SAVAH: Source Address Validation with Host Identity Protocol
NASA Astrophysics Data System (ADS)
Kuptsov, Dmitriy; Gurtov, Andrei
Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.
Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian
2016-03-01
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.
Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chard, Kyle; Lidman, Mattias; McCollam, Brendan
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus,more » describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.« less
Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management
Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian
2015-01-01
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability. PMID:26688598
Filtering SPAM in P2PSIP Communities with Web of Trust
NASA Astrophysics Data System (ADS)
Heikkilä, Juho; Gurtov, Andrei
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasingly popular, proliferation of spam calls is only a matter of time. As SIP identity scheme is practically similar to email, those share the same threats. We utilized Host Identity Protocol (HIP) to provide basic security, such as end-to-end encryption. To provide call filtering, however, other tools are needed. In this paper, we suggest applying trust paths familiar from the PGP web of trust to prevent unwanted communication in P2PSIP communities.
Controller–Pilot Data Link Communication Security
Polishchuk, Tatiana; Wernberg, Max
2018-01-01
The increased utilization of the new types of cockpit communications, including controller–pilot data link communications (CPDLC), puts the airplane at higher risk of hacking or interference than ever before. We review the technological characteristics and properties of the CPDLC and construct the corresponding threat model. Based on the limitations imposed by the system parameters, we propose several solutions for the improved security of the data messaging communication used in air traffic management (ATM). We discuss the applicability of elliptical curve cryptography (ECC), protected aircraft communications addressing and reporting systems (PACARs) and the Host Identity Protocol (HIP) as possible countermeasures to the identified security threats. In addition, we consider identity-defined networking (IDN) as an example of a genuine security solution which implies global changes in the whole air traffic communication system. PMID:29783791
Controller⁻Pilot Data Link Communication Security.
Gurtov, Andrei; Polishchuk, Tatiana; Wernberg, Max
2018-05-20
The increased utilization of the new types of cockpit communications, including controller⁻pilot data link communications (CPDLC), puts the airplane at higher risk of hacking or interference than ever before. We review the technological characteristics and properties of the CPDLC and construct the corresponding threat model. Based on the limitations imposed by the system parameters, we propose several solutions for the improved security of the data messaging communication used in air traffic management (ATM). We discuss the applicability of elliptical curve cryptography (ECC), protected aircraft communications addressing and reporting systems (PACARs) and the Host Identity Protocol (HIP) as possible countermeasures to the identified security threats. In addition, we consider identity-defined networking (IDN) as an example of a genuine security solution which implies global changes in the whole air traffic communication system.
Integrated Detection of Pathogens and Host Biomarkers for Wounds
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jaing, C
2012-03-19
The increasing incidence and complications arising from combat wounds has necessitated a reassessment of methods for effective treatment. Infection, excessive inflammation, and incidence of drug-resistant organisms all contribute toward negative outcomes for afflicted individuals. The organisms and host processes involved in wound progression, however, are incompletely understood. We therefore set out, using our unique technical resources, to construct a profile of combat wounds which did or did not successfully resolve. We employed the Lawrence Livermore Microbial Detection Array and identified a number of nosocomial pathogens present in wound samples. Some of these identities corresponded with bacterial isolates previously cultured, whilemore » others were not obtained via standard microbiology. Further, we optimized proteomics protocols for the identification of host biomarkers indicative of various stages in wound progression. In combination with our pathogen data, our biomarker discovery efforts will provide a profile corresponding to wound complications, and will assist significantly in treatment of these complex cases.« less
NASA Astrophysics Data System (ADS)
Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio
2017-08-01
We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).
NASA Astrophysics Data System (ADS)
Seifert, Veronica Aili
Lyme disease is the most prevalent tick-borne disease in North America and presents challenges to clinicians, researchers and the public in diagnosis, treatment and prevention. Lyme disease is caused by the spirochete, Borrelia burgdorferi, which is a zoonotic pathogen obligate upon hematophagous arthropod vectors and propagates in small mammal reservoir hosts. Identifying factors governing zoonotic diseases within regions of high-risk provides local health and agricultural agencies with necessary information to formulate public policy and implement treatment protocols to abate the rise and expansion of infectious disease outbreaks. In the United States, the documented primary reservoir host of Lyme disease is the white-footed mouse, Peromyscus leucopus, and the arthropod vector is the deer tick, Ixodes scapularis. Reducing the impact of Lyme disease will need novel methods for identifying both the reservoir host and the tick vector. The reservoir host, Peromyscus leucopus is difficult to distinguish from the virtually identical Peromyscus maniculatus that also is present in Northern Minnesota, a region where Lyme disease is endemic. Collection of the Ixodes tick, the Lyme disease vector, is difficult as this is season dependent and differs from year to year. This study develops new strategies to assess the extent of Borrelia burgdorferi in the local environment of Northern Minnesota. A selective and precise method to identify Peromyscus species was developed. This assay provides a reliable and definitive method to identify the reservoir host, Peromyscus leucopus from a physically identical and sympatric Peromyscus species, Peromyscus maniculatus. A new strategy to collect ticks for measuring the disbursement of Borrelia was employed. Students from local high schools were recruited to collect ticks. This strategy increased the available manpower to cover greater terrain, provided students with valuable experience in research methodology, and highlighted the prospect of increasing community engagement in university-based research projects.
Simple Peer-to-Peer SIP Privacy
NASA Astrophysics Data System (ADS)
Koskela, Joakim; Tarkoma, Sasu
In this paper, we introduce a model for enhancing privacy in peer-to-peer communication systems. The model is based on data obfuscation, preventing intermediate nodes from tracking calls, while still utilizing the shared resources of the peer network. This increases security when moving between untrusted, limited and ad-hoc networks, when the user is forced to rely on peer-to-peer schemes. The model is evaluated using a Host Identity Protocol-based prototype on mobile devices, and is found to provide good privacy, especially when combined with a source address hiding scheme. The contribution of this paper is to present the model and results obtained from its use, including usability considerations.
Exploring the Implementation of Steganography Protocols on Quantum Audio Signals
NASA Astrophysics Data System (ADS)
Chen, Kehan; Yan, Fei; Iliyasu, Abdullah M.; Zhao, Jianping
2018-02-01
Two quantum audio steganography (QAS) protocols are proposed, each of which manipulates or modifies the least significant qubit (LSQb) of the host quantum audio signal that is encoded as an FRQA (flexible representation of quantum audio) audio content. The first protocol (i.e. the conventional LSQb QAS protocol or simply the cLSQ stego protocol) is built on the exchanges between qubits encoding the quantum audio message and the LSQb of the amplitude information in the host quantum audio samples. In the second protocol, the embedding procedure to realize it implants information from a quantum audio message deep into the constraint-imposed most significant qubit (MSQb) of the host quantum audio samples, we refer to it as the pseudo MSQb QAS protocol or simply the pMSQ stego protocol. The cLSQ stego protocol is designed to guarantee high imperceptibility between the host quantum audio and its stego version, whereas the pMSQ stego protocol ensures that the resulting stego quantum audio signal is better immune to illicit tampering and copyright violations (a.k.a. robustness). Built on the circuit model of quantum computation, the circuit networks to execute the embedding and extraction algorithms of both QAS protocols are determined and simulation-based experiments are conducted to demonstrate their implementation. Outcomes attest that both protocols offer promising trade-offs in terms of imperceptibility and robustness.
Adom, Theodosia; Puoane, Thandi; De Villiers, Anniza; Kengne, André Pascal
2017-01-01
Introduction The increasing prevalence of obesity and overweight in childhood in developing countries is a public health concern to many governments. Schools play a significant role in the obesity epidemic as well as provide favourable environments for change in behaviours in childhood which can be carried on into adulthood. There is dearth of information on intervention studies in poor-resource settings. This review will summarise the available evidence on school-based interventions that focused on promoting healthy eating and physical activity among learners aged 6–15 years in Africa and to identify factors that lead to successful interventions or potential barriers to success of these programmes within the African context. Methods and analysis This protocol is developed following the guidelines of PRIMSA-P 2015. Relevant search terms and keywords generated from the subject headings and the African search filter will be used to conduct a comprehensive search of MEDLINE (PubMed), MEDLINE (EbscoHost), CINAHL (EbscoHost), Register Academic Search Complete (EbscoHost) and ISI Web of Science (Science Citation Index) for published literature on school-based interventions to prevent and control obesity in learners in Africa. Grey literature will be also be obtained. The searches will cover 1 January 2000 to 30 June 2016. No language limitations will be applied. Full-text articles of eligible studies will be screened. Risk of bias and quality of reporting will be assessed. Data will be extracted, synthesised and presented by country and major regional groupings. Meta-analysis will be conducted for identical variables across studies, where data allow. This protocol is developed following the guidelines of PRISMA-P 2015. Ethics and dissemination No primary data will be collected hence ethics is not a requirement. The findings will be submitted for publication in peer-reviewed journals, in conferences and in policy documents for decision-making, where needed. PMID:28348187
Gaziev, Javid; Isgrò, Antonella; Sodani, Pietro; Marziali, Marco; Paciaroni, Katia; Gallucci, Cristiano; De Angelis, Gioia; Andreani, Marco; Testi, Manuela; Alfieri, Cecilia; Ribersani, Michela; Galluccio, Tiziana; Battarra, Maria Rosa; Morrone, Aldo; Lucarelli, Guido
2016-04-01
Bone marrow transplantation (BMT) for class 3 patients with thalassemia is challenging due to high rates of graft rejection and transplant-related mortality. Since the first studies of BMT in the late 1980s, a number of conditioning regimens have been designed to improve outcomes, but with suboptimal results. Here we report the outcome of transplantation in class 3 patients using a modified protocol. Sixty-three patients between 5 and 16.7 years of age with class 3 thalassemia received HLA-matched sibling BMT following either the original protocol (26 patients) or the modified protocol (37 patients). Both regimens comprised preconditioning cytoreduction with hydroxyurea and azathioprine starting at -45 days pretransplant, and fludarabine from days -16 to -12. Conditioning was performed with busulfan and cyclophosphamide (original protocol) or with busulfan, thiotepa, and cyclophosphamide (modified protocol). The 2 groups showed similar patient demographics. At day 0, the degree of cytoreduction (lymphopenia, neuthropenia, and thrombocytopenia) achieved by the modified protocol was greater than the original protocol. The incidence of graft failure/rejection was significantly higher in the original group (15%; 95% confidence interval [95% CI], 5-32%) compared with the modified group (0%) (P = 0.014). The respective 5-year thalassemia-free survival rates were 73% (95% CI, 51-86%) and 92% (95% CI, 77-97%) (P = 0.047). Both groups showed similar incidences of grades II to IV acute graft-versus host disease. Modified protocol did not increase nonhematological toxicity or infectious complications. The modified treatment protocol effectively and safely prevented graft failure/rejection and significantly increased thalassemia-free survival of class 3 patients with thalassemia.
Comparison of seven protocols to identify fecal contamination sources using Escherichia coli
Stoeckel, D.M.; Mathes, M.V.; Hyer, K.E.; Hagedorn, C.; Kator, H.; Lukasik, J.; O'Brien, T. L.; Fenger, T.W.; Samadpour, M.; Strickler, K.M.; Wiggins, B.A.
2004-01-01
Microbial source tracking (MST) uses various approaches to classify fecal-indicator microorganisms to source hosts. Reproducibility, accuracy, and robustness of seven phenotypic and genotypic MST protocols were evaluated by use of Escherichia coli from an eight-host library of known-source isolates and a separate, blinded challenge library. In reproducibility tests, measuring each protocol's ability to reclassify blinded replicates, only one (pulsed-field gel electrophoresis; PFGE) correctly classified all test replicates to host species; three protocols classified 48-62% correctly, and the remaining three classified fewer than 25% correctly. In accuracy tests, measuring each protocol's ability to correctly classify new isolates, ribotyping with EcoRI and PvuII approached 100% correct classification but only 6% of isolates were classified; four of the other six protocols (antibiotic resistance analysis, PFGE, and two repetitive-element PCR protocols) achieved better than random accuracy rates when 30-100% of challenge isolates were classified. In robustness tests, measuring each protocol's ability to recognize isolates from nonlibrary hosts, three protocols correctly classified 33-100% of isolates as "unknown origin," whereas four protocols classified all isolates to a source category. A relevance test, summarizing interpretations for a hypothetical water sample containing 30 challenge isolates, indicated that false-positive classifications would hinder interpretations for most protocols. Study results indicate that more representation in known-source libraries and better classification accuracy would be needed before field application. Thorough reliability assessment of classification results is crucial before and during application of MST protocols.
Candida utilis and Cyberlindnera (Pichia) jadinii: yeast relatives with expanding applications.
Buerth, Christoph; Tielker, Denis; Ernst, Joachim F
2016-08-01
The yeast Candida utilis is used as a food additive and as a host for heterologous gene expression to produce various metabolites and proteins. Reliable protocols for intracellular production of recombinant proteins are available for C. utilis and have now been expanded to secrete proteins into the growth medium or to achieve surface display by linkage to a cell wall protein. A recombinant C. utilis strain was recently shown to induce oral tolerance in a mouse model of multiple sclerosis suggesting future applications in autoimmune therapy. Whole genome sequencing of C. utilis and its presumed parent Cyberlindnera (Pichia) jadinii demonstrated different ploidy but high sequence identity, consistent with identical recombinant technologies for both yeasts. C. jadinii was recently described as an antagonist to the important human fungal pathogen Candida albicans suggesting its use as a probiotic agent. The review summarizes the status of recombinant protein production in C. utilis, as well as current and future biotechnological and medical applications of C. utilis and C. jadinii.
Blind quantum computation with identity authentication
NASA Astrophysics Data System (ADS)
Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong
2018-04-01
Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.
NASA Astrophysics Data System (ADS)
Stratford, K.; Henrich, O.; Lintuvuori, J. S.; Cates, M. E.; Marenduzzo, D.
2014-06-01
Colloidal particles dispersed in liquid crystals can form new materials with tunable elastic and electro-optic properties. In a periodic ‘blue phase’ host, particles should template into colloidal crystals with potential uses in photonics, metamaterials and transformational optics. Here we show by computer simulation that colloid/cholesteric mixtures can give rise to regular crystals, glasses, percolating gels, isolated clusters, twisted rings and undulating colloidal ropes. This structure can be tuned via particle concentration, and by varying the surface interactions of the cholesteric host with both the particles and confining walls. Many of these new materials are metastable: two or more structures can arise under identical thermodynamic conditions. The observed structure depends not only on the formulation protocol but also on the history of an applied electric field. This new class of soft materials should thus be relevant to design of switchable, multistable devices for optical technologies such as smart glass and e-paper.
Communication-Gateway Software For NETEX, DECnet, And TCP/IP
NASA Technical Reports Server (NTRS)
Keith, B.; Ferry, D.; Fendler, E.
1990-01-01
Communications gateway software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. Provides necessary mapping from one protocol to another and facilitates practical intermachine communications in cost-effective manner by eliminating need to standardize on single protocol or to implement multiple protocols in host computers. Written in Ada.
Wassermann, Maria; Fujishiro, Kaori; Hoppe, Annekatrin
2017-11-01
Overqualification is a form of person-job misfit that is common among those who reside in a foreign country. It is associated with poor work-related well-being and can inhibit full adjustment to the host society. The goal of our study is to examine the impact of perceived overqualification on job satisfaction and career satisfaction among immigrants. Furthermore, we investigated immigrants' host national identity as a moderator of the impact of perceived overqualification on job satisfaction and career satisfaction. We analysed longitudinal online survey data from 124 Italian and Spanish immigrants who migrated to Germany between 2000 and 2014. Regression analyses show that perceived overqualification is negatively associated with job satisfaction six months later. Furthermore, host national identity moderates the association between perceived overqualification and job satisfaction: low overqualification is beneficial for job satisfaction whereas high overqualification is a threat for job satisfaction, especially for immigrants who identify strongly with the host society. We do not find corresponding direct and moderating effects on career satisfaction. We conclude that indicators of acculturation, such as host national identity, are worth considering in order to understand the impact of person-job misfit on work-related well-being among immigrants.
Privacy-Preserving Health Data Collection for Preschool Children
Zhang, Yuan; Ji, Yue
2013-01-01
With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol. PMID:24285984
Privacy-preserving health data collection for preschool children.
Guan, Shaopeng; Zhang, Yuan; Ji, Yue
2013-01-01
With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol.
SPP: A data base processor data communications protocol
NASA Technical Reports Server (NTRS)
Fishwick, P. A.
1983-01-01
The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.
Testing Two Methods that Relate Herbivorous Insects to Host Plants
White, Peter J. T.
2013-01-01
Insect herbivores are integral to terrestrial ecosystems. They provide essential food for higher trophic levels and aid in nutrient cycling. In general, research tends to relate individual insect herbivore species to host plant identity, where a species will show preference for one host over another. In contrast, insect herbivore assemblages are often related to host plant richness where an area with a higher richness of hosts will also have a higher richness of herbivores. In this study, the ability of these two approaches (host plant identity/abundance vs. host plant richness) to describe the diversity, richness, and abundance of an herbivorous Lepidoptera assemblage in temperate forest fragments in southern Canada is tested. Analyses indicated that caterpillar diversity, richness, and abundance were better described by quadrat-scale host plant identity and abundance than by host plant richness. Most host plant-herbivore studies to date have only considered investigating host plant preferences at a species level; the type of assemblage level preference shown in this study has been rarely considered. In addition, host plant replacement simulations indicate that increasing the abundance of preferred host plants could increase Lepidoptera richness and abundance by as much as 30% and 40% respectively in disturbed remnant forest fragments. This differs from traditional thinking that suggests higher levels of insect richness can be best obtained by maximizing plant richness. Host plant species that are highly preferred by the forest-dwelling caterpillar assemblage should be given special management and conservation considerations to maximize biodiversity in forest communities. PMID:24205830
NASA Astrophysics Data System (ADS)
Zhu, Lijuan; Liu, Jingao
2013-07-01
This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.
Patient privacy protection using anonymous access control techniques.
Weerasinghe, D; Rajarajan, M; Elmufti, K; Rakocevic, V
2008-01-01
The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.
Greiman, Stephen E.; Tkach, Vasyl V.; Pulis, Eric; Fayton, Thomas J.; Curran, Stephen S.
2014-01-01
Digeneans are endoparasitic flatworms with complex life cycles including one or two intermediate hosts (first of which is always a mollusk) and a vertebrate definitive host. Digeneans may harbor intracellular endosymbiotic bacteria belonging to the genus Neorickettsia (order Rickettsiales, family Anaplasmataceae). Some Neorickettsia are able to invade cells of the digenean's vertebrate host and are known to cause diseases of wildlife and humans. In this study we report the results of screening 771 digenean samples for Neorickettsia collected from various vertebrates in terrestrial, freshwater, brackish, and marine habitats in the United States, China and Australia. Neorickettsia were detected using a newly designed real-time PCR protocol targeting a 152 bp fragment of the heat shock protein coding gene, GroEL, and verified with nested PCR and sequencing of a 1371 bp long region of 16S rRNA. Eight isolates of Neorickettsia have been obtained. Sequence comparison and phylogenetic analysis demonstrated that 7 of these isolates, provisionally named Neorickettsia sp. 1–7 (obtained from allocreadiid Crepidostomum affine, haploporids Saccocoelioides beauforti and Saccocoelioides lizae, faustulid Bacciger sprenti, deropegid Deropegus aspina, a lecithodendriid, and a pleurogenid) represent new genotypes and one (obtained from Metagonimoides oregonensis) was identical to a published sequence of Neorickettsia known as SF agent. All digenean species reported in this study represent new host records. Three of the 6 digenean families (Haploporidae, Pleurogenidae, and Faustulidae) are also reported for the first time as hosts of Neorickettsia. We have detected Neorickettsia in digeneans from China and Australia for the first time based on PCR and sequencing evidence. Our findings suggest that further surveys from broader geographic regions and wider selection of digenean taxa are likely to reveal new Neorickettsia lineages as well as new digenean host associations. PMID:24911315
Zucker, Kenneth J; Bradley, Susan J; Owen-Anderson, Allison; Kibblewhite, Sarah J; Wood, Hayley; Singh, Devita; Choi, Kathryn
2012-01-01
This study provided a descriptive and quantitative comparative analysis of data from an assessment protocol for adolescents referred clinically for gender identity disorder (n = 192; 105 boys, 87 girls) or transvestic fetishism (n = 137, all boys). The protocol included information on demographics, behavior problems, and psychosexual measures. Gender identity disorder and transvestic fetishism youth had high rates of general behavior problems and poor peer relations. On the psychosexual measures, gender identity disorder patients had considerably greater cross-gender behavior and gender dysphoria than did transvestic fetishism youth and other control youth. Male gender identity disorder patients classified as having a nonhomosexual sexual orientation (in relation to birth sex) reported more indicators of transvestic fetishism than did male gender identity disorder patients classified as having a homosexual sexual orientation (in relation to birth sex). The percentage of transvestic fetishism youth and male gender identity disorder patients with a nonhomosexual sexual orientation self-reported similar degrees of behaviors pertaining to transvestic fetishism. Last, male and female gender identity disorder patients with a homosexual sexual orientation had more recalled cross-gender behavior during childhood and more concurrent cross-gender behavior and gender dysphoria than did patients with a nonhomosexual sexual orientation. The authors discuss the clinical utility of their assessment protocol.
An improved authenticated key agreement protocol for telecare medicine information system.
Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin
2016-01-01
In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.
AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.
Wang, Changji; Shi, Dongyuan; Xu, Xilei
2015-01-01
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.
AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems
Wang, Changji; Shi, Dongyuan; Xu, Xilei
2015-01-01
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879
Bidirectional Retroviral Integration Site PCR Methodology and Quantitative Data Analysis Workflow.
Suryawanshi, Gajendra W; Xu, Song; Xie, Yiming; Chou, Tom; Kim, Namshin; Chen, Irvin S Y; Kim, Sanggu
2017-06-14
Integration Site (IS) assays are a critical component of the study of retroviral integration sites and their biological significance. In recent retroviral gene therapy studies, IS assays, in combination with next-generation sequencing, have been used as a cell-tracking tool to characterize clonal stem cell populations sharing the same IS. For the accurate comparison of repopulating stem cell clones within and across different samples, the detection sensitivity, data reproducibility, and high-throughput capacity of the assay are among the most important assay qualities. This work provides a detailed protocol and data analysis workflow for bidirectional IS analysis. The bidirectional assay can simultaneously sequence both upstream and downstream vector-host junctions. Compared to conventional unidirectional IS sequencing approaches, the bidirectional approach significantly improves IS detection rates and the characterization of integration events at both ends of the target DNA. The data analysis pipeline described here accurately identifies and enumerates identical IS sequences through multiple steps of comparison that map IS sequences onto the reference genome and determine sequencing errors. Using an optimized assay procedure, we have recently published the detailed repopulation patterns of thousands of Hematopoietic Stem Cell (HSC) clones following transplant in rhesus macaques, demonstrating for the first time the precise time point of HSC repopulation and the functional heterogeneity of HSCs in the primate system. The following protocol describes the step-by-step experimental procedure and data analysis workflow that accurately identifies and quantifies identical IS sequences.
Lopez-Rendon, Xochitl; Zhang, Guozhi; Coudyzer, Walter; Develter, Wim; Bosmans, Hilde; Zanca, Federica
2017-11-01
To compare the lung and breast dose associated with three chest protocols: standard, organ-based tube current modulation (OBTCM) and fast-speed scanning; and to estimate the error associated with organ dose when modelling the longitudinal (z-) TCM versus the 3D-TCM in Monte Carlo simulations (MC) for these three protocols. Five adult and three paediatric cadavers with different BMI were scanned. The CTDI vol of the OBTCM and the fast-speed protocols were matched to the patient-specific CTDI vol of the standard protocol. Lung and breast doses were estimated using MC with both z- and 3D-TCM simulated and compared between protocols. The fast-speed scanning protocol delivered the highest doses. A slight reduction for breast dose (up to 5.1%) was observed for two of the three female cadavers with the OBTCM in comparison to the standard. For both adult and paediatric, the implementation of the z-TCM data only for organ dose estimation resulted in 10.0% accuracy for the standard and fast-speed protocols, while relative dose differences were up to 15.3% for the OBTCM protocol. At identical CTDI vol values, the standard protocol delivered the lowest overall doses. Only for the OBTCM protocol is the 3D-TCM needed if an accurate (<10.0%) organ dosimetry is desired. • The z-TCM information is sufficient for accurate dosimetry for standard protocols. • The z-TCM information is sufficient for accurate dosimetry for fast-speed scanning protocols. • For organ-based TCM schemes, the 3D-TCM information is necessary for accurate dosimetry. • At identical CTDI vol , the fast-speed scanning protocol delivered the highest doses. • Lung dose was higher in XCare than standard protocol at identical CTDI vol .
Adom, Theodosia; Puoane, Thandi; De Villiers, Anniza; Kengne, André Pascal
2017-03-27
The increasing prevalence of obesity and overweight in childhood in developing countries is a public health concern to many governments. Schools play a significant role in the obesity epidemic as well as provide favourable environments for change in behaviours in childhood which can be carried on into adulthood. There is dearth of information on intervention studies in poor-resource settings. This review will summarise the available evidence on school-based interventions that focused on promoting healthy eating and physical activity among learners aged 6-15 years in Africa and to identify factors that lead to successful interventions or potential barriers to success of these programmes within the African context. This protocol is developed following the guidelines of PRIMSA-P 2015. Relevant search terms and keywords generated from the subject headings and the African search filter will be used to conduct a comprehensive search of MEDLINE (PubMed), MEDLINE (EbscoHost), CINAHL (EbscoHost), Register Academic Search Complete (EbscoHost) and ISI Web of Science (Science Citation Index) for published literature on school-based interventions to prevent and control obesity in learners in Africa. Grey literature will be also be obtained. The searches will cover 1 January 2000 to 30 June 2016. No language limitations will be applied. Full-text articles of eligible studies will be screened. Risk of bias and quality of reporting will be assessed. Data will be extracted, synthesised and presented by country and major regional groupings. Meta-analysis will be conducted for identical variables across studies, where data allow. This protocol is developed following the guidelines of PRISMA-P 2015. No primary data will be collected hence ethics is not a requirement. The findings will be submitted for publication in peer-reviewed journals, in conferences and in policy documents for decision-making, where needed. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Using principal component analysis for selecting network behavioral anomaly metrics
NASA Astrophysics Data System (ADS)
Gregorio-de Souza, Ian; Berk, Vincent; Barsamian, Alex
2010-04-01
This work addresses new approaches to behavioral analysis of networks and hosts for the purposes of security monitoring and anomaly detection. Most commonly used approaches simply implement anomaly detectors for one, or a few, simple metrics and those metrics can exhibit unacceptable false alarm rates. For instance, the anomaly score of network communication is defined as the reciprocal of the likelihood that a given host uses a particular protocol (or destination);this definition may result in an unrealistically high threshold for alerting to avoid being flooded by false positives. We demonstrate that selecting and adapting the metrics and thresholds, on a host-by-host or protocol-by-protocol basis can be done by established multivariate analyses such as PCA. We will show how to determine one or more metrics, for each network host, that records the highest available amount of information regarding the baseline behavior, and shows relevant deviances reliably. We describe the methodology used to pick from a large selection of available metrics, and illustrate a method for comparing the resulting classifiers. Using our approach we are able to reduce the resources required to properly identify misbehaving hosts, protocols, or networks, by dedicating system resources to only those metrics that actually matter in detecting network deviations.
Garnerin, P; Arès, M; Huchet, A; Clergue, F
2008-12-01
The potential severity of wrong patient/procedure/site of surgery and the view that these events are avoidable, make the prevention of such errors a priority. An intervention was set up to develop a verification protocol for checking patient identity and the site of surgery with periodic audits to measure compliance while providing feedback. A nurse auditor performed the compliance audits in inpatients and outpatients during three consecutive 3-month periods and three 1-month follow-up periods; 11 audit criteria were recorded, as well as reasons for not performing a check. The nurse auditor provided feedback to the health professionals, including discussion of inadequate checks. 1,000 interactions between patients and their anaesthetist or nurse anaesthetist were observed. Between the first and second audit periods compliance with all audit criteria except "surgical site marked" noticeably improved, such as the proportion of patients whose identities were checked (62.6% to 81.4%); full compliance with protocol in patient identity checks (9.7% to 38.1%); proportion of site of surgery checks carried out (77.1% to 92.6%); and full compliance with protocol in site of surgery checks (32.2% to 52.0%). Thereafter, compliance was stable for most criteria. The reason for failure to perform checks of patient identity or site of surgery was mostly that the anaesthetist in charge had seen the patient at the preanaesthetic consultation. By combining the implementation of a verification protocol with periodic audits with feedback, the intervention changed practice and increased compliance with patient identity and site of surgery checks. The impact of the intervention was limited by communication problems between patients and professionals, and lack of collaboration with surgical services.
Multi-Model Validation in the Chesapeake Bay Region During Frontier Sentinel 2010
2012-09-28
which a 72-hr forecast took approximately 1 hr. Identical runs were performed on the DoD Supercomputing Resources Center (DSRC) host “ DaVinci ” at the...performance Navy DSRC host DaVinci . Products of water level and horizontal current maps as well as station time series, identical to those produced by the...forecast meteorological fields. The NCOM simulations were run daily on 128 CPUs at the Navy DSRC host DaVinci and required approximately 5 hrs of wall
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Visual cryptography for face privacy
NASA Astrophysics Data System (ADS)
Ross, Arun; Othman, Asem A.
2010-04-01
We discuss the problem of preserving the privacy of a digital face image stored in a central database. In the proposed scheme, a private face image is dithered into two host face images such that it can be revealed only when both host images are simultaneously available; at the same time, the individual host images do not reveal the identity of the original image. In order to accomplish this, we appeal to the field of Visual Cryptography. Experimental results confirm the following: (a) the possibility of hiding a private face image in two unrelated host face images; (b) the successful matching of face images that are reconstructed by superimposing the host images; and (c) the inability of the host images, known as sheets, to reveal the identity of the secret face image.
USDA-ARS?s Scientific Manuscript database
There are uncertainties concerning the identity and host species specificity of Sarcocystis species of the water buffalo (Bubalus bubalis) and cattle (Bos taurus). Currently, in cattle three species are recognized with known endogenous stages, viz.: S. cruzi (with canine definitive host), S. hirsuta...
Martinez-Vaz, Betsy M; Denny, Roxanne; Young, Nevin D; Sadowsky, Michael J
2015-12-01
Microbiology courses often include a laboratory activity on the identification of unknown microbes. This activity consists of providing students with microbial cultures and running biochemical assays to identify the organisms. This approach lacks molecular techniques such as sequencing of genes encoding 16S rRNA, which is currently the method of choice for identification of unknown bacteria. A laboratory activity was developed to teach students how to identify microorganisms using 16S rRNA polymerase chain reaction (PCR) and validate microbial identities using biochemical techniques. We hypothesized that designing an experimental protocol to confirm the identity of a bacterium would improve students' knowledge of microbial identification techniques and the physiological characteristics of bacterial species. Nitrogen-fixing bacteria were isolated from the root nodules of Medicago truncatula and prepared for 16S rRNA PCR analysis. Once DNA sequencing revealed the identity of the organisms, the students designed experimental protocols to verify the identity of rhizobia. An assessment was conducted by analyzing pre- and posttest scores and by grading students' verification protocols and presentations. Posttest scores were higher than pretest scores at or below p = 0.001. Normalized learning gains (G) showed an improvement of students' knowledge of microbial identification methods (LO4, G = 0.46), biochemical properties of nitrogen-fixing bacteria (LO3, G = 0.45), and the events leading to the establishment of nitrogen-fixing symbioses (LO1&2, G = 0.51, G = 0.37). An evaluation of verification protocols also showed significant improvement with a p value of less than 0.001.
Identity-Based Authentication for Cloud Computing
NASA Astrophysics Data System (ADS)
Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.
Electronic Voting Protocol Using Identity-Based Cryptography.
Gallegos-Garcia, Gina; Tapia-Recillas, Horacio
2015-01-01
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.
Electronic Voting Protocol Using Identity-Based Cryptography
Gallegos-Garcia, Gina; Tapia-Recillas, Horacio
2015-01-01
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515
Server-Controlled Identity-Based Authenticated Key Exchange
NASA Astrophysics Data System (ADS)
Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun
We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.
In situ hybridization for the detection of rust fungi in paraffin embedded plant tissue sections.
Ellison, Mitchell A; McMahon, Michael B; Bonde, Morris R; Palmer, Cristi L; Luster, Douglas G
2016-01-01
Rust fungi are obligate pathogens with multiple life stages often including different spore types and multiple plant hosts. While individual rust pathogens are often associated with specific plants, a wide range of plant species are infected with rust fungi. To study the interactions between these important pathogenic fungi and their host plants, one must be able to differentiate fungal tissue from plant tissue. This can be accomplished using the In situ hybridization (ISH) protocol described here. To validate reproducibility using the ISH protocol, samples of Chrysanthemum × morifolium infected with Puccinia horiana, Gladiolus × hortulanus infected with Uromyces transversalis and Glycine max infected with Phakopsora pachyrhizi were tested alongside uninfected leaf tissue samples. The results of these tests show that this technique clearly distinguishes between rust pathogens and their respective host plant tissues. This ISH protocol is applicable to rust fungi and potentially other plant pathogenic fungi as well. It has been shown here that this protocol can be applied to pathogens from different genera of rust fungi with no background staining of plant tissue. We encourage the use of this protocol for the study of plant pathogenic fungi in paraffin embedded sections of host plant tissue.
The sponge microbiome project.
Moitinho-Silva, Lucas; Nielsen, Shaun; Amir, Amnon; Gonzalez, Antonio; Ackermann, Gail L; Cerrano, Carlo; Astudillo-Garcia, Carmen; Easson, Cole; Sipkema, Detmer; Liu, Fang; Steinert, Georg; Kotoulas, Giorgos; McCormack, Grace P; Feng, Guofang; Bell, James J; Vicente, Jan; Björk, Johannes R; Montoya, Jose M; Olson, Julie B; Reveillaud, Julie; Steindler, Laura; Pineda, Mari-Carmen; Marra, Maria V; Ilan, Micha; Taylor, Michael W; Polymenakou, Paraskevi; Erwin, Patrick M; Schupp, Peter J; Simister, Rachel L; Knight, Rob; Thacker, Robert W; Costa, Rodrigo; Hill, Russell T; Lopez-Legentil, Susanna; Dailianis, Thanos; Ravasi, Timothy; Hentschel, Ute; Li, Zhiyong; Webster, Nicole S; Thomas, Torsten
2017-10-01
Marine sponges (phylum Porifera) are a diverse, phylogenetically deep-branching clade known for forming intimate partnerships with complex communities of microorganisms. To date, 16S rRNA gene sequencing studies have largely utilised different extraction and amplification methodologies to target the microbial communities of a limited number of sponge species, severely limiting comparative analyses of sponge microbial diversity and structure. Here, we provide an extensive and standardised dataset that will facilitate sponge microbiome comparisons across large spatial, temporal, and environmental scales. Samples from marine sponges (n = 3569 specimens), seawater (n = 370), marine sediments (n = 65) and other environments (n = 29) were collected from different locations across the globe. This dataset incorporates at least 268 different sponge species, including several yet unidentified taxa. The V4 region of the 16S rRNA gene was amplified and sequenced from extracted DNA using standardised procedures. Raw sequences (total of 1.1 billion sequences) were processed and clustered with (i) a standard protocol using QIIME closed-reference picking resulting in 39 543 operational taxonomic units (OTU) at 97% sequence identity, (ii) a de novo clustering using Mothur resulting in 518 246 OTUs, and (iii) a new high-resolution Deblur protocol resulting in 83 908 unique bacterial sequences. Abundance tables, representative sequences, taxonomic classifications, and metadata are provided. This dataset represents a comprehensive resource of sponge-associated microbial communities based on 16S rRNA gene sequences that can be used to address overarching hypotheses regarding host-associated prokaryotes, including host specificity, convergent evolution, environmental drivers of microbiome structure, and the sponge-associated rare biosphere. © The Authors 2017. Published by Oxford University Press.
Protocol for a Delay-Tolerant Data-Communication Network
NASA Technical Reports Server (NTRS)
Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin
2004-01-01
As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.
Carr, Michael; Gonzalez, Gabriel; Sasaki, Michihito; Dool, Serena E; Ito, Kimihito; Ishii, Akihiro; Hang'ombe, Bernard M; Mweene, Aaron S; Teeling, Emma C; Hall, William W; Orba, Yasuko; Sawa, Hirofumi
2017-10-06
Polyomaviruses (PyVs) are considered to be highly host-specific in different mammalian species, with no well-supported evidence for host-switching events. We examined the species diversity and host specificity of PyVs in horseshoe bats (Rhinolophus spp.), a broadly distributed and highly speciose mammalian genus. We annotated six PyV genomes, comprising four new PyV species, based on pairwise identity within the large T antigen (LTAg) coding region. Phylogenetic comparisons revealed two instances of highly related PyV species, one in each of the Alphapolyomavirus and Betapolyomavirus genera, present in different horseshoe bat host species (Rhinolophus blasii and R. simulator), suggestive of short-range host-switching events. The two pairs of Rhinolophus PyVs in different horseshoe bat host species were 99.9 and 88.8 % identical with each other over their respective LTAg coding sequences and thus constitute the same virus species. To corroborate the species identification of the bat hosts, we analysed mitochondrial cytb and a large nuclear intron dataset derived from six independent and neutrally evolving loci for bat taxa of interest. Bayesian estimates of the ages of the most recent common ancestors suggested that the near-identical and more distantly related PyV species diverged approximately 9.1E4 (5E3-2.8E5) and 9.9E6 (4E6-18E6) years before the present, respectively, in contrast to the divergence times of the bat host species: 12.4E6 (10.4E6-15.4E6). Our findings provide evidence that short-range host-switching of PyVs is possible in horseshoe bats, suggesting that PyV transmission between closely related mammalian species can occur.
Sikes, Benjamin A; Maherali, Hafiz; Klironomos, John N
2014-04-01
Soil factors and host plant identity can both affect the growth and functioning of mycorrhizal fungi. Both components change during primary succession, but it is unknown if their relative importance to mycorrhizas also changes. This research tested how soil type and host plant differences among primary successional stages determine the growth and plant effects of arbuscular mycorrhizal (AM) fungal communities. Mycorrhizal fungal community, plant identity, and soil conditions were manipulated among three stages of a lacustrine sand dune successional series in a fully factorial greenhouse experiment. Late succession AM fungi produced more arbuscules and soil hyphae when grown in late succession soils, although the community was from the same narrow phylogenetic group as those in intermediate succession. AM fungal growth did not differ between host species, and plant growth was similarly unaffected by different AM fungal communities. These results indicate that though ecological filtering and/or adaptation of AM fungi occurs during this primary dune succession, it more strongly reflects matching between fungi and soils, rather than interactions between fungi and host plants. Thus, AM fungal performance during this succession may not depend directly on the sequence of plant community succession.
Estimation of network path segment delays
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nichols, Kathleen Marie
A method for estimation of a network path segment delay includes determining a scaled time stamp for each packet of a plurality of packets by scaling a time stamp for each respective packet to minimize a difference of at least one of a frequency and a frequency drift between a transport protocol clock of a host and a monitoring point. The time stamp for each packet is provided by the transport protocol clock of the host. A corrected time stamp for each packet is determined by removing from the scaled time stamp for each respective packet, a temporal offset betweenmore » the transport protocol clock and the monitoring clock by minimizing a temporal delay variation of the plurality of packets traversing a segment between the host and the monitoring point.« less
DNET: A communications facility for distributed heterogeneous computing
NASA Technical Reports Server (NTRS)
Tole, John; Nagappan, S.; Clayton, J.; Ruotolo, P.; Williamson, C.; Solow, H.
1989-01-01
This document describes DNET, a heterogeneous data communications networking facility. DNET allows programs operating on hosts on dissimilar networks to communicate with one another without concern for computer hardware, network protocol, or operating system differences. The overall DNET network is defined as the collection of host machines/networks on which the DNET software is operating. Each underlying network is considered a DNET 'domain'. Data communications service is provided between any two processes on any two hosts on any of the networks (domains) that may be reached via DNET. DNET provides protocol transparent, reliable, streaming data transmission between hosts (restricted, initially to DECnet and TCP/IP networks). DNET also provides variable length datagram service with optional return receipts.
Martínez-García, Laura B; Richardson, Sarah J; Tylianakis, Jason M; Peltzer, Duane A; Dickie, Ian A
2015-03-01
Little is known about the response of arbuscular mycorrhizal fungal communities to ecosystem development. We use a long-term soil chronosequence that includes ecosystem progression and retrogression to quantify the importance of host plant identity as a factor driving fungal community composition during ecosystem development. We identified arbuscular mycorrhizal fungi and plant species from 50 individual roots from each of 10 sites spanning 5-120 000 yr of ecosystem age using terminal restriction fragment length polymorphism (T-RFLP), Sanger sequencing and pyrosequencing. Arbuscular mycorrhizal fungal communities were highly structured by ecosystem age. There was strong niche differentiation, with different groups of operational taxonomic units (OTUs) being characteristic of early succession, ecosystem progression and ecosystem retrogression. Fungal alpha diversity decreased with ecosystem age, whereas beta diversity was high at early stages and lower in subsequent stages. A total of 39% of the variance in fungal communities was explained by host plant and site age, 29% of which was attributed to host and the interaction between host and site (24% and 5%, respectively). The strong response of arbuscular mycorrhizal fungi to ecosystem development appears to be largely driven by plant host identity, supporting the concept that plant and fungal communities are tightly coupled rather than independently responding to habitat. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.
A Generic Protocol for Intracellular Expression of Recombinant Proteins in Bacillus subtilis.
Phan, Trang; Huynh, Phuong; Truong, Tuom; Nguyen, Hoang
2017-01-01
Bacillus subtilis (B. subtilis) is a potential and attractive host for the production of recombinant proteins. Different expression systems for B. subtilis have been developed recently, and various target proteins have been recombinantly synthesized and purified using this host. In this chapter, we introduce a generic protocol to express a recombinant protein in B. subtilis. It includes protocols for (1) using our typical expression vector (plasmid pHT254) to introduce a target gene, (2) transformation of the target vector into B. subtilis, and (3) evaluation of the actual expression of a recombinant protein.
Network acceleration techniques
NASA Technical Reports Server (NTRS)
Crowley, Patricia (Inventor); Maccabe, Arthur Barney (Inventor); Awrach, James Michael (Inventor)
2012-01-01
Splintered offloading techniques with receive batch processing are described for network acceleration. Such techniques offload specific functionality to a NIC while maintaining the bulk of the protocol processing in the host operating system ("OS"). The resulting protocol implementation allows the application to bypass the protocol processing of the received data. Such can be accomplished this by moving data from the NIC directly to the application through direct memory access ("DMA") and batch processing the receive headers in the host OS when the host OS is interrupted to perform other work. Batch processing receive headers allows the data path to be separated from the control path. Unlike operating system bypass, however, the operating system still fully manages the network resource and has relevant feedback about traffic and flows. Embodiments of the present disclosure can therefore address the challenges of networks with extreme bandwidth delay products (BWDP).
Intercultural Allusion in Transcultural Identity Narratives
ERIC Educational Resources Information Center
Sell, Jonathan P. A.
2004-01-01
This paper attempts to provide a theoretical framework for the use of intercultural allusion in narratives of transcultural identity. Identity is taken to be narrative in performance, one element of which, intercultural allusion, serves pragmatically to broker the transcultured subject's insertion into the host culture. The paper then shows how…
Quantum secret sharing with identity authentication based on Bell states
NASA Astrophysics Data System (ADS)
Abulkasim, Hussein; Hamad, Safwat; Khalifa, Amal; El Bahnasy, Khalid
Quantum secret sharing techniques allow two parties or more to securely share a key, while the same number of parties or less can efficiently deduce the secret key. In this paper, we propose an authenticated quantum secret sharing protocol, where a quantum dialogue protocol is adopted to authenticate the identity of the parties. The participants simultaneously authenticate the identity of each other based on parts of a prior shared key. Moreover, the whole prior shared key can be reused for deducing the secret data. Although the proposed scheme does not significantly improve the efficiency performance, it is more secure compared to some existing quantum secret sharing scheme due to the identity authentication process. In addition, the proposed scheme can stand against participant attack, man-in-the-middle attack, impersonation attack, Trojan-horse attack as well as information leaks.
Montes-Borrego, Miguel; Lopes, Joao R S; Jiménez-Díaz, Rafael M; Landa, Blanca B
2015-03-01
Two haplotypes of Xylella fastidiosa subsp. pauca (Xfp) that correlated with their host of origin were identified in a collection of 90 isolates infecting citrus and coffee plants in Brazil, based on a single-nucleotide polymorphism in the gyrB sequence. A new single-nucleotide primer extension (SNuPE) protocol was designed for rapid identification of Xfp according to the host source. The protocol proved to be robust for the prediction of the Xfp host source in blind tests using DNA from cultures of the bacterium, infected plants, and insect vectors allowed to feed on Xfp-infected citrus plants. AMOVA and STRUCTURE analyses of microsatellite data separated most Xfp populations on the basis of their host source, indicating that they were genetically distinct. The combined use of the SNaPshot protocol and three previously developed multilocus SSR markers showed that two haplotypes and distinct isolates of Xfp infect citrus and coffee in Brazil and that multiple, genetically different isolates can be present in a single orchard or infect a single tree. This combined approach will be very useful in studies of the epidemiology of Xfp-induced diseases, host specificity of bacterial genotypes, the occurrence of Xfp host jumping, vector feeding habits, etc., in economically important cultivated plants or weed host reservoirs of Xfp in Brazil and elsewhere. Copyright© by the Spanish Society for Microbiology and Institute for Catalan Studies.
Stephanie Gervasi; Carmen Gondhalekar; Deanna H. Olson; Andrew R. Blaustein
2013-01-01
Species composition within ecological assemblages can drive disease dynamics including pathogen invasion, spread, and persistence. In multi-host pathogen systems, interspecific variation in responses to infection creates important context dependency when predicting the outcome of disease. Here, we examine the responses of three sympatric host species to a single fungal...
An Efficient Two-Tier Causal Protocol for Mobile Distributed Systems
Dominguez, Eduardo Lopez; Pomares Hernandez, Saul E.; Gomez, Gustavo Rodriguez; Medina, Maria Auxilio
2013-01-01
Causal ordering is a useful tool for mobile distributed systems (MDS) to reduce the non-determinism induced by three main aspects: host mobility, asynchronous execution, and unpredictable communication delays. Several causal protocols for MDS exist. Most of them, in order to reduce the overhead and the computational cost over wireless channels and mobile hosts (MH), ensure causal ordering at and according to the causal view of the Base Stations. Nevertheless, these protocols introduce certain disadvantage, such as unnecessary inhibition at the delivery of messages. In this paper, we present an efficient causal protocol for groupware that satisfies the MDS's constraints, avoiding unnecessary inhibitions and ensuring the causal delivery based on the view of the MHs. One interesting aspect of our protocol is that it dynamically adapts the causal information attached to each message based on the number of messages with immediate dependency relation, and this is not directly proportional to the number of MHs. PMID:23585828
López-Pérez, Andrés M; Gage, Kenneth; Rubio, Andre V; Montenieri, John; Orozco, Libertad; Suzan, Gerardo
2018-06-01
Host identity, habitat type, season, and interspecific interactions were investigated as determinants of the community structure of fleas on wild carnivores in northwestern Mexico. A total of 540 fleas belonging to seven species was collected from 64 wild carnivores belonging to eight species. We found that the abundances of some flea species are explained by season and host identity. Pulex irritans and Echidnophaga gallinacea abundances were significantly higher in spring than in fall season. Flea communities on carnivore hosts revealed three clusters with a high degree of similarity within each group that was explained by the flea dominance of E. gallinacea, P. simulans, and P. irritans across host identity. Flea abundances did not differ statistically among habitat types. Finally, we found a negative correlation between the abundances of three flea species within wild carnivore hosts. Individual hosts with high loads of P. simulans males usually had significantly lower loads of P. irritans males or tend to have lower loads of E. gallinacea fleas and vice-versa. Additionally, the logistic regression model showed that the presence of P. simulans males is more likely to occur in wild carnivore hosts in which P. irritans males are absent and vice-versa. These results suggest that there is an apparent competitive exclusion among fleas on wild carnivores. The study of flea community structure on wild carnivores is important to identify the potential flea vectors for infectious diseases and provide information needed to design programs for human health and wildlife conservation. © 2018 The Society for Vector Ecology.
Collini, Margherita; Albonico, Francesca; Rosà, Roberto; Tagliapietra, Valentina; Arnoldi, Daniele; Conterno, Lorenza; Rossi, Chiara; Mortarino, Michele; Rizzoli, Annapaola; Hauffe, Heidi Christine
2016-12-12
In Europe, Ixodes ricinus L. is the main vector of a variety of zoonotic pathogens, acquired through blood meals taken once per stage from a vertebrate host. Defining the main tick hosts in a given area is important for planning public health interventions; however, until recently, no robust molecular methods existed for blood meal identification from questing ticks. Here we improved the time- and cost-effectiveness of an HRMA protocol for blood meal analysis and used it to identify blood meal sources of sheep tick larvae from Italian alpine forests. Nine hundred questing nymphs were collected using blanket-dragging in 18 extensive forests and 12 forest patches close to rural villages in the Province of Trento. Total DNA was either extracted manually, with the QIAamp DNA Investigator kit, or automatically using the KingFisher™ Flex Magnetic Particle Processors (KingFisher Cell and Tissue DNA Kit). Host DNA was amplified with six independent host group real-time PCR reactions and identified by means of HRMA. Statistical analyses were performed in R to assess the variables important for achieving successful identification and to compare host use in the two types of forest. Automating DNA extraction improved time- and cost-effectiveness of the HRMA protocol, but identification success fell to 22.4% (KingFisher™) from 55.1% (QIAamp), with larval hosts identified in 215 of 848 questing nymphs; 23 mixed blood meals were noted. However, the list of hosts targeted by our primer sets was extended, improving the potential of the method. Host identification to species or genus level was possible for 137 and 102 blood meals, respectively. The most common hosts were Rodentia (28.9%) and, unexpectedly, Carnivora (28.4%), with domestic dogs accounting for 21.3% of all larval blood meals. Overall, Cetartiodactyla species fed 17.2% of larvae. Passeriformes (14.6%) fed a significantly higher proportion of larvae in forest patches (22.3%) than in extensive forest (9.6%), while Soricomorpha (10.9%) were more important hosts in extensive forest (15.2%) than in forest patches (4.3%). The HRMA protocol for blood meal analysis is a valuable tool in the study of feeding ecology of sheep ticks, especially with the cost- and time- reductions introduced here. To our knowledge, we show for the first time that domestic dogs are important larval hosts in the Alps, which may have possible implications for tick-borne disease cycles in urbanized areas.
Communication protocol in chassis detecting wireless transmission system based on WiFi
USDA-ARS?s Scientific Manuscript database
In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...
A Unified Approach to Intra-Domain Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shue, Craig A; Kalafut, Andrew J.; Gupta, Prof. Minaxi
2009-01-01
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to secure prominent networking protocols within a single domain. We begin with a secure version of the DHCP protocol, which has the additional feature of providing each host with a certificate. We then leverage these certificates to secure ARP, prevent spoofing within the domain, and secure SSH and VPN connections between the domain and hosts which have previously interacted with it locally. In doing so, we also develop an incrementally deployable public key infrastructuremore » which can later be leveraged to support inter-domain authentication.« less
The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan
2007-04-11
27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect
ERIC Educational Resources Information Center
Buchanan, Larry
1998-01-01
Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…
Further developments in generating type-safe messaging
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neswold, R.; King, C.; /Fermilab
2011-11-01
At ICALEPCS 09, we introduced a source code generator that allows processes to communicate safely using data types native to each host language. In this paper, we discuss further development that has occurred since the conference in Kobe, Japan, including the addition of three more client languages, an optimization in network packet size and the addition of a new protocol data type. The protocol compiler is continuing to prove itself as an easy and robust way to get applications written in different languages hosted on different computer architectures to communicate. We have two active Erlang projects that are using themore » protocol compiler to access ACNET data at high data rates. We also used the protocol compiler output to deliver ACNET data to an iPhone/iPad application. Since it takes an average of two weeks to support a new language, we're willing to expand the protocol compiler to support new languages that our community uses.« less
Fine, C G; Berkowitz, A S
2001-01-01
Dissociative Identity Disorder (DID), a chronic childhood onset posttraumatic stress disorder, is currently recognized as a treatable condition. It is considered the paradigmatic dissociative condition and carries with it extreme posttraumatic symptomatology. Therapists skilled in the treatment of DID are typically fluent in the uses of hypnosis for stabilization, affect management, building a safe place and grounding to name of few. EMDR, which has come to the forefront of clinical awareness in the last ten years, seems aptly suited for the treatment of trauma, but can be destabilizing. This paper proposes a protocol, called Wreathing Protocol, for the imbricated use of EMDR and hypnosis in the treatment of not only DID (though this will be the primary focus of the paper), but also Dissociative Disorder Not Otherwise Specified (DDNOS) and chronic Posttraumatic Stress Disorder (PTSD). This protocol is useful to advanced clinicians skilled in both modalities independently. The sequential steps of the Wreathing Protocol will be described and illustrated by a clinical vignette on DID. The clinical implications of the use of the Wreathing Protocol will be discussed in DID as well as the chronic post traumatic spectrum.
ERIC Educational Resources Information Center
Bhadha, Bakhtawar
The challenges of identity formation are particularly difficult for minority youth because of the clash of traditional culture and the host culture. This study examined the effects of parenting style, acculturation, and parent and adolescent ethnic identity on the self-esteem and school performance of East Indian and European American adolescents.…
Pent, Mari; Põldmaa, Kadri; Bahram, Mohammad
2017-01-01
Despite recent advances in understanding the microbiome of eukaryotes, little is known about microbial communities in fungi. Here we investigate the structure of bacterial communities in mushrooms, including common edible ones, with respect to biotic and abiotic factors in the boreal forest. Using a combination of culture-based and Illumina high-throughput sequencing, we characterized the bacterial communities in fruitbodies of fungi from eight genera spanning four orders of the class Agaricomycetes (Basidiomycota). Our results revealed that soil pH followed by fungal identity are the main determinants of the structure of bacterial communities in mushrooms. While almost half of fruitbody bacteria were also detected from soil, the abundance of several bacterial taxa differed considerably between the two environments. The effect of host identity was significant at the fungal genus and order level and could to some extent be ascribed to the distinct bacterial community of the chanterelle, representing Cantharellales—the earliest diverged group of mushroom-forming basidiomycetes. These data suggest that besides the substantial contribution of soil as a major taxa source of bacterial communities in mushrooms, the structure of these communities is also affected by the identity of the host. Thus, bacteria inhabiting fungal fruitbodies may be non-randomly selected from environment based on their symbiotic functions and/or habitat requirements. PMID:28539921
Montgomery, Rhonda J V; Kwak, Jung; Kosloski, Karl; O'Connell Valuch, Katharine
2011-09-01
We examined the effects of a manualized care management protocol specifically designed for care managers working with caregivers, the Tailored Caregiver Assessment and Referral® (TCARE®) protocol, on caregiver identity discrepancy, burden, and depressive symptoms. Preliminary data from a longitudinal, randomized, controlled intervention study with 266 family caregivers served by 52 care managers in 4 states were analyzed using repeated measures random effects regression procedures. Caregivers in the intervention and control groups were repeatedly assessed for up to 9 months on caregiver identity discrepancy, 3 areas of caregiving burden-objective, relationship, and stress burdens; depression; and intention for nursing home placement. We found significant group by time interaction effects for caregiver identity discrepancy, relationship burden, stress burden, depression, and intention for nursing home placement. Caregivers in the intervention group experienced significant improvement on these measures, whereas caregivers in the control group worsened on these measures over time. The preliminary findings provide strong support for effectiveness of the TCARE® protocol on improving caregiver well-being and mental health outcomes.
Kwak, Jung; Kosloski, Karl; O’Connell Valuch, Katharine
2011-01-01
Objectives. We examined the effects of a manualized care management protocol specifically designed for care managers working with caregivers, the Tailored Caregiver Assessment and Referral® (TCARE®) protocol, on caregiver identity discrepancy, burden, and depressive symptoms. Methods. Preliminary data from a longitudinal, randomized, controlled intervention study with 266 family caregivers served by 52 care managers in 4 states were analyzed using repeated measures random effects regression procedures. Caregivers in the intervention and control groups were repeatedly assessed for up to 9 months on caregiver identity discrepancy, 3 areas of caregiving burden—objective, relationship, and stress burdens; depression; and intention for nursing home placement. Results. We found significant group by time interaction effects for caregiver identity discrepancy, relationship burden, stress burden, depression, and intention for nursing home placement. Caregivers in the intervention group experienced significant improvement on these measures, whereas caregivers in the control group worsened on these measures over time. Discussion. The preliminary findings provide strong support for effectiveness of the TCARE® protocol on improving caregiver well-being and mental health outcomes. PMID:21840840
Wunsch, Christopher M; Lewis, Janina P
2015-12-17
Anaerobic bacteria far outnumber aerobes in many human niches such as the gut, mouth, and vagina. Furthermore, anaerobic infections are common and frequently of indigenous origin. The ability of some anaerobic pathogens to invade human cells gives them adaptive measures to escape innate immunity as well as to modulate host cell behavior. However, ensuring that the anaerobic bacteria are live during experimental investigation of the events may pose challenges. Porphyromonas gingivalis, a Gram-negative anaerobe, is capable of invading a variety of eukaryotic non-phagocytic cells. This article outlines how to successfully culture and assess the ability of P. gingivalis to invade human umbilical vein endothelial cells (HUVECs). Two protocols were developed: one to measure bacteria that can successfully invade and survive within the host, and the other to visualize bacteria interacting with host cells. These techniques necessitate the use of an anaerobic chamber to supply P. gingivalis with an anaerobic environment for optimal growth. The first protocol is based on the antibiotic protection assay, which is largely used to study the invasion of host cells by bacteria. However, the antibiotic protection assay is limited; only intracellular bacteria that are culturable following antibiotic treatment and host cell lysis are measured. To assess all bacteria interacting with host cells, both live and dead, we developed a protocol that uses fluorescent microscopy to examine host-pathogen interaction. Bacteria are fluorescently labeled with 2',7'-Bis-(2-carboxyethyl)-5-(and-6)-carboxyfluorescein acetoxymethyl ester (BCECF-AM) and used to infect eukaryotic cells under anaerobic conditions. Following fixing with paraformaldehyde and permeabilization with 0.2% Triton X-100, host cells are labeled with TRITC phalloidin and DAPI to label the cell cytoskeleton and nucleus, respectively. Multiple images taken at different focal points (Z-stack) are obtained for temporal-spatial visualization of bacteria. Methods used in this study can be applied to any cultivable anaerobe and any eukaryotic cell type.
Wunsch, Christopher M.; Lewis, Janina P.
2015-01-01
Anaerobic bacteria far outnumber aerobes in many human niches such as the gut, mouth, and vagina. Furthermore, anaerobic infections are common and frequently of indigenous origin. The ability of some anaerobic pathogens to invade human cells gives them adaptive measures to escape innate immunity as well as to modulate host cell behavior. However, ensuring that the anaerobic bacteria are live during experimental investigation of the events may pose challenges. Porphyromonas gingivalis, a Gram-negative anaerobe, is capable of invading a variety of eukaryotic non-phagocytic cells. This article outlines how to successfully culture and assess the ability of P. gingivalis to invade human umbilical vein endothelial cells (HUVECs). Two protocols were developed: one to measure bacteria that can successfully invade and survive within the host, and the other to visualize bacteria interacting with host cells. These techniques necessitate the use of an anaerobic chamber to supply P. gingivalis with an anaerobic environment for optimal growth. The first protocol is based on the antibiotic protection assay, which is largely used to study the invasion of host cells by bacteria. However, the antibiotic protection assay is limited; only intracellular bacteria that are culturable following antibiotic treatment and host cell lysis are measured. To assess all bacteria interacting with host cells, both live and dead, we developed a protocol that uses fluorescent microscopy to examine host-pathogen interaction. Bacteria are fluorescently labeled with 2',7'-Bis-(2-carboxyethyl)-5-(and-6)-carboxyfluorescein acetoxymethyl ester (BCECF-AM) and used to infect eukaryotic cells under anaerobic conditions. Following fixing with paraformaldehyde and permeabilization with 0.2% Triton X-100, host cells are labeled with TRITC phalloidin and DAPI to label the cell cytoskeleton and nucleus, respectively. Multiple images taken at different focal points (Z-stack) are obtained for temporal-spatial visualization of bacteria. Methods used in this study can be applied to any cultivable anaerobe and any eukaryotic cell type. PMID:26709454
Vályi, Kriszta; Rillig, Matthias C; Hempel, Stefan
2015-03-01
We studied the effect of host plant identity and land-use intensity (LUI) on arbuscular mycorrhizal fungi (AMF, Glomeromycota) communities in roots of grassland plants. These are relevant factors for intraradical AMF communities in temperate grasslands, which are habitats where AMF are present in high abundance and diversity. In order to focus on fungi that directly interact with the plant at the time, we investigated root-colonizing communities. Our study sites represent an LUI gradient with different combinations of grazing, mowing, and fertilization. We used massively parallel multitag pyrosequencing to investigate AMF communities in a large number of root samples, while being able to track the identity of the host. We showed that host plants significantly differed in AMF community composition, while land use modified this effect in a plant species-specific manner. Communities in medium and low land-use sites were subsets of high land-use communities, suggesting a differential effect of land use on the dispersal of AMF species with different abundances and competitive abilities. We demonstrate that in these grasslands, there is a small group of highly abundant, generalist fungi which represent the dominating species in the AMF community. © 2014 The Authors New Phytologist © 2014 New Phytologist Trust.
Autoconfiguration and Service Discovery
NASA Astrophysics Data System (ADS)
Manner, Jukka
To be useful, IP networking requires various parameters to be set up. A network node needs at least an IP address, routing information, and name services. In a fixed network this configuration is typically done with a centralized scheme, where a server hosts the configuration information and clients query the server with the Dynamic Host Configuration Protocol (DHCP). Companies, university campuses and even home broadband use the DHCP system to configure hosts. This signaling happens in the background, and users seldom need to think about it; only when things are not working properly, manual intervention is needed. The same protocol can be used in mobile networks, where the client device communicates with the access network provider and his DHCP service. The core information provided by DHCP includes a unique IP address for the host, the IP address of the closest IP router for routing messages to other networks, and the location of domain name servers.
Complement C2 receptor inhibitor trispanning: from man to schistosome.
Inal, Jameel M
2005-11-01
Horizontal gene transfer (HGT), in relation to genetic transfer between hosts and parasites, is a little described mechanism. Since the complement inhibitor CRIT was first discovered in the human Schistosoma parasite (the causative agent of Bilharzia) and in Trypanosoma cruzi (a parasite causing Chagas' disease), it has been found to be distributed amongst various species, ranging from the early teleost cod to rats and humans. In terms of evolutionary distance, as measured in a phylogenetic analysis of these CRIT genes at nucleotide level, the parasitic species are as removed from their human host as is the rat sequence, suggesting HGT. The hypotheses that CRIT in humans and schistosomes is orthologous and that the presence of CRIT in schistosomes occurs as a result of host-to-parasite HGT are presented in the light of empirical data and the growing body of data on mobile genetic elements in human and schistosome genomes. In summary, these data indicate phylogenetic proximity between Schistosoma and human CRIT, identity of function, high nucleotide/amino acid identity and secondary protein structure, as well as identical genomic organization.
Rivera-Parra, Jose L; Levin, Iris I; Johnson, Kevin P; Parker, Patricia G
2015-08-01
Parasites comprise a significant percentage of the biodiversity of the planet and are useful systems to test evolutionary and ecological hypotheses. In this study, we analyze the effect of host species identity and the immediate local species assemblage within mixed species colonies of nesting seabirds on patterns of genetic clustering within two species of multihost ectoparasitic lice. We use three genetic markers (one mitochondrial, COI, and two nuclear, EF1-α and wingless) and maximum likelihood phylogenetic trees to test whether (1) parasites show lineage sorting based on their host species; and (2) switching of lineages to the alternate host species depends on the immediate local species assemblage of individual hosts within a colony. Specifically, we examine the genetic structure of two louse species: Eidmanniella albescens, infecting both Nazca (Sula granti) and blue-footed boobies (Sula nebouxii), and Fregatiella aurifasciata, infecting both great (Fregata minor) and magnificent frigatebirds (Fregata magnificens). We found that host species identity was the only factor explaining the patterns of genetic structure in both parasites. In both cases, there is evident genetic differentiation depending on the host species. Thus, a revision of the taxonomy of these louse species is needed. One possible explanation of this pattern is extremely low louse migration rates between host species, perhaps influenced by fine-scale spatial separation of host species within mixed colonies, and low parasite infrapopulation numbers.
Rivera-Parra, Jose L; Levin, Iris I; Johnson, Kevin P; Parker, Patricia G
2015-01-01
Parasites comprise a significant percentage of the biodiversity of the planet and are useful systems to test evolutionary and ecological hypotheses. In this study, we analyze the effect of host species identity and the immediate local species assemblage within mixed species colonies of nesting seabirds on patterns of genetic clustering within two species of multihost ectoparasitic lice. We use three genetic markers (one mitochondrial, COI, and two nuclear, EF1-α and wingless) and maximum likelihood phylogenetic trees to test whether (1) parasites show lineage sorting based on their host species; and (2) switching of lineages to the alternate host species depends on the immediate local species assemblage of individual hosts within a colony. Specifically, we examine the genetic structure of two louse species: Eidmanniella albescens, infecting both Nazca (Sula granti) and blue-footed boobies (Sula nebouxii), and Fregatiella aurifasciata, infecting both great (Fregata minor) and magnificent frigatebirds (Fregata magnificens). We found that host species identity was the only factor explaining the patterns of genetic structure in both parasites. In both cases, there is evident genetic differentiation depending on the host species. Thus, a revision of the taxonomy of these louse species is needed. One possible explanation of this pattern is extremely low louse migration rates between host species, perhaps influenced by fine-scale spatial separation of host species within mixed colonies, and low parasite infrapopulation numbers. PMID:26380662
McCaffrey, Keegan; Johnson, Pieter T. J.
2017-01-01
Decades of community ecology research have highlighted the importance of resource availability, habitat heterogeneity, and colonization opportunities in driving biodiversity. Less clear, however, is whether a similar suite of factors explains the diversity of symbionts. Here, we used a hierarchical dataset involving 12,712 freshwater snail hosts representing five species to test the relative importance of potential factors in driving symbiont richness. Specifically, we used model selection to assess the explanatory power of variables related to host species identity, resource availability (average body size, host density), ecological heterogeneity (richness of hosts and other taxa), and colonization opportunities (wetland size and amount of neighboring wetland area) on symbiont richness in 146 snail host populations in California, USA. We encountered a total of 24 taxa of symbionts, including both obligatory parasites such as digenetic trematodes as well as more commensal, mutualistic, or opportunistic groups such as aquatic insect larvae, annelids, and leeches. After validating richness estimates per host population using species accumulative curves, we detected positive effects on symbiont richness from host body size, total richness of the aquatic community, and colonization opportunities. Neither snail density nor the richness of snail species accounted for significant variation in symbiont diversity. Host species identity also affected symbiont richness, with higher gamma and average alpha diversity among more common host species and with higher local abundances. These findings highlight the importance of multiple, concurrent factors in driving symbiont richness that extend beyond epidemiological measures of host abundance or host diversity alone. PMID:28039528
Steinert, Georg; Taylor, Michael W.; Deines, Peter; Simister, Rachel L.; de Voogd, Nicole J.; Hoggard, Michael
2016-01-01
Sponges (phylum Porifera) are important members of almost all aquatic ecosystems, and are renowned for hosting often dense and diverse microbial communities. While the specificity of the sponge microbiota seems to be closely related to host phylogeny, the environmental factors that could shape differences within local sponge-specific communities remain less understood. On tropical coral reefs, sponge habitats can span from shallow areas to deeper, mesophotic sites. These habitats differ in terms of environmental factors such as light, temperature, and food availability, as well as anthropogenic impact. In order to study the host specificity and potential influence of varying habitats on the sponge microbiota within a local area, four tropical reef sponges, Rhabdastrella globostellata, Callyspongia sp., Rhaphoxya sp., and Acanthella cavernosa, were collected from exposed shallow reef slopes and a deep reef drop-off. Based on 16S rRNA gene pyrosequencing profiles, beta diversity analyses revealed that each sponge species possessed a specific microbiota that was significantly different to those of the other species and exhibited attributes that are characteristic of high- and/or low-microbial-abundance sponges. These findings emphasize the influence of host identity on the associated microbiota. Dominant sponge- and seawater-associated bacterial phyla were Chloroflexi, Cyanobacteria, and Proteobacteria. Comparison of individual sponge taxa and seawater samples between shallow and deep reef sites revealed no significant variation in alpha diversity estimates, while differences in microbial beta diversity (variation in community composition) were significant for Callyspongia sp. sponges and seawater samples. Overall, the sponge-associated microbiota is significantly shaped by host identity across all samples, while the effect of habitat differentiation seems to be less predominant in tropical reef sponges. PMID:27114882
GATEWAY - COMMUNICATIONS GATEWAY SOFTWARE FOR NETEX, DECNET, AND TCP/IP
NASA Technical Reports Server (NTRS)
Keith, B.
1994-01-01
The Communications Gateway Software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. The gateway provides the necessary mapping from one protocol to another and will facilitate practical intermachine communications in a cost effective manner by eliminating the need to standardize on a single protocol or the need to implement multiple protocols in the host computers. The purpose of the gateway is to support data transfers between application programs on different host computers using different protocols. The gateway computer must be physically connected to both host computers and must contain the system software needed to use the communication protocols of both host computers. The communication process between application partners can be divided into three phases: session establishment, data transfer, and session termination. The communication protocols supported by GATEWAY (DECnet, NETEX, and TCP/IP) have addressing mechanisms that allow an application to identify itself and distinguish among other applications on the network. The exact form of the address varies depending on whether an application is passively offering (awaiting the receipt of a network connection from another network application) or actively connecting to another network. When the gateway is started, GATEWAY reads a file of address pairs. One of the address pairs is used by GATEWAY for passively offering on one network while the other address in the pair is used for actively connecting on the other network establishing the session. Now the two application partners can send and receive data in a manner appropriate to their home networks. GATEWAY accommodates full duplex transmissions. Thus, if the application partners are sophisticated enough, they can send and receive simultaneously. GATEWAY also keeps track of the number of bytes contained in each ransferred data packet. If GATEWAY detects an error during the data transfer, the sessions on both networks are terminated and the passive offer on the appropriate network is reissued. After performing the desired data transfer, one of the remote applications will send a network disconnect to the gateway to close its communication link. Upon detecting this network disconnect, GATEWAY replies with its own disconnect to ensure that the network connection has been fully terminated. Then, GATEWAY terminates its session with the other application by closing the communication link. GATEWAY has been implemented on a DEC VAX under VMS 4.7. It is written in ADA and has a central memory requirement of approximately 406K bytes. The communications protocols supported by GATEWAY are Network Systems Corporation's Network Executive (NETEX), Excelan's TCP/IP, and DECnet. GATEWAY was developed in 1988.
Tag Content Access Control with Identity-based Key Exchange
NASA Astrophysics Data System (ADS)
Yan, Liang; Rong, Chunming
2010-09-01
Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.
Leaf bacterial diversity mediates plant diversity and ecosystem function relationships.
Laforest-Lapointe, Isabelle; Paquette, Alain; Messier, Christian; Kembel, Steven W
2017-06-01
Research on biodiversity and ecosystem functioning has demonstrated links between plant diversity and ecosystem functions such as productivity. At other trophic levels, the plant microbiome has been shown to influence host plant fitness and function, and host-associated microbes have been proposed to influence ecosystem function through their role in defining the extended phenotype of host organisms However, the importance of the plant microbiome for ecosystem function has not been quantified in the context of the known importance of plant diversity and traits. Here, using a tree biodiversity-ecosystem functioning experiment, we provide strong support for the hypothesis that leaf bacterial diversity is positively linked to ecosystem productivity, even after accounting for the role of plant diversity. Our results also show that host species identity, functional identity and functional diversity are the main determinants of leaf bacterial community structure and diversity. Our study provides evidence of a positive correlation between plant-associated microbial diversity and terrestrial ecosystem productivity, and a new mechanism by which models of biodiversity-ecosystem functioning relationships can be improved.
Chameleon Changes: An Exploration of Racial Identity Themes of Multiracial People
ERIC Educational Resources Information Center
Miville, Marie L.; Constantine, Madonna G.; Baysden, Matthew F.; So-Lloyd, Gloria
2005-01-01
The current study explored essential themes of racial identity development among 10 self-identified multiracial adults from a variety of racial backgrounds. Participants were interviewed using a semistructured protocol, and the interviews were recorded, transcribed, and then coded for themes by research team members. Four primary themes were…
Cheung, Leo Chin-Ting; Jones, Alice Yee-Men
2007-06-01
This study aims to investigate the effect of transcutaneous electrical nerve stimulation, applied at bilateral acupuncture points PC6 (Acu-TENS), on recovery heart rate (HR) in healthy subjects after treadmill running exercise. A single blinded, randomized controlled trial. Laboratory with healthy male subjects (n=28). Each subject participated in three separate protocols in random order. PROTOCOL A: The subject followed the Bruce protocol and ran on a treadmill until their HR reached 70% of their maximum (220-age). At this 'target' HR, the subject adopted the supine position and Acu-TENS to bilateral PC6 was commenced. PROTOCOL B: Identical to protocol A except that Acu-TENS was applied in the supine position for 45min prior to, but not after exercise. PROTOCOL C: Identical to protocol A except that placebo Acu-TENS was applied. Heart rate was recorded before and at 30s intervals after exercise until it returned to the pre-exercise baseline. The time for HR to return to baseline was compared for each protocol. Acu-TENS applied to bilateral PC6 resulted in a faster return to pre-exercise HR compared to placebo. Time required for HR to return to pre-exercise level in protocols A-C was 5.5+/-3.0; 4.8+/-3.3; 9.4+/-3.7 min, respectively (p<0.001). There was no statistical difference in HR recovery time between protocols A and B. Subjects expressed the lowest rate of perceived exertion score (RPE) at 70% maximum HR with protocol B. This study suggests that Acu-TENS applied to PC6 may facilitate HR recovery after high intensity treadmill exercise.
Documentary of MFENET, a national computer network
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shuttleworth, B.O.
1977-06-01
The national Magnetic Fusion Energy Computer Network (MFENET) is a newly operational star network of geographically separated heterogeneous hosts and a communications subnetwork of PDP-11 processors. Host processors interfaced to the subnetwork currently include a CDC 7600 at the Central Computer Center (CCC) and several DECsystem-10's at User Service Centers (USC's). The network was funded by a U.S. government agency (ERDA) to provide in an economical manner the needed computational resources to magnetic confinement fusion researchers. Phase I operation of MFENET distributed the processing power of the CDC 7600 among the USC's through the provision of file transport between anymore » two hosts and remote job entry to the 7600. Extending the capabilities of Phase I, MFENET Phase II provided interactive terminal access to the CDC 7600 from the USC's. A file management system is maintained at the CCC for all network users. The history and development of MFENET are discussed, with emphasis on the protocols used to link the host computers and the USC software. Comparisons are made of MFENET versus ARPANET (Advanced Research Projects Agency Computer Network) and DECNET (Digital Distributed Network Architecture). DECNET and MFENET host-to host, host-to-CCP, and link protocols are discussed in detail. The USC--CCP interface is described briefly. 43 figures, 2 tables.« less
Defining the identity of human adipose-derived mesenchymal stem cells.
Montelatici, Elisa; Baluce, Barbara; Ragni, Enrico; Lavazza, Cristiana; Parazzi, Valentina; Mazzola, Riccardo; Cantarella, Giovanna; Brambilla, Massimiliano; Giordano, Rosaria; Lazzari, Lorenza
2015-02-01
Adipose-derived mesenchymal stem cells (ADMSCs) are an ideal population for regenerative medical application. Both the isolation procedure and the culturing conditions are crucial steps, since low yield can limit further cell therapies, especially when minimal adipose tissue harvests are available for cell expansion. To date, a standardized procedure encompassing both isolation sites and expansion methods is missing, thus making the choice of the most appropriate conditions for the preparation of ADMSCs controversial, especially in view of the different applications needed. In this study, we compared the effects of three different commercial media (DMEM, aMEM, and EGM2), routinely used for ADMSCs expansion, and two supplements, FBS and human platelet lysate, recently proven to be an effective alternative to prevent xenogeneic antibody transfer and immune alloresponse in the host. Notably, all the conditions resulted in being safe for ADMSCs isolation and expansion with platelet lysate supplementation giving the highest isolation and proliferation rates, together with a commitment for osteogenic lineage. Then, we proved that the high ADMSC hematopoietic supportive potential is performed through a constant and abundant secretion of both GCSF and SCF. In conclusion, this study further expands the knowledge on ADMSCs, defining their identity definition and offers potential options for in vitro protocols for clinical production, especially related to HSC expansion without use of exogenous cytokines or genetic modifications.
Hu, Jun; Mercer, Jay; Peyton, Liam; Kantarcioglu, Murat; Malin, Bradley; Buckeridge, David; Samet, Saeed; Earle, Craig
2011-01-01
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality has been an important driver of this reluctance. Methods Six requirements for a surveillance protocol were defined that satisfy the confidentiality needs of providers and ensure utility to public health. The authors developed a secure multi-party computation protocol using the Paillier cryptosystem to allow the disclosure of stratified case counts and denominators to meet these requirements. The authors evaluated the protocol in a simulated environment on its computation performance and ability to detect disease outbreak clusters. Results Theoretical and empirical assessments demonstrate that all requirements are met by the protocol. A system implementing the protocol scales linearly in terms of computation time as the number of providers is increased. The absolute time to perform the computations was 12.5 s for data from 3000 practices. This is acceptable performance, given that the reporting would normally be done at 24 h intervals. The accuracy of detection disease outbreak cluster was unchanged compared with a non-secure distributed surveillance protocol, with an F-score higher than 0.92 for outbreaks involving 500 or more cases. Conclusion The protocol and associated software provide a practical method for providers to disclose patient data for sentinel, syndromic or other indicator-based surveillance while protecting patient privacy and the identity of individual providers. PMID:21486880
Closed Conference Signalling Using the Session Initiation Protocol.
ERIC Educational Resources Information Center
Miladinovic, Igor; Stadler, Johannes
2003-01-01
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Sintayehu, Dejene W; Heitkönig, Ignas M A; Prins, Herbert H T; Tessema, Zewdu K; DE Boer, Willem F
2017-05-01
Current theories on diversity-disease relationships describe host species diversity and species identity as important factors influencing disease risk, either diluting or amplifying disease prevalence in a community. Whereas the simple term 'diversity' embodies a set of animal community characteristics, it is not clear how different measures of species diversity are correlated with disease risk. We therefore tested the effects of species richness, Pielou's evenness and Shannon's diversity on bovine tuberculosis (bTB) risk in cattle in the Afar Region and Awash National Park between November 2013 and April 2015. We also analysed the identity effect of a particular species and the effect of host habitat use overlap on bTB risk. We used the comparative intradermal tuberculin test to assess the number of bTB-infected cattle. Our results suggested a dilution effect through species evenness. We found that the identity effect of greater kudu - a maintenance host - confounded the dilution effect of species diversity on bTB risk. bTB infection was positively correlated with habitat use overlap between greater kudu and cattle. Different diversity indices have to be considered together for assessing diversity-disease relationships, for understanding the underlying causal mechanisms. We posit that unpacking diversity metrics is also relevant for formulating disease control strategies to manage cattle in ecosystems characterized by seasonally limited resources and intense wildlife-livestock interactions.
NANOINTERACT: A rational approach to the interaction between nanoscale materials and living matter?
NASA Astrophysics Data System (ADS)
Lynch, Iseult; Linse, Sara; Vyvyan Howard, C.; Stepnik, Maciej; Rydzynski, Konrad; Hanrahan, John; de Jong, Wim; Langevin, Dominique; Rädler, Joachim; Parak, Wolfgang; Volkov, Yuri; Radomski, Marek; Thomas, Robert; Klein, Jacob; Barron, Andrew A.; Janssen, Colin; Lyons, Fiona M.; Quinn, Francis; Swennen, Bert; Cuypers, Peter; Duffy, Angela; Dawson, Kenneth A.
2009-05-01
The importance of understanding the interactions between nanoscale materials and living matter has now begun to be appreciated by an extraordinaryly large range of stakeholders, including researchers, industry, governments and society, all of whom appreciate both the opportunities presented by and challenges raised by this arena of research. Not only does it open up new directions in nanomedicine and nanodiagnostics, but it also offers the chance to implement nanotechnology across all industry in a safe and responsible manner. The underlying reasons for this arena as a new scientific paradigm are real and durable. Less than 100 nm nanoparticles can enter cells, less that 40 nm they can enter cell nucleus, and less that 35 nm they can pass through the blood brain barrier. These are fundamental length scales of biological relevance that will ensure that engineered nanoscience will impinge on biology and medicine for many decades to come. One important issue is the current lack of reproducibility of the outcomes of many experiments in this arena. Differences are likely a consequence of such things as uncontrolled nanoparticle aggregation leading to unpredictable doses being presented to cells, interference of the nanoparticles themselves with many of the tests being applied, differences in the degree of confluency of the cells used, and a host of other factors. NanoInteract has shown how careful control of all aspects of the test system, combined with round robin type approaches, can help resolve these issues and begin to ensure that the field can become a quantitative science. The basic principle of NanoInteract is that given identical nanomaterials, cells and biological materials, and using a common protocol, experiments must yield identical answers. Thus, any deviations result from errors in (applying) the protocol which can be tracked and eliminated, until quantitatively reproducible results are obtained by any researcher in any location. This paper outlines the NanoInteract programme, illustrates key advances, and highlights early successes. (www.nanointeract.net)
Exploring Uyghur University Students' Identities Constructed through Multilingual Practices in China
ERIC Educational Resources Information Center
Guo, Xiaoyan; Gu, Mingyue
2018-01-01
This article explores how a cohort of tertiary-level Uyghur students contested and negotiated their identities through multilingual practices in the receiving community. Drawing upon interview data from fieldwork, this study indicates that these students experienced essentialist understandings and negative views in the host society. Participants…
Sandford, II, Maxwell T.; Handel, Theodore G.
1997-01-01
A method of embedding auxiliary information into a set of host data, such as a photograph, television signal, facsimile transmission, or identification card. All such host data contain intrinsic noise, allowing pixels in the host data which are nearly identical and which have values differing by less than the noise value to be manipulated and replaced with auxiliary data. As the embedding method does not change the elemental values of the host data, the auxiliary data do not noticeably affect the appearance or interpretation of the host data. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user.
Sandford, M.T. II; Handel, T.G.
1997-08-19
A method is disclosed for embedding auxiliary information into a set of host data, such as a photograph, television signal, facsimile transmission, or identification card. All such host data contain intrinsic noise, allowing pixels in the host data which are nearly identical and which have values differing by less than the noise value to be manipulated and replaced with auxiliary data. As the embedding method does not change the elemental values of the host data, the auxiliary data do not noticeably affect the appearance or interpretation of the host data. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user. 19 figs.
Sullivan, Con; Jurcyzszak, Denise; Goody, Michelle F; Gabor, Kristin A; Longfellow, Jacob R; Millard, Paul J; Kim, Carol H
2017-01-20
Each year, seasonal influenza outbreaks profoundly affect societies worldwide. In spite of global efforts, influenza remains an intractable healthcare burden. The principle strategy to curtail infections is yearly vaccination. In individuals who have contracted influenza, antiviral drugs can mitigate symptoms. There is a clear and unmet need to develop alternative strategies to combat influenza. Several animal models have been created to model host-influenza interactions. Here, protocols for generating zebrafish models for systemic and localized human influenza A virus (IAV) infection are described. Using a systemic IAV infection model, small molecules with potential antiviral activity can be screened. As a proof-of-principle, a protocol that demonstrates the efficacy of the antiviral drug Zanamivir in IAV-infected zebrafish is described. It shows how disease phenotypes can be quantified to score the relative efficacy of potential antivirals in IAV-infected zebrafish. In recent years, there has been increased appreciation for the critical role neutrophils play in the human host response to influenza infection. The zebrafish has proven to be an indispensable model for the study of neutrophil biology, with direct impacts on human medicine. A protocol to generate a localized IAV infection in the Tg(mpx:mCherry) zebrafish line to study neutrophil biology in the context of a localized viral infection is described. Neutrophil recruitment to localized infection sites provides an additional quantifiable phenotype for assessing experimental manipulations that may have therapeutic applications. Both zebrafish protocols described faithfully recapitulate aspects of human IAV infection. The zebrafish model possesses numerous inherent advantages, including high fecundity, optical clarity, amenability to drug screening, and availability of transgenic lines, including those in which immune cells such as neutrophils are labeled with fluorescent proteins. The protocols detailed here exploit these advantages and have the potential to reveal critical insights into host-IAV interactions that may ultimately translate into the clinic.
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic. PMID:27007951
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.
An Educators' Guide to Information Access across the Internet.
ERIC Educational Resources Information Center
Hazari, Sunil
1994-01-01
A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…
Johnson, M. Brittany; Criss, Alison K.
2013-01-01
Central to the field of bacterial pathogenesis is the ability to define if and how microbes survive after exposure to eukaryotic cells. Current protocols to address these questions include colony count assays, gentamicin protection assays, and electron microscopy. Colony count and gentamicin protection assays only assess the viability of the entire bacterial population and are unable to determine individual bacterial viability. Electron microscopy can be used to determine the viability of individual bacteria and provide information regarding their localization in host cells. However, bacteria often display a range of electron densities, making assessment of viability difficult. This article outlines protocols for the use of fluorescent dyes that reveal the viability of individual bacteria inside and associated with host cells. These assays were developed originally to assess survival of Neisseria gonorrhoeae in primary human neutrophils, but should be applicable to any bacterium-host cell interaction. These protocols combine membrane-permeable fluorescent dyes (SYTO9 and 4',6-diamidino-2-phenylindole [DAPI]), which stain all bacteria, with membrane-impermeable fluorescent dyes (propidium iodide and SYTOX Green), which are only accessible to nonviable bacteria. Prior to eukaryotic cell permeabilization, an antibody or fluorescent reagent is added to identify extracellular bacteria. Thus these assays discriminate the viability of bacteria adherent to and inside eukaryotic cells. A protocol is also provided for using the viability dyes in combination with fluorescent antibodies to eukaryotic cell markers, in order to determine the subcellular localization of individual bacteria. The bacterial viability dyes discussed in this article are a sensitive complement and/or alternative to traditional microbiology techniques to evaluate the viability of individual bacteria and provide information regarding where bacteria survive in host cells. PMID:24056524
Adom, Theodosia; Puoane, Thandi; De Villiers, Anniza; Kengne, André Pascal
2017-01-01
Introduction Obesity and overweight are an emerging problem in Africa. Obese children are at increased risk of developing hypertension, high cholesterol, orthopaedic problems and type 2 diabetes as well as increased risk of adult obesity. Prevention of childhood overweight and obesity therefore needs high priority. The review approach is particularly useful in establishing whether research findings are consistent and can be generalised across populations and settings. This systematic review aims to assess the magnitude and distribution of overweight and obesity among primary school learners within populations in Africa. Methods and analysis A comprehensive search of key bibliographic databases including MEDLINE (PubMed), MEDLINE (EbscoHost), CINAHL (EbscoHost), Academic Search Complete (EbscoHost) and ISI Web of Science (Science Citation Index) will be conducted for published literature. Grey literature will be also be obtained. Full-text articles of eligible studies will be obtained and screened following predefined inclusion criteria. The quality of reporting as well as risk of bias of included studies will be assessed, data extracted and synthesised. The results will be summarised and presented by country and major regional groupings. Meta-analysis will be conducted for identical variables across studies. This review will be reported following the MOOSE Guidelines for Meta-Analysis and Systematic Reviews of Observational Studies. Ethics and dissemination Ethics is not a requirement since no primary data will be collected. All data that will be presented in this review are based on published articles. The findings of this systematic review will be submitted for publication in peer-reviewed journals and disseminated in national and international conferences and also in policy documents to appropriate bodies for decision-making, where needed. It is expected that the findings will identify some research gaps for further studies. PMID:28087553
Tan, J S P; Tan, K-L; Lee, J C L; Wan, C-M; Leong, J-L; Chan, L-L
2009-02-01
To our knowledge, there has been no study that compares the radiation dose delivered to the eye lens by 16- and 64-section multidetector CT (MDCT) for standard clinical neuroimaging protocols. Our aim was to assess radiation-dose differences between 16- and 64-section MDCT from the same manufacturer, by using near-identical neuroimaging protocols. Three cadaveric heads were scanned on 16- and 64-section MDCT by using standard neuroimaging CT protocols. Eye lens dose was measured by using thermoluminescent dosimeters (TLD), and each scanning was repeated to reduce random error. The dose-length product, volume CT dose index (CTDI(vol)), and TLD readings for each imaging protocol were averaged and compared between scanners and protocols, by using the paired Student t test. Statistical significance was defined at P < .05. The radiation dose delivered and eye lens doses were lower by 28.1%-45.7% (P < .000) on the 64-section MDCT for near-identical imaging protocols. On the 16-section MDCT, lens dose reduction was greatest (81.1%) on a tilted axial mode, compared with a nontilted helical mode for CT brain scans. Among the protocols studied, CT of the temporal bone delivered the greatest radiation dose to the eye lens. Eye lens radiation doses delivered by the 64-section MDCT are significantly lower, partly due to improvements in automatic tube current modulation technology. However, where applicable, protection of the eyes from the radiation beam by either repositioning the head or tilting the gantry remains the best way to reduce eye lens dose.
Occurrence, horizontal transfer and degeneration of VDE intein family in Saccharomycete yeasts.
Okuda, Yoshihiro; Sasaki, Daisuke; Nogami, Satoru; Kaneko, Yoshinobu; Ohya, Yoshikazu; Anraku, Yasuhiro
2003-05-01
VDE is a homing endonuclease gene originally discovered as an intervening element in VMA1s of Saccharomyces cerevisiae. There have been two independent subfamilies of VDE, one from S. cerevisiae strain X2180-1A and the other from Saccharomyces sp. DH1-1A in the host VMA1 gene, and they share the identity of 96.3%. In order to search the occurrence, intra/interspecies transfer and molecular degeneration of VDE, complete sequences of VMA1 in 10 strains of S. cerevisiae, eight species of saccharomycete yeasts, Candida glabrata and Kluyveromyces lactis were determined. We found that six of 10 S. cerevisiae strains contain VDEs 99.7-100% identical to that of the strain X2180-1A, one has no VDE, whereas the other three harbour VDEs 100% identical to that of the strain DH1-1A. S. carlsbergensis has two VMA1s, one being 99.8% identical to that of the strain X2180-1A with VDE 100% identical to that of the strain DH1-1A and the other containing the same VMA1 in S. pastorianus with no VDE. This and other evidence indicates that intra/interspecies transmissions of VDEs have occurred among saccharomycete yeasts. Phylogenetic analyses of VMA1 and VDE suggest that the S. cerevisiae VDEs had branched earlier than other VDEs from an ancestral VDE and had invaded into the host loci as relatively late events. The two VDEs seemed to degenerate in individual host loci, retaining their splicing capacity intact. The degeneration of the endonuclease domains was distinct and, if compared, its apparent rate was much faster than that of the protein-splicing domains. Copyright 2003 John Wiley & Sons, Ltd.
Coberly, L Caitlin; Wei, Wei; Sampson, Koffi Y; Millstein, Jack; Wichman, Holly A; Krone, Stephen M
2009-04-01
We present a joint experimental/theoretical investigation into the roles of spatial structure and time in the competition between two pathogens for a single host. We suggest a natural mechanism by which competing pathogens can coexist when host evolution and competitive dynamics occur on similar timescales. Our experimental system consisted of a single bacterial host species and two competing bacteriophage strains grown on agar plates, with a serial transfer of samples of the bacteriophage population to fresh host populations after each incubation cycle. The experiments included two incubation times and two transfer protocols that either maintained or disrupted the spatial structure of the viruses at each transfer. The same bacteriophage acted as the dominant competitor under both transfer protocols. A striking difference between the treatments is that the weak competitor was able to persist in the long-incubation experiments but not in the short-incubation experiments. Mathematical and experimental evidence suggest that coexistence is due to the appearance of resistant mutant host cells that provide a transient "spatiotemporal refuge" for the weaker competitor. Our mathematical model is individual based, captures the stochastic spatial dynamics down to the level of individual cells, and helps to explain the differences in behavior under the various experimental conditions.
Eytan, Ariel; Jene-Petschen, Nuria; Gex-Fabry, Marianne
2007-01-01
Background Acculturation is one of the determinants of mental health among immigrants. Evaluating adaptation to the host culture is insufficient, since immigrants will develop various degrees of bi- or multicultural identity. However, mental health professionals lack simple and easy to use instruments to guide them with bicultural identity evaluation in their practice. Our aim was to develop such an instrument to be used for clinical purposes among economical migrants from three South European countries living in Geneva, Switzerland. Methods We adapted from existing instruments a 24 item bi-dimensional scale to assess involvement in both culture of origin and host culture. The study included 93 immigrant adults from three south European countries (Italy, Portugal and Spain). Thirty-eight patients were recruited in an outpatient treatment program for alcohol-related problems and 55 participants were hospital employees. Results The questionnaire was rated as easy or rather easy by 97.8% of participants. Median time to complete it was 5 minutes. The instrument allowed discriminating between patients and healthy subjects, with scores for Swiss culture significantly higher among hospital workers. The subscales related to culture of origin and host culture displayed adequate internal consistency (Cronbach's alpha 0.77 and 0.73 respectively). Conclusion It is possible to assist clinicians' assessment of cultural identity of Italian, Portuguese and Spanish economical immigrants in Switzerland with a single and easy to use instrument. PMID:17490478
Graves, Scott S; Hogan, William J; Kuhr, Christian; Diaconescu, Razvan; Harkey, Michael; Sale, George E; Stone, Brad; Georges, George E; Storb, Rainer
2008-11-01
Dogs given nonmyeloablative conditioning and marrow grafts from 2 dog leukocyte antigen (DLA)-identical littermate donors developed stable trichimerism and stably accepted a subsequent kidney graft from one of the marrow donors without the need for immunosuppression. In this study, we used trichimeras to evaluate strategies for adoptive immunotherapy to solid tumors, using the kidney as a tumor surrogate. Three DLA-identical trichimeric recipients were established by simultaneously infusing marrow from 2 DLA-identical donor dogs into a DLA-identical recipient conditioned with 2 Gy of total body irradiation (TBI) and given a short course of postgraft immunosuppression. After stable hematopoietic engraftment was confirmed, a kidney was transplanted from 1 of the 2 marrow donors into each respective trichimeric recipient. Peripheral blood lymphocytes from each kidney donor were then used to sensitize the alternate marrow donor. The trichimeric recipients were given donor lymphocyte infusions (DLIs) from the sensitized dogs and monitored for chimerism, graft-versus-host disease (GVHD), and kidney rejection. After DLI, we observed both prompt rejection of the transplanted marrow and donor kidney and disappearance of corresponding hematopoietic chimerism. Presumably due to shared minor histocompatibility antigens, host chimerism also disappeared, and GVHD in skin, gut, and liver developed. The native kidneys, although exhibiting lymphocytic infiltration, remained functionally normal. This study demonstrates that under certain experimental conditions, the kidney--an organ ordinarily not involved in graft-versus-host reactions--can be targeted by sensitized donor lymphocytes.
Graves, Scott S.; Hogan, William J.; Kuhr, Christian; Diaconescu, Razvan; Harkey, Michael; Sale, George E.; Stone, Brad; Georges, George E.; Storb, Rainer
2008-01-01
Dogs given nonmyeloablative conditioning and marrow grafts from two dog leukocyte antigen- (DLA) identical littermate donors developed stable trichimerism and stably accepted a subsequent kidney graft from one of the marrow donors without the need for immunosuppression. Here, we used trichimeras to evaluate strategies of adoptive immunotherapy to solid tumors, using the kidney as a tumor surrogate. Three DLA-identical trichimeric recipients were established by simultaneously infusing marrow from two DLA-identical donor dogs into a DLA-identical recipient conditioned with 2 Gy total body irradiation and given a short course of postgrafting immunosuppression. After confirming stable hematopoietic engraftment, a kidney was transplanted from one of the two marrow donors into each respective trichimeric recipient. Peripheral blood lymphocytes (PBL) from each kidney donor were then used to sensitize the alternate marrow donor. Donor lymphocyte infusions (DLI) from the sensitized dogs were given to the trichimeric recipients, whereupon chimerism, graft-versus-host disease (GvHD), and kidney rejection were monitored. After DLI, we observed both prompt rejection of the transplanted marrow-donor kidney and disappearance of corresponding hematopoietic chimerism. Presumably, owing to shared minor histocompatibility antigens, host chimerism also disappeared and GvHD in skin, gut, and liver developed. The native kidneys, while showing lymphocytic infiltration, remained functionally normal. The current study demonstrated that under certain experimental conditions, the kidney, an organ ordinarily not involved in graft-versus-host reactions, can be targeted by sensitized donor lymphocytes. PMID:18940673
A Generic Archive Protocol and an Implementation
NASA Astrophysics Data System (ADS)
Jordan, J. M.; Jennings, D. G.; McGlynn, T. A.; Ruggiero, N. G.; Serlemitsos, T. A.
1993-01-01
Archiving vast amounts of data has become a major part of every scientific space mission today. GRASP, the Generic Retrieval/Ar\\-chive Services Protocol, addresses the question of how to archive the data collected in an environment where the underlying hardware archives and computer hosts may be rapidly changing.
USDA-ARS?s Scientific Manuscript database
Understanding the factors that drive the evolution of pathogenic fungi is central to revealing the mechanisms of virulence and host preference, as well as developing effective disease control measures. Prerequisite to these pursuits is the accurate delimitation of species boundaries. Colletotrichu...
Data embedding employing degenerate clusters of data having differences less than noise value
Sanford, II, Maxwell T.; Handel, Theodore G.
1998-01-01
A method of embedding auxiliary information into a set of host data, such as a photograph, television signal, facsimile transmission, or identification card. All such host data contain intrinsic noise, allowing pixels in the host data which are nearly identical and which have values differing by less than the noise value to be manipulated and replaced with auxiliary data. As the embedding method does not change the elemental values of the host data, the auxiliary data do not noticeably affect the appearance or interpretation of the host data. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user.
Zheng, Hongying; Chen, Jiong; Chen, Jianping; Adams, Michael J; Hou, Mingsheng
2002-06-01
Potyvirus isolates from asparagus bean ( Vigna sesquipedalis) plants in Zhejiang province, China, caused either rugose and vein banding mosaic symptoms (isolate R) or severe yellowing (isolate Y) in this host, but were otherwise similar in host range. Both isolates were completely sequenced and shown to be isolates of Bean common mosaic virus (BCMV). The complete sequences were 9992 (R) or 10062 (Y) nucleotides long and shared 91.7% identical nucleotides (93.2% identical amino acids) in their genomes and were more distantly related to the BCMV-Peanut stripe virus sequence (PStV). The isolates were much less similar to one another in the 5'-UTR and the N-terminal region of the P1 protein. In the P1, isolate Y was closer to PStV (76.1% identical amino acids) than to isolate R (64.8%). Phylogenetic analyses of the coat protein region showed that the new isolates grouped with other isolates from Vigna spp., forming the blackeye cowpea mosaic strain subgroup of BCMV with 94-98% nucleotides (96-99% amino acids) identical to one another and about 90% identity to other BCMV isolates. Other significant subgroupings amongst published BCMV isolates were detected.
Bauman, David; Raspé, Olivier; Meerts, Pierre; Degreef, Jérôme; Ilunga Muledi, Jonathan; Drouet, Thomas
2016-10-01
Ectomycorrhizal fungi (EMF) are highly diversified and dominant in a number of forest ecosystems. Nevertheless, their scales of spatial distribution and the underlying ecological processes remain poorly understood. Although most EMF are considered to be generalists regarding host identity, a preference toward functional strategies of host trees has never been tested. Here, the EMF community was characterised by DNA sequencing in a 10-ha tropical dry season forest-referred to as miombo-an understudied ecosystem from a mycorrhizal perspective. We used 36 soil parameters and 21 host functional traits (FTs) as candidate explanatory variables in spatial constrained ordinations for explaining the EMF community assemblage. Results highlighted that the community variability was explained by host FTs related to the 'leaf economics spectrum' (adjusted R(2) = 11%; SLA, leaf area, foliar Mg content), and by soil parameters (adjusted R(2) = 17%), notably total forms of micronutrients or correlated available elements (Al, N, K, P). Both FTs and soil generated patterns in the community at scales ranging from 75 to 375 m. Our results indicate that soil is more important than previously thought for EMF in miombo woodlands, and show that FTs of host species can be better predictors of symbiont distribution than taxonomical identity. © FEMS 2016. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W.; Simons, George; Barsun, Stephan
The main focus of most evaluations is to determine the energy-savings impacts of the installed measure. This protocol defines a combined heat and power (CHP) measure as a system that sequentially generates both electrical energy and useful thermal energy from one fuel source at a host customer's facility or residence. This protocol is aimed primarily at regulators and administrators of ratepayer-funded CHP programs; however, project developers may find the protocol useful to understand how CHP projects are evaluated.
Integrated AUTODIN System Architecture Report. Part 2.
1979-03-01
Link Modes Protocols and end-to- end host protocols Codes ASCII, ITA#2 ASCII, Others (Trans- parent to network) Speeds 45 thru 4800 bps 110 bps thru 56K ...service facilities such as AMPEs, subscriber access lines, modems , multiplexers, concentrators, interface development to include software design and...Protocol) CODES - ASCII and ITA#2 (others transparent) SPEEDS - 45.5bps - 56K bps FORMATS - AUTODIN II Segment Formats, JANAP 128, ACP 126/127, DOI 103
Meeting the Needs of Clients with Dissociative Identity Disorder: Considerations for Psychotherapy
ERIC Educational Resources Information Center
Ringrose, Jo L.
2011-01-01
Psychotherapy for clients with Dissociative Identity Disorder (DID) is different to therapy with most clients because these clients are multiple, comprising one or more host, and one or more alter personalities. The necessary components to be addressed in order that clients can live successfully either as a multiple or as an integrated person are…
"They Will Come to Understand": Supervisor Reflections on International Medical Electives.
Roebbelen, Erica; Dorman, Katie; Hunter, Andrea; Kraeker, Christian; O'Shea, Tim; Bozinoff, Nikki
2018-03-22
Phenomenon: Increasing numbers of medical students from high-income countries are undertaking international medical electives (IMEs) during their training. Much has been written about the benefits of these experiences for the student, and concerns have been raised regarding the burden of IMEs on host communities. The voices of physicians from low- and middle-income countries who supervise IMEs have not been explored in depth. The current study sought to investigate host-physician perspectives on IMEs. Host supervisors were recruited by convenience sampling through students travelling abroad for IMEs during the summer of 2012. From 2012 through 2014, 11 semistructured interviews were conducted by telephone with host supervisors from Nepal, Uganda, Ghana, Guyana, and Kenya. Participants were invited to describe their motivations for hosting IMEs and their experiences of the benefits and harms of IMEs. Interviews were transcribed verbatim and checked for accuracy. An initial coding framework was developed and underwent multiple revisions, after which analytic categories were derived using conventional qualitative content analysis. For host supervisors, visits from international medical students provided a window into the resource-rich medical practice of high-income countries, and supervisors positioned themselves, their education, and clinical expertise against perceived standards of the international students' context. Hosting IMEs also contributed to supervisors' identities as educators connected to a global community. Supervisors described the challenge of helping students navigate their distress when confronting global health inequity. Finally, the desire for increasingly reciprocal relationships was expressed as a hope for the future. Insights: IMEs can be formative for host supervisors' identities and are used to benchmark host institutions compared with international medical standards. Reciprocity was articulated as essential for IMEs moving forward.
Analysis of Host-Takeover During SPO1 Infection of Bacillus subtilis.
Stewart, Charles R
2018-01-01
When Bacillus subtilis is infected by bacteriophage SPO1, the phage directs the remodeling of the host cell, converting it into a factory for phage reproduction. Much synthesis of host DNA, RNA, and protein is shut off, and cell division is prevented. Here I describe the protocols by which we have demonstrated those processes, and identified the roles played by specific SPO1 gene products in causing those processes.
Antonio, D B; El-Matbouli, M; Hedrick, R P
1999-11-01
The myxosporean and actinosporean spores of Myxobolus cerebralis develop through many stages in their respective hosts, salmonid fishes and a tubificid oligochaete. Using a modified, non-radioactive in situ hybridization protocol, the parasite, which exhibits radically different structural forms during its development in each host, could be specifically detected in paraffin-embedded tissues of both fish and oligochaetes. Our study aims to demonstrate the application of the technique for detection of early stages of M. cerebralis in both hosts.
A Practical Approach to Identity on Digital Ecosystems Using Claim Verification and Trust
NASA Astrophysics Data System (ADS)
McLaughlin, Mark; Malone, Paul
Central to the ethos of digital ecosystems (DEs) is that DEs should be distributed and have no central points of failure or control. This essentially mandates a decentralised system, which poses significant challenges for identity. Identity in decentralised environments must be treated very differently to identity in traditional environments, where centralised naming, authentication and authorisation can be assumed, and where identifiers can be considered global and absolute. In the absence of such guarantees we have expanded on the OPAALS identity model to produce a general implementation for the OPAALS DE that uses a combination of identity claim verification protocols and trust to give assurances in place of centralised servers. We outline how the components of this implementation function and give an illustrated workflow of how identity issues are solved on the OPAALS DE in practice.
NASA Astrophysics Data System (ADS)
Hassan, Waleed K.; Al-Assam, Hisham
2017-05-01
The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.
UltraNet Target Parameters. Chapter 1
NASA Technical Reports Server (NTRS)
Kislitzin, Katherine T.; Blaylock, Bruce T. (Technical Monitor)
1992-01-01
The UltraNet is a high speed network capable of rates up to one gigabit per second. It is a hub based network with four optical fiber links connecting each hub. Each link can carry up to 256 megabits of data, and the hub backplane is capable of one gigabit aggregate throughput. Host connections to the hub may be fiber, coax, or channel based. Bus based machines have adapter boards that connect to transceivers in the hub, while channel based machines use a personality module in the hub. One way that the UltraNet achieves its high transfer rates is by off-loading the protocol processing from the hosts to special purpose protocol engines in the UltraNet hubs. In addition, every hub has a PC connected to it by StarLAN for network management purposes. Although there is hub resident and PC resident UltraNet software, this document treats only the host resident UltraNet software.
Satellite Communications Using Commercial Protocols
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan
2000-01-01
NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.
Albornoz, Felipe E; Teste, François P; Lambers, Hans; Bunce, Michael; Murray, Dáithí C; White, Nicole E; Laliberté, Etienne
2016-10-01
Ectomycorrhizal (ECM) fungal communities covary with host plant communities along soil fertility gradients, yet it is unclear whether this reflects changes in host composition, fungal edaphic specialization or priority effects during fungal community establishment. We grew two co-occurring ECM plant species (to control for host identity) in soils collected along a 2-million-year chronosequence representing a strong soil fertility gradient and used soil manipulations to disentangle the effects of edaphic properties from those due to fungal inoculum. Ectomycorrhizal fungal community composition changed and richness declined with increasing soil age; these changes were linked to pedogenesis-driven shifts in edaphic properties, particularly pH and resin-exchangeable and organic phosphorus. However, when differences in inoculum potential or soil abiotic properties among soil ages were removed while host identity was held constant, differences in ECM fungal communities and richness among chronosequence stages disappeared. Our results show that ECM fungal communities strongly vary during long-term ecosystem development, even within the same hosts. However, these changes could not be attributed to short-term fungal edaphic specialization or differences in fungal inoculum (i.e. density and composition) alone. Rather, they must reflect longer-term ecosystem-level feedback between soil, vegetation and ECM fungi during pedogenesis. © 2016 John Wiley & Sons Ltd.
ERIC Educational Resources Information Center
Grieve, Averil Marie
2015-01-01
This study focuses on the relationships between host family success, social integration, length of stay and acquisition of adolescent language by students on extended international homestay programmes. Degree of adolescent language acquisition and integration is measured by use of two hallmarks of adolescent language: markers of approximation…
NASA Astrophysics Data System (ADS)
Foswell, Stuart D.; McLaren, David; Paramanatham, Daran; Taylor, Chris; Stanton, Dai; Farrell, Stephen
2012-08-01
This paper describes the outcome of analysis and simulation of how to deploy CFDP and DTN protocol engines onboard a spacecraft, so as to support the Space Internet, and the resulting spacecraft resource utilisation, under an ESA TRP contract [1].
USDA-ARS?s Scientific Manuscript database
Coffee Berry Borer (CBB) is the most devastating insect pest for coffee crops worldwide. We developed a scientific monitoring protocol aimed at capturing and quantifying the dynamics and impact of this invasive insect pest as well as the development of its host plant across a heterogeneous landscape...
Research Review: Gender identity in youth: treatment paradigms and controversies.
Turban, Jack L; Ehrensaft, Diane
2017-10-26
Pediatric gender identity has gained increased attention over the past several years in the popular media, political arena, and medical literature. This article reviews terminology in this evolving field, traditional models of gender identity development and their limitations, epidemiology and natural history of cross-gender identification among children and adolescents, co-occurring conditions and behaviors, research into the biological and psychosocial determinants of cross-gender identification, and research into the options regarding and benefits of clinical approaches to gender incongruent youth. Based on a critical review of the extant literature, both theoretical and empirical, that addresses the issue of pediatric gender identity, the authors synthesized what is presently known and what is in need of further research in order to elucidate the developmental trajectory and clinical needs of gender diverse youth. The field of pediatric gender identity has evolved substantially over the past several years. New research suggests that cross-gender identification is prevalent (approximately 1% of youth). These youth suffer disproportionately high rates of anxiety, depression, and suicidality. Although research into the etiology of cross-gender identification is limited, emerging data have shown that affirmative treatment protocols may improve the high rates of mental health difficulties seen among these patients. The field of pediatric gender identity has evolved dramatically. Emerging data suggest that these patients' high rates of anxiety, depression, and suicidality appear to be improved with affirmative protocols, although future longitudinal data are needed. © 2017 Association for Child and Adolescent Mental Health.
Fujimura, Tsutomu; Esteban, Rosa
2016-10-01
The 5'end of RNA conveys important information on self-identity. In mammalian cells, double-stranded RNA (dsRNA) with 5'di- or triphosphates generated during virus infection is recognized as foreign and elicits the host innate immune response. Here, we analyze the 5' ends of the dsRNA genome of the yeast L-A virus. The positive strand has largely diphosphates with a minor amount of triphosphates, while the negative strand has only diphosphates. Although the virus can produce capped transcripts by cap snatching, neither strand carried a cap structure, suggesting that only non-capped transcripts serve as genomic RNA for encapsidation. We also found that the 5' diphosphates of the positive but not the negative strand within the dsRNA genome are crucial for transcription in vitro. Furthermore, the presence of a cap structure in the dsRNA abrogated its template activity. Given that the 5' diphosphates of the transcripts are also essential for cap acquisition and that host cytosolic RNAs (mRNA, rRNA, and tRNA) are uniformly devoid of 5' pp-structures, the L-A virus takes advantage of its 5' terminal diphosphates, using them as a self-identity tag to propagate in the host cytoplasm. © 2016 John Wiley & Sons Ltd.
Exploring Identity in Muslim Moroccan and Pakistani Immigrant Women
Giuliani, Cristina; Tagliabue, Semira
2015-01-01
This study presents a qualitative investigation of how Muslim Moroccan and Pakistani female immigrants living in Italy conceptualize their cultural identity. Ten Moroccan and 10 Pakistani (adolescent and adult) women were interviewed through in-depth semi-structured interviews. The interviewees expressed a strong attachment to their culture of origin: their religion is a crucial aspect of their identity, along with certain cultural rules and traditional values. At the same time, both Moroccan and Pakistani participants were ambivalent toward and experienced difficulties in developing a connection to the host country, although the two groups exhibit their lack of connection to their host country in different ways: Moroccans’ self-representation is marked by a sense of foreignness and by a lack of an emotional connection with places where they are living while Pakistanis tend to express cultural distance and conflict with the host culture’s values. For both the Moroccan and Pakistani groups, the challenge of integration and biculturalism seems demanding in the Italian context and is marked by a deep feeling of emptiness, a lack of an emotional bond with the new country, and a strong cultural ambivalence. Finally, narrative themes are articulated across four interrelated dimensions (cultural, religious, gendered, spatial), revealing interesting differences based on national origin and generation. PMID:27247642
Identity and Professional Networking.
Raj, Medha; Fast, Nathanael J; Fisher, Oliver
2017-06-01
Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.
Multi-Model Validation of Currents in the Chesapeake Bay Region in June 2010
2012-01-01
host “ DaVinci ” at the Naval Oceanographic Office (NAVOCEANO). The same model configuration also took approximately 1 hr of wall clock time for a 72-hr...comparable to the performance Navy DSRC host DaVinci . Products of water level and horizontal current maps as well as station time series, identical to...DSRC host DaVinci and required approximately 5 hrs of wall-clock time for 72-hr forecasts, including data Figure 10. The Chesapeake Bay Delft3D
1988-08-01
Interconnection (OSI) in years. It is felt even more urgent in the past few years, with the rapid evolution of communication technologies and the...services and protocols above the transport layer are usually implemented as user- callable utilities on the host computers, it is desirable to offer them...Networks, Prentice-hall, New Jersey, 1987 [ BOND 87] Bond , John, "Parallel-Processing Concepts Finally Come together in Real Systems", Computer Design
Walker, Rheeda L; Wingate, Laricka R; Obasi, Ezemenari M; Joiner, Thomas E
2008-01-01
The purpose of this study was to explore the relationships of acculturative stress and ethnic identity to depressive symptomatology and suicidal ideation in college students. The SAFE Acculturative Stress Scale, Multi-Group Ethnic Identity Measure, Beck Depression Inventory, and Beck Suicide Scale were administered to 452 college students. The authors found that acculturative stress and ethnic identity moderated the depression-suicide ideation relationship for African American but not European American college students. Given that vulnerability toward suicidal thoughts is increased for African American college students who report symptoms of depression accompanied by either high-acculturative stress or poor group identity, these culturally relevant factors should be included in protocol for suicide risk assessment.
Data embedding employing degenerate clusters of data having differences less than noise value
Sanford, M.T. II; Handel, T.G.
1998-10-06
A method of embedding auxiliary information into a set of host data, such as a photograph, television signal, facsimile transmission, or identification card. All such host data contain intrinsic noise, allowing pixels in the host data which are nearly identical and which have values differing by less than the noise value to be manipulated and replaced with auxiliary data. As the embedding method does not change the elemental values of the host data, the auxiliary data do not noticeably affect the appearance or interpretation of the host data. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user. 35 figs.
Authenticated Quantum Key Distribution with Collective Detection using Single Photons
NASA Astrophysics Data System (ADS)
Huang, Wei; Xu, Bing-Jie; Duan, Ji-Tong; Liu, Bin; Su, Qi; He, Yuan-Hang; Jia, Heng-Yue
2016-10-01
We present two authenticated quantum key distribution (AQKD) protocols by utilizing the idea of collective (eavesdropping) detection. One is a two-party AQKD protocol, the other is a multiparty AQKD protocol with star network topology. In these protocols, the classical channels need not be assumed to be authenticated and the single photons are used as the quantum information carriers. To achieve mutual identity authentication and establish a random key in each of the proposed protocols, only one participant should be capable of preparing and measuring single photons, and the main quantum ability that the rest of the participants should have is just performing certain unitary operations. Security analysis shows that these protocols are free from various kinds of attacks, especially the impersonation attack and the man-in-the-middle (MITM) attack.
Authentication techniques for smart cards
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nelson, R.A.
1994-02-01
Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thoroughmore » understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.« less
An overview of the DII-HEP OpenStack based CMS data analysis
NASA Astrophysics Data System (ADS)
Osmani, L.; Tarkoma, S.; Eerola, P.; Komu, M.; Kortelainen, M. J.; Kraemer, O.; Lindén, T.; Toor, S.; White, J.
2015-05-01
An OpenStack based private cloud with the Cluster File System has been built and used with both CMS analysis and Monte Carlo simulation jobs in the Datacenter Indirection Infrastructure for Secure High Energy Physics (DII-HEP) project. On the cloud we run the ARC middleware that allows running CMS applications without changes on the job submission side. Our test results indicate that the adopted approach provides a scalable and resilient solution for managing resources without compromising on performance and high availability. To manage the virtual machines (VM) dynamically in an elastic fasion, we are testing the EMI authorization service (Argus) and the Execution Environment Service (Argus-EES). An OpenStackplugin has been developed for Argus-EES. The Host Identity Protocol (HIP) has been designed for mobile networks and it provides a secure method for IP multihoming. HIP separates the end-point identifier and locator role for IP address which increases the network availability for the applications. Our solution leverages HIP for traffic management. This presentation gives an update on the status of the work and our lessons learned in creating an OpenStackbased cloud for HEP.
Ringdén, Olle; Sadeghi, Behnam; Moretti, Gianluca; Finnbogadottir, Sigrun; Eriksson, Brita; Mattsson, Jonas; Svahn, Britt-Marie; Remberger, Mats
2018-04-01
Patients undergoing allogeneic haematopoietic stem cell transplantation (HSCT) were given the option to be treated at home during the pancytopenic phase. Daily visits by a nurse and phone calls from a physician from the unit were part of the protocol. During almost two decades, 252 patients with haematological malignancies and non-malignant disorders were included. Median age was 47 (range 0-72) years. Myeloablative conditioning was given to 102 patients and reduced intensity to 150. Donors were matched unrelated (n = 160), HLA-identical siblings (n = 71), or HLA-mismatched (n = 21). Cumulative incidence of acute graft-versus-host disease (GVHD) was 35% and that of chronic GVHD was 46%. Non-relapse mortality was 14% 10 years after HSCT. In patients with haematological malignancies (n = 229), the 10-year probability of relapse was 34%. No patients died at home. Overall survival was 59% and relapse-free survival was 50% after 10 years. We conclude that patients treated at home after HSCT have an encouraging long-term outcome.
Hellmann, Anna-Maria; Lother, Jasmin; Wurster, Sebastian; Lutz, Manfred B; Schmitt, Anna Lena; Morton, Charles Oliver; Eyrich, Matthias; Czakai, Kristin; Einsele, Hermann; Loeffler, Juergen
2017-01-01
Aspergillus fumigatus is the main cause of invasive fungal infections occurring almost exclusively in immunocompromised patients. An improved understanding of the initial innate immune response is key to the development of better diagnostic tools and new treatment options. Mice are commonly used to study immune defense mechanisms during the infection of the mammalian host with A. fumigatus . However, little is known about functional differences between the human and murine immune response against this fungal pathogen. Thus, we performed a comparative functional analysis of human and murine dendritic cells (DCs), macrophages, and polymorphonuclear cells (PMNs) using standardized and reproducible working conditions, laboratory protocols, and readout assays. A. fumigatus did not provoke identical responses in murine and human immune cells but rather initiated relatively specific responses. While human DCs showed a significantly stronger upregulation of their maturation markers and major histocompatibility complex molecules and phagocytosed A. fumigatus more efficiently compared to their murine counterparts, murine PMNs and macrophages exhibited a significantly stronger release of reactive oxygen species after exposure to A. fumigatus . For all studied cell types, human and murine samples differed in their cytokine response to conidia or germ tubes of A. fumigatus . Furthermore, Dectin-1 showed inverse expression patterns on human and murine DCs after fungal stimulation. These specific differences should be carefully considered and highlight potential limitations in the transferability of murine host-pathogen interaction studies.
Starks, Angela M.; Schoeb, Trenton R.; Tamplin, Mark L.; Parveen, Salina; Doyle, Thomas J.; Bomeisl, Philip E.; Escudero, Gloria M.; Gulig, Paul A.
2000-01-01
Vibrio vulnificus is an opportunistic pathogen that contaminates oysters harvested from the Gulf of Mexico. In humans with compromising conditions, especially excess levels of iron in plasma and tissues, consumption of contaminated seafood or exposure of wounds to contaminated water can lead to systemic infection and disfiguring skin infection with extremely high mortality. V. vulnificus-associated diseases are noted for the rapid replication of the bacteria in host tissues, with extensive tissue damage. In this study we examined the virulence attributes of three virulent clinical strains and three attenuated oyster or seawater isolates in mouse models of systemic disease. All six V. vulnificus strains caused identical skin lesions in subcutaneously (s.c.) inoculated iron dextran-treated mice in terms of numbers of recovered CFU and histopathology; however, the inocula required for identical frequency and magnitude of infection were at least 350-fold higher for the environmental strains. At lethal doses, all strains caused s.c. skin lesions with extensive edema, necrosis of proximate host cells, vasodilation, and as many as 108 CFU/g, especially in perivascular regions. These data suggest that the differences between these clinical and environmental strains may be related to growth in the host or susceptibility to host defenses. In non-iron dextran-treated mice, strains required 105-fold-higher inocula to cause an identical disease process as with iron dextran treatment. These results demonstrate that s.c. inoculation of iron dextran-treated mice is a useful model for studying systemic disease caused by V. vulnificus. PMID:10992486
Koizumi, Takahiko; Nara, Kazuhide
2017-06-24
Dwarf shrubs of the family Ericaceae are common in arctic and alpine regions. Many of these plants are associated with ericoid mycorrhizal (ERM) fungi, which allow them to take nutrients and water from the soil under harsh environmental conditions and, thus, affect host plant survival. Despite the importance of ERM fungi to alpine plant communities, limited information is available on the effects of microhabitat and host identity on ERM fungal communities. We investigated the communities of putative ERM fungi isolated from five dwarf shrub species (Arcterica nana, Diapensia lapponica, Empetrum nigrum, Loiseleuria procumbens, and Vaccinium vitis-idaea) that co-occur in an alpine region of Japan, with reference to distinct microhabitats provided by large stone pine (Pinus pumila) shrubs (i.e. bare ground, the edge of stone pine shrubs, and the inside of stone pine shrubs). We obtained 703 fungal isolates from 222 individual plants. These isolates were classified into 55 operational taxonomic units (OTUs) based on the sequencing of internal transcribed spacer regions in ribosomal DNA. These putative ERM fungal communities were dominated by Helotiales fungi for all host species. Cistella and Trimmatostroma species, which have rarely been detected in ERM roots in previous studies, were abundant. ERM fungal communities were significantly different among microhabitats (R 2 =0.28), while the host effect explained less variance in the fungal communities after excluding the microhabitat effect (R 2 =0.17). Our results suggest that the host effect on ERM fungal communities is minor and the distributions of hosts and fungal communities may be assessed based on microhabitat conditions.
Koizumi, Takahiko; Nara, Kazuhide
2017-01-01
Dwarf shrubs of the family Ericaceae are common in arctic and alpine regions. Many of these plants are associated with ericoid mycorrhizal (ERM) fungi, which allow them to take nutrients and water from the soil under harsh environmental conditions and, thus, affect host plant survival. Despite the importance of ERM fungi to alpine plant communities, limited information is available on the effects of microhabitat and host identity on ERM fungal communities. We investigated the communities of putative ERM fungi isolated from five dwarf shrub species (Arcterica nana, Diapensia lapponica, Empetrum nigrum, Loiseleuria procumbens, and Vaccinium vitis-idaea) that co-occur in an alpine region of Japan, with reference to distinct microhabitats provided by large stone pine (Pinus pumila) shrubs (i.e. bare ground, the edge of stone pine shrubs, and the inside of stone pine shrubs). We obtained 703 fungal isolates from 222 individual plants. These isolates were classified into 55 operational taxonomic units (OTUs) based on the sequencing of internal transcribed spacer regions in ribosomal DNA. These putative ERM fungal communities were dominated by Helotiales fungi for all host species. Cistella and Trimmatostroma species, which have rarely been detected in ERM roots in previous studies, were abundant. ERM fungal communities were significantly different among microhabitats (R2=0.28), while the host effect explained less variance in the fungal communities after excluding the microhabitat effect (R2=0.17). Our results suggest that the host effect on ERM fungal communities is minor and the distributions of hosts and fungal communities may be assessed based on microhabitat conditions. PMID:28529264
Freeman, Christopher J; Thacker, Robert W; Baker, David M; Fogel, Marilyn L
2013-06-01
By forming symbiotic interactions with microbes, many animals and plants gain access to the products of novel metabolic pathways. We investigated the transfer of symbiont-derived carbon and nitrogen to the sponges Aplysina cauliformis, Aplysina fulva, Chondrilla caribensis, Neopetrosia subtriangularis and Xestospongia bocatorensis, all of which host abundant microbial populations, and Niphates erecta, which hosts a sparse symbiont community. We incubated sponges in light and dark bottles containing seawater spiked with (13)C- and (15)N-enriched inorganic compounds and then measured (13)C and (15)N enrichment in the microbial (nutrient assimilation) and sponge (nutrient transfer) fractions. Surprisingly, although most sponges hosting abundant microbial communities were more enriched in (13)C than N. erecta, only N. subtriangularis was more enriched in (15)N than N. erecta. Although photosymbiont abundance varied substantially across species, (13)C and (15)N enrichment was not significantly correlated with photosymbiont abundance. Enrichment was significantly correlated with the ratio of gross productivity to respiration (P:R), which varied across host species and symbiont phylotype. Because irradiance impacts P:R ratios, we also incubated A. cauliformis in (13)C-enriched seawater under different irradiances to determine whether symbiont carbon fixation and transfer are dependent on irradiance. Carbon fixation and transfer to the sponge host occurred in all treatments, but was greatest at higher irradiances and was significantly correlated with P:R ratios. Taken together, these results demonstrate that nutrient transfer from microbial symbionts to host sponges is influenced more by host-symbiont identities and P:R ratios than by symbiont abundance.
Wilkins, Laetitia G E; Fumagalli, Luca; Wedekind, Claus
2016-10-01
Recent studies found fish egg-specific bacterial communities that changed over the course of embryogenesis, suggesting an interaction between the developing host and its microbiota. Indeed, single-strain infections demonstrated that the virulence of opportunistic bacteria is influenced by environmental factors and host immune genes. However, the interplay between a fish embryo host and its microbiota has not been studied yet at the community level. To test whether host genetics affects the assemblage of egg-associated bacteria, adult brown trout (Salmo trutta) were sampled from a natural population. Their gametes were used for full-factorial in vitro fertilizations to separate sire from dam effects. In total, 2520 embryos were singly raised under experimental conditions that differently support microbial growth. High-throughput 16S rRNA amplicon sequencing was applied to characterize bacterial communities on milt and fertilized eggs across treatments. Dam and sire identity influenced embryo mortality, time until hatching and composition of egg-associated microbiotas, but no link between bacterial communities on milt and on fertilized eggs could be found. Elevated resources increased embryo mortality and modified bacterial communities with a shift in their putative functional potential. Resource availability did not significantly affect any parental effects on embryo performance. Sire identity affected bacterial diversity that turned out to be a significant predictor of hatching time: embryos associated with high bacterial diversity hatched later. We conclude that both host genetics and the availability of resources define diversity and composition of egg-associated bacterial communities that then affect the life history of their hosts. © 2016 John Wiley & Sons Ltd.
Poelman, Erik H; Zheng, Si-Jun; Zhang, Zhao; Heemskerk, Nanda M; Cortesero, Anne-Marie; Dicke, Marcel
2011-12-06
Plants are exposed to a suite of herbivorous attackers that often arrive sequentially. Herbivory affects interactions between the host plants and subsequently attacking herbivores. Moreover, plants may respond to herbivory by emitting volatile organic compounds (VOCs) that attract carnivorous natural enemies of the herbivores. However, information borne by VOCs is ubiquitous and may attract carnivores, such as parasitoids, that differ in their effectiveness at releasing the plant from its herbivorous attackers. Furthermore, the development of parasitoids within their herbivorous hosts, attacking a given host plant, may influence the elicitation of defensive reactions in the host plant. This may, in turn, affect the behavior of subsequent herbivores attacking the host plant. Here, we show that the species identity of a parasitoid had a more significant effect on defense responses of Brassica oleracea plants than the species identity of the herbivorous hosts of the parasitoids. Consequently, B. oleracea plants that were damaged by caterpillars (Pieris spp.) parasitized by different parasitoid species varied in the degree to which diamondback moths (Plutella xylostella) selected the plants for oviposition. Attracting parasitoids in general benefitted the plants by reducing diamondback moth colonization. However, the species of parasitoid that parasitized the herbivore significantly affected the magnitude of this benefit by its species-specific effect on herbivore-plant interactions mediated by caterpillar regurgitant. Our findings show that information-mediated indirect defense may lead to unpredictable consequences for plants when considering trait-mediated effects of parasitized caterpillars on the host plant and their consequences because of community-wide responses to induced plants.
Fisher, Matthew C; Ghosh, Pria; Shelton, Jennifer M G; Bates, Kieran; Brookes, Lola; Wierzbicki, Claudia; Rosa, Gonçalo M; Farrer, Rhys A; Aanensen, David M; Alvarado-Rybak, Mario; Bataille, Arnaud; Berger, Lee; Böll, Susanne; Bosch, Jaime; Clare, Frances C; A Courtois, Elodie; Crottini, Angelica; Cunningham, Andrew A; Doherty-Bone, Thomas M; Gebresenbet, Fikirte; Gower, David J; Höglund, Jacob; James, Timothy Y; Jenkinson, Thomas S; Kosch, Tiffany A; Lambertini, Carolina; Laurila, Anssi; Lin, Chun-Fu; Loyau, Adeline; Martel, An; Meurling, Sara; Miaud, Claude; Minting, Pete; Ndriantsoa, Serge; O'Hanlon, Simon J; Pasmans, Frank; Rakotonanahary, Tsanta; Rabemananjara, Falitiana C E; Ribeiro, Luisa P; Schmeller, Dirk S; Schmidt, Benedikt R; Skerratt, Lee; Smith, Freya; Soto-Azat, Claudio; Tessa, Giulia; Toledo, Luís Felipe; Valenzuela-Sánchez, Andrés; Verster, Ruhan; Vörös, Judit; Waldman, Bruce; Webb, Rebecca J; Weldon, Che; Wombwell, Emma; Zamudio, Kelly R; Longcore, Joyce E; Garner, Trenton W J
2018-05-17
Parasitic chytrid fungi have emerged as a significant threat to amphibian species worldwide, necessitating the development of techniques to isolate these pathogens into culture for research purposes. However, early methods of isolating chytrids from their hosts relied on killing amphibians. We modified a pre-existing protocol for isolating chytrids from infected animals to use toe clips and biopsies from toe webbing rather than euthanizing hosts, and distributed the protocol to researchers as part of the BiodivERsA project RACE; here called the RML protocol. In tandem, we developed a lethal procedure for isolating chytrids from tadpole mouthparts. Reviewing a database of use a decade after their inception, we find that these methods have been applied across 5 continents, 23 countries and in 62 amphibian species. Isolation of chytrids by the non-lethal RML protocol occured in 18% of attempts with 207 fungal isolates and three species of chytrid being recovered. Isolation of chytrids from tadpoles occured in 43% of attempts with 334 fungal isolates of one species (Batrachochytrium dendrobatidis) being recovered. Together, these methods have resulted in a significant reduction and refinement of our use of threatened amphibian species and have improved our ability to work with this group of emerging pathogens.
Atkinson, K; Norrie, S; Chan, P; Zehnwirth, B; Downs, K; Biggs, J
1986-05-01
We examined hemopoietic reconstitution during the first 12 months post-transplant in 31 patients given high-dose cyclophosphamide, total body irradiation and an HLA-identical sibling marrow transplant for hematological malignancy. Unexpectedly, we found marrow CFU-gm and marrow CFU-e cells to be denser than normal throughout the first year post-transplant. While functionally adequate neutrophil and platelet counts were achieved in the first six weeks post-transplant, there were defects in hemopoietic progenitor cell function during the first year post-transplant. Although we could detect no influence from acute graft-versus-host disease (GVHD), chronic GVHD adversely affected the growth of both myeloid and erythroid blood progenitor cells.
Masakazu Sano; Nathan P. Havill; Kenichi Ozaki
2011-01-01
Gall-forming insects are commonly highly host-specific, and galling species once thought to be oligo- or polyphagous are often found to represent a complex of host-specific races or cryptic species. A recent DNA barcoding study documented that an unidentified species of the genus Adelges is a gall-former associated with four spruce species (...
Continued Development of Internet Protocols under the IBM OS/MVS Operating System
1985-01-25
developed a prototype TCP/IP implementation for an IBM MVS host under a previous DARPA contract’ as part of the Internet research effort on the design of...participated in the DARPA Internet research program which led to the present TCP and IP protocols. Development of a prototype implementation of TCP/IP
The Myriad Properties of Pasteurella multocida Lipopolysaccharide
Harper, Marina; Boyce, John Dallas
2017-01-01
Pasteurella multocida is a heterogeneous species that is a primary pathogen of many different vertebrates. This Gram-negative bacterium can cause a range of diseases, including fowl cholera in birds, haemorrhagic septicaemia in ungulates, atrophic rhinitis in swine, and lower respiratory tract infections in cattle and pigs. One of the primary virulence factors of P. multocida is lipopolysaccharide (LPS). Recent work has shown that this crucial surface molecule shows significant structural variability across different P. multocida strains, with many producing LPS structures that are highly similar to the carbohydrate component of host glycoproteins. It is likely that this LPS mimicry of host molecules plays a major role in the survival of P. multocida in certain host niches. P. multocida LPS also plays a significant role in resisting the action of chicken cathelicidins, and is a strong stimulator of host immune responses. The inflammatory response to the endotoxic lipid A component is a major contributor to the pathogenesis of certain infections. Recent work has shown that vaccines containing killed bacteria give protection only against other strains with identical, or nearly identical, surface LPS structures. Conversely, live attenuated vaccines give protection that is broadly protective, and their efficacy is independent of LPS structure. PMID:28825691
Díaz-Rodríguez, Jesus; Donaire-Barroso, David; Jowers, Michael J
2018-06-02
In this study, we report, through molecular identification, the first African records of a digenean trematode parasite of the genus Euryhelmis. We recovered metacercariae encysted in an anuran, the endemic Moroccan painted frog (Discoglossus scovazzi), and a vulnerable caudate, the North African fire salamander (Salamandra algira), from four localities in North Africa (Morocco). Our records go back to the past century and have been confirmed in successive fieldwork seasons thereafter. Metacercarial stages of these parasites require amphibians as the last intermediate host, but the exact identity of the primary hosts and predators of the infected animals in Africa remain unknown. Our searches with basic local alignment search tool (BLAST) from Genbank revealed that hosts were infected by parasites of Euryhelmis costaricensis, which showed almost the same genetic identity (with only one substitution) to previous reports from Costa Rica and Japan, suggesting a recent introduction in Morocco. We proceed to discuss the likely role of introduced mustelids as the potential definitive hosts of trematode adults. Under this assumption, we conclude that the infestation of Discoglossus scovazzi and Salamandra algira might pose a risk to these threatened species.
Genome-wide RNAi Screening to Identify Host Factors That Modulate Oncolytic Virus Therapy.
Allan, Kristina J; Mahoney, Douglas J; Baird, Stephen D; Lefebvre, Charles A; Stojdl, David F
2018-04-03
High-throughput genome-wide RNAi (RNA interference) screening technology has been widely used for discovering host factors that impact virus replication. Here we present the application of this technology to uncovering host targets that specifically modulate the replication of Maraba virus, an oncolytic rhabdovirus, and vaccinia virus with the goal of enhancing therapy. While the protocol has been tested for use with oncolytic Maraba virus and oncolytic vaccinia virus, this approach is applicable to other oncolytic viruses and can also be utilized for identifying host targets that modulate virus replication in mammalian cells in general. This protocol describes the development and validation of an assay for high-throughput RNAi screening in mammalian cells, the key considerations and preparation steps important for conducting a primary high-throughput RNAi screen, and a step-by-step guide for conducting a primary high-throughput RNAi screen; in addition, it broadly outlines the methods for conducting secondary screen validation and tertiary validation studies. The benefit of high-throughput RNAi screening is that it allows one to catalogue, in an extensive and unbiased fashion, host factors that modulate any aspect of virus replication for which one can develop an in vitro assay such as infectivity, burst size, and cytotoxicity. It has the power to uncover biotherapeutic targets unforeseen based on current knowledge.
Enguita, Francisco J.; Costa, Marina C.; Fusco-Almeida, Ana Marisa; Mendes-Giannini, Maria José; Leitão, Ana Lúcia
2016-01-01
Fungal invasive infections are an increasing health problem. The intrinsic complexity of pathogenic fungi and the unmet clinical need for new and more effective treatments requires a detailed knowledge of the infection process. During infection, fungal pathogens are able to trigger a specific transcriptional program in their host cells. The detailed knowledge of this transcriptional program will allow for a better understanding of the infection process and consequently will help in the future design of more efficient therapeutic strategies. Simultaneous transcriptomic studies of pathogen and host by high-throughput sequencing (dual RNA-seq) is an unbiased protocol to understand the intricate regulatory networks underlying the infectious process. This protocol is starting to be applied to the study of the interactions between fungal pathogens and their hosts. To date, our knowledge of the molecular basis of infection for fungal pathogens is still very limited, and the putative role of regulatory players such as non-coding RNAs or epigenetic factors remains elusive. The wider application of high-throughput transcriptomics in the near future will help to understand the fungal mechanisms for colonization and survival, as well as to characterize the molecular responses of the host cell against a fungal infection. PMID:29376924
A developmental, biopsychosocial model for the treatment of children with gender identity disorder.
Zucker, Kenneth J; Wood, Hayley; Singh, Devita; Bradley, Susan J
2012-01-01
This article provides a summary of the therapeutic model and approach used in the Gender Identity Service at the Centre for Addiction and Mental Health in Toronto. The authors describe their assessment protocol, describe their current multifactorial case formulation model, including a strong emphasis on developmental factors, and provide clinical examples of how the model is used in the treatment.
MetaSeq: privacy preserving meta-analysis of sequencing-based association studies.
Singh, Angad Pal; Zafer, Samreen; Pe'er, Itsik
2013-01-01
Human genetics recently transitioned from GWAS to studies based on NGS data. For GWAS, small effects dictated large sample sizes, typically made possible through meta-analysis by exchanging summary statistics across consortia. NGS studies groupwise-test for association of multiple potentially-causal alleles along each gene. They are subject to similar power constraints and therefore likely to resort to meta-analysis as well. The problem arises when considering privacy of the genetic information during the data-exchange process. Many scoring schemes for NGS association rely on the frequency of each variant thus requiring the exchange of identity of the sequenced variant. As such variants are often rare, potentially revealing the identity of their carriers and jeopardizing privacy. We have thus developed MetaSeq, a protocol for meta-analysis of genome-wide sequencing data by multiple collaborating parties, scoring association for rare variants pooled per gene across all parties. We tackle the challenge of tallying frequency counts of rare, sequenced alleles, for metaanalysis of sequencing data without disclosing the allele identity and counts, thereby protecting sample identity. This apparent paradoxical exchange of information is achieved through cryptographic means. The key idea is that parties encrypt identity of genes and variants. When they transfer information about frequency counts in cases and controls, the exchanged data does not convey the identity of a mutation and therefore does not expose carrier identity. The exchange relies on a 3rd party, trusted to follow the protocol although not trusted to learn about the raw data. We show applicability of this method to publicly available exome-sequencing data from multiple studies, simulating phenotypic information for powerful meta-analysis. The MetaSeq software is publicly available as open source.
[Acculturation, bicultural identity and psychiatric morbidity in young Turkish patients in Germany].
Gül, Vahdet; Kolb, Semra
2009-01-01
This study was designed to examine, with the use of Berry's acculturation concept (2003), personal self-esteem and collective esteem in the acculturation of young Turks in Germany. Further, it was aimed to examine whether ethnic identity is linked to better mental health. Consecutive psychiatric primary care patients with Turkish background were screened with the 5-item Acculturation Questionnaire, adopted from the Latin American Validated Acculturation Scale. The interviewed patients were also assessed for psychiatric disorders according to ICD-10. By using the acculturation questionnaire among 220 patients included to this study, 154 (70%) patients, (88 male- 57,14%, mean age:22,1 sd. +/- 3,26 and 66 female- 42,85%, mean age: 21,73 sd. +/- 1,19) were found to be relatively good adjusted (group 1), and of 66 (30%) patients (44 male- 66,6%, mean age:26,3 sd. +/-3,39 and 22 female- 33,3%, mean age:25,88 sd. +/- 3,41) were found to be relatively poor adjusted (group 2) to the host community. The psychiatric co-morbidity showed in these two groups two distinct patterns (p< 0.001). Endogenous depression and the depression caused by the conflicts in the family-milieu are significantly more common in the group I. Unlike, the depression triggered by the psycho-social maladjustment is clearly more prevalent in the group II. The predictors of good adaptation were shown to be: bilingualism, bicultural identity and Germany as country of birth, whereas poor adaptation was related to: dominance of ethnic culture and language, and being born outside of Germany. The research presented provides firm evidence for a bicultural identity through assessments of several domains of acculturation: language spoken most of the time, language thought, ethnic identity, birthplace and the degree of adjustment to the host community. Cultural identity is one of the key determinants of mental health in evaluating adaptation to the host culture among immigrants. It is vital for the mental health professionals to understand the roles, context, and therapeutic consequences that originate from culture.
A Federated Digital Identity Management Approach for Business Processes
NASA Astrophysics Data System (ADS)
Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.
Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.
Hamley, Madeleine; Franke, Frederik; Kurtz, Joachim; Scharsack, Jörn Peter
2017-09-01
The evolutionary arms race of hosts and parasites often results in adaptations, which may differ between populations. Investigation of such local adaptation becomes increasingly important to understand dynamics of host-parasite interactions and co-evolution. To this end we performed an infection experiment involving pairs of three-spined sticklebacks and their tapeworm parasite Schistocephalus solidus from three geographically separated origins (Germany, Spain and Iceland) in a fully-crossed design for sympatric and allopatric host/parasite combinations. We hypothesized that local adaptation of the hosts results in differences in parasite resistance with variation in parasite infection rates and leukocyte activation, whereas parasites from different origins might differ in virulence reflected in host exploitation rates (parasite indices) and S. solidus excretory-secretory products (SsESP) involved in immune manipulation. In our experimental infections, sticklebacks from Iceland were more resistant to S. solidus infection compared to Spanish and German sticklebacks. Higher resistance of Icelandic sticklebacks seemed to depend on adaptive immunity, whereas sticklebacks of German origin, which were more heavily afflicted by S. solidus, showed elevated activity of innate immune traits. German S. solidus were less successful in infecting and exploiting allopatric hosts compared to their Icelandic and Spanish conspecifics. Nevertheless, exclusively SsESP from German S. solidus triggered significant in vitro responses of leukocytes from naïve sticklebacks. Interestingly, parasite indices were almost identical across the sympatric combinations. Differences in host resistance and parasite virulence between the origins were most evident in allopatric combinations and were consistent within origin; i.e. Icelandic sticklebacks were more resistant and their S. solidus were more virulent in all allopatric combinations, whereas German sticklebacks were less resistant and their parasites less virulent. Despite such differences between origins, the degree of host exploitation was almost identical in the sympatric host-parasite combinations, suggesting that the local evolutionary arms race of hosts and parasites resulted in an optimal virulence, maximising parasite fitness while avoiding host overexploitation. Copyright © 2017 Elsevier Inc. All rights reserved.
Simmons, Greg; Clarke, Daniel; McKee, Jeff; Young, Paul; Meers, Joanne
2014-01-01
Gibbon ape leukaemia virus (GALV) and koala retrovirus (KoRV) share a remarkably close sequence identity despite the fact that they occur in distantly related mammals on different continents. It has previously been suggested that infection of their respective hosts may have occurred as a result of a species jump from another, as yet unidentified vertebrate host. To investigate possible sources of these retroviruses in the Australian context, DNA samples were obtained from 42 vertebrate species and screened using PCR in order to detect proviral sequences closely related to KoRV and GALV. Four proviral partial sequences totalling 2880 bases which share a strong similarity with KoRV and GALV were detected in DNA from a native Australian rodent, the grassland melomys, Melomys burtoni. We have designated this novel gammaretrovirus Melomys burtoni retrovirus (MbRV). The concatenated nucleotide sequence of MbRV shares 93% identity with the corresponding sequence from GALV-SEATO and 83% identity with KoRV. The geographic ranges of the grassland melomys and of the koala partially overlap. Thus a species jump by MbRV from melomys to koalas is conceivable. However the genus Melomys does not occur in mainland South East Asia and so it appears most likely that another as yet unidentified host was the source of GALV.
Genetic analysis of the porcine group B rotavirus NSP2 gene from wild-type Brazilian strains.
Médici, K C; Barry, A F; Alfieri, A F; Alfieri, A A
2010-01-01
Group B rotaviruses (RV-B) were first identified in piglet feces, being later associated with diarrhea in humans, cattle, lambs, and rats. In human beings, the virus was only described in China, India, and Bangladesh, especially infecting adults. Only a few studies concerning molecular analysis of the RV-B NSP2 gene have been conducted, and porcine RV-B has not been characterized. In the present study, three porcine wild-type RV-B strains from piglet stool samples collected from Brazilian pig herds were used for analysis. PAGE results were inconclusive for those samples, but specific amplicons of the RV-B NSP2 gene (segment 8) were obtained in a semi-nested PCR assay. The three porcine RV-B strains showed the highest nucleotide identity with the human WH1 strain and the alignments with other published sequences resulted in three groups of strains divided according to host species. The group of human strains showed 92.4 to 99.7% nucleotide identity while the porcine strains of the Brazilian RV-B group showed 90.4 to 91.8% identity to each other. The identity of the Brazilian porcine RV-B strains with outer sequences consisting of group A and C rotaviruses was only 35.3 to 38.8%. A dendrogram was also constructed to group the strains into clusters according to host species: human, rat, and a distinct third cluster consisting exclusively of the Brazilian porcine RV-B strains. This is the first study of the porcine RV-B NSP2 gene that contributes to the partial characterization of this virus and demonstrates the relationship among RV-B strains from different host species.
Quantum processing by remote quantum control
NASA Astrophysics Data System (ADS)
Qiang, Xiaogang; Zhou, Xiaoqi; Aungskunsiri, Kanin; Cable, Hugo; O'Brien, Jeremy L.
2017-12-01
Client-server models enable computations to be hosted remotely on quantum servers. We present a novel protocol for realizing this task, with practical advantages when using technology feasible in the near term. Client tasks are realized as linear combinations of operations implemented by the server, where the linear coefficients are hidden from the server. We report on an experimental demonstration of our protocol using linear optics, which realizes linear combination of two single-qubit operations by a remote single-qubit control. In addition, we explain when our protocol can remain efficient for larger computations, as well as some ways in which privacy can be maintained using our protocol.
Bohn, Georg; Hardtke-Wolenski, Matthias; Zeidler, Cornelia; Maecker, Britta; Sauer, Martin; Sykora, Karl-Walter; Grigull, Lorenz; Welte, Karl; Klein, Christoph
2008-09-01
The molecular heterogeneity of severe congenital neutropenia (SCN) is increasingly recognized and may influence the risk-benefit assessment of therapeutic strategies. We report on a patient with p14 deficiency who succumbed to severe grade IV graft-versus-host disease (GvHD) after a human leukocyte antigen-identical bone marrow transplantion (BMT) from a sibling donor. Before BMT, in vitro generated p14-deficient dendritic cells showed a markedly elevated tumor necrosis factor (TNF-) alpha production upon toll-like receptor stimulation. We hypothesize that p14 deficiency predisposes to GvHD through increased TNF-alpha production. Adequate genetic testing is needed to prospectively assess potential risk factors for GvHD in defined SCN subgroups. (c) 2008 Wiley-Liss, Inc.
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang
2018-05-22
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks
Zhu, Hongfei; Tan, Yu-an; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang
2018-01-01
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size. PMID:29789475
Insights into Host Cell Modulation and Induction of New Cells by the Corn Smut Ustilago maydis.
Redkar, Amey; Matei, Alexandra; Doehlemann, Gunther
2017-01-01
Many filamentous fungal pathogens induce drastic modulation of host cells causing abnormal infectious structures such as galls, or tumors that arise as a result of re-programming in the original developmental cell fate of a colonized host cell. Developmental consequences occur predominantly with biotrophic phytopathogens. This suggests that these host structures result as an outcome of efficient defense suppression and intimate fungal-host interaction to suit the pathogen's needs for completion of its infection cycle. This mini-review mainly summarizes host cell re-programming that occurs in the Ustilago maydis - maize interaction, in which the pathogen deploys cell-type specific effector proteins with varying activities. The fungus senses the physiological status and identity of colonized host cells and re-directs the endogenous developmental program of its host. The disturbance of host cell physiology and cell fate leads to novel cell shapes, increased cell size, and/or the number of host cells. We particularly highlight the strategies of U. maydis to induce physiologically varied host organs to form the characteristic tumors in both vegetative and floral parts of maize.
ERIC Educational Resources Information Center
Gu, Qing
2015-01-01
This article discusses the nature of Chinese students' transnational experiences and its impact on their identities within and beyond national and cultural boundaries. The discussion is located in the theoretical framework of transnationalism and explores in detail the ways in which students adapt, change and develop, both in the host country of…
Sellami, Mohamed Hichem; Chaabane, Manel; Kaabi, Houda; Torjemane, Lamia; Ladeb, Saloua; Ben Othmane, Tarek; Hmida, Slama
2012-03-01
FY antigens are candidate minor histocompatibility antigens relevant to renal allograft rejection, but no data have been reported about their role in graft-versus-host disease (GVHD) incidence after human leukocyte antigen (HLA)-identical siblings hematopoietic stem cell transplantation (HSCT). The aim of this study was to examine the effect of donor/recipient disparity at FY antigens on the incidence of GVHD in Tunisian patients receiving an HLA-identical HSCT. This work enrolled 105 Tunisian pairs of recipients and their HLA-identical sibling donors of HSCs. FY genotyping was performed with the polymerase chain reaction-sequence-specific primer method and donor/recipient disparity for these antigens was analyzed at two levels: incompatibility and nonidentity. The case-control analyses showed no significant correlation between FY disparity and the incidence of either acute or chronic GVHD. Sample size calculation showed that 572 cases and 1716 controls would be necessary to be able to detect a significant association with 80% power and two-sided type I error level of 5% (α=0.05). The lack of association in the studied cohort may be explained by the low immunogenicity of FY antigens in HSCT context, compared with other antigens such as HA-1 and CD31.
Vanz, Ana Ls; Renard, Gaby; Palma, Mario S; Chies, Jocelei M; Dalmora, Sérgio L; Basso, Luiz A; Santos, Diógenes S
2008-04-04
Biopharmaceutical drugs are mainly recombinant proteins produced by biotechnological tools. The patents of many biopharmaceuticals have expired, and biosimilars are thus currently being developed. Human granulocyte colony stimulating factor (hG-CSF) is a hematopoietic cytokine that acts on cells of the neutrophil lineage causing proliferation and differentiation of committed precursor cells and activation of mature neutrophils. Recombinant hG-CSF has been produced in genetically engineered Escherichia coli (Filgrastim) and successfully used to treat cancer patients suffering from chemotherapy-induced neutropenia. Filgrastim is a 175 amino acid protein, containing an extra N-terminal methionine, which is needed for expression in E. coli. Here we describe a simple and low-cost process that is amenable to scaling-up for the production and purification of homogeneous and active recombinant hG-CSF expressed in E. coli cells. Here we describe cloning of the human granulocyte colony-stimulating factor coding DNA sequence, protein expression in E. coli BL21(DE3) host cells in the absence of isopropyl-beta-D-thiogalactopyranoside (IPTG) induction, efficient isolation and solubilization of inclusion bodies by a multi-step washing procedure, and a purification protocol using a single cationic exchange column. Characterization of homogeneous rhG-CSF by size exclusion and reverse phase chromatography showed similar yields to the standard. The immunoassay and N-terminal sequencing confirmed the identity of rhG-CSF. The biological activity assay, in vivo, showed an equivalent biological effect (109.4%) to the standard reference rhG-CSF. The homogeneous rhG-CSF protein yield was 3.2 mg of bioactive protein per liter of cell culture. The recombinant protein expression in the absence of IPTG induction is advantageous since cost is reduced, and the protein purification protocol using a single chromatographic step should reduce cost even further for large scale production. The physicochemical, immunological and biological analyses showed that this protocol can be useful to develop therapeutic bioproducts. In summary, the combination of different experimental strategies presented here allowed an efficient and cost-effective protocol for rhG-CSF production. These data may be of interest to biopharmaceutical companies interested in developing biosimilars and healthcare community.
Vanz, Ana LS; Renard, Gaby; Palma, Mario S; Chies, Jocelei M; Dalmora, Sérgio L; Basso, Luiz A; Santos, Diógenes S
2008-01-01
Background Biopharmaceutical drugs are mainly recombinant proteins produced by biotechnological tools. The patents of many biopharmaceuticals have expired, and biosimilars are thus currently being developed. Human granulocyte colony stimulating factor (hG-CSF) is a hematopoietic cytokine that acts on cells of the neutrophil lineage causing proliferation and differentiation of committed precursor cells and activation of mature neutrophils. Recombinant hG-CSF has been produced in genetically engineered Escherichia coli (Filgrastim) and successfully used to treat cancer patients suffering from chemotherapy-induced neutropenia. Filgrastim is a 175 amino acid protein, containing an extra N-terminal methionine, which is needed for expression in E. coli. Here we describe a simple and low-cost process that is amenable to scaling-up for the production and purification of homogeneous and active recombinant hG-CSF expressed in E. coli cells. Results Here we describe cloning of the human granulocyte colony-stimulating factor coding DNA sequence, protein expression in E. coli BL21(DE3) host cells in the absence of isopropyl-β-D-thiogalactopyranoside (IPTG) induction, efficient isolation and solubilization of inclusion bodies by a multi-step washing procedure, and a purification protocol using a single cationic exchange column. Characterization of homogeneous rhG-CSF by size exclusion and reverse phase chromatography showed similar yields to the standard. The immunoassay and N-terminal sequencing confirmed the identity of rhG-CSF. The biological activity assay, in vivo, showed an equivalent biological effect (109.4%) to the standard reference rhG-CSF. The homogeneous rhG-CSF protein yield was 3.2 mg of bioactive protein per liter of cell culture. Conclusion The recombinant protein expression in the absence of IPTG induction is advantageous since cost is reduced, and the protein purification protocol using a single chromatographic step should reduce cost even further for large scale production. The physicochemical, immunological and biological analyses showed that this protocol can be useful to develop therapeutic bioproducts. In summary, the combination of different experimental strategies presented here allowed an efficient and cost-effective protocol for rhG-CSF production. These data may be of interest to biopharmaceutical companies interested in developing biosimilars and healthcare community. PMID:18394164
Retrieving and routing quantum information in a quantum network
NASA Astrophysics Data System (ADS)
Sazim, S.; Chiranjeevi, V.; Chakrabarty, I.; Srinathan, K.
2015-12-01
In extant quantum secret sharing protocols, once the secret is shared in a quantum network ( qnet) it cannot be retrieved, even if the dealer wishes that his/her secret no longer be available in the network. For instance, if the dealer is part of the two qnets, say {{Q}}_1 and {{Q}}_2 and he/she subsequently finds that {{Q}}_2 is more reliable than {{Q}}_1, he/she may wish to transfer all her secrets from {{Q}}_1 to {{Q}}_2. Known protocols are inadequate to address such a revocation. In this work we address this problem by designing a protocol that enables the source/dealer to bring back the information shared in the network, if desired. Unlike classical revocation, the no-cloning theorem automatically ensures that the secret is no longer shared in the network. The implications of our results are multi-fold. One interesting implication of our technique is the possibility of routing qubits in asynchronous qnets. By asynchrony we mean that the requisite data/resources are intermittently available (but not necessarily simultaneously) in the qnet. For example, we show that a source S can send quantum information to a destination R even though (a) S and R share no quantum resource, (b) R's identity is unknown to S at the time of sending the message, but is subsequently decided, (c) S herself can be R at a later date and/or in a different location to bequeath her information (`backed-up' in the qnet) and (d) importantly, the path chosen for routing the secret may hit a dead end due to resource constraints, congestion, etc., (therefore the information needs to be back-tracked and sent along an alternate path). Another implication of our technique is the possibility of using insecure resources. For instance, if the quantum memory within an organization is insufficient, it may safely store (using our protocol) its private information with a neighboring organization without (a) revealing critical data to the host and (b) losing control over retrieving the data. Putting the two implications together, namely routing and secure storage, it is possible to envision applications like quantum mail (qmail) as an outsourced service.
Network Upgrade for the SLC: Control System Modifications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crane, M.; Mackenzie, R.; Sass, R.
2011-09-09
Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used to reduce the number of total system TCP/IP connections. The SLCmicros were upgraded to use Ethernet and TCP/IP as well as SLCNET. Design choices and implementation experiences are addressed.
In-memory interconnect protocol configuration registers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cheng, Kevin Y.; Roberts, David A.
Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mappingmore » decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.« less
Struggle for space: viral extinction through competition for cells.
Cuesta, José A; Aguirre, Jacobo; Capitán, José A; Manrubia, Susanna C
2011-01-14
The design of protocols to suppress the propagation of viral infections is an enduring enterprise, especially hindered by limited knowledge of the mechanisms leading to viral extinction. Here we report on infection extinction due to intraspecific competition to infect susceptible hosts. Beneficial mutations increase the production of viral progeny, while the host cell may develop defenses against infection. For an unlimited number of host cells, a feedback runaway coevolution between host resistance and progeny production occurs. However, physical space limits the advantage that the virus obtains from increasing offspring numbers; thus, infection clearance may result from an increase in host defenses beyond a finite threshold. Our results might be relevant to devise improved control strategies in environments with mobility constraints or different geometrical properties.
Remote Memory Access Protocol Target Node Intellectual Property
NASA Technical Reports Server (NTRS)
Haddad, Omar
2013-01-01
The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Uribe, Eva C; Sandoval, M Analisa; Sandoval, Marisa N
2009-01-01
With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to accessmore » to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.« less
Defense Data Network/TOPS-20 Tutorial. An Interative Computer Program.
1985-12-01
33 XI. ELECTRONIC MAIL HOST ( EMH )-------------------------- 34 XII. EMACS...contents of text buffer to a file X EXCHANGE , used to search for and replace text Z ZAP, puts your entire file into the print buffer 23 - -° SWITCH...prompt USC-ISIE.ARPA> Sample foreign host command level prompt FTP COMMAND LEVEL COMMANDS COMMAND USE(S) FTP Invokes the FTP protocol CONNECT Connects
2002-09-01
to Ref (1). 34 RS232.java Serial Coomunication port class To Bluetooth module HCI.java Host Control Interface class L2CAP.java Logical Link Control...standard protocol for transporting IP datagrams over point-to-point link . It is designed to run over RFCOMM to accomplish point-to-point connections...Control and Adaption Host Controller Interface Link Manager Baseband / Link Controller Radio Figure 2. Bluetooth layers (From Ref. [3].) C
TMS communications hardware. Volume 2: Bus interface unit
NASA Technical Reports Server (NTRS)
Brown, J. S.; Hopkins, G. T.
1979-01-01
A prototype coaxial cable bus communication system used in the Trend Monitoring System to interconnect intelligent graphics terminals to a host minicomputer is described. The terminals and host are connected to the bus through a microprocessor-based RF modem termed a Bus Interface Unit (BIU). The BIU hardware and the Carrier Sense Multiple Access Listen-While-Talk protocol used on the network are described.
Leventhal, Joseph R; Miller, Joshua; Mathew, James M; Kurian, Sunil; Tambur, Anat R; Friedewald, John; Charrette, Jane; Abecassis, Michael M
2018-05-01
Kidney transplant recipients given donor hematopoietic stem cells from their HLA-identical living related donors have now been followed between 5 and 9½ years post-operatively. Recipients who were designated as tolerant (Tol) have remained so since the last report when the 5 year (biopsy associated) milestone was reached. There has been 1 mortality of a Tol patient, unrelated to the study protocol, while 5 (of 15) have remained Tol between 7 and 8½ years post-operatively. There has been continuing elevated T-regulatory (CD4 + CD25 High CD127 - FOXP3 + ) cells in PBMC previously reported on. Ten year renal transplant biopsies are tentatively planned. Copyright © 2018 American Society for Histocompatibility and Immunogenetics. Published by Elsevier Inc. All rights reserved.
Photoelectrochemical processes in polymer-tethered CdSe nanocrystals.
Shallcross, R Clayton; D'Ambruoso, Gemma D; Pyun, Jeffrey; Armstrong, Neal R
2010-03-03
We demonstrate the electrochemical capture of CdSe semiconductor nanocrystals (NCs), with thiophene-terminated carboxylic acid capping ligands, at the surfaces of electrodeposited poly(thiophene) films (i) poly((diethyl)propylenedixoythiophene), P(Et)(2)ProDOT; (ii) poly(propylenedioxythiophene), PProDOT; and (iii) poly(ethylenedioxythiophene), PEDOT, coupled with the exploration of their photoelectrochemical properties. Host polymer films were created using a kinetically controlled electrodeposition protocol on activated indium-tin oxide electrodes (ITO), producing conformal films that facilitate high rates of electron transfer. ProDOT-terminated, ligand-capped CdSe-NCs were captured at the outer surface of the host polymer films using a unique pulse-potential step electrodeposition protocol, providing for nearly close-packed monolayers of the NCs at the host polymer/solution interface. These polymer-confined CdSe NCs were used as sensitizers in the photoelectrochemical reduction of methyl viologen (MV(+2)). High internal quantum efficiencies (IQEs) are estimated for photoelectrochemical sensitized MV(+2) reduction using CdSe NCs ranging from 3.1 to 7.0 nm diameters. Cathodic photocurrent at high MV(+2) concentrations are limited by the rate of hole-capture by the host polymer from photoexcited NCs. The rate of this hole-capture process is determined by (a) the onset potential for reductive dedoping of the host polymer film; (b) the concentration ratio of neutral to oxidized forms of the host polymer ([P(n)]/[P(ox)]); and (c) the NC diameter, which controls its valence band energy, E(VB). These relationships are consistent with control of photoinduced electron transfer by Marcus-like excess free energy relationships. Our electrochemical assembly methods provide an enabling route to the capture of functional NCs in conducting polymer hosts in both photoelectrochemical and photovoltaic energy conversion systems.
2007-02-01
almost identical system call sequences and triggering the same alarm at different hosts. The alarm propagation effect can be used to distinguish “true...different hosts. The alarm propagation effect can be used to distinguish “true alarms” from “false positives”. At the host-level, a new anomaly...0H ( ) ( )∑∑ = = ⎟⎟ ⎠ ⎞ ⎜⎜ ⎝ ⎛ − + − = 2 1 1, 2 2 2 2 1 1 ),( ),(),()( ),( ),(),()( k m ji jiT jiTjiTiN jiT jiTjiTiNW where - marginal observed
Adom, Theodosia; Puoane, Thandi; De Villiers, Anniza; Kengne, André Pascal
2017-01-13
Obesity and overweight are an emerging problem in Africa. Obese children are at increased risk of developing hypertension, high cholesterol, orthopaedic problems and type 2 diabetes as well as increased risk of adult obesity. Prevention of childhood overweight and obesity therefore needs high priority. The review approach is particularly useful in establishing whether research findings are consistent and can be generalised across populations and settings. This systematic review aims to assess the magnitude and distribution of overweight and obesity among primary school learners within populations in Africa. A comprehensive search of key bibliographic databases including MEDLINE (PubMed), MEDLINE (EbscoHost), CINAHL (EbscoHost), Academic Search Complete (EbscoHost) and ISI Web of Science (Science Citation Index) will be conducted for published literature. Grey literature will be also be obtained. Full-text articles of eligible studies will be obtained and screened following predefined inclusion criteria. The quality of reporting as well as risk of bias of included studies will be assessed, data extracted and synthesised. The results will be summarised and presented by country and major regional groupings. Meta-analysis will be conducted for identical variables across studies. This review will be reported following the MOOSE Guidelines for Meta-Analysis and Systematic Reviews of Observational Studies. Ethics is not a requirement since no primary data will be collected. All data that will be presented in this review are based on published articles. The findings of this systematic review will be submitted for publication in peer-reviewed journals and disseminated in national and international conferences and also in policy documents to appropriate bodies for decision-making, where needed. It is expected that the findings will identify some research gaps for further studies. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Protocol dependence of mechanical properties in granular systems.
Inagaki, S; Otsuki, M; Sasa, S
2011-11-01
We study the protocol dependence of the mechanical properties of granular media by means of computer simulations. We control a protocol of realizing disk packings in a systematic manner. In 2D, by keeping material properties of the constituents identical, we carry out compaction with various strain rates. The disk packings exhibit the strain rate dependence of the critical packing fraction above which the pressure becomes non-zero. The observed behavior contrasts with the well-studied jamming transitions for frictionless disk packings. We also observe that the elastic moduli of the disk packings depend on the strain rate logarithmically. Our results suggest that there exists a time-dependent state variable to describe macroscopic material properties of disk packings, which depend on its protocol.
Authenticated multi-user quantum key distribution with single particles
NASA Astrophysics Data System (ADS)
Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen
2016-03-01
Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.
Zscheck, K K; Murray, B E
1991-01-01
The nucleotide sequence of the constitutively produced beta-lactamase (Bla) gene from Enterococcus faecalis HH22 was shown to be identical to the published sequences of three of four staphylococcal type A beta-lactamase genes; more differences were seen with the genes for staphylococcal type C and D enzymes. One hundred forty nucleotides upstream of the beta-lactamase start codon were determined for an inducible staphylococcal beta-lactamase and were identical to those of the constitutively expressed enterococcal gene, indicating that the changes resulting in constitutive expression are not due to changes in the promoter or operator region. Moreover, complementation studies indicated that production of the enterococcal enzyme could be repressed. The genes for the enterococcal Bla and an inducible staphylococcal Bla were each cloned into a shuttle vector and transformed into enterococcal and staphylococcal recipients. The major difference between the backgrounds of the two hosts was that more enzyme was produced by the staphylococcal host, regardless of the source of the gene. The location of the enzyme was found to be host dependent, since each cloned gene generated extracellular (free) enzyme in the staphylococcus and cell-bound enzyme in the enterococcus. On the basis of the identities of the enterococcal Bla and several staphylococcal Bla sequences, these data suggest the recent spread of beta-lactamase to enterococci and also suggest the loss of a functional repressor. PMID:1952840
2004-01-01
login identity to the one under which the system call is executed, the parameters of the system call execution - file names including full path...Anomaly detection COAST-EIMDT Distributed on target hosts EMERALD Distributed on target hosts and security servers Signature recognition Anomaly...uses a centralized architecture, and employs an anomaly detection technique for intrusion detection. The EMERALD project [80] proposes a
Session Initiation Protocol Network Encryption Device Plain Text Domain Discovery Service
2007-12-07
MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION / AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a...such as the TACLANE, have developed unique discovery methods to establish Plain Text Domain (PTD) Security Associations (SA). All of these techniques...can include network and host Internet Protocol (IP) addresses, Information System Security Office (ISSO) point of contact information and PTD status
Identity-Based Verifiably Encrypted Signatures without Random Oracles
NASA Astrophysics Data System (ADS)
Zhang, Lei; Wu, Qianhong; Qin, Bo
Fair exchange protocol plays an important role in electronic commerce in the case of exchanging digital contracts. Verifiably encrypted signatures provide an optimistic solution to these scenarios with an off-line trusted third party. In this paper, we propose an identity-based verifiably encrypted signature scheme. The scheme is non-interactive to generate verifiably encrypted signatures and the resulting encrypted signature consists of only four group elements. Based on the computational Diffie-Hellman assumption, our scheme is proven secure without using random oracles. To the best of our knowledge, this is the first identity-based verifiably encrypted signature scheme provably secure in the standard model.
1980-07-01
MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links
NASA Astrophysics Data System (ADS)
Song, Yang; Laskay, Ünige A.; Vilcins, Inger-Marie E.; Barbour, Alan G.; Wysocki, Vicki H.
2015-11-01
Ticks are vectors for disease transmission because they are indiscriminant in their feeding on multiple vertebrate hosts, transmitting pathogens between their hosts. Identifying the hosts on which ticks have fed is important for disease prevention and intervention. We have previously shown that hemoglobin (Hb) remnants from a host on which a tick fed can be used to reveal the host's identity. For the present research, blood was collected from 33 bird species that are common in the U.S. as hosts for ticks but that have unknown Hb sequences. A top-down-assisted bottom-up mass spectrometry approach with a customized searching database, based on variability in known bird hemoglobin sequences, has been devised to facilitate fast and complete sequencing of hemoglobin from birds with unknown sequences. These hemoglobin sequences will be added to a hemoglobin database and used for tick host identification. The general approach has the potential to sequence any set of homologous proteins completely in a rapid manner.
Scioscia, Nathalia P; Olmos, Leandro; Gorosábel, Antonella; Bernad, Lucía; Pedrana, Julieta; Hecker, Yanina P; Gual, Ignacio; Laura Gos, M; Denegri, Guillermo M; Moore, Dadín P; Moré, Gastón
2017-06-01
Several Sarcocystis spp. have carnivores as definitive host and sarcocysts are common in muscles of herbivores (intermediate host). However, sarcocysts have been found in muscles of wild and domestic carnivores suggesting they are intermediate host for some Sarcocystis spp. Here, we report mature sarcocysts in the muscles of Pampas fox (Lycalopex gymnocercus). A total of 36 free-living foxes were analyzed. Different skeletal muscles were assessed by microscopic and molecular methods. Cysts and/or DNA of Sarcocystis sp. were detected in 61.1% (22/36) foxes. Histopathology revealed the presence of sarcocysts in 52.8% (19/36) foxes. The tongue and masseter were the muscles more frequently infected. Of all the samples processed by homogenization of pooled muscles of each animal, 45.4% (10/22) evidenced muscle cysts and 68.2% (15/22) resulted positives by PCR. Individual cysts obtained from the ten positive samples in direct microscopic examination were all positive by PCR. Five amplicons from individual cysts from different samples were selected for sequencing together with four PCR products obtained from the pooled muscles. All nine sequences shared a high identity among them (99.8-100%) and showed the highest identity by BLAST (99%) with a S. svanai sequence (KM362428) from a North American dog. By transmission electron microscopy, the sarcocyst wall was thin (<1μm), had minute undulations, with tiny evaginations and without evident villar protrusions. The cyst wall type is referred as "type 1". Sarcocystis svanai infects L. gymnocercus with a high prevalence and the presence of mature sarcocysts suggests the role of the Pampas fox as natural intermediate host. The definitive host of S. svanai remains unknown. Copyright © 2017 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Huang, Wei; Wen, Qiao-Yan; Liu, Bin; Su, Qi; Qin, Su-Juan; Gao, Fei
2014-03-01
Anonymous ranking is a kind of privacy-preserving ranking whereby each of the involved participants can correctly and anonymously get the rankings of his data. It can be utilized to solve many practical problems, such as anonymously ranking the students' exam scores. We investigate the issue of how quantum mechanics can be of use in maintaining the anonymity of the participants in multiparty ranking and present a series of quantum anonymous multiparty, multidata ranking protocols. In each of these protocols, a participant can get the correct rankings of his data and nobody else can match the identity to his data. Furthermore, the security of these protocols with respect to different kinds of attacks is proved.
RFID applications in transportation operation and intelligent transportation systems (ITS).
DOT National Transportation Integrated Search
2009-06-01
Radio frequency identification (RFID) transmits the identity of an object or a person wirelessly. It is grouped under : the broad category of automatic identification technologies with corresponding standards and established protocols. : RFID is suit...
Public-key quantum digital signature scheme with one-time pad private-key
NASA Astrophysics Data System (ADS)
Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua
2018-01-01
A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.
Security analysis and enhanced user authentication in proxy mobile IPv6 networks.
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.
Sex-specific effects of a parasite evolving in a female-biased host population
2012-01-01
Background Males and females differ in many ways and might present different opportunities and challenges to their parasites. In the same way that parasites adapt to the most common host type, they may adapt to the characteristics of the host sex they encounter most often. To explore this hypothesis, we characterized host sex-specific effects of the parasite Pasteuria ramosa, a bacterium evolving in naturally, strongly, female-biased populations of its host Daphnia magna. Results We show that the parasite proliferates more successfully in female hosts than in male hosts, even though males and females are genetically identical. In addition, when exposure occurred when hosts expressed a sexual dimorphism, females were more infected. In both host sexes, the parasite causes a similar reduction in longevity and leads to some level of castration. However, only in females does parasite-induced castration result in the gigantism that increases the carrying capacity for the proliferating parasite. Conclusions We show that mature male and female Daphnia represent different environments and reveal one parasite-induced symptom (host castration), which leads to increased carrying capacity for parasite proliferation in female but not male hosts. We propose that parasite induced host castration is a property of parasites that evolved as an adaptation to specifically exploit female hosts. PMID:23249484
Sex-specific effects of a parasite evolving in a female-biased host population.
Duneau, David; Luijckx, Pepijn; Ruder, Ludwig F; Ebert, Dieter
2012-12-18
Males and females differ in many ways and might present different opportunities and challenges to their parasites. In the same way that parasites adapt to the most common host type, they may adapt to the characteristics of the host sex they encounter most often. To explore this hypothesis, we characterized host sex-specific effects of the parasite Pasteuria ramosa, a bacterium evolving in naturally, strongly, female-biased populations of its host Daphnia magna. We show that the parasite proliferates more successfully in female hosts than in male hosts, even though males and females are genetically identical. In addition, when exposure occurred when hosts expressed a sexual dimorphism, females were more infected. In both host sexes, the parasite causes a similar reduction in longevity and leads to some level of castration. However, only in females does parasite-induced castration result in the gigantism that increases the carrying capacity for the proliferating parasite. We show that mature male and female Daphnia represent different environments and reveal one parasite-induced symptom (host castration), which leads to increased carrying capacity for parasite proliferation in female but not male hosts. We propose that parasite induced host castration is a property of parasites that evolved as an adaptation to specifically exploit female hosts.
Global Diversity and Distribution of Hantaviruses and Their Hosts.
Milholland, Matthew T; Castro-Arellano, Iván; Suzán, Gerardo; Garcia-Peña, Gabriel E; Lee, Thomas E; Rohde, Rodney E; Alonso Aguirre, A; Mills, James N
2018-04-30
Rodents represent 42% of the world's mammalian biodiversity encompassing 2,277 species populating every continent (except Antarctica) and are reservoir hosts for a wide diversity of disease agents. Thus, knowing the identity, diversity, host-pathogen relationships, and geographic distribution of rodent-borne zoonotic pathogens, is essential for predicting and mitigating zoonotic disease outbreaks. Hantaviruses are hosted by numerous rodent reservoirs. However, the diversity of rodents harboring hantaviruses is likely unknown because research is biased toward specific reservoir hosts and viruses. An up-to-date, systematic review covering all known rodent hosts is lacking. Herein, we document gaps in our knowledge of the diversity and distribution of rodent species that host hantaviruses. Of the currently recognized 681 cricetid, 730 murid, 61 nesomyid, and 278 sciurid species, we determined that 11.3, 2.1, 1.6, and 1.1%, respectively, have known associations with hantaviruses. The diversity of hantaviruses hosted by rodents and their distribution among host species supports a reassessment of the paradigm that each virus is associated with a single-host species. We examine these host-virus associations on a global taxonomic and geographical scale with emphasis on the rodent host diversity and distribution. Previous reviews have been centered on the viruses and not the mammalian hosts. Thus, we provide a perspective not previously addressed.
Wolbachia transmission dynamics in Formica wood ants
2008-01-01
Background The role of Wolbachia endosymbionts in shaping the mitochondrial diversity of their arthropod host depends on the effects they have on host reproduction and on the mode of transmission of the bacteria. We have compared the sequence diversity of wsp (Wolbachia surface protein gene) and the host mtDNA in a group of Formica ant species that have diverged approximately 0.5 million years ago (MYA). The aim was to study the relationship of Wolbachia and its ant hosts in terms of vertical and horizontal transmission of the bacteria. Results All studied ant species were doubly infected with two Wolbachia strains (wFex1 and wFex4) all over their geographical distribution area in Eurasia. The most common haplotypes of these strains were identical with strains previously described from a more distantly related Formica ant, with an estimated divergence time of 3.5 – 4 MYA. Some strain haplotypes were associated to the same or closely related mtDNA haplotypes as expected under vertical transmission. However, in several cases the wsp haplotypes coexisted with distant mtDNA haplotypes, a pattern which is more compatible with horizontal transmission of the bacteria. Conclusion Two lines of evidence suggest that the sharing of Wolbachia strains by all F. rufa species is rather due to horizontal than vertical transmission. First, the fact that endosymbiont strains identical to those of F. rufa ants have been found in another species that diverged 3.5–4 MYA strongly suggests that horizontal transfer can and does occur between Formica ants. Second, the frequent sharing of identical Wolbachia strains by distant mitochondrial lineages within the F. rufa group further shows that horizontal transmission has occurred repeatedly. Nevertheless, our dataset also provides some evidence for longer-term persistence of infection, indicating that Wolbachia infection within this host clade has been shaped by both horizontal and vertical transmission of symbionts. The fact that all the ants were infected irrespective of the family structure of their societies gives no support to the proposed hypotheses that the spreading of Wolbachia in ants might be associated to the types of their societies. PMID:18291041
IBE-Lite: a lightweight identity-based cryptography for body sensor networks.
Tan, Chiu C; Wang, Haodong; Zhong, Sheng; Li, Qun
2009-11-01
A body sensor network (BSN) is a network of sensors deployed on a person's body for health care monitoring. Since the sensors collect personal medical data, security and privacy are important components in a BSN. In this paper, we developed IBE-Lite, a lightweight identity-based encryption suitable for sensors in a BSN. We present protocols based on IBE-Lite that balance security and privacy with accessibility and perform evaluation using experiments conducted on commercially available sensors.
NASA Astrophysics Data System (ADS)
Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao
2016-08-01
A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state | φ -> is used as the carrier. One photon of | φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.
Robust Multi-unit Auction Protocol against False-name Bids
NASA Astrophysics Data System (ADS)
Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo
This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.
A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.
Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander
2017-01-01
Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.
Interculture: Some Concepts for Describing the Situation of Immigrants.
ERIC Educational Resources Information Center
Ekstrand, Lars Henric; And Others
1981-01-01
Attempts to find new ways of describing and analyzing dynamic interactions in country of origin, host country, and immigrant community caused by migration. Analyzes linguistic models, concept of culture, emigration psychology, and identity formation. (Author/BK)
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-01-01
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-09-02
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.
Doyle, Vinson P.; Oudemans, Peter V.; Rehner, Stephen A.; Litt, Amy
2013-01-01
Understanding the factors that drive the evolution of pathogenic fungi is central to revealing the mechanisms of virulence and host preference, as well as developing effective disease control measures. Prerequisite to these pursuits is the accurate delimitation of species boundaries. Colletotrichum gloeosporioides s.l. is a species complex of plant pathogens and endophytic fungi for which reliable species recognition has only recently become possible through a multi-locus phylogenetic approach. By adopting an intensive regional sampling strategy encompassing multiple hosts within and beyond agricultural zones associated with cranberry (Vaccinium macrocarpon Aiton), we have integrated North America strains of Colletotrichum gloeosporioides s.l. from these habitats into a broader phylogenetic framework. We delimit species on the basis of genealogical concordance phylogenetic species recognition (GCPSR) and quantitatively assess the monophyly of delimited species at each of four nuclear loci and in the combined data set with the genealogical sorting index (gsi). Our analysis resolved two principal lineages within the species complex. Strains isolated from cranberry and sympatric host plants are distributed across both of these lineages and belong to seven distinct species or terminal clades. Strains isolated from V. macrocarpon in commercial cranberry beds belong to four species, three of which are described here as new. Another species, C. rhexiae Ellis & Everh., is epitypified. Intensive regional sampling has revealed a combination of factors, including the host species from which a strain has been isolated, the host organ of origin, and the habitat of the host species, as useful indicators of species identity in the sampled regions. We have identified three broadly distributed temperate species, C. fructivorum, C. rhexiae, and C. nupharicola, that could be useful for understanding the microevolutionary forces that may lead to species divergence in this important complex of endophytes and plant pathogens. PMID:23671594
Distributed run of a one-dimensional model in a regional application using SOAP-based web services
NASA Astrophysics Data System (ADS)
Smiatek, Gerhard
This article describes the setup of a distributed computing system in Perl. It facilitates the parallel run of a one-dimensional environmental model on a number of simple network PC hosts. The system uses Simple Object Access Protocol (SOAP) driven web services offering the model run on remote hosts and a multi-thread environment distributing the work and accessing the web services. Its application is demonstrated in a regional run of a process-oriented biogenic emission model for the area of Germany. Within a network consisting of up to seven web services implemented on Linux and MS-Windows hosts, a performance increase of approximately 400% has been reached compared to a model run on the fastest single host.
Biometric identity management for standard mobile medical networks.
Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica
2012-01-01
The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented.
The Robinson Protocol: a treadmill anaerobic performance test.
Robinson, Ellyn M; Graham, Louise B; Headley, Samuel A
2004-08-01
The current investigation was designed to further examine the reliability of the Robinson protocol, which is a run-to-exhaustion treadmill test. Robinson (10) originally examined this protocol with 5 subjects. The significance of the initial exploratory study was the impetus for expanding the study to examine the reliability of the protocol with a larger sample. Fifteen male subjects participated in 3 trial runs on the treadmill. The first trial was a modified McConnell (7) test to determine the aerobic capacity of each subject. The second and third trials were identical Robinson protocols (10). The first trial run mean, in seconds (262.04 +/- 74.50), was not significantly different from the second trial run mean (257.30 +/- 72.65), p = 0.526 (2 tailed). As expected, trial 1 and trial 2 were highly correlated (intraclass) (r = 0.927, p < 0.001). These results provide additional support for the hypothesis that the Robinson protocol with a greater subject pool is a reliable protocol that can be used in research studies interested in examining various physiological interventions or anaerobic training.
NASA Technical Reports Server (NTRS)
Rakow, Glenn; McGuirk, Patrick; Kimmery, Clifford; Jaffe, Paul
2006-01-01
The ability to rapidly deploy inexpensive satellites to meet tactical goals has become an important goal for military space systems. In fact, Operationally Responsive Space (ORS) has been in the spotlight at the highest levels. The Office of the Secretary of Defense (OSD) has identified that the critical next step is developing the bus standards and modular interfaces. Historically, satellite components have been constructed based on bus standards and standardized interfaces. However, this has not been done to a degree, which would allow the rapid deployment of a satellite. Advancements in plug-and-play (PnP) technologies for terrestrial applications can serve as a baseline model for a PnP approach for satellite applications. Since SpaceWire (SpW) has become a de facto standard for satellite high-speed (greater than 200Mbp) on-board communications, it has become important for SpW to adapt to this Plug and Play (PnP) environment. Because SpW is simply a bulk transport protocol and lacks built-in PnP features, several changes are required to facilitate PnP with SpW. The first is for Host(s) to figure out what the network looks like, i.e., how pieces of the network, routers and nodes, are connected together; network mapping, and to receive notice of changes to the network. The second is for the components connected to the network to be understood so that they can communicate. The first element, network topology mapping & change of status indication, is being defined (topic of this paper). The second element describing how components are to communicate has been defined by ARFL with the electronic data sheets known as XTEDS. The first element, network mapping, is recent activities performed by Air Force Research Lab (ARFL), Naval Research Lab (NRL), NASA and US industry (Honeywell, Clearwater, FL, and others). This work has resulted in the development of a protocol that will perform the lower level functions of network mapping and Change Of Status (COS) indication required by Plug 'n' Play over SpaceWire. This work will be presented to the SpaceWire working group for standardization under European Cooperation for Space Standardization (ECSS) and to obtain a permanent Protocol ID (see SpaceWire Protocol ID: What Does it Mean to You; IEEE Aerospace Conference 2006). The portion of the Plug 'n' Play protocol that will be described in this paper is how the Host(s) of a SpaceWire network map the network and detect additions and deletions of devices on a SpaceWire network.
Probing individual environmental bacteria for viruses by using microfluidic digital PCR.
Tadmor, Arbel D; Ottesen, Elizabeth A; Leadbetter, Jared R; Phillips, Rob
2011-07-01
Viruses may very well be the most abundant biological entities on the planet. Yet neither metagenomic studies nor classical phage isolation techniques have shed much light on the identity of the hosts of most viruses. We used a microfluidic digital polymerase chain reaction (PCR) approach to physically link single bacterial cells harvested from a natural environment with a viral marker gene. When we implemented this technique on the microbial community residing in the termite hindgut, we found genus-wide infection patterns displaying remarkable intragenus selectivity. Viral marker allelic diversity revealed restricted mixing of alleles between hosts, indicating limited lateral gene transfer of these alleles despite host proximity. Our approach does not require culturing hosts or viruses and provides a method for examining virus-bacterium interactions in many environments.
Probing Individual Environmental Bacteria for Viruses by Using Microfluidic Digital PCR
Tadmor, Arbel D.; Ottesen, Elizabeth A.; Leadbetter, Jared R.; Phillips, Rob
2012-01-01
Viruses may very well be the most abundant biological entities on the planet. Yet neither metagenomic studies nor classical phage isolation techniques have shed much light on the identity of the hosts of most viruses. We used a microfluidic digital polymerase chain reaction (PCR) approach to physically link single bacterial cells harvested from a natural environment with a viral marker gene. When we implemented this technique on the microbial community residing in the termite hindgut, we found genus-wide infection patterns displaying remarkable intragenus selectivity. Viral marker allelic diversity revealed restricted mixing of alleles between hosts, indicating limited lateral gene transfer of these alleles despite host proximity. Our approach does not require culturing hosts or viruses and provides a method for examining virus-bacterium interactions in many environments. PMID:21719670
Pariaud, Bénédicte; Berg, Femke; Bosch, Frank; Powers, Stephen J; Kaltz, Oliver; Lannou, Christian
2013-02-01
Crop pathogens are notorious for their rapid adaptation to their host. We still know little about the evolution of their life cycles and whether there might be trade-offs between fitness components, limiting the evolutionary potential of these pathogens. In this study, we explored a trade-off between spore production capacity and latent period in Puccinia triticina, a fungal pathogen causing leaf rust on wheat. Using a simple multivariate (manova) technique, we showed that the covariance between the two traits is under shared control of host and pathogen, with contributions from host genotype (57%), pathogen genotype (18.4%) and genotype × genotype interactions (12.5%). We also found variation in sign and strength of genetic correlations for the pathogen, when measured on different host varieties. Our results suggest that these important pathogen life-history traits do not freely respond to directional selection and that precise evolutionary trajectories are contingent on the genetic identity of the interacting host and pathogen.
Heinze, Simon; Kornberger, Petra; Grätz, Christian; Schwarz, Wolfgang H; Zverlov, Vladimir V; Liebl, Wolfgang
2018-06-08
The genus Bacillus includes a great variety of species with potential applications in biotechnology. While species such as B. subtilis or B. licheniformis are well-known and used to provide various products at industrial scale, other Bacillus species are less characterized and are not yet used in commercial processes. One reason for this is the fact that genetic manipulation of new isolates is usually complicated with conventional techniques which have to be adapted to each new strain. Even in well-established strains, the available transformation protocols often suffer from low efficiencies. In this paper, we provide a new broad host range E. coli/Bacillus shuttle vector, named pBACOV (Bacillus conjugation vector), that can be efficiently transferred to various Bacillus species using a single protocol. A variant of pBACOV carrying the sfGFP gene was successfully transferred to eight different species from the genus Bacillus and to one Paenibacillus species using triparental conjugation ("transmating"). This was achieved using a single protocol and worked for nine out of eleven tested acceptor species. The transmating procedure was used to test expression of the heterologous reporter gene sfGFP under control of the P aprE -promoter from B. subtilis in several Bacillus species in parallel. Expression of sfGFP was found in eight out of nine transmates. For several of the tested species, this is the first report of a method for genetic modification and heterologous gene expression. The expression level, analyzed by measuring the relative sfGFP-fluorescence normalized to the cell density of the cultures, was highest in B. mojavensis. The new shuttle vector pBACOV can be transferred to many different Bacillus and Paenibacillus species using a simple and efficient transmating protocol. It is a versatile tool facilitating the application of recombinant DNA technology in new as well as established strains, or selection of an ideal host for heterologous gene expression from a multitude of strains. This paves the way for the genetic modification and biotechnological exploitation of the broad diversity of species of Bacillus and related genera as well as different strains from these species.
Host-Associated Metagenomics: A Guide to Generating Infectious RNA Viromes
Robert, Catherine; Pascalis, Hervé; Michelle, Caroline; Jardot, Priscilla; Charrel, Rémi; Raoult, Didier; Desnues, Christelle
2015-01-01
Background Metagenomic analyses have been widely used in the last decade to describe viral communities in various environments or to identify the etiology of human, animal, and plant pathologies. Here, we present a simple and standardized protocol that allows for the purification and sequencing of RNA viromes from complex biological samples with an important reduction of host DNA and RNA contaminants, while preserving the infectivity of viral particles. Principal Findings We evaluated different viral purification steps, random reverse transcriptions and sequence-independent amplifications of a pool of representative RNA viruses. Viruses remained infectious after the purification process. We then validated the protocol by sequencing the RNA virome of human body lice engorged in vitro with artificially contaminated human blood. The full genomes of the most abundant viruses absorbed by the lice during the blood meal were successfully sequenced. Interestingly, random amplifications differed in the genome coverage of segmented RNA viruses. Moreover, the majority of reads were taxonomically identified, and only 7–15% of all reads were classified as “unknown”, depending on the random amplification method. Conclusion The protocol reported here could easily be applied to generate RNA viral metagenomes from complex biological samples of different origins. Our protocol allows further virological characterizations of the described viral communities because it preserves the infectivity of viral particles and allows for the isolation of viruses. PMID:26431175
NASA Astrophysics Data System (ADS)
Ammendola, R.; Biagioni, A.; Frezza, O.; Lo Cicero, F.; Lonardo, A.; Martinelli, M.; Paolucci, P. S.; Pastorelli, E.; Rossetti, D.; Simula, F.; Tosoratto, L.; Vicini, P.
2015-12-01
In the attempt to develop an interconnection architecture optimized for hybrid HPC systems dedicated to scientific computing, we designed APEnet+, a point-to-point, low-latency and high-performance network controller supporting 6 fully bidirectional off-board links over a 3D torus topology. The first release of APEnet+ (named V4) was a board based on a 40 nm Altera FPGA, integrating 6 channels at 34 Gbps of raw bandwidth per direction and a PCIe Gen2 x8 host interface. It has been the first-of-its-kind device to implement an RDMA protocol to directly read/write data from/to Fermi and Kepler NVIDIA GPUs using NVIDIA peer-to-peer and GPUDirect RDMA protocols, obtaining real zero-copy GPU-to-GPU transfers over the network. The latest generation of APEnet+ systems (now named V5) implements a PCIe Gen3 x8 host interface on a 28 nm Altera Stratix V FPGA, with multi-standard fast transceivers (up to 14.4 Gbps) and an increased amount of configurable internal resources and hardware IP cores to support main interconnection standard protocols. Herein we present the APEnet+ V5 architecture, the status of its hardware and its system software design. Both its Linux Device Driver and the low-level libraries have been redeveloped to support the PCIe Gen3 protocol, introducing optimizations and solutions based on hardware/software co-design.
De Mársico, María C; Gantchoff, Mariela G; Reboreda, Juan C
2012-09-07
Egg mimicry by obligate avian brood parasites and host rejection of non-mimetic eggs are well-known textbook examples of host-parasite coevolution. By contrast, reciprocal adaptations and counteradaptations beyond the egg stage in brood parasites and their hosts have received less attention. The screaming cowbird (Molothrus rufoaxillaris) is a specialist obligate brood parasite whose fledglings look identical to those of its primary host, the baywing (Agelaioides badius). Such a resemblance has been proposed as an adaptation in response to host discrimination against odd-looking young, but evidence supporting this idea is scarce. Here, we examined this hypothesis by comparing the survival rates of young screaming cowbirds and non-mimetic shiny cowbirds (Molothrus bonariensis) cross-fostered to baywing nests and quantifying the similarity in plumage colour and begging calls between host and cowbird fledglings. Shiny cowbirds suffered higher post-fledging mortality rates (83%) than screaming cowbirds (0%) owing to host rejection. Visual modelling revealed that screaming cowbirds, but not shiny cowbirds, were indistinguishable from host young in plumage colour. Similarly, screaming cowbirds matched baywings' begging calls more closely than shiny cowbirds. Our results strongly support the occurrence of host fledgling mimicry in screaming cowbirds and suggest a role of visual and vocal cues in fledgling discrimination by baywings.
Kawaguchi, Naoto; Kurata, Akira; Kido, Teruhito; Nishiyama, Yoshiko; Kido, Tomoyuki; Miyagawa, Masao; Ogimoto, Akiyoshi; Mochizuki, Teruhito
2014-01-01
The purpose of this study was to evaluate a personalized protocol with diluted contrast material (CM) for coronary computed tomography angiography (CTA). One hundred patients with suspected coronary artery disease underwent retrospective electrocardiogram-gated coronary CTA on a 256-slice multidetector-row CT scanner. In the diluted CM protocol (n=50), the optimal scan timing and CM dilution rate were determined by the timing bolus scan, with 20% CM dilution (5ml/s during 10s) being considered suitable to achieve the target arterial attenuation of 350 Hounsfield units (HU). In the body weight (BW)-adjusted protocol (n=50, 222mg iodine/kg), only the optimal scan timing was determined by the timing bolus scan. The injection rate and volume in the timing bolus scan and real scan were identical between the 2 protocols. We compared the means and variations in coronary attenuation between the 2 protocols. Coronary attenuation (mean±SD) in the diluted CM and BW-adjusted protocols was 346.1±23.9 HU and 298.8±45.2 HU, respectively. The diluted CM protocol provided significantly higher coronary attenuation and lower variance than did the BW-adjusted protocol (P<0.05, in each). The diluted CM protocol facilitates more uniform attenuation on coronary CTA in comparison with the BW-adjusted protocol.
Multiple Path Static Routing Protocols for Packet Switched Networks.
1983-09-01
model are: (1) Physical Layer (2) Data Link Layer (3) Network Layer (4) Transport Layer (5) Session Layer (6) Presentation Layer (7) pplication Layer The...The transport layer, also known as the host-host layer, accepts data from the session layer, splits it into smaller units if needed, passes these to...the network layer, and ensures that all the pieces arrive correctly at the other end. It creates a distinct network connection for each transport
Constructing Cost-Effective and Targetable ICS Honeypots Suited for Production Networks
2015-03-26
introducing Honeyd+ has a marginal impact on performance. Notable findings are that the Raspberry Pi is the preferred hosting platform for the EtherNet/IP... Raspberry Pi or Gumstix, which is a low-cost approach to replicating multiple decoys. One hidden drawback to low- interaction honeypots is the extensive time...EtherNet/IP industrial protocol. Honeyd+ is hosted on a low-cost computing platform ( Raspberry Pi running Raspbian, approximately $50) and a high-cost
NASA Astrophysics Data System (ADS)
Gilman, Alison
The tumultuous experience of the Shell Petroleum Development Company of Nigeria Ltd (SPDC) in the Niger Delta region of Nigeria has contributed to the debates surrounding the role of transnational companies in their host communities and the impact that resource extraction has on the economic development of emerging countries. The case study demonstrates that methods used by extraction companies for interacting with their host communities are ineffective and superficial. Using the lessons learned from the Niger Delta conflict, this thesis proposes a new strategy, entitled community- corporate diplomacy, and a protocol for companies to implement before opening production sites in Africa. The proposed strategy and an accompanying protocol offer a break from the status quo in that they are built upon an understanding of the specificities of the African continent, that host communities need to be respected as key stakeholders, and that extraction activities have a higher risk of negatively impacting neighboring communities. The recommendation could be applied to other countries and industries, but the increasing importance of African natural resources, the particularities of African political and social structures and the effects of extraction activities make this proposal especially important for extractive companies beginning production in Africa. Keywords: Nigeria, Niger Delta, Shell, corporate social responsibility, transnational advocacy networks, multi-stakeholder initiatives, community relations, corporate diplomacy, Africa, extractive industries.
Cell engineering: spearheading the next generation in healthcare.
Jayasinghe, Suwan N
2008-09-01
Manipulating living mammalian cells present fascinating possibilities for a plethora of applications within our healthcare. These imply several possibilities in tissue engineering and regenerative medicine, to those of a therapeutic nature. The physical sciences are increasingly playing a pivotal role in this endeavour by both advancing existing cell engineering technology and pioneering new protocols for the creation of biologically viable structures. In this paper, the author introduces several direct needle/channel/orifice-based cell engineering protocols, currently undergoing intense investigation for a whole host of bio-applications. Hence, each protocol's advantages and disadvantages are clearly identified, whilst recognizing their future biological and engineering challenges. In conclusion, a few selected biotechnological applications present possibilities where these protocols could undergo focused exploration. Successful development of these bio-protocols sees the emergence of unique future strategies within a clinical environment having far-reaching consequences for our healthcare.
Christensen, Niels J; Kepp, Kasper P
2013-07-09
A recent computational protocol that accurately predicts and rationalizes protein multisite mutant stabilities has been extended to handle widely different isoforms of laccases. We apply the protocol to four isoenzymes of Trametes versicolor laccase (TvL) with variable lengths (498-503 residues) and thermostability (Topt ∼ 45-80 °C) and with 67-77% sequence identity. The extended protocol uses (i) statistical averaging, (ii) a molecular-dynamics-validated "compromise" homology model to minimize bias that causes proteins close in sequence to a structural template to be too stable due to having the benefits of the better sampled template (typically from a crystal structure), (iii) correction for hysteresis that favors the input template to overdestabilize, and (iv) a preparative protocol to provide robust input sequences of equal length. The computed ΔΔG values are in good agreement with the major trends in experimental stabilities; that is, the approach may be applicable for fast estimates of the relative stabilities of proteins with as little as 70% identity, something that is currently extremely challenging. The computed stability changes associated with variations are Gaussian-distributed, in good agreement with experimental distributions of stability effects from mutation. The residues causing the differential stability of the four isoforms are consistent with a range of compiled laccase wild type data, suggesting that we may have identified general drivers of laccase stability. Several sites near Cu, notably 79, 241, and 245, or near substrate, mainly 265, are identified that contribute to stability-function trade-offs, of relevance to the search for new proficient and stable variants of these important industrial enzymes.
ZeroCal: Automatic MAC Protocol Calibration
NASA Astrophysics Data System (ADS)
Meier, Andreas; Woehrle, Matthias; Zimmerling, Marco; Thiele, Lothar
Sensor network MAC protocols are typically configured for an intended deployment scenario once and for all at compile time. This approach, however, leads to suboptimal performance if the network conditions deviate from the expectations. We present ZeroCal, a distributed algorithm that allows nodes to dynamically adapt to variations in traffic volume. Using ZeroCal, each node autonomously configures its MAC protocol at runtime, thereby trying to reduce the maximum energy consumption among all nodes. While the algorithm is readily usable for any asynchronous low-power listening or low-power probing protocol, we validate and demonstrate the effectiveness of ZeroCal on X-MAC. Extensive testbed experiments and simulations indicate that ZeroCal quickly adapts to traffic variations. We further show that ZeroCal extends network lifetime by 50% compared to an optimal configuration with identical and static MAC parameters at all nodes.
Horta, Mauricio C; Pinter, Adriano; Schumaker, Teresinha T S; Labruna, Marcelo B
2006-10-01
An Ixodes loricatus engorged female, infected with Rickettsia bellii, was collected from an opossum (Didelphis aurita) in Mogi das Cruzes, São Paulo State, Brazil. Two consecutive laboratory tick generations (F(1) and F(2)) reared from this single engorged female were evaluated for Rickettsia infection by polymerase chain reaction (PCR) targeting specific Rickettsia genes. Immature ticks fed on naïve Wistar rats (Rattus norvegicus) and adult ticks fed on opossum (D. aurita), both free of ticks and rickettsial infection. PCR performed on individual ticks from the F(1) (20 larvae, 10 nymphs, and 10 adults) and the F(2) (30 larvae, 30 nymphs, and 15 adults) yielded expected bands compatible with Rickettsia. All the PCR products that were sequenced, targeting gltA gene, resulted in sequences identical to each other and 99.7% (349/350) similar to the corresponding sequence of R. bellii in GenBank. The R. bellii infection on ticks from the second laboratory generation (F(2)) was confirmed by other PCR protocols and successful isolation of R. bellii in cell culture. We report for the first time a Rickettsia species infecting I. loricatus, and the first report of R. bellii in the tick genus Ixodes. We conclude that there was an efficient transovarial transmission and transstadial survival of this Rickettsia species in the tick I. loricatus. Our results suggest that R. bellii might be maintained in nature solely by transovarial transmission and transstadial survival in ticks (no amplifier vertebrate host is needed), since there has been no direct or indirect evidence of infection of vertebrate hosts by R. bellii.
Griffiths, Samantha J.; Haas, Jürgen
2017-01-01
Varicella zoster virus (VZV) is a human herpesvirus which causes Varicella (chickenpox) upon primary infection and Zoster (shingles) following reactivation from latency (von Bokay, 1909). Whilst VZV is extensively studied, inherent features of VZV replication, such as cell-association of virus particles during in vitro culture and a restricted host range (limited to humans and some other primates) mean the cellular and viral mechanisms underlying VZV reactivation and pathogenesis remain largely uncharacterised. Much remains to be learnt about VZV, interactions with its host, and the development of disease. This protocol describes a basic VZV replication assay using a recombinant VZV-GFP reporter virus. As VZV is highly cell-associated in tissue culture, the reporter virus inoculum described here is a preparation of infected cells. This reporter virus-infected cell line can be used in combination with siRNA gene depletion or cDNA overexpression transfection protocols to determine the effect of individual cellular genes on virus replication. PMID:29085851
Molecular Typing of Borrelia burgdorferi
Wang, Guiqing; Liveris, Dionysios; Mukherjee, Priyanka; Jungnick, Sabrina; Margos, Gabriele; Schwartz, Ira
2015-01-01
Borrelia burgdorferi sensu lato is a group of spirochetes belonging to the genus Borrelia in the family of Spirochaetaceae. The spirochete is transmitted between reservoirs and hosts by ticks of the family Ixodidae. Infection with B. burgdorferi in humans causes Lyme disease or Lyme borreliosis. Currently, 20 Lyme disease-associated Borrelia species and more than 20 relapsing fever-associated Borrelia species have been described. Identification and differentiation of different Borrelia species and strains is largely dependent on analyses of their genetic characteristics. A variety of molecular techniques have been described for Borrelia isolate speciation, molecular epidemiology, and pathogenicity studies. In this unit, we focus on three basic protocols, PCR-RFLP-based typing of the rrs-rrlA and rrfA-rrlB ribosomal spacer, ospC typing, and MLST. These protocols can be employed alone or in combination for characterization of B. burgdorferi isolates or directly on uncultivated organisms in ticks, mammalian host reservoirs, and human clinical specimens. PMID:25082003
Transformation of the rodent malaria parasite Plasmodium chabaudi.
Spence, Philip J; Cunningham, Deirdre; Jarra, William; Lawton, Jennifer; Langhorne, Jean; Thompson, Joanne
2011-04-01
The rodent malaria parasite Plasmodium chabaudi chabaudi shares many features with human malaria species, including P. falciparum, and is the in vivo model of choice for many aspects of malaria research in the mammalian host, from sequestration of parasitized erythrocytes, to antigenic variation and host immunity and immunopathology. This protocol describes an optimized method for the transformation of mature blood-stage P.c. chabaudi and a description of a vector that targets efficient, single crossover integration into the P.c. chabaudi genome. Transformed lines are reproducibly generated and selected within 14-20 d, and show stable long-term protein expression even in the absence of drug selection. This protocol, therefore, provides the scientific community with a robust and reproducible method to generate transformed P.c. chabaudi parasites expressing fluorescent, bioluminescent and model antigens that can be used in vivo to dissect many of the fundamental principles of malaria infection.
Transformation of the rodent malaria parasite Plasmodium chabaudi
Spence, Philip J; Cunningham, Deirdre; Jarra, William; Lawton, Jennifer
2014-01-01
The rodent malaria parasite Plasmodium chabaudi chabaudi shares many features with human malaria species, including P. falciparum, and is the in vivo model of choice for many aspects of malaria research in the mammalian host, from sequestration of parasitized erythrocytes, to antigenic variation and host immunity and immunopathology. this protocol describes an optimized method for the transformation of mature blood-stage P.c. chabaudi and a description of a vector that targets efficient, single crossover integration into the P.c. chabaudi genome. Transformed lines are reproducibly generated and selected within 4–20 d, and show stable long-term protein expression even in the absence of drug selection. this protocol, therefore, provides the scientific community with a robust and reproducible method to generate transformed P.c. chabaudi parasites expressing fluorescent, bioluminescent and model antigens that can be used in vivo to dissect many of the fundamental principles of malaria infection. PMID:21455190
Junghanss, Christian; Takatu, Alessandra; Little, Marie-Terese; Maciej Zaucha, J; Zellmer, Eustacia; Yunusov, Murad; Sale, George; Georges, George E; Storb, Rainer
2003-02-15
Stable mixed-donor-host-hematopoietic chimerism can serve as a platform for adoptive immunotherapy. Infusions of donor lymphocytes (DLI) sensitized against hematopoietic cells converted mixed hematopoietic into full-donor chimerism in dog-leukocyte antigen (DLA)-identical littermates. Whether sensitization against tissue of solid organs leads to organ-specific immunity that can be transferred by DLI was unknown and was investigated in these experiments using the kidney as target. DLA-identical recipients with established stable mixed-donor-host-hematopoietic chimerism were used. In five pairs, hematopoietic stem-cell transplant (HSCT) donors were sensitized by kidney transplantation from the respective chimeras. In a second group, five HSCT donors received vaccinations that were generated from kidney cells of the respective mixed chimeras. Twenty-eight days after sensitization, DLI were administered to the mixed-hematopoietic chimeras. All HSCT donors rejected their kidney grafts from their mixed-chimeric recipients within 22 to 45 days. DLI caused no sustained graft-versus-kidney effects in the mixed-chimeric recipients. However, DLI donors sensitized by kidney transplantation converted 4 of 5 mixed chimeras into virtually complete (>95%) donor-type chimeras, compared with 1 of 5 mixed chimeras given DLI by vaccination from sensitized donors. Although DLA-identical kidney grafts from mixed-hematopoietic chimeras were readily rejected by their HSCT donors, subsequent transfusions of sensitized-donor lymphocytes into mixed chimeras converted mixed to all-donor chimerism but failed to induce graft-versus-kidney effects. Vaccination strategies in lieu of kidney grafts failed to convert mixed chimerism.
2013-01-01
Background The volume of influenza pandemic modelling studies has increased dramatically in the last decade. Many models incorporate now sophisticated parameterization and validation techniques, economic analyses and the behaviour of individuals. Methods We reviewed trends in these aspects in models for influenza pandemic preparedness that aimed to generate policy insights for epidemic management and were published from 2000 to September 2011, i.e. before and after the 2009 pandemic. Results We find that many influenza pandemics models rely on parameters from previous modelling studies, models are rarely validated using observed data and are seldom applied to low-income countries. Mechanisms for international data sharing would be necessary to facilitate a wider adoption of model validation. The variety of modelling decisions makes it difficult to compare and evaluate models systematically. Conclusions We propose a model Characteristics, Construction, Parameterization and Validation aspects protocol (CCPV protocol) to contribute to the systematisation of the reporting of models with an emphasis on the incorporation of economic aspects and host behaviour. Model reporting, as already exists in many other fields of modelling, would increase confidence in model results, and transparency in their assessment and comparison. PMID:23651557
Johnson, Melissa Anne; Hollingsworth, Robert; Fortna, Samuel; Aristizábal, Luis F.; Manoukis, Nicholas C.
2018-01-01
Coffee berry borer (CBB) is the most devastating insect pest for coffee crops worldwide. We developed a scientific monitoring protocol that is aimed at capturing and quantifying the dynamics and impact of this invasive insect pest as well as the development of its host plant across a heterogeneous landscape. The cornerstone of this comprehensive monitoring system is timely georeferenced data collection on CBB movement, coffee berry infestation, mortality by the fungus Beauveria bassiana, and coffee plant phenology via a mobile electronic data recording application. This electronic data collection system allows field records to be georeferenced through built-in global positioning systems, and is backed by a network of weather stations and records of farm management practices. Comprehensive monitoring of CBB and host plant dynamics is an essential part of an area-wide project in Hawaii to aggregate landscape-level data for research to improve management practices. Coffee agroecosystems in other parts of the world that experience highly variable environmental and socioeconomic factors will also benefit from implementing this protocol, in that it will drive the development of customized integrated pest management (IPM) to manage CBB populations. PMID:29608152
Johnson, Melissa Anne; Hollingsworth, Robert; Fortna, Samuel; Aristizábal, Luis F; Manoukis, Nicholas C
2018-03-19
Coffee berry borer (CBB) is the most devastating insect pest for coffee crops worldwide. We developed a scientific monitoring protocol that is aimed at capturing and quantifying the dynamics and impact of this invasive insect pest as well as the development of its host plant across a heterogeneous landscape. The cornerstone of this comprehensive monitoring system is timely georeferenced data collection on CBB movement, coffee berry infestation, mortality by the fungus Beauveria bassiana, and coffee plant phenology via a mobile electronic data recording application. This electronic data collection system allows field records to be georeferenced through built-in global positioning systems, and is backed by a network of weather stations and records of farm management practices. Comprehensive monitoring of CBB and host plant dynamics is an essential part of an area-wide project in Hawaii to aggregate landscape-level data for research to improve management practices. Coffee agroecosystems in other parts of the world that experience highly variable environmental and socioeconomic factors will also benefit from implementing this protocol, in that it will drive the development of customized integrated pest management (IPM) to manage CBB populations.
Huggins, Lucas G; Michaels, Christopher J; Cruickshank, Sheena M; Preziosi, Richard F; Else, Kathryn J
2017-01-01
Anthropogenic disturbance via resource acquisition, habitat fragmentation and climate change, amongst other factors, has led to catastrophic global biodiversity losses and species extinctions at an accelerating rate. Amphibians are currently one of the worst affected classes with at least a third of species categorised as being threatened with extinction. At the same time, they are also critically important for many habitats and provide man with a powerful proxy for ecosystem health by acting as a bioindicator group. Whilst the causes of synchronised amphibian losses are varied recent research has begun to highlight a growing role that macroparasites are playing in amphibian declines. However, diagnosing parasite infection in the field can be problematic, principally relying on collection and euthanasia of hosts, followed by necropsy and morphological identification of parasites in situ. The current study developed a non-invasive PCR-based methodology for sensitive detection and identification of parasitic nematode DNA released in the faeces of infected amphibians as egg or tissue fragments (environmental DNA). A DNA extraction protocol optimised for liberation of DNA from resilient parasite eggs was developed alongside the design of a novel, nematode universal, degenerate primer pair, thus avoiding the difficulties of using species specific primers in situations where common parasite species are unknown. Used in conjunction this protocol and primer pair was tested on a wide range of faecal samples from captive and wild amphibians. The primers and protocol were validated and detected infections, including a Railletnema nematode infection in poison dart frogs from ZSL London Zoo and Mantella cowani frogs in the wild. Furthermore, we demonstrate the efficacy of our PCR-based protocol for detecting nematode infection in other hosts, such as the presence of pinworm (Aspiculuris) in two tortoise species and whipworm (Trichuris muris) in mice. Our environmental DNA approach mitigates problems associated with microscopic identification and can be applied to detect nematode parasitoses in wild and captive hosts for infection surveillance and maintenance of healthy populations.
Michaels, Christopher J.
2017-01-01
Anthropogenic disturbance via resource acquisition, habitat fragmentation and climate change, amongst other factors, has led to catastrophic global biodiversity losses and species extinctions at an accelerating rate. Amphibians are currently one of the worst affected classes with at least a third of species categorised as being threatened with extinction. At the same time, they are also critically important for many habitats and provide man with a powerful proxy for ecosystem health by acting as a bioindicator group. Whilst the causes of synchronised amphibian losses are varied recent research has begun to highlight a growing role that macroparasites are playing in amphibian declines. However, diagnosing parasite infection in the field can be problematic, principally relying on collection and euthanasia of hosts, followed by necropsy and morphological identification of parasites in situ. The current study developed a non-invasive PCR-based methodology for sensitive detection and identification of parasitic nematode DNA released in the faeces of infected amphibians as egg or tissue fragments (environmental DNA). A DNA extraction protocol optimised for liberation of DNA from resilient parasite eggs was developed alongside the design of a novel, nematode universal, degenerate primer pair, thus avoiding the difficulties of using species specific primers in situations where common parasite species are unknown. Used in conjunction this protocol and primer pair was tested on a wide range of faecal samples from captive and wild amphibians. The primers and protocol were validated and detected infections, including a Railletnema nematode infection in poison dart frogs from ZSL London Zoo and Mantella cowani frogs in the wild. Furthermore, we demonstrate the efficacy of our PCR-based protocol for detecting nematode infection in other hosts, such as the presence of pinworm (Aspiculuris) in two tortoise species and whipworm (Trichuris muris) in mice. Our environmental DNA approach mitigates problems associated with microscopic identification and can be applied to detect nematode parasitoses in wild and captive hosts for infection surveillance and maintenance of healthy populations. PMID:28934299
Koyama, Akihiro; Pietrangelo, Olivia; Sanderson, Laura; Antunes, Pedro M
2017-08-01
Little is known about the adaptive capacity of arbuscular mycorrhizal (AM) fungi to novel hosts. Here we assessed the possibility of two heterospecific AM fungal isolates to adaptively change, in terms of host biomass response, as a function of host plant identity, over the course of a growing season. First, we produced pure inocula of Rhizophagus clarus and Rhizophagus intraradices, each starting from a single spore. Second, we "trained" each isolate individually in a community with two plants, sudangrass (Sorgum bicolour subsp. drummondii) and leek (Aliium ampeloprasum var. porrum), using a dual-compartment system to allow the establishment of a common mycorrhizal network between the two hosts. Third, we conducted a greenhouse experiment to reciprocally test each "trained" clone, obtained from each compartment, either with the same (home), or the other host (away) under two contrasting phosphorus levels. Overall, results did not support adaptive responses of the AM fungi to their hosts (i.e., greater host biomass under "home" relative to "away" conditions), but the opposite (i.e., greater host biomass under "away" relative to "home" conditions) was more frequently observed. These changes in AM fungal symbiotic functioning open the possibility for relatively rapid genetic change of arbuscular mycorrhizal fungi in response to new hosts, which represents one step forward from in vitro experiments.
ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks
NASA Astrophysics Data System (ADS)
Banerjee, Debasmit; Dong, Bo; Biswas, Subir
2013-05-01
Wireless sensor network used in military applications may be deployed in hostile environments, where privacy and security is of primary concern. This can lead to the formation of a trust-based sub-network among mutually-trusting nodes. However, designing a TDMA MAC protocol is very challenging in situations where such multiple sub-networks coexist, since TDMA protocols require node identity information for slot assignments. This paper introduces a novel distributed TDMA MAC protocol, ZEA-TDMA (Zero Exposure Anonymous TDMA), for anonymous wireless networks. ZEA-TDMA achieves slot allocation with strict anonymity constraints, i.e. without nodes having to exchange any identity revealing information. By using just the relative time of arrival of packets and a novel technique of wireless collision-detection and resolution for fixed packetsizes, ZEA-TDMA is able to achieve MAC slot-allocation which is described as follows. Initially, a newly joined node listens to its one-hop neighborhood channel usage and creates a slot allocation table based on its own relative time, and finally, selects a slot that is collision free within its one-hop neighborhood. The selected slot can however cause hidden collisions with a two-hop neighbor of the node. These collisions are resolved by a common neighbor of the colliding nodes, which first detects the collision, and then resolve them using an interrupt packet. ZEA-TDMA provides the following features: a) it is a TDMA protocol ideally suited for highly secure or strictly anonymous environments b) it can be used in heterogeneous environments where devices use different packet structures c) it does not require network time-synchronization, and d) it is insensitive to channel errors. We have implemented ZEA-TDMA on the MICA2 hardware platform running TinyOS and evaluated the protocol functionality and performance on a MICA2 test-bed.
Kannan, Geetha; Prandovszky, Emese; Steinfeldt, Curtis B.; Gressitt, Kristin L.; Yang, ChunXia; Yolken, Robert H.; Severance, Emily G.; Jones-Brando, Lorraine; Pletnikov, Mikhail V.
2015-01-01
We developed a protocol to inactivate Toxoplasma gondii (T. gondii) tachyzoites employing 1 minute of ultraviolet (UV) exposure. We show that this treatment completely inhibited parasite replication and cyst formation in vitro and in vivo but did not affect the induction of a robust IgG response in mice. We propose that our protocol can be used to study the contribution of the humoral immune response to rodent behavioral alterations following T. gondii infection. PMID:25131777
Duan, Dongsheng; Rafael-Fortney, Jill A; Blain, Alison; Kass, David A; McNally, Elizabeth M; Metzger, Joseph M; Spurney, Christopher F; Kinnett, Kathi
2016-02-01
A recent working group meeting focused on contemporary cardiac issues in Duchenne muscular dystrophy (DMD) was hosted by the National Heart, Lung, and Blood Institute in collaboration with the Parent Project Muscular Dystrophy. An outcome of this meeting was to provide freely available detailed protocols for preclinical animal studies. The goal of these protocols is to improve the quality and reproducibility of cardiac preclinical studies aimed at developing new therapeutics for the prevention and treatment of DMD cardiomyopathy.
A Combination of Ontogeny and CNS Environment Establishes Microglial Identity.
Bennett, F Chris; Bennett, Mariko L; Yaqoob, Fazeela; Mulinyawe, Sara B; Grant, Gerald A; Hayden Gephart, Melanie; Plowey, Edward D; Barres, Ben A
2018-05-22
Microglia, the brain's resident macrophages, are dynamic CNS custodians with surprising origins in the extra-embryonic yolk sac. The consequences of their distinct ontogeny are unknown but critical to understanding and treating brain diseases. We created a brain macrophage transplantation system to disentangle how environment and ontogeny specify microglial identity. We find that donor cells extensively engraft in the CNS of microglia-deficient mice, and even after exposure to a cell culture environment, microglia fully regain their identity when returned to the CNS. Though transplanted macrophages from multiple tissues can express microglial genes in the brain, only those of yolk-sac origin fully attain microglial identity. Transplanted macrophages of inappropriate origin, including primary human cells in a humanized host, express disease-associated genes and specific ontogeny markers. Through brain macrophage transplantation, we discover new principles of microglial identity that have broad applications to the study of disease and development of myeloid cell therapies. Copyright © 2018 Elsevier Inc. All rights reserved.
Erlandson, Sonya R; Savage, Jessica A; Cavender-Bares, Jeannine M; Peay, Kabir G
2016-01-01
Influences of soil environment and willow host species on ectomycorrhizal fungi communities was studied across an hydrologic gradient in temperate North America. Soil moisture, organic matter and pH strongly predicted changes in fungal community composition. In contrast, increased fungal richness strongly correlated with higher plant-available phosphorus. The 93 willow trees sampled for ectomycorrhizal fungi included seven willow species. Host identity did not influence fungal richness or community composition, nor was there strong evidence of willow host preference for fungal species. Network analysis suggests that these mutualist interaction networks are not significantly nested or modular. Across a strong environmental gradient, fungal abiotic niche determined the fungal species available to associate with host plants within a habitat. © FEMS 2015. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
A comparison of two methods for quantifying parasitic nematode fecundity
USDA-ARS?s Scientific Manuscript database
Accurate measures of nematode fecundity can provide important information for investigating parasite life history evolution, transmission potential, and effects on host health. Understanding differences among fecundity assessment protocols and standardizing methods, where possible, will enable compa...
Identification of phlebotomine sand fly blood meals by real-time PCR.
Sales, Kamila Gaudêncio da Silva; Costa, Pietra Lemos; de Morais, Rayana Carla Silva; Otranto, Domenico; Brandão-Filho, Sinval Pinto; Cavalcanti, Milena de Paiva; Dantas-Torres, Filipe
2015-04-16
Phlebotomine sand flies are blood-feeding insects of great medical and veterinary significance acting as vectors of Leishmania parasites. Studying the blood-feeding pattern of these insects may help in the understanding of their interactions with potential reservoir hosts of Leishmania parasites. In this study, we developed real time PCR assays for the identification of sand fly blood meal. Six pairs of primers were designed based on cytochrome b gene sequences available in GenBank of the following potential hosts: dog, cat, horse, chicken, black rat, and human. Firstly, SYBR Green-based real time PCR assays were conducted using a standard curve with eight different concentrations (i.e., 10 ng, 1 ng, 100 pg, 10 pg, 1 pg, 100 fg, 10 fg and 1 fg per 2 μl) of DNA samples extracted from EDTA blood samples from each target animal. Then, DNA samples extracted from field-collected engorged female sand flies belonging to three species (i.e., Lutzomyia longipalpis, L. migonei and L. lenti) were tested by the protocols standardized herein. Additionally, female sand flies were experimentally fed on a black rat (Rattus rattus) and used for evaluating the time course of the detection of the protocol targeting this species. The protocols performed well with detection limits of 10 pg to 100 fg. Field-collected female sand flies were fed on blood from humans (73%), chickens (23%), dogs (22%), horses (15%), black rats (11%) and cats (2%). Interestingly, 76.1% of the L. longipalpis females were positive for human blood. In total, 48% of the tested females were fed on single sources, 31% on two and 12% on three. The analysis of the time course showed that the real time PCR protocol targeting the black rat DNA was able to detect small amounts of the host DNA up to 5 days after the blood meal. The real time PCR assays standardized herein successfully detected small amounts of host DNA in female sand flies fed on different vertebrate species and, specifically for the black rats, up to 5 days after the blood meal. These assays represent promising tools for the identification of blood meal in field-collected female sand flies.
How to Fabricate Functional Artificial Luciferases for Bioassays.
Kim, Sung-Bae; Fujii, Rika
2016-01-01
The present protocol introduces fabrication of artificial luciferases (ALuc(®)) by extracting the consensus amino acids from the alignment of copepod luciferase sequences. The made ALucs have unique sequential identities that are phylogenetically distinctive from those of any existing copepod luciferase. Some ALucs exhibited heat stability, and strong and greatly prolonged optical intensities. The made ALucs are applicable to various bioassays as an optical readout, including live cell imaging, single-chain probes, and bioluminescent tags of antibodies. The present protocol guides on how to fabricate a unique artificial luciferase with designed optical properties and functionalities.
Studies on fall armyworm migration and monitoring
USDA-ARS?s Scientific Manuscript database
Spodoptera frugiperda (J.E. Smith; Lepidoptera: Noctuidae) or fall armyworm is an important agricultural pest of a number of crops in thewestern hemisphere. Two morphologically identical host strains of fall armyworm exist, the rice-strain and corn-strain, with the latter inflicting substantial eco...
Tuberculosis immunity: Opportunities from studies with cattle
USDA-ARS?s Scientific Manuscript database
Mycobacterium tuberculosis and M. bovis are closely related (>99% genetic identity), inducing similar host responses and disease expression upon infection. There is a rich history of co-discovery in the development of control measures applicable to both human and bovine tuberculosis (TB) including s...
Asynchronous reference frame agreement in a quantum network
NASA Astrophysics Data System (ADS)
Islam, Tanvirul; Wehner, Stephanie
2016-03-01
An efficient implementation of many multiparty protocols for quantum networks requires that all the nodes in the network share a common reference frame. Establishing such a reference frame from scratch is especially challenging in an asynchronous network where network links might have arbitrary delays and the nodes do not share synchronised clocks. In this work, we study the problem of establishing a common reference frame in an asynchronous network of n nodes of which at most t are affected by arbitrary unknown error, and the identities of the faulty nodes are not known. We present a protocol that allows all the correctly functioning nodes to agree on a common reference frame as long as the network graph is complete and not more than t\\lt n/4 nodes are faulty. As the protocol is asynchronous, it can be used with some assumptions to synchronise clocks over a network. Also, the protocol has the appealing property that it allows any existing two-node asynchronous protocol for reference frame agreement to be lifted to a robust protocol for an asynchronous quantum network.
Security analysis and enhanced user authentication in proxy mobile IPv6 networks
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN’s identity, password and session key. In this paper, we analyze Alizadeh et al.’s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key. PMID:28719621
Lalremruata, Albert; Magris, Magda; Vivas-Martínez, Sarai; Koehler, Maike; Esen, Meral; Kempaiah, Prakasha; Jeyaraj, Sankarganesh; Perkins, Douglas Jay; Mordmüller, Benjamin; Metzger, Wolfram G
2015-09-01
The quartan malaria parasite Plasmodium malariae is the widest spread and best adapted human malaria parasite. The simian Plasmodium brasilianum causes quartan fever in New World monkeys and resembles P. malariae morphologically. Since the genetics of the two parasites are nearly identical, differing only in a range of mutations expected within a species, it has long been speculated that the two are the same. However, no naturally acquired infection with parasites termed as P. brasilianum has been found in humans until now. We investigated malaria cases from remote Yanomami indigenous communities of the Venezuelan Amazon and analyzed the genes coding for the circumsporozoite protein (CSP) and the small subunit of ribosomes (18S) by species-specific PCR and capillary based-DNA sequencing. Based on 18S rRNA gene sequencing, we identified 12 patients harboring malaria parasites which were 100% identical with P. brasilianum isolated from the monkey, Alouatta seniculus. Translated amino acid sequences of the CS protein gene showed identical immunodominant repeat units between quartan malaria parasites isolated from both humans and monkeys. This study reports, for the first time, naturally acquired infections in humans with parasites termed as P. brasilianum. We conclude that quartan malaria parasites are easily exchanged between humans and monkeys in Latin America. We hypothesize a lack of host specificity in mammalian hosts and consider quartan malaria to be a true anthropozoonosis. Since the name P. brasilianum suggests a malaria species distinct from P. malariae, we propose that P. brasilianum should have a nomenclatorial revision in case further research confirms our findings. The expansive reservoir of mammalian hosts discriminates quartan malaria from other Plasmodium spp. and requires particular research efforts.
Lalremruata, Albert; Magris, Magda; Vivas-Martínez, Sarai; Koehler, Maike; Esen, Meral; Kempaiah, Prakasha; Jeyaraj, Sankarganesh; Perkins, Douglas Jay; Mordmüller, Benjamin; Metzger, Wolfram G.
2015-01-01
Background The quartan malaria parasite Plasmodium malariae is the widest spread and best adapted human malaria parasite. The simian Plasmodium brasilianum causes quartan fever in New World monkeys and resembles P. malariae morphologically. Since the genetics of the two parasites are nearly identical, differing only in a range of mutations expected within a species, it has long been speculated that the two are the same. However, no naturally acquired infection with parasites termed as P. brasilianum has been found in humans until now. Methods We investigated malaria cases from remote Yanomami indigenous communities of the Venezuelan Amazon and analyzed the genes coding for the circumsporozoite protein (CSP) and the small subunit of ribosomes (18S) by species-specific PCR and capillary based-DNA sequencing. Findings Based on 18S rRNA gene sequencing, we identified 12 patients harboring malaria parasites which were 100% identical with P. brasilianum isolated from the monkey, Alouatta seniculus. Translated amino acid sequences of the CS protein gene showed identical immunodominant repeat units between quartan malaria parasites isolated from both humans and monkeys. Interpretation This study reports, for the first time, naturally acquired infections in humans with parasites termed as P. brasilianum. We conclude that quartan malaria parasites are easily exchanged between humans and monkeys in Latin America. We hypothesize a lack of host specificity in mammalian hosts and consider quartan malaria to be a true anthropozoonosis. Since the name P. brasilianum suggests a malaria species distinct from P. malariae, we propose that P. brasilianum should have a nomenclatorial revision in case further research confirms our findings. The expansive reservoir of mammalian hosts discriminates quartan malaria from other Plasmodium spp. and requires particular research efforts. PMID:26501116
Huang, Xiaojun; Liu, Daihong
2011-01-01
The Institute of Hematology, Peking University, is the largest hematopoietic stem cell transplantation (HSCT) center in China. A total of 400 HSCTs performed in 2010 accounted for a quarter of all allogeneic HSCTs performed in China. The GIAC protocol, which uses HLA-mismatched/haploidentical blood or bone marrow transplantation without in vitro T-cell depletion, entails administration of granulocyte-colony stimulating factor (G-CSF) to all donors, intensified immunological suppression, and treatment with anti-human thymocyte immunoglobulin. The stem cell grafts are a combination of G-CSF-primed bone marrow cells and G-CSF-mobilized peripheral blood stem cells, which may be critical to the success of this protocol through the immune modulation of G-CSF. Using this protocol, more than 99% engraftment and complete donor chimerism were achieved in pediatric and adult patients with hematological malignancies. The incidence of graft-versus-host disease (GVHD) grades 3 and 4 was 13.4% and that of extensive chronic GVHD 22.6%. Comparable relapse rates were observed between patients who received unmanipulated haploidentical transplantation, and those who received HLA-identical or unrelated HSCT. Patients with confirmed minimal residual disease, (expression levels of Wilms' tumor suppressor gene 1 and flow cytometry) after HSCT received pre-emptive modified donor lymphocyte infusion to prevent relapse. Infection was the main cause of non-relapse death. Prospective studies are ongoing to investigate the mechanisms of immune reconstitution in order to refine the protocol. In 1964, a patient with severe aplastic anemia received a bone marrow infusion from her syngeneic, pregnant sister, and remained disease-free over a 40-year follow-up period. Following this success, there was a 20-year interruption in the transplantation program at our center. The hiatus ended in 1981 with the first allogeneic HSCT, which was used to treat a girl with acute lymphoblastic leukemia (ALL). In the mid-1990s, the facility performed allo-HSCTs from unrelated donors (URD) and umbilical cord blood (UCB). Then, in 2000, a patient with refractory acute leukemia received related haploidentical HSCT and achieved long-term survival without relapse over an 11-year followup period. Coincident with the rapid economic development experienced in China since 2000, the transplantation program at our Institute has been expanded to include broadened indications, multiple sources of stem cells and improved outcomes. The Institute is the largest HSCT center in China, now with 130 beds in four wards, 33 of which are laminar-flow rooms. Between 2007 and 2009, over 350 HSCTs were performed per year, rising to a total of 400 in 2010. Further, in 2010, 94% of these HSCTs were allogeneic transplants, accounting for a quarter of all allo-HSCTs performed in China. Of these, transplants from URD accounted for 6%-7%, those using UCB for less than 5%, those from identical siblings for 25%-30%, and those from the related haploidentical for 55%-65%. The most common indications for treatment with allo-HSCT are intermediate-to-high risk of acute leukemia or myelodysplastic syndrome, advanced chronic myeloid leukemia (CML), refractory lymphoma, or severe aplastic anemia.
Emergence of a Novel Avian Pox Disease in British Tit Species
Lawson, Becki; Lachish, Shelly; Colvile, Katie M.; Durrant, Chris; Peck, Kirsi M.; Toms, Mike P.; Sheldon, Ben C.; Cunningham, Andrew A.
2012-01-01
Avian pox is a viral disease with a wide host range. In Great Britain, avian pox in birds of the Paridae family was first diagnosed in a great tit (Parus major) from south-east England in 2006. An increasing number of avian pox incidents in Paridae have been reported each year since, indicative of an emergent infection. Here, we utilise a database of opportunistic reports of garden bird mortality and morbidity to analyse spatial and temporal patterns of suspected avian pox throughout Great Britain, 2006–2010. Reports of affected Paridae (211 incidents) outnumbered reports in non-Paridae (91 incidents). The majority (90%) of Paridae incidents involved great tits. Paridae pox incidents were more likely to involve multiple individuals (77.3%) than were incidents in non-Paridae hosts (31.9%). Unlike the small wart-like lesions usually seen in non-Paridae with avian pox in Great Britain, lesions in Paridae were frequently large, often with an ulcerated surface and caseous core. Spatial analyses revealed strong clustering of suspected avian pox incidents involving Paridae hosts, but only weak, inconsistent clustering of incidents involving non-Paridae hosts. There was no spatial association between Paridae and non-Paridae incidents. We documented significant spatial spread of Paridae pox from an origin in south-east England; no spatial spread was evident for non-Paridae pox. For both host clades, there was an annual peak of reports in August/September. Sequencing of the avian poxvirus 4b core protein produced an identical viral sequence from each of 20 great tits tested from Great Britain. This sequence was identical to that from great tits from central Europe and Scandinavia. In contrast, sequence variation was evident amongst virus tested from 17 non-Paridae hosts of 5 species. Our findings show Paridae pox to be an emerging infectious disease in wild birds in Great Britain, apparently originating from viral incursion from central Europe or Scandinavia. PMID:23185231
Emergence of a novel avian pox disease in British tit species.
Lawson, Becki; Lachish, Shelly; Colvile, Katie M; Durrant, Chris; Peck, Kirsi M; Toms, Mike P; Sheldon, Ben C; Cunningham, Andrew A
2012-01-01
Avian pox is a viral disease with a wide host range. In Great Britain, avian pox in birds of the Paridae family was first diagnosed in a great tit (Parus major) from south-east England in 2006. An increasing number of avian pox incidents in Paridae have been reported each year since, indicative of an emergent infection. Here, we utilise a database of opportunistic reports of garden bird mortality and morbidity to analyse spatial and temporal patterns of suspected avian pox throughout Great Britain, 2006-2010. Reports of affected Paridae (211 incidents) outnumbered reports in non-Paridae (91 incidents). The majority (90%) of Paridae incidents involved great tits. Paridae pox incidents were more likely to involve multiple individuals (77.3%) than were incidents in non-Paridae hosts (31.9%). Unlike the small wart-like lesions usually seen in non-Paridae with avian pox in Great Britain, lesions in Paridae were frequently large, often with an ulcerated surface and caseous core. Spatial analyses revealed strong clustering of suspected avian pox incidents involving Paridae hosts, but only weak, inconsistent clustering of incidents involving non-Paridae hosts. There was no spatial association between Paridae and non-Paridae incidents. We documented significant spatial spread of Paridae pox from an origin in south-east England; no spatial spread was evident for non-Paridae pox. For both host clades, there was an annual peak of reports in August/September. Sequencing of the avian poxvirus 4b core protein produced an identical viral sequence from each of 20 great tits tested from Great Britain. This sequence was identical to that from great tits from central Europe and Scandinavia. In contrast, sequence variation was evident amongst virus tested from 17 non-Paridae hosts of 5 species. Our findings show Paridae pox to be an emerging infectious disease in wild birds in Great Britain, apparently originating from viral incursion from central Europe or Scandinavia.
Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J
2018-01-01
The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.
Design of MPPT Controller Monitoring Software Based on QT Framework
NASA Astrophysics Data System (ADS)
Meng, X. Z.; Lu, P. G.
2017-10-01
The MPPT controller was a hardware device for tracking the maximum power point of solar photovoltaic array. Multiple controllers could be working as networking mode by specific communicating protocol. In this article, based on C++ GUI programming with Qt frame, we designed one sort of desktop application for monitoring and analyzing operational parameter of MPPT controller. The type of communicating protocol for building network was Modbus protocol which using Remote Terminal Unit mode and The desktop application of host computer was connected with all the controllers in the network through RS485 communication or ZigBee wireless communication. Using this application, user could monitor the parameter of controller wherever they were by internet.
Development of a manualized protocol of massage therapy for clinical trials in osteoarthritis.
Ali, Ather; Kahn, Janet; Rosenberger, Lisa; Perlman, Adam I
2012-10-04
Clinical trial design of manual therapies may be especially challenging as techniques are often individualized and practitioner-dependent. This paper describes our methods in creating a standardized Swedish massage protocol tailored to subjects with osteoarthritis of the knee while respectful of the individualized nature of massage therapy, as well as implementation of this protocol in two randomized clinical trials. The manualization process involved a collaborative process between methodologic and clinical experts, with the explicit goals of creating a reproducible semi-structured protocol for massage therapy, while allowing some latitude for therapists' clinical judgment and maintaining consistency with a prior pilot study. The manualized protocol addressed identical specified body regions with distinct 30- and 60-min protocols, using standard Swedish strokes. Each protocol specifies the time allocated to each body region. The manualized 30- and 60-min protocols were implemented in a dual-site 24-week randomized dose-finding trial in patients with osteoarthritis of the knee, and is currently being implemented in a three-site 52-week efficacy trial of manualized Swedish massage therapy. In the dose-finding study, therapists adhered to the protocols and significant treatment effects were demonstrated. The massage protocol was manualized, using standard techniques, and made flexible for individual practitioner and subject needs. The protocol has been applied in two randomized clinical trials. This manualized Swedish massage protocol has real-world utility and can be readily utilized both in the research and clinical settings. Clinicaltrials.gov NCT00970008 (18 August 2009).
Model Checking a Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2011-01-01
This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period.
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2011-01-01
This report presents a deductive proof of a self-stabilizing distributed clock synchronization protocol. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present a deductive proof of the correctness of the protocol as it applies to the networks with unidirectional and bidirectional links. We also confirm the claims of determinism and linear convergence.
Schäpers, Alexander; Petrén, Hampus; Wheat, Christopher W.; Wiklund, Christer
2017-01-01
Reproducibility is a scientific cornerstone. Many recent studies, however, describe a reproducibility crisis and call for assessments of reproducibility across scientific domains. Here, we explore the reproducibility of a classic ecological experiment—that of assessing female host plant preference and acceptance in phytophagous insects, a group in which host specialization is a key driver of diversification. We exposed multiple cohorts of Pieris napi butterflies from the same population to traditional host acceptance and preference tests on three Brassicaceae host species. Whereas the host plant rank order was highly reproducible, the propensity to oviposit on low-ranked hosts varied significantly even among cohorts exposed to similar conditions. Much variation could be attributed to among-cohort variation in female fecundity, a trait strongly correlated both to female size and to the size of the nuptial gift a female receives during mating. Small males provide small spermatophores, and in our experiment small females that mated with small males had a disproportionally low propensity to oviposit on low-ranked hosts. Hence, our results provide empirical support to the theoretical prediction that female host utilization is strongly affected by non-genetic, environmental variation, and that such variation can affect the reproducibility of ecological experiments even under seemingly identical conditions. PMID:28202813
De Mársico, María C.; Gantchoff, Mariela G.; Reboreda, Juan C.
2012-01-01
Egg mimicry by obligate avian brood parasites and host rejection of non-mimetic eggs are well-known textbook examples of host–parasite coevolution. By contrast, reciprocal adaptations and counteradaptations beyond the egg stage in brood parasites and their hosts have received less attention. The screaming cowbird (Molothrus rufoaxillaris) is a specialist obligate brood parasite whose fledglings look identical to those of its primary host, the baywing (Agelaioides badius). Such a resemblance has been proposed as an adaptation in response to host discrimination against odd-looking young, but evidence supporting this idea is scarce. Here, we examined this hypothesis by comparing the survival rates of young screaming cowbirds and non-mimetic shiny cowbirds (Molothrus bonariensis) cross-fostered to baywing nests and quantifying the similarity in plumage colour and begging calls between host and cowbird fledglings. Shiny cowbirds suffered higher post-fledging mortality rates (83%) than screaming cowbirds (0%) owing to host rejection. Visual modelling revealed that screaming cowbirds, but not shiny cowbirds, were indistinguishable from host young in plumage colour. Similarly, screaming cowbirds matched baywings' begging calls more closely than shiny cowbirds. Our results strongly support the occurrence of host fledgling mimicry in screaming cowbirds and suggest a role of visual and vocal cues in fledgling discrimination by baywings. PMID:22648157
Gilbert, Maarten J; Duim, Birgitta; Timmerman, Arjen J; Zomer, Aldert L; Wagenaar, Jaap A
2017-08-21
Reptiles have been shown to host a significant Helicobacter diversity. In order to survive, reptile-associated Helicobacter lineages need to be adapted to the thermally dynamic environment encountered in a poikilothermic host. The whole genomes of reptile-associated Helicobacter lineages can provide insights in Helicobacter host adaptation and coevolution. These aspects were explored by comparing the genomes of reptile-, bird-, and mammal-associated Helicobacter lineages. Based on average nucleotide identity, all reptile-associated Helicobacter lineages in this study could be considered distinct species. A whole genome-based phylogeny showed two distinct clades, one associated with chelonians and one associated with lizards. The phylogeny indicates initial adaptation to an anatomical niche, which is followed by an ancient host jump and subsequent diversification. Furthermore, the ability to grow at low temperatures, which might reflect thermal adaptation to a reptilian host, originated at least twice in Helicobacter evolution. A putative tricarballylate catabolism locus was specifically present in Campylobacter and Helicobacter isolates from reptiles. The phylogeny of reptile-associated Helicobacter parallels host association, indicating a high level of host specificity. The high diversity and deep branching within these clades supports long-term coevolution with, and extensive radiation within the respective reptilian host type.
Rasmussen, C.; Purcell, M.K.; Gregg, J.L.; LaPatra, S.E.; Winton, J.R.; Hershberger, P.K.
2010-01-01
The mesomycetozoean parasite Ichthyophonus hoferi is most commonly associated with marine fish hosts but also occurs in some components of the freshwater rainbow trout Oncorhynchus mykiss aquaculture industry in Idaho, USA. It is not certain how the parasite was introduced into rainbow trout culture, but it might have been associated with the historical practice of feeding raw, ground common carp Cyprinus carpio that were caught by commercial fisherman. Here, we report a major genetic division between west coast freshwater and marine isolates of Ichthyophonus hoferi. Sequence differences were not detected in 2 regions of the highly conserved small subunit (18S) rDNA gene; however, nucleotide variation was seen in internal transcribed spacer loci (ITS1 and ITS2), both within and among the isolates. Intra-isolate variation ranged from 2.4 to 7.6 nucleotides over a region consisting of ~740 bp. Majority consensus sequences from marine/anadromous hosts differed in only 0 to 3 nucleotides (99.6 to 100% nucleotide identity), while those derived from freshwater rainbow trout had no nucleotide substitutions relative to each other. However, the consensus sequences between isolates from freshwater rainbow trout and those from marine/anadromous hosts differed in 13 to 16 nucleotides (97.8 to 98.2% nucleotide identity).
Distributed Dynamic Host Configuration Protocol (D2HCP)
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856
Distributed Dynamic Host Configuration Protocol (D2HCP).
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment.
Generic Principles for Resolving Intergroup Conflict.
ERIC Educational Resources Information Center
Fisher, Ronald J.
1994-01-01
Provides an initial statement of generic principles deemed effective for addressing protracted social conflicts between identity groups. These principles are compatible with certain values for societal organization and approaches to social change, raising questions of value differences between intervenors and the host culture(s). Three case…
Protocols for the delivery of small molecules to the two-spotted spider mite, Tetranychus urticae
Nunes, Maria Andreia; Zhurov, Vladimir; Dermauw, Wannes; Osakabe, Masahiro; Van Leeuwen, Thomas; Grbic, Miodrag
2017-01-01
The two-spotted spider mite, Tetranychus urticae, is a chelicerate herbivore with an extremely wide host range and an extraordinary ability to develop pesticide resistance. Due to its responsiveness to natural and synthetic xenobiotics, the spider mite is becoming a prime pest herbivore model for studies of the evolution of host range, plant-herbivore interactions and mechanisms of xenobiotic resistance. The spider mite genome has been sequenced and its transcriptional responses to developmental and various biotic and abiotic cues have been documented. However, to identify biological and evolutionary roles of T. urticae genes and proteins, it is necessary to develop methods for the efficient manipulation of mite gene function or protein activity. Here, we describe protocols developed for the delivery of small molecules into spider mites. Starting with mite maintenance and the preparation of the experimental mite populations of developmentally synchronized larvae and adults, we describe 3 methods for delivery of small molecules including artificial diet, leaf coating, and soaking. The presented results define critical steps in these methods and demonstrate that they can successfully deliver tracer dyes into mites. Described protocols provide guidelines for high-throughput setups for delivery of experimental compounds that could be used in reverse genetics platforms to modulate gene expression or protein activity, or for screens focused on discovery of new molecules for mite control. In addition, described protocols could be adapted for other Tetranychidae and related species of economic importance such as Varroa, dust and poultry mites. PMID:28686745
Strydom, Elrea; Pietersen, Gerhard
2018-05-01
Infection of soybean by the plant cytorhabdovirus soybean blotchy mosaic virus (SbBMV) results in significant yield losses in the temperate, lower-lying soybean production regions of South Africa. A 277 bp portion of the RNA-dependent RNA polymerase gene of 66 SbBMV isolates from different: hosts, geographical locations in South Africa, and times of collection (spanning 16 years) were amplified by RT-PCR and sequenced to investigate the genetic diversity of isolates. Phylogenetic reconstruction revealed three main lineages, designated Groups A, B and C, with isolates grouping primarily according to geographic origin. Pairwise nucleotide identities ranged between 85.7% and 100% among all isolates, with isolates in Group A exhibiting the highest degree of sequence identity, and isolates of Groups A and B being more closely related to each other than to those in Group C. This is the first study investigating the genetic diversity of SbBMV.
Li, Tongtong; Long, Meng; Li, Huan; Gatesoupe, François-Joël; Zhang, Xujie; Zhang, Qianqian; Feng, Dongyue; Li, Aihua
2017-01-01
Gut microbiota play key roles in host nutrition and metabolism. However, little is known about the relationship between host genetics, gut microbiota and metabolic profiles. Here, we used high-throughput sequencing and gas chromatography/mass spectrometry approaches to characterize the microbiota composition and the metabolite profiles in the gut of five cyprinid fish species with three different feeding habits raised under identical husbandry conditions. Our results showed that host species and feeding habits significantly affect not only gut microbiota composition but also metabolite profiles (ANOSIM, p ≤ 0.05). Mantel test demonstrated that host phylogeny, gut microbiota, and metabolite profiles were significantly related to each other (p ≤ 0.05). Additionally, the carps with the same feeding habits had more similarity in gut microbiota composition and metabolite profiles. Various metabolites were correlated positively with bacterial taxa involved in food degradation. Our results shed new light on the microbiome and metabolite profiles in the gut content of cyprinid fishes, and highlighted the correlations between host genotype, fish gut microbiome and putative functions, and gut metabolite profiles. PMID:28367147
Bradford, James R.; Farren, Matthew; Powell, Steve J.; Runswick, Sarah; Weston, Susie L.; Brown, Helen; Delpuech, Oona; Wappett, Mark; Smith, Neil R.; Carr, T. Hedley; Dry, Jonathan R.; Gibson, Neil J.; Barry, Simon T.
2013-01-01
Pre-clinical models of tumour biology often rely on propagating human tumour cells in a mouse. In order to gain insight into the alignment of these models to human disease segments or investigate the effects of different therapeutics, approaches such as PCR or array based expression profiling are often employed despite suffering from biased transcript coverage, and a requirement for specialist experimental protocols to separate tumour and host signals. Here, we describe a computational strategy to profile transcript expression in both the tumour and host compartments of pre-clinical xenograft models from the same RNA sample using RNA-Seq. Key to this strategy is a species-specific mapping approach that removes the need for manipulation of the RNA population, customised sequencing protocols, or prior knowledge of the species component ratio. The method demonstrates comparable performance to species-specific RT-qPCR and a standard microarray platform, and allowed us to quantify gene expression changes in both the tumour and host tissue following treatment with cediranib, a potent vascular endothelial growth factor receptor tyrosine kinase inhibitor, including the reduction of multiple murine transcripts associated with endothelium or vessels, and an increase in genes associated with the inflammatory response in response to cediranib. In the human compartment, we observed a robust induction of hypoxia genes and a reduction in cell cycle associated transcripts. In conclusion, the study establishes that RNA-Seq can be applied to pre-clinical models to gain deeper understanding of model characteristics and compound mechanism of action, and to identify both tumour and host biomarkers. PMID:23840389
Performance analysis of routing protocols for IoT
NASA Astrophysics Data System (ADS)
Manda, Sridhar; Nalini, N.
2018-04-01
Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.
Butterfield, Timothy A; Herzog, Walter
2006-02-01
It is generally accepted that eccentric exercise, when performed by a muscle that is unaccustomed to that type of contraction, results in a delayed onset of muscle soreness (DOMS). A prolonged exposure to eccentric exercise leads to the disappearance of the signs and symptoms associated with DOMS, which has been referred to as the repeated bout effect (RBE). Although the mechanisms underlying the RBE remain unclear, several mechanisms have been proposed, including the serial sarcomere number addition following exercise induced muscle damage. In the traditional DOMS and RBE protocols, muscle injury has been treated as a global parameter, with muscle force and strain assumed to be uniform throughout the muscle. To assess the effects of muscle-tendon unit strain, fiber strain, torque and injury on serial sarcomere number adaptations, three groups of New Zealand White (NZW) rabbits were subjected to chronic repetitive eccentric exercise bouts of the ankle dorsiflexors for 6 weeks. These eccentric exercise protocols consisted of identical muscle tendon unit (MTU) strain, but other mechanical factors were systematically altered. Following chronic eccentric exercise, serial sarcomere number adaptations were not identical between the three eccentric exercise protocols, and serial sarcomere number adaptations were not uniform across all regions of the muscle. Peak torque and relaxation fiber strain were the best predictors of serial sarcomere number across all three protocols. Therefore, MTU strain does not appear to be the primary cause for sarcomerogenesis, and differential adaptations within the muscle may be explained by the nonuniform architecture of the muscle, resulting in differential local fiber strains.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Das, Shubhagata, E-mail: sdas@csu.edu.au
Competing roles of coevolution, selective pressure and recombination are an emerging interest in virus evolution. We report a novel aviadenovirus from captive red-bellied parrots (Poicephalus rufiventris) that uncovers evidence of deep recombination among aviadenoviruses. The sequence identity of the virus was most closely related to Turkey adenovirus D (42% similarity) and other adenoviruses in chickens, turkeys and pigeons. Sequencing and comparative analysis showed that the genome comprised 40,930 nucleotides containing 42 predicted open reading frames (ORFs) 19 of which had strong similarity with genes from other adenovirus species. The new genome unveiled a lineage that likely participated in deep recombinationmore » events across the genus Aviadenovirus accounting for an ancient evolutionary relationship. We hypothesize frequent host switch events and recombination among adenovirus progenitors in Galloanserae hosts caused the radiation of extant aviadenoviruses and the newly assembled Poicephalus adenovirus genome points to a potentially broader host range of these viruses among birds. - Highlights: •Shows how a single new genome can change overall phylogeny. •Reveals host switch events among adenovirus progenitors in Galloanserae hosts. •Points to a potentially broader host range of adenoviruses among birds and wildlife .« less
Host specificity in biological control: insights from opportunistic pathogens
Brodeur, Jacques
2012-01-01
Host/prey specificity is a significant concern in biological control. It influences the effectiveness of a natural enemy and the risks it might have on non-target organisms. Furthermore, narrow host specificity can be a limiting factor for the commercialization of natural enemies. Given the great diversity in taxonomy and mode of action of natural enemies, host specificity is a highly variable biological trait. This variability can be illustrated by opportunist fungi from the genus Lecanicillium, which have the capacity to exploit a wide range of hosts – from arthropod pests to fungi causing plant diseases – through different modes of action. Processes determining evolutionary trajectories in host specificity are closely linked to the modes of action of the natural enemy. This hypothesis is supported by advances in fungal genomics concerning the identity of genes and biological traits that are required for the evolution of life history strategies and host range. Despite the significance of specificity, we still need to develop a conceptual framework for better understanding of the relationship between specialization and successful biological control. The emergence of opportunistic pathogens and the development of ‘omic’ technologies offer new opportunities to investigate evolutionary principles and applications of the specificity of biocontrol agents. PMID:22949922
Hawlena, Hadas; Rynkiewicz, Evelyn; Toh, Evelyn; Alfred, Andrew; Durden, Lance A; Hastriter, Michael W; Nelson, David E; Rong, Ruichen; Munro, Daniel; Dong, Qunfeng; Fuqua, Clay; Clay, Keith
2013-01-01
Bacterial community composition in blood-sucking arthropods can shift dramatically across time and space. We used 16S rRNA gene amplification and pyrosequencing to investigate the relative impact of vertebrate host-related, arthropod-related and environmental factors on bacterial community composition in fleas and ticks collected from rodents in southern Indiana (USA). Bacterial community composition was largely affected by arthropod identity, but not by the rodent host or environmental conditions. Specifically, the arthropod group (fleas vs ticks) determined the community composition of bacteria, where bacterial communities of ticks were less diverse and more dependent on arthropod traits—especially tick species and life stage—than bacterial communities of fleas. Our data suggest that both arthropod life histories and the presence of arthropod-specific endosymbionts may mask the effects of the vertebrate host and its environment. PMID:22739493
Multinational Quality Assurance
ERIC Educational Resources Information Center
Kinser, Kevin
2011-01-01
Multinational colleges and universities pose numerous challenges to the traditional models of quality assurance that are designed to validate domestic higher education. When institutions cross international borders, at least two quality assurance protocols are involved. To guard against fraud and abuse, quality assurance in the host country is…
Maia, João P.; Harris, D. James; Carranza, Salvador; Gómez-Díaz, Elena
2014-01-01
Identifying factors influencing infection patterns among hosts is critical for our understanding of the evolution and impact of parasitism in natural populations. However, the correct estimation of infection parameters depends on the performance of detection and quantification methods. In this study, we designed a quantitative PCR (qPCR) assay targeting the 18 S rRNA gene to estimate prevalence and intensity of Hepatozoon infection and compared its performance with microscopy and PCR. Using qPCR, we also compared various protocols that differ in the biological source and the extraction methods. Our results show that the qPCR approach on DNA extracted from blood samples, regardless of the extraction protocol, provided the most sensitive estimates of Hepatozoon infection parameters; while allowed us to differentiate between mixed infections of Adeleorinid (Hepatozoon) and Eimeriorinid (Schellackia and Lankesterella), based on the analysis of melting curves. We also show that tissue and saline methods can be used as low-cost alternatives in parasitological studies. The next step was to test our qPCR assay in a biological context, and for this purpose we investigated infection patterns between two sympatric lacertid species, which are naturally infected with apicomplexan hemoparasites, such as the genera Schellackia (Eimeriorina) and Hepatozoon (Adeleorina). From a biological standpoint, we found a positive correlation between Hepatozoon intensity of infection and host body size within each host species, being significantly higher in males, and higher in the smaller sized host species. These variations can be associated with a number of host intrinsic factors, like hormonal and immunological traits, that require further investigation. Our findings are relevant as they pinpoint the importance of accounting for methodological issues to better estimate infection in parasitological studies, and illustrate how between-host factors can influence parasite distributions in sympatric natural populations. PMID:24743340
Maia, João P; Harris, D James; Carranza, Salvador; Gómez-Díaz, Elena
2014-01-01
Identifying factors influencing infection patterns among hosts is critical for our understanding of the evolution and impact of parasitism in natural populations. However, the correct estimation of infection parameters depends on the performance of detection and quantification methods. In this study, we designed a quantitative PCR (qPCR) assay targeting the 18 S rRNA gene to estimate prevalence and intensity of Hepatozoon infection and compared its performance with microscopy and PCR. Using qPCR, we also compared various protocols that differ in the biological source and the extraction methods. Our results show that the qPCR approach on DNA extracted from blood samples, regardless of the extraction protocol, provided the most sensitive estimates of Hepatozoon infection parameters; while allowed us to differentiate between mixed infections of Adeleorinid (Hepatozoon) and Eimeriorinid (Schellackia and Lankesterella), based on the analysis of melting curves. We also show that tissue and saline methods can be used as low-cost alternatives in parasitological studies. The next step was to test our qPCR assay in a biological context, and for this purpose we investigated infection patterns between two sympatric lacertid species, which are naturally infected with apicomplexan hemoparasites, such as the genera Schellackia (Eimeriorina) and Hepatozoon (Adeleorina). From a biological standpoint, we found a positive correlation between Hepatozoon intensity of infection and host body size within each host species, being significantly higher in males, and higher in the smaller sized host species. These variations can be associated with a number of host intrinsic factors, like hormonal and immunological traits, that require further investigation. Our findings are relevant as they pinpoint the importance of accounting for methodological issues to better estimate infection in parasitological studies, and illustrate how between-host factors can influence parasite distributions in sympatric natural populations.
Active Spread-Spectrum Steganalysis for Hidden Data Extraction
2011-09-01
steganalysis. In particular, we aim to recover blindly se- cret data hidden in image hosts via (multi-signature) direct- sequence SS embedding [18]-[25...access (CDMA) communica- tion systems. Under the assumption that the embedded se- cret messages are independent identically distributed (i.i.d.) random
Diasporic Communication: Cultural Deviance and Accommodation among Tibetan Exiles in India
ERIC Educational Resources Information Center
Dorjee, Tenzin; Giles, Howard; Barker, Valerie
2011-01-01
Diasporic communities around the world regularly encounter challenges of preserving their identities and communication practices while adapting to their host social-cultural environment. Grounded in communication accommodation theory (CAT) and informed by recent research on deviance, this study investigated the relationships between Tibetan…
Fall armyworm (Spodoptera frugiperda) migration pathways in the United States
USDA-ARS?s Scientific Manuscript database
Spodoptera frugiperda (J.E. Smith; Lepidoptera: Noctuidae) or fall armyworm is an important agricultural pest of a number of crops in the western hemisphere. Two morphologically identical host strains of fall armyworm exist, the rice-strain and corn-strain, with the latter inflicting substantial ec...
Moreno-Pérez, Oscar; Esteva De Antonio, Isabel
2012-01-01
Transsexual patients can only be diagnosed and treated at functional gender identity Units with provision of high quality care, development of clinical practice guidelines, and interdisciplinary working groups. The therapeutic process has three mainstays: initial psychological diagnostic evaluation and psychotherapy, endocrinological evaluation and hormone therapy, and sex reassignment surgery. Cross-sex hormone therapy is essential for the anatomical and psychological transition process in duly selected patients. Hormones help optimize real-life sex identity, improve quality of life, and limit psychiatric co-morbidities often associated to lack of treatment. Development of this clinical practice guideline addresses the need for implementing a coordinated action protocol for comprehensive health care for transgender people in the National Health System. Copyright © 2012 SEEN. Published by Elsevier Espana. All rights reserved.
ERIC Educational Resources Information Center
Gervais, Matthew M.
2017-01-01
Experimental economic games reveal significant population variation in human social behavior. However, most protocols involve anonymous recipients, limiting their validity to fleeting interactions. Understanding human relationship dynamics will require methods with the virtues of economic games that also tap recipient identity-conditioned…
Code of Federal Regulations, 2014 CFR
2014-04-01
... in the petition. (ii) A protocol for a test or study, unless it is shown to fall within the exemption..., safety and functionality data include all studies and tests of a food additive on animals and humans and all studies and tests on a food additive for identity, stability, purity, potency, performance, and...
Code of Federal Regulations, 2013 CFR
2013-04-01
... in the petition. (ii) A protocol for a test or study, unless it is shown to fall within the exemption... regulation, safety and functionality data include all studies and tests of a food additive on animals and humans and all studies and tests on a food additive for identity, stability, purity, potency, performance...
Code of Federal Regulations, 2012 CFR
2012-04-01
... in the petition. (ii) A protocol for a test or study, unless it is shown to fall within the exemption... regulation, safety and functionality data include all studies and tests of a food additive on animals and humans and all studies and tests on a food additive for identity, stability, purity, potency, performance...
Code of Federal Regulations, 2010 CFR
2010-04-01
... in the petition. (ii) A protocol for a test or study, unless it is shown to fall within the exemption..., safety and functionality data include all studies and tests of a food additive on animals and humans and all studies and tests on a food additive for identity, stability, purity, potency, performance, and...
Code of Federal Regulations, 2011 CFR
2011-04-01
... in the petition. (ii) A protocol for a test or study, unless it is shown to fall within the exemption..., safety and functionality data include all studies and tests of a food additive on animals and humans and all studies and tests on a food additive for identity, stability, purity, potency, performance, and...
Code of Federal Regulations, 2014 CFR
2014-04-01
... in the petition. (ii) A protocol for a test or study, unless it is shown to fall within the exemption... regulation, safety and functionality data include all studies and tests of a food additive on animals and humans and all studies and tests on a food additive for identity, stability, purity, potency, performance...
Code of Federal Regulations, 2011 CFR
2011-04-01
... in the petition. (ii) A protocol for a test or study, unless it is shown to fall within the exemption... regulation, safety and functionality data include all studies and tests of a food additive on animals and humans and all studies and tests on a food additive for identity, stability, purity, potency, performance...
Code of Federal Regulations, 2012 CFR
2012-04-01
... in the petition. (ii) A protocol for a test or study, unless it is shown to fall within the exemption..., safety and functionality data include all studies and tests of a food additive on animals and humans and all studies and tests on a food additive for identity, stability, purity, potency, performance, and...
Code of Federal Regulations, 2013 CFR
2013-04-01
... in the petition. (ii) A protocol for a test or study, unless it is shown to fall within the exemption..., safety and functionality data include all studies and tests of a food additive on animals and humans and all studies and tests on a food additive for identity, stability, purity, potency, performance, and...
Code of Federal Regulations, 2010 CFR
2010-04-01
... in the petition. (ii) A protocol for a test or study, unless it is shown to fall within the exemption... regulation, safety and functionality data include all studies and tests of a food additive on animals and humans and all studies and tests on a food additive for identity, stability, purity, potency, performance...
Can Massive but Passive Exposure to Faces Contribute to Face Recognition Abilities?
ERIC Educational Resources Information Center
Yovel, Galit; Halsband, Keren; Pelleg, Michel; Farkash, Naomi; Gal, Bracha; Goshen-Gottstein, Yonatan
2012-01-01
Recent studies have suggested that individuation of other-race faces is more crucial for enhancing recognition performance than exposure that involves categorization of these faces to an identity-irrelevant criterion. These findings were primarily based on laboratory training protocols that dissociated exposure and individuation by using…
Delany, Eoghan G; Connon, Stephen J
2018-01-31
The design of a novel N-heterocyclic carbene catalyst incorporating a bulky yet highly electron-deficient N-aryl substituent has allowed the development of an efficient protocol for the first highly chemoselective intermolecular benzoin condensations between two non-identical aromatic aldehydes.
Simultaneous purification of DNA and RNA from microbiota in a single colonic mucosal biopsy.
Moen, Aina E F; Tannæs, Tone M; Vatn, Simen; Ricanek, Petr; Vatn, Morten Harald; Jahnsen, Jørgen
2016-06-28
Nucleic acid purification methods are of importance when performing microbiota studies and especially when analysing the intestinal microbiota as we here find a wide range of different microbes. Various considerations must be taken to lyse the microbial cell wall of each microbe. In the present article, we compare several tissue lysis steps and commercial purification kits, to achieve a joint RNA and DNA purification protocol for the purpose of investigating the microbiota and the microbiota-host interactions in a single colonic mucosal tissue sample. A further optimised tissue homogenisation and lysis protocol comprising mechanical bead beating, lysis buffer replacement and enzymatic treatment, in combination with the AllPrep DNA/RNA Mini Kit (Qiagen, Hilden, Germany) resulted in efficient and simultaneous purification of microbial and human RNA and DNA from a single mucosal colonic tissue sample. The present work provides a unique possibility to study RNA and DNA from the same mucosal biopsy sample, making a direct comparison between metabolically active microbes and total microbial DNA. The protocol also offers an opportunity to investigate other members of a microbiota such as viruses, fungi and micro-eukaryotes, and moreover the possibility to extract data on microbiota and host interactions from one single mucosal biopsy.
Peer effects on risk behaviour: the importance of group identity.
Gioia, Francesca
2017-01-01
This paper investigates whether and to what extent group identity plays a role in peer effects on risk behaviour. We run a laboratory experiment in which different levels of group identity are induced through different matching protocols (random or based on individual painting preferences) and the possibility to interact with group members via an online chat in a group task. Risk behaviour is measured by using the Bomb Risk Elicitation Task and peer influence is introduced by giving subjects feedback regarding group members' previous decisions. We find that subjects are affected by their peers when taking decisions and that group identity influences the magnitude of peer effects: painting preferences matching significantly reduces the heterogeneity in risk behaviour compared with random matching. On the other hand, introducing a group task has no significant effect on behaviour, possibly because interaction does not always contribute to enhancing group identity. Finally, relative riskiness within the group matters and individuals whose peers are riskier than they are take on average riskier decisions, even when controlling for regression to the mean.
Studying tumor growth in Drosophila using the tissue allograft method.
Rossi, Fabrizio; Gonzalez, Cayetano
2015-10-01
This protocol describes a method to allograft Drosophila larval tissue into adult fly hosts that can be used to assay the tumorigenic potential of mutant tissues. The tissue of interest is dissected, loaded into a fine glass needle and implanted into a host. Upon implantation, nontransformed tissues do not overgrow beyond their normal size, but malignant tumors grow without limit, are invasive and kill the host. By using this method, Drosophila malignant tumors can be transplanted repeatedly, for years, and therefore they can be aged beyond the short life span of flies. Because several hosts can be implanted using different pieces from a single tumor, the method also allows the tumor mass to be increased to facilitate further studies that may require large amounts of tissue (i.e., genomics, proteomics and so on). This method also provides an operational definition of hyperplastic, benign and malignant growth. The injection procedure itself requires only ∼1 d. Tumor development can then be monitored until the death of the implanted hosts.
Weinberg, E D
1996-02-01
Numerous laboratory and clinical investigations over the past few decades have observed that one of the dangers of iron is its ability to favour neoplastic cell growth. The metal is carcinogenic due to its catalytic effect on the formation of hydroxyl radicals, suppression of the activity of host defence cells and promotion of cancer cell multiplication. In both animals and humans, primary neoplasms develop at body sites of excessive iron deposits. The invaded host attempts to withhold iron from the cancer cells via sequestration of the metal in newly formed ferritin. The host also endeavours to withdraw the metal from cancer cells via macrophage synthesis of nitric oxide. Quantitative evaluation of body iron and of iron-withholding proteins has prognostic value in cancer patients. Procedures associated with lowering host iron intake and inducing host cell iron efflux can assist in prevention and management of neoplastic diseases. Pharmaceutical methods for depriving neoplastic cells of iron are being developed in experimental and clinical protocols.
Kumar, Revathy; Seay, Nancy; Karabenick, Stuart A
2015-04-01
Ecologically embedded social identity theories were used to examine the risk and protective factors associated with the identity negotiation and adjustment of recent immigrant Arab (IA) adolescents to the United States residing in ethnic enclaves. Yemeni, Lebanese, and Iraqi 8th-graders (n = 45) from 4 ethnic enclave schools participated in focus-group interviews. In-depth analyses of interviews revealed that living in an ethnic enclave enhanced IA adolescents' feelings of belonging to the community. However, the new immigrant status coupled with country of origin determined the permeability of intergroup boundaries with well-established Arab and Arab American peers. Their identity negotiations and social identity salience (national, religious, and pan-Arab) were informed by transitional experiences from home to host country and the prevailing political and cultural tensions between the two, recognition of national hierarchy within the Arab community, perceptions of discrimination by the larger society, changed educational aspirations consequent to immigration, and current physical (school and community) and phenomenological contexts. Findings suggest that current theoretical perspectives should be extended to incorporate phenomenological representations of past spaces and places not currently occupied to understand adolescents' multifaceted identity. (c) 2015 APA, all rights reserved).
Watzlawik, Meike; Brescó de Luna, Ignacio
2017-06-01
How migration influences the processes of identity development has been under longstanding scrutiny in the social sciences. Usually, stage models have been suggested, and different strategies for acculturation (e.g., integration, assimilation, separation, and marginalization) have been considered as ways to make sense of the psychological transformations of migrants as a group. On an individual level, however, identity development is a more complex endeavor: Identity does not just develop by itself, but is constructed as an ongoing process. To capture these processes, we will look at different aspects of migration and asylum seeking; for example, the cultural-specific values and expectations of the hosting (European) countries (e.g., as identifier), but also of the arriving individuals/groups (e.g., identified as refugees). Since the two may contradict each other, negotiations between identities claims and identity assignments become necessary. Ways to solve these contradictions are discussed, with a special focus on the experienced (and often missing) agency in different settings upon arrival in a new country. In addition, it will be shown how sudden events (e.g., 9/11, the Charlie Hebdo attack) may challenge identity processes in different ways.
Protocol for fermionic positive-operator-valued measures
NASA Astrophysics Data System (ADS)
Arvidsson-Shukur, D. R. M.; Lepage, H. V.; Owen, E. T.; Ferrus, T.; Barnes, C. H. W.
2017-11-01
In this paper we present a protocol for the implementation of a positive-operator-valued measure (POVM) on massive fermionic qubits. We present methods for implementing nondispersive qubit transport, spin rotations, and spin polarizing beam-splitter operations. Our scheme attains linear opticslike control of the spatial extent of the qubits by considering ground-state electrons trapped in the minima of surface acoustic waves in semiconductor heterostructures. Furthermore, we numerically simulate a high-fidelity POVM that carries out Procrustean entanglement distillation in the framework of our scheme, using experimentally realistic potentials. Our protocol can be applied not only to pure ensembles with particle pairs of known identical entanglement, but also to realistic ensembles of particle pairs with a distribution of entanglement entropies. This paper provides an experimentally realizable design for future quantum technologies.
Zeolite crystal growth in space - What has been learned
NASA Technical Reports Server (NTRS)
Sacco, A., Jr.; Thompson, R. W.; Dixon, A. G.
1993-01-01
Three zeolite crystal growth experiments developed at WPI have been performed in space in last twelve months. One experiment, GAS-1, illustrated that to grow large, crystallographically uniform crystals in space, the precursor solutions should be mixed in microgravity. Another experiment evaluated the optimum mixing protocol for solutions that chemically interact ('gel') on contact. These results were utilized in setting the protocol for mixing nineteen zeolite solutions that were then processed and yielded zeolites A, X and mordenite. All solutions in which the nucleation event was influenced produced larger, more 'uniform' crystals than did identical solutions processed on earth.
Advanced information processing system: Authentication protocols for network communication
NASA Technical Reports Server (NTRS)
Harper, Richard E.; Adams, Stuart J.; Babikyan, Carol A.; Butler, Bryan P.; Clark, Anne L.; Lala, Jaynarayan H.
1994-01-01
In safety critical I/O and intercomputer communication networks, reliable message transmission is an important concern. Difficulties of communication and fault identification in networks arise primarily because the sender of a transmission cannot be identified with certainty, an intermediate node can corrupt a message without certainty of detection, and a babbling node cannot be identified and silenced without lengthy diagnosis and reconfiguration . Authentication protocols use digital signature techniques to verify the authenticity of messages with high probability. Such protocols appear to provide an efficient solution to many of these problems. The objective of this program is to develop, demonstrate, and evaluate intercomputer communication architectures which employ authentication. As a context for the evaluation, the authentication protocol-based communication concept was demonstrated under this program by hosting a real-time flight critical guidance, navigation and control algorithm on a distributed, heterogeneous, mixed redundancy system of workstations and embedded fault-tolerant computers.
15 CFR 784.3 - Scope and conduct of complementary access.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., safety, and security regulations (e.g., regulations for protection of controlled environments within the... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS... presence of a U.S. Government Host Team. No information of direct national security significance shall be...
Kietz, Christa; Pollari, Vilma; Meinander, Annika
2018-06-22
As several diseases have been linked to dysbiosis of the human intestinal microflora, manipulation of the microbiota has emerged as an exciting new strategy for potentially treating and preventing diseases. However, the human microbiota consists of a plethora of different species, and distinguishing the impact of a specific bacterial species on human health is challenging. In tackling this challenge, the fruit fly Drosophila melanogaster, with its far simpler microbial composition, has emerged as a powerful model for unraveling host-microbe interactions. To study the interplay between the resident commensal microbiome and the host, flies can be made germ-free, or axenic. To elucidate the impact of specific bacteria, axenic flies can then be re-introduced to specific microbial species. In this unit, we provide a step-by-step protocol on how to rear Drosophila melanogaster under axenic conditions and confirm the axenity of flies. © 2018 by John Wiley & Sons, Inc. © 2018 John Wiley & Sons, Inc.
Failure of antiarrhythmic drugs to prevent experimental reperfusion ventricular fibrillation.
Naito, M; Michelson, E L; Kmetzo, J J; Kaplinsky, E; Dreifus, L S
1981-01-01
Ninety-nine adult mongrel dogs underwent acute ligation of the proximal left anterior descending coronary artery. Thirty minutes later, the occlusion was released to evaluate the effectiveness of five antiarrhythmic protocols in eliminating reperfusion ventricular fibrillation. The five protocols included: protocol 1 --i.v. lidocaine, preligation and prerelease (n = 19); protocol 2 -- i.v. lidocaine, prereperfusion only (n = 22); protocol 3 -- chronic, oral, daily amiodarone for 2 weeks preligation (n = 19); protocol 4 -- i.v. procainamide, preligation and prereperfusion (n = 21); and protocol 5 -- i.v. verapamil, prereperfusion (n = 18). Each regimen was evaluated with respect to the incidence of reperfusion ventricular fibrillation in dogs that survived to reperfusion, and the results were compared to 77 control dogs that underwent identical coronary artery occlusion and release procedures without drug therapy. The incidence of reperfusion ventricular fibrillation was as follows: protocol 1 -- seven of 15 dogs (47%); protocol 2 -- six of 18 (33%); protocol 3 -- 11 of 16 dogs (69%); protocol 4 -- eight of 17 dogs (47%); and protocol 5 -- 10 of 17 dogs (59%), compared with 36 of 60 (60%) in control dogs. Using chi-square analysis, protocol 2 was beneficial (p < 0.05). The dogs were then stratified into high- and low-risk subgroups based on the arrhythmic events of the antecedent coronary artery ligation periods, and predictive risk indexes for the occurrence of reperfusion ventricular fibrillation were developed. the Mantel-Haenszel method of statistical analysis revealed that none of these protocols resulted in a statistically significant reduction in the incidence of reperfusion ventricular fibrillation. Thus, use of these predictive indexes plus appropriate statistical methods has revealed, unexpectedly, limitations in the efficacy of a spectrum of antiarrhythmic agents in preventing reperfusion ventricular fibrillation.
"Cheap" "c'est quoi"? Immigrant Teenagers in Quest of Multilingual Competence and Identity
ERIC Educational Resources Information Center
Kasanga, Luanga Adrien
2008-01-01
Second generation immigrants tend to shift their loyalty from their own languages ("immigrant language") to the language of the host country ("societal language"), given the socioeconomically weak vitality position of the immigrant languages. This language shift makes intergenerational communication, especially with folk left…
Student Self-Formation in International Education
ERIC Educational Resources Information Center
Marginson, Simon
2014-01-01
In research in cross-cultural psychology, international education is largely understood as an "adjustment" to host country norms and institutions, a notion that prioritizes social order and stability. The student is seen as in deficit in relation to these norms. The student's home country identity becomes seen as a barrier to be broken…
Analyte sensing mediated by adapter/carrier molecules
Bayley, Hagan; Braha, Orit; Gu, LiQun
2002-07-30
This invention relates to an improved method and system for sensing of one or more analytes. A host molecule, which serves as an adapter/carrier, is used to facilitate interaction between the analyte and the sensor element. A detectable signal is produced reflecting the identity and concentration of analyte present.
First report of wheat blast caused by magnaporthe oryzae pathotype triticum in Bangladesh
USDA-ARS?s Scientific Manuscript database
Wheat blast or ‘brusone’, caused by the ascomycetous fungus Magnaporthe oryzae B.C. Couch (synonym Pyricularia oryzae Cavara), was first identified in 1985 in Brazil. M. oryzae is composed of a range of morphologically identical but genetically different host-specific pathotypes that are specialized...
What Not to Wear: Exposing the G(host) in Art Education
ERIC Educational Resources Information Center
Robinson-Cseke, Maria
2012-01-01
Two films, "Ghost World" and "Art School Confidential," serve as backdrops for an examination of art education, revealing identity conflicts among artist, student, and teacher. This article addresses ideas of uniqueness, uniformity, professionalism, and nakedness through the concept of personal dress. This critical discussion explores the…
Faith Dialogues Foster Identity Development
ERIC Educational Resources Information Center
Small, Jenny L.
2009-01-01
The author shares the results of her research with focus groups of Christian, Jewish, Muslim, and atheist students who discussed their religious and spiritual beliefs with her and with each other. She offers these students' words in order to encourage other educators to consider hosting similarly structured conversations and to think about the…
A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2011-01-01
This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.
Pagel, Kevin; Harvey, David J
2013-05-21
Currently, the vast majority of complex carbohydrates are characterized using mass spectrometry (MS)-based techniques. Measuring the molecular mass of a sugar, however, immediately poses a fundamental problem: entire classes of the constituting monosaccharide building blocks exhibit an identical atomic composition and, consequently, also an identical mass. Therefore, carbohydrate MS data can be highly ambiguous and often it is simply not possible to clearly assign a particular molecular structure. A promising approach to overcome the above-mentioned limitation is to implement an additional gas-phase separation dimension using ion mobility spectrometry (IMS), which is a method in which molecules of identical mass and structure but different structure can be separated according to their shape and collision cross section (CCS). With the emergence of commercially available hybrid ion mobility-mass spectrometry (IM-MS) instruments in 2006, IMS technology became readily available. Because of the nonhomogeneous, traveling wave (TW) field utilized in these instruments, however, CCS values currently cannot be determined directly from the drift times measured. Instead, an external calibration using compounds of known CCS and similar molecular identity is required. Here, we report a calibration protocol for TW IMS instruments using a series of sodiated N-glycans that were released from commercially available glycoproteins using an easy-to-follow protocol. The underlying CCS values were determined using a modified Synapt HDMS instrument with a linear drift tube, which was described in detail previously. Our data indicate that, under in-source fragmentation conditions, only a few glycans are required to obtain a TW IMS calibration of sufficient quality. In this context, however, the type of glycan was shown to be of tremendous importance. Furthermore, our data clearly demonstrate that carbohydrate isomers with identical mass but different conformation can be distinguished based on their CCS when all the associated errors are taken into account.
NASA Astrophysics Data System (ADS)
Mims, C. W.; Celio, Gail J.; Richardson, Elizabeth A.
2003-12-01
This article reports on the use of high pressure freezing followed by freeze substitution (HPF/FS) to study ultrastructural details of host pathogen interactions in fungal diseases of plants. The specific host pathogen systems discussed here include a powdery mildew infection of poinsettia and rust infections of daylily and Indian strawberry. The three pathogens considered here all attack the leaves of their hosts and produce specialized hyphal branches known as haustoria that invade individual host cells without killing them. We found that HPF/FS provided excellent preservation of both haustoria and host cells for all three host pathogen systems. Preservation of fungal and host cell membranes was particularly good and greatly facilitated the detailed study of host pathogen interfaces. In some instances, HPF/FS provided information that was not available in samples prepared for study using conventional chemical fixation. On the other hand, we did encounter various problems associated with the use of HPF/FS. Examples included freeze damage of samples, inconsistency of fixation in different samples, separation of plant cell cytoplasm from cell walls, breakage of cell walls and membranes, and splitting of thin sections. However, we believe that the outstanding preservation of ultrastructural details afforded by HPF/FS significantly outweighs these problems and we highly recommend the use of this fixation protocol for future studies of fungal host-plant interactions.
Xia, Yixun; Zhong, Fang; O'Mahony, Michael
2016-09-01
One form of paired preference test protocol requires consumers to assess 2 pairs of products. One is the target pair under consideration, while the other is a putatively identical pair named the "placebo pair" which is also presented as a control. Counterintuitively, the majority of consumers report preferences when presented with the placebo pair. Their response frequencies are hypothesized to be those of consumers having "no preference" and are compared with the response frequencies elicited by a target pair, to determine whether the target pair elicits significant preferences. The primary goal of this paper was to study the robustness of 2 new so called disruptive protocols that reduced the proportion of consumers, who reported preferences when assessing a putatively identical pair of products. For this task, the tests were performed in a different language, in a different country, using different products from before. The results showed that the proportion of consumers reporting preferences for the placebo pair was reduced, confirming earlier work. Also, comparison of d' values showed a lack of significant overall differences between the placebo and target pairs, while chi-squared analyses indicated significant differences in the response frequencies. This indicated that the sample was segmented into 2 balanced groups with opposing preferences. © 2016 Institute of Food Technologists®
Patient and tissue identification in the assisted reproductive technology laboratory.
Pomeroy, Kimball O; Racowsky, Catherine
2012-06-01
Several high-profile cases involving in vitro fertilization have recently received considerable media attention and highlight the importance of assuring patient and tissue identification. Within the assisted reproductive technology (ART) laboratory, there are many steps where wrong patient or tissue identity could have drastic results. Erroneous identity can result in tragic consequences for the patient, the laboratory, and for those working in the program as a whole. Such errors can result in enormous psychological and financial costs, as well as a loss in confidence. There are several critical steps that should be taken every single time and for each specific procedure performed in the ART laboratory to ensure the correct identification of patients and their tissue. These steps should be detailed in protocols that include the method of identification, the two unique identifiers that will be used, the sources of these identifiers, and often a system in which more than one person is involved in the identification. Each protocol should ideally include a checklist that is actively used for the implementation of each procedure. The protocol should also indicate what to do if the identification does not match up, including rapid handling and notification of the patient involved in the error. All ART laboratories should instill in their employees an atmosphere of full and open disclosure for cases where mistakes are made. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.
Model Checking A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2012-01-01
This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV) for a subset of digraphs. Modeling challenges of the protocol and the system are addressed. The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period.
A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2011-01-01
This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.
Characterization of tobacco geminiviruses in the Old and New World.
Paximadis, M; Idris, A M; Torres-Jerez, I; Villarreal, A; Rey, M E; Brown, J K
1999-01-01
Biological differences and molecular variability between six phenotypically distinct tobacco-infecting geminivirus isolates from southern Africa (Zimbabwe) and Mexico were investigated. Host range studies conducted with tobacco virus isolates ZIM H from Zimbabwe and MEX 15 and MEX 32 from Mexico indicated all had narrow host ranges restricted to the Solanaceae. Alignment of coat protein gene (CP) and common region (CR) sequences obtained by PCR, and phylogenetic analysis of the CP sequences indicated Zimbabwean isolates were distantly related to those from Mexico and that geographically proximal isolates shared their closest affinities with Old and New World geminiviruses, respectively. Zimbabwean isolates formed a distinct cluster of closely related variants (> 98% sequence identity) of the same species, while MEX 15 segregated independently from MEX 32, the former constituting a distinct species among New World geminiviruses, and the latter being a variant, Texas pepper virus-Chiapas isolate (TPV-CPS) with 95% sequence identity to TPV-TAM. Results collectively indicated a geographic basis for phylogenetic relationships rather than a specific affiliation with tobacco as a natural host. MEX 15 is provisionally described as a new begomovirus, tobacco apical stunt virus, TbASV, whose closest CP relative is cabbage leaf curl virus, and ZIM isolates are provisionally designated as tobacco leaf curl virus, TbLCV-ZIM, a new Eastern Hemisphere begomovirus, which has as its closest relative, chayote mosaic virus from Nigeria.
The genetic architecture of susceptibility to parasites.
Wilfert, Lena; Schmid-Hempel, Paul
2008-06-30
The antagonistic co-evolution of hosts and their parasites is considered to be a potential driving force in maintaining host genetic variation including sexual reproduction and recombination. The examination of this hypothesis calls for information about the genetic basis of host-parasite interactions - such as how many genes are involved, how big an effect these genes have and whether there is epistasis between loci. We here examine the genetic architecture of quantitative resistance in animal and plant hosts by concatenating published studies that have identified quantitative trait loci (QTL) for host resistance in animals and plants. Collectively, these studies show that host resistance is affected by few loci. We particularly show that additional epistatic interactions, especially between loci on different chromosomes, explain a majority of the effects. Furthermore, we find that when experiments are repeated using different host or parasite genotypes under otherwise identical conditions, the underlying genetic architecture of host resistance can vary dramatically - that is, involves different QTLs and epistatic interactions. QTLs and epistatic loci vary much less when host and parasite types remain the same but experiments are repeated in different environments. This pattern of variability of the genetic architecture is predicted by strong interactions between genotypes and corroborates the prevalence of varying host-parasite combinations over varying environmental conditions. Moreover, epistasis is a major determinant of phenotypic variance for host resistance. Because epistasis seems to occur predominantly between, rather than within, chromosomes, segregation and chromosome number rather than recombination via cross-over should be the major elements affecting adaptive change in host resistance.
Dudczig, Stefanie; Currie, Peter D; Poggi, Lucia; Jusuf, Patricia R
2017-03-22
The genetic and technical strengths have made the zebrafish vertebrate a key model organism in which the consequences of gene manipulations can be traced in vivo throughout the rapid developmental period. Multiple processes can be studied including cell proliferation, gene expression, cell migration and morphogenesis. Importantly, the generation of chimeras through transplantations can be easily performed, allowing mosaic labeling and tracking of individual cells under the influence of the host environment. For example, by combining functional gene manipulations of the host embryo (e.g., through morpholino microinjection) and live imaging, the effects of extrinsic, cell nonautonomous signals (provided by the genetically modified environment) on individual transplanted donor cells can be assessed. Here we demonstrate how this approach is used to compare the onset of fluorescent transgene expression as a proxy for the timing of cell fate determination in different genetic host environments. In this article, we provide the protocol for microinjecting zebrafish embryos to mark donor cells and to cause gene knockdown in host embryos, a description of the transplantation technique used to generate chimeric embryos, and the protocol for preparing and running in vivo time-lapse confocal imaging of multiple embryos. In particular, performing multiposition imaging is crucial when comparing timing of events such as the onset of gene expression. This requires data collection from multiple control and experimental embryos processed simultaneously. Such an approach can easily be extended for studies of extrinsic influences in any organ or tissue of choice accessible to live imaging, provided that transplantations can be targeted easily according to established embryonic fate maps.
12 CFR 34.103 - Registration of mortgage loan originators.
Code of Federal Regulations, 2011 CFR
2011-01-01
....103 Section 34.103 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY REAL... not act as mortgage loan originators unless the bank has 10 or fewer full time or equivalent employees... paragraphs (e)(1)(i)(E) and (F) of this section must comply with Registry protocols to verify their identity...
12 CFR 34.103 - Registration of mortgage loan originators.
Code of Federal Regulations, 2013 CFR
2013-01-01
....103 Section 34.103 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY REAL... not act as mortgage loan originators unless the bank has 10 or fewer full time or equivalent employees... paragraphs (e)(1)(i)(E) and (F) of this section must comply with Registry protocols to verify their identity...
12 CFR 34.103 - Registration of mortgage loan originators.
Code of Federal Regulations, 2012 CFR
2012-01-01
....103 Section 34.103 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY REAL... not act as mortgage loan originators unless the bank has 10 or fewer full time or equivalent employees... paragraphs (e)(1)(i)(E) and (F) of this section must comply with Registry protocols to verify their identity...
12 CFR 34.103 - Registration of mortgage loan originators.
Code of Federal Regulations, 2014 CFR
2014-01-01
....103 Section 34.103 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY REAL... not act as mortgage loan originators unless the bank has 10 or fewer full time or equivalent employees... paragraphs (e)(1)(i)(E) and (F) of this section must comply with Registry protocols to verify their identity...
Ko Wai Au? Who Am I? Examining the Multiple Identities of Maori Youth
ERIC Educational Resources Information Center
Faircloth, Susan C.; Hynds, Anne; Jacob, Helen; Green, Clint; Thompson, Patrick
2016-01-01
In this paper, we present preliminary findings from a unique collaborative research project involving six Deaf Maori rangatahi (youth) in Tamaki Makaurau (Auckland), Aotearoa New Zealand. This study utilized kaupapa whanau (research family) protocols, established in consultation with two cultural advisory groups within New Zealand and the young…
Avian species diversity and transmission of West Nile virus in Atlanta, Georgia.
Levine, Rebecca S; Hedeen, David L; Hedeen, Meghan W; Hamer, Gabriel L; Mead, Daniel G; Kitron, Uriel D
2017-02-03
The dilution effect is the reduction in vector-borne pathogen transmission associated with the presence of diverse potential host species, some of which are incompetent. It is popularized as the notion that increased biodiversity leads to decreased rates of disease. West Nile virus (WNV) is an endemic mosquito-borne virus in the United States that is maintained in a zoonotic cycle involving various avian host species. In Atlanta, Georgia, substantial WNV presence in the vector and host species has not translated into a high number of human cases. To determine whether a dilution effect was contributing to this reduced transmission, we characterized the host species community composition and performed WNV surveillance of hosts and vectors in urban Atlanta between 2010 and 2011. We tested the relationship between host diversity and both host seroprevalence and vector infection rates using a negative binomial generalized linear mixed model. Regardless of how we measured host diversity or whether we considered host seroprevalence and vector infection rates as predictor variables or outcome variables, we did not detect a dilution effect. Rather, we detected an amplification effect, in which increased host diversity resulted in increased seroprevalence or infection rates; this is the first empirical evidence for this effect in a mosquito-borne system. We suggest that this effect may be driven by an over-abundance of moderately- to poorly-competent host species, such as northern cardinals and members of the Mimid family, which cause optimal hosts to become rarer and present primarily in species-rich areas. Our results support the notion that dilution or amplification effects depend more on the identities of the species comprising the host community than on the absolute diversity of hosts.
Elder, Hinemoa
2008-06-01
This paper aimed to investigate narratives regarding the experience of Maori cultural identity of Maori psychiatrists and registrars who have worked with tamariki (children), taiohi (adolescents) and whanau (families). This was a Kaupapa Maori (Maori-centred) qualitative study where a total of five Maori psychiatrists and registrars were interviewed using a semi-structured questionnaire informed by Tikanga Maori (Maori custom and protocol). This paper presents one significant theme, that of "doing the work differently". Within this theme, the perceived 'mismatch' between psychiatric training, seeming to value opacity in clinical sessions, compared to Tikanga Maori aspects of the doctor's identity which values whakawhanaungatanga (connectivity and relationships) was consistently described. This paper has implications for registrar training needs, workforce development, service development and cultural competency.
Host Model Uncertainty in Aerosol Radiative Effects: the AeroCom Prescribed Experiment and Beyond
NASA Astrophysics Data System (ADS)
Stier, Philip; Schutgens, Nick; Bian, Huisheng; Boucher, Olivier; Chin, Mian; Ghan, Steven; Huneeus, Nicolas; Kinne, Stefan; Lin, Guangxing; Myhre, Gunnar; Penner, Joyce; Randles, Cynthia; Samset, Bjorn; Schulz, Michael; Yu, Hongbin; Zhou, Cheng; Bellouin, Nicolas; Ma, Xiaoyan; Yu, Fangqun; Takemura, Toshihiko
2013-04-01
Anthropogenic and natural aerosol radiative effects are recognized to affect global and regional climate. Multi-model "diversity" in estimates of the aerosol radiative effect is often perceived as a measure of the uncertainty in modelling aerosol itself. However, current aerosol models vary considerably in model components relevant for the calculation of aerosol radiative forcings and feedbacks and the associated "host-model uncertainties" are generally convoluted with the actual uncertainty in aerosol modelling. In the AeroCom Prescribed intercomparison study we systematically isolate and quantify host model uncertainties on aerosol forcing experiments through prescription of identical aerosol radiative properties in eleven participating models. Host model errors in aerosol radiative forcing are largest in regions of uncertain host model components, such as stratocumulus cloud decks or areas with poorly constrained surface albedos, such as sea ice. Our results demonstrate that host model uncertainties are an important component of aerosol forcing uncertainty that require further attention. However, uncertainties in aerosol radiative effects also include short-term and long-term feedback processes that will be systematically explored in future intercomparison studies. Here we will present an overview of the proposals for discussion and results from early scoping studies.
Tao, Leiling; Gowler, Camden D; Ahmad, Aamina; Hunter, Mark D; de Roode, Jacobus C
2015-10-22
Host-parasite interactions are subject to strong trait-mediated indirect effects from other species. However, it remains unexplored whether such indirect effects may occur across soil boundaries and connect spatially isolated organisms. Here, we demonstrate that, by changing plant (milkweed Asclepias sp.) traits, arbuscular mycorrhizal fungi (AMF) significantly affect interactions between a herbivore (the monarch butterfly Danaus plexippus) and its protozoan parasite (Ophryocystis elektroscirrha), which represents an interaction across four biological kingdoms. In our experiment, AMF affected parasite virulence, host resistance and host tolerance to the parasite. These effects were dependent on both the density of AMF and the identity of milkweed species: AMF indirectly increased disease in monarchs reared on some species, while alleviating disease in monarchs reared on other species. The species-specificity was driven largely by the effects of AMF on both plant primary (phosphorus) and secondary (cardenolides; toxins in milkweeds) traits. Our study demonstrates that trait-mediated indirect effects in disease ecology are extensive, such that below-ground interactions between AMF and plant roots can alter host-parasite interactions above ground. In general, soil biota may play an underappreciated role in the ecology of many terrestrial host-parasite systems. © 2015 The Author(s).
NASA Astrophysics Data System (ADS)
Zhao-Xu, Ji; Tian-Yu, Ye
2017-07-01
In this paper, a novel multi-party quantum private comparison protocol with a semi-honest third party (TP) is proposed based on the entanglement swapping of d-level cat states and d-level Bell states. Here, TP is allowed to misbehave on his own, but will not conspire with any party. In our protocol, n parties employ unitary operations to encode their private secrets and can compare the equality of their private secrets within one time execution of the protocol. Our protocol can withstand both the outside attacks and the participant attacks on the condition that none of the QKD methods is adopted to generate keys for security. One party cannot obtain other parties' secrets except for the case that their secrets are identical. The semi-honest TP cannot learn any information about these parties' secrets except the end comparison result on whether all private secrets from n parties are equal.
I-MAC: an incorporation MAC for wireless sensor networks
NASA Astrophysics Data System (ADS)
Zhao, Jumin; Li, Yikun; Li, Dengao; Lin, Xiaojie
2017-11-01
This paper proposes an innovative MAC protocol called I-MAC. Protocol for wireless sensor networks, which combines the advantages of collision tolerance and collision cancellation. The protocol increases the number of antenna in wireless sensor nodes. The purpose is to monitor the occurrence of packet collisions by increasing the number of antenna in real time. The built-in identity structure is used in the frame structure in order to help the sending node to identify the location of the receiving node after a data packet collision is detected. Packets can be recovered from where the conflict occurred. In this way, we can monitor the conflict for a fixed period of time. It can improve the channel utilisation through changing the transmission probability of collision nodes and solve the problem of hidden terminal through collision feedback mechanism. We have evaluated our protocol. Our results show that the throughput of I-MAC is 5 percentage points higher than that of carrier sense multiple access/collision notification. The network utilisation of I-MAC is more than 92%.
Herpesvirus papio 2 encodes a virion host shutoff function.
Bigger, John E; Martin, David W
2002-12-05
Infection of baboons with herpesvirus papio 2 (HVP-2) produces a disease that is similar to human infection with herpes simplex viruses (HSV). Molecular characterization of HVP-2 has demonstrated that the virion contains a factor which rapidly shuts off host cell protein synthesis after infection. Reduction of host cell protein synthesis occurs in parallel with the degradation of mRNA species. A homolog of the HSV virion host shutoff (vhs) gene was identified by Southern and DNA sequence analysis. The sequence of the HVP-2 vhs gene homolog had greater than 70% identity with the vhs genes of HSV 1 and 2. Disruption of the HVP-2 vhs open reading frame diminished the ability of the virus to shut off protein synthesis and degrade cellular mRNA, indicating that this gene was responsible for the vhs activity. The HVP-2 model system provides the opportunity to study the biological role of vhs in the context of a natural primate host. Further development of this system will provide a platform for proof-of-concept studies that will test the efficacy of vaccines that utilize vhs-deficient viruses.
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S
2015-11-01
In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.
Brucker, Robert M; Bordenstein, Seth R
2012-02-01
The comparative structure of bacterial communities among closely related host species remains relatively unexplored. For instance, as speciation events progress from incipient to complete stages, does divergence in the composition of the species' microbial communities parallel the divergence of host nuclear genes? To address this question, we used the recently diverged species of the parasitoid wasp genus Nasonia to test whether the evolutionary relationships of their bacterial microbiotas recapitulate the Nasonia phylogenetic history. We also assessed microbial diversity in Nasonia at different stages of development to determine the role that host age plays in microbiota structure. The results indicate that all three species of Nasonia share simple larval microbiotas dominated by the γ-proteobacteria class; however, bacterial species diversity increases as Nasonia develop into pupae and adults. Finally, under identical environmental conditions, the relationships of the microbial communities reflect the phylogeny of the Nasonia host species at multiple developmental stages, which suggests that the structure of an animal's microbial community is closely allied with divergence of host genes. These findings highlight the importance of host evolutionary relationships on microbiota composition and have broad implications for future studies of microbial symbiosis and animal speciation. © 2011 The Author(s). Evolution© 2011 The Society for the Study of Evolution.
Al-Saadi, Abdulwahid; Reddy, Joseph D; Duan, Yong P; Brunings, Asha M; Yuan, Qiaoping; Gabriel, Dean W
2007-08-01
Citrus canker disease is caused by five groups of Xanthomonas citri strains that are distinguished primarily by host range: three from Asia (A, A*, and A(w)) and two that form a phylogenetically distinct clade and originated in South America (B and C). Every X. citri strain carries multiple DNA fragments that hybridize with pthA, which is essential for the pathogenicity of wide-host-range X. citri group A strain 3213. DNA fragments that hybridized with pthA were cloned from a representative strain from all five groups. Each strain carried one and only one pthA homolog that functionally complemented a knockout mutation of pthA in 3213. Every complementing homolog was of identical size to pthA and carried 17.5 nearly identical, direct tandem repeats, including three new genes from narrow-host-range groups C (pthC), A(w) (pthAW), and A* (pthA*). Every noncomplementing paralog was of a different size; one of these was sequenced from group A* (pthA*-2) and was found to have an intact promoter and full-length reading frame but with 15.5 repeats. None of the complementing homologs nor any of the noncomplementing paralogs conferred avirulence to 3213 on grapefruit or suppressed avirulence of a group A* strain on grapefruit. A knockout mutation of pthC in a group C strain resulted in loss of pathogenicity on lime, but the strain was unaffected in ability to elicit an HR on grapefruit. This pthC- mutant was fully complemented by pthA, pthB, or pthC. Analysis of the predicted amino-acid sequences of all functional pthA homologs and nonfunctional paralogs indicated that the specific sequence of the 17th repeat may be essential for pathogenicity of X. citri on citrus.
Paredes, Adriana; Cangalaya, Carla; Rivera, Andrea; Gonzalez, Armando E.; Mahanty, Siddhartha; Garcia, Hector H.; Nash, Theodore E.
2014-01-01
Cysticidal drug treatment of viable Taenia solium brain parenchymal cysts leads to an acute pericystic host inflammatory response and blood brain barrier breakdown (BBB), commonly resulting in seizures. Naturally infected pigs, untreated or treated one time with praziquantel were sacrificed at 48 hr and 120 hr following the injection of Evans blue (EB) to assess the effect of treatment on larval parasites and surrounding tissue. Examination of harvested non encapsulated muscle cysts unexpectedly revealed one or more small, focal round region(s) of Evans blue dye infiltration (REBI) on the surface of otherwise non dye-stained muscle cysts. Histopathological analysis of REBI revealed focal areas of eosinophil-rich inflammatory infiltrates that migrated from the capsule into the tegument and internal structures of the parasite. In addition some encapsulated brain cysts, in which the presence of REBI could not be directly assessed, showed histopathology identical to that of the REBI. Muscle cysts with REBI were more frequent in pigs that had received praziquantel (6.6% of 3736 cysts; n = 6 pigs) than in those that were untreated (0.2% of 3172 cysts; n = 2 pigs). Similar results were found in the brain, where 20.7% of 29 cysts showed histopathology identical to muscle REBI cysts in praziquantel-treated pigs compared to the 4.3% of 47 cysts in untreated pigs. Closer examination of REBI infiltrates showed that EB was taken up only by eosinophils, a major component of the cellular infiltrates, which likely explains persistence of EB in the REBI. REBI likely represent early damaging host responses to T. solium cysts and highlight the focal nature of this initial host response and the importance of eosinophils at sites of host-parasite interaction. These findings suggest new avenues for immunomodulation to reduce inflammatory side effects of anthelmintic therapy. PMID:24915533
USDA-ARS?s Scientific Manuscript database
The science of Insect Pathology encompasses a diverse assemblage of pathogens from a large and varied group of hosts. Microscopy techniques and protocols for these organisms are complex and varied and often require modifications and adaptations of standard procedures. The objective of this chapter...
The Defense Message System and the U.S. Coast Guard
1992-06-01
these mail services, the Internet also provides a File Transfer Protocol (FTP) and remote login between host computers (TELNET) capabilities. 17 [Ref...the Joint Maritime Intelligence Element (JMIE), Zincdust, and Emerald . [Ref. 27] 4. Secure Data Network The Coast Guard’s Secure Data Network (SDN
Comment on "Analysis of Citric Acid in Beverages: Use of an Indicator Displacement Assay"
ERIC Educational Resources Information Center
Konski, Krzysiek; Saw, Jessica; Torriero, Angel A. J.
2017-01-01
This letter comments on the paper "Analysis of Citric Acid in Beverages: Use of an Indicator Displacement Assay" ["J. Chem. Educ." 2010, 87 (8), 832-835 (EJ918557)]. Discrepancies in figures and host:indicator complex behavior are discussed and an alternative experimental protocol presented.
Production of a maternal-zygotic medaka mutant using hybrid sterility.
Shimada, Atsuko; Takeda, Hiroyuki
2008-08-01
Taking advantage of the characteristics that make hybrids between Japanese and Chinese medaka grow well, albeit sterile, we have developed a method of germ-line replacement in which these hybrids are used as hosts for the production of a maternal-zygotic mutant. The protocol is described herein.
NASA Astrophysics Data System (ADS)
Spengler, Chelsea; Côté, Patrick; Roediger, Joel; Ferrarese, Laura; Sánchez-Janssen, Rubén; Toloba, Elisa; Liu, Yiqing; Guhathakurta, Puragra; Cuillandre, Jean-Charles; Gwyn, Stephen; Zirm, Andrew; Muñoz, Roberto; Puzia, Thomas; Lançon, Ariane; Peng, Eric; Mei, Simona; Powalka, Mathieu
2018-01-01
It is now established that most, if not all, massive galaxies host central supermassive black holes (SMBHs), and that these SMBHs are linked to the growth their host galaxies as shown by several scaling relations. Within the last couple of decades, it has become apparent that most lower-mass galaxies without obvious SMBHs nevertheless contain some sort of central massive object in the form of compact stellar nuclei that also follow identical (or similar) scaling relations. These nuclei are challenging to study given their small sizes and relatively faint magnitudes, but understanding their origins and relationship to their hosts is critical to gaining a more complete picture of galaxy evolution. To that end, we highlight selected results from an analysis of 39 nuclei and their early-type hosts in the Virgo Cluster using ten broadband filters: F300W, F475W, F850LP, F160W, u*griz, and Ks. We estimate masses, metallicities and ages using simple stellar population (SSP) models. For 19 nuclei, we compare to SSP parameters derived from Keck and Gemini spectra and find reasonable agreement between the photometric and spectroscopic metallicity: the RMS scatter is 0.3 dex. We reproduce the nucleus-galaxy mass fraction of 0.33 ± 0.08% for galaxy stellar masses 108.4-1010.3 M⊙ with a typical precision of ~35% for the nuclei masses. Based on available model predictions, there is no single preferred formation scenario for nuclei, suggesting that nuclei are formed stochastically through a mix of processes. Nuclei metallicities are statistically identical to those of their hosts, appearing 0.07 ± 0.3 dex more metal-rich on average — although, omitting galaxies with unusual origins (i.e., compact ellipticals), nuclei are 0.20 ± 0.28 dex more metal-rich. We find no clear age difference between nuclei and their galaxies, with nuclei displaying a broad range of ages. Interestingly, we find that the most massive nuclei may be flatter and more closely aligned with the semi-major axes of their hosts, suggesting that they formed through predominantly dissipative processes.
"Eux Autres versus Nous Autres": Adolescent Students' Views on the Integration of Newcomers
ERIC Educational Resources Information Center
Steinbach, Marilyn
2010-01-01
Focus group interviews with secondary school students in Quebec reveal assimilationist discourses concerning the integration of newcomers. The first part of the study involved interviews with immigrant students. In the second part of the study, reported here, host society youth describe fears of losing their cultural identity. Interview data…
Sarcocystis canis associated hepatitis in a Steller sea lion (Eumetopias jubatus) from Alaska.
Welsh, Trista; Burek-Huntington, Kathy; Savage, Kate; Rosenthal, Benjamin; Dubey, J P
2014-04-01
Sarcocystis canis infection was associated with hepatitis in a Steller sea lion (Eumetopias jubatus). Intrahepatocellular protozoal schizonts were among areas of necrosis and inflammation. The parasite was genetically identical to S. canis and is the first report in a Steller sea lion, indicating another intermediate host species for S. canis.
Complete Genome Sequences of Bacillus Phages Janet and OTooleKemple52
2018-01-01
ABSTRACT We report here the genome sequences of two novel Bacillus cereus group-infecting bacteriophages, Janet and OTooleKemple52. These bacteriophages are double-stranded DNA-containing Myoviridae isolated from soil samples. While their genomes share a high degree of sequence identity with one another, their host preferences are unique. PMID:29748396
USDA-ARS?s Scientific Manuscript database
The purpose of this study was to determine the underlying cause of differences in pathogenicity of two Eimeria maxima strains (APU1 and APU2) observed during coccidiosis infection. At identical challenge doses, E. maxima APU1 always produces greater intestinal lesions and lower weight gain compared...
de Oliveira Freitas, Rejane; Buscardo, Erika; Nagy, Laszlo; dos Santos Maciel, Alex Bruno; Carrenho, Rosilaine; Luizão, Regina C C
2014-01-01
Little attention has been paid to plant mutualistic interactions in the Amazon rainforest, and the general pattern of occurrence and diversity of arbuscular mycorrhizal fungi (AMF) in these ecosystems is largely unknown. This study investigated AMF communities through their spores in soil in a 'terra firme forest' in Central Amazonia. The contribution played by abiotic factors and plant host species identity in regulating the composition, abundance and diversity of such communities along a topographic gradient with different soils and hydrology was also evaluated. Forty-one spore morphotypes were observed with species belonging to the genera Glomus and Acaulospora, representing 44 % of the total taxa. Soil texture and moisture, together with host identity, were predominant factors responsible for shaping AMF communities along the pedo-hydrological gradient. However, the variability within AMF communities was largely associated with shifts in the relative abundance of spores rather than changes in species composition, confirming that common AMF species are widely distributed in plant communities and all plants recruited into the forest are likely to be exposed to the dominant sporulating AMF species.
Short-Term Experiments on Ion Transport by Seedlings and Excised Roots 1
Huang, Zhang-Zhi; Yan, Xiaolong; Jalil, Abdul; Norlyn, Jack D.; Epstein, Emanuel
1992-01-01
The absorption of K+ by excised roots of barley (Hordeum vulgare L. cv California Mariout) has been systematically compared with that of entire, undisturbed seedlings. Some experiments have also been done with wheat (Triticum aestivum L.) and an amphiploid obtained from a cross between it and salt-tolerant tall wheatgrass (Lophopyrum elongatum Host Löve [syn. Agropyron elongatum Host]). For all three genotypes, the rate of K+ absorption measured in a 20-min period was identical for entire 8-d-old seedlings and their excised roots within the experimental error. Manipulation gentler than root excision, viz. careful transfer of seedlings from one experimental solution to another, was also without effect on the rate of K+ absorption. Absorption of K+ measured by assay of its 86Rb label in the tissue was identical with that measured by K+ depletion of the experimental solutions assayed chemically. For the plant materials and conditions of these experiments, the excised root technique for studying ion transport into roots is validated. The advantages of the technique, and findings differing from the present ones, are discussed. Images Figure 2 PMID:16653217
Performances and robustness of quantum teleportation with identical particles
Marzolino, Ugo; Buchleitner, Andreas
2016-01-01
When quantum teleportation is performed with truly identical massive particles, indistinguishability allows us to teleport addressable degrees of freedom which do not identify particles, but, for example, orthogonal modes. The key resource of the protocol is a state of entangled modes, but the conservation of the total number of particles does not allow for perfect deterministic teleportation unless the number of particles in the resource state goes to infinity. Here, we study the convergence of teleportation performances in the above limit and provide sufficient conditions for asymptotic perfect teleportation. We also apply these conditions to the case of resource states affected by noise. PMID:26997896
Performances and robustness of quantum teleportation with identical particles.
Marzolino, Ugo; Buchleitner, Andreas
2016-01-01
When quantum teleportation is performed with truly identical massive particles, indistinguishability allows us to teleport addressable degrees of freedom which do not identify particles, but, for example, orthogonal modes. The key resource of the protocol is a state of entangled modes, but the conservation of the total number of particles does not allow for perfect deterministic teleportation unless the number of particles in the resource state goes to infinity. Here, we study the convergence of teleportation performances in the above limit and provide sufficient conditions for asymptotic perfect teleportation. We also apply these conditions to the case of resource states affected by noise.
Maia, João P; Crottini, Angelica; Harris, David James
2014-01-01
Madagascar is one of the world's top twelve "megadiversity" hot spots hosting unique and threatened flora and fauna. Parasites are a major component of biodiversity but remain largely uncharacterized in wildlife. In this study we combine microscopic and molecular assessment of hemoparasites in endemic reptile species from Madagascar. We detected three distinct parasites: the apicomplexans Hepatozoon and Sarcocystis, and filarial nematodes. The prevalence and intensity of these apicomplexans were low overall, while microfilarial infections in chameleons were relatively high. We detected mixed infections of two Hepatozoon haplotypes in Madagascarophis colubrinus, and of Hepatozoon and microfilariae in a Furcifer sp. Phylogenetic analyses of Hepatozoon showed evidence of prey-predator transmission, with identical sequences found in the snakes M. colubrinus and Ithycyphus oursi, and their prey Furcifer sp. Based on previous studies regarding the life cycle of Hepatozoon domerguei Landau, Chabaud, Michel, and Brygoo, 1970 in these hosts and due to their morphological similarity, we propose that this Hepatozoon haplotype is Hepatozoon domerguei. Future studies, including the examination of invertebrate hosts, are needed to verify this preliminary taxonomic identification. A distinct hemogregarine haplotype was found in Oplurus sp., which displayed morphologically different gametocytes, some of which were apparently inside leukocytes. The Sarcocystis identified from Tracheloptychus petersi was identical to that reported in a North African snake, indicating that the same lineage is found in geographically distinct regions. By combining morphological and genetic information, Foleyella furcata (Linstow, 1899) filarial nematodes were identified in several Furcifer chameleons. This study provides insights into the distribution, diversity and host-parasite interactions of hemoparasites in wild reptile populations from Madagascar. © J.P. Maia et al., published by EDP Sciences, 2014.
Maia, João P.; Crottini, Angelica; Harris, David James
2014-01-01
Madagascar is one of the world’s top twelve “megadiversity” hot spots hosting unique and threatened flora and fauna. Parasites are a major component of biodiversity but remain largely uncharacterized in wildlife. In this study we combine microscopic and molecular assessment of hemoparasites in endemic reptile species from Madagascar. We detected three distinct parasites: the apicomplexans Hepatozoon and Sarcocystis, and filarial nematodes. The prevalence and intensity of these apicomplexans were low overall, while microfilarial infections in chameleons were relatively high. We detected mixed infections of two Hepatozoon haplotypes in Madagascarophis colubrinus, and of Hepatozoon and microfilariae in a Furcifer sp. Phylogenetic analyses of Hepatozoon showed evidence of prey-predator transmission, with identical sequences found in the snakes M. colubrinus and Ithycyphus oursi, and their prey Furcifer sp. Based on previous studies regarding the life cycle of Hepatozoon domerguei Landau, Chabaud, Michel, and Brygoo, 1970 in these hosts and due to their morphological similarity, we propose that this Hepatozoon haplotype is Hepatozoon domerguei. Future studies, including the examination of invertebrate hosts, are needed to verify this preliminary taxonomic identification. A distinct hemogregarine haplotype was found in Oplurus sp., which displayed morphologically different gametocytes, some of which were apparently inside leukocytes. The Sarcocystis identified from Tracheloptychus petersi was identical to that reported in a North African snake, indicating that the same lineage is found in geographically distinct regions. By combining morphological and genetic information, Foleyella furcata (Linstow, 1899) filarial nematodes were identified in several Furcifer chameleons. This study provides insights into the distribution, diversity and host-parasite interactions of hemoparasites in wild reptile populations from Madagascar. PMID:25224723
Golomidova, Alla K; Kulikov, Eugene E; Prokhorov, Nikolai S; Guerrero-Ferreira, Ricardo С; Knirel, Yuriy A; Kostryukova, Elena S; Tarasyan, Karina K; Letarov, Andrey V
2016-01-21
The T5-like siphoviruses DT57C and DT571/2, isolated from horse feces, are very closely related to each other, and most of their structural proteins are also nearly identical to T5 phage. Their LTFs (L-shaped tail fibers), however, are composed of two proteins, LtfA and LtfB, instead of the single Ltf of bacteriophage T5. In silico and mutant analysis suggests a possible branched structure of DT57C and DT571/2 LTFs, where the LtfB protein is connected to the phage tail via the LtfA protein and with both proteins carrying receptor recognition domains. Such adhesin arrangement has not been previously recognized in siphoviruses. The LtfA proteins of our phages are found to recognize different host O-antigen types: E. coli O22-like for DT57C phage and E. coli O87 for DT571/2. LtfB proteins are identical in both phages and recognize another host receptor, most probably lipopolysaccharide (LPS) of E. coli O81 type. In these two bacteriophages, LTF function is essential to penetrate the shield of the host's O-antigens. We also demonstrate that LTF-mediated adsorption becomes superfluous when the non-specific cell protection by O-antigen is missing, allowing the phages to bind directly to their common secondary receptor, the outer membrane protein BtuB. The LTF independent adsorption was also demonstrated on an O22-like host mutant missing O-antigen O-acetylation, thus showing the biological value of this O-antigen modification for cell protection against phages.
Li, Tong; Johansson, Ingegerd; Hay, Donald I.; Strömberg, Nicklas
1999-01-01
Oral strains of Actinomyces spp. express type 1 fimbriae, which are composed of major FimP subunits, and bind preferentially to salivary acidic proline-rich proteins (APRPs) or to statherin. We have mapped genetic differences in the fimP subunit genes and the peptide recognition motifs within the host proteins associated with these differential binding specificities. The fimP genes were amplified by PCR from Actinomyces viscosus ATCC 19246, with preferential binding to statherin, and from Actinomyces naeslundii LY7, P-1-K, and B-1-K, with preferential binding to APRPs. The fimP gene from the statherin-binding strain 19246 is novel and has about 80% nucleotide and amino acid sequence identity to the highly conserved fimP genes of the APRP-binding strains (about 98 to 99% sequence identity). The novel FimP protein contains an amino-terminal signal peptide, randomly distributed single-amino-acid substitutions, and structurally different segments and ends with a cell wall-anchoring and a membrane-spanning region. When agarose beads with CNBr-linked host determinant-specific decapeptides were used, A. viscosus 19246 bound to the Thr42Phe43 terminus of statherin and A. naeslundii LY7 bound to the Pro149Gln150 termini of APRPs. Furthermore, while the APRP-binding A. naeslundii strains originate from the human mouth, A. viscosus strains isolated from the oral cavity of rat and hamster hosts showed preferential binding to statherin and contained the novel fimP gene. Thus, A. viscosus and A. naeslundii display structurally variant fimP genes whose protein products are likely to interact with different peptide motifs and to determine animal host tropism. PMID:10225854
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
Experimental system for computer network via satellite /CS/. III - Network control processor
NASA Astrophysics Data System (ADS)
Kakinuma, Y.; Ito, A.; Takahashi, H.; Uchida, K.; Matsumoto, K.; Mitsudome, H.
1982-03-01
A network control processor (NCP) has the functions of generating traffics, the control of links and the control of transmitting bursts. The NCP executes protocols, monitors of experiments, gathering and compiling data of measurements, of which programs are loaded on a minicomputer (MELCOM 70/40) with 512KB of memories. The NCP acts as traffic generators, instead of a host computer, in the experiment. For this purpose, 15 fake stations are realized by the software in each user station. This paper describes the configuration of the NCP and the implementation of the protocols for the experimental system.
2004-02-01
Protocol for Unix enumerating by stealing /etc/ passwd and (or) /etc/hosts.equiv and (or) ~/.rhosts; ISU – Identifying SID with user2sid ; IAS...null sessions””, FUE – “Finger Users Enumeration”, UTFTP – “Use of Trivial File Transfer Protocol for Unix enumerating by stealing /etc/ passwd and...Ping of Death”, UF – “UDP flooding”, IFS – “Storm of inquiries to FTP-server”, APF – “Access to Password File . passwd ”, WDPF – “Writing of Data with
Learning and memory in disease vector insects
Vinauger, Clément; Lahondère, Chloé; Cohuet, Anna; Lazzari, Claudio R.; Riffell, Jeffrey A.
2016-01-01
Learning and memory plays an important role in host preference and parasite transmission by disease vector insects. Historically there has been a dearth of standardized protocols that permit testing their learning abilities, thus limiting discussion on the potential epidemiological consequences of learning and memory to a largely speculative extent. However, with increasing evidence that individual experience and associative learning can affect processes such as oviposition site selection and host preference, it is timely to review the recently acquired knowledge, identify research gaps and discuss the implication of learning in disease vector insects in perspective with control strategies. PMID:27450224
Ebersbach, Georg; Grust, Ute; Ebersbach, Almut; Wegner, Brigitte; Gandor, Florin; Kühn, Andrea A
2015-02-01
LSVT-BIG is an exercise for patients with Parkinson's disease (PD) comprising of 16 1-h sessions within 4 weeks. LSVT-BIG was compared with a 2-week short protocol (AOT-SP) consisting of 10 sessions with identical exercises in 42 patients with PD. UPDRS-III-score was reduced by -6.6 in LSVT-BIG and -5.7 in AOT-SP at follow-up after 16 weeks (p < 0.001). Measures of motor performance were equally improved by LSVT-BIG and AOT-SP but high-intensity LSVT-BIG was more effective to obtain patient-perceived benefit.
Cellular computational platform and neurally inspired elements thereof
Okandan, Murat
2016-11-22
A cellular computational platform is disclosed that includes a multiplicity of functionally identical, repeating computational hardware units that are interconnected electrically and optically. Each computational hardware unit includes a reprogrammable local memory and has interconnections to other such units that have reconfigurable weights. Each computational hardware unit is configured to transmit signals into the network for broadcast in a protocol-less manner to other such units in the network, and to respond to protocol-less broadcast messages that it receives from the network. Each computational hardware unit is further configured to reprogram the local memory in response to incoming electrical and/or optical signals.
Efficient and simple approaches towards direct oxidative esterification of alcohols.
Ray, Ritwika; Jana, Rahul Dev; Bhadra, Mayukh; Maiti, Debabrata; Lahiri, Goutam Kumar
2014-11-17
The present article describes novel oxidative protocols for direct esterification of alcohols. The protocols involve successful demonstrations of both "cross" and "self" esterification of a wide variety of alcohols. The cross-esterification proceeds under a simple transition-metal-free condition, containing catalytic amounts of TEMPO (2,2,6,6-tetramethyl-1-piperidinyloxy)/TBAB (tetra-n-butylammonium bromide) in combination with oxone (potassium peroxo monosulfate) as the oxidant, whereas the self-esterification is achieved through simple induction of Fe(OAc)2 /dipic (dipic=2,6-pyridinedicarboxylic acid) as the active catalyst under an identical oxidizing environment. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
No Martian soil component in shergottite meteorites
NASA Astrophysics Data System (ADS)
Barrat, J. A.; Jambon, A.; Ferrière, L.; Bollinger, C.; Langlade, J. A.; Liorzou, C.; Boudouma, O.; Fialin, M.
2014-01-01
We report on the major and trace element geochemistry of the impact melts contained in some shergottite meteorites. It has been previously proposed that some of these impact melts formed from a mixture of the host rock and a Martian soil component (e.g., Rao et al., 1999) or from partially weathered portions of the host rock (Chennaoui Aoudjehane et al., 2012). Our results contradict both of these theories. Trace element abundances of a glass pod from the EETA 79001A meteorite are identical to those of the host lithology, and indicate that no additional component is required in this case. The impact melts in Tissint share the same trace element features as the host rock, and no secondary phases produced by Martian secondary processes are involved. The light rare earth enrichments displayed by two small samples of Tissint (Chennaoui Aoudjehane et al., 2012) are possibly the result of some contamination of small stones on desert soil before the recovery of the meteorites.
Aluja, Martin; Díaz-Fleischer, Francisco
2006-02-01
Following oviposition, females of many Tephritid flies deposit host marking pheromones (HMPs) to indicate that the host fruit has been occupied. We describe the foraging behavior of these three economically important species (Anastrepha ludens and A. obliqua from the fraterculus species group and A. serpentina from the serpentina species group) when they encounter an artificial fruit (green agar spheres wrapped in Parafilm) marked with intra- and interspecific feces extracts that contain, among other substances, host marking pheromone. When flies encountered fruit treated with either 1 or 100 mg/ml feces extract, there were drastic and statistically significant reductions in tree residence time, mean time spent on fruit, and in the number of oviposition attempts or actual ovipositions when compared to the control treatment (clean fruit). These responses were almost identical irrespective of extract origin (i.e., fly species), indicating complete interspecific HMP cross-recognition by all three Anastrepha species tested. We discuss the ecological and practical implications of our findings.
Johnson, C A; Vander Meer, R K; Lavine, B
2001-09-01
Queens of the slave-maker ant, Polyergus breviceps, take over nests of their Formica host species by fatally attacking the resident queen. As workers only begin grooming the P. breviceps queen once she has ceased her attack, we investigated whether a change in parasite queen chemistry may account for the change in worker behavior. Cuticular hydrocarbon profiles of newly mated P. breviceps queens and of queens of their two Formica host species were found to be species-specific. Profiles of newly mated P. breviceps queens that had attacked a Formica queen, however, were virtually identical to the queen profile of the species killed. Mass spectral analysis revealed that the hydrocarbons on the cuticles of newly mated P. breviceps changed from primarily normal alkanes to methyl and di-methyl branched alkanes after attacks. The results suggest that cuticular compounds from the host queen were transferred to the parasite queen during their aggressive interaction.
Evidence to support horses as natural intermediate hosts for Sarcocystis neurona.
Mullaney, Thomas; Murphy, Alice J; Kiupel, Matti; Bell, Julia A; Rossano, Mary G; Mansfield, Linda S
2005-10-10
Opossums (Didelphis spp.) are the definitive host for the protozoan parasite Sarcocystis neurona, the causative agent of equine protozoal myeloencephalitis (EPM). Opossums shed sporocysts in feces that can be ingested by true intermediate hosts (cats, raccoons, skunks, armadillos and sea otters). Horses acquire the parasite by ingestion of feed or water contaminated by opossum feces. However, horses have been classified as aberrant intermediate hosts because the terminal asexual sarcocyst stage that is required for transmission to the definitive host has not been found in their tissues despite extensive efforts to search for them [Dubey, J.P., Lindsay, D.S., Saville, W.J., Reed, S.M., Granstrom, D.E., Speer, C.A., 2001b. A review of Sarcocystis neurona and equine protozoal myeloencephalitis (EPM). Vet. Parasitol. 95, 89-131]. In a 4-month-old filly with neurological disease consistent with EPM, we demonstrate schizonts in the brain and spinal cord and mature sarcocysts in the tongue and skeletal muscle, both with genetic and morphological characteristics of S. neurona. The histological and electron microscopic morphology of the schizonts and sarcocysts were identical to published features of S. neurona [Stanek, J.F., Dubey, J.P., Oglesbee, M.J., Reed, S.M., Lindsay, D.S., Capitini, L.A., Njoku, C.J., Vittitow, K.L., Saville, W.J., 2002. Life cycle of Sarcocystis neurona in its natural intermediate host, the raccoon, Procyon lotor. J. Parasitol. 88, 1151-1158]. DNA from schizonts and sarcocysts from this horse produced Sarcocystis specific 334bp PCR products [Tanhauser, S.M., Yowell, C.A., Cutler, T.J., Greiner, E.C., MacKay, R.J., Dame, J.B., 1999. Multiple DNA markers differentiate Sarcocystis neurona and Sarcocystis falcatula. J. Parasitol. 85, 221-228]. Restriction fragment length polymorphism (RFLP) analysis of these PCR products showed banding patterns characteristic of S. neurona. Sequencing, alignment and comparison of both schizont and sarcocyst DNA amplicons showed 100% identity. Although Koch's postulates have not been demonstrated in this case study, the finding of mature, intact S. neurona schizonts and sarcocysts in the tissues of this single horse strongly suggests that horses have the potential to act as intermediate hosts. Further studies are needed to demonstrate Koch's postulates with repeated transfer of S. neurona between opossums and horses.
Mangan, Scott A; Herre, Edward A; Bever, James D
2010-09-01
A growing body of evidence obtained largely from temperate grassland studies suggests that feedbacks occurring between plants and their associated soil biota are important to plant community assemblage. However, few studies have examined the importance of soil organisms in driving plant-soil feedbacks in forested systems. In a tropical forest in central Panama, we examined whether interactions between tree seedlings and their associated arbuscular mycorrhizal fungi (AMF) lead to plant-soil feedback. Specifically, do tropical seedlings modify their own AMF communities in a manner that either favors or inhibits the next cohort of conspecific seedlings (i.e., positive or negative feedback, respectively)? Seedlings of two shade-tolerant tree species (Eugenia nesiotica, Virola surinamensis) and two pioneer tree species (Luehea seemannii, Apeiba aspera) were grown in pots containing identical AMF communities composed of equal amounts of inoculum of six co-occurring AMF species. The different AMF-host combinations were all exposed to two light levels. Under low light (2% PAR), only two of the six AMF species sporulated, and we found that host identity did not influence composition of AMF spore communities. However, relative abundances of three of the four AMF species that produced spores were influenced by host identity when grown under high light (20% PAR). Furthermore, spores of one of the AMF species, Glomus geosporum, were common in soils of Luehea and Eugenia but absent in soils of Apeiba and Virola. We then conducted a reciprocal experiment to test whether AMF communities previously modified by Luehea and Apeiba differentially affected the growth of conspecific and heterospecific seedlings. Luehea seedling growth did not differ between soils containing AMF communities modified by Luehea and Apeiba. However, Apeiba seedlings were significantly larger when grown with Apeiba-modified AMF communities, as compared to Apeiba seedlings grown with Luehea-modifed AMF communities. Our experiments suggest that interactions between tropical trees and their associated AMF are species-specific and that these interactions may shape both tree and AMF communities through plant-soil feedback.
Linking manipulative experiments to field data to test the dilution effect.
Venesky, Matthew D; Liu, Xuan; Sauer, Erin L; Rohr, Jason R
2014-05-01
The dilution effect, the hypothesis that biodiversity reduces disease risk, has received support in many systems. However, few dilution effect studies have linked mechanistic experiments to field patterns to establish both causality and ecological relevance. We conducted a series of laboratory experiments and tested the dilution effect hypothesis in an amphibian-Batrachochytrium dendrobatidis (Bd) system and tested for consistency between our laboratory experiments and field patterns of amphibian species richness, host identity and Bd prevalence. In our laboratory experiments, we show that tadpoles can filter feed Bd zoospores and that the degree of suspension feeding was positively associated with their dilution potential. The obligate suspension feeder, Gastrophryne carolinensis, generally diluted the risk of chytridiomycosis for tadpoles of Bufo terrestris and Hyla cinerea, whereas tadpoles of B. terrestris (an obligate benthos feeder) generally amplified infections for the other species. In addition, G. carolinensis reduced Bd abundance on H. cinerea more so in the presence than absence of B. terrestris and B. terrestris amplified Bd abundance on H. cinerea more so in the absence than presence of G. carolinensis. Also, when ignoring species identity, species richness was a significant negative predictor of Bd abundance. In our analysis of field data, the presence of Bufo spp. and Gastrophryne spp. were significant positive and negative predictors of Bd prevalence, respectively, even after controlling for climate, vegetation, anthropogenic factors (human footprint), species richness and sampling effort. These patterns of dilution and amplification supported our laboratory findings, demonstrating that the results are likely ecologically relevant. The results from our laboratory and field data support the dilution effect hypothesis and also suggest that dilution and amplification are predictable based on host traits. Our study is among the first to link manipulative experiments, in which a potential dilution mechanism is supported, with analyses of field data on species richness, host identity, spatial autocorrelation and disease prevalence. © 2013 The Authors. Journal of Animal Ecology © 2013 British Ecological Society.
Pollak, Andrew N; Ficke, Col James R
2010-01-01
The fourth annual Extremity War Injuries (EWI) Symposium addressed ongoing challenges and opportunities in the management of combat-related musculoskeletal injury. The symposium, which also examined host-nation care and disaster preparedness and response, defined opportunities for synergy between several organizations with similar missions and goals. Within the Department of Defense, the Orthopaedic Extremity Trauma Research Program (OETRP) has funded basic research related to a series of protocols first identified and validated at prior EWI symposia. A well-funded clinical research arm of OETRP has been developed to help translate and validate research advances from each of the protocols. The Armed Forces Institute for Regenerative Medicine, a consortium of academic research institutions, employs a tissue-engineering approach to EWI challenges, particularly with regard to tissue loss. Programs within the National Institute of Arthritis and Musculoskeletal and Skin Diseases and throughout the National Institutes of Health have also expanded tissue-engineering efforts by emphasizing robust mechanistic basic science programs. Much of the clinical care delivered by US military medical personnel and nongovernmental agencies has been to host-nation populations; coordinating delivery to maximize the number of injured who receive care requires understanding of the breadth and scope of resources available within the war zone. Similarly, providing the most comprehensive care to the greatest number of injured in the context of domestic mass casualty requires discussion and planning by all groups involved.
Diversity and Hidden Host Specificity of Chytrids infecting Colonial Volvocacean Algae.
Van den Wyngaert, Silke; Rojas-Jimenez, Keilor; Seto, Kensuke; Kagami, Maiko; Grossart, Hans-Peter
2018-05-12
Chytrids are zoosporic fungi that play an important, but yet understudied, ecological role in aquatic ecosystems. Many chytrid species have been morphologically described as parasites on phytoplankton. However, the majority of them have rarely been isolated and lack DNA sequence data. In this study we isolated and cultivated three parasitic chytrids, infecting a common volvocacean host species, Yamagishiella unicocca. In order to identify the chytrids, we characterized morphology and life cycle, and analyzed phylogenetic relationships based on 18S and 28S rDNA genes. Host range and specificity of the chytrids was determined by cross infection assays with host strains, characterized by rbcL and ITS markers. We were able to confirm the identity of two chytrid strains as Endocoenobium eudorinae Ingold and Dangeardia mamillata Schröder and described the third chytrid strain as Algomyces stechlinensis gen. et sp. nov. The three chytrids were assigned to novel and phylogenetically distant clades within the phylum Chytridiomycota, each exhibiting different host specificities. By integrating morphological and molecular data of both the parasitic chytrids and their respective host species, we unveiled cryptic host-parasite associations. This study highlights that a high prevalence of (pseudo)cryptic diversity requires molecular characterization of both phytoplankton host and parasitic chytrid to accurately identify and compare host range and specificity, and to study phytoplankton-chytrid interactions in general. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
New Hepatitis B Virus of Cranes That Has an Unexpected Broad Host Range
Prassolov, Alexej; Hohenberg, Heinz; Kalinina, Tatyana; Schneider, Carola; Cova, Lucyna; Krone, Oliver; Frölich, Kai; Will, Hans; Sirma, Hüseyin
2003-01-01
All hepadnaviruses known so far have a very limited host range, restricted to their natural hosts and a few closely related species. This is thought to be due mainly to sequence divergence in the large envelope protein and species-specific differences in host components essential for virus propagation. Here we report an infection of cranes with a novel hepadnavirus, designated CHBV, that has an unexpectedly broad host range and is only distantly evolutionarily related to avihepadnaviruses of related hosts. Direct DNA sequencing of amplified CHBV DNA as well a sequencing of cloned viral genomes revealed that CHBV is most closely related to, although distinct from, Ross' goose hepatitis B virus (RGHBV) and slightly less closely related to duck hepatitis B virus (DHBV). Phylogenetically, cranes are very distant from geese and ducks and are most closely related to herons and storks. Naturally occurring hepadnaviruses in the last two species are highly divergent in sequence from RGHBV and DHBV and do not infect ducks or do so only marginally. In contrast, CHBV from crane sera and recombinant CHBV produced from LMH cells infected primary duck hepatocytes almost as efficiently as DHBV did. This is the first report of a rather broad host range of an avihepadnavirus. Our data imply either usage of similar or identical entry pathways and receptors by DHBV and CHBV, unusual host and virus adaptation mechanisms, or divergent evolution of the host genomes and cellular components required for virus propagation. PMID:12525630
New hepatitis B virus of cranes that has an unexpected broad host range.
Prassolov, Alexej; Hohenberg, Heinz; Kalinina, Tatyana; Schneider, Carola; Cova, Lucyna; Krone, Oliver; Frölich, Kai; Will, Hans; Sirma, Hüseyin
2003-02-01
All hepadnaviruses known so far have a very limited host range, restricted to their natural hosts and a few closely related species. This is thought to be due mainly to sequence divergence in the large envelope protein and species-specific differences in host components essential for virus propagation. Here we report an infection of cranes with a novel hepadnavirus, designated CHBV, that has an unexpectedly broad host range and is only distantly evolutionarily related to avihepadnaviruses of related hosts. Direct DNA sequencing of amplified CHBV DNA as well a sequencing of cloned viral genomes revealed that CHBV is most closely related to, although distinct from, Ross' goose hepatitis B virus (RGHBV) and slightly less closely related to duck hepatitis B virus (DHBV). Phylogenetically, cranes are very distant from geese and ducks and are most closely related to herons and storks. Naturally occurring hepadnaviruses in the last two species are highly divergent in sequence from RGHBV and DHBV and do not infect ducks or do so only marginally. In contrast, CHBV from crane sera and recombinant CHBV produced from LMH cells infected primary duck hepatocytes almost as efficiently as DHBV did. This is the first report of a rather broad host range of an avihepadnavirus. Our data imply either usage of similar or identical entry pathways and receptors by DHBV and CHBV, unusual host and virus adaptation mechanisms, or divergent evolution of the host genomes and cellular components required for virus propagation.
Evolution of eukaryotic microbial pathogens via covert sexual reproduction
Heitman, Joseph
2010-01-01
Sexual reproduction enables eukaryotic organisms to re-assort genetic diversity and purge deleterious mutations, producing better-fit progeny. Sex arose early and pervades eukaryotes. Fungal and parasite pathogens once thought asexual have maintained cryptic sexual cycles, including unisexual or parasexual reproduction. As pathogens become niche and host-adapted, sex appears to specialize to promote inbreeding and clonality yet maintain out-crossing potential. During self-fertile sexual modes, sex itself may generate genetic diversity de novo. Mating-type loci govern fungal sexual identity; how parasites establish sexual identity is unknown. Comparing and contrasting fungal and parasite sex promises to reveal how microbial pathogens evolved and are evolving. PMID:20638645
NASA Astrophysics Data System (ADS)
Yin, Aihan; Ding, Yisheng
2014-11-01
Identity-related security issues inherently present in passive optical networks (PON) still exist in the current (1G) and next-generation (10G) Ethernet-based passive optical network (EPON) systems. We propose a mutual authentication scheme that integrates an NTRUsign digital signature algorithm with inherent multipoint control protocol (MPCP) frames over an EPON system between the optical line terminal (OLT) and optical network unit (ONU). Here, a primitive NTRUsign algorithm is significantly modified through the use of a new perturbation so that it can be effectively used for simultaneously completing signature and authentication functions on the OLT and the ONU sides. Also, in order to transmit their individual sensitive messages, which include public key, signature, and random value and so forth, to each other, we redefine three unique frames according to MPCP format frame. These generated messages can be added into the frames and delivered to each other, allowing the OLT and the ONU to go ahead with a mutual identity authentication process to verify their legal identities. Our simulation results show that this proposed scheme performs very well in resisting security attacks and has low influence on the registration efficiency to to-be-registered ONUs. A performance comparison with traditional authentication algorithms is also presented. To the best of our knowledge, no detailed design of mutual authentication in EPON can be found in the literature up to now.
Imo, Miriam; Maixner, Michael; Johannesen, Jes
2013-04-01
The epidemiology of vector transmitted plant diseases is highly influenced by dispersal and the host-plant range of the vector. Widening the vector's host range may increase transmission potential, whereas specialization may induce specific disease cycles. The process leading to a vector's host shift and its epidemiological outcome is therefore embedded in the frameworks of sympatric evolution vs. immigration of preadapted populations. In this study, we analyse whether a host shift of the stolbur phytoplasma vector, Hyalesthes obsoletus from field bindweed to stinging nettle in its northern distribution range evolved sympatrically or by immigration. The exploitation of stinging nettle has led to outbreaks of the grapevine disease bois noir caused by a stinging nettle-specific phytoplasma strain. Microsatellite data from populations from northern and ancestral ranges provide strong evidence for sympatric host-race evolution in the northern range: Host-plant associated populations were significantly differentiated among syntopic sites (0.054 < F(HT) < 0.098) and constant over 5 years. While gene flow was asymmetric from the old into the predicted new host race, which had significantly reduced genetic diversity, the genetic identity between syntopic host-race populations in the northern range was higher than between these populations and syntopic populations in ancestral ranges, where there was no evidence for genetic host races. Although immigration was detected in the northern field bindweed population, it cannot explain host-race diversification but suggests the introduction of a stinging nettle-specific phytoplasma strain by plant-unspecific vectors. The evolution of host races in the northern range has led to specific vector-based bois noir disease cycles. © 2013 Blackwell Publishing Ltd.
Cell Cycle-Dependent Phosphorylation of Theileria annulata Schizont Surface Proteins
von Schubert, Conrad; Wastling, Jonathan M.; Heussler, Volker T.; Woods, Kerry L.
2014-01-01
The invasion of Theileria sporozoites into bovine leukocytes is rapidly followed by the destruction of the surrounding host cell membrane, allowing the parasite to establish its niche within the host cell cytoplasm. Theileria infection induces host cell transformation, characterised by increased host cell proliferation and invasiveness, and the activation of anti-apoptotic genes. This process is strictly dependent on the presence of a viable parasite. Several host cell kinases, including PI3-K, JNK, CK2 and Src-family kinases, are constitutively activated in Theileria-infected cells and contribute to the transformed phenotype. Although a number of host cell molecules, including IkB kinase and polo-like kinase 1 (Plk1), are recruited to the schizont surface, very little is known about the schizont molecules involved in host-parasite interactions. In this study we used immunofluorescence to detect phosphorylated threonine (p-Thr), serine (p-Ser) and threonine-proline (p-Thr-Pro) epitopes on the schizont during host cell cycle progression, revealing extensive schizont phosphorylation during host cell interphase. Furthermore, we established a quick protocol to isolate schizonts from infected macrophages following synchronisation in S-phase or mitosis, and used mass spectrometry to detect phosphorylated schizont proteins. In total, 65 phosphorylated Theileria proteins were detected, 15 of which are potentially secreted or expressed on the surface of the schizont and thus may be targets for host cell kinases. In particular, we describe the cell cycle-dependent phosphorylation of two T. annulata surface proteins, TaSP and p104, both of which are highly phosphorylated during host cell S-phase. TaSP and p104 are involved in mediating interactions between the parasite and the host cell cytoskeleton, which is crucial for the persistence of the parasite within the dividing host cell and the maintenance of the transformed state. PMID:25077614
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ishihara, T
Currently, the problem at hand is in distributing identical copies of OEP and filter software to a large number of farm nodes. One of the common methods used to transfer these softwares is through unicast. Unicast protocol faces the problem of repetitiously sending the same data over the network. Since the sending rate is limited, this process poses to be a bottleneck. Therefore, one possible solution to this problem lies in creating a reliable multicast protocol. A specific type of multicast protocol is the Bulk Multicast Protocol [4]. This system consists of one sender distributing data to many receivers. Themore » sender delivers data at a given rate of data packets. In response to that, the receiver replies to the sender with a status packet which contains information about the packet loss in terms of Negative Acknowledgment. The probability of the status packet sent back to the sender is+, where N is the number of receivers. The protocol is designed to have approximately 1 status packet for each data packet sent. In this project, we were able to show that the time taken for the complete transfer of a file to multiple receivers was about 12 times faster with multicast than by the use of unicast. The implementation of this experimental protocol shows remarkable improvement in mass data transfer to a large number of farm machines.« less
Bader, Peter; Kuçi, Zyrafete; Bakhtiar, Shahrzad; Basu, Oliver; Bug, Gesine; Dennis, Michael; Greil, Johann; Barta, Aniko; Kállay, Krisztián M; Lang, Peter; Lucchini, Giovanna; Pol, Raj; Schulz, Ansgar; Sykora, Karl-Walter; von Luettichau, Irene; Herter-Sprie, Grit; Uddin, Mohammad Ashab; Jenkin, Phil; Alsultan, Abdulrahman; Buechner, Jochen; Stein, Jerry; Kelemen, Agnes; Jarisch, Andrea; Soerensen, Jan; Salzmann-Manrique, Emilia; Hutter, Martin; Schäfer, Richard; Seifried, Erhard; Klingebiel, Thomas; Bonig, Halvard; Kuçi, Selim
2018-01-29
The inability to generate mesenchymal stromal cells (MSCs) of consistent potency likely is responsible for inconsistent clinical outcomes of patients with aGvHD receiving MSC products. We developed a novel MSC manufacturing protocol characterized by high in vitro potency and near-identity of individual doses, referred to as "MSC-Frankfurt am Main (MSC-FFM)". Herein, we report outcomes of the 69 patients who have received MSC-FFM. These were 51 children and 18 adults with refractory aGvHD grade II (4%), III (36%) or IV (59%). Patients were refractory either to frontline therapy (steroids) (29%) or to steroids and 1-5 additional lines of immunosuppressants (71%) were given infusions in four weekly intervals. The day 28 overall response rate was 83%; at the last follow-up, 61% and 25% of patients were in complete or partial remission. The median follow-up was 8.1 months. Six-month estimate for cumulative incidence of non-relapse mortality was 27% (range, 16-38); leukemia relapse mortality was 2% (range, 0-5). This was associated with a superior six-month overall survival (OS) probability rate of 71% (range, 61-83), compared to the outcome of patients not treated with MSC-FFM. This novel product was effective in children and adults, suggesting that MSC-FFM represents a promising therapy for steroid refractory aGvHD.
Characterization of 47 MHC class I sequences in Filipino cynomolgus macaques
Campbell, Kevin J.; Detmer, Ann M.; Karl, Julie A.; Wiseman, Roger W.; Blasky, Alex J.; Hughes, Austin L.; Bimber, Benjamin N.; O’Connor, Shelby L.; O’Connor, David H.
2009-01-01
Cynomolgus macaques (Macaca fascicularis) provide increasingly common models for infectious disease research. Several geographically distinct populations of these macaques from Southeast Asia and the Indian Ocean island of Mauritius are available for pathogenesis studies. Though host genetics may profoundly impact results of such studies, similarities and differences between populations are often overlooked. In this study we identified 47 full-length MHC class I nucleotide sequences in 16 cynomolgus macaques of Filipino origin. The majority of MHC class I sequences characterized (39 of 47) were unique to this regional population. However, we discovered eight sequences with perfect identity and six sequences with close similarity to previously defined MHC class I sequences from other macaque populations. We identified two ancestral MHC haplotypes that appear to be shared between Filipino and Mauritian cynomolgus macaques, notably a Mafa-B haplotype that has previously been shown to protect Mauritian cynomolgus macaques against challenge with a simian/human immunodeficiency virus, SHIV89.6P. We also identified a Filipino cynomolgus macaque MHC class I sequence for which the predicted protein sequence differs from Mamu-B*17 by a single amino acid. This is important because Mamu-B*17 is strongly associated with protection against simian immunodeficiency virus (SIV) challenge in Indian rhesus macaques. These findings have implications for the evolutionary history of Filipino cynomolgus macaques as well as for the use of this model in SIV/SHIV research protocols. PMID:19107381
Maculosin, a host-specific phytotoxin for spotted knapweed from Alternaria alternata
Stierle, Andrea C.; Cardellina, John H.; Strobel, Gary A.
1988-01-01
Several diketopiperazines have been isolated from liquid cultures of Alternaria alternata, the causal agent of black leaf blight of spotted knapweed, Centaurea maculosa Lam. One of these compounds, maculosin [the diketopiperazine cyclo(-L-Pro-L-Tyr-)], was active in the nicked-leaf bioassay at 10-5 M; synthetic maculosin possessed chemical and biological activities identical to those of the natural product. Other diketopiperazines isolated from the fungus possessed either less activity or none at all. In tests against 19 plant species, maculosin was phytotoxic only to spotted knapweed. Thus maculosin is a host-specific phytotoxin from a weed pathogen. PMID:16593989
Duck Interferon-Inducible Transmembrane Protein 3 Mediates Restriction of Influenza Viruses.
Blyth, Graham A D; Chan, Wing Fuk; Webster, Robert G; Magor, Katharine E
2016-01-01
Interferon-inducible transmembrane proteins (IFITMs) can restrict the entry of a wide range of viruses. IFITM3 localizes to endosomes and can potently restrict the replication of influenza A viruses (IAV) and several other viruses that also enter host cells through the endocytic pathway. Here, we investigate whether IFITMs are involved in protection in ducks, the natural host of influenza virus. We identify and sequence duck IFITM1, IFITM2, IFITM3, and IFITM5. Using quantitative PCR (qPCR), we demonstrate the upregulation of these genes in lung tissue in response to highly pathogenic IAV infection by 400-fold, 30-fold, 30-fold, and 5-fold, respectively. We express each IFITM in chicken DF-1 cells and show duck IFITM1 localizes to the cell surface, while IFITM3 localizes to LAMP1-containing compartments. DF-1 cells stably expressing duck IFITM3 (but not IFITM1 or IFITM2) show increased restriction of replication of H1N1, H6N2, and H11N9 IAV strains but not vesicular stomatitis virus. Although duck and human IFITM3 share only 38% identity, critical residues for viral restriction are conserved. We generate chimeric and mutant IFITM3 proteins and show duck IFITM3 does not require its N-terminal domain for endosomal localization or antiviral function; however, this N-terminal end confers endosomal localization and antiviral function on IFITM1. In contrast to mammalian IFITM3, the conserved YXXθ endocytosis signal sequence in the N-terminal domain of duck IFITM3 is not essential for correct endosomal localization. Despite significant structural and amino acid divergence, presumably due to host-virus coevolution, duck IFITM3 is functional against IAV. Immune IFITM genes are poorly conserved across species, suggesting that selective pressure from host-specific viruses has driven this divergence. We wondered whether coevolution between viruses and their natural host would result in the evasion of IFITM restriction. Ducks are the natural host of avian influenza A viruses and display few or no disease symptoms upon infection with most strains, including highly pathogenic avian influenza. We have characterized the duck IFITM locus and identified IFITM3 as an important restrictor of several influenza A viruses, including avian strains. With only 38% amino acid identity to human IFITM3, duck IFITM3 possesses antiviral function against influenza virus. Thus, despite long coevolution of virus and host effectors in the natural host, influenza virus evasion of IFITM3 restriction in ducks is not apparent. Copyright © 2015, American Society for Microbiology. All Rights Reserved.
Inokuma, Yasuhide; Yoshioka, Shota; Ariyoshi, Junko; Arai, Tatsuhiko; Fujita, Makoto
2014-02-01
We recently reported a new method for single-crystal X-ray diffraction (SCD) analysis that does not require the crystallization of the target compound. In this 'crystal-free' crystallography, a tiny crystal of a porous complex is soaked in the solution of the target guest. The guest molecules are absorbed and oriented in the crystal pores and can be analyzed by X-ray diffraction. We describe here a detailed synthetic protocol for the preparation of uniform single crystals of the porous host complex and for the subsequent guest uptake. The protocol describes our most versatile porous complex, which is prepared from commercially available ZnI2 and 2,4,6-tri(4-pyridyl)-1,3,5-triazine. The host complex has large pores with a cross-section of 8 × 5 Å(2). Single crystals of the complex are grown from layered solutions of the two components. The pores of the as-synthesized complex are filled with nitrobenzene, which is replaced with the inert solvent cyclohexane. This solvent exchange is essential for the rapid and effective inclusion of target compounds. The most crucial and delicate step is the selection of high-quality single crystals from the mixture of crystals of various shapes and sizes. We suggest using the facial indices of the single crystals as a criterion for crystal selection. Single-crystal samples for X-ray analysis can be prepared by immersing the selected crystals in a cyclohexane/dichloromethane solution of target compound. After a very slow evaporation of the solvent, typically over 2 d, the final crystal can be picked and directly subjected to SCD analysis. The protocol can be completed within ∼16 d.
Efficient Isolation Protocol for B and T Lymphocytes from Human Palatine Tonsils
Assadian, Farzaneh; Sandström, Karl; Laurell, Göran; Svensson, Catharina; Akusjärvi, Göran; Punga, Tanel
2015-01-01
Tonsils form a part of the immune system providing the first line of defense against inhaled pathogens. Usually the term “tonsils” refers to the palatine tonsils situated at the lateral walls of the oral part of the pharynx. Surgically removed palatine tonsils provide a convenient accessible source of B and T lymphocytes to study the interplay between foreign pathogens and the host immune system. This video protocol describes the dissection and processing of surgically removed human palatine tonsils, followed by the isolation of the individual B and T cell populations from the same tissue sample. We present a method, which efficiently separates tonsillar B and T lymphocytes using an antibody-dependent affinity protocol. Further, we use the method to demonstrate that human adenovirus infects specifically the tonsillar T cell fraction. The established protocol is generally applicable to efficiently and rapidly isolate tonsillar B and T cell populations to study the role of different types of pathogens in tonsillar immune responses. PMID:26650582
Koga, Y; Nagatoshi, Y; Kawano, Y; Okamura, J
2003-07-01
The efficacy of methotrexate (MTX) as a single graft-versus-host disease (GVHD) prophylaxis agent was compared to that of cyclosporin A (CSA) in 62 pediatric patients (median age: 8 years) with hematological malignancies who had undergone bone marrow transplantation (BMT) from HLA-identical sibling donors at National Kyushu Cancer Center since 1977. In all, 30 patients received MTX by intravenous bolus injection, with a dose of 15 mg/m(2) on day +1, followed by 10 mg/m(2) on days +3, +6, and +11, and then once a week until day +100. A total of 32 patients were treated with CSA, which was given intravenously in the early stages and orally thereafter until day +100, and then gradually tapered and stopped 6 months after BMT. There were no differences between the groups in terms of rates of hematopoietic recovery after BMT. The probabilities of acute GVHD (grades II-IV) and chronic GVHD were 29.6 vs 40.6% (P=0.294) and 19 vs 20% (MTX vs CSA), respectively. Relapse rates and event-free survival were identical. These results suggest that MTX and CSA were equally effective when given after BMT in Japanese pediatric patients with hematological malignancies. Since MTX was given over a shorter time than CSA, it might be more practical in the management of such patients.
Zhou, Ren-Bin; Lu, Hui-Meng; Liu, Jie; Shi, Jian-Yu; Zhu, Jing; Lu, Qin-Qin; Yin, Da-Chuan
2016-01-01
Recombinant expression of proteins has become an indispensable tool in modern day research. The large yields of recombinantly expressed proteins accelerate the structural and functional characterization of proteins. Nevertheless, there are literature reported that the recombinant proteins show some differences in structure and function as compared with the native ones. Now there have been more than 100,000 structures (from both recombinant and native sources) publicly available in the Protein Data Bank (PDB) archive, which makes it possible to investigate if there exist any proteins in the RCSB PDB archive that have identical sequence but have some difference in structures. In this paper, we present the results of a systematic comparative study of the 3D structures of identical naturally purified versus recombinantly expressed proteins. The structural data and sequence information of the proteins were mined from the RCSB PDB archive. The combinatorial extension (CE), FATCAT-flexible and TM-Align methods were employed to align the protein structures. The root-mean-square distance (RMSD), TM-score, P-value, Z-score, secondary structural elements and hydrogen bonds were used to assess the structure similarity. A thorough analysis of the PDB archive generated five-hundred-seventeen pairs of native and recombinant proteins that have identical sequence. There were no pairs of proteins that had the same sequence and significantly different structural fold, which support the hypothesis that expression in a heterologous host usually could fold correctly into their native forms.
Zhou, Ren-Bin; Lu, Hui-Meng; Liu, Jie; Shi, Jian-Yu; Zhu, Jing; Lu, Qin-Qin; Yin, Da-Chuan
2016-01-01
Recombinant expression of proteins has become an indispensable tool in modern day research. The large yields of recombinantly expressed proteins accelerate the structural and functional characterization of proteins. Nevertheless, there are literature reported that the recombinant proteins show some differences in structure and function as compared with the native ones. Now there have been more than 100,000 structures (from both recombinant and native sources) publicly available in the Protein Data Bank (PDB) archive, which makes it possible to investigate if there exist any proteins in the RCSB PDB archive that have identical sequence but have some difference in structures. In this paper, we present the results of a systematic comparative study of the 3D structures of identical naturally purified versus recombinantly expressed proteins. The structural data and sequence information of the proteins were mined from the RCSB PDB archive. The combinatorial extension (CE), FATCAT-flexible and TM-Align methods were employed to align the protein structures. The root-mean-square distance (RMSD), TM-score, P-value, Z-score, secondary structural elements and hydrogen bonds were used to assess the structure similarity. A thorough analysis of the PDB archive generated five-hundred-seventeen pairs of native and recombinant proteins that have identical sequence. There were no pairs of proteins that had the same sequence and significantly different structural fold, which support the hypothesis that expression in a heterologous host usually could fold correctly into their native forms. PMID:27517583
Sedlacek, Petr; Hönig, Manfred; Friedrich, Wilhelm; Champagne, Martin; Matsumoto, Tadashi; Fischer, Alain; Neven, Benedicte; Contet, Audrey; Bensoussan, Danielle; Bordigoni, Pierre; Loeb, David; Savage, William; Jabado, Nada; Bonilla, Francisco A.; Slatter, Mary A.; Davies, E. Graham; Gennery, Andrew R.
2010-01-01
Seventeen patients transplanted with hematopoietic cells to correct severe T lymphocyte immunodeficiency resulting from complete DiGeorge anomaly were identified worldwide, and retrospective data were obtained using a questionnaire-based survey. Patients were treated at a median age of 5 months (range, 2-53 months) between 1995 and 2006. Bone marrow was used in 11 procedures in 9 cases: 6 from matched unrelated donors, 4 from human leukocyte antigen (HLA)-identical siblings, and one haploidentical parent with T-cell depletion. Unmobilized peripheral blood was used in 8 cases: 5 from HLA-identical siblings, one from a matched unrelated donor, one from an HLA-identical parent, and one unrelated matched cord blood. Conditioning was used in 5 patients and graft-versus-host disease prophylaxis in 11 patients. Significant graft-versus-host disease occurred in 9 patients, becoming chronic in 3. Median length of follow-up was 13 months, with transplantation from HLA-matched sibling showing the best results. Median survival among deceased patients (10 patients) was 7 months after transplantation (range, 2-18 months). The overall survival rate was 41%, with a median follow-up of 5.8 years (range, 4-11.5 years). Among survivors, median CD3 and CD4 counts were 806 (range, 644-1224) and 348 (range, 225-782) cells/mm3, respectively, CD4+/CD45RA+ cells remained very low, whereas mitogen responses were normalized. PMID:20530285
Hawthorne, Graeme; Davidson, Natasha; Quinn, Kathryn; McCrate, Farah; Winkler, Ines; Lucas, Ramona; Kilian, Reinhold; Molzahn, Anita
2006-09-01
Multi-centre and cross-cultural research require the use of common protocols if the results are to be either pooled or compared. All too often adherence to protocols is not discussed in reports and where it is reported poor adherence is frequently noted. This paper discusses the use of international guidelines developed by WHOQOL Field Centres to conduct and report focus groups aimed at eliciting key concepts of quality of life among older adults. This was the first step in the development of the WHOQOL-OLD instrument. Although there was overall adherence to the agreed guidelines, there were some differences in the level of reporting, even after participating Field Centres had the opportunity to explain their reports. The reasons for these discrepancies are reported. It is concluded that because of local situations, it is difficult to achieve identical implementation of multi-centre cross-cultural protocols and that the highest standards of auditing are required if findings are to be compared. Suggestions for how such protocols can be improved are given.
A Comparison of Hamster Anesthetics and Their Effect on Mosquito Blood Feeding
USDA-ARS?s Scientific Manuscript database
Hamsters or mice are often anesthetized when they are used as the hosts for insect feeding experiments. An experiment was done to determine if there was a difference in mosquito blood feeding success when fed on hamsters anesthetized using two commonly used protocols. The number of blood-fed females...
The New Student-Teacher Channel
ERIC Educational Resources Information Center
Harper, Vernon B., Jr.
2005-01-01
The Web is no longer a novel ingredient in the learning experience, it is intrinsic and constant. In fact, a host of new technologies has sparked an age of inexpensive, effortless, and universal Web access in the classroom, while wireless devices and protocols have steadily moved downstream and down the socioeconomic ladder. With this incredible…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-19
... Pacific Council will host a meeting of the Council Coordination Committee (CCC) consisting of the eight..., including: budget issues, CCC meeting protocols, Managing Our Nation's Fisheries 3 (MONF3) conference...) of 2006 established the Council Coordination Committee (CCC) by amending section 302 (16 U.S.C. 1852...
Isolation and Characterization of Extracellular Vesicles from Adult Schistosoma japonicum.
Liu, Juntao; Zhu, Lihui; Wang, Lihui; Chen, Yongjun; Giri, Bikash Ranjan; Li, Jianjun; Cheng, Guofeng
2018-05-22
Extracellular vesicles (EVs) are membranous vesicles released by a variety of cells into the extracellular microenvironment. EVs represent a population of heterogeneous vesicles, whose size range between 40 and 1,000 nm. Accumulated evidence indicated that EVs play important regulatory roles in pathogen-host interactions. A deep understanding of schistosome EVs should provide insights into the mechanisms underlying schistosome-host interactions, enabling development of novel strategies against schistosomiasis. Here, we aim to further study EVs functions in schistosomes by presenting a protocol for the isolation and characterization of EVs from adult Schistosoma japonicum (S. japonicum). EVs were isolated from in vitro culture medium using centrifugation combined with a commercial exosome isolation kit. The isolated S. japonicum EVs (SjEVs) typically possess a diameter of 100 - 400 nm, and are characterized by transmission electronic microscopy and western blotting. The usage of PKH67 dye-labeled SjEVs has demonstrated that SjEVs are internalized by the recipient cells. Overall, our protocol provides an alternative method for isolating EVs from adult schistosomes; the isolated SjEVs may be suitable for functional analysis.
Host status of barley to Puccinia coronata from couch grass and P. striiformis from wheat and brome
USDA-ARS?s Scientific Manuscript database
The pathogenicity and identity of a field sample (PcE) of crown rust fungus Puccinia coronata collected in Hungary on wild couch grass (Elytrigia repens) and of a field sample (Psb) of stripe rust (P. striiformis) collected in the Netherlands on California brome (Bromus carinatus) was studied. We fo...
USDA-ARS?s Scientific Manuscript database
Fungal communities in soil are critical to plant health and ecosystem processes in agricultural systems. Although the composition of fungal communities is often related to soil edaphic characteristic and host plant identity, there is a paucity of information on how communities vary with soil depth a...
Self-Presentation and Interaction in Blogs of Adolescents and Young Emerging Adults
ERIC Educational Resources Information Center
Mazur, Elizabeth; Kozarian, Lauri
2010-01-01
This article analyzed 124 blogs, chronological, journal-type entries published on public hosting Web sites, as new and popular places for adolescents and emerging adults aged 15 to 19 to play openly with their self-presentation, an important aspect of identity exploration. Findings indicate that most young persons write emotionally toned entries;…
USDA-ARS?s Scientific Manuscript database
Chitinase modifying proteins (cmps) are proteases, secreted by fungal pathogens, which truncate the plant class IV chitinases ChitA and ChitB during maize ear rot. Cmp activity has been characterized for Bipolaris zeicola and Stenocarpella maydis, but the identities of the proteases are not known. H...
ERIC Educational Resources Information Center
Marsh, Kathryn
2017-01-01
In contemporary society, global population movements, global conflict and ensuing migration have resulted in the presence of bicultural children in many nations, with multiple possibilities for musical engagement emerging within their home and host cultures. For these children, issues of social integration, identity construction, and cultural…
Technology: So Pervasive in Jewish Living, so Absent from Jewish Educational Research
ERIC Educational Resources Information Center
Schein, Jeffrey
2016-01-01
The Jewish world, like the world civilization that hosts it, is awash in new technologies. Appropriately, there is a great deal of attention paid to how to improve the Jewish world and Jewish identity through technology. Paradoxically there is a paucity of literature characterizing the relationship of Jews and Judaism to technology. This article…
ERIC Educational Resources Information Center
Prevoo, Marielle J. L.; Mesman, Judi; Van Ijzendoorn, Marinus H.; Pieper, Suzanne
2011-01-01
This study investigated the development and correlates of language use in bilingual Turkish-Dutch immigrant mothers and their toddlers. In this short-term longitudinal study 87 mothers completed questionnaires on their Dutch and Turkish language use, ethnic identity and use of childcare. Observational data were obtained for maternal supportive…
Complete Genome Sequences of Bacillus Phages Janet and OTooleKemple52.
Kent, Brenna; Raymond, Thomas; Mosier, Philip D; Johnson, Allison A
2018-05-10
We report here the genome sequences of two novel Bacillus cereus group-infecting bacteriophages, Janet and OTooleKemple52. These bacteriophages are double-stranded DNA-containing Myoviridae isolated from soil samples. While their genomes share a high degree of sequence identity with one another, their host preferences are unique. Copyright © 2018 Kent et al.
The Quest for Fairness in Language Testing
ERIC Educational Resources Information Center
Karami, Hossein
2013-01-01
The search for fairness in language testing is distinct from other areas of educational measurement as the object of measurement, that is, language, is part of the identity of the test takers. So, a host of issues enter the scene when one starts to reflect on how to assess people's language abilities. As the quest for fairness in language testing…
Identification of a new Apscaviroid from Japanese persimmon.
Nakaune, Ryoji; Nakano, Masaaki
2008-01-01
Three viroid-like sequences were detected from Japanese persimmon (Diospyrus kaki Thunb.) by RT-PCR using primers specific for members of the genus Apscaviroid. Based on the sequences, we determined the complete genomic sequences. Two had 92.1-94.3% sequence identity with citrus viroid OS (CVd-OS) and 91.4-96.3% identity with apple fruit crinkle viroid (AFCVd), respectively. Another one, tentatively named persimmon viroid (PVd), had 396 nucleotides and less than 70% sequence identity with known viroids. The secondary structure of PVd is proposed to be rod-like with extensive base pairing and contains the terminal conserved region and the central conserved region characteristic of the genus Apscaviroid. Moreover, we confirmed that the viroids, including PVd, are graft transmissible from persimmon to persimmon and that persimmon is a natural host of these viroids. According to its molecular and biological properties, PVd should be considered a member of a new species in the genus Apscaviroid.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Frantzen, K.A.
1985-01-01
Helminthosphorium maydis race I and Phyllosticta maydis, the causal agents of southern and yellow corn leaf blights, respectively, produce host-specific toxins. The toxic specificity of these natural products is identical to the host-specificity of the pathogens for certain varieties of corn. Susceptible genotypes carry the Texas type of cytoplasmic male sterility. Isolated mitochondria from susceptible plant species are highly sensitive to these toxins, whereas other plant species, including resistant corn varieties, and their mitochondria are not. The mitochondrion may be the primary cellular site of action for these toxins. The toxins from H. maydis and P. maydis were tritiated bymore » reduction with borotritide salts. The labeled products had a high specific activity (3.8 to 8 Ci/mmole), high biological activity, and specificity identical to that of the native toxins. A filtration binding assay was developed to investigate the binding characteristics of these labeled toxins to isolated mitochondria. Mitochondria isolated from both cytoplasmic male sterile (Texas) and normal corn demonstrated similar binding characteristics including ligand displaceable binding with both labeled toxins. Ligand displaceable binding was also detectable in mitochondria from soybeans, a nonhost plant for these fungi. The ability to displace the bound labeled toxins was generally correlated with the biological activity of the competing toxin. The results of this study suggest that a receptor site hypothesis for the mode of action of these toxins may not be valid.« less
Kawakami, Shuji; Hasegawa, Takuya; Imachi, Hiroyuki; Yamaguchi, Takashi; Harada, Hideki; Ohashi, Akiyoshi; Kubota, Kengo
2012-02-01
In situ detection of functional genes with single-cell resolution is currently of interest to microbiologists. Here, we developed a two-pass tyramide signal amplification (TSA)-fluorescence in situ hybridization (FISH) protocol with PCR-derived polynucleotide probes for the detection of single-copy genes in prokaryotic cells. The mcrA gene and the apsA gene in methanogens and sulfate-reducing bacteria, respectively, were targeted. The protocol showed bright fluorescence with a good signal-to-noise ratio and achieved a high efficiency of detection (>98%). The discrimination threshold was approximately 82-89% sequence identity. Microorganisms possessing the mcrA or apsA gene in anaerobic sludge samples were successfully detected by two-pass TSA-FISH with polynucleotide probes. The developed protocol is useful for identifying single microbial cells based on functional gene sequences. Copyright © 2011 Elsevier B.V. All rights reserved.
Nishimura, Nicole; Heins, David C.; Andersen, Ryan O.; Barber, Iain; Cresko, William A.
2011-01-01
Parasitic interactions are often part of complex networks of interspecific relationships that have evolved in biological communities. Despite many years of work on the evolution of parasitism, the likelihood that sister taxa of parasites can co-evolve with their hosts to specifically infect two related lineages, even when those hosts occur sympatrically, is still unclear. Furthermore, when these specific interactions occur, the molecular and physiological basis of this specificity is still largely unknown. The presence of these specific parasitic relationships can now be tested using molecular markers such as DNA sequence variation. Here we test for specific parasitic relationships in an emerging host-parasite model, the stickleback-Schistocephalus system. Threespine and ninespine stickleback fish are intermediate hosts for Schistocephalus cestode parasites that are phenotypically very similar and have nearly identical life cycles through plankton, stickleback, and avian hosts. We analyzed over 2000 base pairs of COX1 and NADH1 mitochondrial DNA sequences in 48 Schistocephalus individuals collected from threespine and ninespine stickleback hosts from disparate geographic regions distributed across the Northern Hemisphere. Our data strongly support the presence of two distinct clades of Schistocephalus, each of which exclusively infects either threespine or ninespine stickleback. These clades most likely represent different species that diverged soon after the speciation of their stickleback hosts. In addition, genetic structuring exists among Schistocephalus taken from threespine stickleback hosts from Alaska, Oregon and Wales, although it is much less than the divergence between hosts. Our findings emphasize that biological communities may be even more complex than they first appear, and beg the question of what are the ecological, physiological, and genetic factors that maintain the specificity of the Schistocephalus parasites and their stickleback hosts. PMID:21811623
Regulation of infection efficiency in a globally abundant marine Bacteriodetes virus
Howard-Varona, Cristina; Roux, Simon; Dore, Hugo; ...
2016-05-17
Microbes impact human health and disease, industrial processes and natural ecosystems, but do so under the influence of viruses. Problematically, knowledge of viral infection efficiencies and outcomes (e.g. lysis, lysogeny) derives from few model systems that over-represent efficient, lytic infections and under-represent virus-host natural diversity. Here we sought to understand how infection efficiency is regulated in an environmental Bacteroidetes virus that represents a globally abundant viral group and has drastically different infection efficiencies when infecting two nearly identical bacterial strains. To this end, we quantified bacterial virus (phage) and host DNA, transcripts and phage particles throughout the infection of bothmore » bacterial hosts. While the phage transcriptome was similar during both infections, host transcriptional differences appeared to have altered infection efficiency. Specifically, host transcriptomes suggested that the phage failed to repress early host expression in the inefficient nfection, thereby allowing the host to respond against infection by delaying phage DNA replication and protein translation. Further measurements showed that phage DNA and particle production were delayed (by >30 minutes) and reduced (by >50%) in the inefficient versus efficient infection as the host over-expressed DNA degradation genes and under-expressed translation genes, respectively. Together these results suggest that multiple levels of regulation can impact infection efficiencies as failure to repress host transcription allowed the host to defend against both phage DNA and protein production. Given that this phage type is ubiquitous and abundant in the global oceans and that variably efficient viral infections are likely common in any ecosystem with varying phage-host abundances and physiological states, these data provide a critically needed foundation for understanding and modeling viral infection efficiency in nature.« less
Fitness Impact of Obligate Intranuclear Bacterial Symbionts Depends on Host Growth Phase
Bella, Chiara; Koehler, Lars; Grosser, Katrin; Berendonk, Thomas U.; Petroni, Giulio; Schrallhammer, Martina
2016-01-01
According to text book definition, parasites reduce the fitness of their hosts whereas mutualists provide benefits. But biotic and abiotic factors influence symbiotic interactions, thus under certain circumstances parasites can provide benefits and mutualists can harm their host. Here we addressed the question which intrinsic biotic factors shape a symbiosis and are crucial for the outcome of the interaction between the obligate intranuclear bacterium Holospora caryophila (Alphaproteobacteria; Rickettsiales) and its unicellular eukaryotic host Paramecium biaurelia (Alveolata; Ciliophora). The virulence of H. caryophila, i.e., the negative fitness effect on host division and cell number, was determined by growth assays of several P. biaurelia strains. The performances of genetically identical lines either infected with H. caryophila or symbiont-free were compared. Following factors were considered as potentially influencing the outcome of the interaction: (1) host strain, (2) parasite strain, and (3) growth phases of the host. All three factors revealed a strong effect on the symbiosis. In presence of H. caryophila, the Paramecium density in the stationary growth phase decreased. Conversely, a positive effect of the bacteria during the exponential phase was observed for several host × parasite combinations resulting in an increased growth rate of infected P. biaurelia. Furthermore, the fitness impact of the tested endosymbionts on different P. biaurelia lines was not only dependent on one of the two involved strains but distinct for the specific combination. Depending on the current host growth phase, the presence of H. caryophila can be harmful or advantageous for P. biaurelia. Thus, under the tested experimental conditions, the symbionts can switch from the provision of benefits to the exploitation of host resources within the same host population and a time-span of less than 6 days. PMID:28066397
Regulation of infection efficiency in a globally abundant marine Bacteriodetes virus
DOE Office of Scientific and Technical Information (OSTI.GOV)
Howard-Varona, Cristina; Roux, Simon; Dore, Hugo
Microbes impact human health and disease, industrial processes and natural ecosystems, but do so under the influence of viruses. Problematically, knowledge of viral infection efficiencies and outcomes (e.g. lysis, lysogeny) derives from few model systems that over-represent efficient, lytic infections and under-represent virus-host natural diversity. Here we sought to understand how infection efficiency is regulated in an environmental Bacteroidetes virus that represents a globally abundant viral group and has drastically different infection efficiencies when infecting two nearly identical bacterial strains. To this end, we quantified bacterial virus (phage) and host DNA, transcripts and phage particles throughout the infection of bothmore » bacterial hosts. While the phage transcriptome was similar during both infections, host transcriptional differences appeared to have altered infection efficiency. Specifically, host transcriptomes suggested that the phage failed to repress early host expression in the inefficient nfection, thereby allowing the host to respond against infection by delaying phage DNA replication and protein translation. Further measurements showed that phage DNA and particle production were delayed (by >30 minutes) and reduced (by >50%) in the inefficient versus efficient infection as the host over-expressed DNA degradation genes and under-expressed translation genes, respectively. Together these results suggest that multiple levels of regulation can impact infection efficiencies as failure to repress host transcription allowed the host to defend against both phage DNA and protein production. Given that this phage type is ubiquitous and abundant in the global oceans and that variably efficient viral infections are likely common in any ecosystem with varying phage-host abundances and physiological states, these data provide a critically needed foundation for understanding and modeling viral infection efficiency in nature.« less
Drosophila melanogaster as a High-Throughput Model for Host-Microbiota Interactions.
Trinder, Mark; Daisley, Brendan A; Dube, Josh S; Reid, Gregor
2017-01-01
Microbiota research often assumes that differences in abundance and identity of microorganisms have unique influences on host physiology. To test this concept mechanistically, germ-free mice are colonized with microbial communities to assess causation. Due to the cost, infrastructure challenges, and time-consuming nature of germ-free mouse models, an alternative approach is needed to investigate host-microbial interactions. Drosophila melanogaster (fruit flies) can be used as a high throughput in vivo screening model of host-microbiome interactions as they are affordable, convenient, and replicable. D. melanogaster were essential in discovering components of the innate immune response to pathogens. However, axenic D. melanogaster can easily be generated for microbiome studies without the need for ethical considerations. The simplified microbiota structure enables researchers to evaluate permutations of how each microbial species within the microbiota contribute to host phenotypes of interest. This enables the possibility of thorough strain-level analysis of host and microbial properties relevant to physiological outcomes. Moreover, a wide range of mutant D. melanogaster strains can be affordably obtained from public stock centers. Given this, D. melanogaster can be used to identify candidate mechanisms of host-microbe symbioses relevant to pathogen exclusion, innate immunity modulation, diet, xenobiotics, and probiotic/prebiotic properties in a high throughput manner. This perspective comments on the most promising areas of microbiota research that could immediately benefit from using the D. melanogaster model.
Childs, Lauren M; Held, Nicole L; Young, Mark J; Whitaker, Rachel J; Weitz, Joshua S
2012-01-01
The CRISPR (Clustered Regularly Interspaced Short Palindromic Repeats) system is a recently discovered type of adaptive immune defense in bacteria and archaea that functions via directed incorporation of viral and plasmid DNA into host genomes. Here, we introduce a multiscale model of dynamic coevolution between hosts and viruses in an ecological context that incorporates CRISPR immunity principles. We analyze the model to test whether and how CRISPR immunity induces host and viral diversification and the maintenance of many coexisting strains. We show that hosts and viruses coevolve to form highly diverse communities. We observe the punctuated replacement of existent strains, such that populations have very low similarity compared over the long term. However, in the short term, we observe evolutionary dynamics consistent with both incomplete selective sweeps of novel strains (as single strains and coalitions) and the recurrence of previously rare strains. Coalitions of multiple dominant host strains are predicted to arise because host strains can have nearly identical immune phenotypes mediated by CRISPR defense albeit with different genotypes. We close by discussing how our explicit eco-evolutionary model of CRISPR immunity can help guide efforts to understand the drivers of diversity seen in microbial communities where CRISPR systems are active. PMID:22759281
Bai, Y.; Kosoy, M.Y.; Cully, J.F.; Bala, T.; Ray, C.; Collinge, S.K.
2007-01-01
Rodent-associated Bartonella species are generally host-specific parasites in North America. Here evidence that Bartonella species can 'jump' between host species is presented. Northern grasshopper mice and other rodents were trapped in the western USA. A study of Bartonella infection in grasshopper mice demonstrated a high prevalence that varied from 25% to 90% by location. Bartonella infection was detected in other rodent species with a high prevalence as well. Sequence analyses of gltA identified 29 Bartonella variants in rodents, 10 of which were obtained from grasshopper mice. Among these 10, only six variants were specific to grasshopper mice, whereas four were identical to variants specific to deer mice or 13-lined ground squirrels. Fourteen of 90 sequenced isolates obtained from grasshopper mice were strains found more commonly in other rodent species and were apparently acquired from these animals. The ecological behavior of grasshopper mice may explain the occurrence of Bartonella strains in occasional hosts. The observed rate at which Bartonella jumps from a donor host species to the grasshopper mouse was directly proportional to a metric of donor host density and to the prevalence of Bartonella in the donor host, and inversely proportional to the same parameters for the grasshopper mouse. ?? 2007 Federation of European Microbiological Societies.
Rossi, Franco Rubén; Gárriz, Andrés; Marina, María; Romero, Fernando Matías; Gonzalez, María Elisa; Collado, Isidro González; Pieckenstain, Fernando Luis
2011-08-01
Botrytis cinerea, as a necrotrophic fungus, kills host tissues and feeds on the remains. This fungus is able to induce the hypersensitive response (HR) on its hosts, thus taking advantage on the host's defense machinery for generating necrotic tissues. However, the identity of HR effectors produced by B. cinerea is not clear. The aim of this work was to determine whether botrydial, a phytotoxic sesquiterpene produced by B. cinerea, is able to induce the HR on plant hosts, using Arabidopsis thaliana as a model. Botrydial induced the expression of the HR marker HSR3, callose deposition, and the accumulation of reactive oxygen species and phenolic compounds. Botrydial also induced the expression of PR1 and PDF1.2, two pathogenesis-related proteins involved in defense responses regulated by salicylic acid (SA) and jasmonic acid (JA), respectively. A. thaliana and tobacco plants defective in SA signaling were more resistant to botrydial than wild-type plants, as opposed to A. thaliana plants defective in JA signaling, which were more sensitive. It can be concluded that botrydial induces the HR on its hosts and its effects are modulated by host signaling pathways mediated by SA and JA.
Chen, Xiancheng; Lin, Xiaojuan; Li, Meng
2012-10-01
Progressive tumor-bearing patients deserve to benefit from more realistic approaches. Here, a study revealed the impact of modified periodic fasting and refeeding regimen on tumor progression or regression with little or no loss of food intake and body weight. Human A549 lung, HepG-2 liver, and SKOV-3 ovary progressive tumor-bearing mice were established and subjected to 4 wk of periodic fasting/refeeding cycles (PFRC), including periodic 1-d fasting/6-d refeeding weekly (protocol 1) and periodic 2-d fasting/5-d refeeding weekly (P2DF/5DR, protocol 2), with ad libitum (AL)-fed hosts as controls. Afterwards, PFRC groups exhibited tumor growth arrest with some tendency towards regression; especially, complete regression of progressive tumors and metastases comprised between 43.75 and 56.25% of tumor-challenged hosts in P2DF/5DR group (P < 0.05). AL controls, in contrast, showed continuous tumor progression and metastasis. Finally, 100% hosts in P2DF/5DR and 62.5-68.75% in periodic 1-d fasting/6-d refeeding weekly groups survived a 4-month study period vs. only 31.25-37.5% in AL control group. Immunological assays and Luminex microarray revealed that tumor growth remission is mainly via natural killer cell (NK) reactivity and cross-regulation of IGF-binding protein-3, IGF/IGF-receptor, and megakaryocyte growth and development factor autocrine and paracrine loops. In vivo cellular and humoral assays indicated that tumor-regressive induction by PFRC protocols could be partly terminated by NK cell and IGF-binding protein-3 blockade or replenishment of IGF-I/-II and megakaryocyte growth and development factor. These findings offer a better understanding of comprehensive modulation of periodic fasting/refeeding strategy on the balance between tumor progression and regression.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Higgins, M.; Whitworth, G; El Warry, N
2009-01-01
The presence of a fucose utilization operon in the Streptococcus pneumoniae genome and its established importance in virulence indicates a reliance of this bacterium on the harvesting of host fucose-containing glycans. The identities of these glycans, however, and how they are harvested is presently unknown. The biochemical and high resolution x-ray crystallographic analysis of two family 98 glycoside hydrolases (GH98s) from distinctive forms of the fucose utilization operon that originate from different S. pneumoniae strains reveal that one enzyme, the predominant type among pneumococcal isolates, has a unique endo-{beta}-galactosidase activity on the LewisY antigen. Altered active site topography in themore » other species of GH98 enzyme tune its endo-{beta}-galactosidase activity to the blood group A and B antigens. Despite their different specificities, these enzymes, and by extension all family 98 glycoside hydrolases, use an inverting catalytic mechanism. Many bacterial and viral pathogens exploit host carbohydrate antigens for adherence as a precursor to colonization or infection. However, this is the first evidence of bacterial endoglycosidase enzymes that are known to play a role in virulence and are specific for distinct host carbohydrate antigens. The strain-specific distribution of two distinct types of GH98 enzymes further suggests that S. pneumoniae strains may specialize to exploit host-specific antigens that vary from host to host, a factor that may feature in whether a strain is capable of colonizing a host or establishing an invasive infection.« less
Dietary and developmental shifts in butterfly-associated bacterial communities
2018-01-01
Bacterial communities associated with insects can substantially influence host ecology, evolution and behaviour. Host diet is a key factor that shapes bacterial communities, but the impact of dietary transitions across insect development is poorly understood. We analysed bacterial communities of 12 butterfly species across different developmental stages, using amplicon sequencing of the 16S rRNA gene. Butterfly larvae typically consume leaves of a single host plant, whereas adults are more generalist nectar feeders. Thus, we expected bacterial communities to vary substantially across butterfly development. Surprisingly, only few species showed significant dietary and developmental transitions in bacterial communities, suggesting weak impacts of dietary transitions across butterfly development. On the other hand, bacterial communities were strongly influenced by butterfly species and family identity, potentially due to dietary and physiological variation across the host phylogeny. Larvae of most butterfly species largely mirrored bacterial community composition of their diets, suggesting passive acquisition rather than active selection. Overall, our results suggest that although butterflies harbour distinct microbiomes across taxonomic groups and dietary guilds, the dramatic dietary shifts that occur during development do not impose strong selection to maintain distinct bacterial communities across all butterfly hosts. PMID:29892359
Proteomic Analysis of Cytoskeleton Proteins in Fish.
Gotesman, Michael; Menanteau-Ledouble, Simon; El-Matbouli, Mansour
2016-01-01
In this chapter, we describe laboratory protocols for rearing fish and a simple and efficient method of extracting and identifying pathogen and host proteins that may be involved in entry and replication of commercially important fish viruses. We have used the common carp (Cyprinus carpio L.) and goldfish (Cyprinus auratus) as a model system for studies of proteins involved in viral entry and replication. The chapter describes detailed protocols for maintenance of carp, cell culture, antibody purification of proteins, and use of electrospray-ionization mass spectrometry analysis to screen and identify cytoskeleton and other proteins that may be involved in viral infection and propagation in fish.
A protocol for chemical mutagenesis in Strongyloides ratti.
Guo, Li; Chang, Zisong; Dieterich, Christoph; Streit, Adrian
2015-11-01
Genetic analysis using experimentally induced mutations has been a most valuable tool in the analysis of various organisms. However, genetic analysis of endoparasitic organisms tends to be difficult because of the limited accessibility of the sexually reproducing adults, which are normally located within the host. Nematodes of the genera Strogyloides and Parastrongyloides represent an exception to this because they can form facultative free-living sexually reproducing generations in between parasitic generations. Here we present a protocol for the chemical mutagenesis of Strongyloides ratti. Further we evaluate the feasibility of identifying the induced mutations by whole genome re-sequencing. Copyright © 2015 Elsevier Inc. All rights reserved.
American Indian identity in mental health services utilization data from a rural midwestern sample.
Hack, Samantha M; Larrison, Christopher R; Gone, Joseph P
2014-01-01
The governing bodies for psychiatry, psychology, and social work all publicly support culturally competent mental health care and have called for increased awareness of the importance of racial, ethnic, and cultural identity in mental health treatment and outcomes. However, since 1960 the population of people identifying as American Indian in the United States has grown faster than can be explained by birth rates, raising questions about the personal meaning of identity for newly self-designated American Indians. For this research, interviews were conducted with 14 self-identified American Indian clients receiving rural mental health care services in the Midwest. The goal was to assess clients' cultural connection to their racial identity and to understand what impact their American Indian identity had on their mental health care experiences. A modified Consensual Qualitative Research (CQR) method was used to develop the interview protocol and code responses. Interview data revealed that clients primarily based their racial identity on family stories of an American Indian ancestor and the majority did not feel their identification as American Indian was relevant to their mental health care. Regardless of lack of cultural connection, participants often reported feeling personal pride associated with identifying as American Indian. Implications for both researchers collecting self-reported race data and for mental health practitioners who might serve self-identified American Indian clients are discussed.
Frisch, Johanna U.; Häusser, Jan A.; van Dick, Rolf; Mojzisch, Andreas
2015-01-01
In many situations humans are influenced by the behavior of other people and their relationships with them. For example, in stressful situations supportive behavior of other people as well as positive social relationships can act as powerful resources to cope with stress. In order to study the interplay between these variables, this protocol describes two effective experimental manipulations of social relationships and supportive behavior in the laboratory. In the present article, these two manipulations are implemented in the Trier Social Stress Test (TSST)—a standard stress induction paradigm in which participants are subjected to a simulated job interview. More precisely, we propose (a) a manipulation of the relationship between different protagonists in the TSST by making a shared social identity salient and (b) a manipulation of the behavior of the TSST-selection committee, which acts either supportively or unsupportively. These two experimental manipulations are designed in a modular fashion and can be applied independently of each other but can also be combined. Moreover, these two manipulations can also be integrated into other stress protocols and into other standardized social interactions such as trust games, negotiation tasks, or other group tasks. PMID:26649856
Maixner, Michael; Albert, Andreas; Johannesen, Jes
2014-01-01
Dissemination of vectorborne diseases depends strongly on the vector's host range and the pathogen's reservoir range. Because vectors interact with pathogens, the direction and strength of a vector's host shift is vital for understanding epidemiology and is embedded in the framework of ecological specialization. This study investigates survival in host-race evolution of a polyphagous insect disease vector, Hyalesthes obsoletus, whether survival is related to the direction of the host shift (from field bindweed to stinging nettle), the interaction with plant-specific strains of obligate vectored pathogens/symbionts (stolbur phytoplasma), and whether survival is related to genetic differentiation between the host races. We used a twice repeated, identical nested experimental design to study survival of the vector on alternative hosts and relative to infection status. Survival was tested with Kaplan–Meier analyses, while genetic differentiation between vector populations was quantified with microsatellite allele frequencies. We found significant direct effects of host plant (reduced survival on wrong hosts) and sex (males survive longer than females) in both host races and relative effects of host (nettle animals more affected than bindweed animals) and sex (males more affected than females). Survival of bindweed animals was significantly higher on symptomatic than nonsymptomatic field bindweed, but in the second experiment only. Infection potentially had a positive effect on survival in nettle animals but due to low infection rates the results remain suggestive. Genetic differentiation was not related to survival. Greater negative plant-transfer effect but no negative effect of stolbur in the derived host race suggests preadaptation to the new pathogen/symbiont strain before strong diversifying selection during the specialization process. Physiological maladaptation or failure to accept the ancestral plant will have similar consequences, namely positive assortative mating within host races and a reduction in the likelihood of oviposition on the alternative plant and thus the acquisition of alternative stolbur strains. PMID:25247065
Maixner, Michael; Albert, Andreas; Johannesen, Jes
2014-08-01
Dissemination of vectorborne diseases depends strongly on the vector's host range and the pathogen's reservoir range. Because vectors interact with pathogens, the direction and strength of a vector's host shift is vital for understanding epidemiology and is embedded in the framework of ecological specialization. This study investigates survival in host-race evolution of a polyphagous insect disease vector, Hyalesthes obsoletus, whether survival is related to the direction of the host shift (from field bindweed to stinging nettle), the interaction with plant-specific strains of obligate vectored pathogens/symbionts (stolbur phytoplasma), and whether survival is related to genetic differentiation between the host races. We used a twice repeated, identical nested experimental design to study survival of the vector on alternative hosts and relative to infection status. Survival was tested with Kaplan-Meier analyses, while genetic differentiation between vector populations was quantified with microsatellite allele frequencies. We found significant direct effects of host plant (reduced survival on wrong hosts) and sex (males survive longer than females) in both host races and relative effects of host (nettle animals more affected than bindweed animals) and sex (males more affected than females). Survival of bindweed animals was significantly higher on symptomatic than nonsymptomatic field bindweed, but in the second experiment only. Infection potentially had a positive effect on survival in nettle animals but due to low infection rates the results remain suggestive. Genetic differentiation was not related to survival. Greater negative plant-transfer effect but no negative effect of stolbur in the derived host race suggests preadaptation to the new pathogen/symbiont strain before strong diversifying selection during the specialization process. Physiological maladaptation or failure to accept the ancestral plant will have similar consequences, namely positive assortative mating within host races and a reduction in the likelihood of oviposition on the alternative plant and thus the acquisition of alternative stolbur strains.
Bronchiectasis in Children: Current Concepts in Immunology and Microbiology.
Pizzutto, Susan J; Hare, Kim M; Upham, John W
2017-01-01
Bronchiectasis is a complex chronic respiratory condition traditionally characterized by chronic infection, airway inflammation, and progressive decline in lung function. Early diagnosis and intensive treatment protocols can stabilize or even improve the clinical prognosis of children with bronchiectasis. However, understanding the host immunologic mechanisms that contribute to recurrent infection and prolonged inflammation has been identified as an important area of research that would contribute substantially to effective prevention strategies for children at risk of bronchiectasis. This review will focus on the current understanding of the role of the host immune response and important pathogens in the pathogenesis of bronchiectasis (not associated with cystic fibrosis) in children.
Selection dynamic of Escherichia coli host in M13 combinatorial peptide phage display libraries.
Zanconato, Stefano; Minervini, Giovanni; Poli, Irene; De Lucrezia, Davide
2011-01-01
Phage display relies on an iterative cycle of selection and amplification of random combinatorial libraries to enrich the initial population of those peptides that satisfy a priori chosen criteria. The effectiveness of any phage display protocol depends directly on library amino acid sequence diversity and the strength of the selection procedure. In this study we monitored the dynamics of the selective pressure exerted by the host organism on a random peptide library in the absence of any additional selection pressure. The results indicate that sequence censorship exerted by Escherichia coli dramatically reduces library diversity and can significantly impair phage display effectiveness.
NASA Astrophysics Data System (ADS)
Veglia, A. J.; Milford, C. R.; Marston, M.
2016-02-01
Viruses infecting marine Synechococcus are abundant in coastal marine environments and influence the community composition and abundance of their cyanobacterial hosts. In this study, we focused on the cyanopodoviruses which have smaller genomes and narrower host ranges relative to cyanomyoviruses. While previous studies have compared the genomes of diverse podoviruses, here we analyzed the genomic variation, host ranges, and infection kinetics of podoviruses within the same OTU. The genomes of fifty-five podoviral isolates from the coastal waters of New England were fully sequenced. Based on DNA polymerase gene sequences, these isolates fall into five discrete OTUs (termed RIP - Rhode Island Podovirus). Although all the isolates belonging to the same RIP have very similar DNA polymerase gene sequences (>98% sequence identity), differences in genome content, particularly in regions associated with tail fiber genes, were observed among isolates in the same RIP. Host range tests reveal variation both across and within RIPs. Notably within RIP1, isolates that had similar tail fiber regions also had similar host ranges. Isolates belonging to RIP4 do not contain the host-derived psbA photosynthesis gene, while isolates in the other four RIPs do possess a psbA gene. Nevertheless, infection kinetic experiments suggest that the latent period and burst size for RIP4 isolates are similar to RIP1 isolates. We are continuing to investigate the correlations among genome content, host range, and infection kinetics of isolates belonging to the same OTU. Our results to date suggest that there is substantial genomic variation within an OTU and that this variation likely influences cyanopodoviral - host interactions.
Efficient red, green, blue and white organic light-emitting diodes with same exciplex host
NASA Astrophysics Data System (ADS)
Chang, Chih-Hao; Wu, Szu-Wei; Huang, Chih-Wei; Hsieh, Chung-Tsung; Lin, Sung-En; Chen, Nien-Po; Chang, Hsin-Hua
2016-03-01
Recently, exciplex had drawn attention because of its potential for efficient electroluminescence or for use as a host in organic light-emitting diodes (OLEDs). In this study, four kinds of hole transport material/electron transport material combinations were examined to verify the formation of exciplex and the corresponding energy bandgaps. We successfully demonstrated that the combination of tris(4-carbazoyl-9-ylphenyl)amine (TCTA) and 3,5,3‧,5‧-tetra(m-pyrid-3-yl)phenyl[1,1‧]biphenyl (BP4mPy) could form a stable exciplex emission with an adequate energy gap. Using exciplex as a host in red, green, and blue phosphorescent OLEDs with an identical trilayer architecture enabled effective energy transfer from exciplex to emitters, achieving corresponding efficiencies of 8.8, 14.1, and 15.8%. A maximum efficiency of 11.3% and stable emission was obtained in white OLEDs.
Complex archaea that bridge the gap between prokaryotes and eukaryotes
Martijn, Joran; Lind, Anders E.; van Eijk, Roel; Schleper, Christa; Guy, Lionel; Ettema, Thijs J. G.
2015-01-01
The origin of the eukaryotic cell remains one of the most contentious puzzles in modern biology. Recent studies have provided support for the emergence of the eukaryotic host cell from within the archaeal domain of life, but the identity and nature of the putative archaeal ancestor remain a subject of debate. Here we describe the discovery of ‘Lokiarchaeota’, a novel candidate archaeal phylum, which forms a monophyletic group with eukaryotes in phylogenomic analyses, and whose genomes encode an expanded repertoire of eukaryotic signature proteins that are suggestive of sophisticated membrane remodelling capabilities. Our results provide strong support for hypotheses in which the eukaryotic host evolved from a bona fide archaeon, and demonstrate that many components that underpin eukaryote-specific features were already present in that ancestor. This provided the host with a rich genomic ‘starter-kit’ to support the increase in the cellular and genomic complexity that is characteristic of eukaryotes. PMID:25945739
Characterization of isolates of meloidogyne from rice-wheat production fields in Nepal.
Pokharel, Ramesh R; Abawi, George S; Zhang, Ning; Duxbury, John M; Smart, Christine D
2007-09-01
Thirty-three isolates of root-knot nematode were recovered from soil samples from rice-wheat fields in Nepal and maintained on rice cv. BR 11. The isolates were characterized using morphology, host range and DNA sequence analyses in order to ascertain their identity. Results indicated phenotypic similarity (juvenile measurements, perennial pattern, host range and gall shape) of the Nepalese isolates with Meloidogyne graminicola, with minor variations. The rice varieties LA 110 and Labelle were susceptible to all of the Nepalese isolates, but differences in the aggressiveness of the isolates were observed. Phylogenetic analyses based on the sequences of partial internal transcribed spacer (ITS) of the rRNA genes indicated that all Nepalese isolates formed a distinct clade with known isolates of M. graminicola with high bootstrap support. Furthermore, two groups were identified within the M. graminicola clade. No correlation between ITS haplotype and aggressiveness or host range was found among the tested isolates.
Distilling Gaussian states with Gaussian operations is impossible.
Eisert, J; Scheel, S; Plenio, M B
2002-09-23
We show that no distillation protocol for Gaussian quantum states exists that relies on (i) arbitrary local unitary operations that preserve the Gaussian character of the state and (ii) homodyne detection together with classical communication and postprocessing by means of local Gaussian unitary operations on two symmetric identically prepared copies. This is in contrast to the finite-dimensional case, where entanglement can be distilled in an iterative protocol using two copies at a time. The ramifications for the distribution of Gaussian states over large distances will be outlined. We also comment on the generality of the approach and sketch the most general form of a Gaussian local operation with classical communication in a bipartite setting.
Statistics of work performed on a forced quantum oscillator.
Talkner, Peter; Burada, P Sekhar; Hänggi, Peter
2008-07-01
Various aspects of the statistics of work performed by an external classical force on a quantum mechanical system are elucidated for a driven harmonic oscillator. In this special case two parameters are introduced that are sufficient to completely characterize the force protocol. Explicit results for the characteristic function of work and the corresponding probability distribution are provided and discussed for three different types of initial states of the oscillator: microcanonical, canonical, and coherent states. Depending on the choice of the initial state the probability distributions of the performed work may greatly differ. This result in particular also holds true for identical force protocols. General fluctuation and work theorems holding for microcanonical and canonical initial states are confirmed.
NASA Astrophysics Data System (ADS)
Farouk, Ahmed; Batle, J.; Elhoseny, M.; Naseri, Mosayeb; Lone, Muzaffar; Fedorov, Alex; Alkhambashi, Majid; Ahmed, Syed Hassan; Abdel-Aty, M.
2018-04-01
Quantum communication provides an enormous advantage over its classical counterpart: security of communications based on the very principles of quantum mechanics. Researchers have proposed several approaches for user identity authentication via entanglement. Unfortunately, these protocols fail because an attacker can capture some of the particles in a transmitted sequence and send what is left to the receiver through a quantum channel. Subsequently, the attacker can restore some of the confidential messages, giving rise to the possibility of information leakage. Here we present a new robust General N user authentication protocol based on N-particle Greenberger-Horne-Zeilinger (GHZ) states, which makes eavesdropping detection more effective and secure, as compared to some current authentication protocols. The security analysis of our protocol for various kinds of attacks verifies that it is unconditionally secure, and that an attacker will not obtain any information about the transmitted key. Moreover, as the number of transferred key bits N becomes larger, while the number of users for transmitting the information is increased, the probability of effectively obtaining the transmitted authentication keys is reduced to zero.
Quantum Dialogue with Authentication Based on Bell States
NASA Astrophysics Data System (ADS)
Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping
2013-06-01
We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.
A Key Establishment Protocol for RFID User in IPTV Environment
NASA Astrophysics Data System (ADS)
Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho
In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
A Survey of Authentication Schemes in Telecare Medicine Information Systems.
Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber
2017-01-01
E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.
NASA Astrophysics Data System (ADS)
Panteliadis, P.; Hafkenscheid, T.; Cary, B.; Diapouli, E.; Fischer, A.; Favez, O.; Quincey, P.; Viana, M.; Hitzenberger, R.; Vecchi, R.; Saraga, D.; Sciare, J.; Jaffrezo, J. L.; John, A.; Schwarz, J.; Giannoni, M.; Novak, J.; Karanasiou, A.; Fermo, P.; Maenhaut, W.
2015-02-01
A comparison exercise on thermal-optical elemental carbon/organic carbon (ECOC) analysers was carried out among 17 European laboratories. Contrary to previous comparison exercises, the 17 participants made use of an identical instrument set-up, after correcting for temperature offsets with the application of a recently developed temperature calibration kit (Sunset Laboratory Inc, OR, US). Temperature offsets reported by participants ranged from -93 to +100 °C per temperature step. Five filter samples and two sucrose solutions were analysed with both the EUSAAR2 and NIOSH870 thermal protocols. z scores were calculated for total carbon (TC); nine outliers and three stragglers were identified. Three outliers and eight stragglers were found for EC. Overall, the participants provided results between the warning levels with the exception of two laboratories that showed poor performance, the causes of which were identified and corrected through the course of the comparison exercise. The TC repeatability and reproducibility (expressed as relative standard deviations) were 11 and 15% for EUSAAR2 and 9.2 and 12% for NIOSH870; the standard deviations for EC were 15 and 20% for EUSAAR2 and 20 and 26% for NIOSH870. TC was in good agreement between the two protocols, TCNIOSH870 = 0.98 × TCEUSAAR2 (R2 = 1.00, robust means). Transmittance (TOT) calculated EC for NIOSH870 was found to be 20% lower than for EUSAAR2, ECNIOSH870 = 0.80 × ECEUSAAR2 (R2 = 0.96, robust means). The thermograms and laser signal values were compared and similar peak patterns were observed per sample and protocol for most participants. Notable deviations from the typical patterns indicated either the absence or inaccurate application of the temperature calibration procedure and/or pre-oxidation during the inert phase of the analysis. Low or zero pyrolytic organic carbon (POC), as reported by a few participants, is suggested as an indicator of an instrument-specific pre-oxidation. A sample-specific pre-oxidation effect was observed for filter G, for all participants and both thermal protocols, indicating the presence of oxygen donors on the suspended particulate matter. POC (TOT) levels were lower for NIOSH870 than for EUSAAR2, which is related to the heating profile differences of the two thermal protocols.
Gjerde, Bjørn; Josefsen, Terje D
2015-03-01
Sarcocysts were detected in routinely processed histological sections of skeletal muscle, but not cardiac muscle, of two adult male otters (Lutra lutra; Mustelidae) from northern Norway following their post-mortem examination in 1999 and 2000. The sarcocysts were slender, spindle-shaped, up to 970 μm long and 35-70 μm in greatest diameter. The sarcocyst wall was thin (∼ 0.5 μm) and smooth with no visible protrusions. Portions of unfixed diaphragm of both animals were collected at the autopsies and kept frozen for about 14 years pending further examination. When the study was resumed in 2013, the thawed muscle samples were examined for sarcocysts under a stereo microscope, but none could be found. Genomic DNA was therefore extracted from a total of 36 small pieces of the diaphragm from both otters, and samples found to contain Sarcocystidae DNA were used selectively for PCR amplification and sequencing of the nuclear 18S and 28S ribosomal (r) RNA genes and internal transcribed spacer 1 (ITS1) region, as well as the mitochondrial cytochrome b (cytb) and cytochrome c oxidase subunit 1 (cox1) genes. Sequence comparisons revealed that both otters were infected by the same Sarcocystis sp. and that there was no genetic variation (100 % identity) among sequenced isolates at the 18S and 28S rRNA genes (six identical isolates at both loci) or at cox1 (13 identical isolates). PCR products comprising the ITS1 region, on the other hand, had to be cloned before sequencing due to intraspecific sequence variation. A total of 33 clones were sequenced, and the identities between them were 97.9-99.9 %. These sequences were most similar (93.7-96.0 % identity) to a sequence of Sarcocystis kalvikus from the wolverine in Canada, but the phylogenetic analyses placed all of them as a monophyletic sister group to S. kalvikus. Hence, they were considered to represent a novel species, which was named Sarcocystis lutrae. Sequence comparisons and phylogenetic analyses based on sequences of the 18S and 28S rRNA genes and cox1, for which little or no sequence data were available for S. kalvikus, revealed that S. lutrae otherwise was most closely related to various Sarcocystis spp. using birds or carnivores as intermediate hosts. The cox1 sequences of S. lutrae from the otters were identical to two sequences from an arctic fox, which in a previous study had been assigned to Sarcocystis arctica due to a high identity (99.4 %) with the latter species at this gene and a complete identity with S. arctica at three other loci when using the same DNA samples as templates for PCR reactions. Additional PCR amplifications and sequencing of cox1 (ten sequences) and the ITS1 region (four sequences) using four DNA samples from this fox as templates again generated cox1 sequences exclusively of S. lutrae, but ITS1 sequences of S. arctica, and thus confirmed that this arctic fox had acted as intermediate host for both S. arctica and S. lutrae. Based on the phylogenetic placement of S. lutrae, the geographical location of infected animals (otters, arctic fox) and the distribution of carnivores/raptors which may have interacted with them, the white-tailed eagle (Haliaeetus albicilla) seems to be a possible definitive host of S. lutrae. Some of the muscle samples from both otters were shown to harbour stages of Toxoplasma gondii through PCR amplification and sequencing of the entire ITS1 region (five isolates) and/or the partial cytb (eight isolates) and cox1 (one isolate). These sequences were identical to several previous sequences of T. gondii in GenBank. Thus, both otters had a dual infection with S. lutrae and T. gondii.
Hollants, Joke; Leliaert, Frederik; Verbruggen, Heroen; De Clerck, Olivier; Willems, Anne
2013-06-01
The siphonous green seaweed Bryopsis harbors complex intracellular bacterial communities. Previous studies demonstrated that certain species form close, obligate associations with Flavobacteriaceae. A predominant imprint of host evolutionary history on the presence of these bacteria suggests a highly specialized association. In this study we elaborate on previous results by expanding the taxon sampling and testing for host-symbiont coevolution Therefore, we optimized a PCR protocol to directly and specifically amplify Flavobacteriaceae endosymbiont 16S rRNA gene sequences, which allowed us to screen a large number of algal samples without the need for cultivation or surface sterilization. We analyzed 146 Bryopsis samples, and 92 additional samples belonging to the Bryopsidales and other orders within the class Ulvophyceae. Results indicate that the Flavobacteriaceae endosymbionts are restricted to Bryopsis, and only occur within specific, warm-temperate and tropical clades of the genus. Statistical analyses (AMOVA) demonstrate a significant non-random host-symbiont association. Comparison of bacterial 16S rRNA and Bryopsis rbcL phylogenies, however, reveal complex host-symbiont evolutionary associations, whereby closely related hosts predominantly harbor genetically similar endosymbionts. Bacterial genotypes are rarely confined to a single Bryopsis species and most Bryopsis species harbored several Flavobacteriaceae, obscuring a clear pattern of coevolution. Copyright © 2013 Elsevier Inc. All rights reserved.
A preliminary architecture for building communication software from traffic captures
NASA Astrophysics Data System (ADS)
Acosta, Jaime C.; Estrada, Pedro
2017-05-01
Security analysts are tasked with identifying and mitigating network service vulnerabilities. A common problem associated with in-depth testing of network protocols is the availability of software that communicates across disparate protocols. Many times, the software required to communicate with these services is not publicly available. Developing this software is a time-consuming undertaking that requires expertise and understanding of the protocol specification. The work described in this paper aims at developing a software package that is capable of automatically creating communication clients by using packet capture (pcap) and TShark dissectors. Currently, our focus is on simple protocols with fixed fields. The methodologies developed as part of this work will extend to other complex protocols such as the Gateway Load Balancing Protocol (GLBP), Port Aggregation Protocol (PAgP), and Open Shortest Path First (OSPF). Thus far, we have architected a modular pipeline for an automatic traffic-based software generator. We start the transformation of captured network traffic by employing TShark to convert packets into a Packet Details Markup Language (PDML) file. The PDML file contains a parsed, textual, representation of the packet data. Then, we extract field data, types, along with inter and intra-packet dependencies. This information is then utilized to construct an XML file that encompasses the protocol state machine and field vocabulary. Finally, this XML is converted into executable code. Using our methodology, and as a starting point, we have succeeded in automatically generating software that communicates with other hosts using an automatically generated Internet Control Message Protocol (ICMP) client program.
Suppression of Host Photosynthesis by the Parasitic Plant Rhinanthus minor
Cameron, Duncan D.; Geniez, Jean-Michelle; Seel, Wendy E.; Irving, Louis J.
2008-01-01
Background and Aims Parasitism is well understood to have wide-ranging deleterious effects on host performance in species thus far characterized. Photosynthetic performance reductions have been noted in the Striga–Zea mays association; however, no such information exists for facultative hemiparasitic plants and their hosts, nor are the effects of host species understood. Methods Chlorophyll fluorimetry was used to study the effects of parasitism by the hemiparasite Rhinanthus minor on the grass Phleum bertolinii and the forb Plantago lanceolata, and the effects of host species on the photosynthetic apparatus of R. minor. Key Results Parasitism by Rhinanthus led to a significant decrease in the host, and total (host + parasite) biomass in Phleum; however, in Plantago, no significant repression of growth was noted. Maximum quantum yield (Fv/Fm) was reduced in parasitized Plantago, relative to control plants, but not in Phleum. Fv/Fm was significantly lower in R. minor parasitizing Phleum than Plantago, suggesting Phleum to be a superior host to Plantago for R. minor. Steady-state quantum yield (ΦPSII) was significantly depressed in parasitized Phleum, but only at low irradiances in Plantago. ΦPSII was very low for R. minor grown on Plantago, but not Phleum. Conclusions Shown here is the first evidence of the suppression of host photosynthesis by a facultative hemiparasitic plant, which has significant effects on total biomass production. Host identity is a significant factor in parasite success, with the forb Plantago lanceolata exhibiting apparent chemical as well as previously identified physical defences to parasitism. It is proposed that the electron transport rate (as denoted by ΦPSII) represents the limiting factor for biomass accumulation in this system, and that Plantago is able to suppress the growth of Rhinanthus by suppressing the electron transport rate. PMID:18211886
Santos, Nuno; Santos, Catarina; Valente, Teresa; Gortázar, Christian; Almeida, Virgílio; Correia-Neves, Margarida
2015-01-01
Environmental contamination with Mycobacterium tuberculosis complex (MTC) has been considered crucial for bovine tuberculosis persistence in multi-host-pathogen systems. However, MTC contamination has been difficult to detect due to methodological issues. In an attempt to overcome this limitation we developed an improved protocol for the detection of MTC DNA. MTC DNA concentration was estimated by the Most Probable Number (MPN) method. Making use of this protocol we showed that MTC contamination is widespread in different types of environmental samples from the Iberian Peninsula, which supports indirect transmission as a contributing mechanism for the maintenance of bovine tuberculosis in this multi-host-pathogen system. The proportion of MTC DNA positive samples was higher in the bovine tuberculosis-infected than in presumed negative area (0.32 and 0.18, respectively). Detection varied with the type of environmental sample and was more frequent in sediment from dams and less frequent in water also from dams (0.22 and 0.05, respectively). The proportion of MTC-positive samples was significantly higher in spring (p<0.001), but MTC DNA concentration per sample was higher in autumn and lower in summer. The average MTC DNA concentration in positive samples was 0.82 MPN/g (CI95 0.70–0.98 MPN/g). We were further able to amplify a DNA sequence specific of Mycobacterium bovis/caprae in 4 environmental samples from the bTB-infected area. PMID:26561038
Diseases of Monterey pine in native stands of California and in plantations of Western North America
Harold R. Offord
1964-01-01
The prevalence and identity of 72 pathogens occurring on Pinus radiate D. Don are described against a brief background of the native host and its environment. Records of pathogens in California herbaria, pathology notes is Forest Service files, findings of recent surveys, and publications provide the basis for an index of these pathogens. An appendix...
ERIC Educational Resources Information Center
Wortham, Stanton, Ed.; Murillo, Enrique G., Jr., Ed.; Hamann, Edmund T., Ed.
Many immigrant Latino families are settling in U.S. communities that previously had little Latino presence. Through case studies of such communities in Georgia, North Carolina, Maine, Colorado, Illinois, and Indiana, this book describes relations between host communities and newcomers, with particular focus on educational policy formation and…
USDA-ARS?s Scientific Manuscript database
The carpel- and stamen-specific AtAGIP promoter derived from the Arabidopsis AGAMOUS (AG) second intron/enhancer is ideal for engineering complete sterility, but it is highly host-specific. To ascertain that a chimeric promoter with similar tissue specificity can be created for species other than A...
Sinha, Deepak Kumar; Lakshmi, Mulagondla; Anuradha, Ghanta; Rahman, Shaik J.; Siddiq, Ebrahimali A.; Bentur, Jagadish S.; Nair, Suresh
2011-01-01
The Asian rice gall midge, Orseolia oryzae (Wood-Mason), is a serious pest of rice. Investigations into the gall midge-rice interaction will unveil the underlying molecular mechanisms which, in turn, can be used as a tool to assist in developing suitable integrated pest management strategies. The insect gut is known to be involved in various physiological and biological processes including digestion, detoxification and interaction with the host. We have cloned and identified two genes, OoprotI and OoprotII, homologous to serine proteases with the conserved His87, Asp136 and Ser241 residues. OoProtI shared 52.26% identity with mosquito-type trypsin from Hessian fly whereas OoProtII showed 52.49% identity to complement component activated C1s from the Hessian fly. Quantitative real time PCR analysis revealed that both the genes were significantly upregulated in larvae feeding on resistant cultivar than in those feeding on susceptible cultivar. These results provide an opportunity to understand the gut physiology of the insect under compatible or incompatible interactions with the host. Phylogenetic analysis grouped these genes in the clade containing proteases of phytophagous insects away from hematophagous insects. PMID:21686154
Molecular characterization and phylogenetic analysis of Fasciola hepatica from Peru.
Ichikawa-Seki, Madoka; Ortiz, Pedro; Cabrera, Maria; Hobán, Cristian; Itagaki, Tadashi
2016-06-01
The causative agent of fasciolosis in South America is thought to be Fasciola hepatica. In this study, Fasciola flukes from Peru were analyzed to investigate their genetic structure and phylogenetic relationships with those from other countries. Fasciola flukes were collected from the three definitive host species: cattle, sheep, and pigs. They were identified as F. hepatica because mature sperms were observed in their seminal vesicles, and also they displayed Fh type, which has an identical fragment pattern to F. hepatica in the nuclear internal transcribed spacer 1. Eight haplotypes were obtained from the mitochondrial NADH dehydrogenase subunit 1 (nad1) sequences of Peruvian F. hepatica; however, no special difference in genetic structure was observed between the three host species. Its extremely low genetic diversity suggests that the Peruvian population was introduced from other regions. Nad1 haplotypes identical to those of Peruvian F. hepatica were detected in China, Uruguay, Italy, Iran, and Australia. Our results indicate that F. hepatica rapidly expanded its range due to human migration. Future studies are required to elucidate dispersal route of F. hepatica from Europe, its probable origin, to other areas, including Peru. Copyright © 2015. Published by Elsevier Ireland Ltd.
Cipryan, Lukas
2017-02-01
The aim of this study was to investigate changes of interleukin-6 (IL-6), total antioxidant capacity (TAC) and muscle damage markers (creatine kinase (CK), myoglobin and lactate dehydrogenase (LDH)) in response to three different high-intensity interval training (HIIT) protocols of identical external work. Twelve moderately-trained males participated in the three HIIT trials which consisted of a warm-up, followed by 12 min of 15 s, 30 s or 60 s HIIT sequences with the work/rest ratio 1. The biochemical markers of inflammation, oxidative stress and muscle damage were analysed POST, 3 h and 24 h after the exercise. All HIIT protocols caused an immediate increase in IL-6, TAC, CK, myoglobin and LDH. The most pronounced between-trials differences were found for the POST-exercise changes in IL-6 (Effect size ± 90% confidence interval: 1.51 ± 0.63, 0.84 ± 0.34 and 1.80 ± 0.60 for the 15s/15s, 30s/30s and 60s/60s protocol, respectively) and myoglobin (1.11 ± 0.29, 0.45 ± 0.48 and 1.09 ± 0.22 for the 15s/15s, 30s/30s and 60s/60s protocol, respectively). There were no substantial between-trial differences in other biochemical variables. In conclusion, the 15s/15s and 60s/60s protocols might be preferred to the 30s/30s protocols in order to maximize the training stimulus.
Dekkers, Olaf M; Cevallos, Myriam; Bührer, Jonas; Poncet, Antoine; Ackermann Rau, Sabine; Perneger, Thomas V; Egger, Matthias
2015-05-01
To compare noninferiority margins defined in study protocols and trial registry records with margins reported in subsequent publications. Comparison of protocols of noninferiority trials submitted 2001 to 2005 to ethics committees in Switzerland and The Netherlands with corresponding publications and registry records. We searched MEDLINE via PubMed, the Cochrane Controlled Trials Register (Cochrane Library issue 01/2012), and Google Scholar in September 2013 to identify published reports, and the International Clinical Trials Registry Platform of the World Health Organization in March 2013 to identify registry records. Two readers recorded the noninferiority margin and other data using a standardized data-abstraction form. The margin was identical in study protocol and publication in 43 (80%) of 54 pairs of study protocols and articles. In the remaining pairs, reporting was inconsistent (five pairs, 9%), or the noninferiority margin was either not reported in the publication (five pairs, 9%) or not defined in the study protocol (one pair). The confidence interval or the exact P-value required to judge whether the result was compatible with noninferior, inferior, or superior efficacy was reported in 43 (80%) publications. Complete and consistent reporting of both noninferiority margin and confidence interval (or exact P-value) was present in 39 (72%) protocol-publication pairs. Twenty-nine trials (54%) were registered in trial registries, but only one registry record included the noninferiority margin. The reporting of noninferiority margins was incomplete and inconsistent with study protocols in a substantial proportion of published trials, and margins were rarely reported in trial registries. Copyright © 2015 Elsevier Inc. All rights reserved.
Multimodal biometrics for identity documents (MBioID).
Dessimoz, Damien; Richiardi, Jonas; Champod, Christophe; Drygajlo, Andrzej
2007-04-11
The MBioID initiative has been set up to address the following germane question: What and how biometric technologies could be deployed in identity documents in the foreseeable future? This research effort proposes to look at current and future practices and systems of establishing and using biometric identity documents (IDs) and evaluate their effectiveness in large-scale developments. The first objective of the MBioID project is to present a review document establishing the current state-of-the-art related to the use of multimodal biometrics in an IDs application. This research report gives the main definitions, properties and the framework of use related to biometrics, an overview of the main standards developed in the biometric industry and standardisation organisations to ensure interoperability, as well as some of the legal framework and the issues associated to biometrics such as privacy and personal data protection. The state-of-the-art in terms of technological development is also summarised for a range of single biometric modalities (2D and 3D face, fingerprint, iris, on-line signature and speech), chosen according to ICAO recommendations and availabilities, and for various multimodal approaches. This paper gives a summary of the main elements of that report. The second objective of the MBioID project is to propose relevant acquisition and evaluation protocols for a large-scale deployment of biometric IDs. Combined with the protocols, a multimodal database will be acquired in a realistic way, in order to be as close as possible to a real biometric IDs deployment. In this paper, the issues and solutions related to the acquisition setup are briefly presented.
Masachessi, Gisela; Ganesh, Balasubramanian; Martinez, Laura C; Giordano, Miguel O; Barril, Patricia A; Isa, Maria B; Paván, Giorgio V; Mateos, Carlos A; Nates, Silvia V
2015-01-01
The present work provide data about the maintenance of picobirnavirus (PBV) infection during adulthood in a mammalian host. For this purpose PBV infection was studied in an adult orangutan (Pongo pygmaeus) by PAGE/SS, RT-PCR and nucleotide sequencing. PBV infection in the animal was asymptomatic and was characterized by interspaced silent and high/ low active viral excretion periods. The PBV strains excreted by the studied individual were identified as genogroup I and revealed a nucleotide identity among them of 64-81%. The results obtained allowed to arrive to a deeper understanding of the natural history of PBV infection, which seems to be characterized by new-born, juvenile and adult asymptomatic hosts which persistently excrete closely related strains in their feces. Consequently, picobirnaviruses could be considered frequent inhabitants of the gastrointestinal tract, leaving the question open about the molecular mechanisms governing persistent and asymptomatic coexistence within the host and the potential host suitability to maintain this relationship. Copyright © 2014 Elsevier B.V. All rights reserved.
Effect of route on inoculation on host resistance to Nocardia.
Beaman, B L; Maslan, S; Scates, S; Rosen, J
1980-01-01
Virulent strains of Nocardia asteroides and Nocardia caviae were injected into mice by five different routes. When these organisms were grown to the same stage of growth in the same medium and otherwise prepared identically, it was found that they differed significantly in their ability to infect and kill the host, depending entirely upon the route of inoculation. Thus, N. caviae 112 was 30 times more virulent than N. asteroides GUH-2 when administered intranasally, whereas N. asteroides was at least 10 times more pathogenic than N. caviae when injected intravenously. They had similar degrees of virulence when given intraperitoneally. N. asteroides GUH-2 induced a more persistent and progressive infection than N. caviae 112 when injected into the footpads of mice; however, the latter strain was more lethal for the animals when given by this route. Different routes of infecting mice indicate a compartmentalization of the host response to different strains of nocardia. Therefore, the use of different strains of nocardia under carefully controlled and defined conditions should make it possible to dissect the nocardia-host interactions at the cellular levels. Images Fig. 1 PMID:6991437
Isolation of bacteria-containing phagosomes by magnetic selection
Lönnbro, Per; Nordenfelt, Pontus; Tapper, Hans
2008-01-01
Background There is a growing awareness of the importance of intracellular events in determining the outcome of infectious disease. To improve the understanding of such events, like phagosome maturation, we set out to develop a versatile technique for phagosome isolation that is rapid and widely applicable to different pathogens. Results We developed two different protocols to isolate phagosomes containing dead or live bacteria modified with small magnetic particles, in conjunction with a synchronized phagocytosis protocol and nitrogen cavitation. For dead bacteria, we performed analysis of the phagosome samples by microscopy and immunoblot, and demonstrated the appearance of maturation markers on isolated phagosomes. Conclusion We have presented detailed protocols for phagosome isolation, which can be adapted for use with different cell types and prey. The versatility and simplicity of the approach allow better control of phagosome isolation, the parameters of which are critical in studies of host-bacteria interaction and phagosome maturation. PMID:18588680
NASA Astrophysics Data System (ADS)
Denning, Emil V.; Iles-Smith, Jake; McCutcheon, Dara P. S.; Mork, Jesper
2017-12-01
Multiphoton entangled states are a crucial resource for many applications in quantum information science. Semiconductor quantum dots offer a promising route to generate such states by mediating photon-photon correlations via a confined electron spin, but dephasing caused by the host nuclear spin environment typically limits coherence (and hence entanglement) between photons to the spin T2* time of a few nanoseconds. We propose a protocol for the deterministic generation of multiphoton entangled states that is inherently robust against the dominating slow nuclear spin environment fluctuations, meaning that coherence and entanglement is instead limited only by the much longer spin T2 time of microseconds. Unlike previous protocols, the present scheme allows for the generation of very low error probability polarization encoded three-photon GHZ states and larger entangled states, without the need for spin echo or nuclear spin calming techniques.
Kelley, Scott T; Cassirer, E Frances; Weiser, Glen C; Safaee, Shirin
2007-01-01
Wild and domestic animal populations are known to be sources and reservoirs of emerging diseases. There is also a growing recognition that horizontal genetic transfer (HGT) plays an important role in bacterial pathogenesis. We used molecular phylogenetic methods to assess diversity and cross-transmission rates of Pasteurellaceae bacteria in populations of bighorn sheep, Dall's sheep, domestic sheep and domestic goats. Members of the Pasteurellaceae cause an array of deadly illnesses including bacterial pneumonia known as "pasteurellosis", a particularly devastating disease for bighorn sheep. A phylogenetic analysis of a combined dataset of two RNA genes (16S ribosomal RNA and RNAse P RNA) revealed remarkable evolutionary diversity among Pasteurella trehalosi and Mannheimia (Pasteurella) haemolytica bacteria isolated from sheep and goats. Several phylotypes appeared to associate with particular host species, though we found numerous instances of apparent cross-transmission among species and populations. Statistical analyses revealed that host species, geographic locale and biovariant classification, but not virulence, correlated strongly with Pasteurellaceae phylogeny. Sheep host species correlated with P. trehalosi isolates phylogeny (PTP test; P=0.002), but not with the phylogeny of M. haemolytica isolates, suggesting that P. trehalosi bacteria may be more host specific. With regards to populations within species, we also discovered a strong correlation between geographic locale and isolate phylogeny in the Rocky Mountain bighorn sheep (PTP test; P=0.001). We also investigated the potential for HGT of the leukotoxin A (lktA) gene, which produces a toxin that plays an integral role in causing disease. Comparative analysis of the combined RNA gene phylogeny and the lktA phylogenies revealed considerable incongruence between the phylogenies, suggestive of HGT. Furthermore, we found identical lktA alleles in unrelated bacterial species, some of which had been isolated from sheep in distantly removed populations. For example, lktA sequences from P. trehalosi isolated from remote Alaskan Dall's sheep were 100% identical over a 900-nucleotide stretch to sequences determined from M. haemolytica isolated from domestic sheep in the UK. This extremely high degree of sequence similarity of lktA sequences among distinct bacterial species suggests that HGT has played a role in the evolution of lktA in wild hosts.
Ivanova, E; Spiridonov, S; Bain, O
2007-12-01
Over the last century, only two cases of ocular oxyspirurosis were recorded in primates, both in zoos, and two species were described: in Berlin, Germany, Oxyspirura (O.) conjunctivalis from the lemurid Microcebus murinus, later also found in the lorisid Loris gracilis; in Jacksonville, Florida, O. (O.) youngi from the cercopithecid monkey Erythrocebus patas. In the present case from the Moscow zoo, oxyspirurosis was recorded in several species of Old World lemuriforms and lorisiforms, and some South American monkeys. i) The intermediate host was discovered to be a cockroach, as for O. (O.) mansoni, a parasite of poultry. The complete sequence identity between ITS-1 rDNA from adult nematodes of the primate and that of the larval worms from the vector, Nauphoete cinerea, confirmed their conspecificity. ii) Parasites from Moscow zoo recovered from Nycticebus c. coucang were compared morphologically to those from other zoos. The length and shape of the gubernaculum, used previously as a distinct character, were found to be variable. However, the vulvar bosses arrangement, the distal extremity of left spicule and the position of papillae of the first postcloacal pair showed that the worms in the different samples were not exactly identical and that each set seemed characteristic of a particular zoo. iii) The presence of longitudinal cuticular crests in the infective stage as well as in adult worms was recorded. Together with several other morphological and biological characters (long tail and oesophagus, cockroach vector), this confirmed that Oxyspirura is not closely related to Thelazia, another ocular parasite genus. iv) The disease in the Moscow zoo is thought to have started with Nycticebus pygmaeus imported fromVietnam, thus the suggestion was that Asiatic lorisids were at the origin of the Moscow set of cases. The natural host(s) for the Berlin and Jacksonville cases remain unknown but they are unlikely to be the species found infected in zoos. Consequently the notion of type hosts is artificial and the three agents of oxyspirurosis are provisionally placed in the taxon O. (O.) conjunctivalis.
Stochastic Petri net analysis of a replicated file system
NASA Technical Reports Server (NTRS)
Bechta Dugan, Joanne; Ciardo, Gianfranco
1989-01-01
A stochastic Petri-net model of a replicated file system is presented for a distributed environment where replicated files reside on different hosts and a voting algorithm is used to maintain consistency. Witnesses, which simply record the status of the file but contain no data, can be used in addition to or in place of files to reduce overhead. A model sufficiently detailed to include file status (current or out-of-date), as well as failure and repair of hosts where copies or witnesses reside, is presented. The number of copies and witnesses is a parameter of the model. Two different majority protocols are examined, one where a majority of all copies and witnesses is necessary to form a quorum, and the other where only a majority of the copies and witnesses on operational hosts is needed. The latter, known as adaptive voting, is shown to increase file availability in most cases.
Tomioka, Haruaki
2017-01-01
The high incidence of tuberculosis (TB) in developing countries, the resurgence of TB in industrialized countries, and the worldwide increase in the prevalence of Mycobacterium avium complex infections have prompted the quest for new antimycobacterial drugs. However, the development of such chemotherapeutics is currently making very slow progress. It therefore appears that devising improved administration protocols for clinical treatment against intractable mycobacteriosis using existing chemotherapeutics is more practical than awaiting the development of novel antimycobacterial drugs. The modulation of host immune responses using immunoadjunctive agents may increase the efficacy of antimicrobial treatment against mycobacteriosis. Particularly, the mild and long-term up-regulation of host immune reactions against mycobacterial pathogens using Chinese herbal medicines (CHMs) may be beneficial for immunoadjunctive therapy. This review focuses on the current status and future prospects regarding the development of CHMs that can be useful for the clinical control of intractable mycobacterial infections.
Koi herpesvirus encodes and expresses a functional interleukin-10.
Sunarto, Agus; Liongue, Clifford; McColl, Kenneth A; Adams, Mathew M; Bulach, Dieter; Crane, Mark St J; Schat, Karel A; Slobedman, Barry; Barnes, Andrew C; Ward, Alister C; Walker, Peter J
2012-11-01
Koi herpesvirus (KHV) (species Cyprinid herpesvirus 3) ORF134 was shown to transcribe a spliced transcript encoding a 179-amino-acid (aa) interleukin-10 (IL-10) homolog (khvIL-10) in koi fin (KF-1) cells. Pairwise sequence alignment indicated that the expressed product shares 25% identity with carp IL-10, 22 to 24% identity with mammalian (including primate) IL-10s, and 19.1% identity with European eel herpesvirus IL-10 (ahvIL-10). In phylogenetic analyses, khvIL-10 fell in a divergent position from all host IL-10 sequences, indicating extensive structural divergence following capture from the host. In KHV-infected fish, khvIL-10 transcripts were observed to be highly expressed during the acute and reactivation phases but to be expressed at very low levels during low-temperature-induced persistence. Similarly, KHV early (helicase [Hel] and DNA polymerase [DNAP]) and late (intercapsomeric triplex protein [ITP] and major capsid protein [MCP]) genes were also expressed at high levels during the acute and reactivation phases, but only low-level expression of the ITP gene was detected during the persistent phase. Injection of khvIL-10 mRNA into zebrafish (Danio rerio) embryos increased the number of lysozyme-positive cells to a similar degree as zebrafish IL-10. Downregulation of the IL-10 receptor long chain (IL-10R1) using a specific morpholino abrogated the response to both khvIL-10 and zebrafish IL-10 transcripts, indicating that, despite the structural divergence, khvIL-10 functions via this receptor. This is the first report describing the characteristics of a functional viral IL-10 gene in the Alloherpesviridae.
Have No PHEAR: Networks Without Identifiers
2015-12-07
packet processing, cryptography , or other computationally intensive func- tionality is present. This prevents, e.g., SDN-based onion routing from being...client registration protocol uses public key cryptography in its identity verification handshake. An attacker could exploit this by continually...and M. K. Wright. Timing Attacks in Low-Latency Mix-Based Systems. In A. Juels, editor, Proceedings of Financial Cryptography (FC ’04), pages 251–265
Identity Management Task Force Report 2008
2008-01-01
Telecommunication Grid ( GTG ) consists of the public- switched telecommunications network (PSTN), various forms of Internet protocol (IP) networks...to network providers) to a large community of nomadic users and access devices over a wide range of access technologies. The GTG is notional, and...DOC Dr. Myra Gray , DOD Greg Hall, DNI Celia Hanley, DOD Patrick Hannon, DNI James Hass, IC Linda Hill, SSA Bobby Jones, DOC Patrick Hannon
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.
Song, Caixia
2017-12-12
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.
Gamma-Ray Burst Host Galaxies Have "Normal" Luminosities.
Schaefer
2000-04-10
The galactic environment of gamma-ray bursts can provide good evidence about the nature of the progenitor system, with two old arguments implying that the burst host galaxies are significantly subluminous. New data and new analysis have now reversed this picture: (1) Even though the first two known host galaxies are indeed greatly subluminous, the next eight hosts have absolute magnitudes typical for a population of field galaxies. A detailed analysis of the 16 known hosts (10 with redshifts) shows them to be consistent with a Schechter luminosity function with R*=-21.8+/-1.0, as expected for normal galaxies. (2) Bright bursts from the Interplanetary Network are typically 18 times brighter than the faint bursts with redshifts; however, the bright bursts do not have galaxies inside their error boxes to limits deeper than expected based on the luminosities for the two samples being identical. A new solution to this dilemma is that a broad burst luminosity function along with a burst number density varying as the star formation rate will require the average luminosity of the bright sample (>6x1058 photons s-1 or>1.7x1052 ergs s-1) to be much greater than the average luminosity of the faint sample ( approximately 1058 photons s-1 or approximately 3x1051 ergs s-1). This places the bright bursts at distances for which host galaxies with a normal luminosity will not violate the observed limits. In conclusion, all current evidence points to gamma-ray burst host galaxies being normal in luminosity.
RNA trafficking in parasitic plant systems
LeBlanc, Megan; Kim, Gunjune; Westwood, James H.
2012-01-01
RNA trafficking in plants contributes to local and long-distance coordination of plant development and response to the environment. However, investigations of mobile RNA identity and function are hindered by the inherent difficulty of tracing a given molecule of RNA from its cell of origin to its destination. Several methods have been used to address this problem, but all are limited to some extent by constraints associated with accurately sampling phloem sap or detecting trafficked RNA. Certain parasitic plant species form symplastic connections to their hosts and thereby provide an additional system for studying RNA trafficking. The haustorial connections of Cuscuta and Phelipanche species are similar to graft junctions in that they are able to transmit mRNAs, viral RNAs, siRNAs, and proteins from the host plants to the parasite. In contrast to other graft systems, these parasites form connections with host species that span a wide phylogenetic range, such that a high degree of nucleotide sequence divergence may exist between host and parasites and allow confident identification of most host RNAs in the parasite system. The ability to identify host RNAs in parasites, and vice versa, will facilitate genomics approaches to understanding RNA trafficking. This review discusses the nature of host–parasite connections and the potential significance of host RNAs for the parasite. Additional research on host–parasite interactions is needed to interpret results of RNA trafficking studies, but parasitic plants may provide a fascinating new perspective on RNA trafficking. PMID:22936942
Sommer, Simone; Rakotondranary, Solofomalla Jacques; Ganzhorn, Jörg U
2014-01-01
Understanding the drivers of species adaptations to changing environments on the one hand and the limits for hybridization on the other hand is among the hottest questions in evolutionary biology. Parasites represent one of the major selective forces driving host evolution and at least those with free-living stages are at the same time dependent on the ecological conditions of their host's habitat. Local immunological adaptations of host species to varying parasite pressure are therefore expected and might represent the genetic basis for ecological speciation and the maintenance of recently diverged species. Madagascar provides one of the rare examples where two partially sympatric primate species (Microcebus griseorufus, M. murinus) and their hybrids, as well as an allopatric species (M. cf rufus) live in close proximity along a very steep environmental gradient ranging from southern dry spiny bush to gallery forest to evergreen eastern humid rain forest, thus mimicking the situation encountered during extensions and retreats of vegetation formations under changing climatic conditions. This system was used to study parasite infection and immune gene (MHC) adaptations to varying parasite pressure that might provide selective advantages to pure species over hybrids. Parasite burdens increased with increasing humidity. M. griseorufus, M. murinus, and their hybrids but not M. rufus shared the same MHC alleles, indicating either retention of ancestral polymorphism or recent gene flow. The hybrids had much higher prevalence of intestinal parasites than either of the parent species living under identical environmental conditions. The different representation of parasites can indicate a handicap for hybrids that maintains species identities. PMID:25558366
Sommer, Simone; Rakotondranary, Solofomalla Jacques; Ganzhorn, Jörg U
2014-12-01
Understanding the drivers of species adaptations to changing environments on the one hand and the limits for hybridization on the other hand is among the hottest questions in evolutionary biology. Parasites represent one of the major selective forces driving host evolution and at least those with free-living stages are at the same time dependent on the ecological conditions of their host's habitat. Local immunological adaptations of host species to varying parasite pressure are therefore expected and might represent the genetic basis for ecological speciation and the maintenance of recently diverged species. Madagascar provides one of the rare examples where two partially sympatric primate species (Microcebus griseorufus, M. murinus) and their hybrids, as well as an allopatric species (M. cf rufus) live in close proximity along a very steep environmental gradient ranging from southern dry spiny bush to gallery forest to evergreen eastern humid rain forest, thus mimicking the situation encountered during extensions and retreats of vegetation formations under changing climatic conditions. This system was used to study parasite infection and immune gene (MHC) adaptations to varying parasite pressure that might provide selective advantages to pure species over hybrids. Parasite burdens increased with increasing humidity. M. griseorufus, M. murinus, and their hybrids but not M. rufus shared the same MHC alleles, indicating either retention of ancestral polymorphism or recent gene flow. The hybrids had much higher prevalence of intestinal parasites than either of the parent species living under identical environmental conditions. The different representation of parasites can indicate a handicap for hybrids that maintains species identities.
Whole-genome analyses of speciation events in pathogenic Brucellae
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chain, Patrick S. G.; Comerci, Diego J.; Tolmasky, Marcelo E.
Despite their high DNA identity and a proposal to group classical Brucella species as biovars of Brucella melitensis, the commonly recognized Brucella species can be distinguished by distinct biochemical and fatty acid characters, as well as by a marked host range (e.g., Brucella suis for swine, B. melitensis for sheep and goats, and Brucella abortus for cattle). Here we present the genome of B. abortus 2308, the virulent prototype biovar 1 strain, and its comparison to the two other human pathogenic Brucella species and to B. abortus field isolate 9-941. The global distribution of pseudogenes, deletions, and insertions supports previousmore » indications that B. abortus and B. melitensis share a common ancestor that diverged from B. suis. With the exception of a dozen genes, the genetic complements of both B. abortus strains are identical, whereas the three species differ in gene content and pseudogenes. The pattern of species-specific gene inactivations affecting transcriptional regulators and outer membrane proteins suggests that these inactivations may play an important role in the establishment of host specificity and may have been a primary driver of speciation in the genus Brucella. Despite being nonmotile, the brucellae contain flagellum gene clusters and display species-specific flagellar gene inactivations, which lead to the putative generation of different versions of flagellum-derived structures and may contribute to differences in host specificity and virulence. Metabolic changes such as the lack of complete metabolic pathways for the synthesis of numerous compounds (e.g., glycogen, biotin, NAD, and choline) are consistent with adaptation of brucellae to an intracellular life-style.« less
Whole-genome analyses of the speciation events in the pathogenic Brucellae
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chain, P; Comerci, D; Tolmasky, M
Despite their high DNA identity and a proposal to group classical Brucella species as biovars of B. melitensis, the commonly recognized Brucella species can be distinguished by distinct biochemical and fatty acid characters as well as by a marked host range (e.g. B. suis for swine, B. melitensis for sheep and goats, B. abortus for cattle). Here we present the genome of B. abortus 2308, the virulent prototype biovar 1 strain, and its comparison to the two other human pathogenic Brucellae species and to the B. abortus field isolate 9-941. The global distribution of pseudogenes, deletions and insertions support previousmore » indications that B. abortus and B. melitensis share a common ancestor that diverged from B. suis. With the exception of a dozen genes, the genetic complement of both B. abortus strains is identical, whereas the three species differ in gene content and pseudogenes. The pattern of species-specific gene inactivations affecting transcriptional regulators and outer membrane proteins suggest that these inactivations may play an important role in the establishment of host-specificity and may have been a primary driver of speciation in the Brucellae. Despite being non-motile, the Brucellae contain flagellum gene clusters and display species-specific flagellar gene inactivations, which lead to the putative generation of different versions of flagellum-derived structures, and may contribute to differences in host-specificity and virulence. Metabolic changes such as the lack of complete metabolic pathways for the synthesis of numerous compounds (e.g. glycogen, biotin, NAD, and choline) are consistent with adaptation of Brucellae to an intracellular lifestyle.« less
Moore, Marianne S; Field, Kenneth A; Behr, Melissa J; Turner, Gregory G; Furze, Morgan E; Stern, Daniel W F; Allegra, Paul R; Bouboulis, Sarah A; Musante, Chelsey D; Vodzak, Megan E; Biron, Matthew E; Meierhofer, Melissa B; Frick, Winifred F; Foster, Jeffrey T; Howell, Daryl; Kath, Joseph A; Kurta, Allen; Nordquist, Gerda; Johnson, Joseph S; Lilley, Thomas M; Barrett, Benjamin W; Reeder, DeeAnn M
2018-01-01
The devastating bat fungal disease, white-nose syndrome (WNS), does not appear to affect all species equally. To experimentally determine susceptibility differences between species, we exposed hibernating naïve little brown myotis (Myotis lucifugus) and big brown bats (Eptesicus fuscus) to the fungus that causes WNS, Pseudogymnoascus destructans (Pd). After hibernating under identical conditions, Pd lesions were significantly more prevalent and more severe in little brown myotis. This species difference in pathology correlates with susceptibility to WNS in the wild and suggests that survival is related to different host physiological responses. We observed another fungal infection, associated with neutrophilic inflammation, that was equally present in all bats. This suggests that both species are capable of generating a response to cold tolerant fungi and that Pd may have evolved mechanisms for evading host responses that are effective in at least some bat species. These host-pathogen interactions are likely mediated not just by host physiological responses, but also by host behavior. Pd-exposed big brown bats, the less affected species, spent more time in torpor than did control animals, while little brown myotis did not exhibit this change. This differential thermoregulatory response to Pd infection by big brown bat hosts may allow for a more effective (or less pathological) immune response to tissue invasion.
Frequency-domain Hong-Ou-Mandel interference with linear optics.
Imany, Poolad; Odele, Ogaga D; Alshaykh, Mohammed S; Lu, Hsuan-Hao; Leaird, Daniel E; Weiner, Andrew M
2018-06-15
The Hong-Ou-Mandel (HOM) interference is one of the most fundamental quantum-mechanical effects that reveal a nonclassical behavior of single photons. Two identical photons that are incident on the input ports of an unbiased beam splitter always exit the beam splitter together from the same output port, an effect referred to as photon bunching. In this Letter, we utilize a single electro-optic phase modulator as a probabilistic frequency beam splitter, which we exploit to observe HOM interference between two photons that are in different spectral modes, yet are identical in other characteristics. Our approach enables linear optical quantum information processing protocols using the frequency degree of freedom in photons such as quantum computing techniques with linear optics.
Strain diversity and host specificity in a specialized gut symbiont of honeybees and bumblebees.
Powell, Elijah; Ratnayeke, Nalin; Moran, Nancy A
2016-09-01
Host-restricted lineages of gut bacteria often include many closely related strains, but this fine-scale diversity is rarely investigated. The specialized gut symbiont Snodgrassella alvi has codiversified with honeybees (Apis mellifera) and bumblebees (Bombus) for millions of years. Snodgrassella alvi strains are nearly identical for 16S rRNA gene sequences but have distinct gene repertoires potentially affecting host biology and community interactions. We examined S. alvi strain diversity within and between hosts using deep sequencing both of a single-copy coding gene (minD) and of the V4 region of the 16S rRNA gene. We sampled workers from domestic and feral A. mellifera colonies and wild-caught Bombus representing 14 species. Conventional analyses of community profiles, based on the V4 region of the 16S rRNA gene, failed to expose most strain variation. In contrast, the minD analysis revealed extensive strain variation within and between host species and individuals. Snodgrassella alvi strain diversity is significantly higher in A. mellifera than in Bombus, supporting the hypothesis that colony founding by swarms of workers enables retention of more diversity than colony founding by a single queen. Most Bombus individuals (72%) are dominated by a single S. alvi strain, whereas most A. mellifera (86%) possess multiple strains. No S. alvi strains are shared between A. mellifera and Bombus, indicating some host specificity. Among Bombus-restricted strains, some are restricted to a single host species or subgenus, while others occur in multiple subgenera. Findings demonstrate that strains diversify both within and between host species and can be highly specific or relatively generalized in their host associations. © 2016 John Wiley & Sons Ltd.
Biodiversity and evolution of the Myxozoa.
Canning, Elizabeth U; Okamura, Beth
2004-01-01
Myxozoans (phylum Myxozoa) are metazoan parasites utilizing invertebrate and (mainly) aquatic vertebrate hosts. They have in common with cnidarians the possession of virtually identical, highly complex organelles, namely the polar capsules in myxozoan spores, serving for attachment to new hosts and the nematocysts in surface epithelia of cnidarians, serving for food capture. Although myxozoan spores are multicellular, the simple trophic body forms of almost all species, reduced to syncytial plasmodia or single cells, reveal no clues to myxozoan ancestry or phylogenetic relationships. The myxozoan genus Buddenbrockia is one of only two known genera belonging to a clade which diverged early in the evolution of the Myxozoa. Today the Myxozoa are represented by two classes, the Myxosporea, containing all the better-known genera, which alternate between fish and annelids, and the Malacosporea, containing Buddenbrockia and Tetracapsuloides, parasitising bryozoans. The latter genus also infects salmonid fish, causing proliferative kidney disease (PKD). The enigmatic Buddenbrockia has retained some of its ancestral features in a body wall of two cell layers and a worm-like shape, maintained by four longitudinally-running muscle blocks, similar to a gutless nematode and suggestive of a bilaterian ancestry. Although some analyses of 18S rDNA sequences tend towards a cnidarian (diploblast) affinity for myxozoans, the majority of these studies place them within, or sister to, the Bilateria. The latter view is supported by their possession of central class Hox genes, so far considered to be synapomorphic for Bilateria. The simple body form is, therefore, an extreme example of simplification due to parasitism. Various hypotheses for the occurrence of identical complex organelles (nematocysts and polar capsules) in diploblast and triploblast phyla are evaluated: common ancestry, convergent evolution, gene transfer and, especially, endosymbiosis. A theory of the evolution of their digenetic life cycles is proposed, with the invertebrate as primary host and secondary acquisition of the vertebrate host serving for asexual population increase.
Bae, Young-An; Ahn, Jong-Sook; Kim, Seon-Hee; Rhyu, Mun-Gan; Kong, Yoon; Cho, Seung-Yull
2008-10-14
Retrotransposons have been known to involve in the remodeling and evolution of host genome. These reverse transcribing elements, which show a complex evolutionary pathway with diverse intermediate forms, have been comprehensively analyzed from a wide range of host genomes, while the information remains limited to only a few species in the phylum Platyhelminthes. A LTR retrotransposon and its homologs with a strong phylogenetic affinity toward CsRn1 of Clonorchis sinensis were isolated from a trematode parasite Paragonimus westermani via a degenerate PCR method and from an insect species Anopheles gambiae by in silico analysis of the whole mosquito genome, respectively. These elements, designated PwRn1 and AgCR-1 - AgCR-14 conserved unique features including a t-RNATrp primer binding site and the unusual CHCC signature of Gag proteins. Their flanking LTRs displayed >97% nucleotide identities and thus, these elements were likely to have expanded recently in the trematode and insect genomes. They evolved heterogeneous expression strategies: a single fused ORF, two separate ORFs with an identical reading frame and two ORFs overlapped by -1 frameshifting. Phylogenetic analyses suggested that the elements with the separate ORFs had evolved from an ancestral form(s) with the overlapped ORFs. The mobile potential of PwRn1 was likely to be maintained differentially in association with the karyotype of host genomes, as was examined by the presence/absence of intergenomic polymorphism and mRNA transcripts. Our results on the structural diversity of CsRn1-like elements can provide a molecular tool to dissect a more detailed evolutionary episode of LTR retrotransposons. The PwRn1-associated genomic polymorphism, which is substantial in diploids, will also be informative in addressing genomic diversification following inter-/intra-specific hybridization in P. westermani populations.
Host Cell Virus Entry Mediated by Australian Bat Lyssavirus Envelope G glycoprotein
2013-10-24
39 Figure 7. Comparison of the amino acid sequences of Saccolaimus and Pteropus ABLV G mature protein... sequence analysis revealed that the PCR products were identical. Sequence comparisons of the ABLV N and other lyssavirus N proteins showed that ABLV...Saccolaimus flaviventris) (129). Nucleoprotein sequence comparisons revealed that the Saccolaimus N protein shared 96% amino acid homology with the Pteropus
ERIC Educational Resources Information Center
Dressler, Roswita; Dressler, Anja
2016-01-01
Teens who post on the popular social networking site Facebook in their home environment often continue to do so on second language study abroad sojourns. These sojourners use Facebook to document and make sense of their experiences in the host culture and position themselves with respect to language(s) and culture(s). This study examined one…
ERIC Educational Resources Information Center
Choi, Pik Lin
2008-01-01
This article reports a case study on two ethnic Chinese students, one from Malaysia and one from Indonesia, who chose to pursue higher education in Hong Kong. By placing the students at the center of investigation against the social, political, economic, and educational contexts of their home countries, as well as the host territory, the present…
Predicting Host Level Reachability via Static Analysis of Routing Protocol Configuration
2007-09-01
check_function_bodies = false; SET client_min_messages = warning; -- -- Name: SCHEMA public; Type: COMMENT; Schema: -; Owner: postgres -- COMMENT...public; Owner: mcmanst -- -- -- Name: public; Type: ACL; Schema: -; Owner: postgres -- REVOKE ALL ON SCHEMA public FROM PUBLIC; REVOKE...ALL ON SCHEMA public FROM postgres ; GRANT ALL ON SCHEMA public TO postgres ; GRANT ALL ON SCHEMA public TO PUBLIC; -- -- PostgreSQL database
Task Analyses for Difficult-to-Assess Collective Tasks
2014-02-01
FOR THE KLE MISSION Review and rehearse social nuances, customs, and etiquette of the host nation, e.g., gift exchange expectations. Practice... etiquette to foster rapport with the leader and demonstrate cultural awareness. Negotiate with the key leader in a manner that demonstrates...requirements for police applicants by establishing minimum entry requirements, physical fitness tests, literacy tests, and medical screening protocols
Museums and disease: using tissue archive and museum samples to study pathogens.
Tsangaras, Kyriakos; Greenwood, Alex D
2012-01-20
Molecular studies of archival and fossil samples have traditionally focused on the nucleic acids derived from the host species. However, there has recently been an increase in ancient DNA research on the identification and characterization of infectious agents within the hosts. The study of pathogens from the past provides great opportunities for discovering the causes of historical infection events, characterizing host-microorganism co-evolution and directly investigating the evolution of specific pathogens. Several research teams have been able to isolate and characterize a variety of different bacterial, parasite and viral microorganisms. However, this emerging field is not without obstacles. The diagenetic processes that make ancient DNA research generally difficult are also impediments to ancient pathogen research and perhaps more so given that their DNA may represent an even rarer proportion of the remaining nucleic acids in a fossil sample than host DNA. However, studies performed under controlled conditions and following stringent ancient DNA protocols can and have yielded reliable and often surprising results. This article reviews the advantages, problems, and failures of ancient microbiological research. Copyright © 2011 Elsevier GmbH. All rights reserved.
Alba, Annia; Marcet, Ricardo; Otero, Oscar; Hernández, Hilda M; Figueredo, Mabel; Sarracent, Jorge
2016-02-01
Purification of immunoglobulin M (IgM) antibodies could be challenging, and is often characterized by the optimization of the purification protocol to best suit the particular features of the molecule. Here, two different schemes were compared to purify, from ascites, the 1E4 IgM monoclonal antibody (mAb) previously raised against the stage of redia of the trematode Fasciola hepatica. This immunoglobulin is used as capture antibody in an immunoenzymatic assay to detect parasite ongoing infection in its intermediate hosts. The first purification protocol of the 1E4 mAb involved two chromatographic steps: an affinity chromatography on a Concanavalin A matrix followed by size exclusion chromatography. An immunoaffinity chromatography was selected as the second protocol for one-step purification of the antibody using the crude extract of adult parasites coupled to a commercial matrix. Immunoreactivity of the fractions during purification schemes was assessed by indirect immunoenzymatic assays against the crude extract of F. hepatica rediae, while purity was estimated by protein electrophoresis. Losses on the recovery of the antibody isolated by the first purification protocol occurred due to protein precipitation during the concentration of the sample and to low resolution of the size exclusion molecular chromatography step regarding this particular immunoglobulin. The immunoaffinity chromatography using F. hepatica antigens as ligands proved to be the most suitable protocol yielding a pure and immunoreactive antibody. The purification protocols used are discussed regarding efficiency and difficulties.
Feng, Min; Tan, Yan; Dai, Manman; Li, Yuanfang; Xie, Tingting; Li, Hongmei; Shi, Meiqing; Zhang, Xiquan
2016-01-01
Avian leukosis virus subgroup J (ALV-J) infection can cause tumors and immunosuppression. Endogenous viruses integrate into host genomes and can recombine with exogenous avian leukosis virus (ALV). In this study, we analyzed the interaction of endogenous retrovirus 21 ( ev21 ) with the ALV-J in late-feathering Chinese yellow chicken. Two ALV-J strains M180 and K243 were isolated from late-feathering and fast-feathering Chinese yellow chicken flocks, respectively. The env gene of the two strains showed 94.2-94.8% nucleotide identity with reference ALV-J strains. Compared with the env gene and the LTR of ev21 and M180, the nucleotide identity of LTR was 69.7% and env gene was 58.4%, respectively, especially the amino acid identity of env gene as low as 14.2%. Phylogenetic analysis of the nucleotide sequence of the env gene and the 3'LTR showed that M180 was closely related to ALV-J, and was located in a distinct group with ev21 in the phylogenetic tree. Using co-immunoprecipitation (co-IP), we next demonstrate that the envelope protein of ev21 does not interact with the M180 envelope protein. We further show that the envelope protein of ev21 cannot activate ALV-J LTR promoter activity using luciferase-reporter assays. qPCR and western blot analysis revealed that envelope protein of endogenous ev21 can facilitate the expression of PKR at 6h post ALV-J infection (hpi) and facilitate the expression of ISG12 and CH25H at 24 hpi. However, the expression of the env gene of M180 strain was not significantly at 6 and 24 hpi. We conclude that there is no evidence of recombination between endogenous retrovirus ev21 and ALV-J strain M180 in late-feathering Chinese yellow chicken, and envelope protein of ev21 can affect the expression of host ISGs, but appears not to influence the replication of ALV-J strain M180. This is the first report of interaction among the endogenous retrovirus ev21, ALV-J and the late-feathering chicken.
Pharmaceutical identifier confirmation via DART-TOF.
Easter, Jacob L; Steiner, Robert R
2014-07-01
Pharmaceutical analysis comprises a large amount of the casework in forensic controlled substances laboratories. In order to reduce the time of analysis for pharmaceuticals, a Direct Analysis in Real Time ion source coupled with an accurate mass time-of-flight (DART-TOF) mass spectrometer was used to confirm identity. DART-TOF spectral data for pharmaceutical samples were analyzed and evaluated by comparison to standard spectra. Identical mass pharmaceuticals were differentiated using collision induced dissociation fragmentation, present/absent ions, and abundance comparison box plots; principal component analysis (PCA) and linear discriminant analysis (LDA) were used for differentiation of identical mass mixed drug spectra. Mass assignment reproducibility and robustness tests were performed on the DART-TOF spectra. Impacts on the forensic science community include a decrease in analysis time over the traditional gas chromatograph/mass spectrometry (GC/MS) confirmations, better laboratory efficiency, and simpler sample preparation. Using physical identifiers and the DART-TOF to confirm pharmaceutical identity will eliminate the use of GC/MS and effectively reduce analysis time while still complying with accepted analysis protocols. This will prove helpful in laboratories with large backlogs and will simplify the confirmation process. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
[The host community of a child with food allergies: the personalized care project (PCP)].
Rancé, F
2010-12-01
The personalized care project (PCP) can manage allergic emergencies that may occur during school hours. Other objectives are to facilitate academic achievement, social and professional integration of children and adolescents with chronic illness such as food allergy, by promoting education through certain changes. The PCP is derived from official files including Circular N(o) 2003-135 of September 8 and the inter-ministerial circular of 25 June 2001. The family must request a protocol with the host school principal or school head. Then, the doctor of Education organizes the drafting of the document based on information provided by the physician (or allergist). Copyright © 2010 Elsevier Masson SAS. All rights reserved.
American origin of Cupriavidus bacteria associated with invasive Mimosa legumes in the Philippines.
Andrus, Alexis D; Andam, Cheryl; Parker, Matthew A
2012-06-01
To identify the origins of Cupriavidus nodule symbionts associated with two invasive Mimosa species in the Philippines, 22 isolates were sequenced for portions of three chromosomal genes and two symbiotic plasmid loci. Eleven isolates were identical at all gene loci (2713 bp) to a lineage found in Central America. Four other Philippine isolates were identical to a second Cupriavidus lineage distributed both in Central America and in the Caribbean. None of the remaining Philippine strains had more than 0.6% sequence divergence from American Cupriavidus lineages. These results imply that the Philippine population was founded by multiple introductions from the native range of their Mimosa hosts. © 2012 Federation of European Microbiological Societies. Published by Blackwell Publishing Ltd. All rights reserved.
The twin children of Auschwitz-Birkenau: conference on Nazi medicine.
Segal, Nancy L
2013-06-01
The twin children who survived the Holocaust and the horrific medical experiments conducted by Nazi doctors are sometimes overlooked in the relevant literature. This topic and more were discussed as part of an annual conference hosted by students from Yeshiva University's Medical Ethics Society in October 2012. A selective summary of this meeting is followed by summaries of recent twin studies concerning genetic influences on twinning, in vitro fertilization versus spontaneous twin pregnancies, gender identity disorder, and royal support for twin registries. Several human interest stories are also worth noting. They include identical twin school principals, twin loss at Sandy Hook Elementary School, timely twin documentaries, new twin and twin-like reunions, and the passing of two prominent twins.
Host-Plant Selectivity of Rhizobacteria in a Crop/Weed Model System
Zeller, Simon L.; Brandl, Helmut; Schmid, Bernhard
2007-01-01
Belowground microorganisms are known to influence plants' performance by altering the soil environment. Plant pathogens such as cyanide-producing strains of the rhizobacterium Pseudomonas may show strong host-plant selectivity. We analyzed interactions between different host plants and Pseudomonas strains and tested if these can be linked to the cyanide sensitivity of host plants, the cyanide production of bacterial strains or the plant identity from which strains had been isolated. Eight strains (four cyanide producing) were isolated from roots of four weed species and then re-inoculated on the four weed and two additional crop species. Bacterial strain composition varied strongly among the four weed species. Although all six plant species showed different reductions in root growth when cyanide was artificially applied to seedlings, they were generally not negatively affected by inoculation with cyanide-producing bacterial strains. We found a highly significant plant species x bacterial strain interaction. Partitioning this interaction into contrasts showed that it was entirely due to a strongly negative effect of a bacterial strain (Pseudomonas kilonensis/brassicacearum, isolated from Galium mollugo) on Echinochloa crus-galli. This exotic weed may not have become adapted to the bacterial strain isolated from a native weed. Our findings suggest that host-specific rhizobacteria hold some promise as biological weed-control agents. PMID:17786217
Bringing Federated Identity to Grid Computing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Teheran, Jeny
The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access formore » users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.« less
Dawson, Andrew M.; Bettgenhaeuser, Jan; Gardiner, Matthew; Green, Phon; Hernández-Pinzón, Inmaculada; Hubbard, Amelia; Moscou, Matthew J.
2015-01-01
Nonhost resistance is often conceptualized as a qualitative separation from host resistance. Classification into these two states is generally facile, as they fail to fully describe the range of states that exist in the transition from host to nonhost. This poses a problem when studying pathosystems that cannot be classified as either host or nonhost due to their intermediate status relative to these two extremes. In this study, we investigate the efficacy of the Poaceae-stripe rust (Puccinia striiformis Westend.) interaction for describing the host–nonhost landscape. First, using barley (Hordeum vulgare L.) and Brachypodium distachyon (L.) P. Beauv. We observed that macroscopic symptoms of chlorosis and leaf browning were associated with hyphal colonization by P. striiformis f. sp. tritici, respectively. This prompted us to adapt a protocol for visualizing fungal structures into a phenotypic assay that estimates the percent of leaf colonized. Use of this assay in intermediate host and intermediate nonhost systems found the frequency of infection decreases with evolutionary divergence from the host species. Similarly, we observed that the pathogen’s ability to complete its life cycle decreased faster than its ability to colonize leaf tissue, with no incidence of pustules observed in the intermediate nonhost system and significantly reduced pustule formation in the intermediate host system as compared to the host system, barley-P. striiformis f. sp. hordei. By leveraging the stripe rust pathosystem in conjunction with macroscopic and microscopic phenotypic assays, we now hope to dissect the genetic architecture of intermediate host and intermediate nonhost resistance using structured populations in barley and B. distachyon. PMID:26579142
Optical Circuit Switched Protocol
NASA Technical Reports Server (NTRS)
Monacos, Steve P. (Inventor)
2000-01-01
The present invention is a system and method embodied in an optical circuit switched protocol for the transmission of data through a network. The optical circuit switched protocol is an all-optical circuit switched network and includes novel optical switching nodes for transmitting optical data packets within a network. Each optical switching node comprises a detector for receiving the header, header detection logic for translating the header into routing information and eliminating the header, and a controller for receiving the routing information and configuring an all optical path within the node. The all optical path located within the node is solely an optical path without having electronic storage of the data and without having optical delay of the data. Since electronic storage of the header is not necessary and the initial header is eliminated by the first detector of the first switching node. multiple identical headers are sent throughout the network so that subsequent switching nodes can receive and read the header for setting up an optical data path.
A dichotomy in satellite quenching around L* galaxies
NASA Astrophysics Data System (ADS)
Phillips, John I.; Wheeler, Coral; Boylan-Kolchin, Michael; Bullock, James S.; Cooper, Michael C.; Tollerud, Erik J.
2014-01-01
We examine the star formation properties of bright (˜0.1 L*) satellites around isolated ˜L* hosts in the local Universe using spectroscopically confirmed systems in the Sloan Digital Sky Survey Data Release 7. Our selection method is carefully designed with the aid of N-body simulations to avoid groups and clusters. We find that satellites are significantly more likely to be quenched than a stellar mass-matched sample of isolated galaxies. Remarkably, this quenching occurs only for satellites of hosts that are themselves quenched: while star formation is unaffected in the satellites of star-forming hosts, satellites around quiescent hosts are more than twice as likely to be quenched than stellar-mass-matched field samples. One implication of this is that whatever shuts down star formation in isolated, passive L* galaxies also play at least an indirect role in quenching star formation in their bright satellites. The previously reported tendency for `galactic conformity' in colour/morphology may be a by-product of this host-specific quenching dichotomy. The Sérsic indices of quenched satellites are statistically identical to those of field galaxies with the same specific star formation rates, suggesting that environmental and secular quenching give rise to the same morphological structure. By studying the distribution of pairwise velocities between the hosts and satellites, we find dynamical evidence that passive host galaxies reside in dark matter haloes that are ˜45 per cent more massive than those of star-forming host galaxies of the same stellar mass. We emphasize that even around passive hosts, the mere fact that galaxies become satellites does not typically result in star formation quenching: we find that only ˜30 per cent of ˜0.1L* galaxies that fall in from the field are quenched around passive hosts, compared with ˜0 per cent around star-forming hosts.
Posledovich, Diana; Toftegaard, Tenna; Wiklund, Christer; Ehrlén, Johan; Gotthard, Karl
2015-11-01
Interactions between herbivorous insects and their host plants that are limited in time are widespread. Therefore, many insect-plant interactions result in a developmental race, where herbivores need to complete their development before plants become unsuitable, while plants strive to minimize damage from herbivores by outgrowing them. When spring phenologies of interacting species change asymmetrically in response to climate warming, there will be a change in the developmental state of host plants at the time of insect herbivore emergence. In combination with altered temperatures during the subsequent developmental period, this is likely to affect interaction strength as well as fitness of interacting species. Here, we experimentally explore whether the combined effect of phenological matching and thermal conditions influence the outcome of an insect-host interaction. We manipulated both developmental stages of the host plants at the start of the interaction and temperature during the subsequent developmental period in a model system of a herbivorous butterfly, Anthocharis cardamines, and five of its Brassicaceae host plant species. Larval performance characteristics were favoured by earlier stages of host plants at oviposition as well as by higher developmental temperatures on most of the host species. The probability of a larva needing a second host plant covered the full range from no influence of either phenological matching or temperature to strong effects of both factors, and complex interactions between them. The probability of a plant outgrowing a larva was dependent only on the species identity. This study demonstrates that climatic variation can influence the outcome of consumer-resource interactions in multiple ways and that its effects differ among host plant species. Therefore, climate warming is likely to change the temporal match between larval and plant development in some plant species, but not in the others. This is likely to have important implications for host plant use and possibly influence competitive relationships. © 2015 The Authors. Journal of Animal Ecology © 2015 British Ecological Society.
2017-01-01
Abstract The aim of this study was to investigate changes of interleukin-6 (IL-6), total antioxidant capacity (TAC) and muscle damage markers (creatine kinase (CK), myoglobin and lactate dehydrogenase (LDH)) in response to three different high-intensity interval training (HIIT) protocols of identical external work. Twelve moderately-trained males participated in the three HIIT trials which consisted of a warm-up, followed by 12 min of 15 s, 30 s or 60 s HIIT sequences with the work/rest ratio 1. The biochemical markers of inflammation, oxidative stress and muscle damage were analysed POST, 3 h and 24 h after the exercise. All HIIT protocols caused an immediate increase in IL-6, TAC, CK, myoglobin and LDH. The most pronounced between-trials differences were found for the POST-exercise changes in IL-6 (Effect size ± 90% confidence interval: 1.51 ± 0.63, 0.84 ± 0.34 and 1.80 ± 0.60 for the 15s/15s, 30s/30s and 60s/60s protocol, respectively) and myoglobin (1.11 ± 0.29, 0.45 ± 0.48 and 1.09 ± 0.22 for the 15s/15s, 30s/30s and 60s/60s protocol, respectively). There were no substantial between-trial differences in other biochemical variables. In conclusion, the 15s/15s and 60s/60s protocols might be preferred to the 30s/30s protocols in order to maximize the training stimulus. PMID:28469752
Mismatched related hematopoietic stem cell transplantation in primary immunodeficiency.
Wahadneh, Adel M; Bin Dahman, Haifa A; Abu Shukear, Mohammed E; Habahbeh, Zeyad M; Ajarmeh, Mohammad A; Zyood, Raed M; Habashneh, Mueen S
2013-11-01
Hematopoietic stem cell transplantation (HSCT) is the definitive therapy for a variety of primary immunodeficiency syndromes (PIDs). However, no more than 30% of the patients will have a human leukocyte antigen (HLA)-identical sibling. We retrospectively analyzed our results of ten patients with PID; severe combined immunodeficiency (SCID) (n = 7), hyper IgM (HIgM) (n = 1) and combined immunodeficiency (CID) (n = 2), who lacked a fully matched donor and underwent mismatched related HSCT during the period from 2008 to 2010. The median age at the time of transplantation ranged between 3 and 84 months (median 6.5 months). Peripheral blood stem cells (PBSC) were used in all HSCTs. The mean value of the peripheral CD34+ cells infused was 9.19 × 10 (6) /kg recipient weight. Patients received different conditioning protocols. All patients received anti graft versus host disease (GVHD) prophylaxis and all were engrafted. Mixed chimerism (5-55%) was noticed. GVHD was observed in 50% of the patients. Post-transplant follow-up ranged from 3 weeks to 36 months (median 15 months). Five patients are still alive while one patient developed engraftment syndrome followed by graft slippage for which a second transplant with CD34+ stem cells 5.8 × 10 (6) /kg recipient's weight was infused. The others died from sepsis and transplant-related complications. Immune reconstitution was noticed in four patients. In conclusion, HLA-haploidentical stem cell transplantation may be feasible, with appropriate GVHD prophylaxis, for patients with PID who lack a fully matched donor.
Mosimann, Ana Luiza Pamplona; de Siqueira, Mirian Krystel; Ceole, Ligia Fernanda; Nunes Duarte Dos Santos, Claudia
2018-05-29
A new isolate of Aura virus serendipitously discovered as a cell culture contaminant is reported in this manuscript. Aura virus belongs to the family Togaviridae and is classified in the genus Alphavirus. There are only two reports of Aura virus isolation from mosquitoes in the scientific literature, and the existence of a vertebrate host is still unknown. The discovery of this new isolate was based on transmission electron microscopy and nucleic acid amplification through a non-specific RT-PCR amplification protocol followed by sequencing. Genetic analysis has shown that the new virus shares a high degree of identity with the previously described isolate (GenBank: AF126284.1). A major difference was observed in the nsP3 gene in which a 234-nucleotide duplication has been identified. Furthermore, a pronounced difference was observed in cell cultures compared to the data available for the previously described isolate. Cell permissiveness and phenotypic characteristics in C6/36, Vero and BHK-21 cells were found to differ from previous reports. This may be due to the genetic differences that have been observed. The genetic and biological characteristics of the new Aura virus isolate are suggestive of viral adaptation to the cell substrate. The development of a cDNA clone will lend a perspective and better understanding of these results as well as open avenues for its use as a biotechnological tool, as seen for other alphaviruses.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tykvart, J.; Sacha, P.; Barinka, C.
2012-02-07
Affinity purification is a useful approach for purification of recombinant proteins. Eukaryotic expression systems have become more frequently used at the expense of prokaryotic systems since they afford recombinant eukaryotic proteins with post-translational modifications similar or identical to the native ones. Here, we present a one-step affinity purification set-up suitable for the purification of secreted proteins. The set-up is based on the interaction between biotin and mutated streptavidin. Drosophila Schneider 2 cells are chosen as the expression host, and a biotin acceptor peptide is used as an affinity tag. This tag is biotinylated by Escherichia coli biotin-protein ligase in vivo.more » We determined that localization of the ligase within the ER led to the most effective in vivo biotinylation of the secreted proteins. We optimized a protocol for large-scale expression and purification of AviTEV-tagged recombinant human glutamate carboxypeptidase II (Avi-GCPII) with milligram yields per liter of culture. We also determined the 3D structure of Avi-GCPII by X-ray crystallography and compared the enzymatic characteristics of the protein to those of its non-tagged variant. These experiments confirmed that AviTEV tag does not affect the biophysical properties of its fused partner. Purification approach, developed here, provides not only a sufficient amount of highly homogenous protein but also specifically and effectively biotinylates a target protein and thus enables its subsequent visualization or immobilization.« less
Hellmann, Anna-Maria; Lother, Jasmin; Wurster, Sebastian; Lutz, Manfred B.; Schmitt, Anna Lena; Morton, Charles Oliver; Eyrich, Matthias; Czakai, Kristin; Einsele, Hermann; Loeffler, Juergen
2017-01-01
Aspergillus fumigatus is the main cause of invasive fungal infections occurring almost exclusively in immunocompromised patients. An improved understanding of the initial innate immune response is key to the development of better diagnostic tools and new treatment options. Mice are commonly used to study immune defense mechanisms during the infection of the mammalian host with A. fumigatus. However, little is known about functional differences between the human and murine immune response against this fungal pathogen. Thus, we performed a comparative functional analysis of human and murine dendritic cells (DCs), macrophages, and polymorphonuclear cells (PMNs) using standardized and reproducible working conditions, laboratory protocols, and readout assays. A. fumigatus did not provoke identical responses in murine and human immune cells but rather initiated relatively specific responses. While human DCs showed a significantly stronger upregulation of their maturation markers and major histocompatibility complex molecules and phagocytosed A. fumigatus more efficiently compared to their murine counterparts, murine PMNs and macrophages exhibited a significantly stronger release of reactive oxygen species after exposure to A. fumigatus. For all studied cell types, human and murine samples differed in their cytokine response to conidia or germ tubes of A. fumigatus. Furthermore, Dectin-1 showed inverse expression patterns on human and murine DCs after fungal stimulation. These specific differences should be carefully considered and highlight potential limitations in the transferability of murine host–pathogen interaction studies. PMID:29270175
Ingala, Melissa R.; Simmons, Nancy B.; Wultsch, Claudia; Krampis, Konstantinos; Speer, Kelly A.; Perkins, Susan L.
2018-01-01
The gut microbiome is a community of host-associated symbiotic microbes that fulfills multiple key roles in host metabolism, immune function, and tissue development. Given the ability of the microbiome to impact host fitness, there is increasing interest in studying the microbiome of wild animals to better understand these communities in the context of host ecology and evolution. Human microbiome research protocols are well established, but wildlife microbiome research is still a developing field. Currently, there is no standardized set of best practices guiding the collection of microbiome samples from wildlife. Gut microflora are typically sampled either by fecal collection, rectal swabbing, or by destructively sampling the intestinal contents of the host animal. Studies rarely include more than one sampling technique and no comparison of these methods currently exists for a wild mammal. Although some studies have hypothesized that the fecal microbiome is a nested subset of the intestinal microbiome, this hypothesis has not been formally tested. To address these issues, we examined guano (feces) and distal intestinal mucosa from 19 species of free-ranging bats from Lamanai, Belize, using 16S rRNA amplicon sequencing to compare microbial communities across sample types. We found that the diversity and composition of intestine and guano samples differed substantially. In addition, we conclude that signatures of host evolution are retained by studying gut microbiomes based on mucosal tissue samples, but not fecal samples. Conversely, fecal samples retained more signal of host diet than intestinal samples. These results suggest that fecal and intestinal sampling methods are not interchangeable, and that these two microbiotas record different information about the host from which they are isolated. PMID:29765359
Ingala, Melissa R; Simmons, Nancy B; Wultsch, Claudia; Krampis, Konstantinos; Speer, Kelly A; Perkins, Susan L
2018-01-01
The gut microbiome is a community of host-associated symbiotic microbes that fulfills multiple key roles in host metabolism, immune function, and tissue development. Given the ability of the microbiome to impact host fitness, there is increasing interest in studying the microbiome of wild animals to better understand these communities in the context of host ecology and evolution. Human microbiome research protocols are well established, but wildlife microbiome research is still a developing field. Currently, there is no standardized set of best practices guiding the collection of microbiome samples from wildlife. Gut microflora are typically sampled either by fecal collection, rectal swabbing, or by destructively sampling the intestinal contents of the host animal. Studies rarely include more than one sampling technique and no comparison of these methods currently exists for a wild mammal. Although some studies have hypothesized that the fecal microbiome is a nested subset of the intestinal microbiome, this hypothesis has not been formally tested. To address these issues, we examined guano (feces) and distal intestinal mucosa from 19 species of free-ranging bats from Lamanai, Belize, using 16S rRNA amplicon sequencing to compare microbial communities across sample types. We found that the diversity and composition of intestine and guano samples differed substantially. In addition, we conclude that signatures of host evolution are retained by studying gut microbiomes based on mucosal tissue samples, but not fecal samples. Conversely, fecal samples retained more signal of host diet than intestinal samples. These results suggest that fecal and intestinal sampling methods are not interchangeable, and that these two microbiotas record different information about the host from which they are isolated.
Securing resource constraints embedded devices using elliptic curve cryptography
NASA Astrophysics Data System (ADS)
Tam, Tony; Alfasi, Mohamed; Mozumdar, Mohammad
2014-06-01
The use of smart embedded device has been growing rapidly in recent time because of miniaturization of sensors and platforms. Securing data from these embedded devices is now become one of the core challenges both in industry and research community. Being embedded, these devices have tight constraints on resources such as power, computation, memory, etc. Hence it is very difficult to implement traditional Public Key Cryptography (PKC) into these resource constrained embedded devices. Moreover, most of the public key security protocols requires both public and private key to be generated together. In contrast with this, Identity Based Encryption (IBE), a public key cryptography protocol, allows a public key to be generated from an arbitrary string and the corresponding private key to be generated later on demand. While IBE has been actively studied and widely applied in cryptography research, conventional IBE primitives are also computationally demanding and cannot be efficiently implemented on embedded system. Simplified version of the identity based encryption has proven its competence in being robust and also satisfies tight budget of the embedded platform. In this paper, we describe the choice of several parameters for implementing lightweight IBE in resource constrained embedded sensor nodes. Our implementation of IBE is built using elliptic curve cryptography (ECC).