913 resultados para pseudorandom sequence
Resumo:
The familial acute myeloid leukemia related factor gene (FAMLF) was previously identified from a familial AML subtractive cDNA library and shown to undergo alternative splicing. This study used real-time quantitative PCR to investigate the expression of the FAMLF alternative-splicing transcript consensus sequence (FAMLF-CS) in peripheral blood mononuclear cells (PBMCs) from 119 patients with de novo acute leukemia (AL) and 104 healthy controls, as well as in CD34+cells from 12 AL patients and 10 healthy donors. A 429-bp fragment from a novel splicing variant of FAMLF was obtained, and a 363-bp consensus sequence was targeted to quantify total FAMLF expression. Kruskal-Wallis, Nemenyi, Spearman's correlation, and Mann-Whitney U-tests were used to analyze the data. FAMLF-CS expression in PBMCs from AL patients and CD34+ cells from AL patients and controls was significantly higher than in control PBMCs (P<0.0001). Moreover,FAMLF-CS expression in PBMCs from the AML group was positively correlated with red blood cell count (rs=0.317, P=0.006), hemoglobin levels (rs=0.210, P=0.049), and percentage of peripheral blood blasts (rs=0.256, P=0.027), but inversely correlated with hemoglobin levels in the control group (rs=–0.391, P<0.0001). AML patients with high CD34+ expression showed significantly higherFAMLF-CS expression than those with low CD34+ expression (P=0.041). Our results showed thatFAMLF is highly expressed in both normal and malignant immature hematopoietic cells, but that expression is lower in normal mature PBMCs.
Resumo:
Sequence-Characterized Amplified Region (SCAR) appears as a useful technique for genetic purity testing and variety discrimination, applicable to species in which some other techniques have failed. In particular, this technique is very attractive with species in which RAPD results were not consistent. The RAPD polymorphic bands were cloned, sequenced and from the sequence information, primers pairs for normal PCR were developed. Since the probability of obtaining successful SCAR primers from RAPD polymorphic bands was about 50%, a larger number of RAPD polymorphic bands are needed to develop sufficient SCAR primers for varietal discrimination in vinca. In addition, the efficiency of the SCAR technique is strongly affected by the quality of DNA extracted from seeds. The SCAR banding patterns obtained from vinca seed were consistent and repeatable making the results reliable for genetic purity testing and variety discrimination. The SCAR technique is simple, fast, relatively inexpensive and allows the use of DNA extracted from dry seeds, which is very important in a seed-quality evaluating program
Resumo:
Apoptotic beta cell death is an underlying cause majorly for type I and to a lesser extent for type II diabetes. Recently, MST1 kinase was identified as a key apoptotic agent in diabetic condition. In this study, I have examined MST1 and closely related kinases namely, MST2, MST3 and MST4, aiming to tackle diabetes by exploring ways to selectively block MST1 kinase activity. The first investigation was directed towards evaluating possibilities of selectively blocking the ATP binding site of MST1 kinase that is essential for the activity of the enzymes. Structure and sequence analyses of this site however revealed a near absolute conservation between the MSTs and very few changes with other kinases. The observed residue variations also displayed similar physicochemical properties making it hard for selective inhibition of the enzyme. Second, possibilities for allosteric inhibition of the enzyme were evaluated. Analysis of the recognized allosteric site also posed the same problem as the MSTs shared almost all of the same residues. The third analysis was made on the SARAH domain, which is required for the dimerization and activation of MST1 and MST2 kinases. MST3 and MST4 lack this domain, hence selectivity against these two kinases can be achieved. Other proteins with SARAH domains such as the RASSF proteins were also examined. Their interaction with the MST1 SARAH domain were evaluated to mimic their binding pattern and design a peptide inhibitor that interferes with MST1 SARAH dimerization. In molecular simulations the RASSF5 SARAH domain was shown to strongly interact with the MST1 SARAH domain and possibly preventing MST1 SARAH dimerization. Based on this, the peptidic inhibitor was suggested to be based on the sequence of RASSF5 SARAH domain. Since the MST2 kinase also interacts with RASSF5 SARAH domain, absolute selectivity might not be achieved.
Resumo:
Variations in different types of genomes have been found to be responsible for a large degree of physical diversity such as appearance and susceptibility to disease. Identification of genomic variations is difficult and can be facilitated through computational analysis of DNA sequences. Newly available technologies are able to sequence billions of DNA base pairs relatively quickly. These sequences can be used to identify variations within their specific genome but must be mapped to a reference sequence first. In order to align these sequences to a reference sequence, we require mapping algorithms that make use of approximate string matching and string indexing methods. To date, few mapping algorithms have been tailored to handle the massive amounts of output generated by newly available sequencing technologies. In otrder to handle this large amount of data, we modified the popular mapping software BWA to run in parallel using OpenMPI. Parallel BWA matches the efficiency of multithreaded BWA functions while providing efficient parallelism for BWA functions that do not currently support multithreading. Parallel BWA shows significant wall time speedup in comparison to multithreaded BWA on high-performance computing clusters, and will thus facilitate the analysis of genome sequencing data.
Resumo:
Variation in hiring procedures occurs within fire service human resource departments. In this study, City 1 and City 2 applicants were required to pass their biophysical assessments prior to being hired as firefighters at the beginning and end of the screening process, respectively. City 1 applicants demonstrated significantly lower resting heart rate (RHR), resting diastolic blood pressure (RDBP), body fat% (BF) and higher z-scores for BF, trunk flexibility (TF) and overall clinical assessment (p<0.05). Regression analysis found that age and conducting the biophysical assessment at the end of the screening process explained poorer biophysical assessment results in BF% (R2=21%), BF z-score (R2=22%), TF z-score (R2=10%) and overall clinical assessment z-score (R2=7%). Each of RHR (OR=1.06, CI=1.01-1.10), RDBP (OR=1.05, CI=1.00-1.11) and BF% (OR=1.20, CI=1.07-1.37) increased the odds of being a City 2 firefighter (p<0.05). Biophysical screening at the end of the hiring process may result in the hiring of a less healthy firefighter.
Resumo:
The complete genome of an Erwinia amylovora bacteriophage, vB_EamM_Ea35-70 (Ea35-70), is 271,084 bp, encodes 318 putative proteins, and contains one tRNA. Comparative analysis with other Myoviridae genomes suggests that Ea35-70 is related to the Phikzlikevirus genus within the family Myoviridae, since 26% of Ea35-70 proteins share homology to proteins in Pseudomonas phage φKZ.
Resumo:
Affiliation: Département de biochimie, Faculté de médecine, Université de Montréal
Resumo:
In the present investigation, an attempt is made to study late Quaternary foraminiferal and pteropod records of the shelf of northern Kerala and to evaluate their potentiality in paleocenographic and paleoclimatic reconstruction. The study gives details of sediment cores, general characteristics of foraminifera and pteropod species recorded from the examined samples and their systematic classification, spatial distribution of Recent foraminifera and pteropods and their response to varying bathymetry, nature of substrate, organic matter content in sediment and hydrography across the shelf. An attempt is also made to establish an integrated chronostratigraphy for the examined core sections. An effort is also made to identify microfaunal criteria useful in biostratigraphic division in shallow marine core sections. An attempt is made to infer various factors responsible for the change in microfaunal assemblage. Reconstruction of sea level changes during the last 36,000 years was attempted based on the pteropod record. The study reveals a bathymetric control on benthic/planktic (BF/PF) foraminiferal and pteropods/planktic foraminiferal (Pt/PF) abundance ratio. Bathymetric distribution pattern of BF/PF ratio is opposite to the (Pt/PF) ratio with decreasing trend of former from the shore across the shelf. Quantitative benthic foraminiferal record in the surficial sediments reveals a positive correlation between the diversity and bathymetry. R-mode cluster analysis performed on 30n significant Recent benthic foraminiferal, determines three major assemblage.
Resumo:
Modern computer systems are plagued with stability and security problems: applications lose data, web servers are hacked, and systems crash under heavy load. Many of these problems or anomalies arise from rare program behavior caused by attacks or errors. A substantial percentage of the web-based attacks are due to buffer overflows. Many methods have been devised to detect and prevent anomalous situations that arise from buffer overflows. The current state-of-art of anomaly detection systems is relatively primitive and mainly depend on static code checking to take care of buffer overflow attacks. For protection, Stack Guards and I-leap Guards are also used in wide varieties.This dissertation proposes an anomaly detection system, based on frequencies of system calls in the system call trace. System call traces represented as frequency sequences are profiled using sequence sets. A sequence set is identified by the starting sequence and frequencies of specific system calls. The deviations of the current input sequence from the corresponding normal profile in the frequency pattern of system calls is computed and expressed as an anomaly score. A simple Bayesian model is used for an accurate detection.Experimental results are reported which show that frequency of system calls represented using sequence sets, captures the normal behavior of programs under normal conditions of usage. This captured behavior allows the system to detect anomalies with a low rate of false positives. Data are presented which show that Bayesian Network on frequency variations responds effectively to induced buffer overflows. It can also help administrators to detect deviations in program flow introduced due to errors.
Resumo:
This paper discusses our research in developing a generalized and systematic method for anomaly detection. The key ideas are to represent normal program behaviour using system call frequencies and to incorporate probabilistic techniques for classification to detect anomalies and intrusions. Using experiments on the sendmail system call data, we demonstrate that concise and accurate classifiers can be constructed to detect anomalies. An overview of the approach that we have implemented is provided.
Resumo:
Code clones are portions of source code which are similar to the original program code. The presence of code clones is considered as a bad feature of software as the maintenance of software becomes difficult due to the presence of code clones. Methods for code clone detection have gained immense significance in the last few years as they play a significant role in engineering applications such as analysis of program code, program understanding, plagiarism detection, error detection, code compaction and many more similar tasks. Despite of all these facts, several features of code clones if properly utilized can make software development process easier. In this work, we have pointed out such a feature of code clones which highlight the relevance of code clones in test sequence identification. Here program slicing is used in code clone detection. In addition, a classification of code clones is presented and the benefit of using program slicing in code clone detection is also mentioned in this work.
Resumo:
DNA sequence representation methods are used to denote a gene structure effectively and help in similarities/dissimilarities analysis of coding sequences. Many different kinds of representations have been proposed in the literature. They can be broadly classified into Numerical, Graphical, Geometrical and Hybrid representation methods. DNA structure and function analysis are made easy with graphical and geometrical representation methods since it gives visual representation of a DNA structure. In numerical method, numerical values are assigned to a sequence and digital signal processing methods are used to analyze the sequence. Hybrid approaches are also reported in the literature to analyze DNA sequences. This paper reviews the latest developments in DNA Sequence representation methods. We also present a taxonomy of various methods. A comparison of these methods where ever possible is also done
Resumo:
Considerable research effort has been devoted in predicting the exon regions of genes. The binary indicator (BI), Electron ion interaction pseudo potential (EIIP), Filter method are some of the methods. All these methods make use of the period three behavior of the exon region. Even though the method suggested in this paper is similar to above mentioned methods , it introduces a set of sequences for mapping the nucleotides selected by applying genetic algorithm and found to be more promising
Resumo:
The ground state (J = 0) electronic correlation energy of the 4-electron Be-sequence is calculated in the Multi-Configuration Dirac-Fock approximation for Z = 4-20. The 4 electrons were distributed over the configurations arising from the 1s, 2s, 2p, 3s, 3p and 3d orbitals. Theoretical values obtained here are in good agreement with experimental correlation energies.