926 resultados para terminological variant


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The candidate gene approach has been a pioneer in the field of genetic epidemiology, identifying risk alleles and their association with clinical traits. With the advent of rapidly changing technology, there has been an explosion of in silico tools available to researchers, giving them fast, efficient resources and reliable strategies important to find casual gene variants for candidate or genome wide association studies (GWAS). In this review, following a description of candidate gene prioritisation, we summarise the approaches to single nucleotide polymorphism (SNP) prioritisation and discuss the tools available to assess functional relevance of the risk variant with consideration to its genomic location. The strategy and the tools discussed are applicable to any study investigating genetic risk factors associated with a particular disease. Some of the tools are also applicable for the functional validation of variants relevant to the era of GWAS and next generation sequencing (NGS).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: To directly assess tumor oxygenation in resectable non - small cell lung cancers (NSCLC) and to correlate tumor pO2 and the selected gene and protein expression to treatment outcomes. Methods: Twenty patients with resectable NSCLC were enrolled. Intraoperative measurements of normal lung and tumor pO2 were done with the Eppendorf polarographic electrode. All patients had plasma osteopontin measurements by ELISA. Carbonic anhydrase-IX (CA IX) staining of tumor sections was done in the majority of patients (n = 16), as was gene expression profiling (n = 12) using cDNA microarrays. Tumor pO2 was correlated with CA IX staining, osteopontin levels, and treatment outcomes. Results: The median tumor pO2 ranged from 0.7 to 46 mm Hg (median, 16.6) and was lower than normal lung pO2 in all but one patient. Because both variables were affected by the completeness of lung deflation during measurement, we used the ratio of tumor/normal lung (T/L) pO2 as a reflection of tumor oxygenation. The median T/L pO 2 was 0.13. T/L pO2 correlated significantly with plasma osteopontin levels (r = 0.53, P = 0.02) and CA IX expression (P = 0.006). Gene expression profiling showed that high CD44 expression was a predictor for relapse, which was confirmed by tissue staining of CD44 variant 6 protein. Other variables associated with the risk of relapse were T stage (P = 0.02), T/L pO2 (P = 0.04), and osteopontin levels (P = 0.001). Conclusions: Tumor hypoxia exists in resectable NSCLC and is associated with elevated expression of osteopontin and CA IX. Tumor hypoxia and elevated osteopontin levels and CD44 expression correlated with poor prognosis. A larger study is needed to confirm the prognostic significance of these factors. © 2006 American Association for Cancer Research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The central thesis in the article is that the venture creation process is different for innovative versus imitative ventures. This holds up; the pace of the process differs by type of venture as do, in line with theory-based hypotheses, the effects of certain human capital (HC) and social capital (SC) predictors. Importantly, and somewhat unexpectedly, the theoretically derived models using HC, SC, and certain controls are relatively successful explaining progress in the creation process for the minority of innovative ventures, but achieve very limited success for the imitative majority. This may be due to a rationalistic bias in conventional theorizing and suggests that there is need for considerable theoretical development regarding the important phenomenon of new venture creation processes. Another important result is that the building up of instrumental social capital, which we assess comprehensively and as a time variant construct, is important for making progress with both types of ventures, and increasingly, so as the process progresses. This result corroborates with stronger operationalization and more appropriate analysis method what previously published research has only been able to hint at.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Diagnostics of rotating machinery has developed significantly in the last decades, and industrial applications are spreading in different sectors. Most applications are characterized by varying velocities of the shaft and in many cases transients are the most critical to monitor. In these variable speed conditions, fault symptoms are clearer in the angular/order domains than in the common time/frequency ones. In the past, this issue was often solved by synchronously sampling data by means of phase locked circuits governing the acquisition; however, thanks to the spread of cheap and powerful microprocessors, this procedure is nowadays rarer; sampling is usually performed at constant time intervals, and the conversion to the order domain is made by means of digital signal processing techniques. In the last decades different algorithms have been proposed for the extraction of an order spectrum from a signal sampled asynchronously with respect to the shaft rotational velocity; many of them (the so called computed order tracking family) use interpolation techniques to resample the signal at constant angular increments, followed by a common discrete Fourier transform to shift from the angular domain to the order domain. A less exploited family of techniques shifts directly from the time domain to the order spectrum, by means of modified Fourier transforms. This paper proposes a new transform, named velocity synchronous discrete Fourier transform, which takes advantage of the instantaneous velocity to improve the quality of its result, reaching performances that can challenge the computed order tracking.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the scheme satisfies a notion which is stronger than the classical full key exposure setting as even if the keypair of the signing user is adversarially chosen, the statistical distance between signatures of different users remains negligible. Considering unforgeability, the best lattice-based ring signature schemes provide either unforgeability against arbitrary chosen subring attacks or insider corruption in log-sized rings. In this paper we present two variants of our scheme. In the basic one, unforgeability is ensured in those two settings. Increasing signature and key sizes by a factor k (typically 80 − 100), we provide a variant in which unforgeability is ensured against insider corruption attacks for arbitrary rings. The technique used is pretty general and can be adapted to other existing schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

AIMS: To investigate the evolutionary origins of Australian healthcare-associated (HCA) methicillin-resistant Staphylococcus aureus (MRSA) strains from a panel of historical isolates typed using current genotyping techniques. METHODS: Nineteen MRSA isolates from 1965 to 1981 were examined and antibiotic susceptibility profiles determined. Genetic characterisation included real-time (RT) polymerase chain reaction (PCR) assays to identify single nucleotide polymorhpism (SNP) clonal complexes (SNP CC) and sequence type (SNP ST), multi locus sequence typing (MLST) and staphylococcal chromosomal cassette mec typing. RESULTS: All SNP CC30 isolates belonged to a novel sequence type, ST2249. All SNP CC239 isolates were confirmed as ST239-MRSA-III, except for a new single locus variant of ST239, ST2275. A further new type, ST2276, was identified. CONCLUSIONS: The earliest MRSA examined from 1965 was confirmed as ST250-MRSA-I, consistent with archaic European types. Identification of ST1-MRSA-IV in 1981 is the earliest appearance of this clinically important lineage which manifested in Australia and the United States in the 1990s. A previously unknown multi-resistant clone, ST2249-MRSA-III, was identified from 1973. Gentamicin resistance first appeared in this novel strain from 1976 and not ST239 as previously suspected. Thus, ST2249 was present in the earliest phase of the HCA MRSA epidemic in eastern Australia and was perhaps related to the emergence of the globally epidemic strain ST239.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For TREC Crowdsourcing 2011 (Stage 2) we propose a networkbased approach for assigning an indicative measure of worker trustworthiness in crowdsourced labelling tasks. Workers, the gold standard and worker/gold standard agreements are modelled as a network. For the purpose of worker trustworthiness assignment, a variant of the PageRank algorithm, named TurkRank, is used to adaptively combine evidence that suggests worker trustworthiness, i.e., agreement with other trustworthy co-workers and agreement with the gold standard. A single parameter controls the importance of co-worker agreement versus gold standard agreement. The TurkRank score calculated for each worker is incorporated with a worker-weighted mean label aggregation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been standardized by IEEE, but until recently, its security analysis relied only on heuristic arguments. Recently, Stehlé and Steinfeld showed that a slight variant (that we call pNE) could be proven to be secure under chosen-plaintext attack (IND-CPA), assuming the hardness of worst-case problems in ideal lattices. We present a variant of pNE called NTRUCCA, that is IND-CCA2 secure in the standard model assuming the hardness of worst-case problems in ideal lattices, and only incurs a constant factor overhead in ciphertext and key length over the pNE scheme. To our knowledge, our result gives the first IND-CCA2 secure variant of NTRUEncrypt in the standard model, based on standard cryptographic assumptions. As an intermediate step, we present a construction for an All-But-One (ABO) lossy trapdoor function from pNE, which may be of independent interest. Our scheme uses the lossy trapdoor function framework of Peikert and Waters, which we generalize to the case of (k − 1)-of-k-correlated input distributions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Automated process discovery techniques aim at extracting process models from information system logs. Existing techniques in this space are effective when applied to relatively small or regular logs, but generate spaghetti-like and sometimes inaccurate models when confronted to logs with high variability. In previous work, trace clustering has been applied in an attempt to reduce the size and complexity of automatically discovered process models. The idea is to split the log into clusters and to discover one model per cluster. This leads to a collection of process models – each one representing a variant of the business process – as opposed to an all-encompassing model. Still, models produced in this way may exhibit unacceptably high complexity and low fitness. In this setting, this paper presents a two-way divide-and-conquer process discovery technique, wherein the discovered process models are split on the one hand by variants and on the other hand hierarchically using subprocess extraction. Splitting is performed in a controlled manner in order to achieve user-defined complexity or fitness thresholds. Experiments on real-life logs show that the technique produces collections of models substantially smaller than those extracted by applying existing trace clustering techniques, while allowing the user to control the fitness of the resulting models.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Potent and specific enzyme inhibition is a key goal in the development of therapeutic inhibitors targeting proteolytic activity. The backbone-cyclized peptide, Sunflower Trypsin Inhibitor (SFTI-1) affords a scaffold that can be engineered to achieve both these aims. SFTI-1's mechanism of inhibition is unusual in that it shows fast-on/slow-off kinetics driven by cleavage and religation of a scissile bond. This phenomenon was used to select a nanomolar inhibitor of kallikrein-related peptidase 7 (KLK7) from a versatile library of SFTI variants with diversity tailored to exploit distinctive surfaces present in the active site of serine proteases. Inhibitor selection was achieved through the use of size exclusion chromatography to separate protease/inhibitor complexes from unbound inhibitors followed by inhibitor identification according to molecular mass ascertained by mass spectrometry. This approach identified a single dominant inhibitor species with molecular weight of 1562.4 Da, which is consistent with the SFTI variant SFTI-WCTF. Once synthesized individually this inhibitor showed an IC50 of 173.9 ± 7.6 nM against chromogenic substrates and could block protein proteolysis. Molecular modeling analysis suggested that selection of SFTI-WCTF was driven by specific aromatic interactions and stabilized by an enhanced internal hydrogen bonding network. This approach provides a robust and rapid route to inhibitor selection and design.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We study two problems of online learning under restricted information access. In the first problem, prediction with limited advice, we consider a game of prediction with expert advice, where on each round of the game we query the advice of a subset of M out of N experts. We present an algorithm that achieves O(√(N/M)TlnN ) regret on T rounds of this game. The second problem, the multiarmed bandit with paid observations, is a variant of the adversarial N-armed bandit game, where on round t of the game we can observe the reward of any number of arms, but each observation has a cost c. We present an algorithm that achieves O((cNlnN) 1/3 T2/3+√TlnN ) regret on T rounds of this game in the worst case. Furthermore, we present a number of refinements that treat arm- and time-dependent observation costs and achieve lower regret under benign conditions. We present lower bounds that show that, apart from the logarithmic factors, the worst-case regret bounds cannot be improved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The selection of cytochrome P450 enzymes from large variant libraries, and the subsequent use of these enzymes in preparative scale biotransformations, remains a formidable challenge due to the complexities of the associated electron transport systems. Here, a powerful approach for the generation and screening of P450cam libraries for new function is presented that is both flexible and robust. A targeted library was generated wherein only the P450cam active-site amino acids Y96 and F98 were fully randomized and biotransformations, using a novel P450cam whole-cell system, were screened by GC–MS for the hydroxylation of diphenylmethane. One in 50 of the reactions screened, including 16 different variants, produced 4-hydroxydiphenylmethane with up to 92% conversion observed in the case of the Y96A variant. These results demonstrate a primary example of the screening of P450cam libraries in a format that is compatible with extension to preparative scale reactions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Epithelial-to-mesenchymal transition (EMT) promotes cell migration and is important in metastasis. Cellular proliferation is often downregulated during EMT, and the reverse transition (MET) in metastases appears to be required for restoration of proliferation in secondary tumors. We studied the interplay between EMT and proliferation control by MYB in breast cancer cells. Methods MYB, ZEB1, and CDH1 expression levels were manipulated by lentiviral small-hairpin RNA (shRNA)-mediated knockdown/overexpression, and verified with Western blotting, immunocytochemistry, and qRT-PCR. Proliferation was assessed with bromodeoxyuridine pulse labeling and flow cytometry, and sulforhodamine B assays. EMT was induced with epidermal growth factor for 9 days or by exposure to hypoxia (1% oxygen) for up to 5 days, and assessed with qRT-PCR, cell morphology, and colony morphology. Protein expression in human breast cancers was assessed with immunohistochemistry. ZEB1-MYB promoter binding and repression were determined with Chromatin Immunoprecipitation Assay and a luciferase reporter assay, respectively. Student paired t tests, Mann–Whitney, and repeated measures two-way ANOVA tests determined statistical significance (P < 0.05). Results Parental PMC42-ET cells displayed higher expression of ZEB1 and lower expression of MYB than did the PMC42-LA epithelial variant. Knockdown of ZEB1 in PMC42-ET and MDA-MB-231 cells caused increased expression of MYB and a transition to a more epithelial phenotype, which in PMC42-ET cells was coupled with increased proliferation. Indeed, we observed an inverse relation between MYB and ZEB1 expression in two in vitro EMT cell models, in matched human breast tumors and lymph node metastases, and in human breast cancer cell lines. Knockdown of MYB in PMC42-LA cells (MYBsh-LA) led to morphologic changes and protein expression consistent with an EMT. ZEB1 expression was raised in MYBsh-LA cells and significantly repressed in MYB-overexpressing MDA-MB-231 cells, which also showed reduced random migration and a shift from mesenchymal to epithelial colony morphology in two dimensional monolayer cultures. Finally, we detected binding of ZEB1 to MYB promoter in PMC42-ET cells, and ZEB1 overexpression repressed MYB promoter activity. Conclusions This work identifies ZEB1 as a transcriptional repressor of MYB and suggests a reciprocal MYB-ZEB1 repressive relation, providing a mechanism through which proliferation and the epithelial phenotype may be coordinately modulated in breast cancer cells.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Arabidopsis, the identity of perianth and reproductive organs are specified by antagonistic action of two floral homeotic genes, APETALA2 (AP2) and AGAMOUS (AG). AP2 is also negatively regulated by an evolutionary conserved interaction with a microRNA, miR172, and has additional roles in general plant development. A kiwifruit gene with high levels of homology to AP2 and AP2-like genes from other plant species was identified. The transcript was abundant in the kiwifruit flower, particularly petal, suggesting a role in floral organ identity. Splice variants were identified, all containing both AP2 domains, including a variant that potentially produces a shorter transcript without the miRNA172 targeting site. Increased AP2 transcript accumulation was detected in the aberrant flowers of the mutant 'Pukekohe dwarf' with multiple perianth whorls and extended petaloid features. In contrast to normal kiwifruit flowers, the aberrant flowers failed to accumulate miR172 in the developing whorls, although accumulation was detected at the base of the flower. An additional role during dormancy in kiwifruit was proposed based on AP2 transcript accumulation in axillary buds before and after budbreak.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mendel's paper 'Versuche über Pflanzen-Hybriden' is the best known in a series of studies published in the late 18th and 19th centuries that built our understanding of the mechanism of inheritance. Mendel investigated the segregation of seven gene characters of pea (Pisum sativum), of which four have been identified. Here, we review what is known about the molecular nature of these genes, which encode enzymes (R and Le), a biochemical regulator (I) and a transcription factor (A). The mutations are: a transposon insertion (r), an amino acid insertion (i), a splice variant (a) and a missense mutation (le-1). The nature of the three remaining uncharacterized characters (green versus yellow pods, inflated versus constricted pods, and axial versus terminal flowers) is discussed.