87 research outputs found

    Tumor taxonomy for the developmental lineage classification of neoplasms

    Get PDF
    BACKGROUND: The new "Developmental lineage classification of neoplasms" was described in a prior publication. The classification is simple (the entire hierarchy is described with just 39 classifiers), comprehensive (providing a place for every tumor of man), and consistent with recent attempts to characterize tumors by cytogenetic and molecular features. A taxonomy is a list of the instances that populate a classification. The taxonomy of neoplasia attempts to list every known term for every known tumor of man. METHODS: The taxonomy provides each concept with a unique code and groups synonymous terms under the same concept. A Perl script validated successive drafts of the taxonomy ensuring that: 1) each term occurs only once in the taxonomy; 2) each term occurs in only one tumor class; 3) each concept code occurs in one and only one hierarchical position in the classification; and 4) the file containing the classification and taxonomy is a well-formed XML (eXtensible Markup Language) document. RESULTS: The taxonomy currently contains 122,632 different terms encompassing 5,376 neoplasm concepts. Each concept has, on average, 23 synonyms. The taxonomy populates "The developmental lineage classification of neoplasms," and is available as an XML file, currently 9+ Megabytes in length. A representation of the classification/taxonomy listing each term followed by its code, followed by its full ancestry, is available as a flat-file, 19+ Megabytes in length. The taxonomy is the largest nomenclature of neoplasms, with more than twice the number of neoplasm names found in other medical nomenclatures, including the 2004 version of the Unified Medical Language System, the Systematized Nomenclature of Medicine Clinical Terminology, the National Cancer Institute's Thesaurus, and the International Classification of Diseases Oncolology version. CONCLUSIONS: This manuscript describes a comprehensive taxonomy of neoplasia that collects synonymous terms under a unique code number and assigns each tumor to a single class within the tumor hierarchy. The entire classification and taxonomy are available as open access files (in XML and flat-file formats) with this article

    CSI-OMIM - Clinical Synopsis Search in OMIM

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The OMIM database is a tool used daily by geneticists. Syndrome pages include a Clinical Synopsis section containing a list of known phenotypes comprising a clinical syndrome. The phenotypes are in free text and different phrases are often used to describe the same phenotype, the differences originating in spelling variations or typing errors, varying sentence structures and terminological variants.</p> <p>These variations hinder searching for syndromes or using the large amount of phenotypic information for research purposes. In addition, negation forms also create false positives when searching the textual description of phenotypes and induce noise in text mining applications.</p> <p>Description</p> <p>Our method allows efficient and complete search of OMIM phenotypes as well as improved data-mining of the OMIM phenome. Applying natural language processing, each phrase is tagged with additional semantic information using UMLS and MESH. Using a grammar based method, annotated phrases are clustered into groups denoting similar phenotypes. These groups of synonymous expressions enable precise search, as query terms can be matched with the many variations that appear in OMIM, while avoiding over-matching expressions that include the query term in a negative context. On the basis of these clusters, we computed pair-wise similarity among syndromes in OMIM. Using this new similarity measure, we identified 79,770 new connections between syndromes, an average of 16 new connections per syndrome. Our project is Web-based and available at <url>http://fohs.bgu.ac.il/s2g/csiomim</url></p> <p>Conclusions</p> <p>The resulting enhanced search functionality provides clinicians with an efficient tool for diagnosis. This search application is also used for finding similar syndromes for the candidate gene prioritization tool S2G.</p> <p>The enhanced OMIM database we produced can be further used for bioinformatics purposes such as linking phenotypes and genes based on syndrome similarities and the known genes in Morbidmap.</p

    Mapping Differentiation under Mixed Culture Conditions Reveals a Tunable Continuum of T Cell Fates

    Get PDF
    Cell differentiation is typically directed by external signals that drive opposing regulatory pathways. Studying differentiation under polarizing conditions, with only one input signal provided, is limited in its ability to resolve the logic of interactions between opposing pathways. Dissection of this logic can be facilitated by mapping the system's response to mixtures of input signals, which are expected to occur in vivo, where cells are simultaneously exposed to various signals with potentially opposing effects. Here, we systematically map the response of naïve T cells to mixtures of signals driving differentiation into the Th1 and Th2 lineages. We characterize cell state at the single cell level by measuring levels of the two lineage-specific transcription factors (T-bet and GATA3) and two lineage characteristic cytokines (IFN-γ and IL-4) that are driven by these transcription regulators. We find a continuum of mixed phenotypes in which individual cells co-express the two lineage-specific master regulators at levels that gradually depend on levels of the two input signals. Using mathematical modeling we show that such tunable mixed phenotype arises if autoregulatory positive feedback loops in the gene network regulating this process are gradual and dominant over cross-pathway inhibition. We also find that expression of the lineage-specific cytokines follows two independent stochastic processes that are biased by expression levels of the master regulators. Thus, cytokine expression is highly heterogeneous under mixed conditions, with subpopulations of cells expressing only IFN-γ, only IL-4, both cytokines, or neither. The fraction of cells in each of these subpopulations changes gradually with input conditions, reproducing the continuous internal state at the cell population level. These results suggest a differentiation scheme in which cells reflect uncertainty through a continuously tuneable mixed phenotype combined with a biased stochastic decision rather than a binary phenotype with a deterministic decision

    Multistable Decision Switches for Flexible Control of Epigenetic Differentiation

    Get PDF
    It is now recognized that molecular circuits with positive feedback can induce two different gene expression states (bistability) under the very same cellular conditions. Whether, and how, cells make use of the coexistence of a larger number of stable states (multistability) is however largely unknown. Here, we first examine how autoregulation, a common attribute of genetic master regulators, facilitates multistability in two-component circuits. A systematic exploration of these modules' parameter space reveals two classes of molecular switches, involving transitions in bistable (progression switches) or multistable (decision switches) regimes. We demonstrate the potential of decision switches for multifaceted stimulus processing, including strength, duration, and flexible discrimination. These tasks enhance response specificity, help to store short-term memories of recent signaling events, stabilize transient gene expression, and enable stochastic fate commitment. The relevance of these circuits is further supported by biological data, because we find them in numerous developmental scenarios. Indeed, many of the presented information-processing features of decision switches could ultimately demonstrate a more flexible control of epigenetic differentiation

    Universal Forgery Attack against GCM-RUP

    Get PDF
    International audienceAuthenticated encryption (AE) schemes are widely used to secure communications because they can guarantee both confidentiality and authenticity of a message. In addition to the standard AE security notion, some recent schemes offer extra robustness, i.e. they maintain security in some misuse scenarios. In particular, Ashur, Dunkelman and Luykx proposed a generic AE construction at CRYPTO'17 that is secure even when releasing unverified plaintext (the RUP setting), and a concrete instantiation, GCM-RUP. The designers proved that GCM-RUP is secure up to the birthday bound in the nonce-respecting model. In this paper, we perform a birthday-bound universal forgery attack against GCM-RUP, matching the bound of the proof. While there are simple distinguishing attacks with birthday complexity on GCM-RUP, our attack is much stronger: we have a partial key recovery leading to universal forgeries. For reference, the best known universal forgery attack against GCM requires 2 2n/3 operations, and many schemes do not have any known universal forgery attacks faster than 2 n. This suggests that GCM-RUP offers a different security trade-off than GCM: stronger protection in the RUP setting, but more fragile when the data complexity reaches the birthday bound. In order to avoid this attack, we suggest a minor modification of GCM-RUP that seems to offer better robustness at the birthday bound

    Wild chimpanzees modify modality of gestures according to the strength of social bonds and personal network size

    Get PDF
    Primates form strong and enduring social bonds with others and these bonds have important fitness consequences. However, how different types of communication are associated with different types of social bonds is poorly understood. Wild chimpanzees have a large repertoire of gestures, from visual gestures to tactile and auditory gestures. We used social network analysis to examine the association between proximity bonds (time spent in close proximity) and rates of gestural communication in pairs of chimpanzees when the intended recipient was within 10 m of the signaller. Pairs of chimpanzees with strong proximity bonds had higher rates of visual gestures, but lower rates of auditory long-range and tactile gestures. However, individual chimpanzees that had a larger number of proximity bonds had higher rates of auditory and tactile gestures and lower rates of visual gestures. These results suggest that visual gestures may be an efficient way to communicate with a small number of regular interaction partners, but that tactile and auditory gestures may be more effective at communicating with larger numbers of weaker bonds. Increasing flexibility of communication may have played an important role in managing differentiated social relationships in groups of increasing size and complexity in both primate and human evolution

    Barrier Tissue Macrophages: Functional Adaptation to Environmental Challenges

    Get PDF
    Macrophages are found throughout the body, where they have crucial roles in tissue development, homeostasis and remodeling, as well as being sentinels of the innate immune system that can contribute to protective immunity and inflammation. Barrier tissues, such as the intestine, lung, skin and liver, are exposed constantly to the outside world, which places special demands on resident cell populations such as macrophages. Here we review the mounting evidence that although macrophages in different barrier tissues may be derived from distinct progenitors, their highly specific properties are shaped by the local environment, which allows them to adapt precisely to the needs of their anatomical niche. We discuss the properties of macrophages in steady-state barrier tissues, outline the factors that shape their differentiation and behavior and describe how macrophages change during protective immunity and inflammation

    Optimal Forgeries Against Polynomial-Based MACs and GCM

    Get PDF
    Polynomial-based authentication algorithms, such as GCM and Poly1305, have seen widespread adoption in practice. Due to their importance, a significant amount of attention has been given to understanding and improving both proofs and attacks against such schemes. At EUROCRYPT 2005, Bernstein published the best known analysis of the schemes when instantiated with PRPs, thereby establishing the most lenient limits on the amount of data the schemes can process per key. A long line of work, initiated by Handschuh and Preneel at CRYPTO 2008, finds the best known attacks, advancing our understanding of the fragility of the schemes. Yet surprisingly, no known attacks perform as well as the predicted worst-case attacks allowed by Bernstein\u27s analysis, nor has there been any advancement in proofs improving Bernstein\u27s bounds, and the gap between attacks and analysis is significant. We settle the issue by finding a novel attack against polynomial-based authentication algorithms using PRPs, and combine it with new analysis, to show that Bernstein\u27s bound, and our attacks, are optimal

    An early history of T cell-mediated cytotoxicity.

    Get PDF
    After 60 years of intense fundamental research into T cell-mediated cytotoxicity, we have gained a detailed knowledge of the cells involved, specific recognition mechanisms and post-recognition perforin-granzyme-based and FAS-based molecular mechanisms. What could not be anticipated at the outset was how discovery of the mechanisms regulating the activation and function of cytotoxic T cells would lead to new developments in cancer immunotherapy. Given the profound recent interest in therapeutic manipulation of cytotoxic T cell responses, it is an opportune time to look back on the early history of the field. This Timeline describes how the early findings occurred and eventually led to current therapeutic applications
    corecore