17 research outputs found

    Genome Sequence of the Pea Aphid Acyrthosiphon pisum

    Get PDF
    Aphids are important agricultural pests and also biological models for studies of insect-plant interactions, symbiosis, virus vectoring, and the developmental causes of extreme phenotypic plasticity. Here we present the 464 Mb draft genome assembly of the pea aphid Acyrthosiphon pisum. This first published whole genome sequence of a basal hemimetabolous insect provides an outgroup to the multiple published genomes of holometabolous insects. Pea aphids are host-plant specialists, they can reproduce both sexually and asexually, and they have coevolved with an obligate bacterial symbiont. Here we highlight findings from whole genome analysis that may be related to these unusual biological features. These findings include discovery of extensive gene duplication in more than 2000 gene families as well as loss of evolutionarily conserved genes. Gene family expansions relative to other published genomes include genes involved in chromatin modification, miRNA synthesis, and sugar transport. Gene losses include genes central to the IMD immune pathway, selenoprotein utilization, purine salvage, and the entire urea cycle. The pea aphid genome reveals that only a limited number of genes have been acquired from bacteria; thus the reduced gene count of Buchnera does not reflect gene transfer to the host genome. The inventory of metabolic genes in the pea aphid genome suggests that there is extensive metabolite exchange between the aphid and Buchnera, including sharing of amino acid biosynthesis between the aphid and Buchnera. The pea aphid genome provides a foundation for post-genomic studies of fundamental biological questions and applied agricultural problems

    Can we Trust Untargeted Metabolomics: Results of the Metabo-ring Initiative, a Large-scale Multi-instruments Inter-laboratoire Study

    Get PDF
    The metabo-ring initiative brought together five nuclear magnetic resonance instruments (NMR) and 11different mass spectrometers with the objective of assessing the reliability of untargeted metabolomics approaches in obtaining comparable metabolomics profiles. This was estimated by measuring the proportion of common spectral information extracted from the different LCMS and NMR platforms. Biological samples obtained from 2 different conditions were analysed by the partners using their own inhouse protocols. Test #1 examined urine samples from adult volunteers either spiked or not spiked with 32 metabolite standards. Test #2 involved a low biological contrast situation comparing the plasma of rats fed a diet either supplementedor not with vitamin D. The spectral information from each instrument was assembled into separate statisticalblocks. Correlations between blocks (e.g., instruments) were examined (RV coefficients) along with the structure of the common spectral information (common components and specific weights analysis). In addition, in Test #1, an outlier individual was blindly introduced, and its identification by the various platforms was evaluated. Despite large differences in the number of spectral features produced after post-processing and the heterogeneity of the analytical conditions and the data treatment, the spectral information both within (NMR and LCMS) and across methods (NMR vs. LCMS) was highly convergent (from 64 to 91 % on average). No effect of the LCMS instrumentation (TOF, QTOF, LTQ-Orbitrap) was noted. The outlier individual was best detected and characterised by LCMS instruments. In conclusion, untargeted metabolomics analyses report consistent information within and across instruments of various technologies, even without prior standardisation

    Workplace Violence

    No full text
    This multidisciplinary volume assembles current findings on violent crime, behavioral, biological, and sociological perspectives on its causes, and effective methods of intervention and prevention. Noted experts across diverse fields apply a behavioral criminology lens to examine crimes committed by minors, extremely violent offenses, sexual offending, violence in families, violence in high-risk settings, and crimes of recent and emerging interest. The work of mental health practitioners and researchers is shown informing law enforcement response to crime in interrogation, investigative analysis, hostage negotiations, and other core strategies. In addition, chapters pay special attention to criminal activities that violate traditional geographic boundaries, from cyberstalking to sex trafficking to international terrorism. Among the topics in the Handbook: Dyadic conceptualization, measurement, and analysis of family violence. School bullying and cyberbullying: prevalence, characteristics, outcomes, and prevention. A cultural and psychological perspective on mass murder. Young people displaying problematic sexual behavior: the research and their words. Child physical abuse and neglect. Criminal interviewing and interrogation in serious crime investigations. Violence in correctional settings. Foundations of threat assessment and management. The Handbook of Behavioral Criminology is a meticulous resource for researchers in criminology, psychology, sociology, and related fields. It also informs developers of crime prevention programs and practitioners assessing and intervening with criminal clients and in correctional facilities.https://nsuworks.nova.edu/cps_facbooks/1560/thumbnail.jp

    Antagonistic Interactions Among Yeasts

    No full text

    Genome Sequence of the Pea Aphid Acyrthosiphon pisum

    No full text
    corecore