100 research outputs found
EpitopeViewer: a Java application for the visualization and analysis of immune epitopes in the Immune Epitope Database and Analysis Resource (IEDB)
BACKGROUND: Structural information about epitopes, particularly the three-dimensional (3D) structures of antigens in complex with immune receptors, presents a valuable source of data for immunology. This information is available in the Protein Data Bank (PDB) and provided in curated form by the Immune Epitope Database and Analysis Resource (IEDB). With continued growth in these data and the importance in understanding molecular level interactions of immunological interest there is a need for new specialized molecular visualization and analysis tools. RESULTS: The EpitopeViewer is a platform-independent Java application for the visualization of the three-dimensional structure and sequence of epitopes and analyses of their interactions with antigen-specific receptors of the immune system (antibodies, T cell receptors and MHC molecules). The viewer renders both 3D views and two-dimensional plots of intermolecular interactions between the antigen and receptor(s) by reading curated data from the IEDB and/or calculated on-the-fly from atom coordinates from the PDB. The 3D views and associated interactions can be saved for future use and publication. The EpitopeViewer can be accessed from the IEDB Web site through the quick link 'Browse Records by 3D Structure.' CONCLUSION: The EpitopeViewer is designed and been tested for use by immunologists with little or no training in molecular graphics. The EpitopeViewer can be launched from most popular Web browsers without user intervention. A Java Runtime Environment (RJE) 1.4.2 or higher is required
Fate of patients with spinal cord ischemia complicating thoracic endovascular aortic repair
ObjectiveSpinal cord ischemia (SCI) is a potentially devastating complication of thoracic endovascular aortic repair (TEVAR) that can result in varying degrees of short-term and permanent disability. This study was undertaken to describe the clinical outcomes, long-term functional impact, and influence on survival of SCI after TEVAR.MethodsA retrospective review of all TEVAR patients at the University of Florida from 2000 to 2011 was performed to identify individuals experiencing SCI, defined by any new lower extremity neurologic deficit not attributable to another cause. SCI was dichotomized into immediate or delayed onset, with immediate onset defined as SCI noted upon awakening from anesthesia, and delayed characterized as a period of normal function, followed by development of neurologic injury. Ambulatory status was determined using database query, record review, and phone interviews with patients and/or family. Mortality was estimated using life-table analysis.ResultsA total of 607 TEVARs were performed for various indications, with 57 patients (9.4%) noted to have postoperative SCI (4.3% permanent). SCI patients were more likely to be older (63.9 ± 15.6 vs 70.5 ± 11.2 years; P = .002) and have a number of comorbidities, including chronic obstructive pulmonary disease, hypertension, dyslipidemia, and cerebrovascular disease (P < .0001). At some point in their care, a cerebrospinal fluid drain was placed in 54 patients (95%), with 54% placed postoperatively. In-hospital mortality was 8.8% for the entire cohort (SCI vs no SCI; P = .45). SCI developed immediately in 12 patients, delayed onset in 40, and indeterminate in five patients due to indiscriminate timing from postoperative sedation. Three patients (25%) with immediate SCI had measurable functional improvement (FI), whereas 28 (70%) of the delayed-onset patients experienced some degree of neurologic recovery (P = .04). Of the 34 patients with complete data available, 26 (76%) reported quantifiable FI, but only 13 (38%) experienced return to their preoperative baseline. Estimated mean (± standard error) survival for patients with and without SCI was 37.2 ± 4.5 and 71.6 ± 3.9 months (P < .0006), respectively. Patients with FI had a mean survival of 53.9 ± 5.9 months compared with 9.6 ± 3.6 months for those without improvement (P < .0001). Survival and return of neurologic function were not significantly different when patients with preoperative and postoperative cerebrospinal fluid drains were compared.ConclusionsThe minority of patients experience complete return to baseline function after SCI with TEVAR, and outcomes in patients without early functional recovery are particularly dismal. Patients experiencing delayed SCI are more likely to have FI and may anticipate similar life-expectancy with neurologic recovery compared with patients without SCI. Timing of drain placement does not appear to have an impact on postdischarge FI or long-term mortality
Recommended from our members
Securing mobile code.
If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements on this method as well as demonstrating its implementation for various algorithms. We also examine cryptographic techniques to achieve obfuscation including encrypted functions and offer a new application to digital signature algorithms. To better understand the lack of security proofs for obfuscation techniques, we examine in detail general theoretical models of obfuscation. We explain the need for formal models in order to obtain provable security and the progress made in this direction thus far. Finally we tackle the problem of verifying remote execution. We introduce some methods of verifying remote exponentiation computations and some insight into generic computation checking
British Gynaecological Cancer Society recommendations and guidance on patient-initiated follow-up (PIFU)
The National Cancer Survivorship Initiative through the National Health Service (NHS) improvement in the UK started the implementation of stratified pathways of patient-initiated follow-up (PIFU) across various tumor types. Now the initiative is continued through the Living With and Beyond Cancer program by NHS England. Evidence from non-randomized studies and systematic reviews does not demonstrate a survival advantage to the long-established practice of hospital-based follow-up regimens, traditionally over 5 years. Evidence shows that patient needs are inadequately met under the traditional follow-up programs and there is therefore an urgent need to adapt pathways to the needs of patients. The assumption that hospital-based follow-up is able to detect cancer recurrences early and hence improve patient prognosis has not been validated. A recent survey demonstrates that follow-up practice across the UK varies widely, with telephone follow-up clinics, nurse-led clinics and PIFU becoming increasingly common. There are currently no completed randomized controlled trials in PIFU in gynecological malignancies, although there is a drive towards implementing PIFU. PIFU aims to individualize patient care, based on risk of recurrence and holistic needs, and optimizing resources. The British Gynaecological Cancer Society wishes to provide the gynecological oncology community with guidance and a recommendations statement regarding the value, indications, and limitations of PIFU in endometrial, cervical, ovarian, and vulvar cancers in an effort to standardize practice and improve patient care. [Abstract copyright: © IGCS and ESGO 2020. No commercial re-use. See rights and permissions. Published by BMJ.
Recommended from our members
The evolution of the Behavioural Approach System (BAS): Cooperative and competitive resource acquisition strategies
The nature of approach motivation has not yet been adequately defined. Some authors view it as a unidimensional construct, while others consider it to be multidimensional. Its psychometric nature is explored in this study, which tests empirically the motivational account of the Behavioural Approach System (BAS) within an evolutionary context. In a sample of 394 participants, we administered the Assessment of Individual Motives questionnaire (AIM-Q), the Reinforcement Sensitivity Theory Personality Questionnaire (RST-PQ) and a short version of the Sensitivity to Punishment and Sensitivity to Reward (SPSRQ-20). The results of set correlation analysis indicated that different BAS scales relate to different motives, thus supporting the multidimensional perspective on approach motivation. Specifically, Reward Interest relates to various types of motives that generally reflect sensitivity to social rewards; Goal-Drive Persistence relates to social exchange, Reward Reactivity to safety and commitment; while Impulsivity and Sensitivity to Reward (SR) relate to competitive motives. These results are discussed within an evolutionary framework for the multidimensionality of the BAS
Impact of prolonged sitting on vascular function in young girls
Excessive sedentary behaviour has serious clinical and public health implications; however, the physiological changes that accompany prolonged sitting in the child are not completely understood. Herein, we examined the acute effect a prolonged period of sitting has upon superficial femoral artery function in 7- to 10-year-old girls and the impact of interrupting prolonged sitting with exercise breaks. Superficial femoral artery endothelium-dependent flow-mediated dilatation, total shear rate, anterograde and retrograde shear rates and oscillatory shear index were assessed before and after two experimental conditions: a 3 h uninterrupted period of sitting (SIT) and a 3 h period of sitting interrupted each hour with 10 min of moderate-intensity exercise (EX). A mixed-model analysis of variance was used to compare between-condition and within-condition main effects, controlling for the within-subject nature of the experiment by including random effects for participant. Superficial femoral artery endothelium-dependent flow-mediated dilatation decreased significantly from pre- to post-SIT (mean difference 2.2% flow-mediated dilatation; 95% confidence interval = 0.60–2.94%, P < 0.001). This relative decline of 33% was abolished in the EX intervention. Shear rates were not significantly different within conditions. Our data demonstrate the effectiveness of short but regular exercise breaks in offsetting the detrimental effects of uninterrupted sitting in young girls
Dysregulation of PRMT5 in chronic lymphocytic leukemia promotes progression with high risk of Richter's transformation
: Richter's Transformation (RT) is a poorly understood and fatal progression of chronic lymphocytic leukemia (CLL) manifesting histologically as diffuse large B-cell lymphoma. Protein arginine methyltransferase 5 (PRMT5) is implicated in lymphomagenesis, but its role in CLL or RT progression is unknown. We demonstrate herein that tumors uniformly overexpress PRMT5 in patients with progression to RT. Furthermore, mice with B-specific overexpression of hPRMT5 develop a B-lymphoid expansion with increased risk of death, and Eµ-PRMT5/TCL1 double transgenic mice develop a highly aggressive disease with transformation that histologically resembles RT; where large-scale transcriptional profiling identifies oncogenic pathways mediating PRMT5-driven disease progression. Lastly, we report the development of a SAM-competitive PRMT5 inhibitor, PRT382, with exclusive selectivity and optimal in vitro and in vivo activity compared to available PRMT5 inhibitors. Taken together, the discovery that PRMT5 drives oncogenic pathways promoting RT provides a compelling rationale for clinical investigation of PRMT5 inhibitors such as PRT382 in aggressive CLL/RT cases
Minimum Technical Data Elements for Liquid Biopsy Data Submitted to Public Databases
Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/154656/1/cpt1747.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/154656/2/cpt1747-sup-0001-FigS1.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/154656/3/cpt1747_am.pd
Neurodevelopmental and psychosocial risk factors in serial killers and mass murderers
Multiple and serial murders are rare events that have a very profound societal impact. We have conducted a
systematic review, following PRISMA guidelines, of both the peer reviewed literature and of journalistic and
legal sources regarding mass and serial killings. Our findings tentatively indicate that these extreme forms of violence may be a result of a highly complex interaction of biological, psychological and sociological factors and
that, potentially, a significant proportion of mass or serial killers may have had neurodevelopmental disorders
such as autism spectrum disorder or head injury. Research into multiple and serial murders is in its infancy:
there is a lack of rigorous studies and most of the literature is anecdotal and speculative. Specific future study
of the potential role of neurodevelopmental disorders in multiple and serial murders is warranted and, due to
the rarity of these events, innovative research techniques may be required
Hidden in the Middle : Culture, Value and Reward in Bioinformatics
Bioinformatics - the so-called shotgun marriage between biology and computer science - is an interdiscipline. Despite interdisciplinarity being seen as a virtue, for having the capacity to solve complex problems and foster innovation, it has the potential to place projects and people in anomalous categories. For example, valorised 'outputs' in academia are often defined and rewarded by discipline. Bioinformatics, as an interdisciplinary bricolage, incorporates experts from various disciplinary cultures with their own distinct ways of working. Perceived problems of interdisciplinarity include difficulties of making explicit knowledge that is practical, theoretical, or cognitive. But successful interdisciplinary research also depends on an understanding of disciplinary cultures and value systems, often only tacitly understood by members of the communities in question. In bioinformatics, the 'parent' disciplines have different value systems; for example, what is considered worthwhile research by computer scientists can be thought of as trivial by biologists, and vice versa. This paper concentrates on the problems of reward and recognition described by scientists working in academic bioinformatics in the United Kingdom. We highlight problems that are a consequence of its cross-cultural make-up, recognising that the mismatches in knowledge in this borderland take place not just at the level of the practical, theoretical, or epistemological, but also at the cultural level too. The trend in big, interdisciplinary science is towards multiple authors on a single paper; in bioinformatics this has created hybrid or fractional scientists who find they are being positioned not just in-between established disciplines but also in-between as middle authors or, worse still, left off papers altogether
- …