15 research outputs found

    Genomic view of the evolution of the complement system

    Get PDF
    The recent accumulation of genomic information of many representative animals has made it possible to trace the evolution of the complement system based on the presence or absence of each complement gene in the analyzed genomes. Genome information from a few mammals, chicken, clawed frog, a few bony fish, sea squirt, fruit fly, nematoda and sea anemone indicate that bony fish and higher vertebrates share practically the same set of complement genes. This suggests that most of the gene duplications that played an essential role in establishing the mammalian complement system had occurred by the time of the teleost/mammalian divergence around 500 million years ago (MYA). Members of most complement gene families are also present in ascidians, although they do not show a one-to-one correspondence to their counterparts in higher vertebrates, indicating that the gene duplications of each gene family occurred independently in vertebrates and ascidians. The C3 and factor B genes, but probably not the other complement genes, are present in the genome of the cnidaria and some protostomes, indicating that the origin of the central part of the complement system was established more than 1,000 MYA

    Sterility and Gene Expression in Hybrid Males of Xenopus laevis and X. muelleri

    Get PDF
    BACKGROUND: Reproductive isolation is a defining characteristic of populations that represent unique biological species, yet we know very little about the gene expression basis for reproductive isolation. The advent of powerful molecular biology tools provides the ability to identify genes involved in reproductive isolation and focuses attention on the molecular mechanisms that separate biological species. Herein we quantify the sterility pattern of hybrid males in African Clawed Frogs (Xenopus) and apply microarray analysis of the expression pattern found in testes to identify genes that are misexpressed in hybrid males relative to their two parental species (Xenopus laevis and X. muelleri). METHODOLOGY/PRINCIPAL FINDINGS: Phenotypic characteristics of spermatogenesis in sterile male hybrids (X. laevis x X. muelleri) were examined using a novel sperm assay that allowed quantification of live, dead, and undifferentiated sperm cells, the number of motile vs. immotile sperm, and sperm morphology. Hybrids exhibited a dramatically lower abundance of mature sperm relative to the parental species. Hybrid spermatozoa were larger in size and accompanied by numerous undifferentiated sperm cells. Microarray analysis of gene expression in testes was combined with a correction for sequence divergence derived from genomic hybridizations to identify candidate genes involved in the sterility phenotype. Analysis of the transcriptome revealed a striking asymmetric pattern of misexpression. There were only about 140 genes misexpressed in hybrids compared to X. laevis but nearly 4,000 genes misexpressed in hybrids compared to X. muelleri. CONCLUSIONS/SIGNIFICANCE: Our results provide an important correlation between phenotypic characteristics of sperm and gene expression in sterile hybrid males. The broad pattern of gene misexpression suggests intriguing mechanisms creating the dominance pattern of the X. laevis genome in hybrids. These findings significantly contribute to growing evidence for allelic dominance in hybrids and have implications for the mechanism of species differentiation at the transcriptome level

    Securing PDAs in the Healthcare Environment

    No full text
    Wireless networks have become a key element in healthcare institutions for streamlining access to clinical information. With the advent of wireless technology, handheld devices such as PDAs, pagers and Pocket PCs are now being deployed into modern hospital systems. However, putting confidential data on the airwaves using wireless technology introduces significant risk and adds a new level of threat to sensitive medical information. This paper investigates the fundamental concepts required to understand PDA security issues in the health sector. It examines the various risk and threat issues, the security measures needed to secure PDA use, and the appropriate security infrastructure for healthcare settings
    corecore