963 research outputs found

    Mutational analysis of the gene start sequences of pneumonia virus of mice

    Get PDF
    The transcriptional start sequence of pneumonia virus of mice is more variable than that of the other pneumoviruses, with five different nine-base gene start (GS) sequences found in the PVM genome. The sequence requirements of the PVM gene start signal, and the efficiency of transcriptional initiation of the different virus genes, was investigated using a reverse genetics approach with a minigenome construct containing two reporter genes. A series of GS mutants were created, where each of the nine bases of the gene start consensus sequence of a reporter gene was changed to every other possible base, and the resulting effect on initiation of transcription was assayed. Nucleotide positions 1, 2 and 7 were found to be most sensitive to mutation whilst positions 4, 5 and 9 were relatively insensitive. The L gene GS sequence was found to have only 20% of the activity of the consensus sequence whilst the published M2 gene start sequence was found to be non-functional. A minigenome construct in which the two reporter genes were separated by the F-M2 gene junction of PVM was used to confirm the presence of two alternative, functional, GS sequences that could both drive the transcription of the PVM M2 gene

    Epidemiology of parainfluenza virus type 3 in England and Wales over a ten-year period

    Get PDF
    We have analysed data on respiratory syneytial (RS) and parainfiuenza type 3 (PF3) viruses reported to the Communicable Disease Surveillance Centre. London, over the period 1978–87. These confirm the annual winter epidemic of RS virus and show that, in England and Wales, PF3 is a summer infection with regular yearly epidemics

    Transcription of herpes simplex virus type 2

    Get PDF
    Summary available: p. i-iv

    The host-range tdCE phenotype of Chandipura virus is determined by mutations in the polymerase gene

    Get PDF
    The emerging arbovirus Chandipura virus (CV) has been implicated in epidemics of acute encephalitis in India with high mortality rates. The isolation of temperature-dependent host-range (tdCE) mutants, which are impaired in growth at 39 °C in chick embryo (CE) cells but not in monkey cells, highlights a dependence on undetermined host factors. We have characterized three tdCE mutants, each containing one or more coding mutations in the RNA polymerase gene and two containing additional mutations in the attachment protein gene. Using reverse genetics, we showed that a single amino acid change in the virus polymerase of each mutant was responsible for the host-range specificity. In CE cells at the non-permissive temperature, the discrete cytoplasmic replication complexes seen in mammalian cells or at the permissive temperature in CE cells were absent with the tdCE mutants, consistent with the tdCE lesions causing disruption of the replication complexes in a host-dependent manner

    Cloned defective interfering influenza RNA and a 7 possible pan-specific treatment of respiratory virus 8 diseases

    Get PDF
    Defective interfering (DI) genomes are characterised by their ability to interfere with the 3 replication of the virus from which they were derived and other genetically compatible 4 viruses. DI genomes are synthesized by nearly all known viruses and represent a vast 5 natural reservoir of antivirals that can potentially be exploited for use in the clinic. This review 6 describes the application of DI virus to protect from virus-associated diseases in vivo using 7 as an example a highly active cloned influenza A DI genome and virus that protects broadly 8 in preclinical trials against different subtypes of influenza A and against non-influenza A 9 respiratory viruses. This influenza A-derived DI genome protects by two totally different 10 mechanisms: molecular interference with influenza A replication and by stimulating innate 11 immunity that acts against non-influenza A viruses. The review considers what is needed to 12 develop DI genomes to the point of entry into clinical trials

    Cellular mRNAs access second ORFs using a novel amino acid sequence-dependent coupled translation termination-reinitiation mechanism

    Get PDF
    Polycistronic transcripts are considered rare in the human genome. Initiation of translation of internal ORFs of eukaryotic genes has been shown to use either leaky scanning or highly structured IRES regions to access initiation codons. Studies on mammalian viruses identified a mechanism of coupled translation termination-reinitiation that allows translation of an additional ORF. Here, the ribosome terminating translation of ORF-1 translocates upstream to reinitiate translation of ORF-2. We have devised an algorithm to identify mRNAs in the human transcriptome in which the major ORF-1 overlaps a second ORF capable of encoding a product of at least 50 aa in length. This identified 4368 transcripts representing 2214 genes. We investigated 24 transcripts, 22 of which were shown to express a protein from ORF-2 highlighting that 3' UTRs contain protein-coding potential more frequently than previously suspected. Five transcripts accessed ORF-2 using a process of coupled translation termination-reinitiation. Analysis of one transcript, encoding the CASQ2 protein, showed that the mechanism by which the coupling process of the cellular mRNAs was achieved was novel. This process was not directed by the mRNA sequence but required an aspartate-rich repeat region at the carboxyl terminus of the terminating ORF-1 protein. Introduction of wobble mutations for the aspartate codon had no effect, whereas replacing aspartate for glutamate repeats eliminated translational coupling. This is the first description of a coordinated expression of two proteins from cellular mRNAs using a coupled translation termination-reinitiation process and is the first example of such a process being determined at the amino acid level

    Retrograde transport pathways utilised by viruses and protein toxins

    Get PDF
    A model has been presented for retrograde transport of certain toxins and viruses from the cell surface to the ER that suggests an obligatory interaction with a glycolipid receptor at the cell surface. Here we review studies on the ER trafficking cholera toxin, Shiga and Shiga-like toxins, Pseudomonas exotoxin A and ricin, and compare the retrograde routes followed by these protein toxins to those of the ER trafficking SV40 and polyoma viruses. We conclude that there is in fact no obligatory requirement for a glycolipid receptor, nor even with a protein receptor in a lipid-rich environment. Emerging data suggests instead that there is no common pathway utilised for retrograde transport by all of these pathogens, the choice of route being determined by the particular receptor utilised

    Monitoring Inventory Accuracy With Statistical Process Control

    Get PDF
    Inventory accuracy is critical in most industrial environments such as distribution, warehousing, and retail. Many companies use a technique called cycle counting and have realized outstanding results in monitoring and improving inventory accuracy. The time and resources to complete cycle counting are sometimes limited or not available. In this work, we promote statistical process control (SPC) to monitor inventory accuracy. Specifically, we model the complex underlying environments with mixture distributions to demonstrate sampling from a mixed but stationary process. For our particular application, we concern ourselves with data that result from inventory adjustments at the stock keeping unit (SKU) level when a given SKU is found to be inaccurate. We provide estimates of both the Type I and Type II errors when a classic C chart is used. In these estimations, we use both analytical as well as simulation results, and the findings demonstrate the environments that might be conducive for SPC approach

    Responding to Cybersecurity Challenges: Securing Vulnerable U.S. Emergency Alert Systems

    Get PDF
    Emergency alert systems (EASs) in the United States (US) form part of the nation’s critical infrastructure. These systems rely on aging platforms and suffer from a fragmented interconnected network of partnerships. Some EASs have an easily identifiable vulnerability: one can access their management website via the Internet. Authorities must secure these systems quickly. Other concerns also exist, such as the lack of policies for reporting vulnerabilities. To begin to assess EASs in the US, we used Shodan to evaluate the availability of these websites in six southeastern states. We found 18 such websites that one could access via the Internet and that required only requiring user credentials to login into. Next, we searched for published policies on reporting vulnerabilities; we found no vulnerability-disclosure policies for any system we identified. To identify, prioritize, and address EAS vulnerabilities, we present a list of technical and management strategies to reduce cybersecurity threats. We recommend integrated policies and procedures at all levels of the public-private-government partnerships and system resilience as lines of defense against cybersecurity threats. By implementing these strategies, EASs in the US will be positioned to update critical infrastructure, notify groups of emergencies, and ensure the distribution of valid and reliable information to at-risk populations
    • …
    corecore