Search results for: terrorist profiling
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 455

Search results for: terrorist profiling

155 Integrated Geotechnical and Geophysical Investigation of a Proposed Construction Site at Mowe, Southwestern Nigeria

Authors: Kayode Festus Oyedele, Sunday Oladele, Adaora Chibundu Nduka

Abstract:

The subsurface of a proposed site for building development in Mowe, Nigeria, using Standard Penetration Test (SPT) and Cone Penetrometer Test (CPT) supplemented with Horizontal Electrical Profiling (HEP) was investigated with the aim of evaluating the suitability of the strata for foundation materials. Four SPT and CPT were implemented using 10 tonnes hammer. HEP utilizing Wenner array were performed with inter-electrode spacing of 10 – 60 m along four traverses coincident with each of the SPT and CPT. The HEP data were processed using DIPRO software and textural filtering of the resulting resistivity sections was implemented to enable delineation of hidden layers. Sandy lateritic clay, silty lateritic clay, clay, clayey sand and sand horizons were delineated. The SPT “N” value defined very soft to soft sandy lateritic (<4), stiff silty lateritic clay (7 – 12), very stiff silty clay (12 - 15), clayey sand (15- 20) and sand (27 – 37). Sandy lateritic clay (5-40 kg/cm2) and silty lateritic clay (25 - 65 kg/cm2) were defined from the CPT response. Sandy lateritic clay (220-750 Ωm), clay (< 50 Ωm) and sand (415-5359 Ωm) were delineated from the resistivity sections with two thin layers of silty lateritic clay and clayey sand defined in the texturally filtered resistivity sections. This study concluded that the presence of incompetent thick clayey materials (18 m) beneath the study area makes it unsuitable for shallow foundation. Deep foundation involving piling through the clayey layers to the competent sand at 20 m depth was recommended.

Keywords: cone penetrometer, foundation, lithologic texture, resistivity section, standard penetration test

Procedia PDF Downloads 265
154 Interaction Between Gut Microorganisms and Endocrine Disruptors - Effects on Hyperglycaemia

Authors: Karthika Durairaj, Buvaneswari G., Gowdham M., Gilles M., Velmurugan G.

Abstract:

Background: Hyperglycaemia is the primary cause of metabolic illness. Recently, researchers focused on the possibility that chemical exposure could promote metabolic disease. Hyperglycaemia causes a variety of metabolic diseases dependent on its etiologic conditions. According to animal and population-based research, individual chemical exposure causes health problems through alteration of endocrine function with the influence of microbial influence. We were intrigued by the function of gut microbiota variation in high fat and chemically induced hyperglycaemia. Methodology: C57/Bl6 mice were subjected to two different treatments to generate the etiologic-based diabetes model: I – a high-fat diet with a 45 kcal diet, and II - endocrine disrupting chemicals (EDCs) cocktail. The mice were monitored periodically for changes in body weight and fasting glucose. After 120 days of the experiment, blood anthropometry, faecal metagenomics and metabolomics were performed and analyzed through statistical analysis using one-way ANOVA and student’s t-test. Results: After 120 days of exposure, we found hyperglycaemic changes in both experimental models. The treatment groups also differed in terms of plasma lipid levels, creatinine, and hepatic markers. To determine the influence on glucose metabolism, microbial profiling and metabolite levels were significantly different between groups. The gene expression studies associated with glucose metabolism vary between hosts and their treatments. Conclusion: This research will result in the identification of biomarkers and molecular targets for better diabetes control and treatment.

Keywords: hyperglycaemia, endocrine-disrupting chemicals, gut microbiota, host metabolism

Procedia PDF Downloads 40
153 The Role of Micro-Ribonucleic Acid-182 and Micro-Ribonucleic Acid-214 in Cisplatin Resistance of Triple-Negative Breast Cancer Cells

Authors: Bahadir Batar, Elif Serdal, Berna Erdal, Hasan Ogul

Abstract:

Micro-ribonucleic acids (miRNAs) are small short non-coding ribonucleic acid molecules about 22 nucleotides long. miRNAs play a key role in response to chemotherapeutic agents. WW domain-containing oxidoreductase (WWOX) gene encodes a tumor suppressor protein. Loss or reduction of Wwox protein is observed in many breast cancer cases. WWOX protein deficiency is increased in triple-negative breast cancer (TNBC). TNBC is a heterogeneous, highly aggressive, and difficult to treat tumor type. WWOX loss contributes to resistance to cisplatin therapy in patients with TNBC. Here, the aim of the study was to investigate the potential role of miRNAs in cisplatin therapy resistance of WWOX-deficient TNBC cells. This was a cell culture study. miRNA expression profiling was analyzed by LightCycler 480 system. miRNA Set Enrichment Analysis tool was used to integrate experimental data with literature-based biological knowledge to infer a new hypothesis. Increased miR-182 and decreased miR-214 were significantly correlated with cisplatin resistance in WWOX-deficient TNBC cells. miR-182 and miR-214 may involve in cisplatin resistance of WWOX-deficient TNBC cells by deregulating the DNA repair, apoptosis, or protein kinase B signaling pathways. These data highlight the mechanism by which WWOX regulates cisplatin resistance of TNBC and the potential use of WWOX as a predictor biomarker for cisplatin resistance.

Keywords: cisplatin, microRNA, triple-negative breast cancer, WWOX

Procedia PDF Downloads 131
152 MicroRNA Differential Profiling in Hepatitis C Patients Undergoing Major Surgeries: Propofol versus Sevoflurane Anesthesia

Authors: Hala Demerdash, Ola M. Zanaty, Emad Eldin Arida

Abstract:

Background: This study investigated the micoRNA expression changes induced by Sevoflurane and Propofol and their effects on liver functions. Patients and methods: The study was designed as randomized controlled study, carried out on 200 adult patients, scheduled for major surgeries under general anesthesia (GA). Patients were randomly divided into four groups; groups SC and PC included chronic hepatitis C (CHC) patients where SC group are patients receiving Sevoflurane, and PC group are patients receiving Propofol anesthesia. While S and P groups included non- hepatitis patients; S group are patients receiving Sevoflurane and P group are patients receiving Propofol. Anesthesia in Group S and SC patients was maintained by sevoflurane, while anesthesia in Group P and PC patients was maintained by propofol infusion. Blood samples were analyzed for PT, PTT and liver enzymes. Serum samples were analyzed for microRNA before and after surgery. Results: Results show miRNA-122 and miRNA-21 were absent in serum of S and P groups in pre-operative samples. However, they were expressed in SC and PC groups. In post-operative samples; miRNA-122 revealed an increased expression in all groups; with more exaggerated response in SC group. On the other hand miRNA-21 revealed increased expression in both SC and PC groups; a slight expression in S group with absent expression in P group. There was a post-operative negative correlation between miR-122 and ALT (r=-0.46) in SC group and (r=-0.411) in PC group and positive correlation between ALT and miR-21 (r=0.335) in SC group and (r=0.379) in PC group. The amount of blood loss was positively correlated with miR-122 (r=0.366) in SC group and (r=0.384) in PC group. Conclusion: Propofol anesthesia is safer than Sevoflurane anesthesia in patients with CHC. Sevoflurane and Propofol anesthesia affect miRNA expression in both CHC and non-hepatitis patients.

Keywords: anesthesia, chronic hepatitis C, micoRNA, propofol, sevoflurane

Procedia PDF Downloads 341
151 Effect of Active Compounds Extracted From Tagetes Erecta Against Plant-Parasitic Nematodes

Authors: Deepika, Kashika Kapoor, Nistha Khanna, Lakshmi, Archna Kumar

Abstract:

Plant-parasitic nematodes cause major loss in global food production and destroying at least 21.3% of food annually. About 4100 species of plant-parasitic nematodes are reported, out of this, Meloidogyne species is prominent and worldwide in distribution. Observing the harmful effects of chemical based nematicides, there is a great need for an eco-friendly, highly efficient, sustainable control measure for Meloidogyne. Therefore, In vitro study was carried out to observe the impact of volatile cues obtained from the Tagetes erecta leaves on plant parasitic nematodes. Volatile cues were collected from marigold leaves. For chemical characterization, GCMS (Gas Chromatography Mass Spectrometry) profiling was conducted. VOCs (Volatile Organic Compounds) profile of marigold indicated the presence of several types of alkanes, alkenes varying in number and quantity. Status of nematodes population by counting the live and dead individuals after applying a definite volume (100µl) of extract was recorded at different concentrations (100%, 50%, 25%) with contrast of control (hexane) during different time durations i.e.,24hr, 48hr and 72hr. Result indicated that mortality increases with increasing time (72hr) and concentration (100%) i.e., 50%. Thus, application of prominent compound present in Marigold in pure form may be tested individually or in combination to find out the most efficient active compound/s, which may be highly useful in eco-friendly management of targeted plant parasitic nematode.

Keywords: plant-parasitic nematode, meloidogyne, tagetes erecta, volatile organic compounds

Procedia PDF Downloads 168
150 Genome-Wide Expression Profiling of Cicer arietinum Heavy Metal Toxicity

Authors: B. S. Yadav, A. Mani, S. Srivastava

Abstract:

Chickpea (Cicer arietinum L.) is an annual, self-pollinating, diploid (2n = 2x = 16) pulse crop that ranks second in world legume production after common bean (Phaseolus vulgaris). ICC 4958 flowers approximately 39 days after sowing under peninsular Indian conditions and the crop matures in less than 90 days in rained environments. The estimated collective yield losses due to abiotic stresses (6.4 million t) have been significantly higher than for biotic stresses (4.8 million t). Most legumes are known to be salt sensitive, and therefore, it is becoming increasingly important to produce cultivars tolerant to high-salinity in addition to other abiotic and biotic stresses for sustainable chickpea production. Our aim was to identify the genes that are involved in the defence mechanism against heavy metal toxicity in chickpea and establish the biological network of heavy metal toxicity in chickpea. ICC4958 variety of chick pea was taken and grown in normal condition and 150µM concentration of different heavy metal salt like CdCl₂, K₂Cr2O₇, NaAsO₂. At 15th day leave samples were collected and stored in RNA Later solution microarray was performed for checking out differential gene expression pattern. Our studies revealed that 111 common genes that involved in defense mechanism were up regulated and 41 genes were commonly down regulated during treatment of 150µM concentration of CdCl₂, K₂Cr₂O₇, and NaAsO₂. Biological network study shows that the genes which are differentially expressed are highly connected and having high betweenness and centrality.

Keywords: abiotic stress, biological network, chickpea, microarray

Procedia PDF Downloads 197
149 Political Deprivations, Political Risk and the Extent of Skilled Labor Migration from Pakistan: Finding of a Time-Series Analysis

Authors: Syed Toqueer Akhter, Hussain Hamid

Abstract:

Over the last few decades an upward trend has been observed in the case of labor migration from Pakistan. The emigrants are not just economically motivated and in search of a safe living environment towards more developed countries in Europe, North America and Middle East. The opportunity cost of migration comes in the form of brain drain that is the loss of qualified and skilled human capital. Throughout the history of Pakistan, situations of political instability have emerged ranging from violation of political rights, political disappearances to political assassinations. Providing security to the citizens is a major issue faced in Pakistan due to increase in crime and terrorist activities. The aim of the study is to test the impact of political instability, appearing in the form of political terror, violation of political rights and civil liberty on skilled migration of labor. Three proxies are used to measure the political instability; political terror scale (based on a scale of 1-5, the political terror and violence that a country encounters in a particular year), political rights (a rating of 1-7, that describes political rights as the ability for the people to participate without restraint in political process) and civil liberty (a rating of 1-7, civil liberty is defined as the freedom of expression and rights without government intervention). Using time series data from 1980-2011, the distributed lag models were used for estimation because migration is not a onetime process, previous events and migration can lead to more migration. Our research clearly shows that political instability appearing in the form of political terror, political rights and civil liberty all appeared significant in explaining the extent of skilled migration of Pakistan.

Keywords: skilled labor migration, political terror, political rights, civil liberty, distributed lag model

Procedia PDF Downloads 1028
148 Fight against Money Laundering with Optical Character Recognition

Authors: Saikiran Subbagari, Avinash Malladhi

Abstract:

Anti Money Laundering (AML) regulations are designed to prevent money laundering and terrorist financing activities worldwide. Financial institutions around the world are legally obligated to identify, assess and mitigate the risks associated with money laundering and report any suspicious transactions to governing authorities. With increasing volumes of data to analyze, financial institutions seek to automate their AML processes. In the rise of financial crimes, optical character recognition (OCR), in combination with machine learning (ML) algorithms, serves as a crucial tool for automating AML processes by extracting the data from documents and identifying suspicious transactions. In this paper, we examine the utilization of OCR for AML and delve into various OCR techniques employed in AML processes. These techniques encompass template-based, feature-based, neural network-based, natural language processing (NLP), hidden markov models (HMMs), conditional random fields (CRFs), binarizations, pattern matching and stroke width transform (SWT). We evaluate each technique, discussing their strengths and constraints. Also, we emphasize on how OCR can improve the accuracy of customer identity verification by comparing the extracted text with the office of foreign assets control (OFAC) watchlist. We will also discuss how OCR helps to overcome language barriers in AML compliance. We also address the implementation challenges that OCR-based AML systems may face and offer recommendations for financial institutions based on the data from previous research studies, which illustrate the effectiveness of OCR-based AML.

Keywords: anti-money laundering, compliance, financial crimes, fraud detection, machine learning, optical character recognition

Procedia PDF Downloads 144
147 Uruguayan vs. British Press Coverage of a Political Kidnapping

Authors: Luisa Peirano

Abstract:

What began as a middle-class insurgent political movement whose slogan was 'Words divide us. Action unites us!' ultimately mutated into an underground terrorist group that staged a series of armed robberies, kidnappings and even executions in the 1960s and early 1970s. One of the most memorable was the kidnapping of the British ambassador, Sir Geoffrey Jackson, in January 1971, who was held captive for eight months. The episode, which triggered a massive government response and resulted in the capture of the Tupamaros leaders, continued to have political repercussions decades later when Tupamaros leaders emerged from prison to re-enter mainstream Uruguayan politics. The kidnapping and its aftermath attracted intense media coverage in Uruguay and Britain, coverage that affected public opinion profoundly. The treatment by the Uruguayan and British medias’ diverged, however. Uruguayan newspapers focused on political issues, mirrored the positions of various political parties, and showed the larger context of social, cultural and political forces that rocked Latin America in the 1960s and early 1970s. By contrast, the British press limited its attention mainly to the human drama. On the 30th anniversary of Sir Geoffrey Jackson's death, this study compares over one hundred major newspaper articles and suggests some reasons for the differences between Uruguayan and British media treatment in terms of the volume, content, and perspective as well in the effect on readers. The differences have persisted and continue to matter in present day coverage of terrorism and its victims.

Keywords: British Ambassador, Churchill Archives Centre, Sir Geoffrey Jackson, political kidnapping, Latin America in the 1960's, Tupamaro guerrillas, Uruguay

Procedia PDF Downloads 202
146 Exploiting Identity Grievances: Al-Shabaab Propaganda Targeting Individuals Abroad

Authors: Mustafa Mabruk

Abstract:

Groups such as Al-Shabaab have managed to radicalize many individuals abroad, including the first American citizen to ever be radicalized. Yet the pathways of radicalization for these foreign individuals are understudied. Moreover, current measures to prevent foreign radicalization are ineffective, with privacy, screening and profiling implications that render current counter-radicalization efforts counterproductive. Such measures exhibit strictness, political bias, and harshness. As confirmed by recent studies, such counter-radicalization issues exacerbate existing grievances and channel fresh recruits to Al-Shabaab. Addressing these challenges is paramount, requiring alternative strategies to effectively reduce radicalization without triggering further harm. The development of counter-narratives emerges as a potential measure with minimal risk of exacerbating grievances, yet the development of such counter-narratives necessitates a thorough understanding of the radicalization pathways of foreign individuals that are understudied. This study investigates the success of Al-Shabaab in recruiting individuals abroad by analyzing their propaganda in conjunction with analyzing identity-focused theories of radicalization, including Framing Theory and Social Identity Theory. Qualitative content analysis is used to analyze various propaganda material, including tweets, speeches, and webpages. The analysis reveals that issues of identity are of major significance in the radicalization patterns identified and that grievances of Muslims worldwide are used to exploit identity-related grievances. Based on these findings, the paper argues that such evidence enhances our understanding of potential deradicalization pathways and present counter-narratives based on Islamic scripture.

Keywords: counter-narratives, foreign radicalization, identity grievances, propaganda analysis

Procedia PDF Downloads 41
145 Mutation Profiling of Paediatric Solid Tumours in a Cohort of South African Patients

Authors: L. Lamola, E. Manolas, A. Krause

Abstract:

Background: The incidence of childhood cancer incidence is increasing gradually in low-middle income countries, such as South Africa. Globally, there is an extensive range of familial- and hereditary-cancer syndromes, where underlying germline variants increase the likelihood of developing cancer in childhood. Next-Generation Sequencing (NGS) technologies have been key in determining the occurrence and genetic contribution of germline variants to paediatric cancer development. We aimed to design and evaluate a candidate gene panel specific to inherited cancer-predisposing genes to provide a comprehensive insight into the contribution of germline variants to childhood cancer. Methods: 32 paediatric patients (aged 0-18 years) diagnosed with a malignant tumour were recruited, and biological samples were obtained. After quality control, DNA was sequenced using an ion Ampliseq 50 candidate gene panel design and Ion Torrent S5 technologies. Sequencing variants were called using Ion Torrent Suite software and were subsequently annotated using Ion Reporter and Ensembl's VEP. High priority variants were manually analysed using tools such as MutationTaster, SIFT-INDEL and VarSome. Putative identified candidates were validated via Sanger Sequencing. Results: The patients studied had a variety of cancers, the most common being nephroblastoma (13), followed by osteosarcoma (4) and astrocytoma (3). We identified 10 pathogenic / likely pathogenic variants in 10 patients, most of which were novel. Conclusions: According to the literature, we expected ~10% of our patient population to harbour pathogenic or likely pathogenic germline variants, however, we reported about 3 times (~30%) more than we expected. Majority of the identified variants are novel; this may be because this is the first study of its kind in an understudied South African population.

Keywords: Africa, genetics, germline-variants, paediatric-cancer

Procedia PDF Downloads 138
144 Modeling and Simulation of Honeycomb Steel Sandwich Panels under Blast Loading

Authors: Sayed M. Soleimani, Nader H. Ghareeb, Nourhan H. Shaker, Muhammad B. Siddiqui

Abstract:

Honeycomb sandwich panels have been widely used as protective structural elements against blast loading. The main advantages of these panels include their light weight due to the presence of voids, as well as their energy absorption capability. Terrorist activities have imposed new challenges to structural engineers to design protective measures for vital structures. Since blast loading is not usually considered in the load combinations during the design process of a structure, researchers around the world have been motivated to study the behavior of potential elements capable of resisting sudden loads imposed by the detonation of explosive materials. One of the best candidates for this objective is the honeycomb sandwich panel. Studying the effects of explosive materials on the panels requires costly and time-consuming experiments. Moreover, these type of experiments need permission from defense organizations which can become a hurdle. As a result, modeling and simulation using an appropriate tool can be considered as a good alternative. In this research work, the finite element package ABAQUS® is used to study the behavior of hexagonal and squared honeycomb steel sandwich panels under the explosive effects of different amounts of trinitrotoluene (TNT). The results of finite element modeling of a specific honeycomb configuration are initially validated by comparing them with the experimental results from literature. Afterwards, several configurations including different geometrical properties of the honeycomb wall are investigated and the results are compared with the original model. Finally, the effectiveness of the core shape and wall thickness are discussed, and conclusions are made.

Keywords: Abaqus, blast loading, finite element modeling, steel honeycomb sandwich panel

Procedia PDF Downloads 353
143 Next Generation Sequencing Analysis of Circulating MiRNAs in Rheumatoid Arthritis and Osteoarthritis

Authors: Khalda Amr, Noha Eltaweel, Sherif Ismail, Hala Raslan

Abstract:

Introduction: Osteoarthritis is the most common form of arthritis that involves the wearing away of the cartilage that caps the bones in the joints. While rheumatoid arthritis is an autoimmune disease in which the immune system attacks the joints, beginning with the lining of joints. In this study, we aimed to study the top deregulated miRNAs that might be the cause of pathogenesis in both diseases. Methods: Eight cases were recruited in this study: 4 rheumatoid arthritis (RA), 2 osteoarthritis (OA) patients, as well as 2 healthy controls. Total RNA was isolated from plasma to be subjected to miRNA profiling by NGS. Sequencing libraries were constructed and generated using the NEBNextR UltraTM small RNA Sample Prep Kit for Illumina R (NEB, USA), according to the manufacturer’s instructions. The quality of samples were checked using fastqc and multiQC. Results were compared RA vs Controls and OA vs. Controls. Target gene prediction and functional annotation of the deregulated miRNAs were done using Mienturnet. The top deregulated miRNAs in each disease were selected for further validation using qRT-PCR. Results: The average number of sequencing reads per sample exceeded 2.2 million, of which approximately 57% were mapped to the human reference genome. The top DEMs in RA vs controls were miR-6724-5p, miR-1469, miR-194-3p (up), miR-1468-5p, miR-486-3p (down). In comparison, the top DEMs in OA vs controls were miR-1908-3p, miR-122b-3p, miR-3960 (up), miR-1468-5p, miR-15b-3p (down). The functional enrichment of the selected top deregulated miRNAs revealed the highly enriched KEGG pathways and GO terms. Six of the deregulated miRNAs (miR-15b, -128, -194, -328, -542 and -3180) had multiple target genes in the RA pathway, so they are more likely to affect the RA pathogenesis. Conclusion: Six of our studied deregulated miRNAs (miR-15b, -128, -194, -328, -542 and -3180) might be highly involved in the disease pathogenesis. Further functional studies are crucial to assess their functions and actual target genes.

Keywords: next generation sequencing, mirnas, rheumatoid arthritis, osteoarthritis

Procedia PDF Downloads 96
142 Hyper-Production of Lysine through Fermentation and Its Biological Evaluation on Broiler Chicks

Authors: Shagufta Gulraiz, Abu Saeed Hashmi, Muhammad Mohsin Javed

Abstract:

Lysine required for poultry feed is imported in Pakistan to fulfil the desired dietary needs. Present study was designed to produce maximum lysine by utilizing cheap sources to save the foreign exchange. To achieve the goal of lysine production through fermentation, large scale production of lysine was carried out in 7.5 L stirred glass vessel fermenter with wild and mutant Brevibacterium flavum (B. flavum) using all pre-optimized conditions. The identification of produced lysine was carried out by TLC and amino acid analyzer. Toxicity evaluation of produced lysine was performed before feeding to broiler chicks. During biological trial concentrated fermented broth having 8% lysine was used in poultry rations as a source of Lysine for test birds. Fermenter scale studies showed that the maximum lysine (20.8 g/L) was produced at 250 rpm, 1.5 vvm aeration, 6.0% inoculum under controlled pH conditions after 56 h of fermentation with wild culture but mutant (BFENU2) gave maximum yield of lysine 36.3 g/L under optimized condition after 48 h. Amino acid profiling showed 1.826% Lysine in fermented broth by wild B. flavum and 2.644% by mutant strain (BFENU2). Toxicity evaluation report showed that the produced lysine is safe for consumption by broilers. Biological evaluation results showed that produced lysine was equally good as commercial lysine in terms of weight gain, feed intake and feed conversion ratio. A cheap and practical bioprocess of Lysine production was concluded, that can be exploited commercially in Pakistan to save foreign exchange.

Keywords: lysine, fermentation, broiler chicks, biological evaluation

Procedia PDF Downloads 547
141 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy

Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi

Abstract:

Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.

Keywords: terrorism, economy, Boko Haram, Nigeria

Procedia PDF Downloads 261
140 Simulating Human Behavior in (Un)Built Environments: Using an Actor Profiling Method

Authors: Hadas Sopher, Davide Schaumann, Yehuda E. Kalay

Abstract:

This paper addresses the shortcomings of architectural computation tools in representing human behavior in built environments, prior to construction and occupancy of those environments. Evaluating whether a design fits the needs of its future users is currently done solely post construction, or is based on the knowledge and intuition of the designer. This issue is of high importance when designing complex buildings such as hospitals, where the quality of treatment as well as patient and staff satisfaction are of major concern. Existing computational pre-occupancy human behavior evaluation methods are geared mainly to test ergonomic issues, such as wheelchair accessibility, emergency egress, etc. As such, they rely on Agent Based Modeling (ABM) techniques, which emphasize the individual user. Yet we know that most human activities are social, and involve a number of actors working together, which ABM methods cannot handle. Therefore, we present an event-based model that manages the interaction between multiple Actors, Spaces, and Activities, to describe dynamically how people use spaces. This approach requires expanding the computational representation of Actors beyond their physical description, to include psychological, social, cultural, and other parameters. The model presented in this paper includes cognitive abilities and rules that describe the response of actors to their physical and social surroundings, based on the actors’ internal status. The model has been applied in a simulation of hospital wards, and showed adaptability to a wide variety of situated behaviors and interactions.

Keywords: agent based modeling, architectural design evaluation, event modeling, human behavior simulation, spatial cognition

Procedia PDF Downloads 264
139 Deciphering the Action of Neuraminidase in Glioblastoma Models

Authors: Nathalie Baeza-Kallee, Raphaël Bergès, Victoria Hein, Stéphanie Cabaret, Jeremy Garcia, Abigaëlle Gros, Emeline Tabouret, Aurélie Tchoghandjian, Carole Colin, Dominique Figarella-Branger

Abstract:

Glioblastoma (GBM) contains cancer stem cells that are resistant to treatment. GBM cancer stem cell expresses glycolipids recognized by the A2B5 antibody. A2B5, induced by the enzyme ST8 alpha-N-acetyl-neuraminide alpha-2,8-sialyl transferase 3 (ST8Sia3), plays a crucial role in the proliferation, migration, clonogenicity, and tumorigenesis of GBM cancer stem cells. Our aim was to characterize the resulting effects of neuraminidase that remove A2B5 in order to target GBM cancer stem cells. To this end, we set up a GBM organotypic slice model; quantified A2B5 expression by flow cytometry in U87-MG, U87-ST8Sia3, and GBM cancer stem cell lines, treated or not by neuraminidase; performed RNAseq and DNA methylation profiling; and analyzed the ganglioside expression by liquid chromatography-mass spectrometry in these cell lines, treated or not with neuraminidase. Results demonstrated that neuraminidase decreased A2B5 expression, tumor size, and regrowth after surgical removal in the organotypic slice model but did not induce a distinct transcriptomic or epigenetic signature in GBM CSC lines. RNAseq analysis revealed that OLIG2, CHI3L1, TIMP3, TNFAIP2, and TNFAIP6 transcripts were significantly overexpressed in U87-ST8Sia3 compared to U87-MG. RT-qPCR confirmed these results and demonstrated that neuraminidase decreased gene expression in GBM cancer stem cell lines. Moreover, neuraminidase drastically reduced ganglioside expression in GBM cancer stem cell lines. Neuraminidase, by its pleiotropic action, is an attractive local treatment against GBM.

Keywords: cancer stem cell, ganglioside, glioblastoma, targeted treatment

Procedia PDF Downloads 75
138 Effects of Ascophyllum nodosum in Tomato in the Tropical Caribbean Climate: Effects and Molecular Insights into Mechanisms

Authors: Omar Ali, Adesh Ramsubhag, Jayaraj Jayaraman

Abstract:

Seaweed extracts have been reported as plant biostimulants which could be a safer, organic alternative to harsh pesticides. The incentive to use seaweed-based biostimulants is becoming paramount in sustainable agriculture. The current study, therefore, screened a commercial extract of A. nodosum in tomatoes, cultivated in Trinidad to showcase the multiple beneficial effects. Foliar treatment with an A. nodosum commercial extract led to significant increases in fruit yield and a significant reduction of incidence of bacterial spots and early blight diseases under both greenhouse and field conditions. Investigations were carried out to reveal the possible mechanisms of action of this biostimulant through defense enzyme assays and transcriptome profiling via RNA sequencing of tomato. Studies into disease control mechanisms by A. nodosum showed that the extract stimulated the activity of enzymes such as peroxidase, phenylalanine ammonia-lyase, chitinase, polyphenol oxidase, and β-1,3-glucanase. Additionally, the transcriptome survey revealed the upregulation and enrichment of genes responsible for the biosynthesis of growth hormones, defense enzymes, PR proteins and defense-related secondary metabolites, as well as genes involved in the nutrient mobilization, photosynthesis and primary and secondary metabolic pathways. The results of the transcriptome study also demonstrated the cross-talks between growth and defense responses, confirming the bioelicitor and biostimulant value of seaweed extracts in plants. These effects could potentially implicate the benefits of seaweed extract and validate its usage in sustainable crop production.

Keywords: A. nodosum, biostimulants, elicitor, enzymes, growth responses, seaweeds, tomato, transcriptome analysis

Procedia PDF Downloads 162
137 A High Content Screening Platform for the Accurate Prediction of Nephrotoxicity

Authors: Sijing Xiong, Ran Su, Lit-Hsin Loo, Daniele Zink

Abstract:

The kidney is a major target for toxic effects of drugs, industrial and environmental chemicals and other compounds. Typically, nephrotoxicity is detected late during drug development, and regulatory animal models could not solve this problem. Validated or accepted in silico or in vitro methods for the prediction of nephrotoxicity are not available. We have established the first and currently only pre-validated in vitro models for the accurate prediction of nephrotoxicity in humans and the first predictive platforms based on renal cells derived from human pluripotent stem cells. In order to further improve the efficiency of our predictive models, we recently developed a high content screening (HCS) platform. This platform employed automated imaging in combination with automated quantitative phenotypic profiling and machine learning methods. 129 image-based phenotypic features were analyzed with respect to their predictive performance in combination with 44 compounds with different chemical structures that included drugs, environmental and industrial chemicals and herbal and fungal compounds. The nephrotoxicity of these compounds in humans is well characterized. A combination of chromatin and cytoskeletal features resulted in high predictivity with respect to nephrotoxicity in humans. Test balanced accuracies of 82% or 89% were obtained with human primary or immortalized renal proximal tubular cells, respectively. Furthermore, our results revealed that a DNA damage response is commonly induced by different PTC-toxicants with diverse chemical structures and injury mechanisms. Together, the results show that the automated HCS platform allows efficient and accurate nephrotoxicity prediction for compounds with diverse chemical structures.

Keywords: high content screening, in vitro models, nephrotoxicity, toxicity prediction

Procedia PDF Downloads 312
136 Ebola Virus Glycoprotein Inhibitors from Natural Compounds: Computer-Aided Drug Design

Authors: Driss Cherqaoui, Nouhaila Ait Lahcen, Ismail Hdoufane, Mehdi Oubahmane, Wissal Liman, Christelle Delaite, Mohammed M. Alanazi

Abstract:

The Ebola virus is a highly contagious and deadly pathogen that causes Ebola virus disease. The Ebola virus glycoprotein (EBOV-GP) is a key factor in viral entry into host cells, making it a critical target for therapeutic intervention. Using a combination of computational approaches, this study focuses on the identification of natural compounds that could serve as potent inhibitors of EBOV-GP. The 3D structure of EBOV-GP was selected, with missing residues modeled, and this structure was minimized and equilibrated. Two large natural compound databases, COCONUT and NPASS, were chosen and filtered based on toxicity risks and Lipinski’s Rule of Five to ensure drug-likeness. Following this, a pharmacophore model, built from 22 reported active inhibitors, was employed to refine the selection of compounds with a focus on structural relevance to known Ebola inhibitors. The filtered compounds were subjected to virtual screening via molecular docking, which identified ten promising candidates (five from each database) with strong binding affinities to EBOV-GP. These compounds were then validated through molecular dynamics simulations to evaluate their binding stability and interactions with the target. The top three compounds from each database were further analyzed using ADMET profiling, confirming their favorable pharmacokinetic properties, stability, and safety. These results suggest that the selected compounds have the potential to inhibit EBOV-GP, offering new avenues for antiviral drug development against the Ebola virus.

Keywords: EBOV-GP, Ebola virus glycoprotein, high-throughput drug screening, molecular docking, molecular dynamics, natural compounds, pharmacophore modeling, virtual screening

Procedia PDF Downloads 21
135 Conspiracy Theories and the Right to Believe

Authors: Zwelenkani Mdlalose

Abstract:

From the moment Covid 19 was declared a pandemic it became clear that conspiracy theories would significantly impact our response to the crisis that the virus was to become. Central to the interest in conspiracy theories evoked by a pandemic is a more general concern for the impact they have on society and social harmony. The specific brand of Conspiracy Theory that is in question is not any and all theories about conspiracies but rather those conspiracy theories which contradict official accounts. For example, where the official account on the terrorist attacks of September 11 2001 is of a conspiracy involving 19 militants associated with the Islamic extremist group al-Qaeda against targets in the United States, the nature of conspiracy theory under study is the one contradicting this official account to the extent that its attributes the attacks not to al-Qaeda militants but to actors in the United States government itself. The study is not an investigation into the truth value of conspiracy theories but rather an attempt at observing the essential qualities of the type of belief that is belief in conspiracy theories compared to belief in official accounts provided by authoritative sources such as governments, experts and mainstream media. These qualities include the psychological, epistemic and socio-political foundations on which belief in conspiracy theories are established. Based on a foundational understanding of the sort of belief that are beliefs in conspiracy theories, we may then extrapolate implied ethical demands on both authoritative bodies and actors as well as believers in conspiracy theories. For example: in their unofficial ‘non-factual’ status, is there not some violation of epistemic right in the same way we observe in cases where people are prejudiced because of their religious beliefs? In other words, is there an epistemic injustice suffered by believers in conspiracy theories in the way their beliefs are rejected as illegitimate? Conversely, to what extent do believers bear an epistemic responsibility in their adoption of their beliefs in conspiracy theories. From this position, perhaps we can then develop responses to the problem that foster greater social harmony even in the midst of suspicion and distrust.

Keywords: conspiracy theories, subjugated knowledge, epistemic injustice, epistemic responsibility

Procedia PDF Downloads 102
134 Clostridium Difficile in Western Australian Native Animals: Prevalence and Molecular Epidemiology

Authors: Karla Cautivo, Thomas Riley, Daniel Knight

Abstract:

Clostridium difficile infection (CDI) is the most common cause of infectious diarrhea in hospitalised humans. C. difficile colonises the gastrointestinal tract, causes disease in a variety of animal species and can persist as a spore in diverse environments. Genetic overlap between C. difficile strains from human, animal and environmental sources suggests CDI has a zoonotic or foodborne aetiology. In Australia, C. difficile PCR ribotype RT014 (MLST clade 1) and several ST11 (MLST clade 5) RTs are found commonly in livestock. The high prevalence and diversity of ST11 strains in Australian production animals indicates Australia might be the ancestral home for this lineage. This project describes for the first time the ecology of C. difficile in Australian native animals, providing insights into the prevalence, molecular epidemiology and evolution of C. difficile in this unique environment and a possible role in CDI in humans and animals in Australia. Faecal samples were collected from wild/captive reptiles (n=37), mammals (n=104) and birds (n=102) in Western Australia in 2020/21. Anaerobic enrichment culture was performed, and C. difficile isolates were characterised by PCR ribotyping and toxin gene profiling. Seventy isolates of C. difficile were recovered (prevalence of C. difficile in faecal samples 28%, n=68/243); 27 unique RTs were identified, 5 were novel. The prevalence of C. difficile was similar for reptiles and mammals, 46% (n=17/37) and 43%(n=45/104), respectively, but significantly lower in birds (7.8%, n=8/102; p<0.00001 for both reptiles and mammals). Of the 57 isolates available for typing, RT237 (clade 5) and RT002 (clade 2) were the most prevalent, 15.8% (n=9/57) and 14% (n=8/57), respectively. The high prevalence of C. difficile in reptiles and mammals, particularly clade 5 strains, supported by previous studies of C. difficile in Australian soils, suggest that Australia might be the ancestral home of MLST clade 5.

Keywords: Clostridium difficile, zoonosis, molecular epidemiology, ecology and evolution

Procedia PDF Downloads 209
133 An Approach to Building a Recommendation Engine for Travel Applications Using Genetic Algorithms and Neural Networks

Authors: Adrian Ionita, Ana-Maria Ghimes

Abstract:

The lack of features, design and the lack of promoting an integrated booking application are some of the reasons why most online travel platforms only offer automation of old booking processes, being limited to the integration of a smaller number of services without addressing the user experience. This paper represents a practical study on how to improve travel applications creating user-profiles through data-mining based on neural networks and genetic algorithms. Choices made by users and their ‘friends’ in the ‘social’ network context can be considered input data for a recommendation engine. The purpose of using these algorithms and this design is to improve user experience and to deliver more features to the users. The paper aims to highlight a broader range of improvements that could be applied to travel applications in terms of design and service integration, while the main scientific approach remains the technical implementation of the neural network solution. The motivation of the technologies used is also related to the initiative of some online booking providers that have made the fact that they use some ‘neural network’ related designs public. These companies use similar Big-Data technologies to provide recommendations for hotels, restaurants, and cinemas with a neural network based recommendation engine for building a user ‘DNA profile’. This implementation of the ‘profile’ a collection of neural networks trained from previous user choices, can improve the usability and design of any type of application.

Keywords: artificial intelligence, big data, cloud computing, DNA profile, genetic algorithms, machine learning, neural networks, optimization, recommendation system, user profiling

Procedia PDF Downloads 162
132 Natural Gas Flow Optimization Using Pressure Profiling and Isolation Techniques

Authors: Syed Tahir Shah, Fazal Muhammad, Syed Kashif Shah, Maleeha Gul

Abstract:

In recent days, natural gas has become a relatively clean and quality source of energy, which is recovered from deep wells by expensive drilling activities. The recovered substance is purified by processing in multiple stages to remove the unwanted/containments like dust, dirt, crude oil and other particles. Mostly, gas utilities are concerned with essential objectives of quantity/quality of natural gas delivery, financial outcome and safe natural gas volumetric inventory in the transmission gas pipeline. Gas quantity and quality are primarily related to standards / advanced metering procedures in processing units/transmission systems, and the financial outcome is defined by purchasing and selling gas also the operational cost of the transmission pipeline. SNGPL (Sui Northern Gas Pipelines Limited) Pakistan has a wide range of diameters of natural gas transmission pipelines network of over 9125 km. This research results in answer a few of the issues in accuracy/metering procedures via multiple advanced gadgets for gas flow attributes after being utilized in the transmission system and research. The effects of good pressure management in transmission gas pipeline network in contemplation to boost the gas volume deposited in the existing network and finally curbing gas losses UFG (Unaccounted for gas) for financial benefits. Furthermore, depending on the results and their observation, it is directed to enhance the maximum allowable working/operating pressure (MAOP) of the system to 1235 PSIG from the current round about 900 PSIG, such that the capacity of the network could be entirely utilized. In gross, the results depict that the current model is very efficient and provides excellent results in the minimum possible time.

Keywords: natural gas, pipeline network, UFG, transmission pack, AGA

Procedia PDF Downloads 95
131 Genomic and Transcriptomic Analysis of Antibiotic Resistance Genes in Biological Wastewater Treatment Systems Treating Domestic and Hospital Effluents

Authors: Thobela Conco, Sheena Kumari, Chika Nnadozie, Mahmoud Nasr, Thor A. Stenström, Mushal Ali, Arshad Ismail, Faizal Bux

Abstract:

The discharge of antibiotics and its residues into the wastewater treatment plants (WWTP’s) create a conducive environment for the development of antibiotic resistant pathogens. This presents a risk of potential dissemination of antibiotic resistant pathogens and antibiotic resistance genes into the environment. It is, therefore, necessary to study the level of antibiotic resistance genes (ARG’s) among bacterial pathogens that proliferate in biological wastewater treatment systems. In the current study, metagenomic and meta-transcriptomic sequences of samples collected from the influents, secondary effluents and post chlorinated effluents of three wastewater treatment plants treating domestic and hospital effluents in Durban, South Africa, were analyzed for profiling of ARG’s among bacterial pathogens. Results show that a variety of ARG’s, mostly, aminoglycoside, β-lactamases, tetracycline and sulfonamide resistance genes were harbored by diverse bacterial genera found at different stages of treatment. A significant variation in diversity of pathogen and ARGs between the treatment plant was observed; however, treated final effluent samples from all three plants showed a significant reduction in bacterial pathogens and detected ARG’s. Both pre- and post-chlorinated samples showed the presence of mobile genetic elements (MGE’s), indicating the inefficiency of chlorination to remove of ARG’s integrated with MGE’s. In conclusion, the study showed the wastewater treatment plant efficiently caused the reduction and removal of certain ARG’s, even though the initial focus was the removal of biological nutrients.

Keywords: antibiotic resistance, mobile genetic elements, wastewater, wastewater treatment plants

Procedia PDF Downloads 218
130 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria

Authors: Okike Benjamin

Abstract:

Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.

Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria

Procedia PDF Downloads 261
129 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 141
128 Integrative Transcriptomic Profiling of NK Cells and Monocytes: Advancing Diagnostic and Therapeutic Strategies for COVID-19

Authors: Salma Loukman, Reda Benmrid, Najat Bouchmaa, Hicham Hboub, Rachid El Fatimy, Rachid Benhida

Abstract:

In this study, it use integrated transcriptomic datasets from the GEO repository with the purpose of investigating immune dysregulation in COVID-19. Thus, in this context, we decided to be focused on NK cells and CD14+ monocytes gene expression, considering datasets GSE165461 and GSE198256, respectively. Other datasets with PBMCs, lung, olfactory, and sensory epithelium and lymph were used to provide robust validation for our results. This approach gave an integrated view of the immune responses in COVID-19, pointing out a set of potential biomarkers and therapeutic targets with special regard to standards of physiological conditions. IFI27, MKI67, CENPF, MBP, HBA2, TMEM158, THBD, HBA1, LHFPL2, SLA, and AC104564.3 were identified as key genes from our analysis that have critical biological processes related to inflammation, immune regulation, oxidative stress, and metabolic processes. Consequently, such processes are important in understanding the heterogeneous clinical manifestations of COVID-19—from acute to long-term effects now known as 'long COVID'. Subsequent validation with additional datasets consolidated these genes as robust biomarkers with an important role in the diagnosis of COVID-19 and the prediction of its severity. Moreover, their enrichment in key pathophysiological pathways presented them as potential targets for therapeutic intervention.The results provide insight into the molecular dynamics of COVID-19 caused by cells such as NK cells and other monocytes. Thus, this study constitutes a solid basis for targeted diagnostic and therapeutic development and makes relevant contributions to ongoing research efforts toward better management and mitigation of the pandemic.

Keywords: SARS-COV-2, RNA-seq, biomarkers, severity, long COVID-19, bio analysis

Procedia PDF Downloads 12
127 Developing an Automated Protocol for the Wristband Extraction Process Using Opentrons

Authors: Tei Kim, Brooklynn McNeil, Kathryn Dunn, Douglas I. Walker

Abstract:

To better characterize the relationship between complex chemical exposures and disease, our laboratory uses an approach that combines low-cost, polydimethylsiloxane (silicone) wristband samplers that absorb many of the chemicals we are exposed to with untargeted high-resolution mass spectrometry (HRMS) to characterize 1000’s of chemicals at a time. In studies with human populations, these wristbands can provide an important measure of our environment: however, there is a need to use this approach in large cohorts to study exposures associated with the disease. To facilitate the use of silicone samplers in large scale population studies, the goal of this research project was to establish automated sample preparation methods that improve throughput, robustness, and scalability of analytical methods for silicone wristbands. Using the Opentron OT2 automated liquid platform, which provides a low-cost and opensource framework for automated pipetting, we created two separate workflows that translate the manual wristband preparation method to a fully automated protocol that requires minor intervention by the operator. These protocols include a sequence generation step, which defines the location of all plates and labware according to user-specified settings, and a transfer protocol that includes all necessary instrument parameters and instructions for automated solvent extraction of wristband samplers. These protocols were written in Python and uploaded to GitHub for use by others in the research community. Results from this project show it is possible to establish automated and open source methods for the preparation of silicone wristband samplers to support profiling of many environmental exposures. Ongoing studies include deployment in longitudinal cohort studies to investigate the relationship between personal chemical exposure and disease.

Keywords: bioinformatics, automation, opentrons, research

Procedia PDF Downloads 115
126 High-Risk Gene Variant Profiling Models Ethnic Disparities in Diabetes Vulnerability

Authors: Jianhua Zhang, Weiping Chen, Guanjie Chen, Jason Flannick, Emma Fikse, Glenda Smerin, Yanqin Yang, Yulong Li, John A. Hanover, William F. Simonds

Abstract:

Ethnic disparities in many diseases are well recognized and reflect the consequences of genetic, behavior, and environmental factors. However, direct scientific evidence connecting the ethnic genetic variations and the disease disparities has been elusive, which may have led to the ethnic inequalities in large scale genetic studies. Through the genome-wide analysis of data representing 185,934 subjects, including 14,955 from our own studies of the African America Diabetes Mellitus, we discovered sets of genetic variants either unique to or conserved in all ethnicities. We further developed a quantitative gene function-based high-risk variant index (hrVI) of 20,428 genes to establish profiles that strongly correlate with the subjects' self-identified ethnicities. With respect to the ability to detect human essential and pathogenic genes, the hrVI analysis method is both comparable with and complementary to the well-known genetic analysis methods, pLI and VIRlof. Application of the ethnicity-specific hrVI analysis to the type 2 diabetes mellitus (T2DM) national repository, containing 20,791 cases and 24,440 controls, identified 114 candidate T2DM-associated genes, 8.8-fold greater than that of ethnicity-blind analysis. All the genes identified are defined as either pathogenic or likely-pathogenic in ClinVar database, with 33.3% diabetes-associated and 54.4% obesity-associated genes. These results demonstrate the utility of hrVI analysis and provide the first genetic evidence by clustering patterns of how genetic variations among ethnicities may impede the discovery of diabetes and foreseeably other disease-associated genes.

Keywords: diabetes-associated genes, ethnic health disparities, high-risk variant index, hrVI, T2DM

Procedia PDF Downloads 137