Search results for: Yuval Tabach
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11

Search results for: Yuval Tabach

11 Whole Coding Genome Inter-Clade Comparison to Predict Global Cancer-Protecting Variants

Authors: Lamis Naddaf, Yuval Tabach

Abstract:

In this research, we identified the missense genetic variants that have the potential to enhance resistance against cancer. Such field has not been widely explored, as researchers tend to investigate mutations that cause diseases, in response to the suffering of patients, rather than those mutations that protect from them. In conjunction with the genomic revolution, and the advances in genetic engineering and synthetic biology, identifying the protective variants will increase the power of genotype-phenotype predictions and can have significant implications on improved risk estimation, diagnostics, prognosis and even for personalized therapy and drug discovery. To approach our goal, we systematically investigated the sites of the coding genomes and picked up the alleles that showed a correlation with the species’ cancer resistance. We predicted 250 protecting variants (PVs) with a 0.01 false discovery rate and more than 20 thousand PVs with a 0.25 false discovery rate. Cancer resistance in Mammals and reptiles was significantly predicted by the number of PVs a species has. Moreover, Genes enriched with the protecting variants are enriched in pathways relevant to tumor suppression like pathways of Hedgehog signaling and silencing, which its improper activation is associated with the most common form of cancer malignancy. We also showed that the PVs are more abundant in healthy people compared to cancer patients within different human races.

Keywords: comparative genomics, machine learning, cancer resistance, cancer-protecting alleles

Procedia PDF Downloads 64
10 Whole Coding Genome Inter-Clade Comparisons to Predict Global Cancer-Protecting Variants

Authors: Lamis Naddaf, Yuval Tabach

Abstract:

We identified missense genetic variants with the potential to enhance resistance against cancer. Such a field has not been widely explored as researchers tend to investigate the mutations that cause diseases, in response to the suffering of patients, rather than those mutations that protect from them. In conjunction with the genomic revolution and the advances in genetic engineering and synthetic biology, identifying the protective variants will increase the power of genotype-phenotype predictions and have significant implications for improved risk estimation, diagnostics, prognosis, and even personalized therapy and drug discovery. To approach our goal, we systematically investigated the sites of the coding genomes and selected the alleles that showed a correlation with the species’ cancer resistance. Interestingly, we found several amino acids that are more generally preferred (like the Proline) or avoided (like the Cysteine) by the resistant species. Furthermore, Cancer resistance in mammals and reptiles is significantly predicted by the number of the predicted protecting variants (PVs) a species has. Moreover, PVs-enriched-genes are enriched in pathways relevant to tumor suppression. For example, they are enriched in the Hedgehog signaling and silencing pathways, which its improper activation is associated with the most common form of cancer malignancy. We also showed that the PVs are mostly more abundant in healthy people compared to cancer patients within different human races.

Keywords: cancer resistance, protecting variant, naked mole rat, comparative genomics

Procedia PDF Downloads 64
9 Experimental Study of Flow Effects of Solid Particles’ Size in Porous Media

Authors: S. Akridiss, E. El Tabach, K. Chetehouna, N. Gascoin, M. S. Kadiri

Abstract:

Transpiration cooling combined to regenerative cooling is a technique that could be used to cool the porous walls of the future ramjet combustion chambers; it consists of using fuel that will flow through the pores of the porous material consisting of the chamber walls, as coolant. However, at high temperature, the fuel is pyrolysed and generates solid coke particles inside the porous materials. This phenomenon can lead to a significant decrease of the material permeability and can affect the efficiency of the cooling system. In order to better understand this phenomenon, an experimental laboratory study was undertaken to determine the transport and deposition of particles in a sintered porous material subjected to steady state flow. The test bench composed of a high-pressure autoclave is used to study the transport of different particle size (35

Keywords: experimental study, permeability, porous material, suspended particles

Procedia PDF Downloads 246
8 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 321
7 Jewish Law in the State of Israel: Law, Religion and State

Authors: Yuval Sinai

Abstract:

As part of the historical, religious and cultural heritage of the Jewish people, Jewish law is part of the legal system in Israel, which is a Jewish and democratic state. The proper degree of use of Jewish law in judicial decisions is an issue that crops up in Israeli law from time to time. This was a burning question in the 1980s in the wake of the enactment of the Foundations of Law Act 1980, which declared Jewish heritage a supplementary legal method to Israeli law. The enactment of the Basic Law: Human Dignity and Liberty 1992, which decreed that the basic Israeli legal principles must be interpreted in light of the values of a Jewish and democratic state, marks a significant change in the impact of Judaism in the law created and applied by the courts. Both of these legislative developments revived the initiative to grant a central status to Jewish law within the state law. How should Jewish law be applied in Israel’s secular courts? This is not a simple question. It is not merely a question of identifying the relevant rule of Jewish law or tracing its development from the Talmud to modern times. Nor is it the same as asking how a rabbinic court would handle the issue. It is a matter of delicate judgment to distill out of the often conflicting Jewish law sources a rule that will fit into the existing framework of Israeli law so as to advance a policy that will best promote the interests of Israel’s society. We shall point out the occasional tensions between Jewish religious law and secular law, and introduce opinions as to how reconciliation of the two can best be achieved in light of Jewish legal tradition and in light of the reality in the modern State of Israel.

Keywords: law and religion, israel, jewish law, law and society

Procedia PDF Downloads 27
6 Jewish Law in Israel: State, Law, and Religion

Authors: Yuval Sinai

Abstract:

As part of the historical, religious and cultural heritage of the Jewish people, Jewish law is part of the legal system in Israel, which is a Jewish and democratic state. The proper degree of use of Jewish law in judicial decisions is an issue that crops up in Israeli law from time to time. This was a burning question in the 1980s in the wake of the enactment of the Foundations of Law Act 1980, which declared Jewish heritage a supplementary legal method to Israeli law. The enactment of the Basic Law: Human Dignity and Liberty 1992, which decreed that the basic Israeli legal principles must be interpreted in light of the values of a Jewish and democratic state, marks a significant change in the impact of Judaism in the law created and applied by the courts. Both of these legislative developments revived the initiative to grant a central status to Jewish law within the state law. How should Jewish law be applied in Israel’s secular courts? This is not a simple question. It is not merely a question of identifying the relevant rule of Jewish law or tracing its development from the Talmud to modern times. Nor is it the same as asking how a rabbinic court would handle the issue. It is a matter of delicate judgment to distill out of the often conflicting Jewish law sources a rule that will fit into the existing framework of Israeli law so as to advance a policy that will best promote the interests of Israel’s society. We shall point out the occasional tensions between Jewish religious law and secular law, and introduce opinions as to how reconciliation of the two can best be achieved in light of Jewish legal tradition and in light of the reality in the modern State of Israel.

Keywords: law and politics, law and religion, comparative law, law and society

Procedia PDF Downloads 34
5 Age and Gender Differences in Positive Solitude Preferences

Authors: Sharon Ost Mor, Yuval Palgi, Ddikla Segel-Karpas

Abstract:

Solitude and positive solitude (PS) are used in literature interchangeably, yet they have different attributes and effects. While solitude might have devastating outcomes such as depression or health deterioration, PS has beneficial outcomes. Yet, both solitude and PS have no clear unanimous definition. Most researches focus on solitude, while the phenomenon of PS is somewhat neglected. Most research deals with young people and adults, while the current research is interested in PS concepts especially in old age. A qualitative study, with 124 participants was performed in order to understand the essence of PS in different age groups. The findings revealed seven categories related to PS, including: Quietness, religious and spiritual experience, escapism, experience in nature or abroad, controlling stress or thoughts, facilitation achievements and recreation-hobbies-routines. Moreover, three meta-themes emerged: PS is a matter of choice, it is meaningful and enjoyable. One stand alone category was found: PS preconditions. Differences between younger and older adults were found in several categories and in PS preconditions, while the meta-themes were equally mentioned by all participants. Based on the participant's reflections and descriptions a new PS paradigm was built and will be presented as well as a new definition of PS. PS was renamed as 'Soulitude' in order to emphasize its' positive nature. Conclusions: PS serves well most people, yet it has different attributes in different ages. By giving PS a unanimous definition and by understanding its' contribution for the elderly, PS might be addressed as a legitimate, stand alone phenomenon. The paradigm might serve theory as well as clinicians for further PS research.

Keywords: old-old, positive solitude, solitude, soulitude

Procedia PDF Downloads 94
4 Following the Modulation of Transcriptional Activity of Genes by Chromatin Modifications during the Cell Cycle in Living Cells

Authors: Sharon Yunger, Liat Altman, Yuval Garini, Yaron Shav-Tal

Abstract:

Understanding the dynamics of transcription in living cells has improved since the development of quantitative fluorescence-based imaging techniques. We established a method for following transcription from a single copy gene in living cells. A gene tagged with MS2 repeats, used for mRNA tagging, in its 3' UTR was integrated into a single genomic locus. The actively transcribing gene was detected and analyzed by fluorescence in situ hybridization (FISH) and live-cell imaging. Several cell clones were created that differed in the promoter regulating the gene. Thus, comparative analysis could be obtained without the risk of different position effects at each integration site. Cells in S/G2 phases could be detected exhibiting two adjacent transcription sites on sister chromatids. A sharp reduction in the transcription levels was observed as cells progressed along the cell cycle. We hypothesized that a change in chromatin structure acts as a general mechanism during the cell cycle leading to down-regulation in the activity of some genes. We addressed this question by treating the cells with chromatin decondensing agents. Quantifying and imaging the treated cells suggests that chromatin structure plays a role both in regulating transcriptional levels along the cell cycle, as well as in limiting an active gene from reaching its maximum transcription potential at any given time. These results contribute to understanding the role of chromatin as a regulator of gene expression.

Keywords: cell cycle, living cells, nucleus, transcription

Procedia PDF Downloads 250
3 Simulating Elevated Rapid Transit System for Performance Analysis

Authors: Ran Etgar, Yuval Cohen, Erel Avineri

Abstract:

One of the major challenges of transportation in medium sized inner-cities (such as Tel-Aviv) is the last-mile solution. Personal rapid transit (PRT) seems like an applicable candidate for this, as it combines the benefits of personal (car) travel with the operational benefits of transit. However, the investment required for large area PRT grid is significant and there is a need to economically justify such investment by correctly evaluating the grid capacity. PRT main elements are small automated vehicles (sometimes referred to as podcars) operating on a network of specially built guideways. The research is looking at a specific concept of elevated PRT system. Literature review has revealed the drawbacks PRT modelling and simulation approaches, mainly due to the lack of consideration of technical and operational features of the system (such as headways, acceleration, safety issues); the detailed design of infrastructure (guideways, stations, and docks); the stochastic and sessional characteristics of demand; and safety regulations – all of them have a strong effect on the system performance. A highly detailed model of the system, developed in this research, is applying a discrete event simulation combined with an agent-based approach, to represent the system elements and the podecars movement logic. Applying a case study approach, the simulation model is used to study the capacity of the system, the expected throughput of the system, the utilization, and the level of service (journey time, waiting time, etc.).

Keywords: capacity, productivity measurement, PRT, simulation, transportation

Procedia PDF Downloads 116
2 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 351
1 Toward Understanding the Glucocorticoid Receptor Network in Cancer

Authors: Swati Srivastava, Mattia Lauriola, Yuval Gilad, Adi Kimchi, Yosef Yarden

Abstract:

The glucocorticoid receptor (GR) has been proposed to play important, but incompletely understood roles in cancer. Glucocorticoids (GCs) are widely used as co-medication of various carcinomas, due to their ability to reduce the toxicity of chemotherapy. Furthermore, GR antagonism has proven to be a strategy to treat triple negative breast cancer and castration-resistant prostate cancer. These observations suggest differential GR involvement in cancer subtypes. The goal of our study has been to elaborate the current understanding of GR signaling in tumor progression and metastasis. Our study involves two cellular models, non-tumorigenic breast epithelial cells (MCF10A) and Ewing sarcoma cells (CHLA9). In our breast cell model, the results indicated that the GR agonist dexamethasone inhibits EGF-induced mammary cell migration, and this effect was blocked when cells were stimulated with a GR antagonist, namely RU486. Microarray analysis for gene expression revealed that the mechanism underlying inhibition involves dexamenthasone-mediated repression of well-known activators of EGFR signaling, alongside with enhancement of several EGFR’s negative feedback loops. Because GR mainly acts primarily through composite response elements (GREs), or via a tethering mechanism, our next aim has been to find the transcription factors (TFs) which can interact with GR in MCF10A cells.The TF-binding motif overrepresented at the promoter of dexamethasone-regulated genes was predicted by using bioinformatics. To validate the prediction, we performed high-throughput Protein Complementation Assays (PCA). For this, we utilized the Gaussia Luciferase PCA strategy, which enabled analysis of protein-protein interactions between GR and predicted TFs of mammary cells. A library comprising both nuclear receptors (estrogen receptor, mineralocorticoid receptor, GR) and TFs was fused to fragments of GLuc, namely GLuc(1)-X, X-GLuc(1), and X-GLuc(2), where GLuc(1) and GLuc(2) correspond to the N-terminal and C-terminal fragments of the luciferase gene.The resulting library was screened, in human embryonic kidney 293T (HEK293T) cells, for all possible interactions between nuclear receptors and TFs. By screening all of the combinations between TFs and nuclear receptors, we identified several positive interactions, which were strengthened in response to dexamethasone and abolished in response to RU486. Furthermore, the interactions between GR and the candidate TFs were validated by co-immunoprecipitation in MCF10A and in CHLA9 cells. Currently, the roles played by the uncovered interactions are being evaluated in various cellular processes, such as cellular proliferation, migration, and invasion. In conclusion, our assay provides an unbiased network analysis between nuclear receptors and other TFs, which can lead to important insights into transcriptional regulation by nuclear receptors in various diseases, in this case of cancer.

Keywords: epidermal growth factor, glucocorticoid receptor, protein complementation assay, transcription factor

Procedia PDF Downloads 194