This paper provides the first comprehensive analysis of the fidelity of transcription in eukaryotic cells.
We characterized the metallothionein genes (Mt1, Mt2, Mt3, and Mt4) in Daphnia pulex on both molecular and ecotoxicological level. We therefore conducted a bioinformatical analysis of the gene location and predicted protein sequence, and screened the upstream flanking region for regulatory elements. The number of these elements and their positions relative to the start codon varied strongly among the four genes and even among two gene duplicates (Mt1A and Mt1B), suggesting different roles of the four proteins in the organisms’ response to stress. We subsequently conducted a chronic 16-day exposure of D. pulex to different environmental stressors (at sublethal levels causing approximately 50% reduction in reproduction). Based on prior knowledge, we exposed them to the metals Cd, Cu, and Ni, the moulting hormone hydroxyecdysone (20E), and the oxidative stressors cyanobacteria (Microcystis aeruginosa), and paraquat (Pq). We then compared mRNA expression levels of the four Mt genes under these stress conditions with control conditions in “The Chosen One” clone (TCO), for which the full genome was sequenced and annotated. All together, the mRNA expression results under the different stress regimes indicate that different Mt genes may play different and various roles in the response of D. pulex to stress and that some (but not all) of the differences among the four genes could be related to the pattern of regulatory elements in their upstream flanking region.
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on the physical distance between the participants. Existing symbolic verification frameworks for distance-bounding protocols consider timestamps and the location of agents. In this work we introduce a causalitybased characterization of secure distance-bounding that discards the notions of time and location. This allows us to verify the correctness of distance-bounding protocols with standard protocol verification tools. That is to say, we provide the first fully automated verification framework for distance-bounding protocols. By using our framework, we confirmed known vulnerabilities in a number of protocols and discovered unreported attacks against two recently published protocols.Keywords -distance bounding; security; causality; formal verification * This work has been accepted for publication at the proceedings of the 39th IEEE Symposium on Security and Privacy, S&P 2018. This is the authors' preprint version. For reference use published version at IEEE Xplore DL https://ieeexplore.ieee.org/document/8418584. Do not distribute without explicit permission.
BackgroundGenomic resources within the phylum Arthropoda are largely limited to the true insects but are beginning to include unexplored subphyla, such as the Crustacea and Chelicerata. Investigations of these understudied taxa uncover high frequencies of orphan genes, which lack detectable sequence homology to genes in pre-existing databases. The ticks (Acari: Chelicerata) are one such understudied taxon for which genomic resources are urgently needed. Ticks are obligate blood-feeders that vector major diseases of humans, domesticated animals, and wildlife. In analyzing a transcriptome of the lone star tick Amblyomma americanum, one of the most abundant disease vectors in the United States, we find a high representation of unannotated sequences. We apply a general framework for quantifying the origin and true representation of unannotated sequences in a dataset and for evaluating the biological significance of orphan genes.ResultsExpressed sequence tags (ESTs) were derived from different life stages and populations of A. americanum and combined with ESTs available from GenBank to produce 14,310 ESTs, over twice the number previously available. The vast majority (71%) has no sequence homology to proteins archived in UniProtKB. We show that poor sequence or assembly quality is not a major contributor to this high representation by orphan genes. Moreover, most unannotated sequences are functional: a microarray experiment demonstrates that 59% of functional ESTs are unannotated. Lastly, we attempt to further annotate our EST dataset using genomic datasets from other members of the Acari, including Ixodes scapularis, four other tick species and the mite Tetranychus urticae. We find low homology with these species, consistent with significant divergence within this subclass.ConclusionsWe conclude that the abundance of orphan genes in A. americanum likely results from 1) taxonomic isolation stemming from divergence within the tick lineage and limited genomic resources for ticks and 2) lineage-specific genes needing functional genomic studies to evaluate their association with the unique biology of ticks. The EST sequences described here will contribute substantially to the development of tick genomics. Moreover, the framework provided for the evaluation of orphan genes can guide analyses of future transcriptome sequencing projects.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.