This growing collection consists of scholarly works authored by ASU-affiliated faculty, staff, and community members, and it contains many open access articles. ASU-affiliated authors are encouraged to Share Your Work in KEEP.

Displaying 1 - 10 of 98
Filtering by

Clear all filters

141475-Thumbnail Image.png
Description

The evolution of cooperation is a fundamental problem in biology, especially for non-relatives, where indirect fitness benefits cannot counter within-group inequalities. Multilevel selection models show how cooperation can evolve if it generates a group-level advantage, even when cooperators are disadvantaged within their group. This allows the possibility of group selection,

The evolution of cooperation is a fundamental problem in biology, especially for non-relatives, where indirect fitness benefits cannot counter within-group inequalities. Multilevel selection models show how cooperation can evolve if it generates a group-level advantage, even when cooperators are disadvantaged within their group. This allows the possibility of group selection, but few examples have been described in nature. Here we show that group selection can explain the evolution of cooperative nest founding in the harvester ant Pogonomyrmex californicus. Through most of this species’ range, colonies are founded by single queens, but in some populations nests are instead founded by cooperative groups of unrelated queens. In mixed groups of cooperative and single-founding queens, we found that aggressive individuals had a survival advantage within their nest, but foundress groups with such non-cooperators died out more often than those with only cooperative members. An agent-based model shows that the between-group advantage of the cooperative phenotype drives it to fixation, despite its within-group disadvantage, but only when population density is high enough to make between-group competition intense. Field data show higher nest density in a population where cooperative founding is common, consistent with greater density driving the evolution of cooperative foundation through group selection.

ContributorsShaffer, Zachary (Author) / Sasaki, Takao (Author) / Haney, Brian (Author) / Janssen, Marco (Author) / Pratt, Stephen (Author) / Fewell, Jennifer (Author) / College of Liberal Arts and Sciences (Contributor)
Created2016-07-28
Description

Human societies are unique in the level of cooperation among non-kin. Evolutionary models explaining this behavior typically assume pure strategies of cooperation and defection. Behavioral experiments, however, demonstrate that humans are typically conditional co-operators who have other-regarding preferences. Building on existing models on the evolution of cooperation and costly punishment,

Human societies are unique in the level of cooperation among non-kin. Evolutionary models explaining this behavior typically assume pure strategies of cooperation and defection. Behavioral experiments, however, demonstrate that humans are typically conditional co-operators who have other-regarding preferences. Building on existing models on the evolution of cooperation and costly punishment, we use a utilitarian formulation of agent decision making to explore conditions that support the emergence of cooperative behavior. Our results indicate that cooperation levels are significantly lower for larger groups in contrast to the original pure strategy model. Here, defection behavior not only diminishes the public good, but also affects the expectations of group members leading conditional co-operators to change their strategies. Hence defection has a more damaging effect when decisions are based on expectations and not only pure strategies.

Created2014-07-01
Description

The threat of West Nile virus (WNV) epidemics with increasingly severe neuroinvasive infections demands the development and licensing of effective vaccines. To date, vaccine candidates based on inactivated, live-attenuated, or chimeric virus, and viral DNA and WNV protein subunits have been developed. Some have been approved for veterinary use or

The threat of West Nile virus (WNV) epidemics with increasingly severe neuroinvasive infections demands the development and licensing of effective vaccines. To date, vaccine candidates based on inactivated, live-attenuated, or chimeric virus, and viral DNA and WNV protein subunits have been developed. Some have been approved for veterinary use or are under clinical investigation, yet no vaccine has been licensed for human use. Reaching the milestone of a commercialized human vaccine, however, may largely depend on the economics of vaccine production. Analysis suggests that currently only novel low-cost production technologies would allow vaccination to outcompete the cost of surveillance and clinical treatment. Here, we review progress using plants to address the economic challenges of WNV vaccine production. The advantages of plants as hosts for vaccine production in cost, speed and scalability, especially those of viral vector-based transient expression systems, are discussed. The progress in developing WNV subunit vaccines in plants is reviewed within the context of their expression, characterization, downstream processing, and immunogenicity in animal models. The development of vaccines based on enveloped and non-enveloped virus-like particles is also discussed. These advancements suggest that plants may provide a production platform that offers potent, safe and affordable human vaccines against WNV.

Created2015-05-01
Description

Osteosarcoma is the most common bone cancer in children and adolescents. Although 70% of patients with localized disease are cured with chemotherapy and surgical resection, patients with metastatic osteosarcoma are typically refractory to treatment. Numerous lines of evidence suggest that cytotoxic T lymphocytes (CTLs) limit the development of metastatic osteosarcoma.

Osteosarcoma is the most common bone cancer in children and adolescents. Although 70% of patients with localized disease are cured with chemotherapy and surgical resection, patients with metastatic osteosarcoma are typically refractory to treatment. Numerous lines of evidence suggest that cytotoxic T lymphocytes (CTLs) limit the development of metastatic osteosarcoma. We have investigated the role of PD-1, an inhibitory TNFR family protein expressed on CTLs, in limiting the efficacy of immune-mediated control of metastatic osteosarcoma. We show that human metastatic, but not primary, osteosarcoma tumors express a ligand for PD-1 (PD-L1) and that tumor-infiltrating CTLs express PD-1, suggesting this pathway may limit CTLs control of metastatic osteosarcoma in patients. PD-L1 is also expressed on the K7M2 osteosarcoma tumor cell line that establishes metastases in mice, and PD-1 is expressed on tumor-infiltrating CTLs during disease progression. Blockade of PD-1/PD-L1 interactions dramatically improves the function of osteosarcoma-reactive CTLs in vitro and in vivo, and results in decreased tumor burden and increased survival in the K7M2 mouse model of metastatic osteosarcoma. Our results suggest that blockade of PD-1/PD-L1 interactions in patients with metastatic osteosarcoma should be pursued as a therapeutic strategy.

Created2015-04-01
Description

On-going efforts to understand the dynamics of coupled social-ecological (or more broadly, coupled infrastructure) systems and common pool resources have led to the generation of numerous datasets based on a large number of case studies. This data has facilitated the identification of important factors and fundamental principles which increase our

On-going efforts to understand the dynamics of coupled social-ecological (or more broadly, coupled infrastructure) systems and common pool resources have led to the generation of numerous datasets based on a large number of case studies. This data has facilitated the identification of important factors and fundamental principles which increase our understanding of such complex systems. However, the data at our disposal are often not easily comparable, have limited scope and scale, and are based on disparate underlying frameworks inhibiting synthesis, meta-analysis, and the validation of findings. Research efforts are further hampered when case inclusion criteria, variable definitions, coding schema, and inter-coder reliability testing are not made explicit in the presentation of research and shared among the research community. This paper first outlines challenges experienced by researchers engaged in a large-scale coding project; then highlights valuable lessons learned; and finally discusses opportunities for further research on comparative case study analysis focusing on social-ecological systems and common pool resources. Includes supplemental materials and appendices published in the International Journal of the Commons 2016 Special Issue. Volume 10 - Issue 2 - 2016.

ContributorsRatajczyk, Elicia (Author) / Brady, Ute (Author) / Baggio, Jacopo (Author) / Barnett, Allain J. (Author) / Perez Ibarra, Irene (Author) / Rollins, Nathan (Author) / Rubinos, Cathy (Author) / Shin, Hoon Cheol (Author) / Yu, David (Author) / Aggarwal, Rimjhim (Author) / Anderies, John (Author) / Janssen, Marco (Author) / ASU-SFI Center for Biosocial Complex Systems (Contributor)
Created2016-09-09
Description

Governing common pool resources (CPR) in the face of disturbances such as globalization and climate change is challenging. The outcome of any CPR governance regime is the influenced by local combinations of social, institutional, and biophysical factors, as well as cross-scale interdependencies. In this study, we take a step towards

Governing common pool resources (CPR) in the face of disturbances such as globalization and climate change is challenging. The outcome of any CPR governance regime is the influenced by local combinations of social, institutional, and biophysical factors, as well as cross-scale interdependencies. In this study, we take a step towards understanding multiple-causation of CPR outcomes by analyzing 1) the co-occurrence of Design Principles (DP) by activity (irrigation, fishery and forestry), and 2) the combination(s) of DPs leading to social and ecological success. We analyzed 69 cases pertaining to three different activities: irrigation, fishery, and forestry. We find that the importance of the design principles is dependent upon the natural and hard human made infrastructure (i.e. canals, equipment, vessels etc.). For example, clearly defined social boundaries are important when the natural infrastructure is highly mobile (i.e. tuna fish), while monitoring is more important when the natural infrastructure is more static (i.e. forests or water contained within an irrigation system). However, we also find that congruence between local conditions and rules and proportionality between investment and extraction are key for CPR success independent from the natural and human hard made infrastructure. We further provide new visualization techniques for co-occurrence patterns and add to qualitative comparative analysis by introducing a reliability metric to deal with a large meta-analysis dataset on secondary data where information is missing or uncertain.

Includes supplemental materials and appendices publications in International Journal of the Commons 2016 Special Issue. Volume 10 - Issue 2 - 2016

ContributorsBaggio, Jacopo (Author) / Barnett, Alain J. (Author) / Perez, Irene (Author) / Brady, Ute (Author) / Ratajczyk, Elicia (Author) / Rollins, Nathan (Author) / Rubinos, Cathy (Author) / Shin, Hoon Cheol (Author) / Yu, David (Author) / Aggarwal, Rimjhim (Author) / Anderies, John (Author) / Janssen, Marco (Author) / Julie Ann Wrigley Global Institute of Sustainability (Contributor)
Created2016-09-09
Description

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack “fingerprints” and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches.

ContributorsChen, Yu-Zhong (Author) / Huang, Zi-Gang (Author) / Xu, Shouhuai (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-05-20
Description

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low efficiency, resource scarcity, and partial system failures. Under certain conditions global catastrophe on the scale of the whole system can occur through the dynamical process of cascading failures. We investigate optimization and resilience of time-varying supply-demand systems by constructing network models of such systems, where resources are transported from the supplier sites to users through various links. Here by optimization we mean minimization of the maximum load on links, and system resilience can be characterized using the cascading failure size of users who fail to connect with suppliers.

We consider two representative classes of supply schemes: load driven supply and fix fraction supply. Our findings are: (1) optimized systems are more robust since relatively smaller cascading failures occur when triggered by external perturbation to the links; (2) a large fraction of links can be free of load if resources are directed to transport through the shortest paths; (3) redundant links in the performance of the system can help to reroute the traffic but may undesirably transmit and enlarge the failure size of the system; (4) the patterns of cascading failures depend strongly upon the capacity of links; (5) the specific location of the trigger determines the specific route of cascading failure, but has little effect on the final cascading size; (6) system expansion typically reduces the efficiency; and (7) when the locations of the suppliers are optimized over a long expanding period, fewer suppliers are required. These results hold for heterogeneous networks in general, providing insights into designing optimal and resilient complex supply-demand systems that expand constantly in time.

ContributorsZhang, Si-Ping (Author) / Huang, Zi-Gang (Author) / Dong, Jia-Qi (Author) / Eisenberg, Daniel (Author) / Seager, Thomas (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-06-23
128619-Thumbnail Image.png
Description

Cervical cancer is the most common malignancy among women particularly in developing countries, with human papillomavirus (HPV) 16 causing 50% of invasive cervical cancers. A plant-based HPV vaccine is an alternative to the currently available virus-like particle (VLP) vaccines, and would be much less expensive. We optimized methods to express

Cervical cancer is the most common malignancy among women particularly in developing countries, with human papillomavirus (HPV) 16 causing 50% of invasive cervical cancers. A plant-based HPV vaccine is an alternative to the currently available virus-like particle (VLP) vaccines, and would be much less expensive. We optimized methods to express HPV16 L1 protein and purify VLPs from tobacco (Nicotiana benthamiana) leaves transfected with the magnICON deconstructed viral vector expression system. L1 proteins were extracted from agro-infiltrated leaves using a series of pH and salt mediated buffers. Expression levels of L1 proteins and VLPs were verified by immunoblot and ELISA, which confirmed the presence of sequential and conformational epitopes, respectively. Among three constructs tested (16L1d22, TPL1d22, and TPL1F), TPL1F, containing a full-length L1 and chloroplast transit peptide, was best. Extraction of HPV16 L1 from leaf tissue was most efficient (> 2.5% of total soluble protein) with a low-salt phosphate buffer. VLPs were purified using both cesium chloride (CsCl) density gradient and size exclusion chromatography. Electron microscopy studies confirmed the presence of assembled forms of HPV16 L1 VLPs. Collectively; our results indicated that chloroplast-targeted transient expression in tobacco plants is promising for the production of a cheap, efficacious HPV16 L1 VLP vaccine. Studies are underway to develop plant VLPs for the production of a cervical cancer vaccine.

ContributorsZahin, Maryam (Author) / Joh, Joongho (Author) / Khanal, Sujita (Author) / Husk, Adam (Author) / Mason, Hugh (Author) / Warzecha, Heribert (Author) / Ghim, Shin-je (Author) / Miller, Donald M. (Author) / Matoba, Nobuyuki (Author) / Bennett Jenson, Alfred (Author) / ASU Biodesign Center Immunotherapy, Vaccines and Virotherapy (Contributor) / Biodesign Institute (Contributor)
Created2016-08-12
128615-Thumbnail Image.png
Description

The botanical, Astragalus membranaceus, is a therapeutic in traditional Chinese medicine. Limited literature exists on the overall in vivo effects of A. membranaceus on the human body. This study evaluates the physiological responses to A. membranaceus by measuring leukocyte, platelet, and cytokine responses as well as body temperature and blood

The botanical, Astragalus membranaceus, is a therapeutic in traditional Chinese medicine. Limited literature exists on the overall in vivo effects of A. membranaceus on the human body. This study evaluates the physiological responses to A. membranaceus by measuring leukocyte, platelet, and cytokine responses as well as body temperature and blood pressure in healthy individuals after the in vivo administration of A. membranaceus. A dose-dependent increase in monocytes, neutrophils, and lymphocytes was measured 8–12 hours after administration and an increase in the number of circulating platelets was seen as early as 4 hours. A dynamic change in the levels of circulating cytokines was observed, especially in interferon-γ and tumor necrosis factor-α, IL-13, IL-6, and soluble IL-2R. Subjective symptoms reported by participants were similar to those typically experienced in viral type immune responses and included fatigue, malaise, and headache. Systolic and diastolic blood pressure were reduced within 4 hours after administration, while body temperature mildly increased within 8 hours after administration. In general, all responses returned to baseline values by 24 hours. Collectively, these results support the role of A. membranaceus in priming for a potential immune response as well as its effect on blood flow and wound healing.

Created2016-03-30