Matching Items (472)
149725-Thumbnail Image.png
Description
Infections caused by the Hepatitis C Virus (HCV) are very common worldwide, affecting up to 3% of the population. Chronic infection of HCV may develop into liver cirrhosis and liver cancer which is among the top five of the most common cancers. Therefore, vaccines against HCV are under intense study

Infections caused by the Hepatitis C Virus (HCV) are very common worldwide, affecting up to 3% of the population. Chronic infection of HCV may develop into liver cirrhosis and liver cancer which is among the top five of the most common cancers. Therefore, vaccines against HCV are under intense study in order to prevent HCV from harming people's health. The envelope protein 2 (E2) of HCV is thought to be a promising vaccine candidate because it can directly bind to a human cell receptor and plays a role in viral entry. However, the E2 protein production in cells is inefficient due to its complicated matured structure. Folding of E2 in the endoplasmic reticulum (ER) is often error-prone, resulting in production of aggregates and misfolded proteins. These incorrect forms of E2 are not functional because they are not able to bind to human cells and stimulate antibody response to inhibit this binding. This study is aimed to overcome the difficulties of HCV E2 production in plant system. Protein folding in the ER requires great assistance from molecular chaperones. Thus, in this study, two molecular chaperones in the ER, calreticulin and calnexin, were transiently overexpressed in plant leaves in order to facilitate E2 folding and production. Both of them showed benefits in increasing the yield of E2 and improving the quality of E2. In addition, poorly folded E2 accumulated in the ER may cause stress in the ER and trigger transcriptional activation of ER molecular chaperones. Therefore, a transcription factor involved in this pathway, named bZIP60, was also overexpressed in plant leaves, aiming at up-regulating a major family of molecular chaperones called BiP to assist protein folding. However, our results showed that BiP mRNA levels were not up-regulated by bZIP60, but they increased in response to E2 expression. The Western blot analysis also showed that overexpression of bZIP60 had a small effect on promoting E2 folding. Overall, this study suggested that increasing the level of specific ER molecular chaperones was an effective way to promote HCV E2 protein production and maturation.
ContributorsHong, Fan (Author) / Mason, Hugh (Thesis advisor) / Gaxiola, Roberto (Committee member) / Chang, Yung (Committee member) / Chen, Qiang (Committee member) / Arizona State University (Publisher)
Created2011
150111-Thumbnail Image.png
Description
Finding the optimal solution to a problem with an enormous search space can be challenging. Unless a combinatorial construction technique is found that also guarantees the optimality of the resulting solution, this could be an infeasible task. If such a technique is unavailable, different heuristic methods are generally used to

Finding the optimal solution to a problem with an enormous search space can be challenging. Unless a combinatorial construction technique is found that also guarantees the optimality of the resulting solution, this could be an infeasible task. If such a technique is unavailable, different heuristic methods are generally used to improve the upper bound on the size of the optimal solution. This dissertation presents an alternative method which can be used to improve a solution to a problem rather than construct a solution from scratch. Necessity analysis, which is the key to this approach, is the process of analyzing the necessity of each element in a solution. The post-optimization algorithm presented here utilizes the result of the necessity analysis to improve the quality of the solution by eliminating unnecessary objects from the solution. While this technique could potentially be applied to different domains, this dissertation focuses on k-restriction problems, where a solution to the problem can be presented as an array. A scalable post-optimization algorithm for covering arrays is described, which starts from a valid solution and performs necessity analysis to iteratively improve the quality of the solution. It is shown that not only can this technique improve upon the previously best known results, it can also be added as a refinement step to any construction technique and in most cases further improvements are expected. The post-optimization algorithm is then modified to accommodate every k-restriction problem; and this generic algorithm can be used as a starting point to create a reasonable sized solution for any such problem. This generic algorithm is then further refined for hash family problems, by adding a conflict graph analysis to the necessity analysis phase. By recoloring the conflict graphs a new degree of flexibility is explored, which can further improve the quality of the solution.
ContributorsNayeri, Peyman (Author) / Colbourn, Charles (Thesis advisor) / Konjevod, Goran (Thesis advisor) / Sen, Arunabha (Committee member) / Stanzione Jr, Daniel (Committee member) / Arizona State University (Publisher)
Created2011
150114-Thumbnail Image.png
Description
Reverse engineering gene regulatory networks (GRNs) is an important problem in the domain of Systems Biology. Learning GRNs is challenging due to the inherent complexity of the real regulatory networks and the heterogeneity of samples in available biomedical data. Real world biological data are commonly collected from broad surveys (profiling

Reverse engineering gene regulatory networks (GRNs) is an important problem in the domain of Systems Biology. Learning GRNs is challenging due to the inherent complexity of the real regulatory networks and the heterogeneity of samples in available biomedical data. Real world biological data are commonly collected from broad surveys (profiling studies) and aggregate highly heterogeneous biological samples. Popular methods to learn GRNs simplistically assume a single universal regulatory network corresponding to available data. They neglect regulatory network adaptation due to change in underlying conditions and cellular phenotype or both. This dissertation presents a novel computational framework to learn common regulatory interactions and networks underlying the different sets of relatively homogeneous samples from real world biological data. The characteristic set of samples/conditions and corresponding regulatory interactions defines the cellular context (context). Context, in this dissertation, represents the deterministic transcriptional activity within the specific cellular regulatory mechanism. The major contributions of this framework include - modeling and learning context specific GRNs; associating enriched samples with contexts to interpret contextual interactions using biological knowledge; pruning extraneous edges from the context-specific GRN to improve the precision of the final GRNs; integrating multisource data to learn inter and intra domain interactions and increase confidence in obtained GRNs; and finally, learning combinatorial conditioning factors from the data to identify regulatory cofactors. The framework, Expattern, was applied to both real world and synthetic data. Interesting insights were obtained into mechanism of action of drugs on analysis of NCI60 drug activity and gene expression data. Application to refractory cancer data and Glioblastoma multiforme yield GRNs that were readily annotated with context-specific phenotypic information. Refractory cancer GRNs also displayed associations between distinct cancers, not observed through only clustering. Performance comparisons on multi-context synthetic data show the framework Expattern performs better than other comparable methods.
ContributorsSen, Ina (Author) / Kim, Seungchan (Thesis advisor) / Baral, Chitta (Committee member) / Bittner, Michael (Committee member) / Konjevod, Goran (Committee member) / Arizona State University (Publisher)
Created2011
149703-Thumbnail Image.png
Description
This dissertation studies routing in small-world networks such as grids plus long-range edges and real networks. Kleinberg showed that geography-based greedy routing in a grid-based network takes an expected number of steps polylogarithmic in the network size, thus justifying empirical efficiency observed beginning with Milgram. A counterpart for the grid-based

This dissertation studies routing in small-world networks such as grids plus long-range edges and real networks. Kleinberg showed that geography-based greedy routing in a grid-based network takes an expected number of steps polylogarithmic in the network size, thus justifying empirical efficiency observed beginning with Milgram. A counterpart for the grid-based model is provided; it creates all edges deterministically and shows an asymptotically matching upper bound on the route length. The main goal is to improve greedy routing through a decentralized machine learning process. Two considered methods are based on weighted majority and an algorithm of de Farias and Megiddo, both learning from feedback using ensembles of experts. Tests are run on both artificial and real networks, with decentralized spectral graph embedding supplying geometric information for real networks where it is not intrinsically available. An important measure analyzed in this work is overpayment, the difference between the cost of the method and that of the shortest path. Adaptive routing overtakes greedy after about a hundred or fewer searches per node, consistently across different network sizes and types. Learning stabilizes, typically at overpayment of a third to a half of that by greedy. The problem is made more difficult by eliminating the knowledge of neighbors' locations or by introducing uncooperative nodes. Even under these conditions, the learned routes are usually better than the greedy routes. The second part of the dissertation is related to the community structure of unannotated networks. A modularity-based algorithm of Newman is extended to work with overlapping communities (including considerably overlapping communities), where each node locally makes decisions to which potential communities it belongs. To measure quality of a cover of overlapping communities, a notion of a node contribution to modularity is introduced, and subsequently the notion of modularity is extended from partitions to covers. The final part considers a problem of network anonymization, mostly by the means of edge deletion. The point of interest is utility preservation. It is shown that a concentration on the preservation of routing abilities might damage the preservation of community structure, and vice versa.
ContributorsBakun, Oleg (Author) / Konjevod, Goran (Thesis advisor) / Richa, Andrea (Thesis advisor) / Syrotiuk, Violet R. (Committee member) / Czygrinow, Andrzej (Committee member) / Arizona State University (Publisher)
Created2011
152172-Thumbnail Image.png
Description
The primary function of the medium access control (MAC) protocol is managing access to a shared communication channel. From the viewpoint of transmitters, the MAC protocol determines each transmitter's persistence, the fraction of time it is permitted to spend transmitting. Schedule-based schemes implement stable persistences, achieving low variation in delay

The primary function of the medium access control (MAC) protocol is managing access to a shared communication channel. From the viewpoint of transmitters, the MAC protocol determines each transmitter's persistence, the fraction of time it is permitted to spend transmitting. Schedule-based schemes implement stable persistences, achieving low variation in delay and throughput, and sometimes bounding maximum delay. However, they adapt slowly, if at all, to changes in the network. Contention-based schemes are agile, adapting quickly to changes in perceived contention, but suffer from short-term unfairness, large variations in packet delay, and poor performance at high load. The perfect MAC protocol, it seems, embodies the strengths of both contention- and schedule-based approaches while avoiding their weaknesses. This thesis culminates in the design of a Variable-Weight and Adaptive Topology Transparent (VWATT) MAC protocol. The design of VWATT first required answers for two questions: (1) If a node is equipped with schedules of different weights, which weight should it employ? (2) How is the node to compute the desired weight in a network lacking centralized control? The first question is answered by the Topology- and Load-Aware (TLA) allocation which defines target persistences that conform to both network topology and traffic load. Simulations show the TLA allocation to outperform IEEE 802.11, improving on the expectation and variation of delay, throughput, and drop rate. The second question is answered in the design of an Adaptive Topology- and Load-Aware Scheduled (ATLAS) MAC that computes the TLA allocation in a decentralized and adaptive manner. Simulation results show that ATLAS converges quickly on the TLA allocation, supporting highly dynamic networks. With these questions answered, a construction based on transversal designs is given for a variable-weight topology transparent schedule that allows nodes to dynamically and independently select weights to accommodate local topology and traffic load. The schedule maintains a guarantee on maximum delay when the maximum neighbourhood size is not too large. The schedule is integrated with the distributed computation of ATLAS to create VWATT. Simulations indicate that VWATT offers the stable performance characteristics of a scheduled MAC while adapting quickly to changes in topology and traffic load.
ContributorsLutz, Jonathan (Author) / Colbourn, Charles J (Thesis advisor) / Syrotiuk, Violet R. (Thesis advisor) / Konjevod, Goran (Committee member) / Lloyd, Errol L. (Committee member) / Arizona State University (Publisher)
Created2013
150660-Thumbnail Image.png
Description
Semiconductor scaling technology has led to a sharp growth in transistor counts. This has resulted in an exponential increase on both power dissipation and heat flux (or power density) in modern microprocessors. These microprocessors are integrated as the major components in many modern embedded devices, which offer richer features and

Semiconductor scaling technology has led to a sharp growth in transistor counts. This has resulted in an exponential increase on both power dissipation and heat flux (or power density) in modern microprocessors. These microprocessors are integrated as the major components in many modern embedded devices, which offer richer features and attain higher performance than ever before. Therefore, power and thermal management have become the significant design considerations for modern embedded devices. Dynamic voltage/frequency scaling (DVFS) and dynamic power management (DPM) are two well-known hardware capabilities offered by modern embedded processors. However, the power or thermal aware performance optimization is not fully explored for the mainstream embedded processors with discrete DVFS and DPM capabilities. Many key problems have not been answered yet. What is the maximum performance that an embedded processor can achieve under power or thermal constraint for a periodic application? Does there exist an efficient algorithm for the power or thermal management problems with guaranteed quality bound? These questions are hard to be answered because the discrete settings of DVFS and DPM enhance the complexity of many power and thermal management problems, which are generally NP-hard. The dissertation presents a comprehensive study on these NP-hard power and thermal management problems for embedded processors with discrete DVFS and DPM capabilities. In the domain of power management, the dissertation addresses the power minimization problem for real-time schedules, the energy-constrained make-span minimization problem on homogeneous and heterogeneous chip multiprocessors (CMP) architectures, and the battery aware energy management problem with nonlinear battery discharging model. In the domain of thermal management, the work addresses several thermal-constrained performance maximization problems for periodic embedded applications. All the addressed problems are proved to be NP-hard or strongly NP-hard in the study. Then the work focuses on the design of the off-line optimal or polynomial time approximation algorithms as solutions in the problem design space. Several addressed NP-hard problems are tackled by dynamic programming with optimal solutions and pseudo-polynomial run time complexity. Because the optimal algorithms are not efficient in worst case, the fully polynomial time approximation algorithms are provided as more efficient solutions. Some efficient heuristic algorithms are also presented as solutions to several addressed problems. The comprehensive study answers the key questions in order to fully explore the power and thermal management potentials on embedded processors with discrete DVFS and DPM capabilities. The provided solutions enable the theoretical analysis of the maximum performance for periodic embedded applications under power or thermal constraints.
ContributorsZhang, Sushu (Author) / Chatha, Karam S (Thesis advisor) / Cao, Yu (Committee member) / Konjevod, Goran (Committee member) / Vrudhula, Sarma (Committee member) / Xue, Guoliang (Committee member) / Arizona State University (Publisher)
Created2012
136192-Thumbnail Image.png
Description
Is it possible to treat the mouth as a natural environment, and determine new methods to keep the microbiome in check? The need for biodiversity in health may suggest that every species carries out a specific function that is required to maintain equilibrium and homeostasis within the oral cavity. Furthermore,

Is it possible to treat the mouth as a natural environment, and determine new methods to keep the microbiome in check? The need for biodiversity in health may suggest that every species carries out a specific function that is required to maintain equilibrium and homeostasis within the oral cavity. Furthermore, the relationship between the microbiome and its host is mutually beneficial because the host is providing microbes with an environment in which they can flourish and, in turn, keep their host healthy. Reviewing examples of larger scale environmental shifts could provide a window by which scientists can make hypotheses. Certain medications and healthcare treatments have been proven to cause xerostomia. This disorder is characterized by a dry mouth, and known to be associated with a change in the composition, and reduction, of saliva. Two case studies performed by Bardow et al, and Leal et al, tested and studied the relationships of certain medications and confirmed their side effects on the salivary glands [2,3]. Their results confirmed a relationship between specific medicines, and the correlating complaints of xerostomia. In addition, Vissink et al conducted case studies that helped to further identify how radiotherapy causes hyposalivation of the salivary glands [4]. Specifically patients that have been diagnosed with oral cancer, and are treated by radiotherapy, have been diagnosed with xerostomia. As stated prior, studies have shown that patients having an ecologically balanced and diverse microbiome tend to have healthier mouths. The oral cavity is like any biome, consisting of commensalism within itself and mutualism with its host. Due to the decreased salivary output, caused by xerostomia, increased parasitic bacteria build up within the oral cavity thus causing dental disease. Every human body contains a personalized microbiome that is essential to maintaining health but capable of eliciting disease. The Human Oral Microbiomics Database (HOMD) is a set of reference 16S rRNA gene sequences. These are then used to define individual human oral taxa. By conducting metagenomic experiments at the molecular and cellular level, scientists can identify and label micro species that inhabit the mouth during parasitic outbreaks or a shifting of the microbiome. Because the HOMD is incomplete, so is our ability to cure, or prevent, oral disease. The purpose of the thesis is to research what is known about xerostomia and its effects on the complex microbiome of the oral cavity. It is important that researchers determine whether this particular perspective is worth considering. In addition, the goal is to create novel experiments for treatment and prevention of dental diseases.
ContributorsHalcomb, Michael Jordan (Author) / Chen, Qiang (Thesis director) / Steele, Kelly (Committee member) / Barrett, The Honors College (Contributor) / College of Letters and Sciences (Contributor)
Created2015-05
135647-Thumbnail Image.png
Description
Clean water for drinking, food preparation, and bathing is essential for astronaut health and safety during long duration habitation of the International Space Station (ISS), including future missions to Mars. Despite stringent water treatment and recycling efforts on the ISS, it is impossible to completely prevent microbial contamination of onboard

Clean water for drinking, food preparation, and bathing is essential for astronaut health and safety during long duration habitation of the International Space Station (ISS), including future missions to Mars. Despite stringent water treatment and recycling efforts on the ISS, it is impossible to completely prevent microbial contamination of onboard water supplies. In this work, we used a spaceflight analogue culture system to better understand how the microgravity environment can influence the pathogenesis-related characteristics of Burkholderia cepacia complex (Bcc), an opportunistic pathogen previously recovered from the ISS water system. The results of the present study suggest that there may be important differences in how this pathogen can respond and adapt to spaceflight and other low fluid shear environments encountered during their natural life cycles. Future studies are aimed at understanding the underlying mechanisms responsible for these phenotypes.
ContributorsKang, Bianca Younseon (Author) / Nickerson, Cheryl (Thesis director) / Barrila, Jennifer (Committee member) / Ott, Mark (Committee member) / School of Life Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
137715-Thumbnail Image.png
Description
The objectives of this review include a discussion of the West Nile Virus phylogeny, transmission history, how the virus functions in the body and how it is a threat to public health, and then discusses these items related to vaccine technology surrounding West Nile Virus. This will include past developments,

The objectives of this review include a discussion of the West Nile Virus phylogeny, transmission history, how the virus functions in the body and how it is a threat to public health, and then discusses these items related to vaccine technology surrounding West Nile Virus. This will include past developments, current research in the field and what it may take to develop such a vaccine safe and economical for human usage.
ContributorsSlinker, Haleigh Renee (Author) / Chen, Qiang (Thesis director) / Huffman, Holly (Committee member) / Oberstein, Bruce (Committee member) / Barrett, The Honors College (Contributor) / School of Letters and Sciences (Contributor)
Created2013-05
137601-Thumbnail Image.png
Description
Thirty six percent of Americans are obese and thirty three percent are overweight; obesity has become a known killer in the U.S. yet its prevalence has maintained a firm grasp on the U.S. population and continues to spread across the globe as other countries slowly adopt the American lifestyle. A

Thirty six percent of Americans are obese and thirty three percent are overweight; obesity has become a known killer in the U.S. yet its prevalence has maintained a firm grasp on the U.S. population and continues to spread across the globe as other countries slowly adopt the American lifestyle. A survey was compiled collecting demographic and body mass index (BMI) information, as well as Tanofsky-Kraff’s (2009) “Assess Eating in the Absence of Hunger” survey questions. The survey used for this study was emailed out to Arizona State University students in Barrett, The Honors College, and the ASU School of Nutrition and Health Promotion listservs. A total of 457 participants completed the survey, 72 males and 385 females (mean age, 24.5±7.7 y; average body mass index (BMI), 23.4 ± 4.8 [a BMI of 25-29.9 is classified as overweight]). When comparing BMI with the living situation, 71% of obese students were living at home with family versus off campus with friends or alone. For comparison, 45% of normal weight students lived at home with family.  These data could help structure prevention plans targeting college students by focusing on weight gain prevention at the family level. Results from the Tanofsky-Kraff (2009) survey revealed there was not a significant relationship between external or physical cues and BMI in men or women, but there was a significant positive correlation between emotional cues and BMI in women only. Anger and sadness were the emotional cues in women related to initiating consumption past satiation and consumption following several hours of fasting. Although BMI was inversely related to physical activity in this sample (r = -0.132; p=0.005), controlling for physical activity did not impact the significant associations of BMI with anger or sadness (P>0.05).  This information is important in targeting prevention programs to address behavioral change and cognitive awareness of the effects of emotion on over-consumption.
ContributorsGarza, Andrea Marie (Author) / Johnston, Carol (Thesis director) / Jacobs, Mark (Committee member) / Coletta, Dawn (Committee member) / Barrett, The Honors College (Contributor) / Department of Psychology (Contributor) / School of Life Sciences (Contributor)
Created2013-05