Matching Items (85)
Filtering by

Clear all filters

Description
Zoonotic pathogens that cause leprosy (Mycobacterium leprae) and tuberculosis (Mycobacterium tuberculosis complex, MTBC) continue to impact modern human populations. Therefore, methods able to survey mycobacterial infection in potential animal hosts are necessary for proper evaluation of human exposure threats. Here we tested for mycobacterial-specific single- and multi-copy loci using qPCR.

Zoonotic pathogens that cause leprosy (Mycobacterium leprae) and tuberculosis (Mycobacterium tuberculosis complex, MTBC) continue to impact modern human populations. Therefore, methods able to survey mycobacterial infection in potential animal hosts are necessary for proper evaluation of human exposure threats. Here we tested for mycobacterial-specific single- and multi-copy loci using qPCR. In a trial study in which armadillos were artificially infected with M. leprae, these techniques were specific and sensitive to pathogen detection, while more traditional ELISAs were only specific. These assays were then employed in a case study to detect M. leprae as well as MTBC in wild marmosets. All marmosets were negative for M. leprae DNA, but 14 were positive for the mycobacterial rpoB gene assay. Targeted capture and sequencing of rpoB and other MTBC genes validated the presence of mycobacterial DNA in these samples and revealed that qPCR is useful for identifying mycobacterial-infected animal hosts.
Created2015-11-16
130258-Thumbnail Image.png
Description

Background
In 2015, the Zika arbovirus (ZIKV) began circulating in the Americas, rapidly expanding its global geographic range in explosive outbreaks. Unusual among mosquito-borne diseases, ZIKV has been shown to also be sexually transmitted, although sustained autochthonous transmission due to sexual transmission alone has not been observed, indicating the reproduction number

Background
In 2015, the Zika arbovirus (ZIKV) began circulating in the Americas, rapidly expanding its global geographic range in explosive outbreaks. Unusual among mosquito-borne diseases, ZIKV has been shown to also be sexually transmitted, although sustained autochthonous transmission due to sexual transmission alone has not been observed, indicating the reproduction number (R0) for sexual transmission alone is less than 1. Critical to the assessment of outbreak risk, estimation of the potential attack rates, and assessment of control measures, are estimates of the basic reproduction number, R0.
Methods
We estimated the R0 of the 2015 ZIKV outbreak in Barranquilla, Colombia, through an analysis of the exponential rise in clinically identified ZIKV cases (n = 359 to the end of November, 2015).
Findings
The rate of exponential rise in cases was ρ = 0.076 days[superscript −1], with 95% CI [0.066,0.087] days[superscript −1]. We used a vector-borne disease model with additional direct transmission to estimate the R0; assuming the R0 of sexual transmission alone is less than 1, we estimated the total R0 = 3.8 [2.4,5.6], and that the fraction of cases due to sexual transmission was 0.23 [0.01,0.47] with 95% confidence.
Interpretation
This is among the first estimates of R0 for a ZIKV outbreak in the Americas, and also among the first quantifications of the relative impact of sexual transmission.

Created2016-10-17
Description

Stone-tipped weapons were a significant innovation for Middle Pleistocene hominins. Hafted hunting technology represents the development of new cognitive and social learning mechanisms within the genus Homo, and may have provided a foraging advantage over simpler forms of hunting technology, such as a sharpened wooden spear. However, the nature of

Stone-tipped weapons were a significant innovation for Middle Pleistocene hominins. Hafted hunting technology represents the development of new cognitive and social learning mechanisms within the genus Homo, and may have provided a foraging advantage over simpler forms of hunting technology, such as a sharpened wooden spear. However, the nature of this foraging advantage has not been confirmed. Experimental studies and ethnographic reports provide conflicting results regarding the relative importance of the functional, economic, and social roles of hafted hunting technology. The controlled experiment reported here was designed to test the functional hypothesis for stone-tipped weapons using spears and ballistics gelatin. It differs from previous investigations of this type because it includes a quantitative analysis of wound track profiles and focuses specifically on hand-delivered spear technology. Our results do not support the hypothesis that tipped spears penetrate deeper than untipped spears. However, tipped spears create a significantly larger inner wound cavity that widens distally. This inner wound cavity is analogous to the permanent wound cavity in ballistics research, which is considered the key variable affecting the relative ‘stopping power’ or ‘killing power’ of a penetrating weapon. Tipped spears conferred a functional advantage to Middle Pleistocene hominins, potentially affecting the frequency and regularity of hunting success with important implications for human adaptation and life history.

ContributorsWilkins, Jayne (Author) / Schoville, Benjamin (Author) / Brown, Kyle S. (Author) / School of Human Evolution and Social Change (Contributor)
Created2014-08-27
Description

It is known that in classical fluids turbulence typically occurs at high Reynolds numbers. But can turbulence occur at low Reynolds numbers? Here we investigate the transition to turbulence in the classic Taylor-Couette system in which the rotating fluids are manufactured ferrofluids with magnetized nanoparticles embedded in liquid carriers. We

It is known that in classical fluids turbulence typically occurs at high Reynolds numbers. But can turbulence occur at low Reynolds numbers? Here we investigate the transition to turbulence in the classic Taylor-Couette system in which the rotating fluids are manufactured ferrofluids with magnetized nanoparticles embedded in liquid carriers. We find that, in the presence of a magnetic field transverse to the symmetry axis of the system, turbulence can occur at Reynolds numbers that are at least one order of magnitude smaller than those in conventional fluids. This is established by extensive computational ferrohydrodynamics through a detailed investigation of transitions in the flow structure, and characterization of behaviors of physical quantities such as the energy, the wave number, and the angular momentum through the bifurcations. A finding is that, as the magnetic field is increased, onset of turbulence can be determined accurately and reliably. Our results imply that experimental investigation of turbulence may be feasible by using ferrofluids. Our study of transition to and evolution of turbulence in the Taylor-Couette ferrofluidic flow system provides insights into the challenging problem of turbulence control.

ContributorsAltmeyer, Sebastian (Author) / Do, Younghae (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-06-12
Description

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack “fingerprints” and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches.

ContributorsChen, Yu-Zhong (Author) / Huang, Zi-Gang (Author) / Xu, Shouhuai (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-05-20
Description

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low efficiency, resource scarcity, and partial system failures. Under certain conditions global catastrophe on the scale of the whole system can occur through the dynamical process of cascading failures. We investigate optimization and resilience of time-varying supply-demand systems by constructing network models of such systems, where resources are transported from the supplier sites to users through various links. Here by optimization we mean minimization of the maximum load on links, and system resilience can be characterized using the cascading failure size of users who fail to connect with suppliers.

We consider two representative classes of supply schemes: load driven supply and fix fraction supply. Our findings are: (1) optimized systems are more robust since relatively smaller cascading failures occur when triggered by external perturbation to the links; (2) a large fraction of links can be free of load if resources are directed to transport through the shortest paths; (3) redundant links in the performance of the system can help to reroute the traffic but may undesirably transmit and enlarge the failure size of the system; (4) the patterns of cascading failures depend strongly upon the capacity of links; (5) the specific location of the trigger determines the specific route of cascading failure, but has little effect on the final cascading size; (6) system expansion typically reduces the efficiency; and (7) when the locations of the suppliers are optimized over a long expanding period, fewer suppliers are required. These results hold for heterogeneous networks in general, providing insights into designing optimal and resilient complex supply-demand systems that expand constantly in time.

ContributorsZhang, Si-Ping (Author) / Huang, Zi-Gang (Author) / Dong, Jia-Qi (Author) / Eisenberg, Daniel (Author) / Seager, Thomas (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-06-23
128811-Thumbnail Image.png
Description

The Middle Stone Age (MSA) is associated with early evidence for symbolic material culture and complex technological innovations. However, one of the most visible aspects of MSA technologies are unretouched triangular stone points that appear in the archaeological record as early as 500,000 years ago in Africa and persist throughout

The Middle Stone Age (MSA) is associated with early evidence for symbolic material culture and complex technological innovations. However, one of the most visible aspects of MSA technologies are unretouched triangular stone points that appear in the archaeological record as early as 500,000 years ago in Africa and persist throughout the MSA. How these tools were being used and discarded across a changing Pleistocene landscape can provide insight into how MSA populations prioritized technological and foraging decisions. Creating inferential links between experimental and archaeological tool use helps to establish prehistoric tool function, but is complicated by the overlaying of post-depositional damage onto behaviorally worn tools. Taphonomic damage patterning can provide insight into site formation history, but may preclude behavioral interpretations of tool function. Here, multiple experimental processes that form edge damage on unretouched lithic points from taphonomic and behavioral processes are presented. These provide experimental distributions of wear on tool edges from known processes that are then quantitatively compared to the archaeological patterning of stone point edge damage from three MSA lithic assemblages—Kathu Pan 1, Pinnacle Point Cave 13B, and Die Kelders Cave 1. By using a model-fitting approach, the results presented here provide evidence for variable MSA behavioral strategies of stone point utilization on the landscape consistent with armature tips at KP1, and cutting tools at PP13B and DK1, as well as damage contributions from post-depositional sources across assemblages. This study provides a method with which landscape-scale questions of early modern human tool-use and site-use can be addressed.

ContributorsSchoville, Benjamin J. (Author) / Brown, Kyle S. (Author) / Harris, Jacob (Author) / Wilkins, Jayne (Author) / School of Human Evolution and Social Change (Contributor)
Created2016-10-13
128259-Thumbnail Image.png
Description

We formulate an in silico model of pathogen avoidance mechanism and investigate its impact on defensive behavioural measures (e.g., spontaneous social exclusions and distancing, crowd avoidance and voluntary vaccination adaptation). In particular, we use SIR(B)S (e.g., susceptible-infected-recovered with additional behavioural component) model to investigate the impact of homo-psychologicus aspects of

We formulate an in silico model of pathogen avoidance mechanism and investigate its impact on defensive behavioural measures (e.g., spontaneous social exclusions and distancing, crowd avoidance and voluntary vaccination adaptation). In particular, we use SIR(B)S (e.g., susceptible-infected-recovered with additional behavioural component) model to investigate the impact of homo-psychologicus aspects of epidemics. We focus on reactionary behavioural changes, which apply to both social distancing and voluntary vaccination participations. Our analyses reveal complex relationships between spontaneous and uncoordinated behavioural changes, the emergence of its contagion properties, and mitigation of infectious diseases. We find that the presence of effective behavioural changes can impede the persistence of disease. Furthermore, it was found that under perfect effective behavioural change, there are three regions in the response factor (e.g., imitation and/or reactionary) and behavioural scale factor (e.g., global/local) factors ρ–α behavioural space. Mainly, (1) disease is always endemic even in the presence of behavioural change, (2) behavioural-prevalence plasticity is observed and disease can sometimes be eradication, and (3) elimination of endemic disease under permanence of permanent behavioural change is achieved. These results suggest that preventive behavioural changes (e.g., non-pharmaceutical prophylactic measures, social distancing and exclusion, crowd avoidance) are influenced by individual differences in perception of risks and are a salient feature of epidemics. Additionally, these findings indicates that care needs to be taken when considering the effect of adaptive behavioural change in predicting the course of epidemics, and as well as the interpretation and development of the public health measures that account for spontaneous behavioural changes.

Created2015-10-14
130280-Thumbnail Image.png
Description
A two-patch mathematical model of Dengue virus type 2 (DENV-2) that accounts for vectors’ vertical transmission and between patches human dispersal is introduced. Dispersal is modelled via a Lagrangian approach. A host-patch residence-times basic reproduction number is derived and conditions under which the disease dies out or persists are established.

A two-patch mathematical model of Dengue virus type 2 (DENV-2) that accounts for vectors’ vertical transmission and between patches human dispersal is introduced. Dispersal is modelled via a Lagrangian approach. A host-patch residence-times basic reproduction number is derived and conditions under which the disease dies out or persists are established. Analytical and numerical results highlight the role of hosts’ dispersal in mitigating or exacerbating disease dynamics. The framework is used to explore dengue dynamics using, as a starting point, the 2002 outbreak in the state of Colima, Mexico.
Created2016-08-05
130264-Thumbnail Image.png
Description
Recent efforts have attempted to describe the population structure of common chimpanzee, focusing on four subspecies: Pan troglodytes verus, P. t. ellioti, P. t. troglodytes, and P. t. schweinfurthii. However, few studies have pursued the effects of natural selection in shaping their response to pathogens and reproduction. Whey acidic protein

Recent efforts have attempted to describe the population structure of common chimpanzee, focusing on four subspecies: Pan troglodytes verus, P. t. ellioti, P. t. troglodytes, and P. t. schweinfurthii. However, few studies have pursued the effects of natural selection in shaping their response to pathogens and reproduction. Whey acidic protein (WAP) four-disulfide core domain (WFDC) genes and neighboring semenogelin (SEMG) genes encode proteins with combined roles in immunity and fertility. They display a strikingly high rate of amino acid replacement (dN/dS), indicative of adaptive pressures during primate evolution. In human populations, three signals of selection at the WFDC locus were described, possibly influencing the proteolytic profile and antimicrobial activities of the male reproductive tract. To evaluate the patterns of genomic variation and selection at the WFDC locus in chimpanzees, we sequenced 17 WFDC genes and 47 autosomal pseudogenes in 68 chimpanzees (15 P. t. troglodytes, 22 P. t. verus, and 31 P. t. ellioti). We found a clear differentiation of P. t. verus and estimated the divergence of P. t. troglodytes and P. t. ellioti subspecies in 0.173 Myr; further, at the WFDC locus we identified a signature of strong selective constraints common to the three subspecies in WFDC6—a recent paralog of the epididymal protease inhibitor EPPIN. Overall, chimpanzees and humans do not display similar footprints of selection across the WFDC locus, possibly due to different selective pressures between the two species related to immune response and reproductive biology.
Created2013-12-19