AAbs provide value in identifying individuals at risk, stratifying patients with different clinical courses, improving our understanding of autoimmune destructions, identifying antigens for cellular immune response and providing candidates for prevention trials in T1D. A two-stage serological AAb screening against 6,000 human proteins was performed. A dual specificity tyrosine-phosphorylation-regulated kinase 2 (DYRK2) was validated with 36% sensitivity at 98% specificity by an orthogonal immunoassay. This is the first systematic screening for novel AAbs against large number of human proteins by protein arrays in T1D. A more comprehensive search for novel AAbs was performed using a knowledge-based approach by ELISA and a screening-based approach against 10,000 human proteins by NAPPA. Six AAbs were identified and validated with sensitivities ranged from 16% to 27% at 95% specificity. These two studies enriched the T1D “autoantigenome” and provided insights into T1D pathophysiology in an unprecedented breadth and width.
The rapid rise of T1D incidence suggests the potential involvement of environmental factors including viral infections. Sero-reactivity to 646 viral antigens was assessed in new-onset T1D patients. Antibody positive rate of EBV was significantly higher in cases than controls that suggested a potential role of EBV in T1D development. A high density-NAPPA platform was demonstrated with high reproducibility and sensitivity in profiling anti-viral antibodies.
This dissertation shows the power of a protein-array based immunoproteomics approach to characterize humoral immunoprofile against human and viral proteomes. The identification of novel T1D-specific AAbs and T1D-associated viruses will help to connect the nodes in T1D etiology and provide better understanding of T1D pathophysiology.
The electronic structure of eight zinc-centered porphyrin macrocyclic molecules are investigated using density functional theory for ground-state properties, time-dependent density functional theory (TDDFT) for excited states, and Franck-Condon (FC) analysis for further characterization of the UV-vis spectrum. Symmetry breaking was utilized to find the lowest energy of the excited states for many states in the spectra. To confirm the theoretical modeling, the spectroscopic result from zinc phthalocyanine (ZnPc) is used to compare to the TDDFT and FC result. After confirmation of the modeling, five more planar molecules are investigated: zinc tetrabenzoporphyrin (ZnTBP), zinc tetrabenzomonoazaporphyrin (ZnTBMAP), zinc tetrabenzocisdiazaporphyrin (ZnTBcisDAP), zinc tetrabenzotransdiazaporphyrin (ZnTBtransDAP), and zinc tetrabenzotriazaporphyrin (ZnTBTrAP). The two latter molecules are then compared to their phenylated sister molecules: zinc monophenyltetrabenzotriazaporphyrin (ZnMPTBTrAP) and zinc diphenyltetrabenzotransdiazaporphyrin (ZnDPTBtransDAP). The spectroscopic results from the synthesis of ZnMPTBTrAP and ZnDPTBtransDAP are then compared to their theoretical models and non-phenylated pairs. While the Franck-Condon results were not as illuminating for every B-band, the Q-band results were successful in all eight molecules, with a considerable amount of spectral analysis in the range of interest between 300 and 750 nm. The π-π* transitions are evident in the results for all of the Q bands, while satellite vibrations are also visible in the spectra. In particular, this investigation finds that, while ZnPc has a D4h symmetry at ground state, a C4v symmetry is predicted in the excited-state Q band region. The theoretical results for ZnPc found an excitation energy at the Q-band 0-0 transition of 1.88 eV in vacuum, which is in remarkable agreement with published gas-phase spectroscopy, as well as our own results of ZnPc in solution with Tetrahydrofuran that are provided in this paper.
A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack “fingerprints” and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches.
Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low efficiency, resource scarcity, and partial system failures. Under certain conditions global catastrophe on the scale of the whole system can occur through the dynamical process of cascading failures. We investigate optimization and resilience of time-varying supply-demand systems by constructing network models of such systems, where resources are transported from the supplier sites to users through various links. Here by optimization we mean minimization of the maximum load on links, and system resilience can be characterized using the cascading failure size of users who fail to connect with suppliers.
We consider two representative classes of supply schemes: load driven supply and fix fraction supply. Our findings are: (1) optimized systems are more robust since relatively smaller cascading failures occur when triggered by external perturbation to the links; (2) a large fraction of links can be free of load if resources are directed to transport through the shortest paths; (3) redundant links in the performance of the system can help to reroute the traffic but may undesirably transmit and enlarge the failure size of the system; (4) the patterns of cascading failures depend strongly upon the capacity of links; (5) the specific location of the trigger determines the specific route of cascading failure, but has little effect on the final cascading size; (6) system expansion typically reduces the efficiency; and (7) when the locations of the suppliers are optimized over a long expanding period, fewer suppliers are required. These results hold for heterogeneous networks in general, providing insights into designing optimal and resilient complex supply-demand systems that expand constantly in time.