1,177 research outputs found

    Strong Selection Significantly Increases Epistatic Interactions in the Long-Term Evolution of a Protein

    Full text link
    Epistatic interactions between residues determine a protein's adaptability and shape its evolutionary trajectory. When a protein experiences a changed environment, it is under strong selection to find a peak in the new fitness landscape. It has been shown that strong selection increases epistatic interactions as well as the ruggedness of the fitness landscape, but little is known about how the epistatic interactions change under selection in the long-term evolution of a protein. Here we analyze the evolution of epistasis in the protease of the human immunodeficiency virus type 1 (HIV-1) using protease sequences collected for almost a decade from both treated and untreated patients, to understand how epistasis changes and how those changes impact the long-term evolvability of a protein. We use an information-theoretic proxy for epistasis that quantifies the co-variation between sites, and show that positive information is a necessary (but not sufficient) condition that detects epistasis in most cases. We analyze the "fossils" of the evolutionary trajectories of the protein contained in the sequence data, and show that epistasis continues to enrich under strong selection, but not for proteins whose environment is unchanged. The increase in epistasis compensates for the information loss due to sequence variability brought about by treatment, and facilitates adaptation in the increasingly rugged fitness landscape of treatment. While epistasis is thought to enhance evolvability via valley-crossing early-on in adaptation, it can hinder adaptation later when the landscape has turned rugged. However, we find no evidence that the HIV-1 protease has reached its potential for evolution after 9 years of adapting to a drug environment that itself is constantly changing.Comment: 25 pages, 9 figures, plus Supplementary Material including Supplementary Text S1-S7, Supplementary Tables S1-S2, and Supplementary Figures S1-2. Version that appears in PLoS Genetic

    Characterizing Pedophile Conversations on the Internet using Online Grooming

    Full text link
    Cyber-crime targeting children such as online pedophile activity are a major and a growing concern to society. A deep understanding of predatory chat conversations on the Internet has implications in designing effective solutions to automatically identify malicious conversations from regular conversations. We believe that a deeper understanding of the pedophile conversation can result in more sophisticated and robust surveillance systems than majority of the current systems relying only on shallow processing such as simple word-counting or key-word spotting. In this paper, we study pedophile conversations from the perspective of online grooming theory and perform a series of linguistic-based empirical analysis on several pedophile chat conversations to gain useful insights and patterns. We manually annotated 75 pedophile chat conversations with six stages of online grooming and test several hypothesis on it. The results of our experiments reveal that relationship forming is the most dominant online grooming stage in contrast to the sexual stage. We use a widely used word-counting program (LIWC) to create psycho-linguistic profiles for each of the six online grooming stages to discover interesting textual patterns useful to improve our understanding of the online pedophile phenomenon. Furthermore, we present empirical results that throw light on various aspects of a pedophile conversation such as probability of state transitions from one stage to another, distribution of a pedophile chat conversation across various online grooming stages and correlations between pre-defined word categories and online grooming stages

    $1.00 per RT #BostonMarathon #PrayForBoston: analyzing fake content on Twitter

    Get PDF
    This study found that 29% of the most viral content on Twitter during the Boston bombing crisis were rumors and fake content.AbstractOnline social media has emerged as one of the prominent channels for dissemination of information during real world events. Malicious content is posted online during events, which can result in damage, chaos and monetary losses in the real world. We analyzed one such media i.e. Twitter, for content generated during the event of Boston Marathon Blasts, that occurred on April, 15th, 2013. A lot of fake content and malicious profiles originated on Twitter network during this event. The aim of this work is to perform in-depth characterization of what factors influenced in malicious content and profiles becoming viral. Our results showed that 29% of the most viral content on Twitter, during the Boston crisis were rumors and fake content; while 51% was generic opinions and comments; and rest was true information. We found that large number of users with high social reputation and verified accounts were responsible for spreading the fake content. Next, we used regression prediction model, to verify that, overall impact of all users who propagate the fake content at a given time, can be used to estimate the growth of that content in future. Many malicious accounts were created on Twitter during the Boston event, that were later suspended by Twitter. We identified over six thousand such user profiles, we observed that the creation of such profiles surged considerably right after the blasts occurred. We identified closed community structure and star formation in the interaction network of these suspended profiles amongst themselves

    Evolution of genome size in asexual populations

    Full text link
    Genome sizes have evolved to vary widely, from 250 bases in viroids to 670 billion bases in amoeba. This remarkable variation in genome size is the outcome of complex interactions between various evolutionary factors such as point mutation rate, population size, insertions and deletions, and genome editing mechanisms that may be specific to certain taxonomic lineages. While comparative genomics analyses have uncovered some of the relationships between these diverse evolutionary factors, we still do not understand what drives genome size evolution. Specifically, it is not clear how primordial mutational processes of base substitutions, insertions, and deletions influence genome size evolution in asexual organisms. Here, we use digital evolution to investigate genome size evolution by tracking genome edits and their fitness effects in real time. In agreement with empirical data, we find that mutation rate is inversely correlated with genome size in asexual populations. We show that at low point mutation rate, insertions are significantly more beneficial than deletions, driving genome expansion and acquisition of phenotypic complexity. Conversely, high mutational load experienced at high mutation rates inhibits genome growth, forcing the genomes to compress genetic information. Our analyses suggest that the inverse relationship between mutation rate and genome size is a result of the tradeoff between evolving phenotypic innovation and limiting the mutational load

    Differentially-Expressed Pseudogenes in HIV-1 Infection.

    Get PDF
    Not all pseudogenes are transcriptionally silent as previously thought. Pseudogene transcripts, although not translated, contribute to the non-coding RNA pool of the cell that regulates the expression of other genes. Pseudogene transcripts can also directly compete with the parent gene transcripts for mRNA stability and other cell factors, modulating their expression levels. Tissue-specific and cancer-specific differential expression of these "functional" pseudogenes has been reported. To ascertain potential pseudogene:gene interactions in HIV-1 infection, we analyzed transcriptomes from infected and uninfected T-cells and found that 21 pseudogenes are differentially expressed in HIV-1 infection. This is interesting because parent genes of one-third of these differentially-expressed pseudogenes are implicated in HIV-1 life cycle, and parent genes of half of these pseudogenes are involved in different viral infections. Our bioinformatics analysis identifies candidate pseudogene:gene interactions that may be of significance in HIV-1 infection. Experimental validation of these interactions would establish that retroviruses exploit this newly-discovered layer of host gene expression regulation for their own benefit

    Integrin αvβ3 and CD44 pathways in metastatic prostate cancer cells support osteoclastogenesis via a Runx2/Smad 5/receptor activator of NF-κB ligand signaling axis

    Get PDF
    BACKGROUND: Bone loss and pathological fractures are common skeletal complications associated with androgen deprivation therapy and bone metastases in prostate cancer patients. We have previously demonstrated that prostate cancer cells secrete receptor activator of NF-kB ligand (RANKL), a protein essential for osteoclast differentiation and activation. However, the mechanism(s) by which RANKL is produced remains to be determined. The objective of this study is to gain insight into the molecular mechanisms controlling RANKL expression in metastatic prostate cancer cells. RESULTS: We show here that phosphorylation of Smad 5 by integrin αvβ3 and RUNX2 by CD44 signaling, respectively, regulates RANKL expression in human-derived PC3 prostate cancer cells isolated from bone metastasis. We found that RUNX2 intranuclear targeting is mediated by phosphorylation of Smad 5. Indeed, Smad5 knock-down via RNA interference and inhibition of Smad 5 phosphorylation by an αv inhibitor reduced RUNX2 nuclear localization and RANKL expression. Similarly, knockdown of CD44 or RUNX2 attenuated the expression of RANKL. As a result, conditioned media from these cells failed to support osteoclast differentiation in vitro. Immunohistochemistry analysis of tissue microarray sections containing primary prostatic tumor (grade2-4) detected predominant localization of RUNX2 and phosphorylated Smad 5 in the nuclei. Immunoblotting analyses of nuclear lysates from prostate tumor tissue corroborate these observations. CONCLUSIONS: Collectively, we show that CD44 signaling regulates phosphorylation of RUNX2. Localization of RUNX2 in the nucleus requires phosphorylation of Smad-5 by integrin αvβ3 signaling. Our results suggest possible integration of two different pathways in the expression of RANKL. These observations imply a novel mechanistic insight into the role of these proteins in bone loss associated with bone metastases in patients with prostate cancer
    corecore