WorldWideScience

Sample records for hacking rna hakai

  1. Identification of factors required for m6 A mRNA methylation in Arabidopsis reveals a role for the conserved E3 ubiquitin ligase HAKAI.

    Science.gov (United States)

    Růžička, Kamil; Zhang, Mi; Campilho, Ana; Bodi, Zsuzsanna; Kashif, Muhammad; Saleh, Mária; Eeckhout, Dominique; El-Showk, Sedeer; Li, Hongying; Zhong, Silin; De Jaeger, Geert; Mongan, Nigel P; Hejátko, Jan; Helariutta, Ykä; Fray, Rupert G

    2017-07-01

    N6-adenosine methylation (m 6 A) of mRNA is an essential process in most eukaryotes, but its role and the status of factors accompanying this modification are still poorly understood. Using combined methods of genetics, proteomics and RNA biochemistry, we identified a core set of mRNA m 6 A writer proteins in Arabidopsis thaliana. The components required for m 6 A in Arabidopsis included MTA, MTB, FIP37, VIRILIZER and the E3 ubiquitin ligase HAKAI. Downregulation of these proteins led to reduced relative m 6 A levels and shared pleiotropic phenotypes, which included aberrant vascular formation in the root, indicating that correct m 6 A methylation plays a role in developmental decisions during pattern formation. The conservation of these proteins amongst eukaryotes and the demonstration of a role in writing m 6 A for the E3 ubiquitin ligase HAKAI is likely to be of considerable relevance beyond the plant sciences. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  2. Hakai reduces cell-substratum adhesion and increases epithelial cell invasion

    International Nuclear Information System (INIS)

    Rodríguez-Rigueiro, Teresa; Valladares-Ayerbes, Manuel; Haz-Conde, Mar; Aparicio, Luis A; Figueroa, Angélica

    2011-01-01

    The dynamic regulation of cell-cell adhesions is crucial for developmental processes, including tissue formation, differentiation and motility. Adherens junctions are important components of the junctional complex between cells and are necessary for maintaining cell homeostasis and normal tissue architecture. E-cadherin is the prototype and best-characterized protein member of adherens junctions in mammalian epithelial cells. Regarded as a tumour suppressor, E-cadherin loss is associated with poor prognosis in carcinoma. The E3 ubiquitin-ligase Hakai was the first reported posttranslational regulator of the E-cadherin complex. Hakai specifically targetted E-cadherin for internalization and degradation and thereby lowered epithelial cell-cell contact. Hakai was also implicated in controlling proliferation, and promoted cancer-related gene expression by increasing the binding of RNA-binding protein PSF to RNAs encoding oncogenic proteins. We sought to investigate the possible implication of Hakai in cell-substratum adhesions and invasion in epithelial cells. Parental MDCK cells and MDCK cells stably overexpressing Hakai were used to analyse cell-substratum adhesion and invasion capabilities. Western blot and immunofluoresecence analyses were performed to assess the roles of Paxillin, FAK and Vinculin in cell-substratum adhesion. The role of the proteasome in controlling cell-substratum adhesion was studied using two proteasome inhibitors, lactacystin and MG132. To study the molecular mechanisms controlling Paxillin expression, MDCK cells expressing E-cadherin shRNA in a tetracycline-inducible manner was employed. Here, we present evidence that implicate Hakai in reducing cell-substratum adhesion and increasing epithelial cell invasion, two hallmark features of cancer progression and metastasis. Paxillin, an important protein component of the cell-matrix adhesion, was completely absent from focal adhesions and focal contacts in Hakai-overexpressing MDCK cells. The

  3. Hacking GPS

    CERN Document Server

    Kingsley-Hughes, Kathie

    2005-01-01

    * This is the "user manual" that didn't come with any of the 30 million GPS receivers currently in use, showing readers how to modify, tweak, and hack their GPS to take it to new levels!* Crazy-cool modifications include exploiting secret keycodes, revealing hidden features, building power cords and cables, hacking the battery and antenna, protecting a GPS from impact and falls, making a screen protector, and solar-powering a GPS* Potential power users will take the function and performance of their GPS to a whole new level by hacking into the firmware and hacking into a PC connection with a GPS* Fear not! Any potentially dangerous mod (to the device) is clearly labeled, with precautions listed that should be taken* Game time! Readers can check out GPS games, check into hacking geocaching, and even use a GPS as a metal detector

  4. SQL Hacks

    CERN Document Server

    Cumming, Andrew

    2009-01-01

    Whether you're running Access, MySQL, SQL Server, Oracle, or PostgreSQL, this book will help you push the limits of traditional SQL to squeeze data effectively from your database. SQL Hacks offers 100 hacks -- unique tips and tools -- that bring you the knowledge of experts who apply what they know in the real world to help you take full advantage of the expressive power of SQL. You'll find practical techniques to address complex data manipulation problems.

  5. Hacking NIMEs

    OpenAIRE

    Hindle, Abram

    2016-01-01

    NIMEs typically focus on novelty but the cost of novelty is often to ignore other non-functional requirements and concerns such as usability or security. Digital security has probably not been a concern for performers due to the duration of their performances and lack of disrespectful hackers, known as crackers, in attendance carrying the appropriate equipment and software necessary to hack a performance. Yet many modern NIMEs could be hacked from smart-phones in the audience. The lack of sec...

  6. Hacking Around.

    Science.gov (United States)

    Zirkel, Perry A.

    1999-01-01

    Discusses a complicated appellate-court case upholding a Milwaukee high-school junior's expulsion for advocating computer hacking in a student newspaper. The decision is noteworthy for signaling a growing technology-related litigation trend, conflating the advocacy/incitement issue, and showing courts' decreasing tolerance for perceived threats to…

  7. Attributing Hacks

    OpenAIRE

    Liu, Ziqi; Smola, Alexander J.; Soska, Kyle; Wang, Yu-Xiang; Zheng, Qinghua; Zhou, Jun

    2016-01-01

    In this paper we describe an algorithm for estimating the provenance of hacks on websites. That is, given properties of sites and the temporal occurrence of attacks, we are able to attribute individual attacks to joint causes and vulnerabilities, as well as estimating the evolution of these vulnerabilities over time. Specifically, we use hazard regression with a time-varying additive hazard function parameterized in a generalized linear form. The activation coefficients on each feature are co...

  8. Google Hacks

    CERN Document Server

    Dornfest, Rael; Calishain, Tara

    2006-01-01

    Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.The expanded third edition of Google Hacks is a brand-new and infinitely more usef

  9. Hacking for Dummies

    CERN Document Server

    Beaver, Kevin

    2010-01-01

    A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!. It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, data

  10. IS ETHICAL HACKING ETHICAL?

    OpenAIRE

    MUHAMMAD NUMAN ALI KHAN; DANISH JAMIL,

    2011-01-01

    This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked intoto help keep ethical hacking, ethical.

  11. The Art of Hacking

    OpenAIRE

    Ommeln, Miriam; Pimenidis, Lexi

    2018-01-01

    In this position paper we will try to take up on the discussion of ethical issues and hacking. In this work we would like to show what actually happens during hacking and how hacking relates to social responsibility, directed at the benefit of our society. This discussion is necessary for legal discourses and future ethical codices. We come to the conclusion that the discussion actually resolves to aesthetic instead of ethical questions. The latter are only an artificial addendum. However, if...

  12. Hacking for a cause

    OpenAIRE

    Still, Brian

    2005-01-01

    This paper explores the concept of hacktivism, which is hacking for a political or social cause on the Internet. Generally hackers, even those hacking government–sponsored sites, have been negatively stereotyped as malicious thrill seekers or, worse yet, cyberterrorists. But increasingly there are more politically motivated hackers distancing themselves from cyberterrorism by engaging in hacktivism that is intent more upon disruption than disobedience. Certain hacktivists, in fact, have creat...

  13. Hacking the next generation

    CERN Document Server

    Dhanjani, Nitesh; Hardin, Brett

    2009-01-01

    With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse

  14. BioHack*Kolding

    DEFF Research Database (Denmark)

    Wilde, Danielle

    Short Abstract BioHack*Kolding explores the potential of do-it-together biology to support community building in a town that lacks strong science representation, assisting participants to reflect on the bio-potential of their personal, social and political ecologies and to translate their ideas...... into action. Long Abstract Organisations that support lay people to practice bioscience alongside experts are proliferating. They enable interested people to join the global discussion on Bio Engineering by supporting them to gain the necessary knowledge and skills to do it themselves. Such organisations play...... an important role in facilitating informed debate around the biological sciences. Yet they cannot reach everyone. BioHack*Kolding asks how community-focused biology initiatives can reach people in smaller towns that lack science representation, so that they too can join the debate and ensure that its...

  15. Big Book of Windows Hacks

    CERN Document Server

    Gralla, Preston

    2008-01-01

    Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB key, or hack the "unhackable" screensavers, you'll find quick and ingenious ways to bend these recalcitrant operating systems to your will. The Big Book of Windows Hacks focuses on Vista, the new bad boy on Microsoft's block, with hacks and workarounds that

  16. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  17. Students "Hacking" School Computer Systems

    Science.gov (United States)

    Stover, Del

    2005-01-01

    This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…

  18. Techniques de hacking

    CERN Document Server

    Erickson, Jon

    2008-01-01

    Dans cet ouvrage, Jon Erickson présente les bases de la programmation en C du point de vue du hacker et dissèque plusieurs techniques de hacking, passées et actuelles, afin de comprendre comment et pourquoi elles fonctionnent. Même si vous ne savez pas programmer, ce livre vous donnera une vue complète de la programmation, de l'architecture des machines, des communications réseau et des techniques de hacking existantes. Associez ces connaissances à l'environnement Linux fourni et laissez libre cours à votre imagination. Avec ce livre vous apprendrez à : • programmer les ordinateurs en C, en assembleur et avec des scripts shell ; • inspecter les registres du processeur et la mémoire système avec un débogueur afin de comprendre précisément ce qui se passe ; Vous découvrirez comment les hackers parviennent à : • corrompre la mémoire d'un système, en utilisant les débordements de tampons et les chaînes de format, pour exécuter un code quelconque ; • surpasser les mesures de sécurit...

  19. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  20. Ethical hacking and penetration testing guide

    CERN Document Server

    Baloch, Rafay

    2014-01-01

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each ...

  1. Vulnerability Assessments in Ethical Hacking

    OpenAIRE

    Ashiqur Rahman ,; Md. SarwarAlam Rasel; Asaduzzaman Noman; Shakh Md. Alimuzjaman Alim

    2016-01-01

    Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to de...

  2. Growth Hacking a Global Community

    OpenAIRE

    Sarkkinen, Laura; Rauhala, Marita

    2015-01-01

    As technology is developing at a fast phase people are engaging in community activities more and more online, either by extending their offline social life or by creating themselves a whole new parallel life as a member of virtual community. Companies behind communities are rivaling for attention and need to come up with increasingly clever tactics to attract and engage new members. In this thesis the relatively new phenomenon of growth hacking, the use of unconventional methods in order ...

  3. Science Hack Day uses CMS data

    CERN Multimedia

    Katerina Sandoval

    2012-01-01

    Science Hack events: a new way for scientists, designers and other techno-savvy people to interact. The most recent Science Hack Day was held in San Francisco and with it the CMS collaboration found an original and simple way to present its data. Science Hack events: a new way for scientists, designers and other techno-savvy people to interact. The most recent Science Hack Day was held in San Francisco and with it the CMS collaboration found an original and simple way to present its data.   Participants in the CMS hack event. (Photo credit: Morris Mwanga.) First of all, you need to know what “hack” means. A hack is a quick solution to a problem, often the cleverest one if not the most elegant. So, a Science Hack Day is a 48-hour all-night event that brings together “hackers” to create innovative solutions to scientific problems. This year’s event was held in San Francisco from 12 to 13 November and was a huge success! It hosted around 150 s...

  4. Growth Hacking for Startups : How Growth Hacking can utilised for growing startups

    OpenAIRE

    Lee, Jin

    2016-01-01

    In the era of start-ups, many failed to put out their prototypes or products to the market due to lack of funds or experience in marketing. Growth Hacking is a tool that start-ups can benefit from if they learn what Growth Hacking is and how to implement it. The aim of this thesis is to explore what Growth Hacking is and how to implement it for the commissioner CubiCasa Oy. A couple of Growth Hacking tactics are used for CubiCasa Oy and the process of implementation and findings are rec...

  5. Hacking Europe from computer cultures to demoscenes

    CERN Document Server

    Alberts, Gerard

    2014-01-01

    This book traces the evolution of European hacker culture: chopping games in Warsaw, hacking software in Athens, chaos in Hamburg, producing demos in Turku and partying with computing in Zagreb and Amsterdam. Emphasizes the role of mischief, humor and play.

  6. Peran Polri Dalam Penanggulangan Kejahatan Hacking Terhadap Bank

    OpenAIRE

    Idha Endri Prastiono

    2009-01-01

    Cybercrime atau kejahatan dunia siber mempunyai banyak bentuk atau rupa, tetapi dari kesemua bentuk yang ada, hacking merupakan bentuk yang banyak mendapat sorotan karena selain kongres PBB X di Wina menetapkan hacking sebagai first crime, juga dilihat dari aspek teknis, hacking mempunyai kelebihan-kelebihan. Pertama, orang yang melakukan hacking sudah barang tentu dapat melakukan bentuk cybercrime yang lain karena dengan kemampuan masuk ke dalam sistem komputer dan kemudian mengacak-acak si...

  7. The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy

    CERN Document Server

    Engebretson, Patrick

    2011-01-01

    The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topi

  8. The first SPIE software Hack Day

    Science.gov (United States)

    Kendrew, S.; Deen, C.; Radziwill, N.; Crawford, S.; Gilbert, J.; Gully-Santiago, M.; Kubánek, P.

    2014-07-01

    We report here on the software Hack Day organised at the 2014 SPIE conference on Astronomical Telescopes and Instrumentation in Montréal. The first ever Hack Day to take place at an SPIE event, the aim of the day was to bring together developers to collaborate on innovative solutions to problems of their choice. Such events have proliferated in the technology community, providing opportunities to showcase, share and learn skills. In academic environments, these events are often also instrumental in building community beyond the limits of national borders, institutions and projects. We show examples of projects the participants worked on, and provide some lessons learned for future events.

  9. Hacking of Passwords in Windows Environment

    OpenAIRE

    C.K. GOEL; GAURAV ARYA

    2012-01-01

    Hacking is so simple! Not only the operating system‟s loop holes offers opportunities to hackers but also the applications like Skype and Google Chrome developed for the operating systems are quite attractive to hackers. In this paper I present the various ways in which the passwords like user account‟s passwords stored by the operating system or the passwords required by different applications are stored on the system and can be hacked by intended hackers. This paper presents in depth resear...

  10. Hacking Europe: From Computer Cultures to Demoscenes

    NARCIS (Netherlands)

    Alberts, G.; Oldenziel, R.

    2014-01-01

    Hacking Europe focuses on the playfulness that was at the heart of how European users appropriated microcomputers in the last quarter of the twentieth century. The essays argue that users--whether the design of the projected use of computers was detailed or still unfinished--assigned their own

  11. Ian Hacking, Learner Categories and Human Taxonomies

    Science.gov (United States)

    Davis, Andrew

    2008-01-01

    I use Ian Hacking's views to explore ways of classifying people, exploiting his distinction between indifferent kinds and interactive kinds, and his accounts of how we "make up" people. The natural kind/essentialist approach to indifferent kinds is explored in some depth. I relate this to debates in psychiatry about the existence of mental…

  12. Ethical Hacking in Information Security Curricula

    Science.gov (United States)

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  13. Cognitive Hacking and Digital Government: Digital Identity

    Directory of Open Access Journals (Sweden)

    Paul Thompson

    2004-04-01

    Full Text Available Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation systems. Most discussion at the workshop focused on issues related to authentication of users of digital government, but, as implied by the inclusion of a scenario related to ubiquitous identity theft, there was also discussion of problems related to misinformation, including cognitive hacking. Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to succeed. This paper describes cognitive hacking, suggests countermeasures, and discusses the implications of cognitive hacking for identity in digital government. In particular, spoofing of government websites and insider misuse are considered.

  14. Computer Hacking as a Social Problem

    OpenAIRE

    Alleyne, Brian

    2018-01-01

    This chapter introduces the ideas and practices of digital technology enthusiasts who fall under the umbrella of “hackers. “We will discuss how their defining activity has been constructed as a social problem and how that construction has been challenged in different ways. The chapter concludes with several policy suggestions aimed at addressing the more problematic aspects of computer hacking.

  15. Network Security Hacks Tips & Tools for Protecting Your Privacy

    CERN Document Server

    Lockhart, Andrew

    2009-01-01

    This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending, and incident response.

  16. Herramientas para hacking ético

    OpenAIRE

    Redondo Gil, Juan José

    2015-01-01

    The objective of this project is to describe and test the most important hacking tools available in the Kali Linux distribution. This distribution, based on UNIX, contains tools for network auditing, cracking passwords and traffic sniffing of various protocols (TCP, UDP, HTTP, SSH, ..). The hosts used to test the attacks will be based on UNIX, Windows and Android architecture. It is very important to previously study the architecture of the target (host, network) because the attacks are focus...

  17. Low Tech Hacking Street Smarts for Security Professionals

    CERN Document Server

    Wiles, Jack; Jabbusch, Jennifer; Rogers, Russ; Lowther, Sean

    2011-01-01

    Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions

  18. Hacking medical devices a review - biomed 2013.

    Science.gov (United States)

    Frenger, Paul

    2013-01-01

    Programmable, implantable and external biomedical devices (such as pacemakers, defibrillators, insulin pumps, pain management pumps, vagus nerve stimulators and others) may be vulnerable to unauthorized access, commonly referred to as “hacking”. This intrusion may lead to compromise of confidential patient data or loss of control of the device itself, which may be deadly. Risks to health from unauthorized access is in addition to hazards from faulty (“buggy”) software or circuitry. Historically, this aspect of medical device design has been underemphasized by both manufacturers and regulatory bodies until recently. However, an insulin pump was employed as a murder weapon in 2001 and successful hacking of an implantable defibrillator was demonstrated in 2008. To remedy these problems, professional groups have announced a variety of design standards and the governmental agencies of several countries have enacted device regulations. In turn, manufacturers have developed new software products and hardware circuits to assist biomedical engineering firms to improve their commercial offerings. In this paper the author discusses these issues, reviewing known problems and zero-day threats, with potential solutions. He outlines his approach to secure software and hardware challenges using the Forth language. A plausible scenario is described in which hacking of an implantable defibrillator by terrorists results in a severe national security threat to the United States.

  19. Implementasi Algoritma Pengenalan Wajah Untuk Mendeteksi Visual Hacking

    OpenAIRE

    Alexander, Luisan William; Sentinuwo, Steven; sambul, alwin

    2017-01-01

    Visual Hacking merupakan sebuah isu keamanan dan privasi data yang perlu diperhatikan saat ini, dimana visual hacking berfokus pada pencurian informasi yang terpampang pada tampilan elektronik, seperti layar monitor komputer. Isu ini dapat terjadi ketika pengguna membiarkan informasi terpampang pada layar komputer sehingga dapat dilihat oleh siapa saja. Pada penelitian ini, dibuatlah sebuah aplikasi berbasis computer vision dengan tujuan mengimplementasikan algoritma pengenalan wajah eigenfac...

  20. Detecting Hacked Twitter Accounts based on Behavioural Change

    NARCIS (Netherlands)

    Nauta, Meike; Habib, Mena Badieh; van Keulen, Maurice

    Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furthermore, some people deliberately hack an acquaintance to damage his or her image. This paper describes a classification for detecting hacked Twitter accounts. The model is mainly based on features

  1. The extent and consequences of p-hacking in science.

    Science.gov (United States)

    Head, Megan L; Holman, Luke; Lanfear, Rob; Kahn, Andrew T; Jennions, Michael D

    2015-03-01

    A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as "p-hacking," occurs when researchers collect or select data or statistical analyses until nonsignificant results become significant. Here, we use text-mining to demonstrate that p-hacking is widespread throughout science. We then illustrate how one can test for p-hacking when performing a meta-analysis and show that, while p-hacking is probably common, its effect seems to be weak relative to the real effect sizes being measured. This result suggests that p-hacking probably does not drastically alter scientific consensuses drawn from meta-analyses.

  2. Hacking with Kali practical penetration testing techniques

    CERN Document Server

    Broad, James

    2013-01-01

    Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle

  3. Penegakan Hukum Kejahatan Hacking dalam Prespektif Kebijakan Hukum Pidana di Indonesia

    OpenAIRE

    -, Sugiaryo

    2013-01-01

    Hacking is a dark side of information and communication improvement bringing a very wide implication in all aspects of life, especially in close relation with enconomical crime. Hacking can be classified into two, they are usual crime-like hacking in which using information and communication technology as the supporting tools and also post internet-based hacking. In regards of such thing, then it is clearly must be considered on how does the method to enforce it. Hacking crime enforcement in ...

  4. Hacking the quantum revolution: 1925-1975

    Science.gov (United States)

    Schweber, Silvan S.

    2015-01-01

    I argue that the quantum revolution should be seen as an Ian Hacking type of scientific revolution: a profound, longue durée, multidisciplinary process of transforming our understanding of physical nature, with deep-rooted social components from the start. The "revolution" exhibits a characteristic style of reasoning - the hierarchization of physical nature - and developed and uses a specific language - quantum field theory (QFT). It is by virtue of that language that the quantum theory has achieved some of its deepest insights into the description of the dynamics of the physical world. However, the meaning of what a quantum field theory is and what it describes has deeply altered, and one now speaks of "effective" quantum field theories. Interpreting all present day quantum field theories as but "effective" field theories sheds additional light on Phillip Anderson's assertion that "More is different". This important element is addressed in the last part of the paper.

  5. P-Hacking: A Wake-Up Call for the Scientific Community.

    Science.gov (United States)

    Raj, A Thirumal; Patil, Shankargouda; Sarode, Sachin; Salameh, Ziad

    2017-10-25

    P-hacking or data dredging involves manipulation of the research data in order to obtain a statistically significant result. The reasons behind P-hacking and the consequences of the same are discussed in the present manuscript.

  6. RNA.

    Science.gov (United States)

    Darnell, James E., Jr.

    1985-01-01

    Ribonucleic acid (RNA) converts genetic information into protein and usually must be processed to serve its function. RNA types, chemical structure, protein synthesis, translation, manufacture, and processing are discussed. Concludes that the first genes might have been spliced RNA and that humans might be closer than bacteria to primitive…

  7. The need for specific penalties for hacking in criminal law.

    Science.gov (United States)

    Oh, Sangkyo; Lee, Kyungho

    2014-01-01

    In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment.

  8. The Need for Specific Penalties for Hacking in Criminal Law

    Directory of Open Access Journals (Sweden)

    Sangkyo Oh

    2014-01-01

    Full Text Available In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA. Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment.

  9. The Need for Specific Penalties for Hacking in Criminal Law

    OpenAIRE

    Oh, Sangkyo; Lee, Kyungho

    2014-01-01

    In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe p...

  10. Hacking and penetration testing with low power devices

    CERN Document Server

    Polstra, Philip

    2014-01-01

    Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to

  11. Professional penetration testing creating and operating a formal hacking lab

    CERN Document Server

    Wilhelm, Thomas

    2009-01-01

    PART I - Setting Up. Chapter 1: Introduction. Chapter 2: Ethics and Hacking. Chapter 3: Hacking as a Career. Chapter 4: Setting up Your Lab. Chapter 5: Creating and Using PenTest Targets in Your Lab. Chapter 6: Methodologies. Chapter 7: PenTest Metrics. Chapter 8: Management of a PenTest. PART II - Running a PenTest. Chapter 9: Information Gathering. Chapter 10: Vulnerability Identification. Chapter 11: Vulnerability Verification. Chapter 12: Compromising a System and Privilege Escalation. Chapter 13: Maintaining Access. Chapter 14: Covering Your Tracks. PART III - Wrapping Everything Up. Chap

  12. An introduction to hacking and crimeware a pocket guide

    CERN Document Server

    Loewengart, Victoria

    2012-01-01

    An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.

  13. Can a biologist fix a smartphone?-Just hack it!

    Science.gov (United States)

    Kamoun, Sophien

    2017-05-08

    Biological systems integrate multiscale processes and networks and are, therefore, viewed as difficult to dissect. However, because of the clear-cut separation between the software code (the information encoded in the genome sequence) and hardware (organism), genome editors can operate as software engineers to hack biological systems without any particularly deep understanding of the complexity of the systems.

  14. Genetic diversity of Pogonatherum paniceum (Lam.) Hack in ...

    African Journals Online (AJOL)

    Inter-simple sequence repeats markers were used to estimate the genetic diversity of Pogonatherum paniceum (Lam.) Hack. from Sichuan Province, Yunnan Province, Chongqing City and Guangxi Zhuang Autonomous Region in China. 100 primers were carried out on 22 wild populations, 14 could produce highly ...

  15. Genetic diversity of Pogonatherum paniceum (Lam.) Hack. in ...

    African Journals Online (AJOL)

    Amplified fragment length polymorphism (AFLP) markers were used to estimate the genetic diversity of Pogonatherum paniceum (Lam.) Hack. from Sichuan Province, Yunnan Province, Chongqing City and. Guangxi Zhuang autonomous Region in China. 10 primer combinations were carried out on 180 different individuals ...

  16. Less noise, more hacking: how to deploy principles from MIT's hacking medicine to accelerate health care.

    Science.gov (United States)

    DePasse, Jacqueline W; Carroll, Ryan; Ippolito, Andrea; Yost, Allison; Santorino, Data; Chu, Zen; Olson, Kristian R

    2014-07-01

    Medical technology offers enormous potential for scalable medicine--to improve the quality and access in health care while simultaneously reducing cost. However, current medical device innovation within companies often only offers incremental advances on existing products, or originates from engineers with limited knowledge of the clinical complexities. We describe how the Hacking Medicine Initiative, based at Massachusetts Institute of Technology has developed an innovative "healthcare hackathon" approach, bringing diverse teams together to rapidly validate clinical needs and develop solutions. Hackathons are based on three core principles; emphasis on a problem-based approach, cross-pollination of disciplines, and "pivoting" on or rapidly iterating on ideas. Hackathons also offer enormous potential for innovation in global health by focusing on local needs and resources as well as addressing feasibility and cultural contextualization. Although relatively new, the success of this approach is clear, as evidenced by the development of successful startup companies, pioneering product design, and the incorporation of creative people from outside traditional life science backgrounds who are working with clinicians and other scientists to create transformative innovation in health care.

  17. Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times.

    Science.gov (United States)

    Delgado, Ana; Callén, Blanca

    2017-02-01

    In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, 'hacking' is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey's experimental approach to politics, we analyse hacks as 'inquiry' to see how they serve to articulate public and political action. We argue that do-it-yourself and makers' hacks are technical and political demonstrations. What do-it-yourself and makers' hacks ultimately demonstrate is that things can be done otherwise and that 'you' can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration.

  18. Hacking Your Ride: Is Web 2.0 Creating Vulnerabilities To Surface Transportation

    Science.gov (United States)

    2016-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. HACKING YOUR RIDE...3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE HACKING YOUR RIDE: IS WEB 2.0 CREATING VULNERABILITIES TO SURFACE...Prescribed by ANSI Std. 239-18 ii THIS PAGE INTENTIONALLY LEFT BLANK iii Approved for public release. Distribution is unlimited. HACKING

  19. GROWTH HACKING PRACTICES IN A START-UP: A CASE STUDY ON THECON.RO

    OpenAIRE

    Marius GERU; Ema RUSU; Alexandru CAPATINA

    2014-01-01

    Despite the increasing awareness of content marketing tools in the academic community, the benefits of growth hacking were highlighted especially in blog posts and several e-books. This paper examines the particular features of growth hacking techniques, which differentiates it from traditional marketing. Specifically, a content analysis was conducted to identify the experts’ opinions regarding the effective use of growth hacking techniques, to detect the specific skills that a growth hacker ...

  20. Hacking's 'Between Goffman and Foucault': A Theoretical Frame for Criminology

    OpenAIRE

    Tomás Speziale

    2017-01-01

    This paper aims to analyse how Ian Hacking states the theoretical basis of his research on the classification of people. Although all his early philosophical education had been based in Foucault, it is also true that Erving Goffman’s perspective provided him with epistemological and methodological tools for understanding face-to-face relationships. Hence, all his works must be thought of as social science texts that combine the research on how the individuals are constitu...

  1. Understanding network hacks attack and defense with Python

    CERN Document Server

    Ballmann, Bastian

    2015-01-01

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

  2. Hacking in the University: Contesting the Valorisation of Academic Labour

    Directory of Open Access Journals (Sweden)

    Joss Winn

    2013-11-01

    Full Text Available In this article I argue for a different way of understanding the emergence of hacker culture. In doing so, I outline an account of ‘the university’ as an institution that provided the material and subsequent intellectual conditions that early hackers were drawn to and in which they worked. I argue that hacking was originally a form of academic labour that emerged out of the intensification and valorisation of scientific research within the institutional context of the university. The reproduction of hacking as a form of academic labour took place over many decades as academics and their institutions shifted from an ideal of unproductive, communal science to a more productive, entrepreneurial approach to the production of knowledge.  A such, I view hacking as a peculiar, historically situated form of labour that arose out of the contradictions of the academy: vocation vs. profession; teaching vs. research; basic vs. applied research; research vs. development; private vs. public; war vs. peace; institutional autonomy vs. state dependence; scientific communalism vs. intellectual property.

  3. p-Curve and p-Hacking in Observational Research.

    Science.gov (United States)

    Bruns, Stephan B; Ioannidis, John P A

    2016-01-01

    The p-curve, the distribution of statistically significant p-values of published studies, has been used to make inferences on the proportion of true effects and on the presence of p-hacking in the published literature. We analyze the p-curve for observational research in the presence of p-hacking. We show by means of simulations that even with minimal omitted-variable bias (e.g., unaccounted confounding) p-curves based on true effects and p-curves based on null-effects with p-hacking cannot be reliably distinguished. We also demonstrate this problem using as practical example the evaluation of the effect of malaria prevalence on economic growth between 1960 and 1996. These findings call recent studies into question that use the p-curve to infer that most published research findings are based on true effects in the medical literature and in a wide range of disciplines. p-values in observational research may need to be empirically calibrated to be interpretable with respect to the commonly used significance threshold of 0.05. Violations of randomization in experimental studies may also result in situations where the use of p-curves is similarly unreliable.

  4. P-Hacking in Orthopaedic Literature: A Twist to the Tail.

    Science.gov (United States)

    Bin Abd Razak, Hamid Rahmatullah; Ang, Jin-Guang Ernest; Attal, Hersh; Howe, Tet-Sen; Allen, John Carson

    2016-10-19

    "P-hacking" occurs when researchers preferentially select data or statistical analyses until nonsignificant results become significant. We wanted to evaluate if the phenomenon of p-hacking was evident in orthopaedic literature. We text-mined through all articles published in three top orthopaedic journals in 2015. For anonymity, we cipher-coded the three journals. We included all studies that reported a single p value to answer their main hypothesis. These p values were then charted and frequency graphs were generated to illustrate any evidence of p-hacking. Binomial tests were employed to look for evidence of evidential value and significance of p-hacking. Frequency plots for all three journals revealed evidence of p-hacking. Binomial tests for all three journals were significant for evidence of evidential value (p hacking was significant only for one journal (p = 0.0092). P-hacking is an evolving phenomenon that threatens to jeopardize the evidence-based practice of medicine. Although our results show that there is good evidential value for orthopaedic literature published in our top journals, there is some evidence of p-hacking of which authors and readers should be wary. Copyright © 2016 by The Journal of Bone and Joint Surgery, Incorporated.

  5. Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times

    Science.gov (United States)

    Delgado, Ana; Callén, Blanca

    2016-01-01

    In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, ‘hacking’ is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey’s experimental approach to politics, we analyse hacks as ‘inquiry’ to see how they serve to articulate public and political action. We argue that do-it-yourself and makers’ hacks are technical and political demonstrations. What do-it-yourself and makers’ hacks ultimately demonstrate is that things can be done otherwise and that ‘you’ can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration. PMID:27233296

  6. GROWTH HACKING PRACTICES IN A START-UP: A CASE STUDY ON THECON.RO

    Directory of Open Access Journals (Sweden)

    Marius GERU

    2014-06-01

    Full Text Available Despite the increasing awareness of content marketing tools in the academic community, the benefits of growth hacking were highlighted especially in blog posts and several e-books. This paper examines the particular features of growth hacking techniques, which differentiates it from traditional marketing. Specifically, a content analysis was conducted to identify the experts’ opinions regarding the effective use of growth hacking techniques, to detect the specific skills that a growth hacker must gain and to compare the tools related to this concept from both inbound and outbound marketing perspective. On the other hand, we outlined the need for development of start-ups, without spending huge amounts of money in marketing. Using a case study methodology, we examined the motivations of adopting growth hacking techniques by an Internet pure player - Thecon. Results show that the effective mix of growth hacking techniques applied by this company tends to forward more online content than its competitors.

  7. Optimised quantum hacking of superconducting nanowire single-photon detectors.

    Science.gov (United States)

    Tanner, Michael G; Makarov, Vadim; Hadfield, Robert H

    2014-03-24

    We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

  8. Hacking point of sale payment application secrets, threats, and solutions

    CERN Document Server

    Gomzin, Slava

    2014-01-01

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendati

  9. Hacking Health: Bottom-up Innovation for Healthcare

    Directory of Open Access Journals (Sweden)

    Jeeshan Chowdhury

    2012-07-01

    Full Text Available Healthcare is not sustainable and still functions with outdated technology (e.g., pagers, paper records. Top-down approaches by governments and corporations have failed to deliver digital technologies to modernize healthcare. Disruptive innovation must come from the ground up by bridging the gap between front-line health experts and innovators in the latest web and mobile technology. Hacking Health is a hackathon that is focused on social innovation more than technical innovation. Our approach to improve healthcare is to pair technological innovators with healthcare experts to build realistic, human-centric solutions to front-line healthcare problems.

  10. Optimised quantum hacking of superconducting nanowire single-photon detectors

    Science.gov (United States)

    Tanner, Michael G.; Makarov, Vadim; Hadfield, Robert H.

    2014-03-01

    We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

  11. The ethical hack a framework for business value penetration testing

    CERN Document Server

    Tiller, James S

    2004-01-01

    INTRODUCTIONPerspectives of ValueSECURITY AND HACKINGInformation SecuritySecurity ArchitectureHacking ImpactsTHE FRAMEWORKBusiness Planning and OperationsReconnaissanceEnumerationVulnerability AnalysisExploitationFinal AnalysisDeliverableIntegration INFORMATION SECURITY PROGRAMScope of Information Security ProgramsThe Process of Information SecurityComponent Parts of Information Security ProgramsBUSINESS PLANNING AND OPERATIONSBusiness ObjectivesSecurity PolicyPrevious Test ResultsBusiness ChallengesThe Business of SecurityReasoningOverall ExpectationsHow Deep is Deep Enough?Timing is Everythi

  12. Free-space QKD system hacking by wavelength control using an external laser.

    Science.gov (United States)

    Lee, Min Soo; Woo, Min Ki; Jung, Jisung; Kim, Yong-Su; Han, Sang-Wook; Moon, Sung

    2017-05-15

    We develop a way to hack free-space quantum key distribution (QKD) systems by changing the wavelength of the quantum signal laser using an external laser. Most free-space QKD systems use four distinct lasers for each polarization, thereby making the characteristics of each laser indistinguishable. We also discover a side-channel that can distinguish the lasers by using an external laser. Our hacking scheme identifies the lasers by automatically applying the external laser to each signal laser at different intensities and detecting the wavelength variation according to the amount of incident external laser power. We conduct a proof-of-principle experiment to verify the proposed hacking structure and confirm that the wavelength varies by several gigahertzes to several nanometers, depending on the intensity of the external laser. The risk of hacking is successfully proven through the experimental results. Methods for prevention are also suggested.

  13. Reanalyzing Head et al. (2015): investigating the robustness of widespread p-hacking.

    Science.gov (United States)

    Hartgerink, Chris H J

    2017-01-01

    Head et al. (2015) provided a large collection of p -values that, from their perspective, indicates widespread statistical significance seeking (i.e., p -hacking). This paper inspects this result for robustness. Theoretically, the p -value distribution should be a smooth, decreasing function, but the distribution of reported p -values shows systematically more reported p -values for .01, .02, .03, .04, and .05 than p -values reported to three decimal places, due to apparent tendencies to round p -values to two decimal places. Head et al. (2015) correctly argue that an aggregate p -value distribution could show a bump below .05 when left-skew p -hacking occurs frequently. Moreover, the elimination of p  = .045 and p  = .05, as done in the original paper, is debatable. Given that eliminating p  = .045 is a result of the need for symmetric bins and systematically more p -values are reported to two decimal places than to three decimal places, I did not exclude p  = .045 and p  = .05. I conducted Fisher's method .04 hacking remains when we look at the entire range between .04 hacking is widespread. Given the far-reaching implications of supposed widespread p -hacking throughout the sciences Head et al. (2015), it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p -hacking is found in this reanalysis, this does not mean that there is no p -hacking at all. These results nuance the conclusion by Head et al. (2015), indicating that the results are not robust and that the evidence for widespread left-skew p -hacking is ambiguous at best.

  14. iPhone Hacks Tips and Tools for Pushing the Smartest Phone to Its Limits

    CERN Document Server

    Jurick, David; Stolarz, Damien

    2009-01-01

    With iPhone Hacks, you can make your iPhone do all you'd expect of a smartphone -- and more. Learn tips and techniques to unleash little-known features, find and create innovative applications for both the iPhone and iPod touch, and unshackle these devices to run everything from network utilities to video game emulators. iPhone Hacks is exactly what you need to make the most of your iPhone.

  15. Characterizing Cyberbullying among College Students: Hacking, Dirty Laundry, and Mocking

    Directory of Open Access Journals (Sweden)

    Rajitha Kota

    2014-10-01

    Full Text Available Bullying behaviors occur across the lifespan and have increasingly migrated to online platforms where they are known as cyberbullying. The purpose of this study was to explore the phenomenon of cyberbullying among college students. Participants were recruited for focus groups through purposeful sampling, including recruitment from groups traditionally at risk for bullying. Focus groups discussed views and perceptions of cyberbullying on campuses. Groups were led by a trained facilitator and were audio recorded and manually transcribed. The constant comparative approach was used to identify themes and representative quotations. The 42 participants had an average age of 19.2 (SD = 1.2, 55% were female, 83% were Caucasian. Three themes emerged from the data: (1 lack of agreement on a definition of cyberbullying, but consensus on three representative scenarios: hacking, dirty laundry and mocking; (2 concerns with translating definitions of traditional bullying to cyberbullying; (3 opinions that cyberbullying may manifest differently in college compared to younger adolescents, including increased potential for long-term effects. College students were not in agreement about a theoretical definition, but they could agree upon specific representative instances of cyberbullying.  Future studies could consider using common case examples or vignettes of cyberbullying, or creation of developmentally representative definitions by age group.

  16. Mind Invasion: Situated Affectivity and the Corporate Life Hack.

    Science.gov (United States)

    Slaby, Jan

    2016-01-01

    In view of the philosophical problems that vex the debate on situated affectivity, it can seem wise to focus on simple cases. Accordingly, theorists often single out scenarios in which an individual employs a device in order to enhance their emotional experience, or to achieve new kinds of experience altogether, such as playing an instrument, going to the movies, or sporting a fancy handbag. I argue that this narrow focus on cases that fit a "user/resource model" tends to channel attention away from more complex and also more problematic instances of situated affectivity. Among these are scenarios in which a social domain draws individuals into certain modes of affective interaction, often by way of attunement and habituation to affective styles and interaction patterns that are normative in the domain in question. This can lead to a phenomenon that is not so much "mind extension" than "mind invasion": affectivity is dynamically framed and modulated from without, often contrary to the prior orientations of the individuals in question. As an example, I discuss affective patterns prevalent in today's corporate workplace. I claim that workplace affect sometimes contributes to what is effectively a "hack" of employees' subjectivity.

  17. Integrating student feedback during "Dental Curriculum Hack-A-thon".

    Science.gov (United States)

    Saffari, Shawheen S; Frederick Lambert, R; Dang, Lucy; Pagni, Sarah; Dragan, Irina F

    2018-05-02

    The future of dental education is at crossroads. This study used the parameter of the 2016 Dental Curriculum Hack-a-Thon to assess intra- and inter-institutional agreement between student and faculty views regarding dental curriculums to determine if there is an impact in student perceptions towards dental education from before and after the event. This exploratory, cross-sectional study involved two surveys, with Survey 1 being distributed among four faculty-student pairs of the four participating dental schools answering 14 questions. Survey 2 assessed the views of 20 participating dental students through 26 questions in a pre- and post- event survey design. Descriptive statistics were used to explore differences in perceptions towards dental education across both instrument surveys. The results revealed valuable student insights regarding intra- and inter-institutional agreement relevant for the change in dental curriculum that needs to occur. Survey 2 revealed that mandatory attendance in didactic courses, electronic based examination preferences, and the preference of preclinical courses being held in the first and second years of a four-year dental curriculum were of particular importance to student participants. The results of this study indicate that exposure and participation in subjects pertaining to dental education can be influential on student preferences and opinions on how dental education should be delivered in a four-year curriculum.

  18. A Systems Approach to Healthcare Innovation Using the MIT Hacking Medicine Model.

    Science.gov (United States)

    Gubin, Tatyana A; Iyer, Hari P; Liew, Shirlene N; Sarma, Aartik; Revelos, Alex; Ribas, João; Movassaghi, Babak; Chu, Zen M; Khalid, Ayesha N; Majmudar, Maulik D; Lee, Christopher Xiang

    2017-07-26

    MIT Hacking Medicine is a student, academic, and community-led organization that uses systems-oriented "healthcare hacking" to address challenges around innovation in healthcare. The group has organized more than 80 events around the world that attract participants with diverse backgrounds. These participants are trained to address clinical needs from the perspective of multiple stakeholders and emphasize utility and implementation viability of proposed solutions. We describe the MIT Hacking Medicine model as a potential method to integrate collaboration and training in rapid innovation techniques into academic medical centers. Built upon a systems approach to healthcare innovation, the time-compressed but expertly guided nature of the events could enable more widely accessible preliminary training in systems-level innovation methodology, as well as creating a structured opportunity for interdisciplinary congregation and collaboration. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Brief communication: Possible explanation of the values of Hack's drainage basin, river length scaling exponent

    Science.gov (United States)

    Hunt, Allen G.

    2016-04-01

    Percolation theory can be used to find water flow paths of least resistance. Application of percolation theory to drainage networks allows identification of the range of exponent values that describe the tortuosity of rivers in real river networks, which is then used to generate the observed scaling between drainage basin area and channel length, a relationship known as Hack's law. Such a theoretical basis for Hack's law may allow interpretation of the range of exponent values based on an assessment of the heterogeneity of the substrate.

  20. Explanation of the values of Hack's drainage basin, river length scaling exponent

    Science.gov (United States)

    Hunt, A. G.

    2015-08-01

    Percolation theory can be used to find water flow paths of least resistance. The application of percolation theory to drainage networks allows identification of the range of exponent values that describe the tortuosity of rivers in real river networks, which is then used to generate the observed scaling between drainage basin area and channel length, a relationship known as Hack's law. Such a theoretical basis for Hack's law allows interpretation of the range of exponent values based on an assessment of the heterogeneity of the substrate.

  1. Reanalyzing Head et al. (2015: investigating the robustness of widespread p-hacking

    Directory of Open Access Journals (Sweden)

    Chris H.J. Hartgerink

    2017-03-01

    Full Text Available Head et al. (2015 provided a large collection of p-values that, from their perspective, indicates widespread statistical significance seeking (i.e., p-hacking. This paper inspects this result for robustness. Theoretically, the p-value distribution should be a smooth, decreasing function, but the distribution of reported p-values shows systematically more reported p-values for .01, .02, .03, .04, and .05 than p-values reported to three decimal places, due to apparent tendencies to round p-values to two decimal places. Head et al. (2015 correctly argue that an aggregate p-value distribution could show a bump below .05 when left-skew p-hacking occurs frequently. Moreover, the elimination of p = .045 and p = .05, as done in the original paper, is debatable. Given that eliminating p = .045 is a result of the need for symmetric bins and systematically more p-values are reported to two decimal places than to three decimal places, I did not exclude p = .045 and p = .05. I conducted Fisher’s method .04 < p < .05 and reanalyzed the data by adjusting the bin selection to .03875 < p ≤ .04 versus .04875 < p ≤ .05. Results of the reanalysis indicate that no evidence for left-skew p-hacking remains when we look at the entire range between .04 < p < .05 or when we inspect the second-decimal. Taking into account reporting tendencies when selecting the bins to compare is especially important because this dataset does not allow for the recalculation of the p-values. Moreover, inspecting the bins that include two-decimal reported p-values potentially increases sensitivity if strategic rounding down of p-values as a form of p-hacking is widespread. Given the far-reaching implications of supposed widespread p-hacking throughout the sciences Head et al. (2015, it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p-hacking

  2. Statistics Hacks Tips & Tools for Measuring the World and Beating the Odds

    CERN Document Server

    Frey, Bruce

    2008-01-01

    Want to calculate the probability that an event will happen? Be able to spot fake data? Prove beyond doubt whether one thing causes another? Or learn to be a better gambler? You can do that and much more with 75 practical and fun hacks packed into Statistics Hacks. These cool tips, tricks, and mind-boggling solutions from the world of statistics, measurement, and research methods will not only amaze and entertain you, but will give you an advantage in several real-world situations-including business.

  3. Linux Server Hacks, 2 Tips & Tools for Connecting, Monitoring, and Troubleshooting

    CERN Document Server

    von Hagen, William

    2009-01-01

    This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. And you don't have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network. Whether they help you recover lost data, collect information from distributed clients, or synchronize administrative envir

  4. Reanalyzing Head et al. : Investigating the robustness of widespread p-hacking

    NARCIS (Netherlands)

    Hartgerink, C.H.J.

    2017-01-01

    Head et al. (2015) provided a large collection of p-values that, from their perspective, indicates widespread statistical significance seeking (i.e., p-hacking). This paper inspects this result for robustness. Theoretically, the p-value distribution should be a smooth, decreasing function, but the

  5. Connected Learning in the Library as a Product of Hacking, Making, Social Diversity and Messiness

    Science.gov (United States)

    Bilandzic, Mark

    2016-01-01

    Learning is most effective when intrinsically motivated through personal interest, and situated in a supportive socio-cultural context. This paper reports on findings from a study that explored implications for design of interactive learning environments through 18 months of ethnographic observations of people's interactions at "Hack The…

  6. Second generation bioethanol production from Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.

    Science.gov (United States)

    Danilo Scordia; Salvatore L. Consentino; Thomas W. Jeffries

    2010-01-01

    Saccharum (Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.), is a rapidly growing, wide ranging high-yield perennial, suitable for second generation bioethanol production. This study evaluated oxalic acid as a pretreatment for bioconversion. Overall sugar yields, sugar degradation products, enzymatic glucan hydrolysis and ethanol production were studied as...

  7. "Hacking at Our Very Roots": Rearticulating White Racial Identity within the Context of Teacher Education

    Science.gov (United States)

    Aveling, Nado

    2006-01-01

    When teaching about race and racism and how we as "Whites" are implicated in the discursive practices that sustain racism, we are indeed "hacking at the very roots" of the ways in which students have conceptualized their identity in terms of being non-racialized and at the same time non-racist. In this paper I focus on the challenges and…

  8. Variations in Tectonic Activities of the Central and Southwestern Foothills, Taiwan, Inferred from River Hack Profiles

    Directory of Open Access Journals (Sweden)

    Yen-Chieh Chen

    2006-01-01

    Full Text Available A longitudinal profile of a river under static equilibrium shows no degradation or aggradation and can be ideally described as a straight line on a semi-logarithmic graph. This type of profile is called a “Hack profile”. If a river runs across uprising active structure systems, its Hack profile becomes convex. Accumulated tectonic strain varies positively with the intensity of the upwarping in Hack-profile convexity. In this paper, we compare curvature changes in Hack profiles of a series of rivers running through faults in the central and southwestern Foothills of Taiwan. Longitudinal profiles of these rivers were derived from two versions of topographic maps (1904 and 1985 and recent DTM data (2000. Prior to comparisons, we calibrated the 1904 topographic map, named “Taiwan Bautu”, by “offsetting” horizontal coordinates north and westward approximately 440 m and then “linear transforming” the elevation values. The Tungtzchiau fault of the central Foothills has remained inactive since 1935. Here relatively high uplift activity near the Wu River is indicated by significantly convex Hack profiles. This strain accumulation can be attributed to a lack of small magnitude earthquakes along the fault over the past 70 years. In the southwestern Foothills, relatively high uplift activity of similar intensity to the central Foothills is indicted near the Neocho River. Significant profiles with concave segments below the ideal graded profiles, at the lower reaches of rivers where continuous small magnitude strain release events have occurred, can only be found along the Sandieh, Neocho and Bazhang rivers in the southwestern Foothills. All these findings indicate that fault systems in the central Foothills tend to be locked and these faults could yield large earthquakes similar to the Chi-Chi event.

  9. P.S. I love you...and other growth hacking strategies used by disruptive tech start-ups : A case study on the relevance and enactment of growth hacking by Sweden's tech start-ups

    OpenAIRE

    Bergendal, Taghrid Sara

    2017-01-01

    Disruption innovation theory has been the zeitgeist for building globally disruptive tech companies since 1997. One decade later, disruptive tech start-ups are moving away from traditional marketing strategies in favour of growth hacking. There is a seemingly growing consensus by online tech experts, tech entrepreneurs, advisors and investors, that suggests that growth hacking is becoming increasingly important practice for disruption based tech start-ups. Furthermore, Sweden is becoming the ...

  10. Forty Years of Movie Hacking: Considering the Potential Implications of the Popular Media Representation of Computer Hackers from 1968 to 2008

    OpenAIRE

    Gordon, Damian

    2010-01-01

    Increasingly movies are being produced which feature plots that incorporate elements of computer security and hacking, and cumulatively these movies are creating a public perception as to the nature of computer security. This research examines movies that feature hackers (and hacking) to identify if any common themes emerge from these movies in their representation of these issues. To achieve this, first a corpus of hacking movies is created, and then using a qualitative data analysis techniq...

  11. Concepts, Diagnosis and the History of Medicine: Historicising Ian Hacking and Munchausen Syndrome.

    Science.gov (United States)

    Millard, Chris

    2017-08-01

    Concepts used by historians are as historical as the diagnoses or categories that are studied. The example of Munchausen syndrome (deceptive presentation of illness in order to adopt the 'sick role') is used to explore this. Like most psychiatric diagnoses, Munchausen syndrome is not thought applicable across time by social historians of medicine. It is historically specific, drawing upon twentieth-century anthropology and sociology to explain motivation through desire for the 'sick role'. Ian Hacking's concepts of 'making up people' and 'looping effects' are regularly utilised outside of the context in which they are formed. However, this context is precisely the same anthropological and sociological insight used to explain Munchausen syndrome. It remains correct to resist the projection of Munchausen syndrome into the past. However, it seems inconsistent to use Hacking's concepts to describe identity formation before the twentieth century as they are given meaning by an identical context.

  12. Little River revisited - thirty-five years after Hack and Goodlett

    Science.gov (United States)

    Osterkamp, W.R.; Hupp, C.R.; Schening, M.R.

    1995-01-01

    In possibly the first detailed study to relate geomorphology, vegetation, and hydrology at a watershed scale, Hack and Goodlett (1960) documented variation in the eastern forest with topographic positions of cove, side slope, and nose. The study also described effects on landforms and vegetation of a catastrophic flood that occurred in June, 1949. Field investigations, conducted nearly four decades later, review selected parts of the study by Hack and Goodlett (1960). Replicate data provide a basis to evaluate their interpretations, to document geomorphic change since the 1949 flood, and to identify vegetation change in uplands and bottomlands. Results suggest that change to hillslope landforms has been minor since 1949, but that changes have occurred, seemingly during flow events of 1952, 1955 and 1985. Change in areal extent of forest types was not detected. Change in the relative abundances of dominant species may have resulted from 20th century fire suppression. -from Authors

  13. Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

    OpenAIRE

    Heerden , Renier ,; Pieterse , Heloise; Irwin , Barry

    2012-01-01

    Part 4: Section 3: ICT for Peace and War; International audience; This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The...

  14. Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags

    OpenAIRE

    Bermejo, Carlos; Hui, Pan

    2017-01-01

    Nowadays privacy in the connected world is a big user's concern. The ubiquity of mobile devices permits billions of users browse the web at anytime, anywhere. Near Field Communication (NFC) appeared as a seamlessly and simply communication protocol between devices. Commercial services such as Android Pay, and Apple Pay offer contactless payment methods that are spreading in more and more scenarios. However, we take risks while using NFC on Android devices, we can be hacked, and our privacy ca...

  15. Governance responses to hacking in the banking sector of South Africa : an exploratory study

    OpenAIRE

    2013-01-01

    D.Comm. (Auditing) Organisations today are critically dependent on IT to enable business operations and ensure competitiveness in a growing international marketplace. At the same time, IT also introduces significant risks, such as hacking. The board of directors is ultimately responsible for mitigating IT risk as a component of business risk. This task is included in its corporate governance responsibilities, which, in the South African context, is underpinned by the King Code of Corporate...

  16. The value of Growth Hacking. Business development manual for Emi-Rent Properties

    OpenAIRE

    Elezovic, Velimir

    2017-01-01

    This thesis was commissioned by Emi-Rent Properties, a real estate company based in Bel-grade, Serbia. The main objective of this thesis is to help determine the value of growth hack-er marketing for the case company’s newly commissioned marketing campaign. Secondary objective of this thesis is to present practical advice on the implementation of a successful marketing campaign with strong international aspects. The thesis will cover major marketing concepts and provide an alternative view by...

  17. Science Hack Day: an opportunity for public engagement, art/science mash-ups, and inspiration

    Science.gov (United States)

    Bellis, Matthew

    2013-04-01

    The idea of a Science Hack Day (http://sciencehackday.com/) is to put non-scientists (designers, web developers, artists, interested enthusiasts) in a room with scientists and some good ideas, and see what science-themed project they can create in a weekend (about 24 hours of real hacking). The motto of the organizers is ``Get Excited and Make Things with Science!'' I have participated in several of these events including the first one held in the United State in Palo Alto in 2010 and as a remote advisor to participants in Nairobi, Kenya. To these events I have brought particle physics data from both the BaBar and the CMS (Compact Muon Solenoid) experiments, data from the CoGeNT dark matter direct-detection experiment, and my expertise and enthusiasm. The experience has been transformative for me as both a scientist and a science advocate. This talk will recount my experiences with Science Hack Day events in general and detail some projects that have come out of these days, including the Particle Physics Wind Chime (http://www.mattbellis.com/windchime/) and the Standard Model of Cocktail Physics (http://www.physicsdavid.net/2012/11/standard-model-of-cocktail-physics/). Opportunities for other scientists to take part in similar events will be discussed.

  18. Cloud amount/frequency, NITRATE and other data from PORT HACKING 50M, STORM BAY and other platforms from 1989-01-04 to 1990-12-05 (NODC Accession 9300100)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Ocean Serial data in this accession was collected as part of Global Ocean Data Archeaology and Rescue (GODAR) project from ships PORT HACKING 100M, PORT HACKING...

  19. Hacking multitude’ and Big Data: Some insights from the Turkish ‘digital coup’

    Directory of Open Access Journals (Sweden)

    Paolo Cardullo

    2015-04-01

    Full Text Available The paper presents my first findings and reflections on how ordinary people may opportunistically and unpredictably respond to Internet censorship and tracking. I try to capture this process with the concept of ‘hacking multitude'. Working on a case study of the Turkish government's block of the social media platform Twitter (March 2014, I argue that during systemic data choke-points, a multitude of users might acquire a certain degree of reflexivity over ubiquitous software of advanced techno-capitalism. Resisting naïve parallels between urban streets and virtual global streets, the article draws on Fuller's ‘media ecologies' to make sense of complex and dynamic interactions between processes and materialities, strategies of communication and mundane practices. Such a dense space is mostly invisible to network and traffic analysis, although it comes alive under the magnifying lens of digital ethnography. As the Turkish government tried to stop protesters on both the urban and the Twitter spheres, alternative material configurations and new hybrid formations and practices emerged. I try to bring this process alive following the traces – that is, a combination of digital data and materialities – of a social space between the protest for Twitter access, the ‘digital coup' and the interactions that this situation determined. In the final section, I briefly explore two research trajectories which can further develop my initial formulation of a ‘hacking multitude'. I argue that a generalisation of hacking/multitude is problematic for the political, cultural or economic processes more directly associated with Big Data.

  20. Obtaining plant Miscanthus sacchariflorus (Maxim. Hack and Miscanthus sinensis Andersson in vitro culture by indirect morphogenesis

    Directory of Open Access Journals (Sweden)

    С. М. Гонтаренко

    2017-03-01

    Full Text Available Purpose. To obtain Miscanthus sacchariflorus (Maxim. Hack and Miscanthus sinensis Andersson in vitro culture by indirect morphogenesis. Methods. Biotechnological procedures, mathematical and statistical analyses. Results. Composition of nutrient medium was developed intended for induction of callusogenesis from Miscanthus seeds with a poor germination and viability of seedlings – Murashige and Skoog (MS medium was modified for the amount of macroelements (half-dose that was supplemented with amino acids (300 mg/l of glutamic acid, 50 mg/l of aspartic acid, 5 mg/l of tyrosine, 3 mg/l of arginine, 2 mg/l of hydroxyproline and plant growth regulators [2,5 mg/l of 2.4D (2.4-Dichlorophenoxyacetic acid, 0,6 mg/l of BAP (6-Benzyl-aminopurine and 0,3 mg/l of ABA (Abscisic acid]. Composition of nutrient medium was developed for regeneration of microplants from callus – agar MS medium was modified for the amount of macroelements (half-dose supplemented with vitamins: 10 mg/l of thiaminum, 1,0 mg/l of pyridoxine, 1,0 mg/l of nicotinic acid (by White, 1,0 mg/l of ascorbic acid, 250 mg/l of glutamic acid, 2,0 mg/l of BAP, 0,3 mg/l of NAA (Naphthaleneacetic acid. On this medium, 100% regeneration of M. sacchariflorus (Maxim. Hack and 50% regeneration of M. sinensis Andersson was obtained. Due to media modification aimed at initiating callusogenesis and microplants regeneration, reproduction factor of M. sinensis was increased 20 times at the average, M. sacchariflorus – 35–40 times. Conclusions. Plants of M. sacchariflorus (Maxim. Hack and M. sinensis Andersson were obtained in vitro culture by initiation of callusogenes and microplants regeneration from the Miscanthus seeds with poor germination and viability on nutrient media of certain composition.

  1. Macroscopic and stereomicroscopic comparison of hacking trauma of bones before and after carbonization.

    Science.gov (United States)

    Alunni, Véronique; Nogueira, Luísa; Quatrehomme, Gérald

    2018-03-01

    This experimental study examined lesions produced by a hatchet on pig femurs before and after carbonization. A total of 30 lesions were produced and analyzed using stereomicroscopy and then reexamined after carbonization. Not only was the sharp-blunt mechanism of the hacking trauma (V-shape, regularity of one edge, irregularity of the other edge, upraising, lateral pushing back, fossae dug laterally to the edge) still recognizable after carbonization; in some instances, the carbonization actually enhanced the features observed. Carbonization also did not significantly alter the measurements of the lesions. Carbonization tends to alter the structure of the bone especially in areas weakened by the blunt trauma.

  2. Upconversion-based receivers for quantum hacking-resistant quantum key distribution

    Science.gov (United States)

    Jain, Nitin; Kanter, Gregory S.

    2016-07-01

    We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  3. Progress on white papers from the Demographic Hack Session at WiA IV

    Science.gov (United States)

    Norman, Dara J.; WiA IV Demographics Hack Session Attendees.

    2018-06-01

    At the Women in Astronomy IV meeting in June 2017, a number of white papers were started as part of the Demographic Hack session. Several of these white papers are intended for submission to the Decadal Survey on topics including, ‘Providing a Timely Review of Input Demographics to Advisory Committees’, and ‘Tying Research Funding to Progress in Inclusion’. In my talk, I will review the content of these white papers and the progress that has been made in writing them. Interested session attendees are encouraged ‘endorse’ the papers by becoming signatories.

  4. Hacking web intelligence open source intelligence and web reconnaissance concepts and techniques

    CERN Document Server

    Chauhan, Sudhanshu

    2015-01-01

    Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach

  5. Between Freedom and Constraint: ROM Hacking of Pokémon Games

    OpenAIRE

    Barnabé, Fanny

    2018-01-01

    This paper aims to study a creative practice widespread in video game cultures: “ROM hacking”. By examining with the tools of rhetoric a defined corpus of ROM hacks derived from 『Pokémon』 games, the presentation will show that the formal construction of these derivative works demonstrates less a free or subversive transformation than a fairly strict respect for the original games’ conventions. By reproducing the structure of official 『Pokémon 』games, these fan productions become mirrors revea...

  6. Metal accumulation in the greentail prawn, Metapenaeus bennettae, in Sydney and Port Hacking estuaries, Australia.

    Science.gov (United States)

    Lewtas, K L M; Birch, G F; Foster-Thorpe, C

    2014-01-01

    Metal concentrations of the inshore greentail prawn, Metapenaeus bennettae, and surface sediments from locations within Sydney estuary and Port Hacking (Australia) were assessed for bioaccumulation and contamination. The current study aimed to assess metal concentrations in prawn tissue (tail muscle, exoskeleton, hepatopancreas and gills), relate whole body prawn tissue metal concentrations to sediment metal concentrations and animal size, as well as assess prawn consumption as a risk to human health. Metal concentrations were highest in sediment and prawns from contaminated locations (Iron Cove, Hen and Chicken Bay and Lane Cove) in Sydney estuary compared with the reference estuary (Port Hacking). Concentrations in sediments varied considerably between sites and between metals (As, Cd, Cr, Cu, Ni, Pb and Zn), and although concentrations exceeded Interim Sediment Quality Guideline-Low values, metals (As, Cd, Cr, Cu, Ni, Pb and Zn) were below Australian National Health and Medical Research Council human consumption guidelines in prawn tail muscle tissue. Metal concentrations in prawn tail muscle tissue were significantly different (p ≤ 0.05) amongst locations for Pb, Zn and Cd, and metal concentrations were generally highest in gills tissue, followed by the hepatopancreas, exoskeleton and tail muscle. The exoskeleton contained the highest Sr concentration; the hepatopancreas contained the highest As, Cu and Mo concentrations; and the gills contained the highest Al, Cr, Fe and Pb concentrations. Concentrations of Pb, As and Sr were significantly different (p ≤ 0.05) between size groups amongst locations.

  7. Quantum key distribution with hacking countermeasures and long term field trial.

    Science.gov (United States)

    Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J

    2017-05-16

    Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.

  8. A consistent framework for Horton regression statistics that leads to a modified Hack's law

    Science.gov (United States)

    Furey, P.R.; Troutman, B.M.

    2008-01-01

    A statistical framework is introduced that resolves important problems with the interpretation and use of traditional Horton regression statistics. The framework is based on a univariate regression model that leads to an alternative expression for Horton ratio, connects Horton regression statistics to distributional simple scaling, and improves the accuracy in estimating Horton plot parameters. The model is used to examine data for drainage area A and mainstream length L from two groups of basins located in different physiographic settings. Results show that confidence intervals for the Horton plot regression statistics are quite wide. Nonetheless, an analysis of covariance shows that regression intercepts, but not regression slopes, can be used to distinguish between basin groups. The univariate model is generalized to include n > 1 dependent variables. For the case where the dependent variables represent ln A and ln L, the generalized model performs somewhat better at distinguishing between basin groups than two separate univariate models. The generalized model leads to a modification of Hack's law where L depends on both A and Strahler order ??. Data show that ?? plays a statistically significant role in the modified Hack's law expression. ?? 2008 Elsevier B.V.

  9. Deep learning quick reference useful hacks for training and optimizing deep neural networks with TensorFlow and Keras

    CERN Document Server

    Bernico, Michael

    2018-01-01

    This book is a practical guide to applying deep neural networks including MLPs, CNNs, LSTMs, and more in Keras and TensorFlow. Packed with useful hacks to solve real-world challenges along with the supported math and theory around each topic, this book will be a quick reference for training and optimize your deep neural networks.

  10. P-hacking in academic research : a critical review of the job strain model and of the association between night work and breast cancer in women

    OpenAIRE

    Ingre, Michael

    2017-01-01

    P-hacking can be described as a more or less deliberate, explorative approach to data analysis with a flexible/opportunistic search space and the reporting of primarily statistically significant findings. This leads to inflated type-1 error rates and to bias in reported estimates in the scientific literature. This thesis aims to describe how p-hacking can be manifested in academic research and to illustrate how bias due to p-hacking is expected to affect the veracity of published findings usi...

  11. Hacking Culture.

    Science.gov (United States)

    Vigh, Pia

    The paper presents the model behind net2art, a joint Nordic project of creating a platform for Nordic net art. The projects background and scope, organization, impact and experiences, funding structures, and copyright issues are covered. The paper argues that museums do not have a natural role in the distribution of net art (i.e., art that is made…

  12. Hacking on decoy-state quantum key distribution system with partial phase randomization

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  13. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  14. Book Review: Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E

    Directory of Open Access Journals (Sweden)

    Joshua Bartolomie

    2013-09-01

    Full Text Available Wilhelm, T. (2013. Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E. Waltham, MA: Syngress, 464 pages, ISBN-10: 1597499935; ISBN-13: 978-1597499934, US$79.99Reviewed by Joshua Bartolomie, CISSP, CEECS, CFCE, DFCP, CRISC, CSMOrganizations often strive for proactive information security programs in an effort to limit occurrence and impact of security breaches. However, traditional security programs run the risk of being unable to provide adequate insight and proactive awareness into real attack vectors that may exist within their organizations. With attack methods and efforts becoming increasingly aggressive, and effective, organizations must take equally assertive measures to protect their critical information and assets. Penetration testing is one of those tools that is often misunderstood, overlooked, and undervalued. A true adversary would not hesitate to exploit every potential to gain entry or cause a disruption to their target.(see PDF for full review

  15. Comparison of macroscopic and microscopic (stereomicroscopy and scanning electron microscopy) features of bone lesions due to hatchet hacking trauma.

    Science.gov (United States)

    Nogueira, Luísa; Quatrehomme, Gérald; Bertrand, Marie-France; Rallon, Christophe; Ceinos, Romain; du Jardin, Philippe; Adalian, Pascal; Alunni, Véronique

    2017-03-01

    This experimental study examined the lesions produced by a hatchet on human bones (tibiae). A total of 30 lesions were produced and examined macroscopically (naked eye) and by stereomicroscopy. 13 of them were also analyzed using scanning electron microscopy. The general shape of the lesion, both edges, both walls, the kerf floor and the extremities were described. The length and maximum width of the lesions were also recorded. The microscopic analysis of the lesions led to the description of a sharp-blunt mechanism. Specific criteria were identified (lateral pushing back, fragmentation of the upraising, fossa dug laterally to the edge and vertical striae) enabling the forensic expert to conclude that a hacking instrument was used. These criteria are easily identifiable using scanning electron microscopy, but can also be observed with stereomicroscopy. Overall, lateral pushing back and vertical striae visible using stereomicroscopy and scanning electron microscopy signal the use of a hacking tool.

  16. Generating randomised virtualised scenarios for ethical hacking and computer security education: SecGen implementation and deployment

    OpenAIRE

    Schreuders, ZC; Ardern, L

    2015-01-01

    Computer security students benefit from having hands-on experience with hacking tools and with access to vulnerable systems that they can attack and defend. However, vulnerable VMs are static; once they have been exploited by a student there is no repeatable challenge as the vulnerable boxes never change. A new novel solution, SecGen, has been created and deployed. SecGen solves the issue by creating vulnerable machines with randomised vulnerabilities and services, with constraints that ensur...

  17. Problems in using p-curve analysis and text-mining to detect rate of p-hacking and evidential value.

    Science.gov (United States)

    Bishop, Dorothy V M; Thompson, Paul A

    2016-01-01

    Background. The p-curve is a plot of the distribution of p-values reported in a set of scientific studies. Comparisons between ranges of p-values have been used to evaluate fields of research in terms of the extent to which studies have genuine evidential value, and the extent to which they suffer from bias in the selection of variables and analyses for publication, p-hacking. Methods. p-hacking can take various forms. Here we used R code to simulate the use of ghost variables, where an experimenter gathers data on several dependent variables but reports only those with statistically significant effects. We also examined a text-mined dataset used by Head et al. (2015) and assessed its suitability for investigating p-hacking. Results. We show that when there is ghost p-hacking, the shape of the p-curve depends on whether dependent variables are intercorrelated. For uncorrelated variables, simulated p-hacked data do not give the "p-hacking bump" just below .05 that is regarded as evidence of p-hacking, though there is a negative skew when simulated variables are inter-correlated. The way p-curves vary according to features of underlying data poses problems when automated text mining is used to detect p-values in heterogeneous sets of published papers. Conclusions. The absence of a bump in the p-curve is not indicative of lack of p-hacking. Furthermore, while studies with evidential value will usually generate a right-skewed p-curve, we cannot treat a right-skewed p-curve as an indicator of the extent of evidential value, unless we have a model specific to the type of p-values entered into the analysis. We conclude that it is not feasible to use the p-curve to estimate the extent of p-hacking and evidential value unless there is considerable control over the type of data entered into the analysis. In particular, p-hacking with ghost variables is likely to be missed.

  18. The walking-induced transient hack concept is valid & relies on a transient early-exercise hypoxemia.

    Directory of Open Access Journals (Sweden)

    Antoine Bruneau

    Full Text Available Decreased arterial oxygen pressure obtained at peak exercise is strong evidence of walking-induced hypoxemia, assuming that the lower pressure occurs just before exercise is stopped. Using empirical predefined models and transcutaneous oximetry, we have shown that some patients reporting exercise intolerance show a minimal value at the onset of walking and a post-exercise overshoot. These changes are referred to as transcutaneous "walking-induced transient hacks".In 245 patients, walking-induced transcutaneous oxygen pressure changes in the chest were analyzed using observer-independent clustering techniques. Clustering classes were compared to the profile types previously proposed with the cross-correlation technique. The classifications of patients according to both approaches were compared using kappa statistics. In 10 patients showing a hack on transcutaneous oximetry, we analyzed the results of direct iterative arterial sampling recorded during a new walking treadmill test.Clustering analysis resulted in 4 classes that closely fit the 4 most frequently proposed empirical models (cross-correlation coefficients: 0.93 to 0.97. The kappa between the two classifications was 0.865. In 10 patients showing transcutaneous hacks, the minimal direct arterial oxygen pressure value occurred at exercise onset, and these patients exhibited a recovery overshoot reaching a maximum at two minutes of recovery, confirming the walking-induced transient hypoxemia.In patients reporting exercise intolerance, transcutaneous oximetry could help to detect walking-induced transient hypoxemia, while peak-exercise arterial oximetry might be normal.

  19. Morpho-anatomical structure of the leaves of Festuca trachyphylla (Hack. Krajina in the ecological aspect

    Directory of Open Access Journals (Sweden)

    Agnieszka Dąbrowska

    2012-03-01

    Full Text Available Festuca trachyphylla(Hack. Krajina is a morphologically variable species common in warm and dry habitats in various communities: xerothermic grasslands, dry meadows, sand dunes, scrub and well-lighted forest. The aim of this study was to determine the limits of morphological and anatomical trait variability of F. rachyphylla leaves. The study was conducted in 24 sub-populations (N-432 individuals in the Lublin Upland, southeastern Poland. Plants in two localities were investigated: in calcium carbonate-rich xerothermic grasslands and on sand dunes. Variability of the F. trachyphylla leaf blades was demonstrated to be dependent on thehabitat type. The following morphological and anatomical traits: the length of the leaf, width of the cauline leaf, number of ribs in theleaf, length of the cauline leaf, length of hair in the leaf, colour of the leaf, hairiness of the upper part leaf, cross-section of the leaf, and distribution of the sclerenchymatous tissue in the leaf blade exhibited high variability.

  20. Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A.

    Science.gov (United States)

    King, Cason R; Zhang, Ali; Tessier, Tanner M; Gameiro, Steven F; Mymryk, Joe S

    2018-05-01

    As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected "hub" proteins to "hack" the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. Copyright © 2018 King et al.

  1. Reproductive hacking. A male seminal protein acts through intact reproductive pathways in female Drosophila.

    Science.gov (United States)

    Rubinstein, C Dustin; Wolfner, Mariana F

    2014-01-01

    Seminal proteins are critical for reproductive success in all animals that have been studied. Although seminal proteins have been identified in many taxa, and female reproductive responses to receipt of these proteins have been documented in several, little is understood about the mechanisms by which seminal proteins affect female reproductive physiology. To explore this topic, we investigated how a Drosophila seminal protein, ovulin, increases ovulation rate in mated females. Ovulation is a relatively simple physiological process, with known female regulators: previous studies have shown that ovulation rate is promoted by the neuromodulator octopamine (OA) in D. melanogaster and other insects. We found that ovulin stimulates ovulation by increasing OA signaling in the female. This finding supports a model in which a male seminal protein acts through "hacking" a well-conserved, regulatory system females use to adjust reproductive output, rather than acting downstream of female mechanisms of control or in parallel pathways altogether. We also discuss similarities between 2 forms of intersexual control of behavior through chemical communication: seminal proteins and pheromones.

  2. Outcomes From AAS Hack Day at the 227th AAS Meeting

    Science.gov (United States)

    Kohler, Susanna

    2016-01-01

    Editors Note:This is a final post from the 227th AAS Meeting in Kissimmee, FL. This special summary of AAS Hack Day, a meeting of AAS members to collaboratively work on various small projects, was written by Meredith Rawls (@Merrdiff) and was originally posted on astrobites.com.As the 227thAmerican Astronomical Society meeting drew to a close (see highlights from Day 1, Day 2, Day 3, and Day 4), a group of at least 50 attendees spent Day 4working on small projects fondly called hacks. Thanks to sponsorship from LSST and Northrup Grumman, the industrious hackers werewell-caffeinated and fed so we could devote time and energy toworking in groups on one-day projects.TheHack Day beganat 10am with pitches. Anybody with a project idea was welcome to briefly speak and try to convince others to work with them. Only someideas panned out, but the enthusiasm was palpable. Its not every day you get a full room of astronomers and affiliates eager to spend hours working on fun and useful projects to benefit the community.#hackAAS is getting underway! #aas227 pic.twitter.com/yX7jlOnSCK James R A Davenport (@jradavenport) January 8, 2016Here is a rundown of what we accomplished. Pretty impressive for a single day! Many thanks to fellow astrobiter Erika Nesvold (now at Carnegie DTM; @erikanesvold) whose hack was live-documenting all the other hacks. Her tweets as @astrobites appeared with the #hackaas hashtag, and her notes made this recap post infinitely easier to write.Interested in joining the fun? Sign up for Hack Day at the 2017 JanuaryAAS meeting (its free with meeting registration), and consider applying for the .Astronomy conference this summer.Towards Optimal Session Scheduling:Adrian Price-Whelan (Columbia), David Hogg (NYU), and Scott Idem (AAS) began writing a program to take all submitted abstracts to a conference like AAS and sort them using keywords to avoid scheduling similar talks in parallel sessions. Its impossible to make everyone happy, but minimizing conflicts

  3. The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems

    Science.gov (United States)

    Bianco, Louis J.

    The North American Electric Reliability Corporation (NERC) is about to enforce their NERC Critical Infrastructure Protection (CIP) Version Five and Six requirements on July 1st 2016. The NERC CIP requirements are a set of cyber security standards designed to protect cyber assets essential the reliable operation of the electric grid. The new Version Five and Six requirements are a major revision to the Version Three (currently enforced) requirements. The new requirements also bring substations into scope alongside Energy Control Centers. When the Version Five requirements were originally drafted they were vague, causing in depth discussions throughout the industry. The ramifications of these requirements has made owners look at their systems in depth, questioning how much money it will take to meet these requirements. Some owners saw backing down from routable networks to non-routable as a means to save money as they would be held to less requirements within the standards. Some owners saw removing routable connections as a proper security move. The purpose of this research was to uncover the inherent weaknesses in Industrial Control Systems (ICS) devices; to show how ICS devices can be hacked and figure out potential protections for these Critical Infrastructure devices. In addition, this research also aimed to validate the decision to move from External Routable connectivity to Non-Routable connectivity, as a security measure and not as a means of savings. The results reveal in order to ultimately protect Industrial Control Systems they must be removed from the Internet and all bi-directional external routable connections must be removed. Furthermore; non-routable serial connections should be utilized, and these non-routable serial connections should be encrypted on different layers of the OSI model. The research concluded that most weaknesses in SCADA systems are due to the inherent weaknesses in ICS devices and because of these weaknesses, human intervention is

  4. Trunk muscle activation in the back and hack squat at the same relative loads.

    Science.gov (United States)

    Clark, David R; Lambert, Michael I; Hunter, Angus M

    2017-07-12

    The hack squat (HS) is likely to produce a greater 1 repetition maximum (1RM) compared to the back squat (BS). This can be attributed to the support of the trunk during the HS compared to no support during BS. This support however, may compromise trunk muscle activation (TMA), therefore producing different training adaptations. Accordingly, the purpose of this study was to compare 1RM in BS and HS and TMA at 4 relative loads, 65, 75, 85 and 95% of maximal system mass. Ten males completed 3 test sessions:1) BS and HS 1RM, 2) HS & BS neuromuscular test familiarization, and, 3) Neuromuscular test for 3 reps at 4 loads for BS and HS. BS TMA was significantly greater (p<0.05) than HS for all muscles and phases except rectus abdominus in concentric phase. TMA increased (p<0.05) with load in all muscles for both exercises and phases apart from lumbar sacral erector spinae in HS eccentric phase. Mean HS 1RM and submaximal loads were significantly (p<0.0001) higher than the equivalent BS loads. Duration of the eccentric phase was higher (p<0.01) in HS than BS but not different in concentric phase. Duration increased significantly (p<0.01) with load in both exercises and both phases. Despite higher absolute tests loads in HS, TMA was higher in BS. TMA is sensitive to load in both exercises. BS is more effective than HS in activating the muscles of the trunk and therefore arguably more effective in developing trunk strength and stability for dynamic athletic performance.

  5. Modification of Hack Saw Blade Support 'REMOR 400' from the Length of 650 mm to 450 mm

    International Nuclear Information System (INIS)

    Sagino, Abdul-Hafid

    2005-01-01

    REMOR 400 type is the hack saw machine for cutting large work piece. The capacity of cutting is 310 mm diameter. The length of the blade is 650 mm (26 inches). For cutting small work piece (≤ 150 mm), the use of this blade is not efficient because the blade is relatively expensive. To solve this problem, the modification of the blade support is performed so that REMOR 400 machine can use the blade of 450 mm which is cheaper and easier to find in the market. (author)

  6. Sobre la existencia de la ley de Hack en las cuencas hidrográficas de Colombia.

    OpenAIRE

    Mantilla Gutiérrez, Ricardo; Mesa Sánchez, Óscar José; Poveda Jaramillo, Germán

    2000-01-01

    En este trabajo se presenta una caracterización geomorfométrica de las cuencas hidrográficas de Colombia, en términos de un estudio detallado de la relación potencial encontrada por J. T. Hack [3], entre la longitud del cauce principal y el área de la cuenca, que busca determinar una explicación del exponente que se obtiene con datos muestrales para tal relación potencial. Nuestros resultados sugieren que en 1000 cuencas Colombianas, el exponente anómalo de Kack puede explicarse en término...

  7. En torno a la construcción social de la locura: Ian Hacking y la historia cultural de la psiquiatría

    OpenAIRE

    Huertas, Rafael

    2011-01-01

    El objetivo de este trabajo es analizar la contribución del filósofo de la ciencia Ian Hacking a la historia cultural de la psiquiatría. Partiendo de conceptos propuestos por el autor, como "enfermedad mental transitoria" o "inventar/construir gente", se reflexiona en torno a la construcción socio-cultural de la enfermedad mental. Se examinan y discuten los dos estudios de caso propuestos por Hacking: la fuga disociativa y la personalidad múltiple, identificando las fortalezas y debilidades d...

  8. RNA Crystallization

    Science.gov (United States)

    Golden, Barbara L.; Kundrot, Craig E.

    2003-01-01

    RNA molecules may be crystallized using variations of the methods developed for protein crystallography. As the technology has become available to syntheisize and purify RNA molecules in the quantities and with the quality that is required for crystallography, the field of RNA structure has exploded. The first consideration when crystallizing an RNA is the sequence, which may be varied in a rational way to enhance crystallizability or prevent formation of alternate structures. Once a sequence has been designed, the RNA may be synthesized chemically by solid-state synthesis, or it may be produced enzymatically using RNA polymerase and an appropriate DNA template. Purification of milligram quantities of RNA can be accomplished by HPLC or gel electrophoresis. As with proteins, crystallization of RNA is usually accomplished by vapor diffusion techniques. There are several considerations that are either unique to RNA crystallization or more important for RNA crystallization. Techniques for design, synthesis, purification, and crystallization of RNAs will be reviewed here.

  9. The relationship between addiction to internet and adolescence’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking

    Directory of Open Access Journals (Sweden)

    Mehri Mowlaie

    2016-01-01

    Full Text Available Background: Given the importance of adolescent period and impact of internet and virtual communication tools on high risk behaviors, this research was conducted to examine the relationship between addiction to internet and adolescent’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking. Methods: The population of this study included all (n=40597 junior and senior high school students (boys and girls in academic year 2014-2015 in Ardabil, Iran. 380 subjects were selected as the study sample by multistage cluster sampling. The instruments for data collection in this research were addiction to internet questionnaire, Iranian adolescent's risk-taking scale and the researcher-made tendency to chat and hacking questionnaire. The data were analyzed by SPSS-22 software using correlation coefficient and simultaneous regression analysis. Results: The results showed a significantly positive correlation between addiction to internet and sexual behavior, tendency toward opposite sex, aggression, chatting and hacking (P<0.001, but there was no significant relationship between addiction to internet and alcohol. Conclusion: The results of the present study showed that addiction to internet was able to significantly predict sexual behavior, tendency toward opposite sex, aggression, chatting and hacking.

  10. RNA Origami

    DEFF Research Database (Denmark)

    Sparvath, Steffen Lynge

    introducerede vores gruppe den enkeltstrengede RNA-origami metode, der giver mulighed for cotranscriptional foldning af veldefinerede nanostrukturer, og er en central del af arbejdet præsenteret heri. Denne ph.d.-afhandling udforsker potentielle anvendelser af RNA-origami nanostrukturer, som nanomedicin eller...... biosensorer. Afhandlingen består af en introduktion til RNA-nanoteknologi feltet, en introduktion af enkeltstrenget RNA-origami design, og fire studier, der beskriver design, produktion og karakterisering af både strukturelle og funktionelle RNA-origamier. Flere RNA-origami designs er blevet undersøgt, og...... projekterne, der indgår i denne afhandling, inkluderer de nyeste fremskridt indenfor strukturel RNA-nanoteknologi og udvikling af funktionelle RNA-baserede enheder. Det første studie beskriver konstruktion og karakterisering af en enkeltstrenget 6-helix RNA-origami stuktur, som er den første demonstration af...

  11. Hacking for astronomy: can 3D printers and open-hardware enable low-cost sub-/millimeter instrumentation?

    Science.gov (United States)

    Ferkinhoff, Carl

    2014-07-01

    There have been several exciting developments in the technologies commonly used n in the hardware hacking community. Advances in low cost additive-manufacturing processes (i.e. 3D-printers) and the development of openhardware projects, which have produced inexpensive and easily programmable micro-controllers and micro-computers (i.e. Arduino and Raspberry Pi) have opened a new door for individuals seeking to make their own devices. Here we describe the potential for these technologies to reduce costs in construction and development of submillimeter/millimeter astronomical instrumentation. Specifically we have begun a program to measure the optical properties of the custom plastics used in 3D-printers as well as the printer accuracy and resolution to assess the feasibility of directly printing sub- /millimeter transmissive optics. We will also discuss low cost designs for cryogenic temperature measurement and control utilizing Arduino and Raspberry Pi.

  12. One Coin has Two Sides: A Comparative Appraisal of New York Times and China Daily’s News Coverage of Alleged Internet Hacking

    Directory of Open Access Journals (Sweden)

    Wenyu Liu

    2015-04-01

    Full Text Available There is always some debate as to whether news reporting is objective and emotionless. Under the guidance of engagement system, a sub-system of Appraisal Theory, concerning the conveyance of ideology, the present study attempts to make a comparative study of different ideological attitudes by news coverage in New York Times and China Daily’s (English version on alleged internet hacking. The findings suggest that similar distributions of engagement resources in the news reports are adopted when engaged in an ideological attitude. Additionally, China Daily and New York Times hold different attitudes to Internet hacking. The attitude by China Daily changes before and after Snowden Event, while New York Times remains the same.

  13. Análisis filosófico de la construcción social de la escuela: claves críticas a partir de Ian Hacking

    Directory of Open Access Journals (Sweden)

    José PENALVA BUITRAGO

    2009-01-01

    Full Text Available RESUMEN: Este artículo ofrece un análisis filosófico de la idea de la construcción social de la escuela. Tomando como punto de partida algunas de las claves críticas que I. Hacking señala respecto del constructivismo, el autor ensaya una nueva ruta de análisis, no explorada por Hacking: el análisis del constructivismo social en los procesos educativos y en las instituciones educativas. Con ello se intenta poner de relieve cuestiones teóricas de fondo –principalmente de carácter ontológico– acerca de las cuales la comunidad pedagógica ha prestado escasa atención. El análisis se desarrolla en cuatro pasos: en primer lugar, se ofrecen las ideas de Hacking más relevantes al respecto; después, se expone una síntesis de la posición dominante acerca de la construcción social de la escuela. Seguidamente, se analizan los aspectos ontológicos implicados en tal idea, y, por último, se extraen las consecuencias educativas.ABSTRACT: This paper offers a philosophical analysis of the idea of the social construction of School. Taking as a standpoint some critical questions which I. Hacking proposed regarding constructivism, the author examines a new route, not explored by Hacking, i.e., the analysis of social constructivism in educational processes and educational institutions. In this way we expect to throw light on certain deep theoretical questions –of an ontological nature, mainly– to which the educational community has paid little attention. The analysis follows four steps: first, it describes Hacking’s most important ideas in this regard; second, it synthesises the dominant stance concerning the social construction of School. Third, it examines the ontological assumptions of this idea, and, finally, describes some educational consequences.SOMMAIRE: Cet article offre une analyse philosophique de la structure sociale des écoles. L’auteur, à partir de quelques idées critiques signalées par I. Hacking à propos du

  14. Does 'hacking' surface type affect equine forelimb foot placement, movement symmetry or hoof impact deceleration during ridden walk and trot exercise?

    Science.gov (United States)

    Barstow, A; Bailey, J; Campbell, J; Harris, C; Weller, R; Pfau, T

    2018-04-17

    Both pleasure and competition horses regularly exercise on surfaces such as tarmac, gravel and turf during 'hacking'. Despite this, there is limited evidence relating to the effect of these surfaces upon foot-surface interaction. To investigate forelimb foot placement, hoof vibration and movement symmetry in pleasure horses on three commonly encountered hacking surfaces. Quantitative gait study in a convenience sample. Six horses regularly partaking in hacking exercise were ridden in walk and trot on all surfaces. Horses were equipped with one hoof-mounted, accelerometer and four body-mounted inertial measurement units (IMUs) to measure foot impact and movement symmetry. High-speed (400 FPS) video footage of foot-placement was acquired (dorsal, palmar, lateral views). Foot-impact and movement symmetry were analysed with a mixed effects model and Bowker symmetry tests for foot-placement analysis. Vibration power and frequency parameters increase as perceived surface firmness increases from grass, to gravel, to tarmac (P≤0.001). Vibration power parameters were consistently greater at trot compared with walk (P≤0.001), but the same was not true for vibration frequency (P≥0.2). Greatest movement asymmetry was recorded during grass surface trotting. No significant difference in foot-placement was detected between the three surfaces. This was a field study using three commonly encountered hacking surfaces. Surface properties change easily with water content and temperature fluctuations so care must be taken when considering other similar surfaces, especially at different times of the year. Six leisure horses were used so the results may not be representative of horses of all types. Vibration parameters generally increase as perceived surface firmness increases. Increasing speed alters vibration power but not frequency. Further investigations are required to determine the role that this may play in the development of musculoskeletal disease in horses. © 2018 EVJ

  15. Efficacy of ‘hack and squirt’ application of imazapyr, triclopyr, and glyphosate to control the invasive tree species Chinese tallowtree

    Science.gov (United States)

    Charles A. Gresham

    2010-01-01

    In May 2005, 12 plots approximately 21 by 27 m each were established on the exterior bank of a dredge spoil area in Georgetown, SC. The tree cover was primarily Chinese tallowtree, but there were also live oak trees in each plot. Also in May 2005, Chinese tallowtree s (d.b.h. > 2.4 cm) in three randomly selected plots received a ‘hack and squirt’ application of...

  16. The relationship between addiction to internet and adolescence’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking

    OpenAIRE

    Mehri Mowlaie; Setareh Jani

    2016-01-01

    Background: Given the importance of adolescent period and impact of internet and virtual communication tools on high risk behaviors, this research was conducted to examine the relationship between addiction to internet and adolescent’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking. Methods: The population of this study included all (n=40597) junior and senior high school students (boys and girls) in academic year 2014-2015 in Ardabil, Iran. 38...

  17. APLICAÇÃO DO ÍNDICE DE HACK (SL A UM TRECHO DO RIO ZÊZERE, PORTUGAL

    Directory of Open Access Journals (Sweden)

    Daniel Vieira Souza

    2011-11-01

    Full Text Available Os perfis longitudinais de rios são sensíveis a movimentações tectônicas causando alterações no nível de base. Devido a isto, verifica-se incisão fluvial a montante de compartimentos abatidos e agradação a jusante de compartimentos levantados. Os canais fl uviais são dinâmicos e se modificam através da incisão e da agradação periódicas, o estudo destes processos reveste-se de grande importância na compreensão das alterações do relevo. A formação de vales encaixados com perfis típicos em V, ou o aparecimento de trechos de agradação pode ter origem em causas tectônicas, ou outras. Hack (1973 propôs um índice (stream-gradient index para detectar estas alterações em cursos fluviais, decorrentes de mudanças no substrato geológico, aporte de carga, ou tectonismo. O stream-gradient index, ou simplesmente índice SL, relação declive (slope vs. comprimento do curso (length. O presente trabalho objetiva identificar rupturas de declive, num trecho do rio Zêzere, afluente do rio Tejo. O rio Zêzere corre num vale encaixado no interior da Cordilheira Central Portuguesa. Para identificar as roturas de declive utilizou-se o perfil longitudinal, índice de Hack, SL (slope VS. Lenght. Como resultado foi possível detectar locais onde sofreram abatimentos tectônicos, principalmente entre Pedrógão e Bogas de Baixo, foi possível também observar a influência de processos de erosão diferencial e de soleiras Quartzíticas de Farjão a Sarzedas na regularização dos processos tectônicos a montante daqueles níveis de base locais.

  18. Using hacked point and shoot cameras for time-lapse snow cover monitoring in an Alpine valley

    Science.gov (United States)

    Weijs, S. V.; Diebold, M.; Mutzner, R.; Golay, J. R.; Parlange, M. B.

    2012-04-01

    In Alpine environments, monitoring snow cover is essential get insight in the hydrological processes and water balance. Although measurement techniques based on LIDAR are available, their cost is often a restricting factor. In this research, an experiment was done using a distributed array of cheap consumer cameras to get insight in the spatio-temporal evolution of snowpack. Two experiments are planned. The first involves the measurement of eolic snow transport around a hill, to validate a snow saltation model. The second monitors the snowmelt during the melting season, which can then be combined with data from a wireless network of meteorological stations and discharge measurements at the outlet of the catchment. The poster describes the hardware and software setup, based on an external timer circuit and CHDK, the Canon Hack Development Kit. This latter is a flexible and developing software package, released under a GPL license. It was developed by hackers that reverse engineered the firmware of the camera and added extra functionality such as raw image output, more full control of the camera, external trigger and motion detection, and scripting. These features make it a great tool for geosciences. Possible other applications involve aerial stereo photography, monitoring vegetation response. We are interested in sharing experiences and brainstorming about new applications. Bring your camera!

  19. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy

    Science.gov (United States)

    Pleban, Johann-Sebastian; Band, Ricardo; Creutzburg, Reiner

    2014-02-01

    In this article we describe the security problems of the Parrot AR.Drone 2.0 quadcopter. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which makes it a target for harmful attacks. In addition, the videostream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we will perform a security threat analysis on this particular drone. We will set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We will show how the drone can be hacked in order to hijack the AR.Drone 2.0. Our aim is to sensitize the end-user of AR.Drones by describing the security vulnerabilities and to show how the AR.Drone 2.0 could be secured from unauthorized access. We will provide instructions to secure the drones Wi-Fi connection and its operation with the official Smartphone App and third party PC software.

  20. Sécurité informatique ethical hacking : apprendre l'attaque pour mieux se défendre

    CERN Document Server

    ACISSI

    2009-01-01

    Ce livre sur la sécurité informatique (et le ethical hacking) s'adresse à tout utilisateur d'ordinateur sensibilisé au concept de la sécurité informatique. Il a pour objectif d'initier le lecteur aux techniques des attaquants pour lui apprendre comment se défendre. ACISSI (Audit, Conseil, Installation et Sécurisation des Systèmes d'Information) est une association à but non lucratif qui forme et conseille, depuis plusieurs années, sur les enjeux de la sécurité informatique. Les auteurs de ce livre sont bien sûr membres actifs de l'association, chacun détenteur d'une spécialité, et forment une équipe de personnes de conviction qui se donnent pour mission de rendre la sécurité informatique accessible à tous : ""apprendre l'attaque pour mieux se défendre"" est leur adage. Hackers blancs dans l'âme, ils ouvrent au lecteur les portes de la connaissance underground. Aperçu de la table des matières : Introduction et Définitions - La méthodologie d'une attaque - Le Social Engineering - Les ...

  1. RNA-protein interactions in plant disease: hackers at the dinner table.

    Science.gov (United States)

    Spanu, Pietro D

    2015-09-01

    Plants are the source of most of our food, whether directly or as feed for the animals we eat. Our dinner table is a trophic level we share with the microbes that also feed on the primary photosynthetic producers. Microbes that enter into close interactions with plants need to evade or suppress detection and host immunity to access nutrients. They do this by deploying molecular tools - effectors - which target host processes. The mode of action of effector proteins in these events is varied and complex. Recent data from diverse systems indicate that RNA-interacting proteins and RNA itself are delivered by eukaryotic microbes, such as fungi and oomycetes, to host plants and contribute to the establishment of successful interactions. This is evidence that pathogenic microbes can interfere with the host software. We are beginning to see that pathogenic microbes are capable of hacking into the plants' immunity programs. © 2015 The Author. New Phytologist © 2015 New Phytologist Trust.

  2. RNA oxidation

    DEFF Research Database (Denmark)

    Kjaer, L. K.; Cejvanovic, V.; Henriken, T.

    2015-01-01

    .9 significant hazard ratio for death compared with the quartile with the lowest 8oxoGuo excretion when adjusted for age, sex, BMI, smoker status, s-HbA1c, urine protein excretion and s-cholesterol. We conclude that it is now established that RNA oxidation is an independent risk factor for death in type 2...

  3. Growth and physiological responses of two phenotypically distinct accessions of centipedegrass (Eremochloa ophiuroides (Munro) Hack.) to salt stress.

    Science.gov (United States)

    Li, JianJian; Ma, Jingjing; Guo, Hailin; Zong, Junqin; Chen, Jingbo; Wang, Yi; Li, Dandan; Li, Ling; Wang, Jingjing; Liu, Jianxiu

    2018-05-01

    Salinity is one of the major abiotic environmental stress factors affecting plant growth and development. Centipedegrass (Eremochloa ophiuroides [Munro)] Hack.) is an important warm-season turfgrass species with low turf maintenance requirements, but is sensitive to salinity stress. To explore salt tolerant germplasms in centipedegrass and better understand the growth and physiological responses of centipedegrass to salinity, we conducted anatomic observation and phytochemical quantification, examined growth parameters, and investigated photosynthetic machinery and antioxidant system in two phenotypically distinct centipedegrass accessions under NaCl salt stress. The morphophenotypical difference of the stems in the two accessions mainly depends on whether or not a thickened epidermal horny layer with purple colour was formed, which was caused by anthocyanin accumulation in the tissue. Successive salinity treatment was found to result in an inhibition of leaf growth, a marked decrease in photosynthesis, chlorophyll contents, and the maximal photochemical efficiency of PSII (Fv/Fm). Under the same treatment, purple-stem accession (E092) showed a lower degree of inhibition or decrease than green-stem one (E092-1). With the exception of malondialdehyde level, both proline content and antioxidant enzymes were upregulated to a greater extent in E092 following exposure to salinity condition. Meanwhile, significant enhancements of anthocyanin accumulation and total protein synthesis were detected in E092 after salt treatment, but not in E092-1. These results demonstrated that E092 favor better accumulation of anthocyanins under salinity condition, which contribute to salt tolerance by adjusting physiological functions and osmotic balance, and better maintenance of high turf quality. Hence, genetic phenotype can be utilized as a key indicator in E. ophiuroides breeding for salt-tolerance. Copyright © 2018. Published by Elsevier Masson SAS.

  4. 6. Analisis Implementasi Cyber Security Di Uni Eropa: Studi Kasus Carbon Credits Hacking Dalam European Union Emission Trading Scheme (EU ETS) Tahun 2010-2013

    OpenAIRE

    Aisya, Naila Sukma; Putranti, Ika Riswanti; Wahyudi, Fendy Eko

    2017-01-01

    Since the last two decades in the 20th century, the European Union (EU) has presented itself as a leader in climate change issues. The leadership manifested in the formation of the European Union Emission Trading Scheme (EU ETS) as an effort to fulfill the commitments of the Kyoto Protocol to reduce emissions in the region. But the existence of the EU ETS has been challenged by the emergence of carbon credits hacking case in some national registration systems in the EU ETS. This study discuss...

  5. p-hacking by post hoc selection with multiple opportunities: Detectability by skewness test?: Comment on Simonsohn, Nelson, and Simmons (2014).

    Science.gov (United States)

    Ulrich, Rolf; Miller, Jeff

    2015-12-01

    Simonsohn, Nelson, and Simmons (2014) have suggested a novel test to detect p-hacking in research, that is, when researchers report excessive rates of "significant effects" that are truly false positives. Although this test is very useful for identifying true effects in some cases, it fails to identify false positives in several situations when researchers conduct multiple statistical tests (e.g., reporting the most significant result). In these cases, p-curves are right-skewed, thereby mimicking the existence of real effects even if no effect is actually present. (c) 2015 APA, all rights reserved).

  6. Investigación en Progreso: Método de Inclusión de Hacking Ético en el Proceso de Testing de Software

    Directory of Open Access Journals (Sweden)

    Ariel Giannone

    2017-01-01

    Full Text Available Debido al crecimiento exponencial de Internet y a que las organizaciones poseen cada vez mas información, se hace imprescindible bloquear y eliminar todas las intrusiones posibles. Gracias al hacking ético es posible detectar y corregir algunas de las vulnerabilidades antes que el sistema salga a la luz. Con el fin de mejorar este proceso se intentan incluir estas técnicas y métodos en el proceso tradicional de testing de software dentro de las organizaciones.

  7. Investigación en Progreso: Método de Inclusión de Hacking Ético en el Proceso de Testing de Software

    OpenAIRE

    Ariel Giannone

    2017-01-01

    Debido al crecimiento exponencial de Internet y a que las organizaciones poseen cada vez mas información, se hace imprescindible bloquear y eliminar todas las intrusiones posibles. Gracias al hacking ético es posible detectar y corregir algunas de las vulnerabilidades antes que el sistema salga a la luz. Con el fin de mejorar este proceso se intentan incluir estas técnicas y métodos en el proceso tradicional de testing de software dentro de las organizaciones.

  8. Performance of the Hack's Impairment Index Score: A Novel Tool to Assess Impairment from Alcohol in Emergency Department Patients.

    Science.gov (United States)

    Hack, Jason B; Goldlust, Eric J; Ferrante, Dennis; Zink, Brian J

    2017-10-01

    Over 35 million alcohol-impaired (AI) patients are cared for in emergency departments (EDs) annually. Emergency physicians are charged with ensuring AI patients' safety by identifying resolution of alcohol-induced impairment. The most common standard evaluation is an extemporized clinical examination, as ethanol levels are not reliable or predictive of clinical symptoms. There is no standard assessment of ED AI patients. The objective was to evaluate a novel standardized ED assessment of alcohol impairment, Hack's Impairment Index (HII score), in a busy urban ED. A retrospective chart review was performed for all AI patients seen in our busy urban ED over 24 months. Trained nurses evaluated AI patients with both "usual" and HII score every 2 hours. Patients were stratified by frequency of visits for AI during this time: high (≥ 6), medium (2-5), and low (1). Within each category, comparisons were made between HII scores, measured ethanol levels, and usual nursing assessment of AI. Changes in HII scores over time were also evaluated. A total of 8,074 visits from 3,219 unique patients were eligible for study, including 7,973 (98.7%) with ethanol levels, 5,061 (62.7%) with complete HII scores, and 3,646 (45.2%) with health care provider assessments. Correlations between HII scores and ethanol levels were poor (Pearson's R 2  = 0.09, 0.09, and 0.17 for high-, medium-, and low-frequency strata). HII scores were excellent at discriminating nursing assessment of AI, while ethanol levels were less effective. Omitting extrema, HII scores fell consistently an average 0.062 points per hour, throughout patients' visits. The HII score applied a quantitative, objective assessment of alcohol impairment. HII scores were superior to ethanol levels as an objective clinical measure of impairment. The HII declines in a reasonably predictable manner over time, with serial evaluations corresponding well with health care provider evaluations. © 2017 by the Society for Academic

  9. Making and hacking

    NARCIS (Netherlands)

    Richterich, Annika; Wenz, Karin

    2017-01-01

    Digital Culture & Society is a refereed, international journal, fostering discussion about how digital technologies, platforms and applications reconfigure daily lives and practices. It offers a forum for inquiries into digital media theory, methodologies, and socio-technological developments. The

  10. Provoking, disturbing, hacking

    DEFF Research Database (Denmark)

    Groth, Sanne Krogh

    Among the artists on the contemporary Danish scene of computer music and sound art the musician and composer Goodiepal (Gæoudjiparl van den Dobbelsteen or Parl Kristian Bjørn Vester) is by no comparison the most controversial and provocative. This statement is applicable whether we meet him as mu...

  11. Hacking the Matrix.

    Science.gov (United States)

    Czerwinski, Michael; Spence, Jason R

    2017-01-05

    Recently in Nature, Gjorevski et al. (2016) describe a fully defined synthetic hydrogel that mimics the extracellular matrix to support in vitro growth of intestinal stem cells and organoids. The hydrogel allows exquisite control over the chemical and physical in vitro niche and enables identification of regulatory properties of the matrix. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. P-hacking.

    Science.gov (United States)

    Raj, A Thirumal; Patil, Shankargouda; Sarode, Sachin; Sarode, Gargi

    2017-08-01

    Due to increasing rate of research articles getting published in recent times, medical science is evolving very fast. Open access policies of the journals make information easily available to the stakeholders for building future research proposal. Blindly having faith in whatever is published in the literature is detrimental for science; however, it is hard to find out the correctness of the data analysis.

  13. Provoking, disturbing, hacking

    DEFF Research Database (Denmark)

    Groth, Sanne Krogh

    2013-01-01

    The article is a discussion of works by two Danish composers who both, with self-constructed instruments challenge computer music both as genre, the understanding and use of conventional technology and the relation to history. At first glance, the use of the homemade instruments appears as a comm...

  14. Hacking the hospital environment

    DEFF Research Database (Denmark)

    Boisen, Kirsten A; Boisen, Anne Bank; Thomsen, Stine Legarth

    2017-01-01

    BACKGROUND: There is a need for youth-friendly hospital environments as the ward environment may affect both patient satisfaction and health outcomes. OBJECTIVE: To involve young people in designing youth-friendly ward environment. METHODS: We arranged a design competition lasting 42 h (Hackathon...

  15. Who's Hacking Whom?

    DEFF Research Database (Denmark)

    Ridgway, Renée

    2017-01-01

    What can you do with a Tor exploit? The article discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today.......What can you do with a Tor exploit? The article discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today....

  16. Smart Home Hacking

    OpenAIRE

    Kodra, Suela

    2016-01-01

    Smart Home is an intelligent home equipped with devices and communications systems that enables the residents to connect and control their home appliances and systems. This technology has changed the way a consumer interacts with his home, enabling more control and convenience. Another advantage of this technology is the positive impact it has on savings on energy and other resources. However, despite the consumer's excitement about smart home, security and privacy have shown to be the strong...

  17. #HackLibSchool

    Directory of Open Access Journals (Sweden)

    Micah Vandegrift

    2010-10-01

    Full Text Available In the Library with the Lead Pipe welcomes guest poster Micah Vandegrift. Micah is a graduate student in Library and Information Studies at Florida State University. He currently lives in Brooklyn, NY, and is interning at the Brooklyn Public Library. Micah’s education has focused on 20th century American culture, digital media and the humanities and [...

  18. Flow: Cut and Hack

    Directory of Open Access Journals (Sweden)

    Bárbara Sainza Fraga

    2016-11-01

    Full Text Available Time without sequence, vertiginous processing and acceleration of circulation are some of the features of the informationalist paradigm in the network system. The microelectronics and the genetic engineering are writing the code of our societies. The emergence of a synchronic bio-cultural dimension can make us think about organic and fluid forms of writing, molecular, forms of writing that replicate and propagate, parasitic, fertile... for what?

  19. Hacking y ciberdelito

    OpenAIRE

    Giménez Solano, Vicente Miguel

    2011-01-01

    Investigar el delito desde cualquier perspectiva es una tarea compleja; de eso no hay duda. Las dificultades que surgen al tratar de aplicar el método científico a la Delincuencia Transnacional y al Crimen Organizado en buena parte ya fueron establecidas en estudios anteriores, pero enfrentar este tipo de delincuencia a todo nivel es la tarea a la que se ve avocada le Ministerio Público por mandato constitucional y por disposición legal. Ahora bien el fenómeno descrito en los últimos tiemp...

  20. Hacked E-mail

    Science.gov (United States)

    ... your email address was “spoofed,” or faked, and hackers don’t actually have access to your account. ... use public Wi-Fi .) Tagged with: antivirus , email , hacker , imposter , password , phishing , scam , social networking July 2013 ...

  1. Better P-curves: Making P-curve analysis more robust to errors, fraud, and ambitious P-hacking, a Reply to Ulrich and Miller (2015).

    Science.gov (United States)

    Simonsohn, Uri; Simmons, Joseph P; Nelson, Leif D

    2015-12-01

    When studies examine true effects, they generate right-skewed p-curves, distributions of statistically significant results with more low (.01 s) than high (.04 s) p values. What else can cause a right-skewed p-curve? First, we consider the possibility that researchers report only the smallest significant p value (as conjectured by Ulrich & Miller, 2015), concluding that it is a very uncommon problem. We then consider more common problems, including (a) p-curvers selecting the wrong p values, (b) fake data, (c) honest errors, and (d) ambitiously p-hacked (beyond p < .05) results. We evaluate the impact of these common problems on the validity of p-curve analysis, and provide practical solutions that substantially increase its robustness. (c) 2015 APA, all rights reserved).

  2. Inadvertent P-hacking among trials and systematic reviews of the effect of progestogens in pregnancy? A systematic review and meta-analysis.

    Science.gov (United States)

    Prior, M; Hibberd, R; Asemota, N; Thornton, J G

    2017-06-01

    Progestogens have been evaluated in numerous trials and meta-analyses, many of which concluded they were effective. However, two large trials PROMISE and OPPTIMUM have recently concluded that progesterone was ineffective. This raises the possibility that earlier studies and reviews had been biased by either selective publication or selective choice of outcomes, so called "P-hacking". To compare the findings all progestogen trials and systematic reviews with those of trials with pre-registered primary outcomes which avoided selective outcome reporting. Search of PubMed, the Cochrane Library and trial registries. Registration PROSPERO CRD42016035303. Systematic reviews of randomised trials comparing progestogen with placebo in pregnancy and the individual trials included in those reviews. The subset of trials reporting a pre-registered primary outcome were compared with the totality of trials and reviews. For reviews all outcomes were included. For individual trials all outcomes reported in the systematic reviews were included. For the comparison group we recorded the registered primary outcome from trials that were either registered before they started, or registered during the recruitment phase and also double blind. Nineteen of twenty-nine meta-analyses concluded that progestogens were effective. Twenty-two trials reported their pre-registered primary outcomes. There was no effect of progesterone on primary registered dichotomous outcome RR 1.00 (95% CI 0.94-1.07). Only one of the 22 showed a nominally statistically significant benefit. When evaluated in registered double-blind trials with analysis restricted to predefined primary outcomes, progestational agents in pregnancy are ineffective. Progestogens to prevent pregnancy loss, an example of P-hacking. © 2017 Royal College of Obstetricians and Gynaecologists.

  3. Extracellular RNA Communication (ExRNA)

    Data.gov (United States)

    Federal Laboratory Consortium — Until recently, scientists believed RNA worked mostly inside the cell that produced it. Some types of RNA help translate genes into proteins that are necessary for...

  4. Combinatorics of RNA-RNA interaction

    DEFF Research Database (Denmark)

    Li, Thomas J X; Reidys, Christian

    2012-01-01

    RNA-RNA binding is an important phenomenon observed for many classes of non-coding RNAs and plays a crucial role in a number of regulatory processes. Recently several MFE folding algorithms for predicting the joint structure of two interacting RNA molecules have been proposed. Here joint structure...... means that in a diagram representation the intramolecular bonds of each partner are pseudoknot-free, that the intermolecular binding pairs are noncrossing, and that there is no so-called "zigzag" configuration. This paper presents the combinatorics of RNA interaction structures including...

  5. RNA modifications by oxidation

    DEFF Research Database (Denmark)

    Poulsen, Henrik E; Specht, Elisabeth; Broedbaek, Kasper

    2012-01-01

    to encompass various classes of novel regulatory RNAs, including, e.g., microRNAs. It is well known that DNA is constantly oxidized and repaired by complex genome maintenance mechanisms. Analogously, RNA also undergoes significant oxidation, and there are now convincing data suggesting that oxidation......The past decade has provided exciting insights into a novel class of central (small) RNA molecules intimately involved in gene regulation. Only a small percentage of our DNA is translated into proteins by mRNA, yet 80% or more of the DNA is transcribed into RNA, and this RNA has been found......, and the consequent loss of integrity of RNA, is a mechanism for disease development. Oxidized RNA is found in a large variety of diseases, and interest has been especially devoted to degenerative brain diseases such as Alzheimer disease, in which up to 50-70% of specific mRNA molecules are reported oxidized, whereas...

  6. Working with RNA

    DEFF Research Database (Denmark)

    Nielsen, Henrik

    2011-01-01

    Working with RNA is not a special discipline in molecular biology. However, RNA is chemically and structurally different from DNA and a few simple work rules have to be implemented to maintain the integrity of the RNA. Alkaline pH, high temperatures, and heavy metal ions should be avoided when po...

  7. Methods for RNA Analysis

    DEFF Research Database (Denmark)

    Olivarius, Signe

    of the transcriptome, 5’ end capture of RNA is combined with next-generation sequencing for high-throughput quantitative assessment of transcription start sites by two different methods. The methods presented here allow for functional investigation of coding as well as noncoding RNA and contribute to future...... RNAs rely on interactions with proteins, the establishment of protein-binding profiles is essential for the characterization of RNAs. Aiming to facilitate RNA analysis, this thesis introduces proteomics- as well as transcriptomics-based methods for the functional characterization of RNA. First, RNA...

  8. Cytoplasmic Z-RNA

    International Nuclear Information System (INIS)

    Zarling, D.A.; Calhoun, C.J.; Hardin, C.C.; Zarling, A.H.

    1987-01-01

    Specific immunochemical probes for Z-RNA were generated and characterized to search for possible Z-RNA-like double helices in cells. Z-RNA was detected in the cytoplasm of fixed protozoan cells by immunofluorescence microscopy using these anti-Z-RNA IgCs. In contrast, autoimmune or experimentally elicited anti-DNA antibodies, specifically reactive with B-DNA or Z-DNA, stained the nuclei. Pre-or nonimmune IgGs did not bind to the cells. RNase A or T1 digestion eliminated anti-Z-RNA IgG binding to cytoplasmic determinants; however, DNase I or mung bean nuclease had no effect. Doxorubicin and ethidium bromide prevented anti-Z-RNA antibody binding; however, actinomycin D, which does not bind double-stranded RNA, did not. Anti-Z-RNA immunofluorescence was specifically blocked in competition assays by synthetic Z-RNA but not Z-DNA, A-RNA, or single-stranded RNAs. Thus, some cytoplasmic sequences in fixed cells exist in the left-handed Z-RNA conformation

  9. Transgenic Centipedegrass (Eremochloa ophiuroides [Munro] Hack. Overexpressing S-Adenosylmethionine Decarboxylase (SAMDC Gene for Improved Cold Tolerance Through Involvement of H2O2 and NO Signaling

    Directory of Open Access Journals (Sweden)

    Jianhao Luo

    2017-09-01

    Full Text Available Centipedegrass (Eremochloa ophiuroides [Munro] Hack. is an important warm-season turfgrass species. Transgenic centipedgrass plants overexpressing S-adenosylmethionine decarboxylase from bermudagrass (CdSAMDC1 that was induced in response to cold were generated in this study. Higher levels of CdSAMDC1 transcript and sperimidine (Spd and spermin (Spm concentrations and enhanced freezing and chilling tolerance were observed in transgenic plants as compared with the wild type (WT. Transgenic plants had higher levels of polyamine oxidase (PAO activity and H2O2 than WT, which were blocked by pretreatment with methylglyoxal bis (guanylhydrazone or MGBG, inhibitor of SAMDC, indicating that the increased PAO and H2O2 were a result of expression of CdSAMDC1. In addition, transgenic plants had higher levels of nitrate reductase (NR activity and nitric oxide (NO concentration. The increased NR activity were blocked by pretreatment with MGBG and ascorbic acid (AsA, scavenger of H2O2, while the increased NO level was blocked by MGBG, AsA, and inhibitors of NR, indicating that the enhanced NR-derived NO was dependent upon H2O2, as a result of expression CdSAMDC1. Elevated superoxide dismutase (SOD and catalase (CAT activities were observed in transgenic plants than in WT, which were blocked by pretreatment with MGBG, AsA, inhibitors of NR and scavenger of NO, indicating that the increased activities of SOD and CAT depends on expression of CdSAMDC1, H2O2, and NR-derived NO. Our results suggest that the elevated cold tolerance was associated with PAO catalyzed production of H2O2, which in turn led to NR-derived NO production and induced antioxidant enzyme activities in transgenic plants.

  10. Transgenic Centipedegrass (Eremochloa ophiuroides [Munro] Hack.) Overexpressing S-Adenosylmethionine Decarboxylase (SAMDC) Gene for Improved Cold Tolerance Through Involvement of H2O2 and NO Signaling.

    Science.gov (United States)

    Luo, Jianhao; Liu, Mingxi; Zhang, Chendong; Zhang, Peipei; Chen, Jingjing; Guo, Zhenfei; Lu, Shaoyun

    2017-01-01

    Centipedegrass ( Eremochloa ophiuroides [Munro] Hack.) is an important warm-season turfgrass species. Transgenic centipedgrass plants overexpressing S-adenosylmethionine decarboxylase from bermudagrass ( CdSAMDC1 ) that was induced in response to cold were generated in this study. Higher levels of CdSAMDC1 transcript and sperimidine (Spd) and spermin (Spm) concentrations and enhanced freezing and chilling tolerance were observed in transgenic plants as compared with the wild type (WT). Transgenic plants had higher levels of polyamine oxidase (PAO) activity and H 2 O 2 than WT, which were blocked by pretreatment with methylglyoxal bis (guanylhydrazone) or MGBG, inhibitor of SAMDC, indicating that the increased PAO and H 2 O 2 were a result of expression of CdSAMDC1 . In addition, transgenic plants had higher levels of nitrate reductase (NR) activity and nitric oxide (NO) concentration. The increased NR activity were blocked by pretreatment with MGBG and ascorbic acid (AsA), scavenger of H 2 O 2 , while the increased NO level was blocked by MGBG, AsA, and inhibitors of NR, indicating that the enhanced NR-derived NO was dependent upon H 2 O 2 , as a result of expression CdSAMDC1 . Elevated superoxide dismutase (SOD) and catalase (CAT) activities were observed in transgenic plants than in WT, which were blocked by pretreatment with MGBG, AsA, inhibitors of NR and scavenger of NO, indicating that the increased activities of SOD and CAT depends on expression of CdSAMDC1 , H 2 O 2 , and NR-derived NO. Our results suggest that the elevated cold tolerance was associated with PAO catalyzed production of H 2 O 2 , which in turn led to NR-derived NO production and induced antioxidant enzyme activities in transgenic plants.

  11. Regeneração de espécies arbóreas sob a influência de Merostachys multiramea Hack. (Poaceae em uma floresta subtropical Regeneration of tree species influenced by Merostachys multiramea Hack. (Poaceae in a subtropical forest

    Directory of Open Access Journals (Sweden)

    Suzana Cyrino dos Santos

    2012-03-01

    Full Text Available A ocorrência de bambúseas é comum em muitas fisionomias florestais, sendo que a elevada abundância destas espécies pode interagir com a regeneração de espécies arbóreas. Foi avaliada a regeneração de espécies arbóreas e de Merostachys multiramea Hack. em uma área de transição entre Floresta Ombrófila Mista e Floresta Estacional no Sul do Brasil e comparada a estrutura de regeneração da área entre dois e quatro anos após floração, frutificação e morte de M. multiramea. Foram alocadas 25 unidades amostrais de 100 m² dispostas de forma aleatória, onde foram amostrados todos os colmos vivos de M. multiramea e indivíduos regenerantes de espécies arbóreas > 30 cm de altura e com perímetro à altura do peito The occurrence of bamboo species is common in several forest physiognomies, and the high abundance of these species may affect the regeneration of other ones. We evaluated both tree species and Merostachys multiramea Hack. recruitment in a transition area between mixed Araucaria rain forest and seasonal semideciduous forests in southern Brazil. We compared the regeneration structure of the areas evaluated two and four years after flowering, fruiting and death of M. multiramea. We randomly distributed 25 100 m² sampling units, and surveyed all living culms of M. multiramea and tree saplings. We sampled 4,372 living bamboos and 2,918 tree saplings, belonging to 32 plant families and 75 species. Most species were classified as zoochorous and canopy light-demanding. On the other hand, plant abundance revealed a greater contribution of autochorous, understory and shade-tolerant trees. M. multiramea density was higher over the four years after the reproductive event (p<0.05, with taller culms (p<0.01, but with the same mean number of culms (p=0.46. A NPMANOVA revealed significant differences in composition and abundance between surveys, with higher similarity among samplings two years after the reproductive event of M

  12. RNA decay by messenger RNA interferases

    DEFF Research Database (Denmark)

    Christensen-Dalsgaard, Mikkel; Overgaard, Martin; Winther, Kristoffer Skovbo

    2008-01-01

    Two abundant toxin-antitoxin (TA) gene families, relBE and mazEF, encode mRNA cleaving enzymes whose ectopic overexpression abruptly inhibits translation and thereby induces a bacteriostatic condition. Here we describe and discuss protocols for the overproduction, purification, and analysis of mR...... cleaving enzymes such as RelE of Escherichia coli and the corresponding antitoxin RelB. In particular, we describe a set of plasmid vectors useful for the detailed analysis of cleavage sites in model mRNAs.......Two abundant toxin-antitoxin (TA) gene families, relBE and mazEF, encode mRNA cleaving enzymes whose ectopic overexpression abruptly inhibits translation and thereby induces a bacteriostatic condition. Here we describe and discuss protocols for the overproduction, purification, and analysis of mRNA...

  13. Topology of RNA-RNA interaction structures

    DEFF Research Database (Denmark)

    Andersen, Jørgen Ellegaard; Huang, Fenix Wenda; Penner, Robert

    2012-01-01

    Abstract The topological filtration of interacting RNA complexes is studied, and the role is analyzed of certain diagrams called irreducible shadows, which form suitable building blocks for more general structures. We prove that, for two interacting RNAs, called interaction structures, there exist...

  14. RNA Localization in Astrocytes

    DEFF Research Database (Denmark)

    Thomsen, Rune

    2012-01-01

    , regulation of the blood brain barrier and glial scar tissue formation. Despite the involvement in various CNS functions only a limited number of studies have addressed mRNA localization in astrocytes. This PhD project was initially focused on developing and implementing methods that could be used to asses mRNA......Messenger RNA (mRNA) localization is a mechanism by which polarized cells can regulate protein synthesis to specific subcellular compartments in a spatial and temporal manner, and plays a pivotal role in multiple physiological processes from embryonic development to cell differentiation...... localization in astrocyte protrusions, and following look into the subcellular localization pattern of specific mRNA species of both primary astrocytes isolated from cortical hemispheres of newborn mice, and the mouse astrocyte cell line, C8S. The Boyden chamber cell fractionation assay was optimized, in a way...

  15. Hacking the thylakoid proton motive force for improved photosynthesis: modulating ion flux rates that control proton motive force partitioning into Δψ and ΔpH.

    Science.gov (United States)

    Davis, Geoffry A; Rutherford, A William; Kramer, David M

    2017-09-26

    There is considerable interest in improving plant productivity by altering the dynamic responses of photosynthesis in tune with natural conditions. This is exemplified by the 'energy-dependent' form of non-photochemical quenching ( q E ), the formation and decay of which can be considerably slower than natural light fluctuations, limiting photochemical yield. In addition, we recently reported that rapidly fluctuating light can produce field recombination-induced photodamage (FRIP), where large spikes in electric field across the thylakoid membrane (Δ ψ ) induce photosystem II recombination reactions that produce damaging singlet oxygen ( 1 O 2 ). Both q E and FRIP are directly linked to the thylakoid proton motive force ( pmf ), and in particular, the slow kinetics of partitioning pmf into its ΔpH and Δ ψ components. Using a series of computational simulations, we explored the possibility of 'hacking' pmf partitioning as a target for improving photosynthesis. Under a range of illumination conditions, increasing the rate of counter-ion fluxes across the thylakoid membrane should lead to more rapid dissipation of Δ ψ and formation of ΔpH. This would result in increased rates for the formation and decay of q E while resulting in a more rapid decline in the amplitudes of Δ ψ -spikes and decreasing 1 O 2 production. These results suggest that ion fluxes may be a viable target for plant breeding or engineering. However, these changes also induce transient, but substantial mismatches in the ATP : NADPH output ratio as well as in the osmotic balance between the lumen and stroma, either of which may explain why evolution has not already accelerated thylakoid ion fluxes. Overall, though the model is simplified, it recapitulates many of the responses seen in vivo , while spotlighting critical aspects of the complex interactions between pmf components and photosynthetic processes. By making the programme available, we hope to enable the community of photosynthesis

  16. Assembling RNA Nanoparticles.

    Science.gov (United States)

    Xiao, Shou-Jun

    2017-01-01

    RNA nanoparticles are designed and self-assembled according to noncanonical interactions of naturally conserved RNA motifs and/or canonical Watson-Crick base-pairing interactions, which have potential applications in gene therapy and nanomedicine. These artificially engineered nanoparticles are mainly synthesized from in vitro transcribed RNAs, purified by denaturing and native polyacrylamide gel electrophoresis (PAGE), and characterized with native PAGE, AFM, and TEM technologies. The protocols of in vitro transcription, denaturing and native PAGE, and RNA nanoparticle self-assembly are described in detail.

  17. Plant RNA binding proteins for control of RNA virus infection

    Directory of Open Access Journals (Sweden)

    Sung Un eHuh

    2013-12-01

    Full Text Available Plant RNA viruses have effective strategies to infect host plants through either direct or indirect interactions with various host proteins, thus suppressing the host immune system. When plant RNA viruses enter host cells exposed RNAs of viruses are recognized by the host immune system through processes such as siRNA-dependent silencing. Interestingly, some host RNA binding proteins have been involved in the inhibition of RNA virus replication, movement, and translation through RNA-specific binding. Host plants intensively use RNA binding proteins for defense against viral infections in nature. In this mini review, we will summarize the function of some host RNA binding proteins which act in a sequence-specific binding manner to the infecting virus RNA. It is important to understand how plants effectively suppresses RNA virus infections via RNA binding proteins, and this defense system can be potentially developed as a synthetic virus defense strategy for use in crop engineering.

  18. Shapes of interacting RNA complexes

    DEFF Research Database (Denmark)

    Fu, Benjamin Mingming; Reidys, Christian

    2014-01-01

    Shapes of interacting RNA complexes are studied using a filtration via their topological genus. A shape of an RNA complex is obtained by (iteratively) collapsing stacks and eliminating hairpin loops.This shape-projection preserves the topological core of the RNA complex and for fixed topological...... genus there are only finitely many such shapes. Our main result is a new bijection that relates the shapes of RNA complexes with shapes of RNA structures. This allows to compute the shape polynomial of RNA complexes via the shape polynomial of RNA structures. We furthermore present a linear time uniform...... sampling algorithm for shapes of RNA complexes of fixed topological genus....

  19. Remote Network Access (RNA)

    National Research Council Canada - National Science Library

    2002-01-01

    .... Remote Network Access (RNA) includes or is associated with all communication devices/software, firewalls, intrusion detection systems and virus protection applications to ensure security of the OIG, DoD, Network from remote...

  20. RNA/PNA Approach

    Indian Academy of Sciences (India)

    In this approach we want to develop structural analogue of the leader that might have higher affinity towards the Phosphoprotein, but would impair the dimerization process and viral leader RNA binding.

  1. Switching off small RNA regulation with trap-mRNA

    DEFF Research Database (Denmark)

    Overgaard, Martin; Johansen, Jesper; Møller-Jensen, Jakob

    2009-01-01

    to operate at the level of transcription initiation. By employing a highly sensitive genetic screen we uncovered a novel RNA-based regulatory principle in which induction of a trap-mRNA leads to selective degradation of a small regulatory RNA molecule, thereby abolishing the sRNA-based silencing of its...

  2. Bluetooth Hacking: A Case Study

    Directory of Open Access Journals (Sweden)

    Dennis Browning

    2009-06-01

    Full Text Available This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

  3. Hacking Our Brains for Learning

    Directory of Open Access Journals (Sweden)

    Alex Tillas

    2018-05-01

    Full Text Available Observational learning is ubiquitous. We very often observe and pick up information about how others behave and subsequently replicate similar behaviours in one way or another. Focusing on observational learning, I investigate human imitation, the mechanisms that underpin it as well as the processes that complement it, in order to assess its contribution to learning and education. Furthermore, I construe emotion as a scaffold for observational learning and bring together evidence about its influence on selective attention. Finally, I flesh out possible ways in which the insights about the role of imitation in learning could help design a more effective and equally rewarding learning environment. Specifically, I suggest that perhaps the simplest and most effective way to foster learning via promoting imitation is through letting learners of various ages co-exist. The benefits of learning in a mixed-age group are assessed.

  4. Growth Hacking, Dünyayı İşgal Eden Büyüklere Karşı Bir Kurtuluş Savaşı Olabilir mi?

    OpenAIRE

    FETTAHLIOĞLU, H. Seçil; AKDEMİR, Mehmet Alper

    2016-01-01

    Bilgi ekonomisinin etkisinin hissedildiği günümüz ortamında, internetin pazarlama üzerindeki rolü hızla artmaktadır. Dijital pazarlama, içerik pazarlaması, online pazarlama gibi bir çok başlık altında toplanabilecek olan; bilgi teknolojileri vasıtasıyla pazarlama faaliyetlerini ifade eden kavramlar “Growth Hacking (Büyüme Korsanlığı)” ile birlikte anılmaktadır. Büyüme korsanlığı, genellikle online girişimlerin, hızlı bir şekilde dijital pazarlama ve yazılım araçları vasıtasıyla büyütülmesi iç...

  5. A ribosome without RNA

    Directory of Open Access Journals (Sweden)

    Harold S Bernhardt

    2015-11-01

    Full Text Available It was Francis Crick who first asked why the ribosome contains so much RNA, and discussed the implications of this for the direct flow of genetic information from DNA to protein. Remarkable advances in our understanding of the ribosome and protein synthesis, including the recent publication of two mammalian mitochondrial ribosome structures, have shed new light on this intriguing aspect of evolution in molecular biology. We examine here whether RNA is indispensable for coded protein synthesis, or whether an all-protein ‘ribosome’ (or ‘synthosome’ might be possible, with a protein enzyme catalyzing peptide synthesis, and release factor-like protein adaptors able to read a message composed of deoxyribonucleotides. We also compare the RNA world hypothesis with the alternative ‘proteins first’ hypothesis in terms of their different understandings of the evolution of the ribosome, and whether this might have been preceded by an ancestral form of nonribosomal peptide synthesis catalyzed by protein enzymes.

  6. Pyrite footprinting of RNA

    International Nuclear Information System (INIS)

    Schlatterer, Jörg C.; Wieder, Matthew S.; Jones, Christopher D.; Pollack, Lois; Brenowitz, Michael

    2012-01-01

    Highlights: ► RNA structure is mapped by pyrite mediated · OH footprinting. ► Repetitive experiments can be done in a powdered pyrite filled cartridge. ► High · OH reactivity of nucleotides imply dynamic role in Diels–Alderase catalysis. -- Abstract: In RNA, function follows form. Mapping the surface of RNA molecules with chemical and enzymatic probes has revealed invaluable information about structure and folding. Hydroxyl radicals ( · OH) map the surface of nucleic acids by cutting the backbone where it is accessible to solvent. Recent studies showed that a microfluidic chip containing pyrite (FeS 2 ) can produce sufficient · OH to footprint DNA. The 49-nt Diels–Alder RNA enzyme catalyzes the C–C bond formation between a diene and a dienophile. A crystal structure, molecular dynamics simulation and atomic mutagenesis studies suggest that nucleotides of an asymmetric bulge participate in the dynamic architecture of the ribozyme’s active center. Of note is that residue U42 directly interacts with the product in the crystallized RNA/product complex. Here, we use powdered pyrite held in a commercially available cartridge to footprint the Diels–Alderase ribozyme with single nucleotide resolution. Residues C39 to U42 are more reactive to · OH than predicted by the solvent accessibility calculated from the crystal structure suggesting that this loop is dynamic in solution. The loop’s flexibility may contribute to substrate recruitment and product release. Our implementation of pyrite-mediated · OH footprinting is a readily accessible approach to gleaning information about the architecture of small RNA molecules.

  7. RNA Regulation of Estrogen

    Science.gov (United States)

    2010-08-01

    Berglund, Rodger Voelker, Paul Barber and Julien Diegel 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING...estrogen  receptors  [reviewed  in  (3,  4)],  also   functions   by  interacting  directly  with  RNA  to  alter  RNA...Mog myelin oligodendrocyte glycoprotein 6.06 207115_x_at mbtd1 mbt domain containing 1 6.06 208004_at Prol1 proline rich, lacrimal 1 6.06 205247_at

  8. RNA Regulation by Estrogen

    Science.gov (United States)

    2011-08-01

    Julien Diegel, Amy Mahady, and Micah Bodner 5e. TASK NUMBER E-Mail: aberglund@molbio.uoregon.edu 5f. WORK UNIT NUMBER 7. PERFORMING...4)],  also   functions   by  interacting  directly  with  RNA  to  alter  RNA  processing  events  such  as  splicing...1 6.06 208004_at Prol1 proline rich, lacrimal 1 6.06 205247_at NOTCH4 Notch homolog 4 (Drosophila) 6.06 211203_s_at Cntn1 contactin 1 6.06 220689_at

  9. Sensing of RNA viruses

    DEFF Research Database (Denmark)

    Jensen, Søren; Thomsen, Allan Randrup

    2012-01-01

    pathogen-associated molecular patterns have emerged in great detail. This review presents an overview of our current knowledge regarding the receptors used to detect RNA virus invasion, the molecular structures these receptors sense, and the involved downstream signaling pathways.......Our knowledge regarding the contribution of the innate immune system in recognizing and subsequently initiating a host response to an invasion of RNA virus has been rapidly growing over the last decade. Descriptions of the receptors involved and the molecular mechanisms they employ to sense viral...

  10. RNA STRAND: The RNA Secondary Structure and Statistical Analysis Database

    Directory of Open Access Journals (Sweden)

    Andronescu Mirela

    2008-08-01

    Full Text Available Abstract Background The ability to access, search and analyse secondary structures of a large set of known RNA molecules is very important for deriving improved RNA energy models, for evaluating computational predictions of RNA secondary structures and for a better understanding of RNA folding. Currently there is no database that can easily provide these capabilities for almost all RNA molecules with known secondary structures. Results In this paper we describe RNA STRAND – the RNA secondary STRucture and statistical ANalysis Database, a curated database containing known secondary structures of any type and organism. Our new database provides a wide collection of known RNA secondary structures drawn from public databases, searchable and downloadable in a common format. Comprehensive statistical information on the secondary structures in our database is provided using the RNA Secondary Structure Analyser, a new tool we have developed to analyse RNA secondary structures. The information thus obtained is valuable for understanding to which extent and with which probability certain structural motifs can appear. We outline several ways in which the data provided in RNA STRAND can facilitate research on RNA structure, including the improvement of RNA energy models and evaluation of secondary structure prediction programs. In order to keep up-to-date with new RNA secondary structure experiments, we offer the necessary tools to add solved RNA secondary structures to our database and invite researchers to contribute to RNA STRAND. Conclusion RNA STRAND is a carefully assembled database of trusted RNA secondary structures, with easy on-line tools for searching, analyzing and downloading user selected entries, and is publicly available at http://www.rnasoft.ca/strand.

  11. Studying RNA-protein interactions in vivo by RNA immunoprecipitation

    DEFF Research Database (Denmark)

    Selth, Luke A; Close, Pierre; Svejstrup, Jesper Q

    2011-01-01

    and have significant effects on gene expression. RNA immunoprecipitation (RIP) is a powerful technique used to detect direct and indirect interactions between individual proteins and specific RNA molecules in vivo. Here, we describe RIP methods for both yeast and mammalian cells.......The crucial roles played by RNA-binding proteins in all aspects of RNA metabolism, particularly in the regulation of transcription, have become increasingly evident. Moreover, other factors that do not directly interact with RNA molecules can nevertheless function proximally to RNA polymerases...

  12. Branched RNA: A New Architecture for RNA Interference

    Directory of Open Access Journals (Sweden)

    Anna Aviñó

    2011-01-01

    Full Text Available Branched RNAs with two and four strands were synthesized. These structures were used to obtain branched siRNA. The branched siRNA duplexes had similar inhibitory capacity as those of unmodified siRNA duplexes, as deduced from gene silencing experiments of the TNF-α protein. Branched RNAs are considered novel structures for siRNA technology, and they provide an innovative tool for specific gene inhibition. As the method described here is compatible with most RNA modifications described to date, these compounds may be further functionalized to obtain more potent siRNA derivatives and can be attached to suitable delivery systems.

  13. The RNA gene information: retroelement-microRNA entangling as the RNA quantum code.

    Science.gov (United States)

    Fujii, Yoichi Robertus

    2013-01-01

    MicroRNA (miRNA) and retroelements may be a master of regulator in our life, which are evolutionally involved in the origin of species. To support the Darwinism from the aspect of molecular evolution process, it has tremendously been interested in the molecular information of naive RNA. The RNA wave model 2000 consists of four concepts that have altered from original idea of the miRNA genes for crosstalk among embryonic stem cells, their niche cells, and retroelements as a carrier vesicle of the RNA genes. (1) the miRNA gene as a mobile genetic element induces transcriptional and posttranscriptional silencing via networking-processes (no hierarchical architecture); (2) the RNA information supplied by the miRNA genes expands to intracellular, intercellular, intraorgan, interorgan, intraspecies, and interspecies under the cycle of life into the global environment; (3) the mobile miRNAs can self-proliferate; and (4) cells contain two types information as resident and genomic miRNAs. Based on RNA wave, we have developed an interest in investigation of the transformation from RNA information to quantum bits as physicochemical characters of RNA with the measurement of RNA electron spin. When it would have been given that the fundamental bases for the acquired characters in genetics can be controlled by RNA gene information, it may be available to apply for challenging against RNA gene diseases, such as stress-induced diseases.

  14. Plant RNA Regulatory Network and RNA Granules in Virus Infection

    Directory of Open Access Journals (Sweden)

    Kristiina Mäkinen

    2017-12-01

    Full Text Available Regulation of post-transcriptional gene expression on mRNA level in eukaryotic cells includes translocation, translation, translational repression, storage, mRNA decay, RNA silencing, and nonsense-mediated decay. These processes are associated with various RNA-binding proteins and cytoplasmic ribonucleoprotein complexes many of which are conserved across eukaryotes. Microscopically visible aggregations formed by ribonucleoprotein complexes are termed RNA granules. Stress granules where the translationally inactive mRNAs are stored and processing bodies where mRNA decay may occur present the most studied RNA granule types. Diverse RNP-granules are increasingly being assigned important roles in viral infections. Although the majority of the molecular level studies on the role of RNA granules in viral translation and replication have been conducted in mammalian systems, some studies link also plant virus infection to RNA granules. An increasing body of evidence indicates that plant viruses require components of stress granules and processing bodies for their replication and translation, but how extensively the cellular mRNA regulatory network is utilized by plant viruses has remained largely enigmatic. Antiviral RNA silencing, which is an important regulator of viral RNA stability and expression in plants, is commonly counteracted by viral suppressors of RNA silencing. Some of the RNA silencing suppressors localize to cellular RNA granules and have been proposed to carry out their suppression functions there. Moreover, plant nucleotide-binding leucine-rich repeat protein-mediated virus resistance has been linked to enhanced processing body formation and translational repression of viral RNA. Many interesting questions relate to how the pathways of antiviral RNA silencing leading to viral RNA degradation and/or repression of translation, suppression of RNA silencing and viral RNA translation converge in plants and how different RNA granules and

  15. Plant RNA Regulatory Network and RNA Granules in Virus Infection.

    Science.gov (United States)

    Mäkinen, Kristiina; Lõhmus, Andres; Pollari, Maija

    2017-01-01

    Regulation of post-transcriptional gene expression on mRNA level in eukaryotic cells includes translocation, translation, translational repression, storage, mRNA decay, RNA silencing, and nonsense-mediated decay. These processes are associated with various RNA-binding proteins and cytoplasmic ribonucleoprotein complexes many of which are conserved across eukaryotes. Microscopically visible aggregations formed by ribonucleoprotein complexes are termed RNA granules. Stress granules where the translationally inactive mRNAs are stored and processing bodies where mRNA decay may occur present the most studied RNA granule types. Diverse RNP-granules are increasingly being assigned important roles in viral infections. Although the majority of the molecular level studies on the role of RNA granules in viral translation and replication have been conducted in mammalian systems, some studies link also plant virus infection to RNA granules. An increasing body of evidence indicates that plant viruses require components of stress granules and processing bodies for their replication and translation, but how extensively the cellular mRNA regulatory network is utilized by plant viruses has remained largely enigmatic. Antiviral RNA silencing, which is an important regulator of viral RNA stability and expression in plants, is commonly counteracted by viral suppressors of RNA silencing. Some of the RNA silencing suppressors localize to cellular RNA granules and have been proposed to carry out their suppression functions there. Moreover, plant nucleotide-binding leucine-rich repeat protein-mediated virus resistance has been linked to enhanced processing body formation and translational repression of viral RNA. Many interesting questions relate to how the pathways of antiviral RNA silencing leading to viral RNA degradation and/or repression of translation, suppression of RNA silencing and viral RNA translation converge in plants and how different RNA granules and their individual

  16. RNA-Catalyzed Polymerization and Replication of RNA

    Science.gov (United States)

    Horning, D. P.; Samantha, B.; Tjhung, K. F.; Joyce, G. F.

    2017-07-01

    In an effort to reconstruct RNA-based life, in vitro evolution was used to obtain an RNA polymerase ribozyme that can synthesize a variety of complex functional RNAs and can catalyze the exponential amplification of short RNAs.

  17. Natural RNA circles function as efficient microRNA sponges

    DEFF Research Database (Denmark)

    Hansen, Thomas Birkballe; Jensen, Trine I; Clausen, Bettina Hjelm

    2013-01-01

    MicroRNAs (miRNAs) are important post-transcriptional regulators of gene expression that act by direct base pairing to target sites within untranslated regions of messenger RNAs. Recently, miRNA activity has been shown to be affected by the presence of miRNA sponge transcripts, the so-called comp......MicroRNAs (miRNAs) are important post-transcriptional regulators of gene expression that act by direct base pairing to target sites within untranslated regions of messenger RNAs. Recently, miRNA activity has been shown to be affected by the presence of miRNA sponge transcripts, the so......-called competing endogenous RNA in humans and target mimicry in plants. We previously identified a highly expressed circular RNA (circRNA) in human and mouse brain. Here we show that this circRNA acts as a miR-7 sponge; we term this circular transcript ciRS-7 (circular RNA sponge for miR-7). ciRS-7 contains more...... sponge, suggesting that miRNA sponge effects achieved by circRNA formation are a general phenomenon. This study serves as the first, to our knowledge, functional analysis of a naturally expressed circRNA....

  18. Strategies underlying RNA silencing suppression by negative strand RNA viruses

    NARCIS (Netherlands)

    Hemmes, J.C.

    2007-01-01

    The research described in this thesis focused on the strategies of negative strand RNA viruses to counteract antiviral RNA silencing. In plants and insects, RNA silencing has been shown to act as a sequence specific antiviral defence mechanism that is characterised by the processing of double

  19. RNA Interference - Towards RNA becoming a Medicine -42 ...

    Indian Academy of Sciences (India)

    research. A brief history of the development ofRNAi is shown in. Box 2. Mechanism of ... new RNA strand using target RNA as the template and thereby converting it ... thought to excise precursor stRNA from their -70 nt stem loop precursor to ...

  20. Semiautomated improvement of RNA alignments

    DEFF Research Database (Denmark)

    Andersen, Ebbe Sloth; Lind-Thomsen, Allan; Knudsen, Bjarne

    2007-01-01

    connects to external tools to provide a flexible semiautomatic editing environment. A new method, Pcluster, is introduced for dividing the sequences of an RNA alignment into subgroups with secondary structure differences. Pcluster was used to evaluate 574 seed alignments obtained from the Rfam database...... and we identified 71 alignments with significant prediction of inconsistent base pairs and 102 alignments with significant prediction of novel base pairs. Four RNA families were used to illustrate how SARSE can be used to manually or automatically correct the inconsistent base pairs detected by Pcluster......: the mir-399 RNA, vertebrate telomase RNA (vert-TR), bacterial transfer-messenger RNA (tmRNA), and the signal recognition particle (SRP) RNA. The general use of the method is illustrated by the ability to accommodate pseudoknots and handle even large and divergent RNA families. The open architecture...

  1. Comparative RNA genomics

    DEFF Research Database (Denmark)

    Backofen, Rolf; Gorodkin, Jan; Hofacker, Ivo L.

    2018-01-01

    Over the last two decades it has become clear that RNA is much more than just a boring intermediate in protein expression. Ancient RNAs still appear in the core information metabolism and comprise a surprisingly large component in bacterial gene regulation. A common theme with these types of mostly...... small RNAs is their reliance of conserved secondary structures. Large scale sequencing projects, on the other hand, have profoundly changed our understanding of eukaryotic genomes. Pervasively transcribed, they give rise to a plethora of large and evolutionarily extremely flexible noncoding RNAs...... that exert a vastly diverse array of molecule functions. In this chapter we provide a—necessarily incomplete—overview of the current state of comparative analysis of noncoding RNAs, emphasizing computational approaches as a means to gain a global picture of the modern RNA world....

  2. MicroRNA from tuberculosis RNA: A bioinformatics study

    OpenAIRE

    Wiwanitkit, Somsri; Wiwanitkit, Viroj

    2012-01-01

    The role of microRNA in the pathogenesis of pulmonary tuberculosis is the interesting topic in chest medicine at present. Recently, it was proposed that the microRNA can be a useful biomarker for monitoring of pulmonary tuberculosis and might be the important part in pathogenesis of disease. Here, the authors perform a bioinformatics study to assess the microRNA within known tuberculosis RNA. The microRNA part can be detected and this can be important key information in further study of the p...

  3. RNA binding and replication by the poliovirus RNA polymerase

    International Nuclear Information System (INIS)

    Oberste, M.S.

    1988-01-01

    RNA binding and RNA synthesis by the poliovirus RNA-dependent RNA polymerase were studied in vitro using purified polymerase. Templates for binding and RNA synthesis studies were natural RNAs, homopolymeric RNAs, or subgenomic poliovirus-specific RNAs synthesized in vitro from cDNA clones using SP6 or T7 RNA polymerases. The binding of the purified polymerase to poliovirion and other RNAs was studied using a protein-RNA nitrocellulose filter binding assay. A cellular poly(A)-binding protein was found in the viral polymerase preparations, but was easily separated from the polymerase by chromatography on poly(A) Sepharose. The binding of purified polymerase to 32 P-labeled ribohomopolymeric RNAs was examined, and the order of binding observed was poly(G) >>> poly(U) > poly(C) > poly(A). The K a for polymerase binding to poliovirion RNA and to a full-length negative strand transcript was about 1 x 10 9 M -1 . The polymerase binds to a subgenomic RNAs which contain the 3' end of the genome with a K a similar to that for virion RNA, but binds less well to 18S rRNA, globin mRNA, and subgenomic RNAs which lack portions of the 3' noncoding region

  4. Genetic relatedness of orbiviruses by RNA-RNA blot hybridization

    International Nuclear Information System (INIS)

    Bodkin, D.K.

    1985-01-01

    RNA-RNA blot hybridization was developed in order to identify type-specific genes among double-stranded (ds) RNA viruses, to assess the genetic relatedness of dsRNA viruses and to classify new strains. Viral dsRNA segments were electrophoresed through 10% polyacrylamide gels, transferred to membranes, and hybridized to [5' 32 P]-pCp labeled genomic RNA from a related strain. Hybridization was performed at 52 0 C, 50% formamide, 5X SSC. Under these conditions heterologous RNA species must share ≥ 74% sequence homology in order to form stable dsRNA hybrids. Cognate genes of nine members of the Palyam serogroup of orbiviruses were identified and their sequence relatedness to the prototype. Palyam virus, was determined. Reciprocal blot hybridizations were performed using radiolabeled genomic RNA of all members of the Palyam serogroup. Unique and variant genes were identified by lack of cross-homology or by weak homology between segments. Since genes 2 and 6 exhibited the highest degree of sequence variability, response to the vertebrate immune system may be a major cause of sequence divergence among members of a single serogroup. Changuinola serogroup isolates were compared by dot-blot hybridization, while Colorado tick fever (CTF) serogroup isolates were compared by the RNA-RNA blot hybridization procedure described for reovirus and Palyam serogroup isolates. Preliminary blot hybridization data were also obtained on the relatedness of members of different Orbivirus serogroups

  5. RNA-SSPT: RNA Secondary Structure Prediction Tools.

    Science.gov (United States)

    Ahmad, Freed; Mahboob, Shahid; Gulzar, Tahsin; Din, Salah U; Hanif, Tanzeela; Ahmad, Hifza; Afzal, Muhammad

    2013-01-01

    The prediction of RNA structure is useful for understanding evolution for both in silico and in vitro studies. Physical methods like NMR studies to predict RNA secondary structure are expensive and difficult. Computational RNA secondary structure prediction is easier. Comparative sequence analysis provides the best solution. But secondary structure prediction of a single RNA sequence is challenging. RNA-SSPT is a tool that computationally predicts secondary structure of a single RNA sequence. Most of the RNA secondary structure prediction tools do not allow pseudoknots in the structure or are unable to locate them. Nussinov dynamic programming algorithm has been implemented in RNA-SSPT. The current studies shows only energetically most favorable secondary structure is required and the algorithm modification is also available that produces base pairs to lower the total free energy of the secondary structure. For visualization of RNA secondary structure, NAVIEW in C language is used and modified in C# for tool requirement. RNA-SSPT is built in C# using Dot Net 2.0 in Microsoft Visual Studio 2005 Professional edition. The accuracy of RNA-SSPT is tested in terms of Sensitivity and Positive Predicted Value. It is a tool which serves both secondary structure prediction and secondary structure visualization purposes.

  6. RNA meets disease in paradise.

    Science.gov (United States)

    Winter, Julia; Roth, Anna; Diederichs, Sven

    2011-01-01

    Getting off the train in Jena-Paradies, 60 participants joined for the 12 (th) Young Scientist Meeting of the German Society for Cell Biology (DGZ) entitled "RNA & Disease". Excellent speakers from around the world, graduate students, postdocs and young group leaders enjoyed a meeting in a familiar atmosphere to exchange inspiring new data and vibrant scientific discussions about the fascinating history and exciting future of non-coding RNA research including microRNA, piRNA and long non-coding RNA as well as their function in cancer, diabetes and neurodegenerative diseases.

  7. From "Cellular" RNA to "Smart" RNA: Multiple Roles of RNA in Genome Stability and Beyond.

    Science.gov (United States)

    Michelini, Flavia; Jalihal, Ameya P; Francia, Sofia; Meers, Chance; Neeb, Zachary T; Rossiello, Francesca; Gioia, Ubaldo; Aguado, Julio; Jones-Weinert, Corey; Luke, Brian; Biamonti, Giuseppe; Nowacki, Mariusz; Storici, Francesca; Carninci, Piero; Walter, Nils G; Fagagna, Fabrizio d'Adda di

    2018-03-30

    Coding for proteins has been considered the main function of RNA since the "central dogma" of biology was proposed. The discovery of noncoding transcripts shed light on additional roles of RNA, ranging from the support of polypeptide synthesis, to the assembly of subnuclear structures, to gene expression modulation. Cellular RNA has therefore been recognized as a central player in often unanticipated biological processes, including genomic stability. This ever-expanding list of functions inspired us to think of RNA as a "smart" phone, which has replaced the older obsolete "cellular" phone. In this review, we summarize the last two decades of advances in research on the interface between RNA biology and genome stability. We start with an account of the emergence of noncoding RNA, and then we discuss the involvement of RNA in DNA damage signaling and repair, telomere maintenance, and genomic rearrangements. We continue with the depiction of single-molecule RNA detection techniques, and we conclude by illustrating the possibilities of RNA modulation in hopes of creating or improving new therapies. The widespread biological functions of RNA have made this molecule a reoccurring theme in basic and translational research, warranting it the transcendence from classically studied "cellular" RNA to "smart" RNA.

  8. Transfer RNA and human disease

    Directory of Open Access Journals (Sweden)

    Jamie A Abbott

    2014-06-01

    Full Text Available Pathological mutations in tRNA genes and tRNA processing enzymes are numerous and result in very complicated clinical phenotypes. Mitochondrial tRNA (mt-tRNA genes are hotspots for pathological mutations and over 200 mt-tRNA mutations have been linked to various disease states. Often these mutations prevent tRNA aminoacylation. Disrupting this primary function affects protein synthesis and the expression, folding, and function of oxidative phosphorylation enzymes. Mitochondrial tRNA mutations manifest in a wide panoply of diseases related to cellular energetics, including COX deficiency (cytochrome C oxidase, mitochondrial myopathy, MERRF (Myoclonic Epilepsy with Ragged Red Fibers, and MELAS (mitochondrial encephalomyopathy, lactic acidosis, and stroke-like episodes. Diseases caused by mt-tRNA mutations can also affect very specific tissue types, as in the case of neurosensory non-syndromic hearing loss and pigmentary retinopathy, diabetes mellitus, and hypertrophic cardiomyopathy. Importantly, mitochondrial heteroplasmy plays a role in disease severity and age of onset as well. Not surprisingly, mutations in enzymes that modify cytoplasmic and mitochondrial tRNAs are also linked to a diverse range of clinical phenotypes. In addition to compromised aminoacylation of the tRNAs, mutated modifying enzymes can also impact tRNA expression and abundance, tRNA modifications, tRNA folding, and even tRNA maturation (e.g., splicing. Some of these pathological mutations in tRNAs and processing enzymes are likely to affect non-canonical tRNA functions, and contribute to the diseases without significantly impacting on translation. This chapter will review recent literature on the relation of mitochondrial and cytoplasmic tRNA, and enzymes that process tRNAs, to human disease. We explore the mechanisms involved in the clinical presentation of these various diseases with an emphasis on neurological disease.

  9. Transfer RNA and human disease.

    Science.gov (United States)

    Abbott, Jamie A; Francklyn, Christopher S; Robey-Bond, Susan M

    2014-01-01

    Pathological mutations in tRNA genes and tRNA processing enzymes are numerous and result in very complicated clinical phenotypes. Mitochondrial tRNA (mt-tRNA) genes are "hotspots" for pathological mutations and over 200 mt-tRNA mutations have been linked to various disease states. Often these mutations prevent tRNA aminoacylation. Disrupting this primary function affects protein synthesis and the expression, folding, and function of oxidative phosphorylation enzymes. Mitochondrial tRNA mutations manifest in a wide panoply of diseases related to cellular energetics, including COX deficiency (cytochrome C oxidase), mitochondrial myopathy, MERRF (Myoclonic Epilepsy with Ragged Red Fibers), and MELAS (mitochondrial encephalomyopathy, lactic acidosis, and stroke-like episodes). Diseases caused by mt-tRNA mutations can also affect very specific tissue types, as in the case of neurosensory non-syndromic hearing loss and pigmentary retinopathy, diabetes mellitus, and hypertrophic cardiomyopathy. Importantly, mitochondrial heteroplasmy plays a role in disease severity and age of onset as well. Not surprisingly, mutations in enzymes that modify cytoplasmic and mitochondrial tRNAs are also linked to a diverse range of clinical phenotypes. In addition to compromised aminoacylation of the tRNAs, mutated modifying enzymes can also impact tRNA expression and abundance, tRNA modifications, tRNA folding, and even tRNA maturation (e.g., splicing). Some of these pathological mutations in tRNAs and processing enzymes are likely to affect non-canonical tRNA functions, and contribute to the diseases without significantly impacting on translation. This chapter will review recent literature on the relation of mitochondrial and cytoplasmic tRNA, and enzymes that process tRNAs, to human disease. We explore the mechanisms involved in the clinical presentation of these various diseases with an emphasis on neurological disease.

  10. RNA Thermodynamic Structural Entropy.

    Science.gov (United States)

    Garcia-Martin, Juan Antonio; Clote, Peter

    2015-01-01

    Conformational entropy for atomic-level, three dimensional biomolecules is known experimentally to play an important role in protein-ligand discrimination, yet reliable computation of entropy remains a difficult problem. Here we describe the first two accurate and efficient algorithms to compute the conformational entropy for RNA secondary structures, with respect to the Turner energy model, where free energy parameters are determined from UV absorption experiments. An algorithm to compute the derivational entropy for RNA secondary structures had previously been introduced, using stochastic context free grammars (SCFGs). However, the numerical value of derivational entropy depends heavily on the chosen context free grammar and on the training set used to estimate rule probabilities. Using data from the Rfam database, we determine that both of our thermodynamic methods, which agree in numerical value, are substantially faster than the SCFG method. Thermodynamic structural entropy is much smaller than derivational entropy, and the correlation between length-normalized thermodynamic entropy and derivational entropy is moderately weak to poor. In applications, we plot the structural entropy as a function of temperature for known thermoswitches, such as the repression of heat shock gene expression (ROSE) element, we determine that the correlation between hammerhead ribozyme cleavage activity and total free energy is improved by including an additional free energy term arising from conformational entropy, and we plot the structural entropy of windows of the HIV-1 genome. Our software RNAentropy can compute structural entropy for any user-specified temperature, and supports both the Turner'99 and Turner'04 energy parameters. It follows that RNAentropy is state-of-the-art software to compute RNA secondary structure conformational entropy. Source code is available at https://github.com/clotelab/RNAentropy/; a full web server is available at http

  11. RNA Thermodynamic Structural Entropy.

    Directory of Open Access Journals (Sweden)

    Juan Antonio Garcia-Martin

    Full Text Available Conformational entropy for atomic-level, three dimensional biomolecules is known experimentally to play an important role in protein-ligand discrimination, yet reliable computation of entropy remains a difficult problem. Here we describe the first two accurate and efficient algorithms to compute the conformational entropy for RNA secondary structures, with respect to the Turner energy model, where free energy parameters are determined from UV absorption experiments. An algorithm to compute the derivational entropy for RNA secondary structures had previously been introduced, using stochastic context free grammars (SCFGs. However, the numerical value of derivational entropy depends heavily on the chosen context free grammar and on the training set used to estimate rule probabilities. Using data from the Rfam database, we determine that both of our thermodynamic methods, which agree in numerical value, are substantially faster than the SCFG method. Thermodynamic structural entropy is much smaller than derivational entropy, and the correlation between length-normalized thermodynamic entropy and derivational entropy is moderately weak to poor. In applications, we plot the structural entropy as a function of temperature for known thermoswitches, such as the repression of heat shock gene expression (ROSE element, we determine that the correlation between hammerhead ribozyme cleavage activity and total free energy is improved by including an additional free energy term arising from conformational entropy, and we plot the structural entropy of windows of the HIV-1 genome. Our software RNAentropy can compute structural entropy for any user-specified temperature, and supports both the Turner'99 and Turner'04 energy parameters. It follows that RNAentropy is state-of-the-art software to compute RNA secondary structure conformational entropy. Source code is available at https://github.com/clotelab/RNAentropy/; a full web server is available at http

  12. Identifying microRNA/mRNA dysregulations in ovarian cancer.

    Science.gov (United States)

    Miles, Gregory D; Seiler, Michael; Rodriguez, Lorna; Rajagopal, Gunaretnam; Bhanot, Gyan

    2012-03-27

    MicroRNAs are a class of noncoding RNA molecules that co-regulate the expression of multiple genes via mRNA transcript degradation or translation inhibition. Since they often target entire pathways, they may be better drug targets than genes or proteins. MicroRNAs are known to be dysregulated in many tumours and associated with aggressive or poor prognosis phenotypes. Since they regulate mRNA in a tissue specific manner, their functional mRNA targets are poorly understood. In previous work, we developed a method to identify direct mRNA targets of microRNA using patient matched microRNA/mRNA expression data using an anti-correlation signature. This method, applied to clear cell Renal Cell Carcinoma (ccRCC), revealed many new regulatory pathways compromised in ccRCC. In the present paper, we apply this method to identify dysregulated microRNA/mRNA mechanisms in ovarian cancer using data from The Cancer Genome Atlas (TCGA). TCGA Microarray data was normalized and samples whose class labels (tumour or normal) were ambiguous with respect to consensus ensemble K-Means clustering were removed. Significantly anti-correlated and correlated genes/microRNA differentially expressed between tumour and normal samples were identified. TargetScan was used to identify gene targets of microRNA. We identified novel microRNA/mRNA mechanisms in ovarian cancer. For example, the expression level of RAD51AP1 was found to be strongly anti-correlated with the expression of hsa-miR-140-3p, which was significantly down-regulated in the tumour samples. The anti-correlation signature was present separately in the tumour and normal samples, suggesting a direct causal dysregulation of RAD51AP1 by hsa-miR-140-3p in the ovary. Other pairs of potentially biological relevance include: hsa-miR-145/E2F3, hsa-miR-139-5p/TOP2A, and hsa-miR-133a/GCLC. We also identified sets of positively correlated microRNA/mRNA pairs that are most likely result from indirect regulatory mechanisms. Our findings identify

  13. RNA-PAIRS: RNA probabilistic assignment of imino resonance shifts

    International Nuclear Information System (INIS)

    Bahrami, Arash; Clos, Lawrence J.; Markley, John L.; Butcher, Samuel E.; Eghbalnia, Hamid R.

    2012-01-01

    The significant biological role of RNA has further highlighted the need for improving the accuracy, efficiency and the reach of methods for investigating RNA structure and function. Nuclear magnetic resonance (NMR) spectroscopy is vital to furthering the goals of RNA structural biology because of its distinctive capabilities. However, the dispersion pattern in the NMR spectra of RNA makes automated resonance assignment, a key step in NMR investigation of biomolecules, remarkably challenging. Herein we present RNA Probabilistic Assignment of Imino Resonance Shifts (RNA-PAIRS), a method for the automated assignment of RNA imino resonances with synchronized verification and correction of predicted secondary structure. RNA-PAIRS represents an advance in modeling the assignment paradigm because it seeds the probabilistic network for assignment with experimental NMR data, and predicted RNA secondary structure, simultaneously and from the start. Subsequently, RNA-PAIRS sets in motion a dynamic network that reverberates between predictions and experimental evidence in order to reconcile and rectify resonance assignments and secondary structure information. The procedure is halted when assignments and base-parings are deemed to be most consistent with observed crosspeaks. The current implementation of RNA-PAIRS uses an initial peak list derived from proton-nitrogen heteronuclear multiple quantum correlation ( 1 H– 15 N 2D HMQC) and proton–proton nuclear Overhauser enhancement spectroscopy ( 1 H– 1 H 2D NOESY) experiments. We have evaluated the performance of RNA-PAIRS by using it to analyze NMR datasets from 26 previously studied RNAs, including a 111-nucleotide complex. For moderately sized RNA molecules, and over a range of comparatively complex structural motifs, the average assignment accuracy exceeds 90%, while the average base pair prediction accuracy exceeded 93%. RNA-PAIRS yielded accurate assignments and base pairings consistent with imino resonances for a

  14. RNA-PAIRS: RNA probabilistic assignment of imino resonance shifts

    Energy Technology Data Exchange (ETDEWEB)

    Bahrami, Arash; Clos, Lawrence J.; Markley, John L.; Butcher, Samuel E. [National Magnetic Resonance Facility at Madison (United States); Eghbalnia, Hamid R., E-mail: eghbalhd@uc.edu [University of Cincinnati, Department of Molecular and Cellular Physiology (United States)

    2012-04-15

    The significant biological role of RNA has further highlighted the need for improving the accuracy, efficiency and the reach of methods for investigating RNA structure and function. Nuclear magnetic resonance (NMR) spectroscopy is vital to furthering the goals of RNA structural biology because of its distinctive capabilities. However, the dispersion pattern in the NMR spectra of RNA makes automated resonance assignment, a key step in NMR investigation of biomolecules, remarkably challenging. Herein we present RNA Probabilistic Assignment of Imino Resonance Shifts (RNA-PAIRS), a method for the automated assignment of RNA imino resonances with synchronized verification and correction of predicted secondary structure. RNA-PAIRS represents an advance in modeling the assignment paradigm because it seeds the probabilistic network for assignment with experimental NMR data, and predicted RNA secondary structure, simultaneously and from the start. Subsequently, RNA-PAIRS sets in motion a dynamic network that reverberates between predictions and experimental evidence in order to reconcile and rectify resonance assignments and secondary structure information. The procedure is halted when assignments and base-parings are deemed to be most consistent with observed crosspeaks. The current implementation of RNA-PAIRS uses an initial peak list derived from proton-nitrogen heteronuclear multiple quantum correlation ({sup 1}H-{sup 15}N 2D HMQC) and proton-proton nuclear Overhauser enhancement spectroscopy ({sup 1}H-{sup 1}H 2D NOESY) experiments. We have evaluated the performance of RNA-PAIRS by using it to analyze NMR datasets from 26 previously studied RNAs, including a 111-nucleotide complex. For moderately sized RNA molecules, and over a range of comparatively complex structural motifs, the average assignment accuracy exceeds 90%, while the average base pair prediction accuracy exceeded 93%. RNA-PAIRS yielded accurate assignments and base pairings consistent with imino

  15. RNA SURVEILLANCE– AN EMERGING ROLE FOR RNA REGULATORY NETWORKS IN AGING

    OpenAIRE

    Montano, Monty; Long, Kimberly

    2010-01-01

    In this review, we describe recent advances in the field of RNA regulatory biology and relate these advances to aging science. We introduce a new term, RNA surveillance, an RNA regulatory process that is conserved in metazoans, and describe how RNA surveillance represents molecular cross-talk between two emerging RNA regulatory systems – RNA interference and RNA editing. We discuss how RNA surveillance mechanisms influence mRNA and microRNA expression and activity during lifespan. Additionall...

  16. On RNA-RNA interaction structures of fixed topological genus.

    Science.gov (United States)

    Fu, Benjamin M M; Han, Hillary S W; Reidys, Christian M

    2015-04-01

    Interacting RNA complexes are studied via bicellular maps using a filtration via their topological genus. Our main result is a new bijection for RNA-RNA interaction structures and a linear time uniform sampling algorithm for RNA complexes of fixed topological genus. The bijection allows to either reduce the topological genus of a bicellular map directly, or to lose connectivity by decomposing the complex into a pair of single stranded RNA structures. Our main result is proved bijectively. It provides an explicit algorithm of how to rewire the corresponding complexes and an unambiguous decomposition grammar. Using the concept of genus induction, we construct bicellular maps of fixed topological genus g uniformly in linear time. We present various statistics on these topological RNA complexes and compare our findings with biological complexes. Furthermore we show how to construct loop-energy based complexes using our decomposition grammar. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. antaRNA: ant colony-based RNA sequence design.

    Science.gov (United States)

    Kleinkauf, Robert; Mann, Martin; Backofen, Rolf

    2015-10-01

    RNA sequence design is studied at least as long as the classical folding problem. Although for the latter the functional fold of an RNA molecule is to be found ,: inverse folding tries to identify RNA sequences that fold into a function-specific target structure. In combination with RNA-based biotechnology and synthetic biology ,: reliable RNA sequence design becomes a crucial step to generate novel biochemical components. In this article ,: the computational tool antaRNA is presented. It is capable of compiling RNA sequences for a given structure that comply in addition with an adjustable full range objective GC-content distribution ,: specific sequence constraints and additional fuzzy structure constraints. antaRNA applies ant colony optimization meta-heuristics and its superior performance is shown on a biological datasets. http://www.bioinf.uni-freiburg.de/Software/antaRNA CONTACT: backofen@informatik.uni-freiburg.de Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press.

  18. RNA İNTERFERANS (RNAİ)

    OpenAIRE

    GÜNDOĞDU, Ramazan; ÇELİK, Venhar

    2009-01-01

    RNA interferans, uygun çift zincirli RNA’nın hücreye girdiği zaman, endojenik komplementer mRNA dizisinin parçalanmasına yol açan, transkripsiyon sonrası gen susturma mekanizmasıdır. RNA interferans, Dicer adı verilen bir RNase III enzimi tarafından çift zincirli RNA’nın küçük engelleyici RNA’lara (siRNA) kesilmesi ile başlamaktadır. Bu siRNA’lar daha sonra, bir multiprotein-RNA nükleaz kompleksi olan, RNA- indükleyici baskılama kompleksine (RISC) bağlanır. RISC, siRNA’ları komplementer mRNA’...

  19. Radiation sensitivity of messenger RNA

    International Nuclear Information System (INIS)

    Ponta, H.; Pfennig-Yeh, M.L.; Herrlich, P.; Karlsruhe Univ.; Wagner, E.F.; Schweiger, M.

    1979-01-01

    Messenger RNA function is inactivated by irradiation with ultraviolet light. A unit length mRNA (in bases) is 2-3 times more sensitive than a unit length of DNA (in base pairs) with respect to the inactivation of template function. These data stem from four experimental systems all of which do not repair DNA: the translation of E. coli mRNA in rifampicin-treated cells, of T7 mRNA in infected E.coli, of f2 phage RNA in vivo, and of stable mRNA in chromosomeless minicells. The comparison of relative sensitivities to UV is relevant to the technique of UV mapping of transcription units which enjoys increasing popularity in pro- and eukaryotic genetic research. (orig.) [de

  20. Radiation sensitivity of messenger RNA

    Energy Technology Data Exchange (ETDEWEB)

    Ponta, H; Pfennig-Yeh, M L; Herrlich, P [Kernforschungszentrum Karlsruhe G.m.b.H. (Germany, F.R.). Inst. fuer Genetik und Toxikologie von Spaltstoffen; Karlsruhe Univ. (TH) (Germany, F.R.). Inst. fuer Genetik); Wagner, E F; Schweiger, M [Innsbruck Univ. (Austria). Inst. fuer Biochemie

    1979-08-01

    Messenger RNA function is inactivated by irradiation with ultraviolet light. A unit length mRNA (in bases) is 2-3 times more sensitive than a unit length of DNA (in base pairs) with respect to the inactivation of template function. These data stem from four experimental systems all of which do not repair DNA: the translation of E. coli mRNA in rifampicin-treated cells, of T7 mRNA in infected E.coli, of f2 phage RNA in vivo, and of stable mRNA in chromosomeless minicells. The comparison of relative sensitivities to UV is relevant to the technique of UV mapping of transcription units which enjoys increasing popularity in pro- and eukaryotic genetic research.

  1. RNase-assisted RNA chromatography

    Science.gov (United States)

    Michlewski, Gracjan; Cáceres, Javier F.

    2010-01-01

    RNA chromatography combined with mass spectrometry represents a widely used experimental approach to identify RNA-binding proteins that recognize specific RNA targets. An important drawback of most of these protocols is the high background due to direct or indirect nonspecific binding of cellular proteins to the beads. In many cases this can hamper the detection of individual proteins due to their low levels and/or comigration with contaminating proteins. Increasing the salt concentration during washing steps can reduce background, but at the cost of using less physiological salt concentrations and the likely loss of important RNA-binding proteins that are less stringently bound to a given RNA, as well as the disassembly of protein or ribonucleoprotein complexes. Here, we describe an improved RNA chromatography method that relies on the use of a cocktail of RNases in the elution step. This results in the release of proteins specifically associated with the RNA ligand and almost complete elimination of background noise, allowing a more sensitive and thorough detection of RNA-binding proteins recognizing a specific RNA transcript. PMID:20571124

  2. RNA interference in Lepidoptera

    DEFF Research Database (Denmark)

    Terenius, Ole; Papanicolaou, Alexie; Garbutt, Jennie S.

    2011-01-01

    in RNAi experiments in Lepidoptera are discussed. The review also points to a need to further investigate the mechanism of RNAi in lepidopteran insects and its possible connection to the innate immune response. Our general understanding of RNAi in Lepidoptera will be further aided in the future as our...... experiments have not been collected in such a way that they are possible to analyze. In this review, we have collected detailed data from more than 150 experiments including all to date published and many unpublished experiments. Despite a large variation in the data, trends that are found are that RNAi...... is particularly successful in the family Saturniidae and in genes involved in immunity. On the contrary, gene expression in epidermal tissues seems to be most difficult to silence. In addition, gene silencing by feeding dsRNA requires high concentrations for success. Possible causes for the variability of success...

  3. Concepts and introduction to RNA bioinformatics

    DEFF Research Database (Denmark)

    Gorodkin, Jan; Hofacker, Ivo L.; Ruzzo, Walter L.

    2014-01-01

    RNA bioinformatics and computational RNA biology have emerged from implementing methods for predicting the secondary structure of single sequences. The field has evolved to exploit multiple sequences to take evolutionary information into account, such as compensating (and structure preserving) base...... for interactions between RNA and proteins.Here, we introduce the basic concepts of predicting RNA secondary structure relevant to the further analyses of RNA sequences. We also provide pointers to methods addressing various aspects of RNA bioinformatics and computational RNA biology....

  4. Identification of Subtype Specific miRNA-mRNA Functional Regulatory Modules in Matched miRNA-mRNA Expression Data: Multiple Myeloma as a Case

    OpenAIRE

    Zhang, Yunpeng; Liu, Wei; Xu, Yanjun; Li, Chunquan; Wang, Yingying; Yang, Haixiu; Zhang, Chunlong; Su, Fei; Li, Yixue; Li, Xia

    2015-01-01

    Identification of miRNA-mRNA modules is an important step to elucidate their combinatorial effect on the pathogenesis and mechanisms underlying complex diseases. Current identification methods primarily are based upon miRNA-target information and matched miRNA and mRNA expression profiles. However, for heterogeneous diseases, the miRNA-mRNA regulatory mechanisms may differ between subtypes, leading to differences in clinical behavior. In order to explore the pathogenesis of each subtype, it i...

  5. Bifurcations in the interplay of messenger RNA, protein and nonprotein coding RNA

    International Nuclear Information System (INIS)

    Zhdanov, Vladimir P

    2008-01-01

    The interplay of messenger RNA (mRNA), protein, produced via translation of this RNA, and nonprotein coding RNA (ncRNA) may include regulation of the ncRNA production by protein and (i) ncRNA-protein association resulting in suppression of the protein regulatory activity or (ii) ncRNA-mRNA association resulting in degradation of the miRNA-mRNA complex. The kinetic models describing these two scenarios are found to predict bistability provided that protein suppresses the ncRNA formation

  6. 34A, miRNA-944, miRNA-101 and miRNA-218 in cervical cancer

    African Journals Online (AJOL)

    RNAs (21 - 24 nucleotides in length) that are critical for many important processes such as development, ... RNA extraction and reverse transcription. Total RNA was extracted from each of the experimental groups using ... used as an endogenous control to normalize the expression of miRNA-143, miRNA-34A, miRNA-.

  7. Nuclear Export of Messenger RNA

    Directory of Open Access Journals (Sweden)

    Jun Katahira

    2015-03-01

    Full Text Available Transport of messenger RNA (mRNA from the nucleus to the cytoplasm is an essential step of eukaryotic gene expression. In the cell nucleus, a precursor mRNA undergoes a series of processing steps, including capping at the 5' ends, splicing and cleavage/polyadenylation at the 3' ends. During this process, the mRNA associates with a wide variety of proteins, forming a messenger ribonucleoprotein (mRNP particle. Association with factors involved in nuclear export also occurs during transcription and processing, and thus nuclear export is fully integrated into mRNA maturation. The coupling between mRNA maturation and nuclear export is an important mechanism for providing only fully functional and competent mRNA to the cytoplasmic translational machinery, thereby ensuring accuracy and swiftness of gene expression. This review describes the molecular mechanism of nuclear mRNA export mediated by the principal transport factors, including Tap-p15 and the TREX complex.

  8. RNA viruses in the sea.

    Science.gov (United States)

    Lang, Andrew S; Rise, Matthew L; Culley, Alexander I; Steward, Grieg F

    2009-03-01

    Viruses are ubiquitous in the sea and appear to outnumber all other forms of marine life by at least an order of magnitude. Through selective infection, viruses influence nutrient cycling, community structure, and evolution in the ocean. Over the past 20 years we have learned a great deal about the diversity and ecology of the viruses that constitute the marine virioplankton, but until recently the emphasis has been on DNA viruses. Along with expanding knowledge about RNA viruses that infect important marine animals, recent isolations of RNA viruses that infect single-celled eukaryotes and molecular analyses of the RNA virioplankton have revealed that marine RNA viruses are novel, widespread, and genetically diverse. Discoveries in marine RNA virology are broadening our understanding of the biology, ecology, and evolution of viruses, and the epidemiology of viral diseases, but there is still much that we need to learn about the ecology and diversity of RNA viruses before we can fully appreciate their contributions to the dynamics of marine ecosystems. As a step toward making sense of how RNA viruses contribute to the extraordinary viral diversity in the sea, we summarize in this review what is currently known about RNA viruses that infect marine organisms.

  9. Nuclear Export of Messenger RNA

    Science.gov (United States)

    Katahira, Jun

    2015-01-01

    Transport of messenger RNA (mRNA) from the nucleus to the cytoplasm is an essential step of eukaryotic gene expression. In the cell nucleus, a precursor mRNA undergoes a series of processing steps, including capping at the 5' ends, splicing and cleavage/polyadenylation at the 3' ends. During this process, the mRNA associates with a wide variety of proteins, forming a messenger ribonucleoprotein (mRNP) particle. Association with factors involved in nuclear export also occurs during transcription and processing, and thus nuclear export is fully integrated into mRNA maturation. The coupling between mRNA maturation and nuclear export is an important mechanism for providing only fully functional and competent mRNA to the cytoplasmic translational machinery, thereby ensuring accuracy and swiftness of gene expression. This review describes the molecular mechanism of nuclear mRNA export mediated by the principal transport factors, including Tap-p15 and the TREX complex. PMID:25836925

  10. Transfecting Human Monocytes with RNA.

    Science.gov (United States)

    Dannull, Jens; Nair, Smita K

    2016-01-01

    Targeting monocytes as a delivery system for drugs or nucleic acids, and thereby harnessing their natural tissue-infiltrating capacity, has become an area of intense investigation in both basic and clinical research. Herein we describe an efficient method to deliver mRNA (messenger RNA) or siRNA (small interfering RNA) into human monocytes by electroporation. This method can be applied in the laboratory to monocytes isolated via magnetic bead-based techniques, or in a clinical setting using monocytes that were collected via counterflow centrifugation elutriation using the Elutra(®) Cell Separation System. We further demonstrate that electroporation of monocytes with RNA represents a robust and highly relevant approach to modify monocytes for cell-based therapies. Last, the procedure described can readily be adapted to monocytes from different species, hence facilitating research in animal models.

  11. Fast prediction of RNA-RNA interaction using heuristic algorithm.

    Science.gov (United States)

    Montaseri, Soheila

    2015-01-01

    Interaction between two RNA molecules plays a crucial role in many medical and biological processes such as gene expression regulation. In this process, an RNA molecule prohibits the translation of another RNA molecule by establishing stable interactions with it. Some algorithms have been formed to predict the structure of the RNA-RNA interaction. High computational time is a common challenge in most of the presented algorithms. In this context, a heuristic method is introduced to accurately predict the interaction between two RNAs based on minimum free energy (MFE). This algorithm uses a few dot matrices for finding the secondary structure of each RNA and binding sites between two RNAs. Furthermore, a parallel version of this method is presented. We describe the algorithm's concurrency and parallelism for a multicore chip. The proposed algorithm has been performed on some datasets including CopA-CopT, R1inv-R2inv, Tar-Tar*, DIS-DIS, and IncRNA54-RepZ in Escherichia coli bacteria. The method has high validity and efficiency, and it is run in low computational time in comparison to other approaches.

  12. The RNA synthesis machinery of negative-stranded RNA viruses

    Energy Technology Data Exchange (ETDEWEB)

    Ortín, Juan, E-mail: jortin@cnb.csic.es [Department of Molecular and Cellular Biology, Centro Nacional de Biotecnología (CSIC) and CIBER de Enfermedades Respiratorias (ISCIII), Madrid (Spain); Martín-Benito, Jaime, E-mail: jmartinb@cnb.csic.es [Department of Macromolecular Structures, Centro Nacional de Biotecnología (CSIC), Madrid (Spain)

    2015-05-15

    The group of Negative-Stranded RNA Viruses (NSVs) includes many human pathogens, like the influenza, measles, mumps, respiratory syncytial or Ebola viruses, which produce frequent epidemics of disease and occasional, high mortality outbreaks by transmission from animal reservoirs. The genome of NSVs consists of one to several single-stranded, negative-polarity RNA molecules that are always assembled into mega Dalton-sized complexes by association to many nucleoprotein monomers. These RNA-protein complexes or ribonucleoproteins function as templates for transcription and replication by action of the viral RNA polymerase and accessory proteins. Here we review our knowledge on these large RNA-synthesis machines, including the structure of their components, the interactions among them and their enzymatic activities, and we discuss models showing how they perform the virus transcription and replication programmes. - Highlights: • Overall organisation of NSV RNA synthesis machines. • Structure and function of the ribonucleoprotein components: Atomic structure of the RNA polymerase complex. • Commonalities and differences between segmented- and non-segmented NSVs. • Transcription versus replication programmes.

  13. The RNA synthesis machinery of negative-stranded RNA viruses

    International Nuclear Information System (INIS)

    Ortín, Juan; Martín-Benito, Jaime

    2015-01-01

    The group of Negative-Stranded RNA Viruses (NSVs) includes many human pathogens, like the influenza, measles, mumps, respiratory syncytial or Ebola viruses, which produce frequent epidemics of disease and occasional, high mortality outbreaks by transmission from animal reservoirs. The genome of NSVs consists of one to several single-stranded, negative-polarity RNA molecules that are always assembled into mega Dalton-sized complexes by association to many nucleoprotein monomers. These RNA-protein complexes or ribonucleoproteins function as templates for transcription and replication by action of the viral RNA polymerase and accessory proteins. Here we review our knowledge on these large RNA-synthesis machines, including the structure of their components, the interactions among them and their enzymatic activities, and we discuss models showing how they perform the virus transcription and replication programmes. - Highlights: • Overall organisation of NSV RNA synthesis machines. • Structure and function of the ribonucleoprotein components: Atomic structure of the RNA polymerase complex. • Commonalities and differences between segmented- and non-segmented NSVs. • Transcription versus replication programmes

  14. Generation of miRNA sponge constructs

    NARCIS (Netherlands)

    Kluiver, Joost; Slezak-Prochazka, Izabella; Smigielska-Czepiel, Katarzyna; Halsema, Nancy; Kroesen, Bart-Jan; van den Berg, Anke

    2012-01-01

    MicroRNA (miRNA) sponges are RNA molecules with repeated miRNA antisense sequences that can sequester miRNAs from their endogenous targets and thus serve as a decoy. Stably expressed miRNA sponges are especially valuable for long-term loss-of-function studies and can be used in vitro and in vivo. We

  15. microRNA-independent recruitment of Argonaute 1 to nanos mRNA through the Smaug RNA-binding protein

    OpenAIRE

    Pinder, Benjamin D; Smibert, Craig A

    2012-01-01

    Argonaute 1 directly interacts with the RNA binding protein Smaug in Drosophila, is thereby recruited to the Smaug target nanos mRNA and is required for Smaug-mediated translational repression of the nanos mRNA.

  16. IntaRNA 2.0: enhanced and customizable prediction of RNA-RNA interactions.

    Science.gov (United States)

    Mann, Martin; Wright, Patrick R; Backofen, Rolf

    2017-07-03

    The IntaRNA algorithm enables fast and accurate prediction of RNA-RNA hybrids by incorporating seed constraints and interaction site accessibility. Here, we introduce IntaRNAv2, which enables enhanced parameterization as well as fully customizable control over the prediction modes and output formats. Based on up to date benchmark data, the enhanced predictive quality is shown and further improvements due to more restrictive seed constraints are highlighted. The extended web interface provides visualizations of the new minimal energy profiles for RNA-RNA interactions. These allow a detailed investigation of interaction alternatives and can reveal potential interaction site multiplicity. IntaRNAv2 is freely available (source and binary), and distributed via the conda package manager. Furthermore, it has been included into the Galaxy workflow framework and its already established web interface enables ad hoc usage. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  17. Direct, rapid RNA sequence analysis

    International Nuclear Information System (INIS)

    Peattie, D.A.

    1987-01-01

    The original methods of RNA sequence analysis were based on enzymatic production and chromatographic separation of overlapping oligonucleotide fragments from within an RNA molecule followed by identification of the mononucleotides comprising the oligomer. Over the past decade the field of nucleic acid sequencing has changed dramatically, however, and RNA molecules now can be sequenced in a variety of more streamlined fashions. Most of the more recent advances in RNA sequencing have involved one-dimensional electrophoretic separation of 32 P-end-labeled oligoribonucleotides on polyacrylamide gels. In this chapter the author discusses two of these methods for determining the nucleotide sequences of RNA molecules rapidly: the chemical method and the enzymatic method. Both methods are direct and degradative, i.e., they rely on fragmatic and chemical approaches should be utilized. The single-strand-specific ribonucleases (A, T 1 , T 2 , and S 1 ) provide an efficient means to locate double-helical regions rapidly, and the chemical reactions provide a means to determine the RNA sequence within these regions. In addition, the chemical reactions allow one to assign interactions to specific atoms and to distinguish secondary interactions from tertiary ones. If the RNA molecule is small enough to be sequenced directly by the enzymatic or chemical method, the probing reactions can be done easily at the same time as sequencing reactions

  18. Cofactors in the RNA World

    Science.gov (United States)

    Ditzler, Mark A.

    2014-01-01

    RNA world theories figure prominently in many scenarios for the origin and early evolution of life. These theories posit that RNA molecules played a much larger role in ancient biology than they do now, acting both as the dominant biocatalysts and as the repository of genetic information. Many features of modern RNA biology are potential examples of molecular fossils from an RNA world, such as the pervasive involvement of nucleotides in coenzymes, the existence of natural aptamers that bind these coenzymes, the existence of natural ribozymes, a biosynthetic pathway in which deoxynucleotides are produced from ribonucleotides, and the central role of ribosomal RNA in protein synthesis in the peptidyl transferase center of the ribosome. Here, we uses both a top-down approach that evaluates RNA function in modern biology and a bottom-up approach that examines the capacities of RNA independent of modern biology. These complementary approaches exploit multiple in vitro evolution techniques coupled with high-throughput sequencing and bioinformatics analysis. Together these complementary approaches advance our understanding of the most primitive organisms, their early evolution, and their eventual transition to modern biochemistry.

  19. Efficient RNA structure comparison algorithms.

    Science.gov (United States)

    Arslan, Abdullah N; Anandan, Jithendar; Fry, Eric; Monschke, Keith; Ganneboina, Nitin; Bowerman, Jason

    2017-12-01

    Recently proposed relative addressing-based ([Formula: see text]) RNA secondary structure representation has important features by which an RNA structure database can be stored into a suffix array. A fast substructure search algorithm has been proposed based on binary search on this suffix array. Using this substructure search algorithm, we present a fast algorithm that finds the largest common substructure of given multiple RNA structures in [Formula: see text] format. The multiple RNA structure comparison problem is NP-hard in its general formulation. We introduced a new problem for comparing multiple RNA structures. This problem has more strict similarity definition and objective, and we propose an algorithm that solves this problem efficiently. We also develop another comparison algorithm that iteratively calls this algorithm to locate nonoverlapping large common substructures in compared RNAs. With the new resulting tools, we improved the RNASSAC website (linked from http://faculty.tamuc.edu/aarslan ). This website now also includes two drawing tools: one specialized for preparing RNA substructures that can be used as input by the search tool, and another one for automatically drawing the entire RNA structure from a given structure sequence.

  20. Alternative RNA splicing and cancer

    Science.gov (United States)

    Liu, Sali; Cheng, Chonghui

    2015-01-01

    Alternative splicing of pre-messenger RNA (mRNA) is a fundamental mechanism by which a gene can give rise to multiple distinct mRNA transcripts, yielding protein isoforms with different, even opposing, functions. With the recognition that alternative splicing occurs in nearly all human genes, its relationship with cancer-associated pathways has emerged as a rapidly growing field. In this review, we summarize recent findings that have implicated the critical role of alternative splicing in cancer and discuss current understandings of the mechanisms underlying dysregulated alternative splicing in cancer cells. PMID:23765697

  1. Privacidad y periodismo : el escándalo Murdoch sobre escuchas telefónicas en News of the World = Privacy and journalism: Murdoch´s scandal on phone hacking in Newsof the World

    Directory of Open Access Journals (Sweden)

    Cristina Pauner Chulvi

    2013-09-01

    Full Text Available La regulación de la prensa británica se halla en pleno proceso de reforma a raíz del descubrimiento en julio de 2011 del mayor escándalo de escuchas ilegales practicadas por los periodistas del tabloide News of the World. Este hallazgo ha puesto al descubierto una compleja red de conexiones entre la prensa, la policía y los políticos en Reino Unido. Tras varios meses de investigación, el Informe Leveson sobre la cultura, prácticas y ética de la prensa presenta numerosas propuestas para someter a la prensa a un nuevo mecanismo de autorregulación más independiente y garantista que comprometa a una práctica ética del periodismo así como para asegurar los derechos de las personas objeto de información en los medios. The regulation of the British press is undergoing a major process of reform after the biggest scandal of phone hacking carried out by journalists from the tabloid News of the World broke in July 2011. This finding has uncovered a complex network of connections among the press, the police and politicians in the UK. After several months of investigation, the Leveson Inquiry into the culture, practices and ethics of the press has made numerous proposals in order for the press to be covered by a new independent self— regulatory regime leading to the ethical practice of journalism and guaranteeing the rights of persons who draw the attention of the media.

  2. The ViennaRNA web services.

    Science.gov (United States)

    Gruber, Andreas R; Bernhart, Stephan H; Lorenz, Ronny

    2015-01-01

    The ViennaRNA package is a widely used collection of programs for thermodynamic RNA secondary structure prediction. Over the years, many additional tools have been developed building on the core programs of the package to also address issues related to noncoding RNA detection, RNA folding kinetics, or efficient sequence design considering RNA-RNA hybridizations. The ViennaRNA web services provide easy and user-friendly web access to these tools. This chapter describes how to use this online platform to perform tasks such as prediction of minimum free energy structures, prediction of RNA-RNA hybrids, or noncoding RNA detection. The ViennaRNA web services can be used free of charge and can be accessed via http://rna.tbi.univie.ac.at.

  3. Rapid Generation of MicroRNA Sponges for MicroRNA Inhibition

    NARCIS (Netherlands)

    Kluiver, Joost; Gibcus, Johan H.; Hettinga, Chris; Adema, Annelies; Richter, Mareike K. S.; Halsema, Nancy; Slezak-Prochazka, Izabella; Ding, Ye; Kroesen, Bart-Jan; van den Berg, Anke

    2012-01-01

    MicroRNA (miRNA) sponges are transcripts with repeated miRNA antisense sequences that can sequester miRNAs from endogenous targets. MiRNA sponges are valuable tools for miRNA loss-of-function studies both in vitro and in vivo. We developed a fast and flexible method to generate miRNA sponges and

  4. Identification of Subtype Specific miRNA-mRNA Functional Regulatory Modules in Matched miRNA-mRNA Expression Data: Multiple Myeloma as a Case

    Directory of Open Access Journals (Sweden)

    Yunpeng Zhang

    2015-01-01

    Full Text Available Identification of miRNA-mRNA modules is an important step to elucidate their combinatorial effect on the pathogenesis and mechanisms underlying complex diseases. Current identification methods primarily are based upon miRNA-target information and matched miRNA and mRNA expression profiles. However, for heterogeneous diseases, the miRNA-mRNA regulatory mechanisms may differ between subtypes, leading to differences in clinical behavior. In order to explore the pathogenesis of each subtype, it is important to identify subtype specific miRNA-mRNA modules. In this study, we integrated the Ping-Pong algorithm and multiobjective genetic algorithm to identify subtype specific miRNA-mRNA functional regulatory modules (MFRMs through integrative analysis of three biological data sets: GO biological processes, miRNA target information, and matched miRNA and mRNA expression data. We applied our method on a heterogeneous disease, multiple myeloma (MM, to identify MM subtype specific MFRMs. The constructed miRNA-mRNA regulatory networks provide modular outlook at subtype specific miRNA-mRNA interactions. Furthermore, clustering analysis demonstrated that heterogeneous MFRMs were able to separate corresponding MM subtypes. These subtype specific MFRMs may aid in the further elucidation of the pathogenesis of each subtype and may serve to guide MM subtype diagnosis and treatment.

  5. Predicting and Modeling RNA Architecture

    Science.gov (United States)

    Westhof, Eric; Masquida, Benoît; Jossinet, Fabrice

    2011-01-01

    SUMMARY A general approach for modeling the architecture of large and structured RNA molecules is described. The method exploits the modularity and the hierarchical folding of RNA architecture that is viewed as the assembly of preformed double-stranded helices defined by Watson-Crick base pairs and RNA modules maintained by non-Watson-Crick base pairs. Despite the extensive molecular neutrality observed in RNA structures, specificity in RNA folding is achieved through global constraints like lengths of helices, coaxiality of helical stacks, and structures adopted at the junctions of helices. The Assemble integrated suite of computer tools allows for sequence and structure analysis as well as interactive modeling by homology or ab initio assembly with possibilities for fitting within electronic density maps. The local key role of non-Watson-Crick pairs guides RNA architecture formation and offers metrics for assessing the accuracy of three-dimensional models in a more useful way than usual root mean square deviation (RMSD) values. PMID:20504963

  6. Shielding the messenger (RNA): microRNA-based anticancer therapies

    Science.gov (United States)

    Sotillo, Elena; Thomas-Tikhonenko, Andrei

    2011-01-01

    It has been a decade since scientists realized that microRNAs (miRNAs) are not an oddity invented by worms to regulate gene expression at post-transcriptional levels. Rather, many of these 21–22-nucleotide-short RNAs exist in invertebrates and vertebrates alike and some of them are in fact highly conserved. miRNAs are now recognized as an important class of non-coding small RNAs that inhibit gene expression by targeting mRNA stability and translation. In the last ten years, our knowledge of the miRNAs world was expanding at vertiginous speed, propelled by the development of computational engines for miRNA identification and target prediction, biochemical tools and techniques to modulate miRNA activity, and last but not least, the emergence of miRNA-centric animal models. One important conclusion that has emerged from this effort is that many microRNAs and their cognate targets are strongly implicated in cancer, either as oncogenes or tumor and metastasis suppressors. In this review we will discuss the diverse role that miRNAs play in cancer initiation and progression and also the tools with which miRNA expression could be corrected in vivo. While the idea of targeting microRNAs towards therapeutic ends is getting considerable traction, basic, translational, and clinical research done in the next few years will tell whether this promise is well-founded. PMID:21514318

  7. Chaperoning 5S RNA assembly.

    Science.gov (United States)

    Madru, Clément; Lebaron, Simon; Blaud, Magali; Delbos, Lila; Pipoli, Juliana; Pasmant, Eric; Réty, Stéphane; Leulliot, Nicolas

    2015-07-01

    In eukaryotes, three of the four ribosomal RNAs (rRNAs)—the 5.8S, 18S, and 25S/28S rRNAs—are processed from a single pre-rRNA transcript and assembled into ribosomes. The fourth rRNA, the 5S rRNA, is transcribed by RNA polymerase III and is assembled into the 5S ribonucleoprotein particle (RNP), containing ribosomal proteins Rpl5/uL18 and Rpl11/uL5, prior to its incorporation into preribosomes. In mammals, the 5S RNP is also a central regulator of the homeostasis of the tumor suppressor p53. The nucleolar localization of the 5S RNP and its assembly into preribosomes are performed by a specialized complex composed of Rpf2 and Rrs1 in yeast or Bxdc1 and hRrs1 in humans. Here we report the structural and functional characterization of the Rpf2-Rrs1 complex alone, in complex with the 5S RNA, and within pre-60S ribosomes. We show that the Rpf2-Rrs1 complex contains a specialized 5S RNA E-loop-binding module, contacts the Rpl5 protein, and also contacts the ribosome assembly factor Rsa4 and the 25S RNA. We propose that the Rpf2-Rrs1 complex establishes a network of interactions that guide the incorporation of the 5S RNP in preribosomes in the initial conformation prior to its rotation to form the central protuberance found in the mature large ribosomal subunit. © 2015 Madru et al.; Published by Cold Spring Harbor Laboratory Press.

  8. Differential Regulation of rRNA and tRNA Transcription from the rRNA-tRNA Composite Operon in Escherichia coli.

    Directory of Open Access Journals (Sweden)

    Hiraku Takada

    Full Text Available Escherichia coli contains seven rRNA operons, each consisting of the genes for three rRNAs (16S, 23S and 5S rRNA in this order and one or two tRNA genes in the spacer between 16S and 23S rRNA genes and one or two tRNA genes in the 3' proximal region. All of these rRNA and tRNA genes are transcribed from two promoters, P1 and P2, into single large precursors that are afterward processed to individual rRNAs and tRNAs by a set of RNases. In the course of Genomic SELEX screening of promoters recognized by RNA polymerase (RNAP holoenzyme containing RpoD sigma, a strong binding site was identified within 16S rRNA gene in each of all seven rRNA operons. The binding in vitro of RNAP RpoD holoenzyme to an internal promoter, referred to the promoter of riRNA (an internal RNA of the rRNA operon, within each 16S rRNA gene was confirmed by gel shift assay and AFM observation. Using this riRNA promoter within the rrnD operon as a representative, transcription in vitro was detected with use of the purified RpoD holoenzyme, confirming the presence of a constitutive promoter in this region. LacZ reporter assay indicated that this riRNA promoter is functional in vivo. The location of riRNA promoter in vivo as identified using a set of reporter plasmids agrees well with that identified in vitro. Based on transcription profile in vitro and Northern blot analysis in vivo, the majority of transcript initiated from this riRNA promoter was estimated to terminate near the beginning of 23S rRNA gene, indicating that riRNA leads to produce the spacer-coded tRNA. Under starved conditions, transcription of the rRNA operon is markedly repressed to reduce the intracellular level of ribosomes, but the levels of both riRNA and its processed tRNAGlu stayed unaffected, implying that riRNA plays a role in the continued steady-state synthesis of tRNAs from the spacers of rRNA operons. We then propose that the tRNA genes organized within the spacers of rRNA-tRNA composite operons

  9. RegRNA: an integrated web server for identifying regulatory RNA motifs and elements

    OpenAIRE

    Huang, Hsi-Yuan; Chien, Chia-Hung; Jen, Kuan-Hua; Huang, Hsien-Da

    2006-01-01

    Numerous regulatory structural motifs have been identified as playing essential roles in transcriptional and post-transcriptional regulation of gene expression. RegRNA is an integrated web server for identifying the homologs of regulatory RNA motifs and elements against an input mRNA sequence. Both sequence homologs and structural homologs of regulatory RNA motifs can be recognized. The regulatory RNA motifs supported in RegRNA are categorized into several classes: (i) motifs in mRNA 5′-untra...

  10. Analysis of intermolecular RNA-RNA recombination by rubella virus

    International Nuclear Information System (INIS)

    Adams, Sandra D.; Tzeng, W.-P.; Chen, M.-H.; Frey, Teryl K.

    2003-01-01

    To investigate whether rubella virus (RUB) undergoes intermolecular RNA-RNA recombination, cells were cotransfected with pairs of in vitro transcripts from genomic cDNA plasmid vectors engineered to contain nonoverlapping deletions: the replicative transcript maintained the 5'-proximal nonstructural (NS) ORF (which contained the replicase, making it RNA replication competent), had a deletion in the 3'-proximal structural protein (SP) ORF, and maintained the 3' end of the genome, including the putative 3' cis-acting elements (CSE), while the nonreplicative transcript consisted of the 3' half of the genome including the SP-ORF and 3' CSE. Cotransfection yielded plaque-forming virus that synthesized the standard genomic and subgenomic RNAs and thus was generated by RNA-RNA recombination. Using transcripts tagged with a 3'-terminal deletion, it was found that recombinants contained the 3' end derived from the replicative strand, indicating a cis-preference for initiation of negative-strand synthesis. In cotransfections in which the replicative transcript lacked the 3' CSE, recombination occurred, albeit at lower efficiency, indicating that initiation in trans from the NS-ORF can occur. The 3' CSE was sufficient as a nonreplicative transcript, showing that it can serve as a promoter for negative-strand RNA synthesis. While deletion mutagenesis showed that the presence of the junction untranslated region (J-UTR) between the ORFs appeared to be necessary on both transcripts for recombination in this region of the genome, analysis with transcripts tagged with restriction sites showed that the J-UTR was not a hot spot for recombination compared to neighboring regions in both ORFs. Sequence analysis of recombinants revealed that both precise (homologous) and imprecise recombination (aberrant, homologous resulting in duplications) occurred; however, imprecise recombination only involved the J-UTR or the 3' end of the NS-ORF and the J-UTR (maintaining the NS-ORF), indicating

  11. MicroRNA mimicry blocks pulmonary fibrosis

    NARCIS (Netherlands)

    Montgomery, Rusty L; Yu, Guoying; Latimer, Paul A; Stack, Christianna; Robinson, Kathryn; Dalby, Christina M; Kaminski, Naftali; van Rooij, Eva

    2014-01-01

    Over the last decade, great enthusiasm has evolved for microRNA (miRNA) therapeutics. Part of the excitement stems from the fact that a miRNA often regulates numerous related mRNAs. As such, modulation of a single miRNA allows for parallel regulation of multiple genes involved in a particular

  12. Biochemistry and Function of the RNA Exosomes

    DEFF Research Database (Denmark)

    Lubas, Michal Szymon; Chlebowski, Aleksander; Dziembowski, Andrzej

    2012-01-01

    Discovery of the evolutionary conserved RNA exosome was a milestone in RNA biology. First identified as an activity essential for the processing of ribosomal RNA, the exosome has since proved to be central for RNA processing and degradation in both the nucleus and the cytoplasm of eukaryotic cell...

  13. The crystal structure of tRNA

    Indian Academy of Sciences (India)

    Madhu

    of yeast alanine tRNA by Robert Holley's group at Cornell. University ... decode nonsense codons) with John Smith and Brenner. However, my ... tRNA from 10 g of unfractionated tRNA. ... tRNA crystals were, in fact, protein (Hendrikson et al.

  14. A discontinuous RNA platform mediates RNA virus replication: building an integrated model for RNA-based regulation of viral processes.

    Directory of Open Access Journals (Sweden)

    Baodong Wu

    2009-03-01

    Full Text Available Plus-strand RNA viruses contain RNA elements within their genomes that mediate a variety of fundamental viral processes. The traditional view of these elements is that of local RNA structures. This perspective, however, is changing due to increasing discoveries of functional viral RNA elements that are formed by long-range RNA-RNA interactions, often spanning thousands of nucleotides. The plus-strand RNA genomes of tombusviruses exemplify this concept by possessing different long-range RNA-RNA interactions that regulate both viral translation and transcription. Here we report that a third fundamental tombusvirus process, viral genome replication, requires a long-range RNA-based interaction spanning approximately 3000 nts. In vivo and in vitro analyses suggest that the discontinuous RNA platform formed by the interaction facilitates efficient assembly of the viral RNA replicase. This finding has allowed us to build an integrated model for the role of global RNA structure in regulating the reproduction of a eukaryotic RNA virus, and the insights gained have extended our understanding of the multifunctional nature of viral RNA genomes.

  15. Glia to axon RNA transfer.

    Science.gov (United States)

    Sotelo, José Roberto; Canclini, Lucía; Kun, Alejandra; Sotelo-Silveira, José Roberto; Calliari, Aldo; Cal, Karina; Bresque, Mariana; Dipaolo, Andrés; Farias, Joaquina; Mercer, John A

    2014-03-01

    The existence of RNA in axons has been a matter of dispute for decades. Evidence for RNA and ribosomes has now accumulated to a point at which it is difficult to question, much of the disputes turned to the origin of these axonal RNAs. In this review, we focus on studies addressing the origin of axonal RNAs and ribosomes. The neuronal soma as the source of most axonal RNAs has been demonstrated and is indisputable. However, the surrounding glial cells may be a supplemental source of axonal RNAs, a matter scarcely investigated in the literature. Here, we review the few papers that have demonstrated that glial-to-axon RNA transfer is not only feasible, but likely. We describe this process in both invertebrate axons and vertebrate axons. Schwann cell to axon ribosomes transfer was conclusively demonstrated (Court et al. [2008]: J. Neurosci 28:11024-11029; Court et al. [2011]: Glia 59:1529-1539). However, mRNA transfer still remains to be demonstrated in a conclusive way. The intercellular transport of mRNA has interesting implications, particularly with respect to the integration of glial and axonal function. This evolving field is likely to impact our understanding of the cell biology of the axon in both normal and pathological conditions. Most importantly, if the synthesis of proteins in the axon can be controlled by interacting glia, the possibilities for clinical interventions in injury and neurodegeneration are greatly increased. Copyright © 2013 Wiley Periodicals, Inc.

  16. On topological RNA interaction structures.

    Science.gov (United States)

    Qin, Jing; Reidys, Christian M

    2013-07-01

    Recently a folding algorithm of topological RNA pseudoknot structures was presented in Reidys et al. (2011). This algorithm folds single-stranded γ-structures, that is, RNA structures composed by distinct motifs of bounded topological genus. In this article, we set the theoretical foundations for the folding of the two backbone analogues of γ structures: the RNA γ-interaction structures. These are RNA-RNA interaction structures that are constructed by a finite number of building blocks over two backbones having genus at most γ. Combinatorial properties of γ-interaction structures are of practical interest since they have direct implications for the folding of topological interaction structures. We compute the generating function of γ-interaction structures and show that it is algebraic, which implies that the numbers of interaction structures can be computed recursively. We obtain simple asymptotic formulas for 0- and 1-interaction structures. The simplest class of interaction structures are the 0-interaction structures, which represent the two backbone analogues of secondary structures.

  17. Tapping the RNA world for therapeutics.

    Science.gov (United States)

    Lieberman, Judy

    2018-04-16

    A recent revolution in RNA biology has led to the identification of new RNA classes with unanticipated functions, new types of RNA modifications, an unexpected multiplicity of alternative transcripts and widespread transcription of extragenic regions. This development in basic RNA biology has spawned a corresponding revolution in RNA-based strategies to generate new types of therapeutics. Here, I review RNA-based drug design and discuss barriers to broader applications and possible ways to overcome them. Because they target nucleic acids rather than proteins, RNA-based drugs promise to greatly extend the domain of 'druggable' targets beyond what can be achieved with small molecules and biologics.

  18. RNA-Based Vaccines in Cancer Immunotherapy

    Directory of Open Access Journals (Sweden)

    Megan A. McNamara

    2015-01-01

    Full Text Available RNA vaccines traditionally consist of messenger RNA synthesized by in vitro transcription using a bacteriophage RNA polymerase and template DNA that encodes the antigen(s of interest. Once administered and internalized by host cells, the mRNA transcripts are translated directly in the cytoplasm and then the resulting antigens are presented to antigen presenting cells to stimulate an immune response. Alternatively, dendritic cells can be loaded with either tumor associated antigen mRNA or total tumor RNA and delivered to the host to elicit a specific immune response. In this review, we will explain why RNA vaccines represent an attractive platform for cancer immunotherapy, discuss modifications to RNA structure that have been developed to optimize mRNA vaccine stability and translational efficiency, and describe strategies for nonviral delivery of mRNA vaccines, highlighting key preclinical and clinical data related to cancer immunotherapy.

  19. A Regulatory RNA Inducing Transgenerationally Inherited Phenotypes

    DEFF Research Database (Denmark)

    Jensen, Lea Møller

    . The variation in Arabidopsis enables different regulatory networks and mechanisms to shape the phenotypic characteristics. The thesis describes the identification of regulatory RNA encoded by an enzyme encoding gene. The RNA regulates by inducing transgenerationally inherited phenotypes. The function of the RNA...... is dependent on the genetic background illustrating that polymorphisms are found in either interactors or target genes of the RNA. Furthermore, the RNA provides a mechanistic link between accumulation of glucosinolate and onset of flowering....

  20. Screening of Modified RNA duplexes

    DEFF Research Database (Denmark)

    Schyth, Brian Dall; Bramsen, Jesper Bertram; Kjems, Jørgen

    protection against a fish pathogenic virus. This protection corresponded with an interferon response in the fish. Here we use this fish model to screen siRNAs containing various chemical modifications of the RNA backbone for their antiviral activity, the overall aim being identification of an siRNA form......Because of sequence specific gene targeting activity siRNAs are regarded as promising active compounds in gene medicine. But one serious problem with delivering siRNAs as treatment is the now well-established non-specific activities of some RNA duplexes. Cellular reactions towards double stranded...... RNAs include the 2´-5´ oligoadenylate synthetase system, the protein kinase R, RIG-I and Toll-like receptor activated pathways all resulting in antiviral defence mechanism. We have previously shown that antiviral innate immune reactions against double stranded RNAs could be detected in vivo as partial...

  1. TargetRNA: a tool for predicting targets of small RNA action in bacteria

    OpenAIRE

    Tjaden, Brian

    2008-01-01

    Many small RNA (sRNA) genes in bacteria act as posttranscriptional regulators of target messenger RNAs. Here, we present TargetRNA, a web tool for predicting mRNA targets of sRNA action in bacteria. TargetRNA takes as input a genomic sequence that may correspond to an sRNA gene. TargetRNA then uses a dynamic programming algorithm to search each annotated message in a specified genome for mRNAs that evince basepair-binding potential to the input sRNA sequence. Based on the calculated basepair-...

  2. RNA-dependent RNA polymerases from cowpea mosaic virus-infected cowpea leaves

    NARCIS (Netherlands)

    Dorssers, L.

    1983-01-01

    The aim of the research described in this thesis was the purification and identification of the RNA-dependent RNA polymerase engaged in replicating viral RNA in cowpea mosaic virus (CPMV)- infected cowpea leaves.

    Previously, an RNA-dependent RNA polymerase produced upon infection of

  3. RNA Study Using DNA Nanotechnology.

    Science.gov (United States)

    Tadakuma, Hisashi; Masubuchi, Takeya; Ueda, Takuya

    2016-01-01

    Transcription is one of the fundamental steps of gene expression, where RNA polymerases (RNAPs) bind to their template genes and make RNAs. In addition to RNAP and the template gene, many molecules such as transcription factors are involved. The interaction and the effect of these factors depend on the geometry. Molecular layout of these factors, RNAP and gene is thus important. DNA nanotechnology is a promising technology that allows controlling of the molecular layout in the range of nanometer to micrometer scale with nanometer resolution; thus, it is expected to expand the RNA study beyond the current limit. Copyright © 2016 Elsevier Inc. All rights reserved.

  4. Isolation of Microarray-Grade Total RNA, MicroRNA, and DNA from a Single PAXgene Blood RNA Tube

    DEFF Research Database (Denmark)

    Kruhøffer, Mogens; Andersen, Lars Dyrskjøt; Voss, Thorsten

    2007-01-01

    We have developed a procedure for isolation of microRNA and genomic DNA in addition to total RNA from whole blood stabilized in PAXgene Blood RNA tubes. The procedure is based on automatic extraction on a BioRobot MDx and includes isolation of DNA from a fraction of the stabilized blood...... and recovery of small RNA species that are otherwise lost. The procedure presented here is suitable for large-scale experiments and is amenable to further automation. Procured total RNA and DNA was tested using Affymetrix Expression and single-nucleotide polymorphism GeneChips, respectively, and isolated micro......RNA was tested using spotted locked nucleic acid-based microarrays. We conclude that the yield and quality of total RNA, microRNA, and DNA from a single PAXgene blood RNA tube is sufficient for downstream microarray analysis....

  5. microRNA-independent recruitment of Argonaute 1 to nanos mRNA through the Smaug RNA-binding protein.

    Science.gov (United States)

    Pinder, Benjamin D; Smibert, Craig A

    2013-01-01

    Argonaute (Ago) proteins are typically recruited to target messenger RNAs via an associated small RNA such as a microRNA (miRNA). Here, we describe a new mechanism of Ago recruitment through the Drosophila Smaug RNA-binding protein. We show that Smaug interacts with the Ago1 protein, and that Ago1 interacts with and is required for the translational repression of the Smaug target, nanos mRNA. The Ago1/nanos mRNA interaction does not require a miRNA, but it does require Smaug. Taken together, our data suggest a model whereby Smaug directly recruits Ago1 to nanos mRNA in a miRNA-independent manner, thereby repressing translation.

  6. Cyclophilin B stimulates RNA synthesis by the HCV RNA dependent RNA polymerase.

    Science.gov (United States)

    Heck, Julie A; Meng, Xiao; Frick, David N

    2009-04-01

    Cyclophilins are cellular peptidyl isomerases that have been implicated in regulating hepatitis C virus (HCV) replication. Cyclophilin B (CypB) is a target of cyclosporin A (CsA), an immunosuppressive drug recently shown to suppress HCV replication in cell culture. Watashi et al. recently demonstrated that CypB is important for efficient HCV replication, and proposed that it mediates the anti-HCV effects of CsA through an interaction with NS5B [Watashi K, Ishii N, Hijikata M, Inoue D, Murata T, Miyanari Y, et al. Cyclophilin B is a functional regulator of hepatitis C virus RNA polymerase. Mol Cell 2005;19:111-22]. We examined the effects of purified CypB proteins on the enzymatic activity of NS5B. Recombinant CypB purified from insect cells directly stimulated NS5B-catalyzed RNA synthesis. CypB increased RNA synthesis by NS5B derived from genotype 1a, 1b, and 2a HCV strains. Stimulation appears to arise from an increase in productive RNA binding. NS5B residue Pro540, a previously proposed target of CypB peptidyl-prolyl isomerase activity, is not required for stimulation of RNA synthesis.

  7. Role of CBCA in RNA biogenesis

    DEFF Research Database (Denmark)

    Iasillo, Claudia

    RNA transcription and RNA processing are key steps in eukaryotic gene expression, which includes, therefore, RNA synthesis by RNA polymerase enzymes and a range of modifications of the pre-mRNA before the transcript can leave the nucleus and reach the cytoplasm for translation. Interestingly......, a large body of evidence suggests that these RNA processing events occur often already during transcription. One of these modifications, the co-transcriptional 5’ end capping of a nascent RNA, is occurring specifically during RNA polymerase II (RNAPII) transcription. The 5’ cap exerts its role via...... the nuclear Cap Binding Complex (CBC). This thesis focuses on the protein ARS2, which binds the CBC to form the CBCA complex. CBCA can further associate with different proteins playing different roles in RNA metabolism. For example, CBCA binds the Nuclear Exosome Targeting Complex (NEXT), which...

  8. Hydration dependent dynamics in RNA

    International Nuclear Information System (INIS)

    Olsen, Greg L.; Bardaro, Michael F.; Echodu, Dorothy C.; Drobny, Gary P.; Varani, Gabriele

    2009-01-01

    The essential role played by local and collective motions in RNA function has led to a growing interest in the characterization of RNA dynamics. Recent investigations have revealed that even relatively simple RNAs experience complex motions over multiple time scales covering the entire ms-ps motional range. In this work, we use deuterium solid-state NMR to systematically investigate motions in HIV-1 TAR RNA as a function of hydration. We probe dynamics at three uridine residues in different structural environments ranging from helical to completely unrestrained. We observe distinct and substantial changes in 2 H solid-state relaxation times and lineshapes at each site as hydration levels increase. By comparing solid-state and solution state 13 C relaxation measurements, we establish that ns-μs motions that may be indicative of collective dynamics suddenly arise in the RNA as hydration reaches a critical point coincident with the onset of bulk hydration. Beyond that point, we observe smaller changes in relaxation rates and lineshapes in these highly hydrated solid samples, compared to the dramatic activation of motion occurring at moderate hydration

  9. RNA Editing in Plant Mitochondria

    Science.gov (United States)

    Hiesel, Rudolf; Wissinger, Bernd; Schuster, Wolfgang; Brennicke, Axel

    1989-12-01

    Comparative sequence analysis of genomic and complementary DNA clones from several mitochondrial genes in the higher plant Oenothera revealed nucleotide sequence divergences between the genomic and the messenger RNA-derived sequences. These sequence alterations could be most easily explained by specific post-transcriptional nucleotide modifications. Most of the nucleotide exchanges in coding regions lead to altered codons in the mRNA that specify amino acids better conserved in evolution than those encoded by the genomic DNA. Several instances show that the genomic arginine codon CGG is edited in the mRNA to the tryptophan codon TGG in amino acid positions that are highly conserved as tryptophan in the homologous proteins of other species. This editing suggests that the standard genetic code is used in plant mitochondria and resolves the frequent coincidence of CGG codons and tryptophan in different plant species. The apparently frequent and non-species-specific equivalency of CGG and TGG codons in particular suggests that RNA editing is a common feature of all higher plant mitochondria.

  10. Nucleocapsid-Independent Specific Viral RNA Packaging via Viral Envelope Protein and Viral RNA Signal

    OpenAIRE

    Narayanan, Krishna; Chen, Chun-Jen; Maeda, Junko; Makino, Shinji

    2003-01-01

    For any of the enveloped RNA viruses studied to date, recognition of a specific RNA packaging signal by the virus's nucleocapsid (N) protein is the first step described in the process of viral RNA packaging. In the murine coronavirus a selective interaction between the viral transmembrane envelope protein M and the viral ribonucleoprotein complex, composed of N protein and viral RNA containing a short cis-acting RNA element, the packaging signal, determines the selective RNA packaging into vi...

  11. Modular arrangement of regulatory RNA elements.

    Science.gov (United States)

    Roßmanith, Johanna; Narberhaus, Franz

    2017-03-04

    Due to their simple architecture and control mechanism, regulatory RNA modules are attractive building blocks in synthetic biology. This is especially true for riboswitches, which are natural ligand-binding regulators of gene expression. The discovery of various tandem riboswitches inspired the design of combined RNA modules with activities not yet found in nature. Riboswitches were placed in tandem or in combination with a ribozyme or temperature-responsive RNA thermometer resulting in new functionalities. Here, we compare natural examples of tandem riboswitches with recently designed artificial RNA regulators suggesting substantial modularity of regulatory RNA elements. Challenges associated with modular RNA design are discussed.

  12. MicroRNA Delivery for Regenerative Medicine

    OpenAIRE

    Peng, Bo; Chen, Yongming; Leong, Kam W.

    2015-01-01

    MicroRNA (miRNA) directs post-transcriptional regulation of a network of genes by targeting mRNA. Although relatively recent in development, many miRNAs direct differentiation of various stem cells including induced pluripotent stem cells (iPSCs), a major player in regenerative medicine. An effective and safe delivery of miRNA holds the key to translating miRNA technologies. Both viral and nonviral delivery systems have seen success in miRNA delivery, and each approach possesses advantages an...

  13. Viral RNA polymerase scanning and the gymnastics of Sendai virus RNA synthesis

    International Nuclear Information System (INIS)

    Kolakofsky, Daniel; Le Mercier, Philippe; Iseni, Frederic; Garcin, Dominique

    2004-01-01

    mRNA synthesis from nonsegmented negative-strand RNA virus (NNV) genomes is unique in that the genome RNA is embedded in an N protein assembly (the nucleocapsid) and the viral RNA polymerase does not dissociate from the template after release of each mRNA, but rather scans the genome RNA for the next gene-start site. A revised model for NNV RNA synthesis is presented, in which RNA polymerase scanning plays a prominent role. Polymerase scanning of the template is known to occur as the viral transcriptase negotiates gene junctions without falling off the template

  14. iDoRNA: An Interacting Domain-based Tool for Designing RNA-RNA Interaction Systems

    Directory of Open Access Journals (Sweden)

    Jittrawan Thaiprasit

    2016-03-01

    Full Text Available RNA-RNA interactions play a crucial role in gene regulation in living organisms. They have gained increasing interest in the field of synthetic biology because of their potential applications in medicine and biotechnology. However, few novel regulators based on RNA-RNA interactions with desired structures and functions have been developed due to the challenges of developing design tools. Recently, we proposed a novel tool, called iDoDe, for designing RNA-RNA interacting sequences by first decomposing RNA structures into interacting domains and then designing each domain using a stochastic algorithm. However, iDoDe did not provide an optimal solution because it still lacks a mechanism to optimize the design. In this work, we have further developed the tool by incorporating a genetic algorithm (GA to find an RNA solution with maximized structural similarity and minimized hybridized RNA energy, and renamed the tool iDoRNA. A set of suitable parameters for the genetic algorithm were determined and found to be a weighting factor of 0.7, a crossover rate of 0.9, a mutation rate of 0.1, and the number of individuals per population set to 8. We demonstrated the performance of iDoRNA in comparison with iDoDe by using six RNA-RNA interaction models. It was found that iDoRNA could efficiently generate all models of interacting RNAs with far more accuracy and required far less computational time than iDoDe. Moreover, we compared the design performance of our tool against existing design tools using forty-four RNA-RNA interaction models. The results showed that the performance of iDoRNA is better than RiboMaker when considering the ensemble defect, the fitness score and computation time usage. However, it appears that iDoRNA is outperformed by NUPACK and RNAiFold 2.0 when considering the ensemble defect. Nevertheless, iDoRNA can still be an useful alternative tool for designing novel RNA-RNA interactions in synthetic biology research. The source code of iDoRNA

  15. Comprehensive characterization of lncRNA-mRNA related ceRNA network across 12 major cancers

    Science.gov (United States)

    Feng, Li; Li, Feng; Sun, Zeguo; Wu, Tan; Shi, Xinrui; Li, Jing; Li, Xia

    2016-01-01

    Recent studies indicate that long noncoding RNAs (lncRNAs) can act as competing endogenous RNAs (ceRNAs) to indirectly regulate mRNAs through shared microRNAs, which represents a novel layer of RNA crosstalk and plays critical roles in the development of tumor. However, the global regulation landscape and characterization of these lncRNA related ceRNA crosstalk in cancers is still largely unknown. Here, we systematically characterized the lncRNA related ceRNA interactions across 12 major cancers and the normal physiological states by integrating multidimensional molecule profiles of more than 5000 samples. Our study suggest the large difference of ceRNA regulation between normal and tumor states and the higher similarity across similar tissue origin of tumors. The ceRNA related molecules have more conserved features in tumor networks and they play critical roles in both the normal and tumorigenesis processes. Besides, lncRNAs in the pan-cancer ceRNA network may be potential biomarkers of tumor. By exploring hub lncRNAs, we found that these conserved key lncRNAs dominate variable tumor hallmark processes across pan-cancers. Network dynamic analysis highlights the critical roles of ceRNA regulation in tumorigenesis. By analyzing conserved ceRNA interactions, we found that miRNA mediate ceRNA regulation showed different patterns across pan-cancer; while analyzing the cancer specific ceRNA interactions reveal that lncRNAs synergistically regulated tumor driver genes of cancer hallmarks. Finally, we found that ceRNA modules have the potential to predict patient survival. Overall, our study systematically dissected the lncRNA related ceRNA networks in pan-cancer that shed new light on understanding the molecular mechanism of tumorigenesis. PMID:27580177

  16. Application of Live-Cell RNA Imaging Techniques to the Study of Retroviral RNA Trafficking

    Directory of Open Access Journals (Sweden)

    Darrin V. Bann

    2012-06-01

    Full Text Available Retroviruses produce full-length RNA that serves both as a genomic RNA (gRNA, which is encapsidated into virus particles, and as an mRNA, which directs the synthesis of viral structural proteins. However, we are only beginning to understand the cellular and viral factors that influence trafficking of retroviral RNA and the selection of the RNA for encapsidation or translation. Live cell imaging studies of retroviral RNA trafficking have provided important insight into many aspects of the retrovirus life cycle including transcription dynamics, nuclear export of viral RNA, translational regulation, membrane targeting, and condensation of the gRNA during virion assembly. Here, we review cutting-edge techniques to visualize single RNA molecules in live cells and discuss the application of these systems to studying retroviral RNA trafficking.

  17. How the RNA isolation method can affect microRNA microarray results

    DEFF Research Database (Denmark)

    Podolska, Agnieszka; Kaczkowski, Bogumil; Litman, Thomas

    2011-01-01

    RNA microarray analysis on porcine brain tissue. One method is a phenol-guanidine isothiocyanate-based procedure that permits isolation of total RNA. The second method, miRVana™ microRNA isolation, is column based and recovers the small RNA fraction alone. We found that microarray analyses give different results...... that depend on the RNA fraction used, in particular because some microRNAs appear very sensitive to the RNA isolation method. We conclude that precautions need to be taken when comparing microarray studies based on RNA isolated with different methods.......The quality of RNA is crucial in gene expression experiments. RNA degradation interferes in the measurement of gene expression, and in this context, microRNA quantification can lead to an incorrect estimation. In the present study, two different RNA isolation methods were used to perform micro...

  18. Topology and prediction of RNA pseudoknots

    DEFF Research Database (Denmark)

    Reidys, Christian; Huang, Fenix; Andersen, Jørgen Ellegaard

    2011-01-01

    Motivation: Several dynamic programming algorithms for predicting RNA structures with pseudoknots have been proposed that differ dramatically from one another in the classes of structures considered. Results: Here, we use the natural topological classification of RNA structures in terms...

  19. RNA Structural Alignments, Part I

    DEFF Research Database (Denmark)

    Havgaard, Jakob Hull; Gorodkin, Jan

    2014-01-01

    Simultaneous alignment and secondary structure prediction of RNA sequences is often referred to as "RNA structural alignment." A class of the methods for structural alignment is based on the principles proposed by Sankoff more than 25 years ago. The Sankoff algorithm simultaneously folds and aligns...... is so high that it took more than a decade before the first implementation of a Sankoff style algorithm was published. However, with the faster computers available today and the improved heuristics used in the implementations the Sankoff-based methods have become practical. This chapter describes...... the methods based on the Sankoff algorithm. All the practical implementations of the algorithm use heuristics to make them run in reasonable time and memory. These heuristics are also described in this chapter....

  20. Fatgraph models of RNA structure

    Directory of Open Access Journals (Sweden)

    Huang Fenix

    2017-01-01

    Full Text Available In this review paper we discuss fatgraphs as a conceptual framework for RNA structures. We discuss various notions of coarse-grained RNA structures and relate them to fatgraphs.We motivate and discuss the main intuition behind the fatgraph model and showcase its applicability to canonical as well as noncanonical base pairs. Recent discoveries regarding novel recursions of pseudoknotted (pk configurations as well as their translation into context-free grammars for pk-structures are discussed. This is shown to allow for extending the concept of partition functions of sequences w.r.t. a fixed structure having non-crossing arcs to pk-structures. We discuss minimum free energy folding of pk-structures and combine these above results outlining how to obtain an inverse folding algorithm for PK structures.

  1. RNA

    African Journals Online (AJOL)

    SARAH

    30 nov. 2013 ... Keywords: FMNR, mode of management, re-greening, leadership, evolutionary trend. INTRODUCTION .... régénération : L'évolution de la densité des ligneux entre. 2005 et 2012 ..... la production et la qualité fourragères de la.

  2. Nonradioactive RNA mobility shift with chemiluminescent detection ...

    African Journals Online (AJOL)

    hesham

    RNA mobility shift is one among many procedures used to study RNA-protein interaction. Yet, there are some limitations for the radioactive RNA mobility shift including; 1) the risk of using radiolabeled nucleotides, 2) the long time to get the results; this could range from days to weeks, and 3) its high cost as compared to ...

  3. Optimization of chemiluminescent detection of mitochondrial RNA ...

    African Journals Online (AJOL)

    RNA mobility shift is one among many procedures used to study RNA-protein interaction. Yet, there are some limitations for the radioactive RNA mobility shift including; 1) the risk of using radiolabeled nucleotides, 2) the long time to get the results; this could range from days to weeks, and 3) its high cost as compared to ...

  4. RNA polymerase activity of Ustilago maydis virus

    Energy Technology Data Exchange (ETDEWEB)

    Yie, S.W.

    1986-01-01

    Ustilago maydis virus has an RNA polymerase enzyme which is associated with virion capsids. In the presence of Mg/sup 2 +/ ion and ribonucleotide triphosphate, the enzyme catalyzes the in vitro synthesis of mRNA by using dsRNA as a template. The products of the UmV RNA polymerase were both ssRNA and dsRNA. The dsRNA was determined by characteristic mobilities in gel electrophoresis, lack of sensitivity to RNase, and specific hybridization tests. The ssRNAs were identified by elution from a CF-11 column and by their RNase sensitivity. On the basis of the size of ssRNAs, it was concluded that partial transcripts were produced from H dsRNA segments, and full length transcripts were produced from M and L dsRNA segments. The following observations indicates that transcription occurs by strand displacement; (1) Only the positive strand of M2 dsRNA was labeled by the in vitro reaction. (2) The M2 dsRNA which had been labeled with /sup 32/''P-UTP in vitro could be chased from dsRNA with unlabeled UTP. The transcription products of three UmV strains were compared, and the overall pattern of transcription was very similar among them.

  5. Analysis of RNA metabolism in fission yeast

    DEFF Research Database (Denmark)

    Wise, Jo Ann; Nielsen, Olaf

    2017-01-01

    Here we focus on the biogenesis and function of messenger RNA (mRNA) in fission yeast cells. Following a general introduction that also briefly touches on other classes of RNA, we provide an overview of methods used to analyze mRNAs throughout their life cycles....

  6. Tospovirus : induction and suppression of RNA silencing

    NARCIS (Netherlands)

    Hedil, Marcio

    2016-01-01

    While infecting their hosts, viruses must deal with host immunity. In plants the antiviral RNA silencing pathway is an important part of plant innate immunity. Tospoviruses are segmented negative-stranded RNA viruses of plants. To counteract the antiviral RNA silencing response in plants,

  7. A Specific Hepatic Transfer RNA for Phosphoserine*

    Science.gov (United States)

    Mäenpää, Pekka H.; Bernfield, Merton R.

    1970-01-01

    Radioactive O-phosphoryl-L-serine was detected after alkaline deacylation of rat and rooster liver [3H]seryl-tRNA acylated in vitro with homologous synthetases. Ribonuclease treatment of this tRNA yielded a compound with the properties of phosphoseryl-adenosine. Benzoylated DEAE-cellulose chromatography of seryl-tRNA yielded four distinct peaks, only one of which contained phosphoserine. A unique fraction for phosphoserine was also found on chromatography of nonacylated tRNA. In ribosome binding studies, this fraction responded very slightly with poly(U,C), but not with any of the known serine trinucleotide codons. Substantial incorporation of [3H]-serine into protein from this tRNA species was observed in an aminoacyl-tRNA dependent polysomal system derived from chick oviducts. No phosphoserine was found in Escherichia coli or yeast seryl-tRNA acylated with homologous enzymes, nor in E. coli seryl-tRNA acylated with liver synthetase. In the absence of tRNA, free phosphoserine was not formed in reaction mixtures, which suggests that phosphoseryl-tRNA arises by phosphorylation of the unique seryl-tRNA species. These results demonstrate a discrete tRNASer species in rat and rooster liver containing phosphoserine and suggest that this tRNA is involved in ribosomal polypeptide synthesis. PMID:4943179

  8. Cisplatin Targeting of Bacterial Ribosomal RNA Hairpins

    Directory of Open Access Journals (Sweden)

    Gayani N. P. Dedduwa-Mudalige

    2015-09-01

    Full Text Available Cisplatin is a clinically important chemotherapeutic agent known to target purine bases in nucleic acids. In addition to major deoxyribonucleic acid (DNA intrastrand cross-links, cisplatin also forms stable adducts with many types of ribonucleic acid (RNA including siRNA, spliceosomal RNAs, tRNA, and rRNA. All of these RNAs play vital roles in the cell, such as catalysis of protein synthesis by rRNA, and therefore serve as potential drug targets. This work focused on platination of two highly conserved RNA hairpins from E. coli ribosomes, namely pseudouridine-modified helix 69 from 23S rRNA and the 790 loop of helix 24 from 16S rRNA. RNase T1 probing, MALDI mass spectrometry, and dimethyl sulfate mapping revealed platination at GpG sites. Chemical probing results also showed platination-induced RNA structural changes. These findings reveal solvent and structural accessibility of sites within bacterial RNA secondary structures that are functionally significant and therefore viable targets for cisplatin as well as other classes of small molecules. Identifying target preferences at the nucleotide level, as well as determining cisplatin-induced RNA conformational changes, is important for the design of more potent drug molecules. Furthermore, the knowledge gained through studies of RNA-targeting by cisplatin is applicable to a broad range of organisms from bacteria to human.

  9. Small catalytic RNA: Structure, function and application

    Energy Technology Data Exchange (ETDEWEB)

    Monforte, Joseph Albert [Univ. of California, Berkeley, CA (United States)

    1991-04-01

    We have utilized a combination of photochemical cross-linking techniques and site-directed mutagenesis to obtain secondary and tertiary structure information for the self-cleaving, self-ligating subsequence of RNA from the negative strand of Satellite Tobacco Ringspot Virus. We have found that the helical regions fold about a hinge to promoting four different possible tertiary interactions, creating a molecular of similar shape to a paperclip. A model suggesting that the ``paperclip`` and ``hammerhead`` RNAs share a similar three dimensional structure is proposed. We have used a self-cleaving RNA molecule related to a subsequence of plant viroids, a ``hammerhead,`` to study the length-dependent folding of RNA produced during transcription by RNA polymerase. We have used this method to determine the length of RNA sequestered within elongating E. coli and T7 RNA polymerase complexes. The data show that for E. coli RNA polymerase 121±s are sequestered within the ternary complex, which is consistent with the presence of an RNA-DNA hybrid within the transcription bubble, as proposed by others. The result for T7 RNA polymerase differs from E. coli RNA polymerase, with only 10{plus_minus}1 nucleotides sequestered within the ternary complex, setting a new upper limit for the minimum RNA-DNA required for a stable elongating complex. Comparisons between E. coli and T7 RNA polymerase are made. The relevance of the results to models or transcription termination, abortive initiation, and initiation to elongation mode transitions are discussed.

  10. Supplementary data: Materials and methods RNA expression ...

    Indian Academy of Sciences (India)

    ritt8

    Supplementary data: Materials and methods. RNA expression analysis. Freshly collected tissue was taken in TRIzol reagent for total RNA isolation according to the manufacturer's protocol. The cDNA synthesis was carried out in 1 μg total RNA using Random hexamer (Invitrogen, Carlsbad, USA) and Superscript III ...

  11. Regulatory RNAs derived from transfer RNA?

    Science.gov (United States)

    Pederson, Thoru

    2010-10-01

    Four recent studies suggest that cleavages of transfer RNAs generate products with microRNA-like features, with some evidence of function. If their regulatory functions were to be confirmed, these newly revealed RNAs would add to the expanding repertoire of small noncoding RNAs and would also provide new perspectives on the coevolution of transfer RNA and messenger RNA.

  12. Regulatory BC1 RNA in Cognitive Control

    Science.gov (United States)

    Iacoangeli, Anna; Dosunmu, Aderemi; Eom, Taesun; Stefanov, Dimitre G.; Tiedge, Henri

    2017-01-01

    Dendritic regulatory BC1 RNA is a non-protein-coding (npc) RNA that operates in the translational control of gene expression. The absence of BC1 RNA in BC1 knockout (KO) animals causes translational dysregulation that entails neuronal phenotypic alterations including prolonged epileptiform discharges, audiogenic seizure activity in vivo, and…

  13. Primer-dependent and primer-independent initiation of double stranded RNA synthesis by purified arabidopsis RNA-dependent RNA polymerases RDR2 and RDR6

    DEFF Research Database (Denmark)

    Devert, Anthony; Fabre, Nicolas; Floris, Maina Huguette Joséphine

    2015-01-01

    ) targeted by RNA silencing. The dsRNA is subsequently cleaved by the ribonuclease DICER-like into secondary small interfering RNAs (siRNAs) that reinforce and/or maintain the silenced state of the target RNA. Models of RNA silencing propose that RDRs could use primer-independent and primer......Cellular RNA-dependent RNA polymerases (RDRs) are fundamental components of RNA silencing in plants and many other eukaryotes. In Arabidopsis thaliana genetic studies have demonstrated that RDR2 and RDR6 are involved in the synthesis of double stranded RNA (dsRNA) from single stranded RNA (ssRNA......-dependent initiation to generate dsRNA from a transcript targeted by primary siRNA or microRNA (miRNA). However, the biochemical activities of RDR proteins are still partly understood. Here, we obtained active recombinant RDR2 and RDR6 in a purified form. We demonstrate that RDR2 and RDR6 have primer...

  14. Effective Anti-miRNA Oligonucleotides Show High Releasing Rate of MicroRNA from RNA-Induced Silencing Complex.

    Science.gov (United States)

    Ariyoshi, Jumpei; Matsuyama, Yohei; Kobori, Akio; Murakami, Akira; Sugiyama, Hiroshi; Yamayoshi, Asako

    2017-10-01

    MicroRNAs (miRNAs) regulate gene expression by forming RNA-induced silencing complexes (RISCs) and have been considered as promising therapeutic targets. MiRNA is an essential component of RISC for the modulation of gene expression. Therefore, the release of miRNA from RISC is considered as an effective method for the inhibition of miRNA functions. In our previous study, we reported that anti-miRNA oligonucleotides (AMOs), which are composed of the 2'-O-methyl (2'-OMe) RNA, could induce the release of miRNA from RISC. However, the mechanisms underlying the miRNA-releasing effects of chemically modified AMOs, which are conventionally used as anti-cancer drugs, are still unclear. In this study, we investigated the relationship between the miRNA releasing rate from RISC and the inhibitory effect on RISC activity (IC 50 ) using conventional chemically modified AMOs. We demonstrated that the miRNA-releasing effects of AMOs are directly proportional to the IC 50 values, and AMOs, which have an ability to promote the release of miRNA from RISC, can effectively inhibit RISC activity in living cells.

  15. PhishScore: Hacking Phishers' Minds

    OpenAIRE

    Marchal, Samuel; François, Jérôme; State, Radu; Engel, Thomas

    2014-01-01

    Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inefficient due to the short lifetime of phishing Web sites, making recent approaches relying on real-time or proactive phishing URLs detection techniques more appropriate. In this paper we introduce PhishScore, an automated real-time phishing detection system. We observed that phishing URLs usually have fe...

  16. Bromus interruptus (Hack.) Druce (Poaceae) in Nederland

    NARCIS (Netherlands)

    Rich, Tim C.G.

    2001-01-01

    Bromus interruptus is a grass which was endemic to England but is now extinct in the wild. Attention is drawn to the two historic records from the Netherlands, where it was probably introduced with agricultural seed, in case it still survives in the wild. It is readily recognised from the contracted

  17. Hacking 360 Link: A hybrid approach

    Directory of Open Access Journals (Sweden)

    John Durno

    2012-10-01

    Full Text Available When the University of Victoria Libraries switched from a locally-hosted link resolver (SFX to a vendor-hosted link resolver (360Link, new strategies were required to effectively integrate the vendor-hosted link resolver with the Libraries' other systems and services. Custom javascript is used to add links to the 360Link page; these links then point at local PHP code running on UVic servers, which can then redirect to appropriate local service or display a form directly. An open source PHP OpenURL parser class is announced. Consideration is given to the importance of maintaining open protocols and standards in the transition to vendor-hosted services.

  18. Hacking Experiment Using USB Rubber Ducky Scripting

    Directory of Open Access Journals (Sweden)

    Benjamin Cannoles

    2017-04-01

    Full Text Available By leaving your computer unlocked while you are away for seconds can give hackers all the time they need to obtain your personal information from your computer. This paper aims to detail the necessary research and development of a USB Rubber Ducky script, to obtain clear text logon id and passwords from a Windows machine, in mere seconds. Each stage is laid out in sections discussing Ducky script, powershell, Mimikatz, and reenabling the vulnerability by breaking down the attack into two parts for Windows 7 and up operating systems.

  19. Hacking the social life of Big Data

    Directory of Open Access Journals (Sweden)

    Jennifer Pybus

    2015-11-01

    Full Text Available This paper builds off the Our Data Ourselves research project, which examined ways of understanding and reclaiming the data that young people produce on smartphone devices. Here we explore the growing usage and centrality of mobiles in the lives of young people, questioning what data-making possibilities exist if users can either uncover and/or capture what data controllers such as Facebook monetize and share about themselves with third-parties. We outline the MobileMiner, an app we created to consider how gaining access to one’s own data not only augments the agency of the individual but of the collective user. Finally, we discuss the data making that transpired during our hackathon. Such interventions in the enclosed processes of datafication are meant as a preliminary investigation into the possibilities that arise when young people are given back the data which they are normally structurally precluded from accessing.

  20. Hacking Europe: from computer cultures to Demoscenes

    NARCIS (Netherlands)

    Alberts, G.; Oldenziel, R.

    2014-01-01

    Describes how local hacker communities across Europe appropriated the computer and forged new cultures around it. Explores the mediating actors instrumental in introducing and spreading the cultures of computing around Europe. Highlights the role of mischief, humor, and play in hacker culture.

  1. Hacking DNA copy number for circuit engineering.

    Science.gov (United States)

    Wu, Feilun; You, Lingchong

    2017-07-27

    DNA copy number represents an essential parameter in the dynamics of synthetic gene circuits but typically is not explicitly considered. A new study demonstrates how dynamic control of DNA copy number can serve as an effective strategy to program robust oscillations in gene expression circuits.

  2. Hacking control systems, switching… accelerators off?

    CERN Multimedia

    Computer Security Team

    2013-01-01

    In response to our article in the last Bulletin, we received the following comment: “Wasn’t Stuxnet designed to stop the Iranian nuclear programme? Why then all this noise with regard to CERN accelerators? Don’t you realize that ‘computer security’ is not the raison d'être of CERN?”. Thank you for this golden opportunity to delve into this issue.   Given the sophistication of Stuxnet, it might have been hard to detect such a targeted attack against CERN, if at all. But this is not the point. There are much simpler risks for our accelerator complex and infrastructure. And, while “‘computer security’ is [indeed] not the raison d' être”, it is our collective responsibility to keep this risk at bay.   Examples? Just think of a simple computer virus infecting Windows-based control PCs connected to the accelerator network (the Technical Network, &ld...

  3. Cognitive Hacking and Digital Government: Digital Identity

    OpenAIRE

    Paul Thompson

    2004-01-01

    Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation syst...

  4. The news machine hacking, the untold story

    CERN Document Server

    Hanning, James

    2014-01-01

    There is one mystery figure at the heart of ?Hackergate' ? Glenn Mulcaire, the News of the World's top private investigator. The former AFC Wimbledon footballer has never spoken publicly or in court about his work investigating and backing up front-page news stories (such as the News of the World's award-winning David Beckham scoop). Mulcaire's arrest in 2006 for intercepting royal-household phone messages barely registered at the time. Yet his work has continued to generate headlines and embarrassment for the establishment ? with a Prime Minister on the back foot after his former aide Andy

  5. A COMPREHENSIVE STUDY ON ETHICAL HACKING

    OpenAIRE

    Suriya Begum*, Sujeeth Kumar, Ashhar

    2016-01-01

    Explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Go...

  6. Hacking control systems, switching lights off!

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Have you ever heard about “Stuxnet”? “Stuxnet” was a very sophisticated cyber-attack against the Iranian nuclear programme. Like in a spy movie, the attackers infiltrated the uranium enrichment plant at Natanz, arranged for infected USB sticks to be inserted into local PCs, and then the USB viruses did the rest.   Not only did the virus employ four distinct - so far unknown - weaknesses in the Windows operating system, but each weakness could have been sold on the underground market for up to $250,000 each. The virus was targeted to disrupt Iran's uranium production. At first, it scanned the infected PCs for dedicated SCADA (Supervisory Control and Data Acquisition) software from Siemens. Once the virus hit upon that software, it tried to identify any control system components, i.e. so-called PLCs (programmable logic controllers), attached to that PC. If the PLC matched a certain brand (Siemens S7) and configuration, the virus downloaded additi...

  7. Diverging affinity of tospovirus RNA silencing suppressor proteins, NSs, for various RNA duplex molecules.

    Science.gov (United States)

    Schnettler, Esther; Hemmes, Hans; Huismann, Rik; Goldbach, Rob; Prins, Marcel; Kormelink, Richard

    2010-11-01

    The tospovirus NSs protein was previously shown to suppress the antiviral RNA silencing mechanism in plants. Here the biochemical analysis of NSs proteins from different tospoviruses, using purified NSs or NSs containing cell extracts, is described. The results showed that all tospoviral NSs proteins analyzed exhibited affinity to small double-stranded RNA molecules, i.e., small interfering RNAs (siRNAs) and micro-RNA (miRNA)/miRNA* duplexes. Interestingly, the NSs proteins from tomato spotted wilt virus (TSWV), impatiens necrotic spot virus (INSV), and groundnut ringspot virus (GRSV) also showed affinity to long double-stranded RNA (dsRNA), whereas tomato yellow ring virus (TYRV) NSs did not. The TSWV NSs protein was shown to be capable of inhibiting Dicer-mediated cleavage of long dsRNA in vitro. In addition, it suppressed the accumulation of green fluorescent protein (GFP)-specific siRNAs during coinfiltration with an inverted-repeat-GFP RNA construct in Nicotiana benthamiana. In vivo interference of TSWV NSs in the miRNA pathway was shown by suppression of an enhanced GFP (eGFP) miRNA sensor construct. The ability to stabilize miRNA/miRNA* by different tospovirus NSs proteins in vivo was demonstrated by increased accumulation and detection of both miRNA171c and miRNA171c* in tospovirus-infected N. benthamiana. All together, these data suggest that tospoviruses interfere in the RNA silencing pathway by sequestering siRNA and miRNA/miRNA* molecules before they are uploaded into their respective RNA-induced silencing complexes. The observed affinity to long dsRNA for only a subset of the tospoviruses studied is discussed in light of evolutional divergence and their ancestral relation to the animal-infecting members of the Bunyaviridae.

  8. Targeted CRISPR disruption reveals a role for RNase MRP RNA in human preribosomal RNA processing.

    Science.gov (United States)

    Goldfarb, Katherine C; Cech, Thomas R

    2017-01-01

    MRP RNA is an abundant, essential noncoding RNA whose functions have been proposed in yeast but are incompletely understood in humans. Mutations in the genomic locus for MRP RNA cause pleiotropic human diseases, including cartilage hair hypoplasia (CHH). Here we applied CRISPR-Cas9 genome editing to disrupt the endogenous human MRP RNA locus, thereby attaining what has eluded RNAi and RNase H experiments: elimination of MRP RNA in the majority of cells. The resulting accumulation of ribosomal RNA (rRNA) precursor-analyzed by RNA fluorescent in situ hybridization (FISH), Northern blots, and RNA sequencing-implicates MRP RNA in pre-rRNA processing. Amelioration of pre-rRNA imbalance is achieved through rescue of MRP RNA levels by ectopic expression. Furthermore, affinity-purified MRP ribonucleoprotein (RNP) from HeLa cells cleaves the human pre-rRNA in vitro at at least one site used in cells, while RNP isolated from cells with CRISPR-edited MRP loci loses this activity, and ectopic MRP RNA expression restores cleavage activity. Thus, a role for RNase MRP in human pre-rRNA processing is established. As demonstrated here, targeted CRISPR disruption is a valuable tool for functional studies of essential noncoding RNAs that are resistant to RNAi and RNase H-based degradation. © 2017 Goldfarb and Cech; Published by Cold Spring Harbor Laboratory Press.

  9. The early history of tRNA recognition by aminoacyl-tRNA synthetases

    Indian Academy of Sciences (India)

    Madhu

    2006-10-04

    Oct 4, 2006 ... Discovery of aminoacyl-tRNA synthetases and importance ... The pioneering work of Fritz Lipmann on the high-energy ... the peculiar structural and functional relationships tRNAs ... a bulk of only 20 families of tRNA molecules in contrast ...... balance of tRNA and aminoacyl-tRNA synthetase; Science 242.

  10. Cooperation of an RNA Packaging Signal and a Viral Envelope Protein in Coronavirus RNA Packaging

    OpenAIRE

    Narayanan, Krishna; Makino, Shinji

    2001-01-01

    Murine coronavirus mouse hepatitis virus (MHV) produces a genome-length mRNA, mRNA 1, and six or seven species of subgenomic mRNAs in infected cells. Among these mRNAs, only mRNA 1 is efficiently packaged into MHV particles. MHV N protein binds to all MHV mRNAs, whereas envelope M protein interacts only with mRNA 1. This M protein-mRNA 1 interaction most probably determines the selective packaging of mRNA 1 into MHV particles. A short cis-acting MHV RNA packaging signal is necessary and suffi...

  11. Sequence analysis of RNase MRP RNA reveals its origination from eukaryotic RNase P RNA

    Science.gov (United States)

    Zhu, Yanglong; Stribinskis, Vilius; Ramos, Kenneth S.; Li, Yong

    2006-01-01

    RNase MRP is a eukaryote-specific endoribonuclease that generates RNA primers for mitochondrial DNA replication and processes precursor rRNA. RNase P is a ubiquitous endoribonuclease that cleaves precursor tRNA transcripts to produce their mature 5′ termini. We found extensive sequence homology of catalytic domains and specificity domains between their RNA subunits in many organisms. In Candida glabrata, the internal loop of helix P3 is 100% conserved between MRP and P RNAs. The helix P8 of MRP RNA from microsporidia Encephalitozoon cuniculi is identical to that of P RNA. Sequence homology can be widely spread over the whole molecule of MRP RNA and P RNA, such as those from Dictyostelium discoideum. These conserved nucleotides between the MRP and P RNAs strongly support the hypothesis that the MRP RNA is derived from the P RNA molecule in early eukaryote evolution. PMID:16540690

  12. RNA polymerase II mediated transcription from the polymerase III promoters in short hairpin RNA expression vector

    International Nuclear Information System (INIS)

    Rumi, Mohammad; Ishihara, Shunji; Aziz, Monowar; Kazumori, Hideaki; Ishimura, Norihisa; Yuki, Takafumi; Kadota, Chikara; Kadowaki, Yasunori; Kinoshita, Yoshikazu

    2006-01-01

    RNA polymerase III promoters of human ribonuclease P RNA component H1, human U6, and mouse U6 small nuclear RNA genes are commonly used in short hairpin RNA (shRNA) expression vectors due their precise initiation and termination sites. During transient transfection of shRNA vectors, we observed that H1 or U6 promoters also express longer transcripts enough to express several reporter genes including firefly luciferase, green fluorescent protein EGFP, and red fluorescent protein JRed. Expression of such longer transcripts was augmented by upstream RNA polymerase II enhancers and completely inhibited by downstream polyA signal sequences. Moreover, the transcription of firefly luciferase from human H1 promoter was sensitive to RNA polymerase II inhibitor α-amanitin. Our findings suggest that commonly used polymerase III promoters in shRNA vectors are also prone to RNA polymerase II mediated transcription, which may have negative impacts on their targeted use

  13. Using RNA Interference to Study Protein Function

    OpenAIRE

    Curtis, Carol D.; Nardulli, Ann M.

    2009-01-01

    RNA interference can be extremely useful in determining the function of an endogenously-expressed protein in its normal cellular environment. In this chapter, we describe a method that uses small interfering RNA (siRNA) to knock down mRNA and protein expression in cultured cells so that the effect of a putative regulatory protein on gene expression can be delineated. Methods of assessing the effectiveness of the siRNA procedure using real time quantitative PCR and Western analysis are also in...

  14. Analysis of extracellular RNA by digital PCR

    Directory of Open Access Journals (Sweden)

    Kenji eTakahashi

    2014-06-01

    Full Text Available The transfer of extracellular RNA is emerging as an important mechanism for intracellular communication. The ability for the transfer of functionally active RNA molecules from one cell to another within vesicles such as exosomes enables a cell to modulate cellular signaling and biological processes within recipient cells. The study of extracellular RNA requires sensitive methods for the detection of these molecules. In this methods article, we will describe protocols for the detection of such extracellular RNA using sensitive detection technologies such as digital PCR. These protocols should be valuable to researchers interested in the role and contribution of extracellular RNA to tumor cell biology.

  15. Characteristics and Prediction of RNA Structure

    Directory of Open Access Journals (Sweden)

    Hengwu Li

    2014-01-01

    Full Text Available RNA secondary structures with pseudoknots are often predicted by minimizing free energy, which is NP-hard. Most RNAs fold during transcription from DNA into RNA through a hierarchical pathway wherein secondary structures form prior to tertiary structures. Real RNA secondary structures often have local instead of global optimization because of kinetic reasons. The performance of RNA structure prediction may be improved by considering dynamic and hierarchical folding mechanisms. This study is a novel report on RNA folding that accords with the golden mean characteristic based on the statistical analysis of the real RNA secondary structures of all 480 sequences from RNA STRAND, which are validated by NMR or X-ray. The length ratios of domains in these sequences are approximately 0.382L, 0.5L, 0.618L, and L, where L is the sequence length. These points are just the important golden sections of sequence. With this characteristic, an algorithm is designed to predict RNA hierarchical structures and simulate RNA folding by dynamically folding RNA structures according to the above golden section points. The sensitivity and number of predicted pseudoknots of our algorithm are better than those of the Mfold, HotKnots, McQfold, ProbKnot, and Lhw-Zhu algorithms. Experimental results reflect the folding rules of RNA from a new angle that is close to natural folding.

  16. siRNA and innate immunity.

    Science.gov (United States)

    Robbins, Marjorie; Judge, Adam; MacLachlan, Ian

    2009-06-01

    Canonical small interfering RNA (siRNA) duplexes are potent activators of the mammalian innate immune system. The induction of innate immunity by siRNA is dependent on siRNA structure and sequence, method of delivery, and cell type. Synthetic siRNA in delivery vehicles that facilitate cellular uptake can induce high levels of inflammatory cytokines and interferons after systemic administration in mammals and in primary human blood cell cultures. This activation is predominantly mediated by immune cells, normally via a Toll-like receptor (TLR) pathway. The siRNA sequence dependency of these pathways varies with the type and location of the TLR involved. Alternatively nonimmune cell activation may also occur, typically resulting from siRNA interaction with cytoplasmic RNA sensors such as RIG1. As immune activation by siRNA-based drugs represents an undesirable side effect due to the considerable toxicities associated with excessive cytokine release in humans, understanding and abrogating this activity will be a critical component in the development of safe and effective therapeutics. This review describes the intracellular mechanisms of innate immune activation by siRNA, the design of appropriate sequences and chemical modification approaches, and suitable experimental methods for studying their effects, with a view toward reducing siRNA-mediated off-target effects.

  17. TruSeq Stranded mRNA and Total RNA Sample Preparation Kits

    Science.gov (United States)

    Total RNA-Seq enabled by ribosomal RNA (rRNA) reduction is compatible with formalin-fixed paraffin embedded (FFPE) samples, which contain potentially critical biological information. The family of TruSeq Stranded Total RNA sample preparation kits provides a unique combination of unmatched data quality for both mRNA and whole-transcriptome analyses, robust interrogation of both standard and low-quality samples and workflows compatible with a wide range of study designs.

  18. MysiRNA-designer: a workflow for efficient siRNA design.

    Directory of Open Access Journals (Sweden)

    Mohamed Mysara

    Full Text Available The design of small interfering RNA (siRNA is a multi factorial problem that has gained the attention of many researchers in the area of therapeutic and functional genomics. MysiRNA score was previously introduced that improves the correlation of siRNA activity prediction considering state of the art algorithms. In this paper, a new program, MysiRNA-Designer, is described which integrates several factors in an automated work-flow considering mRNA transcripts variations, siRNA and mRNA target accessibility, and both near-perfect and partial off-target matches. It also features the MysiRNA score, a highly ranked correlated siRNA efficacy prediction score for ranking the designed siRNAs, in addition to top scoring models Biopredsi, DISR, Thermocomposition21 and i-Score, and integrates them in a unique siRNA score-filtration technique. This multi-score filtration layer filters siRNA that passes the 90% thresholds calculated from experimental dataset features. MysiRNA-Designer takes an accession, finds conserved regions among its transcript space, finds accessible regions within the mRNA, designs all possible siRNAs for these regions, filters them based on multi-scores thresholds, and then performs SNP and off-target filtration. These strict selection criteria were tested against human genes in which at least one active siRNA was designed from 95.7% of total genes. In addition, when tested against an experimental dataset, MysiRNA-Designer was found capable of rejecting 98% of the false positive siRNAs, showing superiority over three state of the art siRNA design programs. MysiRNA is a freely accessible (Microsoft Windows based desktop application that can be used to design siRNA with a high accuracy and specificity. We believe that MysiRNA-Designer has the potential to play an important role in this area.

  19. 5S rRNA and ribosome.

    Science.gov (United States)

    Gongadze, G M

    2011-12-01

    5S rRNA is an integral component of the ribosome of all living organisms. It is known that the ribosome without 5S rRNA is functionally inactive. However, the question about the specific role of this RNA in functioning of the translation apparatus is still open. This review presents a brief history of the discovery of 5S rRNA and studies of its origin and localization in the ribosome. The previously expressed hypotheses about the role of this RNA in the functioning of the ribosome are discussed considering the unique location of 5S rRNA in the ribosome and its intermolecular contacts. Based on analysis of the current data on ribosome structure and its functional complexes, the role of 5S rRNA as an intermediary between ribosome functional domains is discussed.

  20. Kin Selection in the RNA World.

    Science.gov (United States)

    Levin, Samuel R; West, Stuart A

    2017-12-05

    Various steps in the RNA world required cooperation. Why did life's first inhabitants, from polymerases to synthetases, cooperate? We develop kin selection models of the RNA world to answer these questions. We develop a very simple model of RNA cooperation and then elaborate it to model three relevant issues in RNA biology: (1) whether cooperative RNAs receive the benefits of cooperation; (2) the scale of competition in RNA populations; and (3) explicit replicator diffusion and survival. We show: (1) that RNAs are likely to express partial cooperation; (2) that RNAs will need mechanisms for overcoming local competition; and (3) in a specific example of RNA cooperation, persistence after replication and offspring diffusion allow for cooperation to overcome competition. More generally, we show how kin selection can unify previously disparate answers to the question of RNA world cooperation.

  1. MicroRNA and cancer

    DEFF Research Database (Denmark)

    Jansson, Martin D; Lund, Anders H

    2012-01-01

    biological phenomena and pathologies. The best characterized non-coding RNA family consists in humans of about 1400 microRNAs for which abundant evidence have demonstrated fundamental importance in normal development, differentiation, growth control and in human diseases such as cancer. In this review, we...... summarize the current knowledge and concepts concerning the involvement of microRNAs in cancer, which have emerged from the study of cell culture and animal model systems, including the regulation of key cancer-related pathways, such as cell cycle control and the DNA damage response. Importantly, micro...

  2. RNA2DMut: a web tool for the design and analysis of RNA structure mutations.

    Science.gov (United States)

    Moss, Walter N

    2018-03-01

    With the widespread application of high-throughput sequencing, novel RNA sequences are being discovered at an astonishing rate. The analysis of function, however, lags behind. In both the cis - and trans -regulatory functions of RNA, secondary structure (2D base-pairing) plays essential regulatory roles. In order to test RNA function, it is essential to be able to design and analyze mutations that can affect structure. This was the motivation for the creation of the RNA2DMut web tool. With RNA2DMut, users can enter in RNA sequences to analyze, constrain mutations to specific residues, or limit changes to purines/pyrimidines. The sequence is analyzed at each base to determine the effect of every possible point mutation on 2D structure. The metrics used in RNA2DMut rely on the calculation of the Boltzmann structure ensemble and do not require a robust 2D model of RNA structure for designing mutations. This tool can facilitate a wide array of uses involving RNA: for example, in designing and evaluating mutants for biological assays, interrogating RNA-protein interactions, identifying key regions to alter in SELEX experiments, and improving RNA folding and crystallization properties for structural biology. Additional tools are available to help users introduce other mutations (e.g., indels and substitutions) and evaluate their effects on RNA structure. Example calculations are shown for five RNAs that require 2D structure for their function: the MALAT1 mascRNA, an influenza virus splicing regulatory motif, the EBER2 viral noncoding RNA, the Xist lncRNA repA region, and human Y RNA 5. RNA2DMut can be accessed at https://rna2dmut.bb.iastate.edu/. © 2018 Moss; Published by Cold Spring Harbor Laboratory Press for the RNA Society.

  3. RNA versatility, flexibility, and thermostability for practice in RNA nanotechnology and biomedical applications.

    Science.gov (United States)

    Haque, Farzin; Pi, Fengmei; Zhao, Zhengyi; Gu, Shanqing; Hu, Haibo; Yu, Hang; Guo, Peixuan

    2018-01-01

    In recent years, RNA has attracted widespread attention as a unique biomaterial with distinct biophysical properties for designing sophisticated architectures in the nanometer scale. RNA is much more versatile in structure and function with higher thermodynamic stability compared to its nucleic acid counterpart DNA. Larger RNA molecules can be viewed as a modular structure built from a combination of many 'Lego' building blocks connected via different linker sequences. By exploiting the diversity of RNA motifs and flexibility of structure, varieties of RNA architectures can be fabricated with precise control of shape, size, and stoichiometry. Many structural motifs have been discovered and characterized over the years and the crystal structures of many of these motifs are available for nanoparticle construction. For example, using the flexibility and versatility of RNA structure, RNA triangles, squares, pentagons, and hexagons can be constructed from phi29 pRNA three-way-junction (3WJ) building block. This review will focus on 2D RNA triangles, squares, and hexamers; 3D and 4D structures built from basic RNA building blocks; and their prospective applications in vivo as imaging or therapeutic agents via specific delivery and targeting. Methods for intracellular cloning and expression of RNA molecules and the in vivo assembly of RNA nanoparticles will also be reviewed. WIREs RNA 2018, 9:e1452. doi: 10.1002/wrna.1452 This article is categorized under: RNA Methods > RNA Nanotechnology RNA Structure and Dynamics > RNA Structure, Dynamics and Chemistry RNA in Disease and Development > RNA in Disease Regulatory RNAs/RNAi/Riboswitches > Regulatory RNAs. © 2017 Wiley Periodicals, Inc.

  4. Evaluation of microRNA alignment techniques

    Science.gov (United States)

    Kaspi, Antony; El-Osta, Assam

    2016-01-01

    Genomic alignment of small RNA (smRNA) sequences such as microRNAs poses considerable challenges due to their short length (∼21 nucleotides [nt]) as well as the large size and complexity of plant and animal genomes. While several tools have been developed for high-throughput mapping of longer mRNA-seq reads (>30 nt), there are few that are specifically designed for mapping of smRNA reads including microRNAs. The accuracy of these mappers has not been systematically determined in the case of smRNA-seq. In addition, it is unknown whether these aligners accurately map smRNA reads containing sequence errors and polymorphisms. By using simulated read sets, we determine the alignment sensitivity and accuracy of 16 short-read mappers and quantify their robustness to mismatches, indels, and nontemplated nucleotide additions. These were explored in the context of a plant genome (Oryza sativa, ∼500 Mbp) and a mammalian genome (Homo sapiens, ∼3.1 Gbp). Analysis of simulated and real smRNA-seq data demonstrates that mapper selection impacts differential expression results and interpretation. These results will inform on best practice for smRNA mapping and enable more accurate smRNA detection and quantification of expression and RNA editing. PMID:27284164

  5. MicroRNA mimicry blocks pulmonary fibrosis

    Science.gov (United States)

    Montgomery, Rusty L; Yu, Guoying; Latimer, Paul A; Stack, Christianna; Robinson, Kathryn; Dalby, Christina M; Kaminski, Naftali; van Rooij, Eva

    2014-01-01

    Over the last decade, great enthusiasm has evolved for microRNA (miRNA) therapeutics. Part of the excitement stems from the fact that a miRNA often regulates numerous related mRNAs. As such, modulation of a single miRNA allows for parallel regulation of multiple genes involved in a particular disease. While many studies have shown therapeutic efficacy using miRNA inhibitors, efforts to restore or increase the function of a miRNA have been lagging behind. The miR-29 family has gained a lot of attention for its clear function in tissue fibrosis. This fibroblast-enriched miRNA family is downregulated in fibrotic diseases which induces a coordinate increase of many extracellular matrix genes. Here, we show that intravenous injection of synthetic RNA duplexes can increase miR-29 levels in vivo for several days. Moreover, therapeutic delivery of these miR-29 mimics during bleomycin-induced pulmonary fibrosis restores endogenous miR-29 function whereby decreasing collagen expression and blocking and reversing pulmonary fibrosis. Our data support the feasibility of using miRNA mimics to therapeutically increase miRNAs and indicate miR-29 to be a potent therapeutic miRNA for treating pulmonary fibrosis. PMID:25239947

  6. Modulation of RNA function by aminoglycoside antibiotics.

    Science.gov (United States)

    Schroeder, R; Waldsich, C; Wank, H

    2000-01-04

    One of the most important families of antibiotics are the aminoglycosides, including drugs such as neomycin B, paromomycin, gentamicin and streptomycin. With the discovery of the catalytic potential of RNA, these antibiotics became very popular due to their RNA-binding capacity. They serve for the analysis of RNA function as well as for the study of RNA as a potential therapeutic target. Improvements in RNA structure determination recently provided first insights into the decoding site of the ribosome at high resolution and how aminoglycosides might induce misreading of the genetic code. In addition to inhibiting prokaryotic translation, aminoglycosides inhibit several catalytic RNAs such as self-splicing group I introns, RNase P and small ribozymes in vitro. Furthermore, these antibiotics interfere with human immunodeficiency virus (HIV) replication by disrupting essential RNA-protein contacts. Most exciting is the potential of many RNA-binding antibiotics to stimulate RNA activities, conceiving small-molecule partners for the hypothesis of an ancient RNA world. SELEX (systematic evolution of ligands by exponential enrichment) has been used in this evolutionary game leading to small synthetic RNAs, whose NMR structures gave valuable information on how aminoglycosides interact with RNA, which could possibly be used in applied science.

  7. Movement of regulatory RNA between animal cells.

    Science.gov (United States)

    Jose, Antony M

    2015-07-01

    Recent studies suggest that RNA can move from one cell to another and regulate genes through specific base-pairing. Mechanisms that modify or select RNA for secretion from a cell are unclear. Secreted RNA can be stable enough to be detected in the extracellular environment and can enter the cytosol of distant cells to regulate genes. Mechanisms that import RNA into the cytosol of an animal cell can enable uptake of RNA from many sources including other organisms. This role of RNA is akin to that of steroid hormones, which cross cell membranes to regulate genes. The potential diagnostic use of RNA in human extracellular fluids has ignited interest in understanding mechanisms that enable the movement of RNA between animal cells. Genetic model systems will be essential to gain more confidence in proposed mechanisms of RNA transport and to connect an extracellular RNA with a specific biological function. Studies in the worm C. elegans and in other animals have begun to reveal parts of this novel mechanism of cell-to-cell communication. Here, I summarize the current state of this nascent field, highlight the many unknowns, and suggest future directions. © 2015 Wiley Periodicals, Inc.

  8. Comparison of protocols and RNA carriers for plasma miRNA isolation. Unraveling RNA carrier influence on miRNA isolation

    Science.gov (United States)

    Martos, Laura; Fernández-Pardo, Álvaro; Oto, Julia; Medina, Pilar; España, Francisco; Navarro, Silvia

    2017-01-01

    microRNAs are promising biomarkers in biological fluids in several diseases. Different plasma RNA isolation protocols and carriers are available, but their efficiencies have been scarcely compared. Plasma microRNAs were isolated using a phenol and column-based procedure and a column-based procedure, in the presence or absence of two RNA carriers (yeast RNA and MS2 RNA). We evaluated the presence of PCR inhibitors and the relative abundance of certain microRNAs by qRT-PCR. Furthermore, we analyzed the association between different isolation protocols, the relative abundance of the miRNAs in the sample, the GC content and the free energy of microRNAs. In all microRNAs analyzed, the addition of yeast RNA as a carrier in the different isolation protocols used gave lower raw Cq values, indicating higher microRNA recovery. Moreover, this increase in microRNAs recovery was dependent on their own relative abundance in the sample, their GC content and the free-energy of their own most stable secondary structure. Furthermore, the normalization of microRNA levels by an endogenous microRNA is more reliable than the normalization by plasma volume, as it reduced the difference in microRNA fold abundance between the different isolation protocols evaluated. Our thorough study indicates that a standardization of pre- and analytical conditions is necessary to obtain reproducible inter-laboratory results in plasma microRNA studies. PMID:29077772

  9. Henipavirus RNA in African bats.

    Directory of Open Access Journals (Sweden)

    Jan Felix Drexler

    Full Text Available BACKGROUND: Henipaviruses (Hendra and Nipah virus are highly pathogenic members of the family Paramyxoviridae. Fruit-eating bats of the Pteropus genus have been suggested as their natural reservoir. Human Henipavirus infections have been reported in a region extending from Australia via Malaysia into Bangladesh, compatible with the geographic range of Pteropus. These bats do not occur in continental Africa, but a whole range of other fruit bats is encountered. One of the most abundant is Eidolon helvum, the African Straw-coloured fruit bat. METHODOLOGY/PRINCIPAL FINDINGS: Feces from E. helvum roosting in an urban setting in Kumasi/Ghana were tested for Henipavirus RNA. Sequences of three novel viruses in phylogenetic relationship to known Henipaviruses were detected. Virus RNA concentrations in feces were low. CONCLUSIONS/SIGNIFICANCE: The finding of novel putative Henipaviruses outside Australia and Asia contributes a significant extension of the region of potential endemicity of one of the most pathogenic virus genera known in humans.

  10. REDIdb: the RNA editing database.

    Science.gov (United States)

    Picardi, Ernesto; Regina, Teresa Maria Rosaria; Brennicke, Axel; Quagliariello, Carla

    2007-01-01

    The RNA Editing Database (REDIdb) is an interactive, web-based database created and designed with the aim to allocate RNA editing events such as substitutions, insertions and deletions occurring in a wide range of organisms. The database contains both fully and partially sequenced DNA molecules for which editing information is available either by experimental inspection (in vitro) or by computational detection (in silico). Each record of REDIdb is organized in a specific flat-file containing a description of the main characteristics of the entry, a feature table with the editing events and related details and a sequence zone with both the genomic sequence and the corresponding edited transcript. REDIdb is a relational database in which the browsing and identification of editing sites has been simplified by means of two facilities to either graphically display genomic or cDNA sequences or to show the corresponding alignment. In both cases, all editing sites are highlighted in colour and their relative positions are detailed by mousing over. New editing positions can be directly submitted to REDIdb after a user-specific registration to obtain authorized secure access. This first version of REDIdb database stores 9964 editing events and can be freely queried at http://biologia.unical.it/py_script/search.html.

  11. 5S rRNA-derived and tRNA-derived SINEs in fruit bats.

    Science.gov (United States)

    Gogolevsky, Konstantin P; Vassetzky, Nikita S; Kramerov, Dmitri A

    2009-05-01

    Most short retroposons (SINEs) descend from cellular tRNA of 7SL RNA. Here, four new SINEs were found in megabats (Megachiroptera) but neither in microbats nor in other mammals. Two of them, MEG-RS and MEG-RL, descend from another cellular RNA, 5S rRNA; one (MEG-T2) is a tRNA-derived SINE; and MEG-TR is a hybrid tRNA/5S rRNA SINE. Insertion locus analysis suggests that these SINEs were active in the recent fruit bat evolution. Analysis of MEG-RS and MEG-RL in comparison with other few 5S rRNA-derived SINEs demonstrates that the internal RNA polymerase III promoter is their most invariant region, while the secondary structure is more variable. The mechanisms underlying the modular structure of these and other SINEs as well as their variation are discussed. The scenario of evolution of MEG SINEs is proposed.

  12. RNA-Binding Proteins Revisited – The Emerging Arabidopsis mRNA Interactome

    KAUST Repository

    Kö ster, Tino; Marondedze, Claudius; Meyer, Katja; Staiger, Dorothee

    2017-01-01

    RNA–protein interaction is an important checkpoint to tune gene expression at the RNA level. Global identification of proteins binding in vivo to mRNA has been possible through interactome capture – where proteins are fixed to target RNAs by UV crosslinking and purified through affinity capture of polyadenylated RNA. In Arabidopsis over 500 RNA-binding proteins (RBPs) enriched in UV-crosslinked samples have been identified. As in mammals and yeast, the mRNA interactomes came with a few surprises. For example, a plethora of the proteins caught on RNA had not previously been linked to RNA-mediated processes, for example proteins of intermediary metabolism. Thus, the studies provide unprecedented insights into the composition of the mRNA interactome, highlighting the complexity of RNA-mediated processes.

  13. RNA-Binding Proteins Revisited – The Emerging Arabidopsis mRNA Interactome

    KAUST Repository

    Köster, Tino

    2017-04-13

    RNA–protein interaction is an important checkpoint to tune gene expression at the RNA level. Global identification of proteins binding in vivo to mRNA has been possible through interactome capture – where proteins are fixed to target RNAs by UV crosslinking and purified through affinity capture of polyadenylated RNA. In Arabidopsis over 500 RNA-binding proteins (RBPs) enriched in UV-crosslinked samples have been identified. As in mammals and yeast, the mRNA interactomes came with a few surprises. For example, a plethora of the proteins caught on RNA had not previously been linked to RNA-mediated processes, for example proteins of intermediary metabolism. Thus, the studies provide unprecedented insights into the composition of the mRNA interactome, highlighting the complexity of RNA-mediated processes.

  14. Construction of RNA nanocages by re-engineering the packaging RNA of Phi29 bacteriophage

    Science.gov (United States)

    Hao, Chenhui; Li, Xiang; Tian, Cheng; Jiang, Wen; Wang, Guansong; Mao, Chengde

    2014-05-01

    RNA nanotechnology promises rational design of RNA nanostructures with wide array of structural diversities and functionalities. Such nanostructures could be used in applications such as small interfering RNA delivery and organization of in vivo chemical reactions. Though having impressive development in recent years, RNA nanotechnology is still quite limited and its programmability and complexity could not rival the degree of its closely related cousin: DNA nanotechnology. Novel strategies are needed for programmed RNA self-assembly. Here, we have assembled RNA nanocages by re-engineering a natural, biological RNA motif: the packaging RNA of phi29 bacteriophage. The resulting RNA nanostructures have been thoroughly characterized by gel electrophoresis, cryogenic electron microscopy imaging and dynamic light scattering.

  15. Role of RNase MRP in viral RNA degradation and RNA recombination.

    Science.gov (United States)

    Jaag, Hannah M; Lu, Qiasheng; Schmitt, Mark E; Nagy, Peter D

    2011-01-01

    RNA degradation, together with RNA synthesis, controls the steady-state level of viral RNAs in infected cells. The endoribonucleolytic cleavage of viral RNA is important not only for viral RNA degradation but for RNA recombination as well, due to the participation of some RNA degradation products in the RNA recombination process. To identify host endoribonucleases involved in degradation of Tomato bushy stunt virus (TBSV) in a Saccharomyces cerevisiae model host, we tested eight known endoribonucleases. Here we report that downregulation of SNM1, encoding a component of the RNase MRP, and a temperature-sensitive mutation in the NME1 gene, coding for the RNA component of RNase MRP, lead to reduced production of the endoribonucleolytically cleaved TBSV RNA in yeast. We also show that the highly purified yeast RNase MRP cleaves the TBSV RNA in vitro, resulting in TBSV RNA degradation products similar in size to those observed in yeast cells. Knocking down the NME1 homolog in Nicotiana benthamiana also led to decreased production of the cleaved TBSV RNA, suggesting that in plants, RNase MRP is involved in TBSV RNA degradation. Altogether, this work suggests a role for the host endoribonuclease RNase MRP in viral RNA degradation and recombination.

  16. Fragment-based modelling of single stranded RNA bound to RNA recognition motif containing proteins

    Science.gov (United States)

    de Beauchene, Isaure Chauvot; de Vries, Sjoerd J.; Zacharias, Martin

    2016-01-01

    Abstract Protein-RNA complexes are important for many biological processes. However, structural modeling of such complexes is hampered by the high flexibility of RNA. Particularly challenging is the docking of single-stranded RNA (ssRNA). We have developed a fragment-based approach to model the structure of ssRNA bound to a protein, based on only the protein structure, the RNA sequence and conserved contacts. The conformational diversity of each RNA fragment is sampled by an exhaustive library of trinucleotides extracted from all known experimental protein–RNA complexes. The method was applied to ssRNA with up to 12 nucleotides which bind to dimers of the RNA recognition motifs (RRMs), a highly abundant eukaryotic RNA-binding domain. The fragment based docking allows a precise de novo atomic modeling of protein-bound ssRNA chains. On a benchmark of seven experimental ssRNA–RRM complexes, near-native models (with a mean heavy-atom deviation of <3 Å from experiment) were generated for six out of seven bound RNA chains, and even more precise models (deviation < 2 Å) were obtained for five out of seven cases, a significant improvement compared to the state of the art. The method is not restricted to RRMs but was also successfully applied to Pumilio RNA binding proteins. PMID:27131381

  17. The use of 125iodine-labeled RNA for detection of the RNA binding to ribosomes

    International Nuclear Information System (INIS)

    Mori, Tomohiko; Fukuda, Mitsuru

    1975-01-01

    The in vitro labeling of RNA with radioactive iodine is the efficient method to obtain the RNA with high specific activity. The present paper reports on the application of this technique to the production of iodine-labeled RNA for use in the experiment of binding RNA to ribosomes. Tobacco mosaic virus (TMV) RNA was used as natural mRNA, and E. coli S-30 preparation was used as a source of ribosomes. The TMV-RNA was prepared by bentonite-phenol extraction from TMV, and the method used for the iodation of RNA was based on the procedure described by Getz et al. The iodine-labeled RNA was incubated in a cell-free protein synthesizing system (S-30) prepared from E. coli K-12. After the incubation, the reaction mixture was layered onto sucrose gradient, centrifuged, and fractionated into 18 fractions. Optical density at 260 nm was measured, and radioactivity was counted, for each fraction. The binding of mRNA to ribosomes occurred even at 0 deg C, and the occurrence of the nonspecific binding was also shown. Consequently, the specific binding, i.e. the formation of the initiation complex being involved in amino acid incorporation, may be estimated by subtracting the radioactivity associated with monosomes in the presence of both rRNA and ATA from that in the presence of rRNA only. It was shown that the iodine-labeled RNA can be used for the studies of binding RNA to ribosomes. (Kako, I.)

  18. Deep Sequencing Insights in Therapeutic shRNA Processing and siRNA Target Cleavage Precision.

    Science.gov (United States)

    Denise, Hubert; Moschos, Sterghios A; Sidders, Benjamin; Burden, Frances; Perkins, Hannah; Carter, Nikki; Stroud, Tim; Kennedy, Michael; Fancy, Sally-Ann; Lapthorn, Cris; Lavender, Helen; Kinloch, Ross; Suhy, David; Corbau, Romu

    2014-02-04

    TT-034 (PF-05095808) is a recombinant adeno-associated virus serotype 8 (AAV8) agent expressing three short hairpin RNA (shRNA) pro-drugs that target the hepatitis C virus (HCV) RNA genome. The cytosolic enzyme Dicer cleaves each shRNA into multiple, potentially active small interfering RNA (siRNA) drugs. Using next-generation sequencing (NGS) to identify and characterize active shRNAs maturation products, we observed that each TT-034-encoded shRNA could be processed into as many as 95 separate siRNA strands. Few of these appeared active as determined by Sanger 5' RNA Ligase-Mediated Rapid Amplification of cDNA Ends (5-RACE) and through synthetic shRNA and siRNA analogue studies. Moreover, NGS scrutiny applied on 5-RACE products (RACE-seq) suggested that synthetic siRNAs could direct cleavage in not one, but up to five separate positions on targeted RNA, in a sequence-dependent manner. These data support an on-target mechanism of action for TT-034 without cytotoxicity and question the accepted precision of substrate processing by the key RNA interference (RNAi) enzymes Dicer and siRNA-induced silencing complex (siRISC).Molecular Therapy-Nucleic Acids (2014) 3, e145; doi:10.1038/mtna.2013.73; published online 4 February 2014.

  19. Disruption of Specific RNA-RNA Interactions in a Double-Stranded RNA Virus Inhibits Genome Packaging and Virus Infectivity.

    Science.gov (United States)

    Fajardo, Teodoro; Sung, Po-Yu; Roy, Polly

    2015-12-01

    Bluetongue virus (BTV) causes hemorrhagic disease in economically important livestock. The BTV genome is organized into ten discrete double-stranded RNA molecules (S1-S10) which have been suggested to follow a sequential packaging pathway from smallest to largest segment during virus capsid assembly. To substantiate and extend these studies, we have investigated the RNA sorting and packaging mechanisms with a new experimental approach using inhibitory oligonucleotides. Putative packaging signals present in the 3'untranslated regions of BTV segments were targeted by a number of nuclease resistant oligoribonucleotides (ORNs) and their effects on virus replication in cell culture were assessed. ORNs complementary to the 3' UTR of BTV RNAs significantly inhibited virus replication without affecting protein synthesis. Same ORNs were found to inhibit complex formation when added to a novel RNA-RNA interaction assay which measured the formation of supramolecular complexes between and among different RNA segments. ORNs targeting the 3'UTR of BTV segment 10, the smallest RNA segment, were shown to be the most potent and deletions or substitution mutations of the targeted sequences diminished the RNA complexes and abolished the recovery of viable viruses using reverse genetics. Cell-free capsid assembly/RNA packaging assay also confirmed that the inhibitory ORNs could interfere with RNA packaging and further substitution mutations within the putative RNA packaging sequence have identified the recognition sequence concerned. Exchange of 3'UTR between segments have further demonstrated that RNA recognition was segment specific, most likely acting as part of the secondary structure of the entire genomic segment. Our data confirm that genome packaging in this segmented dsRNA virus occurs via the formation of supramolecular complexes formed by the interaction of specific sequences located in the 3' UTRs. Additionally, the inhibition of packaging in-trans with inhibitory ORNs

  20. Argonaute: The executor of small RNA function.

    Science.gov (United States)

    Azlan, Azali; Dzaki, Najat; Azzam, Ghows

    2016-08-20

    The discovery of small non-coding RNAs - microRNA (miRNA), short interfering RNA (siRNA) and PIWI-interacting RNA (piRNA) - represents one of the most exciting frontiers in biology specifically on the mechanism of gene regulation. In order to execute their functions, these small RNAs require physical interactions with their protein partners, the Argonaute (AGO) family proteins. Over the years, numerous studies have made tremendous progress on understanding the roles of AGO in gene silencing in various organisms. In this review, we summarize recent progress of AGO-mediated gene silencing and other cellular processes in which AGO proteins have been implicated with a particular focus on progress made in flies, humans and other model organisms as compliment. Copyright © 2016 Institute of Genetics and Developmental Biology, Chinese Academy of Sciences, and Genetics Society of China. Published by Elsevier Ltd. All rights reserved.

  1. Designing synthetic RNA for delivery by nanoparticles

    International Nuclear Information System (INIS)

    Jedrzejczyk, Dominika; Pawlowska, Roza; Chworos, Arkadiusz; Gendaszewska-Darmach, Edyta

    2017-01-01

    The rapid development of synthetic biology and nanobiotechnology has led to the construction of various synthetic RNA nanoparticles of different functionalities and potential applications. As they occur naturally, nucleic acids are an attractive construction material for biocompatible nanoscaffold and nanomachine design. In this review, we provide an overview of the types of RNA and nucleic acid’s nanoparticle design, with the focus on relevant nanostructures utilized for gene-expression regulation in cellular models. Structural analysis and modeling is addressed along with the tools available for RNA structural prediction. The functionalization of RNA-based nanoparticles leading to prospective applications of such constructs in potential therapies is shown. The route from the nanoparticle design and modeling through synthesis and functionalization to cellular application is also described. For a better understanding of the fate of targeted RNA after delivery, an overview of RNA processing inside the cell is also provided. (topical review)

  2. Predicting RNA Structure Using Mutual Information

    DEFF Research Database (Denmark)

    Freyhult, E.; Moulton, V.; Gardner, P. P.

    2005-01-01

    , to display and predict conserved RNA secondary structure (including pseudoknots) from an alignment. Results: We show that MIfold can be used to predict simple pseudoknots, and that the performance can be adjusted to make it either more sensitive or more selective. We also demonstrate that the overall...... package. Conclusion: MIfold provides a useful supplementary tool to programs such as RNA Structure Logo, RNAalifold and COVE, and should be useful for automatically generating structural predictions for databases such as Rfam. Availability: MIfold is freely available from http......Background: With the ever-increasing number of sequenced RNAs and the establishment of new RNA databases, such as the Comparative RNA Web Site and Rfam, there is a growing need for accurately and automatically predicting RNA structures from multiple alignments. Since RNA secondary structure...

  3. Preparation of Total RNA from Fission Yeast.

    Science.gov (United States)

    Bähler, Jürg; Wise, Jo Ann

    2017-04-03

    Treatment with hot phenol breaks open fission yeast cells and begins to strip away bound proteins from RNA. Deproteinization is completed by multiple extractions with chloroform/isoamyl alcohol and separation of the aqueous and organic phases using MaXtract gel, an inert material that acts as a physical barrier between the phases. The final step is concentration of the RNA by ethanol precipitation. The protocol can be used to prepare RNA from several cultures grown in parallel, but it is important not to process too many samples at once because delays can be detrimental to RNA quality. A reasonable number of samples to process at once would be three to four for microarray or RNA sequencing analyses and six for preliminary investigations of mutants implicated in RNA metabolism. © 2017 Cold Spring Harbor Laboratory Press.

  4. A probabilistic model of RNA conformational space

    DEFF Research Database (Denmark)

    Frellsen, Jes; Moltke, Ida; Thiim, Martin

    2009-01-01

    efficient sampling of RNA conformations in continuous space, and with associated probabilities. We show that the model captures several key features of RNA structure, such as its rotameric nature and the distribution of the helix lengths. Furthermore, the model readily generates native-like 3-D......, the discrete nature of the fragments necessitates the use of carefully tuned, unphysical energy functions, and their non-probabilistic nature impairs unbiased sampling. We offer a solution to the sampling problem that removes these important limitations: a probabilistic model of RNA structure that allows......The increasing importance of non-coding RNA in biology and medicine has led to a growing interest in the problem of RNA 3-D structure prediction. As is the case for proteins, RNA 3-D structure prediction methods require two key ingredients: an accurate energy function and a conformational sampling...

  5. RNA-Binding Proteins in Plant Immunity

    Directory of Open Access Journals (Sweden)

    Virginia Woloshen

    2011-01-01

    Full Text Available Plant defence responses against pathogen infection are crucial to plant survival. The high degree of regulation of plant immunity occurs both transcriptionally and posttranscriptionally. Once transcribed, target gene RNA must be processed prior to translation. This includes polyadenylation, 5′capping, editing, splicing, and mRNA export. RNA-binding proteins (RBPs have been implicated at each level of RNA processing. Previous research has primarily focused on structural RNA-binding proteins of yeast and mammals; however, more recent work has characterized a number of plant RBPs and revealed their roles in plant immune responses. This paper provides an update on the known functions of RBPs in plant immune response regulation. Future in-depth analysis of RBPs and other related players will unveil the sophisticated regulatory mechanisms of RNA processing during plant immune responses.

  6. The Old and New RNA World

    Directory of Open Access Journals (Sweden)

    Zofia Szweykowska-Kulińska

    2014-12-01

    Full Text Available Among the numerous hypotheses offering a scenario for the origin of life on Earth, the one called “The RNA World” has gained the most attention. According to this hypothesis RNA acted as a genetic information storage material, as a catalyst of all metabolic reactions, and as a regulator of all processes in the primordial world. Various experiments show that RNA molecules could have been synthesized abiotically, with the potential to mediate a whole repertoire of metabolic reactions. Ribozymes carrying out aminoacyl-tRNA reactions have been found in SELEX (systematic evolution of ligands by exponential enrichment approaches and the development of a ribosome from a RNA-built protoribosome is easy to imagine. Transfer RNA aminoacylation, protoribosome origin, and the availability of amino acids on early Earth allowed the genetic code to evolve. Encoded proteins most likely stabilized RNA molecules and were able to create channels across membranes. In the modern cell, DNA replaced RNA as the main depositor of genetic information and proteins carry out almost all metabolic reactions. However, RNA is still playing versatile, crucial roles in the cell. Apart from its classical functions in the cell, a huge small RNA world is controlling gene expression, chromatin condensation, response to environmental cues, and protecting the cell against the invasion of various nucleic acids forms. Long non-coding RNAs act as crucial gene expression regulators. Riboswitches act at the level of transcription, splicing or translation and mediate feedback regulation on biosynthesis and transport of the ligand they sense. Alternative splicing generates genetic variability and increases the protein repertoire in response to developmental or environmental changes. All these regulatory functions are essential in shaping cell plasticity in the changing milieu. Recent discoveries of new, unexpected and important functions of RNA molecules support the hypothesis that we

  7. Small catalytic RNA: Structure, function and application

    Energy Technology Data Exchange (ETDEWEB)

    Monforte, J.A.

    1991-04-01

    We have utilized a combination of photochemical cross-linking techniques and site-directed mutagenesis to obtain secondary and tertiary structure information for the self-cleaving, self-ligating subsequence of RNA from the negative strand of Satellite Tobacco Ringspot Virus. We have found that the helical regions fold about a hinge to promoting four different possible tertiary interactions, creating a molecular of similar shape to a paperclip. A model suggesting that the paperclip'' and hammerhead'' RNAs share a similar three dimensional structure is proposed. We have used a self-cleaving RNA molecule related to a subsequence of plant viroids, a hammerhead,'' to study the length-dependent folding of RNA produced during transcription by RNA polymerase. We have used this method to determine the length of RNA sequestered within elongating E. coli and T7 RNA polymerase complexes. The data show that for E. coli RNA polymerase 12{plus minus}1 nucleotides are sequestered within the ternary complex, which is consistent with the presence of an RNA-DNA hybrid within the transcription bubble, as proposed by others. The result for T7 RNA polymerase differs from E. coli RNA polymerase, with only 10{plus minus}1 nucleotides sequestered within the ternary complex, setting a new upper limit for the minimum RNA-DNA required for a stable elongating complex. Comparisons between E. coli and T7 RNA polymerase are made. The relevance of the results to models or transcription termination, abortive initiation, and initiation to elongation mode transitions are discussed.

  8. Inverse folding of RNA pseudoknot structures

    Directory of Open Access Journals (Sweden)

    Li Linda YM

    2010-06-01

    Full Text Available Abstract Background RNA exhibits a variety of structural configurations. Here we consider a structure to be tantamount to the noncrossing Watson-Crick and G-U-base pairings (secondary structure and additional cross-serial base pairs. These interactions are called pseudoknots and are observed across the whole spectrum of RNA functionalities. In the context of studying natural RNA structures, searching for new ribozymes and designing artificial RNA, it is of interest to find RNA sequences folding into a specific structure and to analyze their induced neutral networks. Since the established inverse folding algorithms, RNAinverse, RNA-SSD as well as INFO-RNA are limited to RNA secondary structures, we present in this paper the inverse folding algorithm Inv which can deal with 3-noncrossing, canonical pseudoknot structures. Results In this paper we present the inverse folding algorithm Inv. We give a detailed analysis of Inv, including pseudocodes. We show that Inv allows to design in particular 3-noncrossing nonplanar RNA pseudoknot 3-noncrossing RNA structures-a class which is difficult to construct via dynamic programming routines. Inv is freely available at http://www.combinatorics.cn/cbpc/inv.html. Conclusions The algorithm Inv extends inverse folding capabilities to RNA pseudoknot structures. In comparison with RNAinverse it uses new ideas, for instance by considering sets of competing structures. As a result, Inv is not only able to find novel sequences even for RNA secondary structures, it does so in the context of competing structures that potentially exhibit cross-serial interactions.

  9. Functional characterization of the Drosophila MRP (mitochondrial RNA processing) RNA gene.

    Science.gov (United States)

    Schneider, Mary D; Bains, Anupinder K; Rajendra, T K; Dominski, Zbigniew; Matera, A Gregory; Simmonds, Andrew J

    2010-11-01

    MRP RNA is a noncoding RNA component of RNase mitochondrial RNA processing (MRP), a multi-protein eukaryotic endoribonuclease reported to function in multiple cellular processes, including ribosomal RNA processing, mitochondrial DNA replication, and cell cycle regulation. A recent study predicted a potential Drosophila ortholog of MRP RNA (CR33682) by computer-based genome analysis. We have confirmed the expression of this gene and characterized the phenotype associated with this locus. Flies with mutations that specifically affect MRP RNA show defects in growth and development that begin in the early larval period and end in larval death during the second instar stage. We present several lines of evidence demonstrating a role for Drosophila MRP RNA in rRNA processing. The nuclear fraction of Drosophila MRP RNA localizes to the nucleolus. Further, a mutant strain shows defects in rRNA processing that include a defect in 5.8S rRNA processing, typical of MRP RNA mutants in other species, as well as defects in early stages of rRNA processing.

  10. RAID: a comprehensive resource for human RNA-associated (RNA–RNA/RNA–protein) interaction

    Science.gov (United States)

    Zhang, Xiaomeng; Wu, Deng; Chen, Liqun; Li, Xiang; Yang, Jinxurong; Fan, Dandan; Dong, Tingting; Liu, Mingyue; Tan, Puwen; Xu, Jintian; Yi, Ying; Wang, Yuting; Zou, Hua; Hu, Yongfei; Fan, Kaili; Kang, Juanjuan; Huang, Yan; Miao, Zhengqiang; Bi, Miaoman; Jin, Nana; Li, Kongning; Li, Xia; Xu, Jianzhen; Wang, Dong

    2014-01-01

    Transcriptomic analyses have revealed an unexpected complexity in the eukaryote transcriptome, which includes not only protein-coding transcripts but also an expanding catalog of noncoding RNAs (ncRNAs). Diverse coding and noncoding RNAs (ncRNAs) perform functions through interaction with each other in various cellular processes. In this project, we have developed RAID (http://www.rna-society.org/raid), an RNA-associated (RNA–RNA/RNA–protein) interaction database. RAID intends to provide the scientific community with all-in-one resources for efficient browsing and extraction of the RNA-associated interactions in human. This version of RAID contains more than 6100 RNA-associated interactions obtained by manually reviewing more than 2100 published papers, including 4493 RNA–RNA interactions and 1619 RNA–protein interactions. Each entry contains detailed information on an RNA-associated interaction, including RAID ID, RNA/protein symbol, RNA/protein categories, validated method, expressing tissue, literature references (Pubmed IDs), and detailed functional description. Users can query, browse, analyze, and manipulate RNA-associated (RNA–RNA/RNA–protein) interaction. RAID provides a comprehensive resource of human RNA-associated (RNA–RNA/RNA–protein) interaction network. Furthermore, this resource will help in uncovering the generic organizing principles of cellular function network. PMID:24803509

  11. Peptides as catalysts in the RNA world

    DEFF Research Database (Denmark)

    Wieczorek, Rafal; Dörr, Mark; Luisi, Pier Luigi

    The emergence of RNA chains from prebiotic soup is considered a stumbling block in the RNA world theory (Orgel 2004). Both the activation of RNA monomers and their subsequent oligomerization is hard to achieve in accepted early Earth conditions, thus putting doubt on the prebiotic plausibility...... chemistry and the RNA world. Prebiotic soup likely contained complex mixtures of various molecules. Interaction of peptides and nucleotides shows that we should give more consideration to systems chemistry approach in the origin-of-life research. Gorlero M, Wieczorek R, Adamala K, Giorgi A, Schininà ME...

  12. Emerging connections between RNA and autophagy

    DEFF Research Database (Denmark)

    Frankel, Lisa B; Lubas, Michal; Lund, Anders H

    2017-01-01

    in yeast, plants and animals, reviewing the molecular mechanisms and biological importance in normal physiology, stress and disease. In addition, we explore emerging evidence of core autophagy regulation mediated by RNA-binding proteins and noncoding RNAs, and point to gaps in our current knowledge......Macroautophagy/autophagy is a key catabolic process, essential for maintaining cellular homeostasis and survival through the removal and recycling of unwanted cellular material. Emerging evidence has revealed intricate connections between the RNA and autophagy research fields. While a majority...... of the connection between RNA and autophagy. Finally, we discuss the pathological implications of RNA-protein aggregation, primarily in the context of neurodegenerative disease....

  13. MiRNA Biogenesis and Intersecting Pathways

    DEFF Research Database (Denmark)

    Ben Chaabane, Samir

    MicroRNAs (miRNAs) are small non-coding RNAs that function as guide molecules in RNA silencing. Plant miRNAs are critical for plant growth, development and stress response, and are processed in Arabidopsis from primary miRNA transcripts (pri-miRNAs) by the endonuclease activity of the DICER-LIKE1...... questions need to be addressed to establish a valid link, we provide encouraging evidence of the involvement of chromatin remodeling factors FAS1 and FAS2 in miRNA biogenesis. Together, we have expanded our understanding of the intersections between miRNA biogenesis and other pathways....

  14. Personalized RNA Medicine for Pancreatic Cancer.

    Science.gov (United States)

    Gilles, Maud-Emmanuelle; Hao, Liangliang; Huang, Ling; Rupaimoole, Rajesha; Lopez-Casas, Pedro P; Pulver, Emilia; Jeong, Jong Cheol; Muthuswamy, Senthil K; Hidalgo, Manuel; Bhatia, Sangeeta N; Slack, Frank J

    2018-04-01

    Purpose: Since drug responses vary between patients, it is crucial to develop pre-clinical or co-clinical strategies that forecast patient response. In this study, we tested whether RNA-based therapeutics were suitable for personalized medicine by using patient-derived-organoid (PDO) and patient-derived-xenograft (PDX) models. Experimental Design: We performed microRNA (miRNA) profiling of PDX samples to determine the status of miRNA deregulation in individual pancreatic ductal adenocarcinoma (PDAC) patients. To deliver personalized RNA-based-therapy targeting oncogenic miRNAs that form part of this common PDAC miRNA over-expression signature, we packaged antimiR oligonucleotides against one of these miRNAs in tumor-penetrating nanocomplexes (TPN) targeting cell surface proteins on PDAC tumors. Results: As a validation for our pre-clinical strategy, the therapeutic potential of one of our nano-drugs, TPN-21, was first shown to decrease tumor cell growth and survival in PDO avatars for individual patients, then in their PDX avatars. Conclusions: This general approach appears suitable for co-clinical validation of personalized RNA medicine and paves the way to prospectively identify patients with eligible miRNA profiles for personalized RNA-based therapy. Clin Cancer Res; 24(7); 1734-47. ©2018 AACR . ©2018 American Association for Cancer Research.

  15. mRNA processing in yeast

    International Nuclear Information System (INIS)

    Stevens, A.

    1982-01-01

    Investigations in this laboratory center on basic enzymatic reactions of RNA. Still undefined are reactions involved in the conversion of precursors of mRA (pre-mRNA) to mRNA in eukaryotes. The pre-mRNA is called heterogeneous nuclear RNA and is 2 to 6 times larger than mRNA. The conversion, called splicing, involves a removal of internal sequences called introns by endoribonuclease action followed by a rejoining of the 3'- and 5'-end fragments, called exons, by ligating activity. It has not been possible yet to study the enzymes involved in vitro. Also undefined are reactions involved in the turnover or discarding of certain of the pre-mRNA molecules. Yeast is a simple eukaryote and may be expected to have the same, but perhaps simpler, processing reactions as the higher eukaryotes. Two enzymes involved in the processing of pre-mRNA and mRNA in yeast are under investigation. Both enzymes have been partially purified from ribonucleoprotein particles of yeast. The first is a unique decapping enzyme which cleaves [ 3 H]m 7 Gppp [ 14 C]RNA-poly (A) of yeast, yielding [ 3 H]m 7 GDP and is suggested by the finding that the diphosphate product, m 7 GpppA(G), and UDP-glucose are not hydrolyzed. The second enzyme is an endoribonuclease which converts both the [ 3 H] and [ 14 C] labels of [ 3 H]m 7 Gppp[ 14 C]RNA-poly(A) from an oligo(dT)-cellulose bound form to an unbound, acid-insoluble form. Results show that the stimulation involves an interaction of the labeled RNA with the small nuclear RNA. The inhibition of the enzyme by ethidium bromide and its stimulation by small nuclear RNA suggest that it may be a processing ribonuclease, requiring specific double-stranded features in its substrate. The characterization of the unique decapping enzyme and endoribonuclease may help to understand reactions involved in the processing of pre-mRNA and mRNA in eukaryotes

  16. MicroRNA delivery for regenerative medicine.

    Science.gov (United States)

    Peng, Bo; Chen, Yongming; Leong, Kam W

    2015-07-01

    MicroRNA (miRNA) directs post-transcriptional regulation of a network of genes by targeting mRNA. Although relatively recent in development, many miRNAs direct differentiation of various stem cells including induced pluripotent stem cells (iPSCs), a major player in regenerative medicine. An effective and safe delivery of miRNA holds the key to translating miRNA technologies. Both viral and nonviral delivery systems have seen success in miRNA delivery, and each approach possesses advantages and disadvantages. A number of studies have demonstrated success in augmenting osteogenesis, improving cardiogenesis, and reducing fibrosis among many other tissue engineering applications. A scaffold-based approach with the possibility of local and sustained delivery of miRNA is particularly attractive since the physical cues provided by the scaffold may synergize with the biochemical cues induced by miRNA therapy. Herein, we first briefly cover the application of miRNA to direct stem cell fate via replacement and inhibition therapies, followed by the discussion of the promising viral and nonviral delivery systems. Next we present the unique advantages of a scaffold-based delivery in achieving lineage-specific differentiation and tissue development. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. Messenger RNA 3' end formation in plants.

    Science.gov (United States)

    Hunt, A G

    2008-01-01

    Messenger RNA 3' end formation is an integral step in the process that gives rise to mature, translated messenger RNAs in eukaryotes. With this step, a pre-messenger RNA is processed and polyadenylated, giving rise to a mature mRNA bearing the characteristic poly(A) tract. The poly(A) tract is a fundamental feature of mRNAs, participating in the process of translation initiation and being the focus of control mechanisms that define the lifetime of mRNAs. Thus messenger RNA 3' end formation impacts two steps in mRNA biogenesis and function. Moreover, mRNA 3' end formation is something of a bridge that integrates numerous other steps in mRNA biogenesis and function. While the process is essential for the expression of most genes, it is also one that is subject to various forms of regulation, such that both quantitative and qualitative aspects of gene expression may be modulated via the polyadenylation complex. In this review, the current status of understanding of mRNA 3' end formation in plants is discussed. In particular, the nature of mRNA 3' ends in plants is reviewed, as are recent studies that are beginning to yield insight into the functioning and regulation of plant polyadenylation factor subunits.

  18. Exploring RNA structure by integrative molecular modelling

    DEFF Research Database (Denmark)

    Masquida, Benoît; Beckert, Bertrand; Jossinet, Fabrice

    2010-01-01

    RNA molecular modelling is adequate to rapidly tackle the structure of RNA molecules. With new structured RNAs constituting a central class of cellular regulators discovered every year, the need for swift and reliable modelling methods is more crucial than ever. The pragmatic method based...... on interactive all-atom molecular modelling relies on the observation that specific structural motifs are recurrently found in RNA sequences. Once identified by a combination of comparative sequence analysis and biochemical data, the motifs composing the secondary structure of a given RNA can be extruded...

  19. The modification of siRNA with 3' cholesterol to increase nuclease protection and suppression of native mRNA by select siRNA polyplexes.

    Science.gov (United States)

    Ambardekar, Vishakha V; Han, Huai-Yun; Varney, Michelle L; Vinogradov, Serguei V; Singh, Rakesh K; Vetro, Joseph A

    2011-02-01

    Polymer-siRNA complexes (siRNA polyplexes) are being actively developed to improve the therapeutic application of siRNA. A major limitation for many siRNA polyplexes, however, is insufficient mRNA suppression. Given that modifying the sense strand of siRNA with 3' cholesterol (chol-siRNA) increases the activity of free nuclease-resistant siRNA in vitro and in vivo, we hypothesized that complexation of chol-siRNA can increase mRNA suppression by siRNA polyplexes. In this study, the characteristics and siRNA activity of self assembled polyplexes formed with chol-siRNA or unmodified siRNA were compared using three types of conventional, positively charged polymers: (i) biodegradable, cross-linked nanogels (BDNG) (ii) graft copolymers (PEI-PEG), and (iii) linear block copolymers (PLL10-PEG, and PLL50-PEG). Chol-siRNA did not alter complex formation or the resistance of polyplexes to siRNA displacement by heparin but increased nuclease protection by BDNG, PLL10-PEG, and PLL50-PEG polyplexes over polyplexes with unmodified siRNA. Chol-CYPB siRNA increased suppression of native CYPB mRNA in mammary microvascular endothelial cells (MVEC) by BDNG polyplexes (35%) and PLL10-PEG polyplexes (69%) over comparable CYPB siRNA polyplexes but had no effect on PEI-PEG or PLL50-PEG polyplexes. Overall, these results indicate that complexation of chol-siRNA increases nuclease protection and mRNA suppression by select siRNA polyplexes. These results also suggest that polycationic block length is an important factor in increasing mRNA suppression by PLL-PEG chol-siRNA polyplexes in mammary MVEC. Copyright © 2010 Elsevier Ltd. All rights reserved.

  20. The Modification of siRNA with 3′ Cholesterol to Increase Nuclease Protection and Suppression of Native mRNA by Select siRNA Polyplexes

    Science.gov (United States)

    Ambardekar, Vishakha V.; Han, Huai-Yun; Varney, Michelle L.; Vinogradov, Serguei V.; Singh, Rakesh K.; Vetro, Joseph A.

    2010-01-01

    Polymer-siRNA complexes (siRNA polyplexes) are being actively developed to improve the therapeutic application of siRNA. A major limitation for many siRNA polyplexes, however, is insufficient mRNA suppression. Given that modifying the sense strand of siRNA with 3′ cholesterol (chol-siRNA) increases the activity of free nuclease-resistant siRNA in vitro and in vivo, we hypothesized that complexation of chol-siRNA can increase mRNA suppression by siRNA polyplexes. In this study, the characteristics and siRNA activity of self assembled polyplexes formed with chol-siRNA or unmodified siRNA were compared using three types of conventional, positively charged polymers: (i) biodegradable, cross-linked nanogels (BDNG) (ii) graft copolymers (PEI-PEG), and (iii) linear block copolymers (PLL10-PEG, and PLL50-PEG). Chol-siRNA did not alter complex formation or the resistance of polyplexes to siRNA displacement by heparin but increased nuclease protection by BDNG, PLL10-PEG, and PLL50-PEG polyplexes over polyplexes with unmodified siRNA. Chol-CYPB siRNA increased suppression of native CYPB mRNA in mammary microvascular endothelial cells (MVEC) by BDNG polyplexes (35%) and PLL10-PEG polyplexes (69%) over comparable CYPB siRNA polyplexes but had no effect on PEI-PEG or PLL50-PEG polyplexes. Overall, these results indicate that complexation of chol-siRNA increases nuclease protection and mRNA suppression by select siRNA polyplexes. These results also suggest that polycationic block length is an important factor in increasing mRNA suppression by PLL-PEG chol-siRNA polyplexes in mammary MVEC. PMID:21047680

  1. RNA-DNA Differences Are Generated in Human Cells within Seconds after RNA Exits Polymerase II

    Directory of Open Access Journals (Sweden)

    Isabel X. Wang

    2014-03-01

    Full Text Available RNA sequences are expected to be identical to their corresponding DNA sequences. Here, we found all 12 types of RNA-DNA sequence differences (RDDs in nascent RNA. Our results show that RDDs begin to occur in RNA chains ∼55 nt from the RNA polymerase II (Pol II active site. These RDDs occur so soon after transcription that they are incompatible with known deaminase-mediated RNA-editing mechanisms. Moreover, the 55 nt delay in appearance indicates that they do not arise during RNA synthesis by Pol II or as a direct consequence of modified base incorporation. Preliminary data suggest that RDD and R-loop formations may be coupled. These findings identify sequence substitution as an early step in cotranscriptional RNA processing.

  2. RNA three-way junctions can act as flexible RNA structural elements in large RNA molecules: a molecular simulation analysis

    Czech Academy of Sciences Publication Activity Database

    Beššeová, Ivana; Réblová, Kamila; Leontis, N.B.; Šponer, Jiří

    2009-01-01

    Roč. 26, č. 6 (2009), s. 830-831 ISSN 0739-1102. [The 17th Conversation . 16.06.2009-20.06.2009, Albany] Institutional research plan: CEZ:AV0Z50040507; CEZ:AV0Z50040702 Keywords : RNA three-way junctions * RNA Subject RIV: BO - Biophysics

  3. The HIV-1 leader RNA conformational switch regulates RNA dimerization but does not regulate mRNA translation

    NARCIS (Netherlands)

    Abbink, Truus E. M.; Ooms, Marcel; Haasnoot, P. C. Joost; Berkhout, Ben

    2005-01-01

    The untranslated leader RNA is the most conserved part of the human immunodeficiency virus type I (HIV-1) genome. It contains many regulatory motifs that mediate a variety of steps in the viral life cycle. Previous work showed that the full-length leader RNA can adopt two alternative structures: a

  4. In vitro transcription of Sonchus yellow net virus RNA by a virus-associated RNA-dependent RNA polymerase

    NARCIS (Netherlands)

    Flore, P.H.

    1986-01-01

    The aim of the investigation presented in this thesis was to elucidate the nature of the RNA- dependent RNA polymerase, thought to be associated with Sonchus yellow net virus (SYNV), a rhabdovirus infecting plants. This research was initiated to shed light on the

  5. [Satellite RNA (RNA3) of tomato black ring virus is found with one of the 2 major RNAs (RNA2) in a new capsid nucleoprotein].

    Science.gov (United States)

    Doz, B; Dunez, J; Bove, J M

    1977-12-19

    Tomato Black Ring Virus (TBRV) like other NEPOviruses posseses two nucleoproteins M and B and two major RNAs, RNA1 and RNA2 respectively distributed in B and M. A new nucleoprotein has just been discovered and comprises one molecule of RNA2 associated with one molecule of RNA3. RNA3 is a small RNA of molecular weight 500,000 d considered to be a satellite RNA. Its level appears to depend on the infection stage, local or systemic. RNA3 is able to modify the relative proportions of nucleoproteins M and B and their respective RNAs. The satellite RNA, might be part of the genome and represent a monocistronic mRNA for protein capsid synthesis. However it seems perhaps more tempting to correlate TBRV-RNA3 with satellite RNA5 of certain strains of Cucumber mosaic virus.

  6. Alterations in messenger RNA and small nuclear RNA metabolism resulting from fluorouracil incorporation

    International Nuclear Information System (INIS)

    Armstrong, R.D.; Cadman, E.C.

    1985-01-01

    Studies were completed to examine the effect of 5-fluorouracil (FUra) incorporation on messenger RNA (mRNA) and small molecular weight nuclear RNA (SnRNA) metabolism. Studies of mRNA were completed using cDNA-mRNA hybridization methods to specifically examine dihydrofolate reductase (DHFR) mRNA. C 3 -L5178Y murine leukemia cells which are gene-amplified for DHFR, were exposed to FUra for 6, 12 or 24 hr, and the nuclear and cytoplasmic levels of DHFR-mRNA determined by hybridization with 32 P-DHFR-cDNA. FUra produced a dose-dependent increase in nuclear DHFR-mRNA levels, while total cytoplasmic DHFR-mRNA levels appeared to be unchanged. To examine only mRNA synthesized during FUra exposure, cells were also treated concurrently with [ 3 H] cytidine, and the [ 3 H]mRNA-cDNA hybrids measured following S 1 -nuclease treatment. FUra produced a concentration-dependent increase in nascent nuclear DHFR-mRNA levels, and a decrease in nascent cytoplasmic DHFR-mRNAs levels. These results suggest that FUra produces either an inhibition of mRNA processing, or an inhibition of nuclear-cytoplasmic transport. Preliminary experiments to examine ATP-dependent mRNA transport were completed with isolated nuclei from cells treated with FUra for 1 or 24 hr and then pulse-labeled for 1 hr with [ 3 H] cytidine. The results demonstrate a FUra-concentration and time-dependent inhibition of ATP-mediated mRNA efflux

  7. Mapping protein-RNA interactions by RCAP, RNA-cross-linking and peptide fingerprinting.

    Science.gov (United States)

    Vaughan, Robert C; Kao, C Cheng

    2015-01-01

    RNA nanotechnology often feature protein RNA complexes. The interaction between proteins and large RNAs are difficult to study using traditional structure-based methods like NMR or X-ray crystallography. RCAP, an approach that uses reversible-cross-linking affinity purification method coupled with mass spectrometry, has been developed to map regions within proteins that contact RNA. This chapter details how RCAP is applied to map protein-RNA contacts within virions.

  8. Overview of methods in RNA nanotechnology: synthesis, purification, and characterization of RNA nanoparticles.

    Science.gov (United States)

    Haque, Farzin; Guo, Peixuan

    2015-01-01

    RNA nanotechnology encompasses the use of RNA as a construction material to build homogeneous nanostructures by bottom-up self-assembly with defined size, structure, and stoichiometry; this pioneering concept demonstrated in 1998 (Guo et al., Molecular Cell 2:149-155, 1998; featured in Cell) has emerged as a new field that also involves materials engineering and synthetic structural biology (Guo, Nature Nanotechnology 5:833-842, 2010). The field of RNA nanotechnology has skyrocketed over the last few years, as evidenced by the burst of publications in prominent journals on RNA nanostructures and their applications in nanomedicine and nanotechnology. Rapid advances in RNA chemistry, RNA biophysics, and RNA biology have created new opportunities for translating basic science into clinical practice. RNA nanotechnology holds considerable promise in this regard. Increased evidence also suggests that substantial part of the 98.5 % of human genome (Lander et al. Nature 409:860-921, 2001) that used to be called "junk DNA" actually codes for noncoding RNA. As we understand more on how RNA structures are related to function, we can fabricate synthetic RNA nanoparticles for the diagnosis and treatment of diseases. This chapter provides a brief overview of the field regarding the design, construction, purification, and characterization of RNA nanoparticles for diverse applications in nanotechnology and nanomedicince.

  9. Methylated nucleosides in tRNA and tRNA methyltransferases

    Directory of Open Access Journals (Sweden)

    Hiroyuki eHori

    2014-05-01

    Full Text Available To date, more than 90 modified nucleosides have been found in tRNA and the biosynthetic pathways of the majority of tRNA modifications include a methylation step(s. Recent studies of the biosynthetic pathways have demonstrated that the availability of methyl group donors for the methylation in tRNA is important for correct and efficient protein synthesis. In this review, I focus on the methylated nucleosides and tRNA methyltransferases. The primary functions of tRNA methylations are linked to the different steps of protein synthesis, such as the stabilization of tRNA structure, reinforcement of the codon–anticodon interaction, regulation of wobble base pairing, and prevention of frameshift errors. However, beyond these basic functions, recent studies have demonstrated that tRNA methylations are also involved in the RNA quality control system and regulation of tRNA localization in the cell. In a thermophilic eubacterium, tRNA modifications and the modification enzymes form a network that responses to temperature changes. Furthermore, several modifications are involved in genetic diseases, infections, and the immune response. Moreover, structural, biochemical, and bioinformatics studies of tRNA methyltransferases have been clarifying the details of tRNA methyltransferases and have enabled these enzymes to be classified. In the final section, the evolution of modification enzymes is discussed.

  10. Mutant allele of rna14 in fission yeast affects pre-mRNA splicing

    Indian Academy of Sciences (India)

    transcript. Rna14 protein in budding yeast has been implicated in cleavage and ... Subsequently, genetic interaction of Rna14 with prp1 and physical .... molecular yeast techniques as described by Moreno et al. ..... To elucidate the role of Rna14 in splicing, RT-PCR analysis ..... design principles of a dynamic RNP machine.

  11. Signatures of RNA binding proteins globally coupled to effective microRNA target sites

    DEFF Research Database (Denmark)

    Jacobsen, Anders; Wen, Jiayu; Marks, Debora S

    2010-01-01

    MicroRNAs (miRNAs) and small interfering RNAs (siRNAs), bound to Argonaute proteins (RISC), destabilize mRNAs through base-pairing with the mRNA. However, the gene expression changes after perturbations of these small RNAs are only partially explained by predicted miRNA/siRNA targeting. Targeting...

  12. RNA trafficking in parasitic plant systems

    Science.gov (United States)

    LeBlanc, Megan; Kim, Gunjune; Westwood, James H.

    2012-01-01

    RNA trafficking in plants contributes to local and long-distance coordination of plant development and response to the environment. However, investigations of mobile RNA identity and function are hindered by the inherent difficulty of tracing a given molecule of RNA from its cell of origin to its destination. Several methods have been used to address this problem, but all are limited to some extent by constraints associated with accurately sampling phloem sap or detecting trafficked RNA. Certain parasitic plant species form symplastic connections to their hosts and thereby provide an additional system for studying RNA trafficking. The haustorial connections of Cuscuta and Phelipanche species are similar to graft junctions in that they are able to transmit mRNAs, viral RNAs, siRNAs, and proteins from the host plants to the parasite. In contrast to other graft systems, these parasites form connections with host species that span a wide phylogenetic range, such that a high degree of nucleotide sequence divergence may exist between host and parasites and allow confident identification of most host RNAs in the parasite system. The ability to identify host RNAs in parasites, and vice versa, will facilitate genomics approaches to understanding RNA trafficking. This review discusses the nature of host–parasite connections and the potential significance of host RNAs for the parasite. Additional research on host–parasite interactions is needed to interpret results of RNA trafficking studies, but parasitic plants may provide a fascinating new perspective on RNA trafficking. PMID:22936942

  13. RNA Encapsidation and Packaging in the Phleboviruses

    Directory of Open Access Journals (Sweden)

    Katherine E. Hornak

    2016-07-01

    Full Text Available The Bunyaviridae represents the largest family of segmented RNA viruses, which infect a staggering diversity of plants, animals, and insects. Within the family Bunyaviridae, the Phlebovirus genus includes several important human and animal pathogens, including Rift Valley fever virus (RVFV, severe fever with thrombocytopenia syndrome virus (SFTSV, Uukuniemi virus (UUKV, and the sandfly fever viruses. The phleboviruses have small tripartite RNA genomes that encode a repertoire of 5–7 proteins. These few proteins accomplish the daunting task of recognizing and specifically packaging a tri-segment complement of viral genomic RNA in the midst of an abundance of host components. The critical nucleation events that eventually lead to virion production begin early on in the host cytoplasm as the first strands of nascent viral RNA (vRNA are synthesized. The interaction between the vRNA and the viral nucleocapsid (N protein effectively protects and masks the RNA from the host, and also forms the ribonucleoprotein (RNP architecture that mediates downstream interactions and drives virion formation. Although the mechanism by which all three genomic counterparts are selectively co-packaged is not completely understood, we are beginning to understand the hierarchy of interactions that begins with N-RNA packaging and culminates in RNP packaging into new virus particles. In this review we focus on recent progress that highlights the molecular basis of RNA genome packaging in the phleboviruses.

  14. RNA trafficking in parasitic plant systems

    Directory of Open Access Journals (Sweden)

    Megan L LeBlanc

    2012-08-01

    Full Text Available RNA trafficking in plants contributes to local and long-distance coordination of plant development and response to the environment. However, investigations of mobile RNA identity and function are hindered by the inherent difficulty of tracing a given molecule of RNA from its cell of origin to its destination. Several methods have been used to address this problem, but all are limited to some extent by constraints associated with accurately sampling phloem sap or detecting trafficked RNA. Certain parasitic plant species form symplastic connections to their hosts and thereby provide an additional system for studying RNA trafficking. The haustorial connections of Cuscuta and Phelipanche species are similar to graft junctions in that they are able to transmit mRNAs, viral RNAs, siRNAs and proteins from the host plants to the parasite. In contrast to other graft systems, these parasites form connections with host species that span a wide phylogenetic range, such that a high degree of nucleotide sequence divergence may exist between host and parasites and allow confident identification of most host RNAs in the parasite system. The ability to identify host RNAs in parasites, and vice versa, will facilitate genomics approaches to understanding RNA trafficking. This review discusses the nature of host parasite connections and the potential significance of host RNAs for the parasite. Additional research on host-parasite interactions is needed to interpret results of RNA trafficking studies, but parasitic plants may provide a fascinating new perspective on RNA trafficking.

  15. Customization of Artificial MicroRNA Design.

    Science.gov (United States)

    Van Vu, Tien; Do, Vinh Nang

    2017-01-01

    RNAi approaches, including microRNA (miRNA) regulatory pathway, offer great tools for functional characterization of unknown genes. Moreover, the applications of artificial microRNA (amiRNA) in the field of plant transgenesis have also been advanced to engineer pathogen-resistant or trait-improved transgenic plants. Until now, despite the high potency of amiRNA approach, no commercial plant cultivar expressing amiRNAs with improved traits has been released yet. Beside the issues of biosafety policies, the specificity and efficacy of amiRNAs are of major concerns. Sufficient cares should be taken for the specificity and efficacy of amiRNAs due to their potential off-target effects and other issues relating to in vivo expression of pre-amiRNAs. For these reasons, the proper design of amiRNAs with the lowest off-target possibility is very important for successful applications of the approach in plant. Therefore, there are many studies with the aim to improve the amiRNA design and amiRNA expressing backbones for obtaining better specificity and efficacy. However, the requirement for an efficient reference for the design is still needed. In the present chapter, we attempt to summarize and discuss all the major concerns relating to amiRNA design with the hope to provide a significant guideline for this approach.

  16. Messenger RNA surveillance: neutralizing natural nonsense

    DEFF Research Database (Denmark)

    Weischelfeldt, Joachim Lütken; Lykke-Andersen, Jens; Porse, Bo

    2005-01-01

    Messenger RNA transcripts that contain premature stop codons are degraded by a process termed nonsense-mediated mRNA decay (NMD). Although previously thought of as a pathway that rids the cell of non-functional mRNAs arising from mutations and processing errors, new research suggests a more general...

  17. RNA-based therapies for genodermatoses

    NARCIS (Netherlands)

    Bornert, Olivier; Peking, Patricia; Bremer, Jeroen; Koller, Ulrich; van den Akker, Peter C.; Aartsma-Rus, Annemieke; Pasmooij, Anna M. G.; Murauer, Eva M.; Nystroem, Alexander

    Genetic disorders affecting the skin, genodermatoses, constitute a large and heterogeneous group of diseases, for which treatment is generally limited to management of symptoms. RNA-based therapies are emerging as a powerful tool to treat genodermatoses. In this review, we discuss in detail RNA

  18. ADAR RNA editing below the backbone.

    Science.gov (United States)

    Keegan, Liam; Khan, Anzer; Vukic, Dragana; O'Connell, Mary

    2017-09-01

    ADAR RNA editing enzymes ( a denosine d e a minases acting on R NA) that convert adenosine bases to inosines were first identified biochemically 30 years ago. Since then, studies on ADARs in genetic model organisms, and evolutionary comparisons between them, continue to reveal a surprising range of pleiotropic biological effects of ADARs. This review focuses on Drosophila melanogaster , which has a single Adar gene encoding a homolog of vertebrate ADAR2 that site-specifically edits hundreds of transcripts to change individual codons in ion channel subunits and membrane and cytoskeletal proteins. Drosophila ADAR is involved in the control of neuronal excitability and neurodegeneration and, intriguingly, in the control of neuronal plasticity and sleep. Drosophila ADAR also interacts strongly with RNA interference, a key antiviral defense mechanism in invertebrates. Recent crystal structures of human ADAR2 deaminase domain-RNA complexes help to interpret available information on Drosophila ADAR isoforms and on the evolution of ADARs from tRNA deaminase ADAT proteins. ADAR RNA editing is a paradigm for the now rapidly expanding range of RNA modifications in mRNAs and ncRNAs. Even with recent progress, much remains to be understood about these groundbreaking ADAR RNA modification systems. © 2017 Keegan et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.

  19. Non-coding RNA in Deinococcus radiodurans

    International Nuclear Information System (INIS)

    Chen Zhongzhong; Wang Liangyan; Lin Jun; Tian Bing; Hua Yuejin

    2006-01-01

    Researches on DNA damage and repair pathways of Deinococcus radiodurans show its extreme resistance to ionizing radiation, ultraviolet radiation and reactive oxygen species. Non-coding (ncRNA) RNAs are involved in a variety of processes such as transcriptional regulations, RNA processing and modification, mRNA translation, protein transportation and stability. The conserved secondary structures of intergenic regions of Deinococcus radiodurans R1 were predicted using Stochastic Context Free Grammar (SCFG) scan strategy. Results showed that 28 ncRNA families were present in the non-coding regions of the genome of Deinococcus radiodurans R1. Among these families, IRE is the largest family, followed by Histone3, tRNA, SECIS. DicF, ctRNA-pGA1 and tmRNA are one discovered in bacteria. Results from the comparison with other organisms showed that these ncRNA can be applied to the study of biological function of Deinococcus radiodurans and supply reference for the further study of DNA damage and repair mechanisms of this bacterium. (authors)

  20. Retroviral RNA Dimerization: From Structure to Functions

    Directory of Open Access Journals (Sweden)

    Noé Dubois

    2018-03-01

    Full Text Available The genome of the retroviruses is a dimer composed by two homologous copies of genomic RNA (gRNA molecules of positive polarity. The dimerization process allows two gRNA molecules to be non-covalently linked together through intermolecular base-pairing. This step is critical for the viral life cycle and is highly conserved among retroviruses with the exception of spumaretroviruses. Furthermore, packaging of two gRNA copies into viral particles presents an important evolutionary advantage for immune system evasion and drug resistance. Recent studies reported RNA switches models regulating not only gRNA dimerization, but also translation and packaging, and a spatio-temporal characterization of viral gRNA dimerization within cells are now at hand. This review summarizes our current understanding on the structural features of the dimerization signals for a variety of retroviruses (HIVs, MLV, RSV, BLV, MMTV, MPMV…, the mechanisms of RNA dimer formation and functional implications in the retroviral cycle.

  1. The integrated analysis of RNA-seq and microRNA-seq depicts miRNA-mRNA networks involved in Japanese flounder (Paralichthys olivaceus) albinism.

    Science.gov (United States)

    Wang, Na; Wang, Ruoqing; Wang, Renkai; Tian, Yongsheng; Shao, Changwei; Jia, Xiaodong; Chen, Songlin

    2017-01-01

    Albinism, a phenomenon characterized by pigmentation deficiency on the ocular side of Japanese flounder (Paralichthys olivaceus), has caused significant damage. Limited mRNA and microRNA (miRNA) information is available on fish pigmentation deficiency. In this study, a high-throughput sequencing strategy was employed to identify the mRNA and miRNAs involved in P. olivaceus albinism. Based on P. olivaceus genome, RNA-seq identified 21,787 know genes and 711 new genes by transcripts assembly. Of those, 235 genes exhibited significantly different expression pattern (fold change ≥2 or ≤0.5 and q-value≤0.05), including 194 down-regulated genes and 41 up-regulated genes in albino versus normally pigmented individuals. These genes were enriched to 81 GO terms and 9 KEGG pathways (p≤0.05). Among those, the pigmentation related pathways-Melanogenesis and tyrosine metabolism were contained. High-throughput miRNA sequencing identified a total of 475 miRNAs, including 64 novel miRNAs. Furthermore, 33 differentially expressed miRNAs containing 13 up-regulated and 20 down-regulated miRNAs were identified in albino versus normally pigmented individuals (fold change ≥1.5 or ≤0.67 and p≤0.05). The next target prediction discovered a variety of putative target genes, of which, 134 genes including Tyrosinase (TYR), Tyrosinase-related protein 1 (TYRP1), Microphthalmia-associated transcription factor (MITF) were overlapped with differentially expressed genes derived from RNA-seq. These target genes were significantly enriched to 254 GO terms and 103 KEGG pathways (p<0.001). Of those, tyrosine metabolism, lysosomes, phototransduction pathways, etc., attracted considerable attention due to their involvement in regulating skin pigmentation. Expression patterns of differentially expressed mRNA and miRNAs were validated in 10 mRNA and 10 miRNAs by qRT-PCR. With high-throughput mRNA and miRNA sequencing and analysis, a series of interested mRNA and miRNAs involved in fish

  2. Long noncoding RNA in hematopoiesis and immunity.

    Science.gov (United States)

    Satpathy, Ansuman T; Chang, Howard Y

    2015-05-19

    Dynamic gene expression during cellular differentiation is tightly coordinated by transcriptional and post-transcriptional mechanisms. An emerging theme is the central role of long noncoding RNAs (lncRNAs) in the regulation of this specificity. Recent advances demonstrate that lncRNAs are expressed in a lineage-specific manner and control the development of several cell types in the hematopoietic system. Moreover, specific lncRNAs are induced to modulate innate and adaptive immune responses. lncRNAs can function via RNA-DNA, RNA-RNA, and RNA-protein target interactions. As a result, they affect several stages of gene regulation, including chromatin modification, mRNA biogenesis, and protein signaling. We discuss recent advances, future prospects, and challenges in understanding the roles of lncRNAs in immunity and immune-mediated diseases. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. A probabilistic model of RNA conformational space

    DEFF Research Database (Denmark)

    Frellsen, Jes; Moltke, Ida; Thiim, Martin

    2009-01-01

    , the discrete nature of the fragments necessitates the use of carefully tuned, unphysical energy functions, and their non-probabilistic nature impairs unbiased sampling. We offer a solution to the sampling problem that removes these important limitations: a probabilistic model of RNA structure that allows...... conformations for 9 out of 10 test structures, solely using coarse-grained base-pairing information. In conclusion, the method provides a theoretical and practical solution for a major bottleneck on the way to routine prediction and simulation of RNA structure and dynamics in atomic detail.......The increasing importance of non-coding RNA in biology and medicine has led to a growing interest in the problem of RNA 3-D structure prediction. As is the case for proteins, RNA 3-D structure prediction methods require two key ingredients: an accurate energy function and a conformational sampling...

  4. Eukaryotic 5S rRNA biogenesis

    Science.gov (United States)

    Ciganda, Martin; Williams, Noreen

    2012-01-01

    The ribosome is a large complex containing both protein and RNA which must be assembled in a precise manner to allow proper functioning in the critical role of protein synthesis. 5S rRNA is the smallest of the RNA components of the ribosome, and although it has been studied for decades, we still do not have a clear understanding of its function within the complex ribosome machine. It is the only RNA species that binds ribosomal proteins prior to its assembly into the ribosome. Its transport into the nucleolus requires this interaction. Here we present an overview of some of the key findings concerning the structure and function of 5S rRNA and how its association with specific proteins impacts its localization and function. PMID:21957041

  5. RNA as a small molecule druggable target.

    Science.gov (United States)

    Rizvi, Noreen F; Smith, Graham F

    2017-12-01

    Small molecule drugs have readily been developed against many proteins in the human proteome, but RNA has remained an elusive target for drug discovery. Increasingly, we see that RNA, and to a lesser extent DNA elements, show a persistent tertiary structure responsible for many diverse and complex cellular functions. In this digest, we have summarized recent advances in screening approaches for RNA targets and outlined the discovery of novel, drug-like small molecules against RNA targets from various classes and therapeutic areas. The link of structure, function, and small-molecule Druggability validates now for the first time that RNA can be the targets of therapeutic agents. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. MicroRNA Implication in Cancer

    Directory of Open Access Journals (Sweden)

    Iker BADIOLA

    2010-03-01

    Full Text Available MicroRNAs (miRNA are a new class of posttranscriptional regulators. These small non-coding RNAs regulate the expression of target mRNA transcripts and are linked to several human disease such as Alzheimer, cancer or heart disease. But it has been the cancer disease which has experimented the major number of studies of miRNA linked to the disease progression. In the last years it has been reported the deregulation pattern of the miRNAs in malignant cells which have disrupted the control of the proliferation, differentiation or apoptosis. The evidence of the presence of specific miRNA deregulated in concrete cancer types has become the miRNAs like possible biomarkers and therapeutic targets. The specific miRNA patterns deregulated in concrete cancer cell types open new opportunities to the diagnosis and therapy.

  7. Transfer RNA methylases in rat placenta

    International Nuclear Information System (INIS)

    Jagtiani, S.K.; Narurkar, L.M.; Narurkar, M.V.

    1977-01-01

    Presence of tRNA methylases (5-adenosylmethionine : tRNA methyltransferases) was demonstrated at various stages of gestation in rat placenta, the enzyme being 50-100% higher than that of adult rat liver during early gestation. Placental tRNA methylases were shown to differ from those of liver in the extent of methylation. Glycine methyltransferase (S-adenosylmethionine : glycine methyltransferase), a regulatory enzyme in adult rat liver, was absent in placenta throughout gestation. The placental tRNA methylases could be inhibited in vitro by semipurified glycine methyltransferase from adult rat liver. The high placental tRNA methylase activity was comparable with the inhibitor-free enzyme activity of the adult rat liver. S-adenosyl-[Me- 14 C]-methionine was used in the investigation. (author)

  8. Identifying and characterizing Hfq-RNA interactions.

    Science.gov (United States)

    Faner, M A; Feig, A L

    2013-09-15

    To regulate stress responses and virulence, bacteria use small regulatory RNAs (sRNAs). These RNAs can up or down regulate target mRNAs through base pairing by influencing ribosomal access and RNA decay. A large class of these sRNAs, called trans-encoded sRNAs, requires the RNA binding protein Hfq to facilitate base pairing between the regulatory RNA and its target mRNA. The resulting network of regulation is best characterized in Escherichia coli and Salmonella typhimurium, but the importance of Hfq dependent sRNA regulation is recognized in a diverse population of bacteria. In this review we present the approaches and methods used to discover Hfq binding RNAs, characterize their interactions and elucidate their functions. Copyright © 2013 Elsevier Inc. All rights reserved.

  9. Analysis of RNA binding by the dengue virus NS5 RNA capping enzyme.

    Directory of Open Access Journals (Sweden)

    Brittney R Henderson

    Full Text Available Flaviviruses are small, capped positive sense RNA viruses that replicate in the cytoplasm of infected cells. Dengue virus and other related flaviviruses have evolved RNA capping enzymes to form the viral RNA cap structure that protects the viral genome and directs efficient viral polyprotein translation. The N-terminal domain of NS5 possesses the methyltransferase and guanylyltransferase activities necessary for forming mature RNA cap structures. The mechanism for flavivirus guanylyltransferase activity is currently unknown, and how the capping enzyme binds its diphosphorylated RNA substrate is important for deciphering how the flavivirus guanylyltransferase functions. In this report we examine how flavivirus NS5 N-terminal capping enzymes bind to the 5' end of the viral RNA using a fluorescence polarization-based RNA binding assay. We observed that the K(D for RNA binding is approximately 200 nM Dengue, Yellow Fever, and West Nile virus capping enzymes. Removal of one or both of the 5' phosphates reduces binding affinity, indicating that the terminal phosphates contribute significantly to binding. RNA binding affinity is negatively affected by the presence of GTP or ATP and positively affected by S-adensyl methoninine (SAM. Structural superpositioning of the dengue virus capping enzyme with the Vaccinia virus VP39 protein bound to RNA suggests how the flavivirus capping enzyme may bind RNA, and mutagenesis analysis of residues in the putative RNA binding site demonstrate that several basic residues are critical for RNA binding. Several mutants show differential binding to 5' di-, mono-, and un-phosphorylated RNAs. The mode of RNA binding appears similar to that found with other methyltransferase enzymes, and a discussion of diphosphorylated RNA binding is presented.

  10. Four RNA families with functional transient structures.

    Science.gov (United States)

    Zhu, Jing Yun A; Meyer, Irmtraud M

    2015-01-01

    Protein-coding and non-coding RNA transcripts perform a wide variety of cellular functions in diverse organisms. Several of their functional roles are expressed and modulated via RNA structure. A given transcript, however, can have more than a single functional RNA structure throughout its life, a fact which has been previously overlooked. Transient RNA structures, for example, are only present during specific time intervals and cellular conditions. We here introduce four RNA families with transient RNA structures that play distinct and diverse functional roles. Moreover, we show that these transient RNA structures are structurally well-defined and evolutionarily conserved. Since Rfam annotates one structure for each family, there is either no annotation for these transient structures or no such family. Thus, our alignments either significantly update and extend the existing Rfam families or introduce a new RNA family to Rfam. For each of the four RNA families, we compile a multiple-sequence alignment based on experimentally verified transient and dominant (dominant in terms of either the thermodynamic stability and/or attention received so far) RNA secondary structures using a combination of automated search via covariance model and manual curation. The first alignment is the Trp operon leader which regulates the operon transcription in response to tryptophan abundance through alternative structures. The second alignment is the HDV ribozyme which we extend to the 5' flanking sequence. This flanking sequence is involved in the regulation of the transcript's self-cleavage activity. The third alignment is the 5' UTR of the maturation protein from Levivirus which contains a transient structure that temporarily postpones the formation of the final inhibitory structure to allow translation of maturation protein. The fourth and last alignment is the SAM riboswitch which regulates the downstream gene expression by assuming alternative structures upon binding of SAM. All

  11. RNA processing and ribonucleoprotein assembly studied in vivo by RNA transfection

    International Nuclear Information System (INIS)

    Kleinschmidt, A.M.; Pederson, T.

    1990-01-01

    The authors present a method for studying RNA processing and ribonucleoprotein assembly in vivo, by using RNA synthesized in vitro. SP6-transcribed 32 P-labeled U2 small nuclear RNA precursor molecules were introduced into cultured human 293 cells by calcium phosphate-mediated uptake, as in standard DNA transfection experiments. RNase protection mapping demonstrated that the introduced pre-U2 RNA underwent accurate 3' end processing. The introduced U2 RNA was assembled into ribonucleoprotein particles that reacted with an antibody specific for proteins known to be associated with the U2 small nuclear ribonucleoprotein particle. The 3' end-processed, ribonucleoprotein-assembled U2 RNA accumulated in the nuclear fraction. When pre-U2 RNA with a 7-methylguanosine group at the 5' end was introduced into cells, it underwent conversion to a 2,2,7-trimethylguanosine cap structure, a characteristic feature of the U-small nuclear RNAs. Pre-U2 RNA introduced with an adenosine cap (Ap-ppG) also underwent processing, small nuclear ribonucleoprotein assembly, and nuclear accumulation, establishing that a methylated guanosine cap structure is not required for these steps in U2 small nuclear ribonucleprotein biosynthesis. Beyond its demonstrated usefulness in the study of small nuclear ribonucleoprotein biosynthesis, RNA transfection may be of general applicability to the investigation of eukaryotic RNA processing in vivo and may also offer opportunities for introducing therapeutically targeted RNAs (ribozymes or antisense RNA) into cells

  12. MicroRNA-target binding structures mimic microRNA duplex structures in humans.

    Directory of Open Access Journals (Sweden)

    Xi Chen

    Full Text Available Traditionally, researchers match a microRNA guide strand to mRNA sequences using sequence comparisons to predict its potential target genes. However, many of the predictions can be false positives due to limitations in sequence comparison alone. In this work, we consider the association of two related RNA structures that share a common guide strand: the microRNA duplex and the microRNA-target binding structure. We have analyzed thousands of such structure pairs and found many of them share high structural similarity. Therefore, we conclude that when predicting microRNA target genes, considering just the microRNA guide strand matches to gene sequences may not be sufficient--the microRNA duplex structure formed by the guide strand and its companion passenger strand must also be considered. We have developed software to translate RNA binding structure into encoded representations, and we have also created novel automatic comparison methods utilizing such encoded representations to determine RNA structure similarity. Our software and methods can be utilized in the other RNA secondary structure comparisons as well.

  13. Conformational Selection and Induced Fit for RNA Polymerase and RNA/DNA Hybrid Backtracked Recognition

    Directory of Open Access Journals (Sweden)

    Haifeng eChen

    2015-11-01

    Full Text Available RNA polymerase catalyzes transcription with a high fidelity. If DNA/RNA mismatch or DNA damage occurs downstream, a backtracked RNA polymerase can proofread this situation. However, the backtracked mechanism is still poorly understood. Here we have performed multiple explicit-solvent molecular dynamics (MD simulations on bound and apo DNA/RNA hybrid to study backtracked recognition. MD simulations at room temperature suggest that specific electrostatic interactions play key roles in the backtracked recognition between the polymerase and DNA/RNA hybrid. Kinetics analysis at high temperature shows that bound and apo DNA/RNA hybrid unfold via a two-state process. Both kinetics and free energy landscape analyses indicate that bound DNA/RNA hybrid folds in the order of DNA/RNA contracting, the tertiary folding and polymerase binding. The predicted Φ-values suggest that C7, G9, dC12, dC15 and dT16 are key bases for the backtracked recognition of DNA/RNA hybrid. The average RMSD values between the bound structures and the corresponding apo ones and Kolmogorov-Smirnov (KS P test analyses indicate that the recognition between DNA/RNA hybrid and polymerase might follow an induced fit mechanism for DNA/RNA hybrid and conformation selection for polymerase. Furthermore, this method could be used to relative studies of specific recognition between nucleic acid and protein.

  14. Phloem RNA-binding proteins as potential components of the long-distance RNA transport system.

    Directory of Open Access Journals (Sweden)

    VICENTE ePALLAS

    2013-05-01

    Full Text Available RNA-binding proteins (RBPs govern a myriad of different essential processes in eukaryotic cells. Recent evidence reveals that apart from playing critical roles in RNA metabolism and RNA transport, RBPs perform a key function in plant adaption to various environmental conditions. Long distance RNA transport occurs in land plants through the phloem, a conducting tissue that integrates the wide range of signalling pathways required to regulate plant development and response to stress processes. The macromolecules in the phloem pathway vary greatly and include defence proteins, transcription factors, chaperones acting in long distance trafficking, and RNAs (mRNAs, siRNAs and miRNAs. How these RNA molecules translocate through the phloem is not well understood, but recent evidence indicates the presence of translocatable RNA-binding proteins in the phloem, which act as potential components of long distance RNA transport system. This review updates our knowledge on the characteristics and functions of RBPs present in the phloem.

  15. Recoding aminoacyl-tRNA synthetases for synthetic biology by rational protein-RNA engineering.

    Science.gov (United States)

    Hadd, Andrew; Perona, John J

    2014-12-19

    We have taken a rational approach to redesigning the amino acid binding and aminoacyl-tRNA pairing specificities of bacterial glutaminyl-tRNA synthetase. The four-stage engineering incorporates generalizable design principles and improves the pairing efficiency of noncognate glutamate with tRNA(Gln) by over 10(5)-fold compared to the wild-type enzyme. Better optimized designs of the protein-RNA complex include substantial reengineering of the globular core region of the tRNA, demonstrating a role for specific tRNA nucleotides in specifying the identity of the genetically encoded amino acid. Principles emerging from this engineering effort open new prospects for combining rational and genetic selection approaches to design novel aminoacyl-tRNA synthetases that ligate noncanonical amino acids onto tRNAs. This will facilitate reconstruction of the cellular translation apparatus for applications in synthetic biology.

  16. Cap-independent translation mechanism of red clover necrotic mosaic virus RNA2 differs from that of RNA1 and is linked to RNA replication.

    Science.gov (United States)

    Mizumoto, Hiroyuki; Iwakawa, Hiro-Oki; Kaido, Masanori; Mise, Kazuyuki; Okuno, Tetsuro

    2006-04-01

    The genome of Red clover necrotic mosaic virus (RCNMV) in the genus Dianthovirus is divided into two RNA molecules of RNA1 and RNA2, which have no cap structure at the 5' end and no poly(A) tail at the 3' end. The 3' untranslated region (3' UTR) of RCNMV RNA1 contains an essential RNA element (3'TE-DR1), which is required for cap-independent translation. In this study, we investigated a cap-independent translational mechanism of RNA2 using a firefly luciferase (Luc) gene expression assay system in cowpea protoplasts and a cell-free lysate (BYL) prepared from evacuolated tobacco BY2 protoplasts. We were unable to detect cis-acting RNA sequences in RNA2 that can replace the function of a cap structure, such as the 3'TE-DR1 of RNA1. However, the uncapped reporter RNA2, RNA2-Luc, in which the Luc open reading frame (ORF) was inserted between the 5' UTR and the movement protein ORF, was effectively translated in the presence of p27 and p88 in protoplasts in which RNA2-Luc was replicated. Time course experiments in protoplasts showed that the translational activity of RNA2-Luc did not reflect the amount of RNA2. Mutations in cis-acting RNA replication elements of RNA2 abolished the cap-independent translational activity of RNA2-Luc, suggesting that the translational activity of RNA2-Luc is coupled to RNA replication. Our results show that the translational mechanism differs between two segmented genomic RNAs of RCNMV. We present a model in which only RNA2 that is generated de novo through the viral RNA replication machinery functions as mRNA for translation.

  17. Combining miRNA and mRNA Expression Profiles in Wilms Tumor Subtypes

    Directory of Open Access Journals (Sweden)

    Nicole Ludwig

    2016-03-01

    Full Text Available Wilms tumor (WT is the most common childhood renal cancer. Recent findings of mutations in microRNA (miRNA processing proteins suggest a pivotal role of miRNAs in WT genesis. We performed miRNA expression profiling of 36 WTs of different subtypes and four normal kidney tissues using microarrays. Additionally, we determined the gene expression profile of 28 of these tumors to identify potentially correlated target genes and affected pathways. We identified 85 miRNAs and 2107 messenger RNAs (mRNA differentially expressed in blastemal WT, and 266 miRNAs and 1267 mRNAs differentially expressed in regressive subtype. The hierarchical clustering of the samples, using either the miRNA or mRNA profile, showed the clear separation of WT from normal kidney samples, but the miRNA pattern yielded better separation of WT subtypes. A correlation analysis of the deregulated miRNA and mRNAs identified 13,026 miRNA/mRNA pairs with inversely correlated expression, of which 2844 are potential interactions of miRNA and their predicted mRNA targets. We found significant upregulation of miRNAs-183, -301a/b and -335 for the blastemal subtype, and miRNAs-181b, -223 and -630 for the regressive subtype. We found marked deregulation of miRNAs regulating epithelial to mesenchymal transition, especially in the blastemal subtype, and miRNAs influencing chemosensitivity, especially in regressive subtypes. Further research is needed to assess the influence of preoperative chemotherapy and tumor infiltrating lymphocytes on the miRNA and mRNA patterns in WT.

  18. MicroRNA-directed siRNA biogenesis in Caenorhabditis elegans.

    Science.gov (United States)

    Corrêa, Régis L; Steiner, Florian A; Berezikov, Eugene; Ketting, René F

    2010-04-08

    RNA interference (RNAi) is a post-transcriptional silencing process, triggered by double-stranded RNA (dsRNA), leading to the destabilization of homologous mRNAs. A distinction has been made between endogenous RNAi-related pathways and the exogenous RNAi pathway, the latter being essential for the experimental use of RNAi. Previous studies have shown that, in Caenorhabditis elegans, a complex containing the enzymes Dicer and the Argonaute RDE-1 process dsRNA. Dicer is responsible for cleaving dsRNA into short interfering RNAs (siRNAs) while RDE-1 acts as the siRNA acceptor. RDE-1 then guides a multi-protein complex to homologous targets to trigger mRNA destabilization. However, endogenous role(s) for RDE-1, if any, have remained unexplored. We here show that RDE-1 functions as a scavenger protein, taking up small RNA molecules from many different sources, including the microRNA (miRNA) pathway. This is in striking contrast to Argonaute proteins functioning directly in the miRNA pathway, ALG-1 and ALG-2: these proteins exclusively bind miRNAs. While playing no significant role in the biogenesis of the main pool of miRNAs, RDE-1 binds endogenous miRNAs and triggers RdRP activity on at least one perfectly matching, endogenous miRNA target. The resulting secondary siRNAs are taken up by a set of Argonaute proteins known to act as siRNA acceptors in exogenous RNAi, resulting in strong mRNA destabilization. Our results show that RDE-1 in an endogenous setting is actively screening the transcriptome using many different small RNAs, including miRNAs, as a guide, with implications for the evolution of transcripts with a potential to be recognized by Dicer.

  19. Interactions between the HIV-1 Unspliced mRNA and Host mRNA Decay Machineries

    Directory of Open Access Journals (Sweden)

    Daniela Toro-Ascuy

    2016-11-01

    Full Text Available The human immunodeficiency virus type-1 (HIV-1 unspliced transcript is used both as mRNA for the synthesis of structural proteins and as the packaged genome. Given the presence of retained introns and instability AU-rich sequences, this viral transcript is normally retained and degraded in the nucleus of host cells unless the viral protein REV is present. As such, the stability of the HIV-1 unspliced mRNA must be particularly controlled in the nucleus and the cytoplasm in order to ensure proper levels of this viral mRNA for translation and viral particle formation. During its journey, the HIV-1 unspliced mRNA assembles into highly specific messenger ribonucleoproteins (mRNPs containing many different host proteins, amongst which are well-known regulators of cytoplasmic mRNA decay pathways such as up-frameshift suppressor 1 homolog (UPF1, Staufen double-stranded RNA binding protein 1/2 (STAU1/2, or components of miRNA-induced silencing complex (miRISC and processing bodies (PBs. More recently, the HIV-1 unspliced mRNA was shown to contain N6-methyladenosine (m6A, allowing the recruitment of YTH N6-methyladenosine RNA binding protein 2 (YTHDF2, an m6A reader host protein involved in mRNA decay. Interestingly, these host proteins involved in mRNA decay were shown to play positive roles in viral gene expression and viral particle assembly, suggesting that HIV-1 interacts with mRNA decay components to successfully accomplish viral replication. This review summarizes the state of the art in terms of the interactions between HIV-1 unspliced mRNA and components of different host mRNA decay machineries.

  20. Intranasal delivery of antiviral siRNA.

    Science.gov (United States)

    Barik, Sailen

    2011-01-01

    Intranasal administration of synthetic siRNA is an effective modality of RNAi delivery for the prevention and therapy of respiratory diseases, including pulmonary infections. Vehicles used for nasal siRNA delivery include established as well as novel reagents, many of which have been recently optimized. In general, they all promote significant uptake of siRNA into the lower respiratory tract, including the lung. When properly designed and optimized, these siRNAs offer significant protection against respiratory viruses such as influenza virus, parainfluenza virus and respiratory syncytial virus (RSV). Nasally administered siRNA remains within the lung and does not access systemic blood flow, as judged by its absence in other major organs such as liver, heart, kidney, and skeletal muscle. Adverse immune reaction is generally not encountered, especially when immunogenic and/or off-target siRNA sequences and toxic vehicles are avoided. In fact, siRNA against RSV has entered Phase II clinical trials in human with promising results. Here, we provide a standardized procedure for using the nose as a specific route for siRNA delivery into the lung of laboratory animals. It should be clear that this simple and efficient system has enormous potential for therapeutics.

  1. The cellular receptors of exogenous RNA

    Directory of Open Access Journals (Sweden)

    Patryk Reniewicz

    2016-04-01

    Full Text Available One of the key determinants of survival for organisms is proper recognition of exogenous and endogenous nucleic acids. Therefore, high eukaryotes developed a number of receptors that allow for discrimination between friend or foe DNA and RNA. Appearance of exogenous RNA in cytoplasm provides a signal of danger and triggers cellular responses that facilitate eradication of a pathogen. Recognition of exogenous RNA is additionally complicated by fact that large amount of endogenous RNA is present in cytoplasm Thus, number of different receptors, found in eukaryotic cells, is able to recognize that nucleic acid. First group of those receptors consist endosomal Toll like receptors, namely TLR3, TLR7, TLR8 and TLR13. Those receptors recognize RNA released from pathogens that enter the cell by endocytosis. The second group includes cytoplasmic sensors like PKR and the family of RLRs comprised of RIG-I, MDA5 and LGP2. Cytoplasmic receptors recognize RNA from pathogens invading the cell by non-endocytic pathway. In both cases binding of RNA by its receptors results in activation of the signalling cascades that lead to the production of interferon and other cytokines.

  2. Annotating RNA motifs in sequences and alignments.

    Science.gov (United States)

    Gardner, Paul P; Eldai, Hisham

    2015-01-01

    RNA performs a diverse array of important functions across all cellular life. These functions include important roles in translation, building translational machinery and maturing messenger RNA. More recent discoveries include the miRNAs and bacterial sRNAs that regulate gene expression, the thermosensors, riboswitches and other cis-regulatory elements that help prokaryotes sense their environment and eukaryotic piRNAs that suppress transposition. However, there can be a long period between the initial discovery of a RNA and determining its function. We present a bioinformatic approach to characterize RNA motifs, which are critical components of many RNA structure-function relationships. These motifs can, in some instances, provide researchers with functional hypotheses for uncharacterized RNAs. Moreover, we introduce a new profile-based database of RNA motifs--RMfam--and illustrate some applications for investigating the evolution and functional characterization of RNA. All the data and scripts associated with this work are available from: https://github.com/ppgardne/RMfam. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.

  3. RNA interference and Register Machines (extended abstract

    Directory of Open Access Journals (Sweden)

    Masahiro Hamano

    2012-11-01

    Full Text Available RNA interference (RNAi is a mechanism whereby small RNAs (siRNAs directly control gene expression without assistance from proteins. This mechanism consists of interactions between RNAs and small RNAs both of which may be single or double stranded. The target of the mechanism is mRNA to be degraded or aberrated, while the initiator is double stranded RNA (dsRNA to be cleaved into siRNAs. Observing the digital nature of RNAi, we represent RNAi as a Minsky register machine such that (i The two registers hold single and double stranded RNAs respectively, and (ii Machine's instructions are interpreted by interactions of enzyme (Dicer, siRNA (with RISC com- plex and polymerization (RdRp to the appropriate registers. Interpreting RNAi as a computational structure, we can investigate the computational meaning of RNAi, especially its complexity. Initially, the machine is configured as a Chemical Ground Form (CGF, which generates incorrect jumps. To remedy this problem, the system is remodeled as recursive RNAi, in which siRNA targets not only mRNA but also the machine instructional analogues of Dicer and RISC. Finally, probabilistic termination is investigated in the recursive RNAi system.

  4. SRD: a Staphylococcus regulatory RNA database.

    Science.gov (United States)

    Sassi, Mohamed; Augagneur, Yoann; Mauro, Tony; Ivain, Lorraine; Chabelskaya, Svetlana; Hallier, Marc; Sallou, Olivier; Felden, Brice

    2015-05-01

    An overflow of regulatory RNAs (sRNAs) was identified in a wide range of bacteria. We designed and implemented a new resource for the hundreds of sRNAs identified in Staphylococci, with primary focus on the human pathogen Staphylococcus aureus. The "Staphylococcal Regulatory RNA Database" (SRD, http://srd.genouest.org/) compiled all published data in a single interface including genetic locations, sequences and other features. SRD proposes novel and simplified identifiers for Staphylococcal regulatory RNAs (srn) based on the sRNA's genetic location in S. aureus strain N315 which served as a reference. From a set of 894 sequences and after an in-depth cleaning, SRD provides a list of 575 srn exempt of redundant sequences. For each sRNA, their experimental support(s) is provided, allowing the user to individually assess their validity and significance. RNA-seq analysis performed on strains N315, NCTC8325, and Newman allowed us to provide further details, upgrade the initial annotation, and identified 159 RNA-seq independent transcribed sRNAs. The lists of 575 and 159 sRNAs sequences were used to predict the number and location of srns in 18 S. aureus strains and 10 other Staphylococci. A comparison of the srn contents within 32 Staphylococcal genomes revealed a poor conservation between species. In addition, sRNA structure predictions obtained with MFold are accessible. A BLAST server and the intaRNA program, which is dedicated to target prediction, were implemented. SRD is the first sRNA database centered on a genus; it is a user-friendly and scalable device with the possibility to submit new sequences that should spread in the literature. © 2015 Sassi et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.

  5. Circular RNA (circRNA) was an important bridge in the switch from the RNA world to the DNA world.

    Science.gov (United States)

    Soslau, Gerald

    2018-06-14

    The concept that life on Earth began as an RNA world has been built upon extensive experimentation demonstrating that many of the building blocks required for living cells could be synthesized in the laboratory under conditions approximating our primordial world. Many of the building blocks for life have also been found in meteorites indicating that meteors may have been a source for these molecules, or more likely, that they represent the chemical library present in most/all bodies in the universe after the big bang. Perhaps the most important support for the concept comes from the fact that some RNA species possess catalytic activity, ribozymes, and that RNA could be reverse transcribe to DNA. The thrust of numerous papers on this topic has been to explore how the available molecules on Earth, at its birth, gave rise to life as we know it today. This paper focuses more on a reverse view of the topic. The "how" molecular building blocks were synthesized is not addressed nor how the "first" RNA molecules were synthesized. We can clearly speculate on the variable environmental conditions and chemistry available on Earth billions of years ago. However, we can never truly replicate the changing conditions or know the chemical composition of Earth at the beginning of time. We can, however, confirm that over millions, perhaps billions of years the basic building blocks for life accumulated sufficiently to initiate evolution to an RNA world followed by our RNA/DNA world. Here we are attempting to take the information from our current knowledge of biology and by inference and extrapolation work backward to hypothesize biological events in the march forward from RNA to DNA. It is proposed that the primordial replicating RNA cell, the ribocyte, evolved from liposomes encompassing required reactants and products for "life" and that ribonucleopeptide complexes formed membrane pores to support bidirectional ion and molecular transport to maintain biological functions and

  6. Chemical fidelity of an RNA polymerase ribozyme

    DEFF Research Database (Denmark)

    Attwater, J.; Tagami, S.; Kimoto, M.

    2013-01-01

    for function. Here we have explored the chemical fidelity, i.e. substrate selectivity and specificity for both single and multiple catalytic steps of the Z RNA polymerase ribozyme-a modern day analogue of the primordial RNA replicase. Using a wide range of nucleotide analogues and ionic conditions, we observe......The emergence of catalytically active RNA enzymes (ribozymes) is widely believed to have been an important transition in the origin of life. In the context of a likely heterogeneous chemical environment, substrate specificity and selectivity of these primordial enzymes would have been critical...

  7. Exploring complex miRNA-mRNA interactions with Bayesian networks by splitting-averaging strategy

    Directory of Open Access Journals (Sweden)

    Liu Lin

    2009-12-01

    Full Text Available Abstract Background microRNAs (miRNAs regulate target gene expression by controlling their mRNAs post-transcriptionally. Increasing evidence demonstrates that miRNAs play important roles in various biological processes. However, the functions and precise regulatory mechanisms of most miRNAs remain elusive. Current research suggests that miRNA regulatory modules are complicated, including up-, down-, and mix-regulation for different physiological conditions. Previous computational approaches for discovering miRNA-mRNA interactions focus only on down-regulatory modules. In this work, we present a method to capture complex miRNA-mRNA interactions including all regulatory types between miRNAs and mRNAs. Results We present a method to capture complex miRNA-mRNA interactions using Bayesian network structure learning with splitting-averaging strategy. It is designed to explore all possible miRNA-mRNA interactions by integrating miRNA-targeting information, expression profiles of miRNAs and mRNAs, and sample categories. We also present an analysis of data sets for epithelial and mesenchymal transition (EMT. Our results show that the proposed method identified all possible types of miRNA-mRNA interactions from the data. Many interactions are of tremendous biological significance. Some discoveries have been validated by previous research, for example, the miR-200 family negatively regulates ZEB1 and ZEB2 for EMT. Some are consistent with the literature, such as LOX has wide interactions with the miR-200 family members for EMT. Furthermore, many novel interactions are statistically significant and worthy of validation in the near future. Conclusions This paper presents a new method to explore the complex miRNA-mRNA interactions for different physiological conditions using Bayesian network structure learning with splitting-averaging strategy. The method makes use of heterogeneous data including miRNA-targeting information, expression profiles of miRNAs and

  8. Affinity maturation of a portable Fab–RNA module for chaperone-assisted RNA crystallography

    Science.gov (United States)

    Koirala, Deepak; Shelke, Sandip A; Dupont, Marcel; Ruiz, Stormy; DasGupta, Saurja; Bailey, Lucas J; Benner, Steven A; Piccirilli, Joseph A

    2018-01-01

    Abstract Antibody fragments such as Fabs possess properties that can enhance protein and RNA crystallization and therefore can facilitate macromolecular structure determination. In particular, Fab BL3–6 binds to an AAACA RNA pentaloop closed by a GC pair with ∼100 nM affinity. The Fab and hairpin have served as a portable module for RNA crystallization. The potential for general application make it desirable to adjust the properties of this crystallization module in a manner that facilitates its use for RNA structure determination, such as ease of purification, surface entropy or binding affinity. In this work, we used both in vitro RNA selection and phage display selection to alter the epitope and paratope sides of the binding interface, respectively, for improved binding affinity. We identified a 5′-GNGACCC-3′ consensus motif in the RNA and S97N mutation in complimentarity determining region L3 of the Fab that independently impart about an order of magnitude improvement in affinity, resulting from new hydrogen bonding interactions. Using a model RNA, these modifications facilitated crystallization under a wider range of conditions and improved diffraction. The improved features of the Fab–RNA module may facilitate its use as an affinity tag for RNA purification and imaging and as a chaperone for RNA crystallography. PMID:29309709

  9. Spontaneous reverse movement of mRNA-bound tRNA through the ribosome.

    Science.gov (United States)

    Konevega, Andrey L; Fischer, Niels; Semenkov, Yuri P; Stark, Holger; Wintermeyer, Wolfgang; Rodnina, Marina V

    2007-04-01

    During the translocation step of protein synthesis, a complex of two transfer RNAs bound to messenger RNA (tRNA-mRNA) moves through the ribosome. The reaction is promoted by an elongation factor, called EF-G in bacteria, which, powered by GTP hydrolysis, induces an open, unlocked conformation of the ribosome that allows for spontaneous tRNA-mRNA movement. Here we show that, in the absence of EF-G, there is spontaneous backward movement, or retrotranslocation, of two tRNAs bound to mRNA. Retrotranslocation is driven by the gain in affinity when a cognate E-site tRNA moves into the P site, which compensates the affinity loss accompanying the movement of peptidyl-tRNA from the P to the A site. These results lend support to the diffusion model of tRNA movement during translocation. In the cell, tRNA movement is biased in the forward direction by EF-G, which acts as a Brownian ratchet and prevents backward movement.

  10. Thermal Stability of siRNA Modulates Aptamer- conjugated siRNA Inhibition

    Directory of Open Access Journals (Sweden)

    Alexey Berezhnoy

    2012-01-01

    Full Text Available Oligonucleotide aptamer-mediated in vivo cell targeting of small interfering RNAs (siRNAs is emerging as a useful approach to enhance the efficacy and reduce the adverse effects resulting from siRNA-mediated genetic interference. A current main impediment in aptamer-mediated siRNA targeting is that the activity of the siRNA is often compromised when conjugated to an aptamer, often requiring labor intensive and time consuming design and testing of multiple configurations to identify a conjugate in which the siRNA activity has not been significantly reduced. Here, we show that the thermal stability of the siRNA is an important parameter of siRNA activity in its conjugated form, and that siRNAs with lower melting temperature (Tm are not or are minimally affected when conjugated to the 3′ end of 2′F-pyrimidine-modified aptamers. In addition, the configuration of the aptamer-siRNA conjugate retains activity comparable with the free siRNA duplex when the passenger strand is co-transcribed with the aptamer and 3′ overhangs on the passenger strand are removed. The approach described in this paper significantly reduces the time and effort necessary to screening siRNA sequences that retain biological activity upon aptamer conjugation, facilitating the process of identifying candidate aptamer-siRNA conjugates suitable for in vivo testing.

  11. A Method to Predict the Structure and Stability of RNA/RNA Complexes.

    Science.gov (United States)

    Xu, Xiaojun; Chen, Shi-Jie

    2016-01-01

    RNA/RNA interactions are essential for genomic RNA dimerization and regulation of gene expression. Intermolecular loop-loop base pairing is a widespread and functionally important tertiary structure motif in RNA machinery. However, computational prediction of intermolecular loop-loop base pairing is challenged by the entropy and free energy calculation due to the conformational constraint and the intermolecular interactions. In this chapter, we describe a recently developed statistical mechanics-based method for the prediction of RNA/RNA complex structures and stabilities. The method is based on the virtual bond RNA folding model (Vfold). The main emphasis in the method is placed on the evaluation of the entropy and free energy for the loops, especially tertiary kissing loops. The method also uses recursive partition function calculations and two-step screening algorithm for large, complicated structures of RNA/RNA complexes. As case studies, we use the HIV-1 Mal dimer and the siRNA/HIV-1 mutant (T4) to illustrate the method.

  12. Mutations in the RNA-binding domains of tombusvirus replicase proteins affect RNA recombination in vivo

    International Nuclear Information System (INIS)

    Panaviene, Zivile; Nagy, Peter D.

    2003-01-01

    RNA recombination, which is thought to occur due to replicase errors during viral replication, is one of the major driving forces of virus evolution. In this article, we show evidence that the replicase proteins of Cucumber necrosis virus, a tombusvirus, are directly involved in RNA recombination in vivo. Mutations within the RNA-binding domains of the replicase proteins affected the frequency of recombination observed with a prototypical defective-interfering (DI) RNA, a model template for recombination studies. Five of the 17 replicase mutants tested showed delay in the formation of recombinants when compared to the wild-type helper virus. Interestingly, two replicase mutants accelerated recombinant formation and, in addition, these mutants also increased the level of subgenomic RNA synthesis (Virology 308 (2003), 191-205). A trans-complementation system was used to demonstrate that mutation in the p33 replicase protein resulted in altered recombination rate. Isolated recombinants were mostly imprecise (nonhomologous), with the recombination sites clustered around a replication enhancer region and a putative cis-acting element, respectively. These RNA elements might facilitate the proposed template switching events by the tombusvirus replicase. Together with data in the article cited above, results presented here firmly establish that the conserved RNA-binding motif of the replicase proteins is involved in RNA replication, subgenomic RNA synthesis, and RNA recombination

  13. Lysosomal putative RNA transporter SIDT2 mediates direct uptake of RNA by lysosomes.

    Science.gov (United States)

    Aizawa, Shu; Fujiwara, Yuuki; Contu, Viorica Raluca; Hase, Katsunori; Takahashi, Masayuki; Kikuchi, Hisae; Kabuta, Chihana; Wada, Keiji; Kabuta, Tomohiro

    2016-01-01

    Lysosomes are thought to be the major intracellular compartment for the degradation of macromolecules. We recently identified a novel type of autophagy, RNautophagy, where RNA is directly taken up by lysosomes in an ATP-dependent manner and degraded. However, the mechanism of RNA translocation across the lysosomal membrane and the physiological role of RNautophagy remain unclear. In the present study, we performed gain- and loss-of-function studies with isolated lysosomes, and found that SIDT2 (SID1 transmembrane family, member 2), an ortholog of the Caenorhabditis elegans putative RNA transporter SID-1 (systemic RNA interference deficient-1), mediates RNA translocation during RNautophagy. We also observed that SIDT2 is a transmembrane protein, which predominantly localizes to lysosomes. Strikingly, knockdown of Sidt2 inhibited up to ˜50% of total RNA degradation at the cellular level, independently of macroautophagy. Moreover, we showed that this impairment is mainly due to inhibition of lysosomal RNA degradation, strongly suggesting that RNautophagy plays a significant role in constitutive cellular RNA degradation. Our results provide a novel insight into the mechanisms of RNA metabolism, intracellular RNA transport, and atypical types of autophagy.

  14. Lowering the quantification limit of the QubitTM RNA HS assay using RNA spike-in.

    Science.gov (United States)

    Li, Xin; Ben-Dov, Iddo Z; Mauro, Maurizio; Williams, Zev

    2015-05-06

    RNA quantification is often a prerequisite for most RNA analyses such as RNA sequencing. However, the relatively low sensitivity and large sample consumption of traditional RNA quantification methods such as UV spectrophotometry and even the much more sensitive fluorescence-based RNA quantification assays, such as the Qubit™ RNA HS Assay, are often inadequate for measuring minute levels of RNA isolated from limited cell and tissue samples and biofluids. Thus, there is a pressing need for a more sensitive method to reliably and robustly detect trace levels of RNA without interference from DNA. To improve the quantification limit of the Qubit™ RNA HS Assay, we spiked-in a known quantity of RNA to achieve the minimum reading required by the assay. Samples containing trace amounts of RNA were then added to the spike-in and measured as a reading increase over RNA spike-in baseline. We determined the accuracy and precision of reading increases between 1 and 20 pg/μL as well as RNA-specificity in this range, and compared to those of RiboGreen(®), another sensitive fluorescence-based RNA quantification assay. We then applied Qubit™ Assay with RNA spike-in to quantify plasma RNA samples. RNA spike-in improved the quantification limit of the Qubit™ RNA HS Assay 5-fold, from 25 pg/μL down to 5 pg/μL while maintaining high specificity to RNA. This enabled quantification of RNA with original concentration as low as 55.6 pg/μL compared to 250 pg/μL for the standard assay and decreased sample consumption from 5 to 1 ng. Plasma RNA samples that were not measurable by the Qubit™ RNA HS Assay were measurable by our modified method. The Qubit™ RNA HS Assay with RNA spike-in is able to quantify RNA with high specificity at 5-fold lower concentration and uses 5-fold less sample quantity than the standard Qubit™ Assay.

  15. Chlorofluorocarbons (CFCs) destruction technology by induction coupled plasma; Koshuha purazuma ni yoru tokutei furon hakai gijutsu ni tsuite

    Energy Technology Data Exchange (ETDEWEB)

    Kobayashi, A. [Nippon Steel Corp., Tokyo (Japan)

    1999-09-05

    Abolishing flon in which the reuse by pollution and degradation is difficult by recovery flon and recovery and recycling process which do not rotate for the middle reuse that the recovery system is constructed is arising. And, the specific flon recovery quantity increases with the progress of development of the recent CFC substitute and renewal to the CFC substitute correspondence machine. Specific flon collapse technique using rf plasma introduced in this paper cultivated the basic technology in Agency of Industrial Science and Technology, resources environment integrated research place. The demonstrated operation research was carried out under Ministry of International Trade and Industry, New Energy and Industrial Technology Development Organization since December 1994. (NEDO)

  16. Aircraft fatigue failures and duties of structural reliability analysis. Kokuki kozo no hiro hakai to kozo shinraisei kaiseki no yakuwari

    Energy Technology Data Exchange (ETDEWEB)

    Fujiwara, G [Japan Airlines Co. Ltd., Tokyo (Japan)

    1992-10-05

    The use of a commercial jet transport airplane over its life of 20 years has been increasing because of intestified competition after cancellation of the regulations. It is necessary that users of the airplane adopt such a positive way as they themselves maintain safety of their airplanes rather than they wait for feedback or technical instructions from manufacturers. This paper outlines the points at issue regarding the problem of fatigue strength which is fundamental to the safety problem, explaining by various examples that the fatigue strength problem includes phenomena of which theoretical elucidation has not been obtained. Consequently, some points to be paid attention to are cited. For instance, in the analysis of reliability in case of determining the period for initial inspection (safety life), reliability should be 95-99% which have been advised by Boeing and others, even if confidence level is 95% as usual In case of considering a fleet number in the reliability analysis, the fleet number should be reflected by grouping significant in fatigue analysis. 30 refs., 10 figs., 1 tab.

  17. On the method for fracture strength assessment. Part 2; Kozobutsu no hakai kyodo hyoka no jissai. 2

    Energy Technology Data Exchange (ETDEWEB)

    Onozuka, M. [Ishikawajima-Harima Heavy Industries Co. Ltd., Tokyo (Japan)

    1995-09-05

    In order to reduce the economic cost of the generating set etc. the damages to the materials and structures of the structure to last the original design life were observed and it was considered that if damages were fewer the life would be longer. One of the important items in assessing, amending and renewing the rationality of the established structure is the assessment of the defects and flaws existing in the welded joints. In Japan, WES 2805 which is named as the Method for Assessing the Defects for the Brittle Fracture Occurring Properties of Welded Joint was formulated in 1980 as the standard of the Japan Welding Society. Although it has been applied as the criterion in wide range, the part on brittle fracture is now under revision to reflect the research results on fracture mechanics thereafter and to perfect the fracture relationship because many years have passed since its first formulation. In this paper, the contents in the final stage of the revision of WES 2805 standard, including concrete examples, were introduced. 2 refs., 6 figs., 2 tabs.

  18. siRNA as an alternative therapy against viral infections

    Directory of Open Access Journals (Sweden)

    Hana A. Pawestri

    2012-07-01

    Full Text Available siRNA (small interfering ribonucleic acid adalah sebuah metode yang dapat digunakan untuk mengatasi infeksi virus yang prinsip kerjanya berdasarkan metode komplementer dsRNA (double stranded RNA pada RNA virus sehingga menyebabkan kegagalan proses transkripsi (silencing.  Untuk lebih memahami bagaimana proses kerja dan ulasan penelitian siRNA yang terkini, di dalam tulisan ini ditinjau siRNA sebagai metoda yang dikembangkan untuk mengatasi infeksi dan meneliti efeknya pada replikasi beberapa virus seperti Hepatitis C, Influenza, Polio, dan HIV. Kami menemukan bahwa urutan basa nukleotida dari target siRNA sangat penting. Hal tersebut harus homolog dengan target RNA virus dan tidak menganggu RNA sel inang. Untuk mengurangi kegagalan terapi siRNA oleh adanya mutasi, digunakan beberapa siRNA yang sekaligus menjadi target RNA virus yang berbeda. Namun demikian, terapi siRNA masih menghadapi beberapa kesulitan seperti pengiriman (transfer khusus ke jaringan yang terinfeksi dan perlindungan siRNA dari perusakan oleh nuklease. Berdasarkan beberapa penelitian yang telah dilakukan, siRNA dapat digunakan sebagai alternatif untuk mengobati infeksi yang disebabkan oleh virus. Terapi tersebut direkomendasikan untuk dilakukan uji klinis dengan memperhatikan beberapa aspek seperti desain siRNA dan mekanisme transfer. (Health Science Indones 2010; 1: 58 - 65 Kata kunci: siRNA, infeksi virus, target virus, alternatif terapi Abstract SiRNA is a promising method to deal with viral infections. The principle of siRNA is based on the complementarily of (synthetic dsRNA to an RNA virus which, in consequence, will be silenced. Many studies are currently examining the effects of siRNA on replication of diverse virus types like Hepatitis C, polio and HIV. The choice of the siRNA target sequence is crucial. It has to be very homologous to the target RNA, but it cannot target RNA of the host cell. To reduce the possibility for the virus to escape from the siRNA therapy by

  19. Mapping RNA-seq Reads with STAR.

    Science.gov (United States)

    Dobin, Alexander; Gingeras, Thomas R

    2015-09-03

    Mapping of large sets of high-throughput sequencing reads to a reference genome is one of the foundational steps in RNA-seq data analysis. The STAR software package performs this task with high levels of accuracy and speed. In addition to detecting annotated and novel splice junctions, STAR is capable of discovering more complex RNA sequence arrangements, such as chimeric and circular RNA. STAR can align spliced sequences of any length with moderate error rates, providing scalability for emerging sequencing technologies. STAR generates output files that can be used for many downstream analyses such as transcript/gene expression quantification, differential gene expression, novel isoform reconstruction, and signal visualization. In this unit, we describe computational protocols that produce various output files, use different RNA-seq datatypes, and utilize different mapping strategies. STAR is open source software that can be run on Unix, Linux, or Mac OS X systems. Copyright © 2015 John Wiley & Sons, Inc.

  20. Facilitating RNA structure prediction with microarrays.

    Science.gov (United States)

    Kierzek, Elzbieta; Kierzek, Ryszard; Turner, Douglas H; Catrina, Irina E

    2006-01-17

    Determining RNA secondary structure is important for understanding structure-function relationships and identifying potential drug targets. This paper reports the use of microarrays with heptamer 2'-O-methyl oligoribonucleotides to probe the secondary structure of an RNA and thereby improve the prediction of that secondary structure. When experimental constraints from hybridization results are added to a free-energy minimization algorithm, the prediction of the secondary structure of Escherichia coli 5S rRNA improves from 27 to 92% of the known canonical base pairs. Optimization of buffer conditions for hybridization and application of 2'-O-methyl-2-thiouridine to enhance binding and improve discrimination between AU and GU pairs are also described. The results suggest that probing RNA with oligonucleotide microarrays can facilitate determination of secondary structure.

  1. MicroRNA involvement in glioblastoma pathogenesis

    International Nuclear Information System (INIS)

    Novakova, Jana; Slaby, Ondrej; Vyzula, Rostislav; Michalek, Jaroslav

    2009-01-01

    MicroRNAs are endogenously expressed regulatory noncoding RNAs. Altered expression levels of several microRNAs have been observed in glioblastomas. Functions and direct mRNA targets for these microRNAs have been relatively well studied over the last years. According to these data, it is now evident, that impairment of microRNA regulatory network is one of the key mechanisms in glioblastoma pathogenesis. MicroRNA deregulation is involved in processes such as cell proliferation, apoptosis, cell cycle regulation, invasion, glioma stem cell behavior, and angiogenesis. In this review, we summarize the current knowledge of miRNA functions in glioblastoma with an emphasis on its significance in glioblastoma oncogenic signaling and its potential to serve as a disease biomarker and a novel therapeutic target in oncology.

  2. Nucleolin Mediates MicroRNA-directed CSF-1 mRNA Deadenylation but Increases Translation of CSF-1 mRNA*

    Science.gov (United States)

    Woo, Ho-Hyung; Baker, Terri; Laszlo, Csaba; Chambers, Setsuko K.

    2013-01-01

    CSF-1 mRNA 3′UTR contains multiple unique motifs, including a common microRNA (miRNA) target in close proximity to a noncanonical G-quadruplex and AU-rich elements (AREs). Using a luciferase reporter system fused to CSF-1 mRNA 3′UTR, disruption of the miRNA target region, G-quadruplex, and AREs together dramatically increased reporter RNA levels, suggesting important roles for these cis-acting regulatory elements in the down-regulation of CSF-1 mRNA. We find that nucleolin, which binds both G-quadruplex and AREs, enhances deadenylation of CSF-1 mRNA, promoting CSF-1 mRNA decay, while having the capacity to increase translation of CSF-1 mRNA. Through interaction with the CSF-1 3′UTR miRNA common target, we find that miR-130a and miR-301a inhibit CSF-1 expression by enhancing mRNA decay. Silencing of nucleolin prevents the miRNA-directed mRNA decay, indicating a requirement for nucleolin in miRNA activity on CSF-1 mRNA. Downstream effects followed by miR-130a and miR-301a inhibition of directed cellular motility of ovarian cancer cells were found to be dependent on nucleolin. The paradoxical effects of nucleolin on miRNA-directed CSF-1 mRNA deadenylation and on translational activation were explored further. The nucleolin protein contains four acidic stretches, four RNA recognition motifs (RRMs), and nine RGG repeats. All three domains in nucleolin regulate CSF-1 mRNA and protein levels. RRMs increase CSF-1 mRNA, whereas the acidic and RGG domains decrease CSF-1 protein levels. This suggests that nucleolin has the capacity to differentially regulate both CSF-1 RNA and protein levels. Our finding that nucleolin interacts with Ago2 indirectly via RNA and with poly(A)-binding protein C (PABPC) directly suggests a nucleolin-Ago2-PABPC complex formation on mRNA. This complex is in keeping with our suggestion that nucleolin may work with PABPC as a double-edged sword on both mRNA deadenylation and translational activation. Our findings underscore the complexity of

  3. Reconstruction and analysis of the lncRNA-miRNA-mRNA network based on competitive endogenous RNA reveal functional lncRNAs in rheumatoid arthritis.

    Science.gov (United States)

    Jiang, Hui; Ma, Rong; Zou, Shubiao; Wang, Yongzhong; Li, Zhuqing; Li, Weiping

    2017-06-01

    Rheumatoid arthritis (RA) is an autoimmune disease with an unknown etiology, occurring in approximately 1.0% of general population. More and more studies have suggested that long non-coding RNAs (lncRNAs) could play important roles in various biological processes and be associated with the pathogenesis of different kinds of diseases including RA. Although a large number of lncRNAs have been found, our knowledge of their function and physiological/pathological significance is still in its infancy. In order to reveal functional lncRNAs and identify the key lncRNAs in RA, we reconstructed a global triple network based on the competitive endogenous RNA (ceRNA) theory using the data from National Center for Biotechnology Information Gene Expression Omnibus and our previous paper. Meanwhile, Gene Ontology (GO) and pathway analysis were performed using Cytoscape plug-in BinGO and Database for Annotation, Visualization, and Integration Discovery (DAVID), respectively. We found that the lncRNA-miRNA-mRNA network was composed of 7 lncRNA nodes, 90 mRNA nodes, 24 miRNA nodes, and 301 edges. The functional assay showed that 147 GO terms and 23 pathways were enriched. In addition, three lncRNAs (S5645.1, XR_006437.1, J01878) were highly related to RA, and therefore, were selected as key lncRNAs. This study suggests that specific lncRNAs are associated with the development of RA, and three lncRNAs (S5645.1, XR_006437.1, J01878) could be used as potential diagnostic biomarkers and therapeutic targets.

  4. Self-amplifying mRNA vaccines.

    Science.gov (United States)

    Brito, Luis A; Kommareddy, Sushma; Maione, Domenico; Uematsu, Yasushi; Giovani, Cinzia; Berlanda Scorza, Francesco; Otten, Gillis R; Yu, Dong; Mandl, Christian W; Mason, Peter W; Dormitzer, Philip R; Ulmer, Jeffrey B; Geall, Andrew J

    2015-01-01

    This chapter provides a brief introduction to nucleic acid-based vaccines and recent research in developing self-amplifying mRNA vaccines. These vaccines promise the flexibility of plasmid DNA vaccines with enhanced immunogenicity and safety. The key to realizing the full potential of these vaccines is efficient delivery of nucleic acid to the cytoplasm of a cell, where it can amplify and express the encoded antigenic protein. The hydrophilicity and strong net negative charge of RNA impedes cellular uptake. To overcome this limitation, electrostatic complexation with cationic lipids or polymers and physical delivery using electroporation or ballistic particles to improve cellular uptake has been evaluated. This chapter highlights the rapid progress made in using nonviral delivery systems for RNA-based vaccines. Initial preclinical testing of self-amplifying mRNA vaccines has shown nonviral delivery to be capable of producing potent and robust innate and adaptive immune responses in small animals and nonhuman primates. Historically, the prospect of developing mRNA vaccines was uncertain due to concerns of mRNA instability and the feasibility of large-scale manufacturing. Today, these issues are no longer perceived as barriers in the widespread implementation of the technology. Currently, nonamplifying mRNA vaccines are under investigation in human clinical trials and can be produced at a sufficient quantity and quality to meet regulatory requirements. If the encouraging preclinical data with self-amplifying mRNA vaccines are matched by equivalently positive immunogenicity, potency, and tolerability in human trials, this platform could establish nucleic acid vaccines as a versatile new tool for human immunization. Copyright © 2015 Elsevier Inc. All rights reserved.

  5. Modelling Toehold-Mediated RNA Strand Displacement

    OpenAIRE

    Šulc, Petr; Ouldridge, Thomas E.; Romano, Flavio; Doye, Jonathan P.K.; Louis, Ard A.

    2015-01-01

    We study the thermodynamics and kinetics of an RNA toehold-mediated strand displacement reaction with a recently developed coarse-grained model of RNA. Strand displacement, during which a single strand displaces a different strand previously bound to a complementary substrate strand, is an essential mechanism in active nucleic acid nanotechnology and has also been hypothesized to occur in vivo. We study the rate of displacement reactions as a function of the length of the toehold and temperat...

  6. Rfam: updates to the RNA families database

    DEFF Research Database (Denmark)

    Gardner, Paul P; Daub, Jennifer; Tate, John G

    2008-01-01

    Rfam is a collection of RNA sequence families, represented by multiple sequence alignments and covariance models (CMs). The primary aim of Rfam is to annotate new members of known RNA families on nucleotide sequences, particularly complete genomes, using sensitive BLAST filters in combination...... to the website, methodologies and data used by Rfam are discussed. Rfam is freely available on the Web at http://rfam.sanger.ac.uk/and http://rfam.janelia.org/....

  7. RNA search engines empower the bacterial intranet

    OpenAIRE

    Dendooven, T; Luisi, Bonaventura Francesco

    2017-01-01

    RNA acts not only as an information bearer in the biogenesis of proteins from genes, but also as a regulator that participates in the control of gene expression. In bacteria, small RNA molecules (sRNAs) play controlling roles in numerous processes and help to orchestrate complex regulatory networks. Such processes include cell growth and development, response to stress and metabolic change, transcription termination, cell-to-cell communication, and the launching of programmes for host invasio...

  8. Prebiotic RNA Synthesis by Montmorillonite Catalysis

    Directory of Open Access Journals (Sweden)

    Sohan Jheeta

    2014-08-01

    Full Text Available This review summarizes our recent findings on the role of mineral salts in prebiotic RNA synthesis, which is catalyzed by montmorillonite clay minerals. The clay minerals not only catalyze the synthesis of RNA but also facilitate homochiral selection. Preliminary data of these findings have been presented at the “Horizontal Gene Transfer and the Last Universal Common Ancestor (LUCA” conference at the Open University, Milton Keynes, UK, 5–6 September 2013. The objective of this meeting was to recognize the significance of RNA in LUCA. We believe that the prebiotic RNA synthesis from its monomers must have been a simple process. As a first step, it may have required activation of the 5'-end of the mononucleotide with a leaving group, e.g., imidazole in our model reaction (Figure 1. Wide ranges of activating groups are produced from HCN under plausible prebiotic Earth conditions. The final step is clay mineral catalysis in the presence of mineral salts to facilitate selective production of functional RNA. Both the clay minerals and mineral salts would have been abundant on early Earth. We have demonstrated that while montmorillonite (pH 7 produced only dimers from its monomers in water, addition of sodium chloride (1 M enhanced the chain length multifold, as detected by HPLC. The effect of monovalent cations on RNA synthesis was of the following order: Li+ > Na+ > K+. A similar effect was observed with the anions, enhancing catalysis in the following order: Cl− > Br− > I−. The montmorillonite-catalyzed RNA synthesis was not affected by hydrophobic or hydrophilic interactions. We thus show that prebiotic synthesis of RNA from its monomers was a simple process requiring only clay minerals and a small amount of salt.

  9. The Spot 42 RNA: A regulatory small RNA with roles in the central metabolism

    Science.gov (United States)

    Bækkedal, Cecilie; Haugen, Peik

    2015-01-01

    The Spot 42 RNA is a 109 nucleotide long (in Escherichia coli) noncoding small regulatory RNA (sRNA) encoded by the spf (spot fourty-two) gene. spf is found in gamma-proteobacteria and the majority of experimental work on Spot 42 RNA has been performed using E. coli, and recently Aliivibrio salmonicida. In the cell Spot 42 RNA plays essential roles as a regulator in carbohydrate metabolism and uptake, and its expression is activated by glucose, and inhibited by the cAMP-CRP complex. Here we summarize the current knowledge on Spot 42, and present the natural distribution of spf, show family-specific secondary structural features of Spot 42, and link highly conserved structural regions to mRNA target binding. PMID:26327359

  10. The replisome uses mRNA as a primer after colliding with RNA polymerase.

    Science.gov (United States)

    Pomerantz, Richard T; O'Donnell, Mike

    2008-12-11

    Replication forks are impeded by DNA damage and protein-nucleic acid complexes such as transcribing RNA polymerase. For example, head-on collision of the replisome with RNA polymerase results in replication fork arrest. However, co-directional collision of the replisome with RNA polymerase has little or no effect on fork progression. Here we examine co-directional collisions between a replisome and RNA polymerase in vitro. We show that the Escherichia coli replisome uses the RNA transcript as a primer to continue leading-strand synthesis after the collision with RNA polymerase that is displaced from the DNA. This action results in a discontinuity in the leading strand, yet the replisome remains intact and bound to DNA during the entire process. These findings underscore the notable plasticity by which the replisome operates to circumvent obstacles in its path and may explain why the leading strand is synthesized discontinuously in vivo.

  11. Comprehensive analysis of RNA-Seq data reveals extensive RNA editing in a human transcriptome

    DEFF Research Database (Denmark)

    Peng, Zhiyu; Cheng, Yanbing; Tan, Bertrand Chin-Ming

    2012-01-01

    a computational pipeline that carefully controls for false positives while calling RNA editing events from genome and whole-transcriptome data of the same individual. We identified 22,688 RNA editing events in noncoding genes and introns, untranslated regions and coding sequences of protein-coding genes. Most......RNA editing is a post-transcriptional event that recodes hereditary information. Here we describe a comprehensive profile of the RNA editome of a male Han Chinese individual based on analysis of ∼767 million sequencing reads from poly(A)(+), poly(A)(-) and small RNA samples. We developed...... changes (∼93%) converted A to I(G), consistent with known editing mechanisms based on adenosine deaminase acting on RNA (ADAR). We also found evidence of other types of nucleotide changes; however, these were validated at lower rates. We found 44 editing sites in microRNAs (miRNAs), suggesting a potential...

  12. The Spot 42 RNA: A regulatory small RNA with roles in the central metabolism.

    Science.gov (United States)

    Bækkedal, Cecilie; Haugen, Peik

    2015-01-01

    The Spot 42 RNA is a 109 nucleotide long (in Escherichia coli) noncoding small regulatory RNA (sRNA) encoded by the spf (spot fourty-two) gene. spf is found in gamma-proteobacteria and the majority of experimental work on Spot 42 RNA has been performed using E. coli, and recently Aliivibrio salmonicida. In the cell Spot 42 RNA plays essential roles as a regulator in carbohydrate metabolism and uptake, and its expression is activated by glucose, and inhibited by the cAMP-CRP complex. Here we summarize the current knowledge on Spot 42, and present the natural distribution of spf, show family-specific secondary structural features of Spot 42, and link highly conserved structural regions to mRNA target binding.

  13. A Two-Way Street: Regulatory Interplay between RNA Polymerase and Nascent RNA Structure.

    Science.gov (United States)

    Zhang, Jinwei; Landick, Robert

    2016-04-01

    The vectorial (5'-to-3' at varying velocity) synthesis of RNA by cellular RNA polymerases (RNAPs) creates a rugged kinetic landscape, demarcated by frequent, sometimes long-lived, pauses. In addition to myriad gene-regulatory roles, these pauses temporally and spatially program the co-transcriptional, hierarchical folding of biologically active RNAs. Conversely, these RNA structures, which form inside or near the RNA exit channel, interact with the polymerase and adjacent protein factors to influence RNA synthesis by modulating pausing, termination, antitermination, and slippage. Here, we review the evolutionary origin, mechanistic underpinnings, and regulatory consequences of this interplay between RNAP and nascent RNA structure. We categorize and rationalize the extensive linkage between the transcriptional machinery and its product, and provide a framework for future studies. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. New windows into retroviral RNA structures.

    Science.gov (United States)

    Jayaraman, Dhivya; Kenyon, Julia Claire

    2018-01-25

    The multiple roles of both viral and cellular RNAs have become increasingly apparent in recent years, and techniques to model them have become significantly more powerful, enabling faster and more accurate visualization of RNA structures. Techniques such as SHAPE (selective 2'OH acylation analysed by primer extension) have revolutionized the field, and have been used to examine RNAs belonging to many and diverse retroviruses. Secondary structure probing reagents such as these have been aided by the development of faster methods of analysis either via capillary or next-generation sequencing, allowing the analysis of entire genomes, and of retroviral RNA structures within virions. Techniques to model the three-dimensional structures of these large RNAs have also recently developed. The flexibility of retroviral RNAs, both structural and functional, is clear from the results of these new experimental techniques. Retroviral RNA structures and structural changes control many stages of the lifecycle, and both the RNA structures themselves and their interactions with ligands are potential new drug targets. In addition, our growing understanding of retroviral RNA structures is aiding our knowledge of cellular RNA form and function.

  15. RNA secondary structure prediction using soft computing.

    Science.gov (United States)

    Ray, Shubhra Sankar; Pal, Sankar K

    2013-01-01

    Prediction of RNA structure is invaluable in creating new drugs and understanding genetic diseases. Several deterministic algorithms and soft computing-based techniques have been developed for more than a decade to determine the structure from a known RNA sequence. Soft computing gained importance with the need to get approximate solutions for RNA sequences by considering the issues related with kinetic effects, cotranscriptional folding, and estimation of certain energy parameters. A brief description of some of the soft computing-based techniques, developed for RNA secondary structure prediction, is presented along with their relevance. The basic concepts of RNA and its different structural elements like helix, bulge, hairpin loop, internal loop, and multiloop are described. These are followed by different methodologies, employing genetic algorithms, artificial neural networks, and fuzzy logic. The role of various metaheuristics, like simulated annealing, particle swarm optimization, ant colony optimization, and tabu search is also discussed. A relative comparison among different techniques, in predicting 12 known RNA secondary structures, is presented, as an example. Future challenging issues are then mentioned.

  16. Bleomycin Can Cleave an Oncogenic Noncoding RNA.

    Science.gov (United States)

    Angelbello, Alicia J; Disney, Matthew D

    2018-01-04

    Noncoding RNAs are pervasive in cells and contribute to diseases such as cancer. A question in biomedical research is whether noncoding RNAs are targets of medicines. Bleomycin is a natural product that cleaves DNA; however, it is known to cleave RNA in vitro. Herein, an in-depth analysis of the RNA cleavage preferences of bleomycin A5 is presented. Bleomycin A5 prefers to cleave RNAs with stretches of AU base pairs. Based on these preferences and bioinformatic analysis, the microRNA-10b hairpin precursor was identified as a potential substrate for bleomycin A5. Both in vitro and cellular experiments demonstrated cleavage. Importantly, chemical cleavage by bleomycin A5 in the microRNA-10b hairpin precursors occurred near the Drosha and Dicer enzymatic processing sites and led to destruction of the microRNA. Evidently, oncogenic noncoding RNAs can be considered targets of cancer medicines and might elicit their pharmacological effects by targeting noncoding RNA. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  17. RNA Relics and Origin of Life

    Directory of Open Access Journals (Sweden)

    Laurent Vial

    2009-07-01

    Full Text Available A number of small RNA sequences, located in different non-coding sequences and highly preserved across the tree of life, have been suggested to be molecular fossils, of ancient (and possibly primordial origin. On the other hand, recent years have revealed the existence of ubiquitous roles for small RNA sequences in modern organisms, in functions ranging from cell regulation to antiviral activity. We propose that a single thread can be followed from the beginning of life in RNA structures selected only for stability reasons through the RNA relics and up to the current coevolution of RNA sequences; such an understanding would shed light both on the history and on the present development of the RNA machinery and interactions. After presenting the evidence (by comparing their sequences that points toward a common thread, we discuss a scenario of genome coevolution (with emphasis on viral infectious processes and finally propose a plan for the reevaluation of the stereochemical theory of the genetic code; we claim that it may still be relevant, and not only for understanding the origin of life, but also for a comprehensive picture of regulation in present-day cells.

  18. RNA Relics and Origin of Life

    Science.gov (United States)

    Demongeot, Jacques; Glade, Nicolas; Moreira, Andrés; Vial, Laurent

    2009-01-01

    A number of small RNA sequences, located in different non-coding sequences and highly preserved across the tree of life, have been suggested to be molecular fossils, of ancient (and possibly primordial) origin. On the other hand, recent years have revealed the existence of ubiquitous roles for small RNA sequences in modern organisms, in functions ranging from cell regulation to antiviral activity. We propose that a single thread can be followed from the beginning of life in RNA structures selected only for stability reasons through the RNA relics and up to the current coevolution of RNA sequences; such an understanding would shed light both on the history and on the present development of the RNA machinery and interactions. After presenting the evidence (by comparing their sequences) that points toward a common thread, we discuss a scenario of genome coevolution (with emphasis on viral infectious processes) and finally propose a plan for the reevaluation of the stereochemical theory of the genetic code; we claim that it may still be relevant, and not only for understanding the origin of life, but also for a comprehensive picture of regulation in present-day cells. PMID:20111682

  19. RNA Export through the NPC in Eukaryotes.

    Science.gov (United States)

    Okamura, Masumi; Inose, Haruko; Masuda, Seiji

    2015-03-20

    In eukaryotic cells, RNAs are transcribed in the nucleus and exported to the cytoplasm through the nuclear pore complex. The RNA molecules that are exported from the nucleus into the cytoplasm include messenger RNAs (mRNAs), ribosomal RNAs (rRNAs), transfer RNAs (tRNAs), small nuclear RNAs (snRNAs), micro RNAs (miRNAs), and viral mRNAs. Each RNA is transported by a specific nuclear export receptor. It is believed that most of the mRNAs are exported by Nxf1 (Mex67 in yeast), whereas rRNAs, snRNAs, and a certain subset of mRNAs are exported in a Crm1/Xpo1-dependent manner. tRNAs and miRNAs are exported by Xpot and Xpo5. However, multiple export receptors are involved in the export of some RNAs, such as 60S ribosomal subunit. In addition to these export receptors, some adapter proteins are required to export RNAs. The RNA export system of eukaryotic cells is also used by several types of RNA virus that depend on the machineries of the host cell in the nucleus for replication of their genome, therefore this review describes the RNA export system of two representative viruses. We also discuss the NPC anchoring-dependent mRNA export factors that directly recruit specific genes to the NPC.

  20. Small Molecule Modifiers of the microRNA and RNA Interference Pathway

    OpenAIRE

    Deiters, Alexander

    2009-01-01

    Recently, the RNA interference (RNAi) pathway has become the target of small molecule inhibitors and activators. RNAi has been well established as a research tool in the sequence-specific silencing of genes in eukaryotic cells and organisms by using exogenous, small, double-stranded RNA molecules of approximately 20 nucleotides. Moreover, a recently discovered post-transcriptional gene regulatory mechanism employs microRNAs (miRNAs), a class of endogenously expressed small RNA molecules, whic...

  1. Steric restrictions of RISC in RNA interference identified with size-expanded RNA nucleobases.

    Science.gov (United States)

    Hernández, Armando R; Peterson, Larryn W; Kool, Eric T

    2012-08-17

    Understanding the interactions between small interfering RNAs (siRNAs) and the RNA-induced silencing complex (RISC), the key protein complex of RNA interference (RNAi), is of great importance to the development of siRNAs with improved biological and potentially therapeutic function. Although various chemically modified siRNAs have been reported, relatively few studies with modified nucleobases exist. Here we describe the synthesis and hybridization properties of siRNAs bearing size-expanded RNA (xRNA) nucleobases and their use as a novel and systematic set of steric probes in RNAi. xRNA nucleobases are expanded by 2.4 Å using benzo-homologation and retain canonical Watson-Crick base-pairing groups. Our data show that the modified siRNA duplexes display small changes in melting temperature (+1.4 to -5.0 °C); substitutions near the center are somewhat destabilizing to the RNA duplex, while substitutions near the ends are stabilizing. RNAi studies in a dual-reporter luciferase assay in HeLa cells revealed that xRNA nucleobases in the antisense strand reduce activity at some central positions near the seed region but are generally well tolerated near the ends. Most importantly, we observed that xRNA substitutions near the 3'-end increased activity over that of wild-type siRNAs. The data are analyzed in terms of site-dependent steric effects in RISC. Circular dichroism experiments show that single xRNA substitutions do not significantly distort the native A-form helical structure of the siRNA duplex, and serum stability studies demonstrated that xRNA substitutions protect siRNAs against nuclease degradation.

  2. Characterizing the transcriptome upon depletion of RNA processing factors

    DEFF Research Database (Denmark)

    Herudek, Jan

    , it is not clear how they target and discriminate their RNA substrates. Moreover, many novel RNA species are poorly characterized and their function is not understood. Over the last decade, protein function has been studied using RNA interference. However, this approach does not allow investigation of instant......The human genome is pervasively transcribed and produces an enormous amount of non-coding RNA (ncRNA). Compared to protein-coding transcripts, many classes of ncRNAs are very unstable and rapidly degraded by the RNA decay machinery. The RNA exosome complex is a main RNA ‘degrader’ in the human...... nucleus and is responsible for the proper processing and decay of a wide range of RNA molecules. Notably, the RNA exosome complex associates with a plethora of co-factors and activators that assist in the recognition of specific RNA substrates. Although many exosome partners have been characterized...

  3. RNA-SeQC: RNA-seq metrics for quality control and process optimization.

    Science.gov (United States)

    DeLuca, David S; Levin, Joshua Z; Sivachenko, Andrey; Fennell, Timothy; Nazaire, Marc-Danie; Williams, Chris; Reich, Michael; Winckler, Wendy; Getz, Gad

    2012-06-01

    RNA-seq, the application of next-generation sequencing to RNA, provides transcriptome-wide characterization of cellular activity. Assessment of sequencing performance and library quality is critical to the interpretation of RNA-seq data, yet few tools exist to address this issue. We introduce RNA-SeQC, a program which provides key measures of data quality. These metrics include yield, alignment and duplication rates; GC bias, rRNA content, regions of alignment (exon, intron and intragenic), continuity of coverage, 3'/5' bias and count of detectable transcripts, among others. The software provides multi-sample evaluation of library construction protocols, input materials and other experimental parameters. The modularity of the software enables pipeline integration and the routine monitoring of key measures of data quality such as the number of alignable reads, duplication rates and rRNA contamination. RNA-SeQC allows investigators to make informed decisions about sample inclusion in downstream analysis. In summary, RNA-SeQC provides quality control measures critical to experiment design, process optimization and downstream computational analysis. See www.genepattern.org to run online, or www.broadinstitute.org/rna-seqc/ for a command line tool.

  4. Site-Specific Covalent Conjugation of Modified mRNA by tRNA Guanine Transglycosylase.

    Science.gov (United States)

    Ehret, Fabian; Zhou, Cun Yu; Alexander, Seth C; Zhang, Dongyang; Devaraj, Neal K

    2018-03-05

    Modified mRNA (mod-mRNA) has recently been widely studied as the form of RNA useful for therapeutic applications due to its high stability and lowered immune response. Herein, we extend the scope of the recently established RNA-TAG (transglycosylation at guanosine) methodology, a novel approach for genetically encoded site-specific labeling of large mRNA transcripts, by employing mod-mRNA as substrate. As a proof of concept, we covalently attached a fluorescent probe to mCherry encoding mod-mRNA transcripts bearing 5-methylcytidine and/or pseudouridine substitutions with high labeling efficiencies. To provide a versatile labeling methodology with a wide range of possible applications, we employed a two-step strategy for functionalization of the mod-mRNA to highlight the therapeutic potential of this new methodology. We envision that this novel and facile labeling methodology of mod-RNA will have great potential in decorating both coding and noncoding therapeutic RNAs with a variety of diagnostic and functional moieties.

  5. A Broad RNA Virus Survey Reveals Both miRNA Dependence and Functional Sequestration

    DEFF Research Database (Denmark)

    Scheel, Troels K H; Luna, Joseph M; Liniger, Matthias

    2016-01-01

    , critically depended on the interaction of cellular miR-17 and let-7 with the viral 3' UTR. Unlike canonical miRNA interactions, miR-17 and let-7 binding enhanced pestivirus translation and RNA stability. miR-17 sequestration by pestiviruses conferred reduced AGO binding and functional de...... immunoprecipitation (CLIP) of the Argonaute (AGO) proteins to characterize strengths and specificities of miRNA interactions in the context of 15 different RNA virus infections, including several clinically relevant pathogens. Notably, replication of pestiviruses, a major threat to milk and meat industries...

  6. RNA Interference and its therapeutic applications

    Directory of Open Access Journals (Sweden)

    Srinivasa Rao T

    2011-10-01

    Full Text Available RNAi is a potent method, requiring only a few molecules of dsRNA per cell to silence the expression. Long molecules of double stranded RNA (dsRNA trigger the process. The dsRNA comes from virus and transposon activity in natural RNAi process, while it can be injected in the cells in experimental processes. The strand of the dsRNA that is identical in sequence to a region in target mRNA molecule is called the sense strand, and the other strand which is complimentary is termed the antisense strand. An enzyme complex called DICER thought to be similar to RNAase III then recognizes dsRNA, and cuts it into roughly 22- nucleotide long fragments. These fragments termed siRNAs for “small interfering RNAs” remain in double stranded duplexes with very short 3' overhangs. However, only one of the two strands, known as the guide strand or antisense strand binds the argonaute protein of RNA-induced silencing complex (RISC and target the complementary mRNA resulting gene silencing. The other anti-guide strand or passenger strand is degraded as a RISC substrate during the process of RISC activation. This form of RNAi is termed as post transcriptional gene silencing (PTGS; other forms are also thought to operate at the genomic or transcriptional level in some organisms. In mammals dsRNA longer than 30 base pairs induces a nonspecific antiviral response. This so-called interferon response results in a nonspecific arrest in translation and induction of apoptosis. This cascade induces a global non-specific suppression of translation, which in turn triggers apoptosis. Interestingly, dsRNAs less than 30 nt in length do not activate the antiviral response and specifically switched off genes in human cells without initiating the acute phase response. Thus these siRNAs are suitable for gene target validation and therapeutic applications in many species, including humans. [Vet. World 2011; 4(5.000: 225-229

  7. Species-independent MicroRNA Gene Discovery

    KAUST Repository

    Kamanu, Timothy K.

    2012-12-01

    MicroRNA (miRNA) are a class of small endogenous non-coding RNA that are mainly negative transcriptional and post-transcriptional regulators in both plants and animals. Recent studies have shown that miRNA are involved in different types of cancer and other incurable diseases such as autism and Alzheimer’s. Functional miRNAs are excised from hairpin-like sequences that are known as miRNA genes. There are about 21,000 known miRNA genes, most of which have been determined using experimental methods. miRNA genes are classified into different groups (miRNA families). This study reports about 19,000 unknown miRNA genes in nine species whereby approximately 15,300 predictions were computationally validated to contain at least one experimentally verified functional miRNA product. The predictions are based on a novel computational strategy which relies on miRNA family groupings and exploits the physics and geometry of miRNA genes to unveil the hidden palindromic signals and symmetries in miRNA gene sequences. Unlike conventional computational miRNA gene discovery methods, the algorithm developed here is species-independent: it allows prediction at higher accuracy and resolution from arbitrary RNA/DNA sequences in any species and thus enables examination of repeat-prone genomic regions which are thought to be non-informative or ’junk’ sequences. The information non-redundancy of uni-directional RNA sequences compared to information redundancy of bi-directional DNA is demonstrated, a fact that is overlooked by most pattern discovery algorithms. A novel method for computing upstream and downstream miRNA gene boundaries based on mathematical/statistical functions is suggested, as well as cutoffs for annotation of miRNA genes in different miRNA families. Another tool is proposed to allow hypotheses generation and visualization of data matrices, intra- and inter-species chromosomal distribution of miRNA genes or miRNA families. Our results indicate that: miRNA and miRNA

  8. ncRNA-class Web Tool: Non-coding RNA feature extraction and pre-miRNA classification web tool

    KAUST Repository

    Kleftogiannis, Dimitrios A.; Theofilatos, Konstantinos A.; Papadimitriou, Stergios; Tsakalidis, Athanasios K.; Likothanassis, Spiridon D.; Mavroudi, Seferina P.

    2012-01-01

    Until recently, it was commonly accepted that most genetic information is transacted by proteins. Recent evidence suggests that the majority of the genomes of mammals and other complex organisms are in fact transcribed into non-coding RNAs (ncRNAs), many of which are alternatively spliced and/or processed into smaller products. Non coding RNA genes analysis requires the calculation of several sequential, thermodynamical and structural features. Many independent tools have already been developed for the efficient calculation of such features but to the best of our knowledge there does not exist any integrative approach for this task. The most significant amount of existing work is related to the miRNA class of non-coding RNAs. MicroRNAs (miRNAs) are small non-coding RNAs that play a significant role in gene regulation and their prediction is a challenging bioinformatics problem. Non-coding RNA feature extraction and pre-miRNA classification Web Tool (ncRNA-class Web Tool) is a publicly available web tool ( http://150.140.142.24:82/Default.aspx ) which provides a user friendly and efficient environment for the effective calculation of a set of 58 sequential, thermodynamical and structural features of non-coding RNAs, plus a tool for the accurate prediction of miRNAs. © 2012 IFIP International Federation for Information Processing.

  9. Identification of RNA species in the RNA-toxin complex and structure of the complex in Clostridium botulinum type E.

    Science.gov (United States)

    Kitamura, Masaru

    2002-02-15

    Clostridium botulinum type E toxin was isolated in the form of a complex with RNA(s) from bacterial cells. Characterization of the complexed RNA remains to be elucidated. The RNA is identified here as ribosomal RNA (rRNA) having 23S and 16S components. The RNA-toxin complexes were found to be made up of three types with different molecular sizes. The three types of RNA-toxin complex are toxin bound to both the 23S and 16S rRNA, toxin bound to the 16S rRNA and a small amount of 23S rRNA, and toxin bound only to the 16S rRNA. ©2002 Elsevier Science (USA).

  10. Vitamin D and alternative splicing of RNA.

    Science.gov (United States)

    Zhou, Rui; Chun, Rene F; Lisse, Thomas S; Garcia, Alejandro J; Xu, Jianzhong; Adams, John S; Hewison, Martin

    2015-04-01

    The active form of vitamin D (1α,25-dihydroxyvitamin D, 1,25(OH)2D) exerts its genomic effects via binding to a nuclear high-affinity vitamin D receptor (VDR). Recent deep sequencing analysis of VDR binding locations across the complete genome has significantly expanded our understanding of the actions of vitamin D and VDR on gene transcription. However, these studies have also promoted appreciation of the extra-transcriptional impact of vitamin D on gene expression. It is now clear that vitamin D interacts with the epigenome via effects on DNA methylation, histone acetylation, and microRNA generation to maintain normal biological functions. There is also increasing evidence that vitamin D can influence pre-mRNA constitutive splicing and alternative splicing, although the mechanism for this remains unclear. Pre-mRNA splicing has long been thought to be a post-transcription RNA processing event, but current data indicate that this occurs co-transcriptionally. Several steroid hormones have been recognized to coordinately control gene transcription and pre-mRNA splicing through the recruitment of nuclear receptor co-regulators that can both control gene transcription and splicing. The current review will discuss this concept with specific reference to vitamin D, and the potential role of heterogeneous nuclear ribonucleoprotein C (hnRNPC), a nuclear factor with an established function in RNA splicing. hnRNPC, has been shown to be involved in the VDR transcriptional complex as a vitamin D-response element-binding protein (VDRE-BP), and may act as a coupling factor linking VDR-directed gene transcription with RNA splicing. In this way hnRNPC may provide an additional mechanism for the fine-tuning of vitamin D-regulated target gene expression. This article is part of a Special Issue entitled '17th Vitamin D Workshop'. Copyright © 2014 Elsevier Ltd. All rights reserved.

  11. A novel TBP-TAF complex on RNA polymerase II-transcribed snRNA genes.

    Science.gov (United States)

    Zaborowska, Justyna; Taylor, Alice; Roeder, Robert G; Murphy, Shona

    2012-01-01

    Initiation of transcription of most human genes transcribed by RNA polymerase II (RNAP II) requires the formation of a preinitiation complex comprising TFIIA, B, D, E, F, H and RNAP II. The general transcription factor TFIID is composed of the TATA-binding protein and up to 13 TBP-associated factors. During transcription of snRNA genes, RNAP II does not appear to make the transition to long-range productive elongation, as happens during transcription of protein-coding genes. In addition, recognition of the snRNA gene-type specific 3' box RNA processing element requires initiation from an snRNA gene promoter. These characteristics may, at least in part, be driven by factors recruited to the promoter. For example, differences in the complement of TAFs might result in differential recruitment of elongation and RNA processing factors. As precedent, it already has been shown that the promoters of some protein-coding genes do not recruit all the TAFs found in TFIID. Although TAF5 has been shown to be associated with RNAP II-transcribed snRNA genes, the full complement of TAFs associated with these genes has remained unclear. Here we show, using a ChIP and siRNA-mediated approach, that the TBP/TAF complex on snRNA genes differs from that found on protein-coding genes. Interestingly, the largest TAF, TAF1, and the core TAFs, TAF10 and TAF4, are not detected on snRNA genes. We propose that this snRNA gene-specific TAF subset plays a key role in gene type-specific control of expression.

  12. RNA precursor pool metabolism and RNA synthesis in X-irradiated Tetrahymena

    International Nuclear Information System (INIS)

    Stephens, R.E.; Paul, I.J.; Zimmerman, A.M.

    1976-01-01

    The incorporation of a radioactive RNA precursor ( 3 H-uridine) has been used in many studies as an index for measuring the synthesis of RNA, yet there is a distinct possibility that the results so obtained were significantly influenced by radiation-induced effects on the metabolism of this precursor into UTP (the primary immediate precursor of RNA) before its incorporation into RNA. A direct examination was therefore undertaken of the effects of X-irradiation on the metabolism of 3 H-uridine and its relationship to RNA synthesis as determined by incorporation. X-irradiation of logarithmically growing Tetrahymena pyriformis caused a dose-dependent depression of total cellular RNA synthesis. Ribosomal RNA (which comprises about 80 per cent of total cellular RNA) synthesis was also depressed by X-irradiation in a dose-dependent manner. Measurements of the levels of radioactivity present in the UTP precursor pool of both irradiated and unirradiated cells were obtained by means of DEAE-cellulose column chromatography of the extracted free nucleotides. Metabolism of 3 H-uridine into UMP, UDP and UTP was depressed by 40%, 26% and 27% respectively, whereas incorporation of 3 H-uridine into RNA was depressed by 77%. The results show that about one-third of the observed (apparent) depression in RNA synthesis was due to radiation-induced effects on the precursor pool, and the remaining two-thirds due to some definite effect of radiation at the transcription level leading to depressed synthesis of RNA. (U.K.)

  13. Extraction of low molecular weight RNA from Citrus trifolita tissues ...

    African Journals Online (AJOL)

    Jane

    2010-12-20

    Dec 20, 2010 ... A critical prerequisite in miRNA studies is acquisition of high quality LMW RNA. LMW RNA is ..... air-dried for a few minutes and then exposed to BIOMAX X-ray film for 48 h using an .... Approaches to microRNA discovery. Nat.

  14. RAIN: RNA-protein Association and Interaction Networks

    DEFF Research Database (Denmark)

    Junge, Alexander; Refsgaard, Jan Christian; Garde, Christian

    2017-01-01

    is challenging due to data heterogeneity. Here, we present a database of ncRNA-RNA and ncRNA-protein interactions and its integration with the STRING database of protein-protein interactions. These ncRNA associations cover four organisms and have been established from curated examples, experimental data...

  15. Interaction of sulforaphane with DNA and RNA.

    Directory of Open Access Journals (Sweden)

    Farzaneh Abassi Joozdani

    Full Text Available Sulforaphane (SFN is an isothiocyanate found in cruciferous vegetables with anti-inflammatory, anti-oxidant and anti-cancer activities. However, the antioxidant and anticancer mechanism of sulforaphane is not well understood. In the present research, we reported binding modes, binding constants and stability of SFN-DNA and -RNA complexes by Fourier transform infrared (FTIR and UV-Visible spectroscopic methods. Spectroscopic evidence showed DNA intercalation with some degree of groove binding. SFN binds minor and major grooves of DNA and backbone phosphate (PO2, while RNA binding is through G, U, A bases with some degree of SFN-phosphate (PO2 interaction. Overall binding constants were estimated to be K(SFN-DNA=3.01 (± 0.035×10(4 M(-1 and K(SFN-RNA= 6.63 (±0.042×10(3 M(-1. At high SFN concentration (SFN/RNA = 1/1, DNA conformation changed from B to A occurred, while RNA remained in A-family structure.

  16. tmRDB (tmRNA database)

    DEFF Research Database (Denmark)

    Zwieb, Christian; Gorodkin, Jan; Knudsen, Bjarne

    2003-01-01

    Maintained at the University of Texas Health Science Center at Tyler, Texas, the tmRNA database (tmRDB) is accessible at the URL http://psyche.uthct.edu/dbs/tmRDB/tmRDB.html with mirror sites located at Auburn University, Auburn, Alabama (http://www.ag.auburn.edu/mirror/tmRDB/) and the Bioinforma......Maintained at the University of Texas Health Science Center at Tyler, Texas, the tmRNA database (tmRDB) is accessible at the URL http://psyche.uthct.edu/dbs/tmRDB/tmRDB.html with mirror sites located at Auburn University, Auburn, Alabama (http......://www.ag.auburn.edu/mirror/tmRDB/) and the Bioinformatics Research Center, Aarhus, Denmark (http://www.bioinf.au.dk/tmRDB/). The tmRDB collects and distributes information relevant to the study of tmRNA. In trans-translation, this molecule combines properties of tRNA and mRNA and binds several proteins to form the tmRNP. Related RNPs are likely...

  17. Accelerated probabilistic inference of RNA structure evolution

    Directory of Open Access Journals (Sweden)

    Holmes Ian

    2005-03-01

    Full Text Available Abstract Background Pairwise stochastic context-free grammars (Pair SCFGs are powerful tools for evolutionary analysis of RNA, including simultaneous RNA sequence alignment and secondary structure prediction, but the associated algorithms are intensive in both CPU and memory usage. The same problem is faced by other RNA alignment-and-folding algorithms based on Sankoff's 1985 algorithm. It is therefore desirable to constrain such algorithms, by pre-processing the sequences and using this first pass to limit the range of structures and/or alignments that can be considered. Results We demonstrate how flexible classes of constraint can be imposed, greatly reducing the computational costs while maintaining a high quality of structural homology prediction. Any score-attributed context-free grammar (e.g. energy-based scoring schemes, or conditionally normalized Pair SCFGs is amenable to this treatment. It is now possible to combine independent structural and alignment constraints of unprecedented general flexibility in Pair SCFG alignment algorithms. We outline several applications to the bioinformatics of RNA sequence and structure, including Waterman-Eggert N-best alignments and progressive multiple alignment. We evaluate the performance of the algorithm on test examples from the RFAM database. Conclusion A program, Stemloc, that implements these algorithms for efficient RNA sequence alignment and structure prediction is available under the GNU General Public License.

  18. A comparison of RNA folding measures

    DEFF Research Database (Denmark)

    Freyhult, E.; Gardner, P. P.; Moulton, V.

    2005-01-01

    the behaviour of these measures over a large range of Rfam ncRNA families. Such measures can be useful in, for example, identifying novel ncRNAs, and indicating the presence of alternate RNA foldings. Results Our analysis shows that ncRNAs, but not mRNAs, in general have lower minimal free energy (MFE) than....... Conclusion Due to the correlations between the different measures we find that it is sufficient to use only two of them in RNA folding studies, one to test if the sequence in question has lower energy than a random sequence with the same dinucleotide frequency (the Z-score) and the other to see......Background In the last few decades there has been a great deal of discussion concerning whether or not noncoding RNA sequences (ncRNAs) fold in a more well-defined manner than random sequences. In this paper, we investigate several existing measures for how well an RNA sequence folds, and compare...

  19. Double Stranded RNA in Human Seminal Plasma

    Directory of Open Access Journals (Sweden)

    Maxim V. Zagoskin

    2017-10-01

    Full Text Available Recently, human semen was shown to contain cell-free nucleic acids, such as DNA, long single stranded RNA, and small RNAs–miRNA and piRNA. The RNAs have been suggested to have potential biological roles as communication molecules between cells and in the temporal and spatial regulation of gene expression in the male reproductive system. Here we demonstrate that human seminal plasma contains a variety of cell-free dsRNAs, describe a robust method to isolate this type of nucleic acid in preparative amounts, and discuss the potential biological roles of these molecules in inheritance. dsRNA plays a role in a variety of biological processes, including gene regulation, is extremely stable and can gain access to cells from the extracellular medium. We suggest that one of the possible functions of dsRNA in human seminal plasma may be to influence human oocytes and therefore, influence the offspring. It also remains possible that these dsRNAs might have potential use as biomarkers for the study of human physiopathological conditions and genetic variation.

  20. A comparison of RNA folding measures

    Directory of Open Access Journals (Sweden)

    Gardner Paul P

    2005-10-01

    Full Text Available Abstract Background In the last few decades there has been a great deal of discussion concerning whether or not noncoding RNA sequences (ncRNAs fold in a more well-defined manner than random sequences. In this paper, we investigate several existing measures for how well an RNA sequence folds, and compare the behaviour of these measures over a large range of Rfam ncRNA families. Such measures can be useful in, for example, identifying novel ncRNAs, and indicating the presence of alternate RNA foldings. Results Our analysis shows that ncRNAs, but not mRNAs, in general have lower minimal free energy (MFE than random sequences with the same dinucleotide frequency. Moreover, even when the MFE is significant, many ncRNAs appear to not have a unique fold, but rather several alternative folds, at least when folded in silico. Furthermore, we find that the six investigated measures are correlated to varying degrees. Conclusion Due to the correlations between the different measures we find that it is sufficient to use only two of them in RNA folding studies, one to test if the sequence in question has lower energy than a random sequence with the same dinucleotide frequency (the Z-score and the other to see if the sequence has a unique fold (the average base-pair distance, D.

  1. Multiple Regression Analysis of mRNA-miRNA Associations in Colorectal Cancer Pathway

    Science.gov (United States)

    Wang, Fengfeng; Wong, S. C. Cesar; Chan, Lawrence W. C.; Cho, William C. S.; Yip, S. P.; Yung, Benjamin Y. M.

    2014-01-01

    Background. MicroRNA (miRNA) is a short and endogenous RNA molecule that regulates posttranscriptional gene expression. It is an important factor for tumorigenesis of colorectal cancer (CRC), and a potential biomarker for diagnosis, prognosis, and therapy of CRC. Our objective is to identify the related miRNAs and their associations with genes frequently involved in CRC microsatellite instability (MSI) and chromosomal instability (CIN) signaling pathways. Results. A regression model was adopted to identify the significantly associated miRNAs targeting a set of candidate genes frequently involved in colorectal cancer MSI and CIN pathways. Multiple linear regression analysis was used to construct the model and find the significant mRNA-miRNA associations. We identified three significantly associated mRNA-miRNA pairs: BCL2 was positively associated with miR-16 and SMAD4 was positively associated with miR-567 in the CRC tissue, while MSH6 was positively associated with miR-142-5p in the normal tissue. As for the whole model, BCL2 and SMAD4 models were not significant, and MSH6 model was significant. The significant associations were different in the normal and the CRC tissues. Conclusion. Our results have laid down a solid foundation in exploration of novel CRC mechanisms, and identification of miRNA roles as oncomirs or tumor suppressor mirs in CRC. PMID:24895601

  2. mRNA/microRNA gene expression profile in microsatellite unstable colorectal cancer

    Directory of Open Access Journals (Sweden)

    Calin George A

    2007-08-01

    Full Text Available Abstract Background Colorectal cancer develops through two main genetic instability pathways characterized by distinct pathologic features and clinical outcome. Results We investigated colon cancer samples (23 characterized by microsatellite stability, MSS, and 16 by high microsatellite instability, MSI-H for genome-wide expression of microRNA (miRNA and mRNA. Based on combined miRNA and mRNA gene expression, a molecular signature consisting of twenty seven differentially expressed genes, inclusive of 8 miRNAs, could correctly distinguish MSI-H versus MSS colon cancer samples. Among the differentially expressed miRNAs, various members of the oncogenic miR-17-92 family were significantly up-regulated in MSS cancers. The majority of protein coding genes were also up-regulated in MSS cancers. Their functional classification revealed that they were most frequently associated with cell cycle, DNA replication, recombination, repair, gastrointestinal disease and immune response. Conclusion This is the first report that indicates the existence of differences in miRNA expression between MSS versus MSI-H colorectal cancers. In addition, the work suggests that the combination of mRNA/miRNA expression signatures may represent a general approach for improving bio-molecular classification of human cancer.

  3. Phosphatidic acid produced by phospholipase D promotes RNA replication of a plant RNA virus.

    Directory of Open Access Journals (Sweden)

    Kiwamu Hyodo

    2015-05-01

    Full Text Available Eukaryotic positive-strand RNA [(+RNA] viruses are intracellular obligate parasites replicate using the membrane-bound replicase complexes that contain multiple viral and host components. To replicate, (+RNA viruses exploit host resources and modify host metabolism and membrane organization. Phospholipase D (PLD is a phosphatidylcholine- and phosphatidylethanolamine-hydrolyzing enzyme that catalyzes the production of phosphatidic acid (PA, a lipid second messenger that modulates diverse intracellular signaling in various organisms. PA is normally present in small amounts (less than 1% of total phospholipids, but rapidly and transiently accumulates in lipid bilayers in response to different environmental cues such as biotic and abiotic stresses in plants. However, the precise functions of PLD and PA remain unknown. Here, we report the roles of PLD and PA in genomic RNA replication of a plant (+RNA virus, Red clover necrotic mosaic virus (RCNMV. We found that RCNMV RNA replication complexes formed in Nicotiana benthamiana contained PLDα and PLDβ. Gene-silencing and pharmacological inhibition approaches showed that PLDs and PLDs-derived PA are required for viral RNA replication. Consistent with this, exogenous application of PA enhanced viral RNA replication in plant cells and plant-derived cell-free extracts. We also found that a viral auxiliary replication protein bound to PA in vitro, and that the amount of PA increased in RCNMV-infected plant leaves. Together, our findings suggest that RCNMV hijacks host PA-producing enzymes to replicate.

  4. Archaeal rRNA operons, intron splicing and homing endonucleases, RNA polymerase operons and phylogeny

    DEFF Research Database (Denmark)

    Garrett, Roger Antony; Aagaard, Claus Sindbjerg; Andersen, Morten

    1994-01-01

    Over the past decade our laboratory has had a strong interest in defining the phylogenetic status of the archaea. This has involved determining and analysing the sequences of operons of both rRNAs and RNA polymerases and it led to the discovery of the first archaeal rRNA intron. What follows...

  5. A ribonuclease coordinates siRNA amplification and mRNA cleavage during RNAi.

    Science.gov (United States)

    Tsai, Hsin-Yue; Chen, Chun-Chieh G; Conte, Darryl; Moresco, James J; Chaves, Daniel A; Mitani, Shohei; Yates, John R; Tsai, Ming-Daw; Mello, Craig C

    2015-01-29

    Effective silencing by RNA-interference (RNAi) depends on mechanisms that amplify and propagate the silencing signal. In some organisms, small-interfering RNAs (siRNAs) are amplified from target mRNAs by RNA-dependent RNA polymerase (RdRP). Both RdRP recruitment and mRNA silencing require Argonaute proteins, which are generally thought to degrade RNAi targets by directly cleaving them. However, in C. elegans, the enzymatic activity of the primary Argonaute, RDE-1, is not required for silencing activity. We show that RDE-1 can instead recruit an endoribonuclease, RDE-8, to target RNA. RDE-8 can cleave RNA in vitro and is needed for the production of 3' uridylated fragments of target mRNA in vivo. We also find that RDE-8 promotes RdRP activity, thereby ensuring amplification of siRNAs. Together, our findings suggest a model in which RDE-8 cleaves target mRNAs to mediate silencing, while generating 3' uridylated mRNA fragments to serve as templates for the RdRP-directed amplification of the silencing signal. Copyright © 2015 Elsevier Inc. All rights reserved.

  6. RNA damage in biological conflicts and the diversity of responding RNA repair systems

    Science.gov (United States)

    Burroughs, A. Maxwell; Aravind, L.

    2016-01-01

    RNA is targeted in biological conflicts by enzymatic toxins or effectors. A vast diversity of systems which repair or ‘heal’ this damage has only recently become apparent. Here, we summarize the known effectors, their modes of action, and RNA targets before surveying the diverse systems which counter this damage from a comparative genomics viewpoint. RNA-repair systems show a modular organization with extensive shuffling and displacement of the constituent domains; however, a general ‘syntax’ is strongly maintained whereby systems typically contain: a RNA ligase (either ATP-grasp or RtcB superfamilies), nucleotidyltransferases, enzymes modifying RNA-termini for ligation (phosphatases and kinases) or protection (methylases), and scaffold or cofactor proteins. We highlight poorly-understood or previously-uncharacterized repair systems and components, e.g. potential scaffolding cofactors (Rot/TROVE and SPFH/Band-7 modules) with their respective cognate non-coding RNAs (YRNAs and a novel tRNA-like molecule) and a novel nucleotidyltransferase associating with diverse ligases. These systems have been extensively disseminated by lateral transfer between distant prokaryotic and microbial eukaryotic lineages consistent with intense inter-organismal conflict. Components have also often been ‘institutionalized’ for non-conflict roles, e.g. in RNA-splicing and in RNAi systems (e.g. in kinetoplastids) which combine a distinct family of RNA-acting prim-pol domains with DICER-like proteins. PMID:27536007

  7. Capturing microRNA targets using an RNA-induced silencing complex (RISC)-trap approach.

    Science.gov (United States)

    Cambronne, Xiaolu A; Shen, Rongkun; Auer, Paul L; Goodman, Richard H

    2012-12-11

    Identifying targets is critical for understanding the biological effects of microRNA (miRNA) expression. The challenge lies in characterizing the cohort of targets for a specific miRNA, especially when targets are being actively down-regulated in miRNA- RNA-induced silencing complex (RISC)-messengerRNA (mRNA) complexes. We have developed a robust and versatile strategy called RISCtrap to stabilize and purify targets from this transient interaction. Its utility was demonstrated by determining specific high-confidence target datasets for miR-124, miR-132, and miR-181 that contained known and previously unknown transcripts. Two previously unknown miR-132 targets identified with RISCtrap, adaptor protein CT10 regulator of kinase 1 (CRK1) and tight junction-associated protein 1 (TJAP1), were shown to be endogenously regulated by miR-132 in adult mouse forebrain. The datasets, moreover, differed in the number of targets and in the types and frequency of microRNA recognition element (MRE) motifs, thus revealing a previously underappreciated level of specificity in the target sets regulated by individual miRNAs.

  8. Orotidine-Containing RNA: Implications for the Hierarchical Selection (Systems Chemistry Emergence) of RNA.

    Science.gov (United States)

    Kim, Eun-Kyong; Martin, Vincent; Krishnamurthy, Ramanarayanan

    2017-09-12

    The prebiotic synthesis of canonical nucleobases from HCN is a cornerstone for the RNA world hypothesis. However, their role in the primordial pathways to RNA is still debated. The very same process starting from HCN also gives rise to orotic acid, which (via orotidine) plays a crucial role in extant biology in the de novo synthesis of uridine and cytidine, the informational base-pairs in RNA. However, orotidine itself is absent in RNA. Given the prebiotic and biological relevance of orotic acid vis-à-vis uracil, we investigated orotidine-containing RNA oligonucleotides and show that they have severely compromised base-pairing properties. While not unexpected, these results suggest that the emergence of extant RNA cannot just be a consequence of the plausible prebiotic formation of its chemical constituents/building blocks. In combination with other investigations on alternative prebiotic nucleobases, sugars, and linkers, these findings imply that the selection of the components of extant RNA occurred at a higher hierarchical level of an oligomer/polymer based on its functional properties-pointing to a systems chemistry emergence of RNA from a library of precursors. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  9. Kinetoplastid guide RNA biogenesis is dependent on subunits of the mitochondrial RNA binding complex 1 and mitochondrial RNA polymerase

    Czech Academy of Sciences Publication Activity Database

    Hashimi, Hassan; Číčová, Zdeňka; Novotná, Lucie; Wen, Y.-Z.; Lukeš, Julius

    2009-01-01

    Roč. 15, č. 4 (2009), s. 588-599 ISSN 1355-8382 R&D Projects: GA ČR GA204/09/1667; GA AV ČR IAA500960705; GA MŠk LC07032; GA MŠk 2B06129; GA ČR GD524/03/H133 Institutional research plan: CEZ:AV0Z60220518 Keywords : RNA editing * guide RNA * mitochondrion * trypanosome Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 5.198, year: 2009

  10. Reproducible pattern of microRNA in normal human skin

    DEFF Research Database (Denmark)

    Holst, Line; Kaczkowski, Bogumil; Gniadecki, Robert

    2010-01-01

    RNA expression pattern in normal human skin. Here we investigated miRNA expression profiles from skin biopsies of 8 healthy volunteers taken from sun protected and mildly photo damaged skin using the modified protocol for miRNA extraction. We were able to show a constant pattern of miRNA expression between......MicroRNAs (miRNAs) regulate cell growth, differentiation and apoptosis via specific targeting of messenger RNA (mRNA). Aberrant mRNA expression contributes to pathological processes such as carcinogenesis. To take advantage of miRNA profiling in skin disease it is essential to investigate mi...... different individuals. We did not find any significant differences in miRNA expression between sun protected and mildly photodamaged skin. These results may be valuable for future design of studies on miRNA expression in skin disease....

  11. Changes in rRNA levels during stress invalidates results from mRNA blotting: Fluorescence in situ rRNA hybridization permits renormalization for estimation of cellular mRNA levels

    DEFF Research Database (Denmark)

    Hansen, M.C.; Nielsen, A.K.; Molin, Søren

    2001-01-01

    obtained by these techniques are compared between experiments in which differences in growth rates, strains, or stress treatments occur, the normalization procedure may have a significant impact on the results. In this report we present a solution to the normalization problem in RNA slot blotting...... the relative level of rRNA per cell, and slot blotting to rRNA probes, which estimates the level of rRNA per extracted total RNA, the amount of RNA per cell was calculated in a series of heat shock experiments with the gram-positive bacterium Lactococcus lactis. It was found that the level of rRNA per cell...... decreased to 30% in the course of the heat shock. This lowered ribosome level led to a decrease in the total RNA content, resulting in a gradually increasing overestimation of the mRNA levels throughout the experiment. Using renormalized cellular mRNA levels, the HrcA-mediated regulation of the genes...

  12. Reproducible pattern of microRNA in normal human skin

    DEFF Research Database (Denmark)

    Holst, Line; Kaczkowski, Bogumil; Gniadecki, Robert

    2010-01-01

    RNA expression pattern in normal human skin. Here we investigated miRNA expression profiles from skin biopsies of 8 healthy volunteers taken from sun protected and mildly photo damaged skin using the modified protocol for miRNA extraction. We were able to show a constant pattern of miRNA expression between...... different individuals. We did not find any significant differences in miRNA expression between sun protected and mildly photodamaged skin. These results may be valuable for future design of studies on miRNA expression in skin disease.......MicroRNAs (miRNAs) regulate cell growth, differentiation and apoptosis via specific targeting of messenger RNA (mRNA). Aberrant mRNA expression contributes to pathological processes such as carcinogenesis. To take advantage of miRNA profiling in skin disease it is essential to investigate mi...

  13. Biochemical characterization of a recombinant Japanese encephalitis virus RNA-dependent RNA polymerase

    Directory of Open Access Journals (Sweden)

    Kim Chan-Mi

    2007-07-01

    Full Text Available Abstract Background Japanese encephalitis virus (JEV NS5 is a viral nonstructural protein that carries both methyltransferase and RNA-dependent RNA polymerase (RdRp domains. It is a key component of the viral RNA replicase complex that presumably includes other viral nonstructural and cellular proteins. The biochemical properties of JEV NS5 have not been characterized due to the lack of a robust in vitro RdRp assay system, and the molecular mechanisms for the initiation of RNA synthesis by JEV NS5 remain to be elucidated. Results To characterize the biochemical properties of JEV RdRp, we expressed in Escherichia coli and purified an enzymatically active full-length recombinant JEV NS5 protein with a hexahistidine tag at the N-terminus. The purified NS5 protein, but not the mutant NS5 protein with an Ala substitution at the first Asp of the RdRp-conserved GDD motif, exhibited template- and primer-dependent RNA synthesis activity using a poly(A RNA template. The NS5 protein was able to use both plus- and minus-strand 3'-untranslated regions of the JEV genome as templates in the absence of a primer, with the latter RNA being a better template. Analysis of the RNA synthesis initiation site using the 3'-end 83 nucleotides of the JEV genome as a minimal RNA template revealed that the NS5 protein specifically initiates RNA synthesis from an internal site, U81, at the two nucleotides upstream of the 3'-end of the template. Conclusion As a first step toward the understanding of the molecular mechanisms for JEV RNA replication and ultimately for the in vitro reconstitution of viral RNA replicase complex, we for the first time established an in vitro JEV RdRp assay system with a functional full-length recombinant JEV NS5 protein and characterized the mechanisms of RNA synthesis from nonviral and viral RNA templates. The full-length recombinant JEV NS5 will be useful for the elucidation of the structure-function relationship of this enzyme and for the

  14. Cancer-Related Triplets of mRNA-lncRNA-miRNA Revealed by Integrative Network in Uterine Corpus Endometrial Carcinoma

    Directory of Open Access Journals (Sweden)

    Chenglin Liu

    2017-01-01

    Full Text Available The regulation of transcriptome expression level is a complex process involving multiple-level interactions among molecules such as protein coding RNA (mRNA, long noncoding RNA (lncRNA, and microRNA (miRNA, which are essential for the transcriptome stability and maintenance and regulation of body homeostasis. The availability of multilevel expression data enables a comprehensive view of the regulatory network. In this study, we analyzed the coding and noncoding gene expression profiles of 301 patients with uterine corpus endometrial carcinoma (UCEC. A new method was proposed to construct a genome-wide integrative network based on variance inflation factor (VIF regression method. The cross-regulation relations of mRNA, lncRNA, and miRNA were then selected based on clique-searching algorithm from the network, when any two molecules of the three were shown as interacting according to the integrative network. Such relation, which we call the mRNA-lncRNA-miRNA triplet, demonstrated the complexity in transcriptome regulation process. Finally, six UCEC-related triplets were selected in which the mRNA participates in endometrial carcinoma pathway, such as CDH1 and TP53. The multi-type RNAs are proved to be cross-regulated as to each of the six triplets according to literature. All the triplets demonstrated the association with the initiation and progression of UCEC. Our method provides a comprehensive strategy for the investigation of transcriptome regulation mechanism.

  15. Pathways of cellular internalisation of liposomes delivered siRNA and effects on siRNA engagement with target mRNA and silencing in cancer cells.

    Science.gov (United States)

    Alshehri, Abdullah; Grabowska, Anna; Stolnik, Snow

    2018-02-28

    Design of an efficient delivery system is a generally recognised bottleneck in translation of siRNA technology into clinic. Despite research efforts, cellular processes that determine efficiency of siRNA silencing achieved by different delivery formulations remain unclear. Here, we investigated the mechanism(s) of cellular internalisation of a model siRNA-loaded liposome system in a correlation to the engagement of delivered siRNA with its target and consequent silencing by adopting siRNA molecular beacon technology. Probing of cellular internalisation pathways by a panel of pharmacological inhibitors indicated that clathrin-mediated (dynamin-dependent) endocytosis, macropinocytosis (dynamine independent), and cell membrane cholesterol dependent process(es) (clathrin and caveolea-independent) all play a role in the siRNA-liposomes internalization. The inhibition of either of these entry routes was, in general, mirrored by a reduction in the level of siRNA engagement with its target mRNA, as well as in a reduction of the target gene silencing. A dramatic increase in siRNA engagement with its target RNA was observed on disruption of endosomal membrane (by chloroquine), accompanied with an increased silencing. The work thus illustrates that employing molecular beacon siRNA technology one can start to assess the target RNA engagement - a stage between initial cellular internalization and final gene silencing of siRNA delivery systems.

  16. RNA 3D modules in genome-wide predictions of RNA 2D structure

    DEFF Research Database (Denmark)

    Theis, Corinna; Zirbel, Craig L; Zu Siederdissen, Christian Höner

    2015-01-01

    . These modules can, for example, occur inside structural elements which in RNA 2D predictions appear as internal loops. Hence one question is if the use of such RNA 3D information can improve the prediction accuracy of RNA secondary structure at a genome-wide level. Here, we use RNAz in combination with 3D......Recent experimental and computational progress has revealed a large potential for RNA structure in the genome. This has been driven by computational strategies that exploit multiple genomes of related organisms to identify common sequences and secondary structures. However, these computational...... approaches have two main challenges: they are computationally expensive and they have a relatively high false discovery rate (FDR). Simultaneously, RNA 3D structure analysis has revealed modules composed of non-canonical base pairs which occur in non-homologous positions, apparently by independent evolution...

  17. A Viral RNA Structural Element Alters Host Recognition of Nonself RNA

    Energy Technology Data Exchange (ETDEWEB)

    Hyde, J. L.; Gardner, C. L.; Kimura, T.; White, J. P.; Liu, G.; Trobaugh, D. W.; Huang, C.; Tonelli, M.; Paessler, S.; Takeda, K.; Klimstra, W. B.; Amarasinghe, G. K.; Diamond, M. S.

    2014-01-30

    Although interferon (IFN) signaling induces genes that limit viral infection, many pathogenic viruses overcome this host response. As an example, 2'-O methylation of the 5' cap of viral RNA subverts mammalian antiviral responses by evading restriction of Ifit1, an IFN-stimulated gene that regulates protein synthesis. However, alphaviruses replicate efficiently in cells expressing Ifit1 even though their genomic RNA has a 5' cap lacking 2'-O methylation. We show that pathogenic alphaviruses use secondary structural motifs within the 5' untranslated region (UTR) of their RNA to alter Ifit1 binding and function. Mutations within the 5'-UTR affecting RNA structural elements enabled restriction by or antagonism of Ifit1 in vitro and in vivo. These results identify an evasion mechanism by which viruses use RNA structural motifs to avoid immune restriction.

  18. C to U RNA editing mediated by APOBEC1 requires RNA-binding protein RBM47.

    Science.gov (United States)

    Fossat, Nicolas; Tourle, Karin; Radziewic, Tania; Barratt, Kristen; Liebhold, Doreen; Studdert, Joshua B; Power, Melinda; Jones, Vanessa; Loebel, David A F; Tam, Patrick P L

    2014-08-01

    Cytidine (C) to Uridine (U) RNA editing is a post-transcriptional modification that is accomplished by the deaminase APOBEC1 and its partnership with the RNA-binding protein A1CF. We identify and characterise here a novel RNA-binding protein, RBM47, that interacts with APOBEC1 and A1CF and is expressed in tissues where C to U RNA editing occurs. RBM47 can substitute for A1CF and is necessary and sufficient for APOBEC1-mediated editing in vitro. Editing is further impaired in Rbm47-deficient mutant mice. These findings suggest that RBM47 and APOBEC1 constitute the basic machinery for C to U RNA editing. © 2014 The Authors.

  19. Clinical significance of LUNX mRNA, CK19 mRNA, CEA mRNA expression in detecting micrometastasis from lung cancer

    International Nuclear Information System (INIS)

    Zhu Guangying; Liu Delin; Chen Jie

    2003-01-01

    Objective: To evaluate the sensitivity, specificity and clinical significance of CK19 mRNA, CEA mRNA and LUNX mRNA for detecting micrometastasis by sampling the peripheral blood and regional lymph nodes of lung cancer patients. Methods: Reverse transcriptase chain reaction (RT-PCR) was used to detect LUNX mRNA, CK19 mRNA, CEA mRNA for micrometastasis by sampling the peripheral blood of 48 lung cancer patients and 44 regional lymph nodes of such patients treated by curative resection. Peripheral blood of 30 patients with pulmonary benign lesions and 10 normal healthy volunteers and lymph nodes of 6 patients with benign pulmonary diseases served as control. Results: 1) LUNX mRNA, CK19 mRNA, CEA mRNA were expressed in all (35/35) lung cancer tissues. 2) In the peripheral blood from 48 lung cancer patients, 30 (62.5%) were positive for LUNX mRNA, 24 (50.0%) positive for CK19 mRNA and 32(66.7%) positive for CEA mRNA. The positive detection rates of micrometastasis in 44 lymph nodes from lung cancer patients were 36.4% (16 out of 44) for LUNX mRNA, 27.3% (12 out of 44) for CK19 mRNA and 40.9% (18 out of 44) for CEA mRNA. 3) In the 30 blood samples from patients with pulmonary benign diseases, 2 (6.7%) expressed CK19 mRNA, but none expressed LUNX mRNA or CEA mRNA. All the 3 molecular markers were negative in the 10 blood samples from healthy volunteers. In 11 lymph nodes from patients with pulmonary benign lesions, none was positive for any of the three markers. 4) In 44 regional lymph nodes from lung cancer patients, 6 (13.6%) were positive for metastasis by histopathological examination, with a positive rate significantly lower than that of the RT-PCR (P<0.05). 5) The micrometastatic positive rate in the peripheral blood of 40 non-small cell lung cancer (NSCLC) patients was significantly related to TNM stage (P=0.01). Conclusions: LUNX mRNA, CK19 MRNA, CEA mRNA are all appropriate target genes for the detection of micrometastasis from lung cancer. LUNX mRNA and CEA mRNA

  20. Human Enterovirus Nonstructural Protein 2CATPase Functions as Both an RNA Helicase and ATP-Independent RNA Chaperone

    Science.gov (United States)

    Xia, Hongjie; Wang, Peipei; Wang, Guang-Chuan; Yang, Jie; Sun, Xianlin; Wu, Wenzhe; Qiu, Yang; Shu, Ting; Zhao, Xiaolu; Yin, Lei; Qin, Cheng-Feng; Hu, Yuanyang; Zhou, Xi

    2015-01-01

    RNA helicases and chaperones are the two major classes of RNA remodeling proteins, which function to remodel RNA structures and/or RNA-protein interactions, and are required for all aspects of RNA metabolism. Although some virus-encoded RNA helicases/chaperones have been predicted or identified, their RNA remodeling activities in vitro and functions in the viral life cycle remain largely elusive. Enteroviruses are a large group of positive-stranded RNA viruses in the Picornaviridae family, which includes numerous important human pathogens. Herein, we report that the nonstructural protein 2CATPase of enterovirus 71 (EV71), which is the major causative pathogen of hand-foot-and-mouth disease and has been regarded as the most important neurotropic enterovirus after poliovirus eradication, functions not only as an RNA helicase that 3′-to-5′ unwinds RNA helices in an adenosine triphosphate (ATP)-dependent manner, but also as an RNA chaperone that destabilizes helices bidirectionally and facilitates strand annealing and complex RNA structure formation independently of ATP. We also determined that the helicase activity is based on the EV71 2CATPase middle domain, whereas the C-terminus is indispensable for its RNA chaperoning activity. By promoting RNA template recycling, 2CATPase facilitated EV71 RNA synthesis in vitro; when 2CATPase helicase activity was impaired, EV71 RNA replication and virion production were mostly abolished in cells, indicating that 2CATPase-mediated RNA remodeling plays a critical role in the enteroviral life cycle. Furthermore, the RNA helicase and chaperoning activities of 2CATPase are also conserved in coxsackie A virus 16 (CAV16), another important enterovirus. Altogether, our findings are the first to demonstrate the RNA helicase and chaperoning activities associated with enterovirus 2CATPase, and our study provides both in vitro and cellular evidence for their potential roles during viral RNA replication. These findings increase our

  1. Pseudogenes regulate parental gene expression via ceRNA network.

    Science.gov (United States)

    An, Yang; Furber, Kendra L; Ji, Shaoping

    2017-01-01

    The concept of competitive endogenous RNA (ceRNA) was first proposed by Salmena and colleagues. Evidence suggests that pseudogene RNAs can act as a 'sponge' through competitive binding of common miRNA, releasing or attenuating repression through sequestering miRNAs away from parental mRNA. In theory, ceRNAs refer to all transcripts such as mRNA, tRNA, rRNA, long non-coding RNA, pseudogene RNA and circular RNA, because all of them may become the targets of miRNA depending on spatiotemporal situation. As binding of miRNA to the target RNA is not 100% complementary, it is possible that one miRNA can bind to multiple target RNAs and vice versa. All RNAs crosstalk through competitively binding to miRNAvia miRNA response elements (MREs) contained within the RNA sequences, thus forming a complex regulatory network. The ratio of a subset of miRNAs to the corresponding number of MREs determines repression strength on a given mRNA translation or stability. An increase in pseudogene RNA level can sequester miRNA and release repression on the parental gene, leading to an increase in parental gene expression. A massive number of transcripts constitute a complicated network that regulates each other through this proposed mechanism, though some regulatory significance may be mild or even undetectable. It is possible that the regulation of gene and pseudogene expression occurring in this manor involves all RNAs bearing common MREs. In this review, we will primarily discuss how pseudogene transcripts regulate expression of parental genes via ceRNA network and biological significance of regulation. © 2016 The Authors. Journal of Cellular and Molecular Medicine published by John Wiley & Sons Ltd and Foundation for Cellular and Molecular Medicine.

  2. Dissecting the interactions of SERRATE with RNA and DICER-LIKE 1 in Arabidopsis microRNA precursor processing

    KAUST Repository

    Iwata, Yuji; Takahashi, Masateru; Fedoroff, Nina V.; Hamdan, Samir

    2013-01-01

    ). In the present study, we examined primary miRNA precursor (pri-miRNA) processing by highly purified recombinant DCL1 and SE proteins and found that SE is integral to pri-miRNA processing by DCL1. SE stimulates DCL1 cleavage of the pri-miRNA in an ionic strength

  3. Therapeutic miRNA and siRNA: Moving from Bench to Clinic as Next Generation Medicine

    Directory of Open Access Journals (Sweden)

    Chiranjib Chakraborty

    2017-09-01

    Full Text Available In the past few years, therapeutic microRNA (miRNA and small interfering RNA (siRNA are some of the most important biopharmaceuticals that are in commercial space as future medicines. This review summarizes the patents of miRNA- and siRNA-based new drugs, and also provides a snapshot about significant biopharmaceutical companies that are investing for the therapeutic development of miRNA and siRNA molecules. An insightful view about individual siRNA and miRNA drugs has been depicted with their present status, which is gaining attention in the therapeutic landscape. The efforts of the biopharmaceuticals are discussed with the status of their preclinical and/or clinical trials. Here, some of the setbacks have been highlighted during the biopharmaceutical development of miRNA and siRNA as individual therapeutics. Finally, a snapshot is illustrated about pharmacokinetics, pharmacodynamics with absorption, distribution, metabolism, and excretion (ADME, which is the fundamental development process of these therapeutics, as well as the delivery system for miRNA- and siRNA-based drugs. Keywords: miRNA, siRNA, drug development

  4. Flock House virus subgenomic RNA3 is replicated and its replication correlates with transactivation of RNA2

    International Nuclear Information System (INIS)

    Eckerle, Lance D.; Albarino, Cesar G.; Ball, L. Andrew.

    2003-01-01

    The nodavirus Flock House virus has a bipartite genome composed of RNAs 1 and 2, which encode the catalytic component of the RNA-dependent RNA polymerase (RdRp) and the capsid protein precursor, respectively. In addition to catalyzing replication of the viral genome, the RdRp also transcribes from RNA1 a subgenomic RNA3, which is both required for and suppressed by RNA2 replication. Here, we show that in the absence of RNA1 replication, FHV RdRp replicated positive-sense RNA3 transcripts fully and copied negative-sense RNA3 transcripts into positive strands. The two nonstructural proteins encoded by RNA3 were dispensable for replication, but sequences in the 3'-terminal 58 nucleotides were required. RNA3 variants that failed to replicate also failed to transactivate RNA2. These results imply that RNA3 is naturally produced both by transcription from RNA1 and by subsequent RNA1-independent replication and that RNA3 replication may be necessary for transactivation of RNA2

  5. dPORE-miRNA: Polymorphic regulation of microRNA genes

    KAUST Repository

    Schmeier, Sebastian

    2011-02-04

    Background: MicroRNAs (miRNAs) are short non-coding RNA molecules that act as post-transcriptional regulators and affect the regulation of protein-coding genes. Mostly transcribed by PolII, miRNA genes are regulated at the transcriptional level similarly to protein-coding genes. In this study we focus on human miRNAs. These miRNAs are involved in a variety of pathways and can affect many diseases. Our interest is on possible deregulation of the transcription initiation of the miRNA encoding genes, which is facilitated by variations in the genomic sequence of transcriptional control regions (promoters). Methodology: Our aim is to provide an online resource to facilitate the investigation of the potential effects of single nucleotide polymorphisms (SNPs) on miRNA gene regulation. We analyzed SNPs overlapped with predicted transcription factor binding sites (TFBSs) in promoters of miRNA genes. We also accounted for the creation of novel TFBSs due to polymorphisms not present in the reference genome. The resulting changes in the original TFBSs and potential creation of new TFBSs were incorporated into the Dragon Database of Polymorphic Regulation of miRNA genes (dPORE-miRNA). Conclusions: The dPORE-miRNA database enables researchers to explore potential effects of SNPs on the regulation of miRNAs. dPORE-miRNA can be interrogated with regards to: a/miRNAs (their targets, or involvement in diseases, or biological pathways), b/SNPs, or c/transcription factors. dPORE-miRNA can be accessed at http://cbrc.kaust.edu.sa/dpore and http://apps.sanbi.ac.za/dpore/. Its use is free for academic and non-profit users. © 2011 Schmeier et al.

  6. Automated classification of RNA 3D motifs and the RNA 3D Motif Atlas

    Science.gov (United States)

    Petrov, Anton I.; Zirbel, Craig L.; Leontis, Neocles B.

    2013-01-01

    The analysis of atomic-resolution RNA three-dimensional (3D) structures reveals that many internal and hairpin loops are modular, recurrent, and structured by conserved non-Watson–Crick base pairs. Structurally similar loops define RNA 3D motifs that are conserved in homologous RNA molecules, but can also occur at nonhomologous sites in diverse RNAs, and which often vary in sequence. To further our understanding of RNA motif structure and sequence variability and to provide a useful resource for structure modeling and prediction, we present a new method for automated classification of internal and hairpin loop RNA 3D motifs and a new online database called the RNA 3D Motif Atlas. To classify the motif instances, a representative set of internal and hairpin loops is automatically extracted from a nonredundant list of RNA-containing PDB files. Their structures are compared geometrically, all-against-all, using the FR3D program suite. The loops are clustered into motif groups, taking into account geometric similarity and structural annotations and making allowance for a variable number of bulged bases. The automated procedure that we have implemented identifies all hairpin and internal loop motifs previously described in the literature. All motif instances and motif groups are assigned unique and stable identifiers and are made available in the RNA 3D Motif Atlas (http://rna.bgsu.edu/motifs), which is automatically updated every four weeks. The RNA 3D Motif Atlas provides an interactive user interface for exploring motif diversity and tools for programmatic data access. PMID:23970545

  7. dPORE-miRNA: Polymorphic regulation of microRNA genes

    KAUST Repository

    Schmeier, Sebastian; Schaefer, Ulf; MacPherson, Cameron R.; Bajic, Vladimir B.

    2011-01-01

    Background: MicroRNAs (miRNAs) are short non-coding RNA molecules that act as post-transcriptional regulators and affect the regulation of protein-coding genes. Mostly transcribed by PolII, miRNA genes are regulated at the transcriptional level similarly to protein-coding genes. In this study we focus on human miRNAs. These miRNAs are involved in a variety of pathways and can affect many diseases. Our interest is on possible deregulation of the transcription initiation of the miRNA encoding genes, which is facilitated by variations in the genomic sequence of transcriptional control regions (promoters). Methodology: Our aim is to provide an online resource to facilitate the investigation of the potential effects of single nucleotide polymorphisms (SNPs) on miRNA gene regulation. We analyzed SNPs overlapped with predicted transcription factor binding sites (TFBSs) in promoters of miRNA genes. We also accounted for the creation of novel TFBSs due to polymorphisms not present in the reference genome. The resulting changes in the original TFBSs and potential creation of new TFBSs were incorporated into the Dragon Database of Polymorphic Regulation of miRNA genes (dPORE-miRNA). Conclusions: The dPORE-miRNA database enables researchers to explore potential effects of SNPs on the regulation of miRNAs. dPORE-miRNA can be interrogated with regards to: a/miRNAs (their targets, or involvement in diseases, or biological pathways), b/SNPs, or c/transcription factors. dPORE-miRNA can be accessed at http://cbrc.kaust.edu.sa/dpore and http://apps.sanbi.ac.za/dpore/. Its use is free for academic and non-profit users. © 2011 Schmeier et al.

  8. Potyviral VPg enhances viral RNA Translation and inhibits reporter mRNA translation in planta.

    Science.gov (United States)

    Eskelin, Katri; Hafrén, Anders; Rantalainen, Kimmo I; Mäkinen, Kristiina

    2011-09-01

    Viral protein genome-linked (VPg) plays a central role in several stages of potyvirus infection. This study sought to answer questions about the role of Potato virus A (PVA; genus Potyvirus) VPg in viral and host RNA expression. When expressed in Nicotiana benthamiana leaves in trans, a dual role of VPg in translation is observed. It repressed the expression of monocistronic luciferase (luc) mRNA and simultaneously induced a significant upregulation in the expression of both replicating and nonreplicating PVA RNAs. This enhanced viral gene expression was due at least to the 5' untranslated region (UTR) of PVA RNA, eukaryotic initiation factors 4E and iso 4E [eIF4E/eIF(iso)4E], and the presence of a sufficient amount of VPg. Coexpression of VPg with viral RNA increased the viral RNA amount, which was not the case with the monocistronic mRNA. Both mutations at certain lysine residues in PVA VPg and eIF4E/eIF(iso)4E depletion reduced its ability to upregulate the viral RNA expression. These modifications were also involved in VPg-mediated downregulation of monocistronic luc expression. These results suggest that VPg can titrate eIF4Es from capped monocistronic RNAs. Because VPg-mediated enhancement of viral gene expression required eIF4Es, it is possible that VPg directs eIF4Es to promote viral RNA expression. From this study it is evident that VPg can serve as a specific regulator of PVA expression by boosting the viral RNA amounts as well as the accumulation of viral translation products. Such a mechanism could function to protect viral RNA from being degraded and to secure efficient production of coat protein (CP) for virion formation.

  9. Potyviral VPg Enhances Viral RNA Translation and Inhibits Reporter mRNA Translation In Planta▿

    Science.gov (United States)

    Eskelin, Katri; Hafrén, Anders; Rantalainen, Kimmo I.; Mäkinen, Kristiina

    2011-01-01

    Viral protein genome-linked (VPg) plays a central role in several stages of potyvirus infection. This study sought to answer questions about the role of Potato virus A (PVA; genus Potyvirus) VPg in viral and host RNA expression. When expressed in Nicotiana benthamiana leaves in trans, a dual role of VPg in translation is observed. It repressed the expression of monocistronic luciferase (luc) mRNA and simultaneously induced a significant upregulation in the expression of both replicating and nonreplicating PVA RNAs. This enhanced viral gene expression was due at least to the 5′ untranslated region (UTR) of PVA RNA, eukaryotic initiation factors 4E and iso 4E [eIF4E/eIF(iso)4E], and the presence of a sufficient amount of VPg. Coexpression of VPg with viral RNA increased the viral RNA amount, which was not the case with the monocistronic mRNA. Both mutations at certain lysine residues in PVA VPg and eIF4E/eIF(iso)4E depletion reduced its ability to upregulate the viral RNA expression. These modifications were also involved in VPg-mediated downregulation of monocistronic luc expression. These results suggest that VPg can titrate eIF4Es from capped monocistronic RNAs. Because VPg-mediated enhancement of viral gene expression required eIF4Es, it is possible that VPg directs eIF4Es to promote viral RNA expression. From this study it is evident that VPg can serve as a specific regulator of PVA expression by boosting the viral RNA amounts as well as the accumulation of viral translation products. Such a mechanism could function to protect viral RNA from being degraded and to secure efficient production of coat protein (CP) for virion formation. PMID:21697470

  10. Human Milk MicroRNA and Total RNA Differ Depending on Milk Fractionation.

    Science.gov (United States)

    Alsaweed, Mohammed; Hepworth, Anna R; Lefèvre, Christophe; Hartmann, Peter E; Geddes, Donna T; Hassiotou, Foteini

    2015-10-01

    MicroRNA have been recently discovered in human milk signifying potentially important functions for both the lactating breast and the infant. Whilst human milk microRNA have started to be explored, little data exist on the evaluation of sample processing, and analysis to ensure that a full spectrum of microRNA can be obtained. Human milk comprises three main fractions: cells, skim milk, and lipids. Typically, the skim milk fraction has been measured in isolation despite evidence that the lipid fraction may contain more microRNA. This study aimed to standardize isolation of microRNA and total RNA from all three fractions of human milk to determine the most appropriate sampling and analysis procedure for future studies. Three different methods from eight commercially available kits were tested for their efficacy in extracting total RNA and microRNA from the lipid, skim, and cell fractions of human milk. Each fraction yielded different concentrations of RNA and microRNA, with the highest quantities found in the cell and lipid fractions, and the lowest in skim milk. The column-based phenol-free method was the most efficient extraction method for all three milk fractions. Two microRNAs were expressed and validated in the three milk fractions by qPCR using the three recommended extraction kits for each fraction. High expression levels were identified in the skim and lipid milk factions for these microRNAs. These results suggest that careful consideration of both the human milk sample preparation and extraction protocols should be made prior to embarking upon research in this area. © 2015 The Authors. Journal of Cellular Biochemistry Published by Wiley Periodicals, Inc.

  11. Identifying functional cancer-specific miRNA-mRNA interactions in testicular germ cell tumor.

    Science.gov (United States)

    Sedaghat, Nafiseh; Fathy, Mahmood; Modarressi, Mohammad Hossein; Shojaie, Ali

    2016-09-07

    Testicular cancer is the most common cancer in men aged between 15 and 35 and more than 90% of testicular neoplasms are originated at germ cells. Recent research has shown the impact of microRNAs (miRNAs) in different types of cancer, including testicular germ cell tumor (TGCT). MicroRNAs are small non-coding RNAs which affect the development and progression of cancer cells by binding to mRNAs and regulating their expressions. The identification of functional miRNA-mRNA interactions in cancers, i.e. those that alter the expression of genes in cancer cells, can help delineate post-regulatory mechanisms and may lead to new treatments to control the progression of cancer. A number of sequence-based methods have been developed to predict miRNA-mRNA interactions based on the complementarity of sequences. While necessary, sequence complementarity is, however, not sufficient for presence of functional interactions. Alternative methods have thus been developed to refine the sequence-based interactions using concurrent expression profiles of miRNAs and mRNAs. This study aims to find functional cancer-specific miRNA-mRNA interactions in TGCT. To this end, the sequence-based predicted interactions are first refined using an ensemble learning method, based on two well-known methods of learning miRNA-mRNA interactions, namely, TaLasso and GenMiR++. Additional functional analyses were then used to identify a subset of interactions to be most likely functional and specific to TGCT. The final list of 13 miRNA-mRNA interactions can be potential targets for identifying TGCT-specific interactions and future laboratory experiments to develop new therapies. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Deep sequencing of cardiac microRNA-mRNA interactomes in clinical and experimental cardiomyopathy.

    Science.gov (United States)

    Matkovich, Scot J; Dorn, Gerald W

    2015-01-01

    MicroRNAs are a family of short (~21 nucleotide) noncoding RNAs that serve key roles in cellular growth and differentiation and the response of the heart to stress stimuli. As the sequence-specific recognition element of RNA-induced silencing complexes (RISCs), microRNAs bind mRNAs and prevent their translation via mechanisms that may include transcript degradation and/or prevention of ribosome binding. Short microRNA sequences and the ability of microRNAs to bind to mRNA sites having only partial/imperfect sequence complementarity complicate purely computational analyses of microRNA-mRNA interactomes. Furthermore, computational microRNA target prediction programs typically ignore biological context, and therefore the principal determinants of microRNA-mRNA binding: the presence and quantity of each. To address these deficiencies we describe an empirical method, developed via studies of stressed and failing hearts, to determine disease-induced changes in microRNAs, mRNAs, and the mRNAs targeted to the RISC, without cross-linking mRNAs to RISC proteins. Deep sequencing methods are used to determine RNA abundances, delivering unbiased, quantitative RNA data limited only by their annotation in the genome of interest. We describe the laboratory bench steps required to perform these experiments, experimental design strategies to achieve an appropriate number of sequencing reads per biological replicate, and computer-based processing tools and procedures to convert large raw sequencing data files into gene expression measures useful for differential expression analyses.

  13. SR proteins are NXF1 adaptors that link alternative RNA processing to mRNA export.

    Science.gov (United States)

    Müller-McNicoll, Michaela; Botti, Valentina; de Jesus Domingues, Antonio M; Brandl, Holger; Schwich, Oliver D; Steiner, Michaela C; Curk, Tomaz; Poser, Ina; Zarnack, Kathi; Neugebauer, Karla M

    2016-03-01

    Nuclear export factor 1 (NXF1) exports mRNA to the cytoplasm after recruitment to mRNA by specific adaptor proteins. How and why cells use numerous different export adaptors is poorly understood. Here we critically evaluate members of the SR protein family (SRSF1-7) for their potential to act as NXF1 adaptors that couple pre-mRNA processing to mRNA export. Consistent with this proposal, >1000 endogenous mRNAs required individual SR proteins for nuclear export in vivo. To address the mechanism, transcriptome-wide RNA-binding profiles of NXF1 and SRSF1-7 were determined in parallel by individual-nucleotide-resolution UV cross-linking and immunoprecipitation (iCLIP). Quantitative comparisons of RNA-binding sites showed that NXF1 and SR proteins bind mRNA targets at adjacent sites, indicative of cobinding. SRSF3 emerged as the most potent NXF1 adaptor, conferring sequence specificity to RNA binding by NXF1 in last exons. Interestingly, SRSF3 and SRSF7 were shown to bind different sites in last exons and regulate 3' untranslated region length in an opposing manner. Both SRSF3 and SRSF7 promoted NXF1 recruitment to mRNA. Thus, SRSF3 and SRSF7 couple alternative splicing and polyadenylation to NXF1-mediated mRNA export, thereby controlling the cytoplasmic abundance of transcripts with alternative 3' ends. © 2016 Müller-McNicoll et al.; Published by Cold Spring Harbor Laboratory Press.

  14. RNA interference in designing transgenic crops.

    Science.gov (United States)

    Ali, Nusrat; Datta, Swapan K; Datta, Karabi

    2010-01-01

    RNA interference (RNAi) is a sequence specific gene silencing mechanism, triggered by the introduction of dsRNA leading to mRNA degradation. It helps in switching on and off the targeted gene, which might have significant impact in developmental biology. Discovery of RNAi represents one of the most promising and rapidly advancing frontiers in plant functional genomics and in crop improvement by plant metabolic engineering and also plays an important role in reduction of allergenicity by silencing specific plant allergens. In plants the RNAi technology has been employed successfully in improvement of several plant species- by increasing their nutritional value, overall quality and by conferring resistance against pathogens and diseases. The review gives an insight to the perspective use of the technology in designing crops with innovation, to bring improvement to crop productivity and quality.

  15. Nonviral pulmonary delivery of siRNA.

    Science.gov (United States)

    Merkel, Olivia M; Kissel, Thomas

    2012-07-17

    RNA interference (RNAi) is an important part of the cell's defenses against viruses and other foreign genes. Moreover, the biotechnological exploitation of RNAi offers therapeutic potential for a range of diseases for which drugs are currently unavailable. Unfortunately, the small interfering RNAs (siRNAs) that are central to RNAi in the cytoplasm are readily degradable by ubiquitous nucleases, are inefficiently targeted to desired organs and cell types, and are excreted quickly upon systemic injection. As a result, local administration techniques have been favored over the past few years, resulting in great success in the treatment of viral infections and other respiratory disorders. Because there are several advantages of pulmonary delivery over systemic administration, two of the four siRNA drugs currently in phase II clinical trials are delivered intranasally or by inhalation. The air-blood barrier, however, has only limited permeability toward large, hydrophilic biopharmaceuticals such as nucleic acids; in addition, the lung imposes intrinsic hurdles to efficient siRNA delivery. Thus, appropriate formulations and delivery devices are very much needed. Although many different formulations have been optimized for in vitro siRNA delivery to lung cells, only a few have been reported successful in vivo. In this Account, we discuss both obstacles to pulmonary siRNA delivery and the success stories that have been achieved thus far. The optimal pulmonary delivery vehicle should be neither cytotoxic nor immunogenic, should protect the payload from degradation by nucleases during the delivery process, and should mediate the intracellular uptake of siRNA. Further requirements include the improvement of the pharmacokinetics and lung distribution profiles of siRNA, the extension of lung retention times (through reduced recognition by macrophages), and the incorporation of reversible or stimuli-responsive binding of siRNA to allow for efficient release of the siRNAs at the

  16. RCrane: semi-automated RNA model building.

    Science.gov (United States)

    Keating, Kevin S; Pyle, Anna Marie

    2012-08-01

    RNA crystals typically diffract to much lower resolutions than protein crystals. This low-resolution diffraction results in unclear density maps, which cause considerable difficulties during the model-building process. These difficulties are exacerbated by the lack of computational tools for RNA modeling. Here, RCrane, a tool for the partially automated building of RNA into electron-density maps of low or intermediate resolution, is presented. This tool works within Coot, a common program for macromolecular model building. RCrane helps crystallographers to place phosphates and bases into electron density and then automatically predicts and builds the detailed all-atom structure of the traced nucleotides. RCrane then allows the crystallographer to review the newly built structure and select alternative backbone conformations where desired. This tool can also be used to automatically correct the backbone structure of previously built nucleotides. These automated corrections can fix incorrect sugar puckers, steric clashes and other structural problems.

  17. Molecular computation: RNA solutions to chess problems.

    Science.gov (United States)

    Faulhammer, D; Cukras, A R; Lipton, R J; Landweber, L F

    2000-02-15

    We have expanded the field of "DNA computers" to RNA and present a general approach for the solution of satisfiability problems. As an example, we consider a variant of the "Knight problem," which asks generally what configurations of knights can one place on an n x n chess board such that no knight is attacking any other knight on the board. Using specific ribonuclease digestion to manipulate strands of a 10-bit binary RNA library, we developed a molecular algorithm and applied it to a 3 x 3 chessboard as a 9-bit instance of this problem. Here, the nine spaces on the board correspond to nine "bits" or placeholders in a combinatorial RNA library. We recovered a set of "winning" molecules that describe solutions to this problem.

  18. Bioinformatics of cardiovascular miRNA biology.

    Science.gov (United States)

    Kunz, Meik; Xiao, Ke; Liang, Chunguang; Viereck, Janika; Pachel, Christina; Frantz, Stefan; Thum, Thomas; Dandekar, Thomas

    2015-12-01

    MicroRNAs (miRNAs) are small ~22 nucleotide non-coding RNAs and are highly conserved among species. Moreover, miRNAs regulate gene expression of a large number of genes associated with important biological functions and signaling pathways. Recently, several miRNAs have been found to be associated with cardiovascular diseases. Thus, investigating the complex regulatory effect of miRNAs may lead to a better understanding of their functional role in the heart. To achieve this, bioinformatics approaches have to be coupled with validation and screening experiments to understand the complex interactions of miRNAs with the genome. This will boost the subsequent development of diagnostic markers and our understanding of the physiological and therapeutic role of miRNAs in cardiac remodeling. In this review, we focus on and explain different bioinformatics strategies and algorithms for the identification and analysis of miRNAs and their regulatory elements to better understand cardiac miRNA biology. Starting with the biogenesis of miRNAs, we present approaches such as LocARNA and miRBase for combining sequence and structure analysis including phylogenetic comparisons as well as detailed analysis of RNA folding patterns, functional target prediction, signaling pathway as well as functional analysis. We also show how far bioinformatics helps to tackle the unprecedented level of complexity and systemic effects by miRNA, underlining the strong therapeutic potential of miRNA and miRNA target structures in cardiovascular disease. In addition, we discuss drawbacks and limitations of bioinformatics algorithms and the necessity of experimental approaches for miRNA target identification. This article is part of a Special Issue entitled 'Non-coding RNAs'. Copyright © 2014 Elsevier Ltd. All rights reserved.

  19. The Conserved RNA Exonuclease Rexo5 Is Required for 3′ End Maturation of 28S rRNA, 5S rRNA, and snoRNAs

    Directory of Open Access Journals (Sweden)

    Stefanie Gerstberger

    2017-10-01

    Full Text Available Non-coding RNA biogenesis in higher eukaryotes has not been fully characterized. Here, we studied the Drosophila melanogaster Rexo5 (CG8368 protein, a metazoan-specific member of the DEDDh 3′-5′ single-stranded RNA exonucleases, by genetic, biochemical, and RNA-sequencing approaches. Rexo5 is required for small nucleolar RNA (snoRNA and rRNA biogenesis and is essential in D. melanogaster. Loss-of-function mutants accumulate improperly 3′ end-trimmed 28S rRNA, 5S rRNA, and snoRNA precursors in vivo. Rexo5 is ubiquitously expressed at low levels in somatic metazoan cells but extremely elevated in male and female germ cells. Loss of Rexo5 leads to increased nucleolar size, genomic instability, defective ribosome subunit export, and larval death. Loss of germline expression compromises gonadal growth and meiotic entry during germline development.

  20. Identification of RNA molecules by specific enzyme digestion and mass spectrometry: software for and implementation of RNA mass mapping

    DEFF Research Database (Denmark)

    Matthiesen, Rune; Kirpekar, Finn

    2009-01-01

    The idea of identifying or characterizing an RNA molecule based on a mass spectrum of specifically generated RNA fragments has been used in various forms for well over a decade. We have developed software-named RRM for 'RNA mass mapping'-which can search whole prokaryotic genomes or RNA FASTA...... sequence databases to identify the origin of a given RNA based on a mass spectrum of RNA fragments. As input, the program uses the masses of specific RNase cleavage of the RNA under investigation. RNase T1 digestion is used here as a demonstration of the usability of the method for RNA identification....... The concept for identification is that the masses of the digestion products constitute a specific fingerprint, which characterize the given RNA. The search algorithm is based on the same principles as those used in peptide mass fingerprinting, but has here been extended to work for both RNA sequence databases...