Leo Samuels, Novak Boskov, Andreas Francisco Oliveira, Edwin Sun, David Starobinski, Ari Trachtenberg, Manan Monga, Mayank Varia, Ran Canetti, Anand Devaiah, Gerald V Denis
{"title":"Automated Exposure Notification for COVID-19.","authors":"Leo Samuels, Novak Boskov, Andreas Francisco Oliveira, Edwin Sun, David Starobinski, Ari Trachtenberg, Manan Monga, Mayank Varia, Ran Canetti, Anand Devaiah, Gerald V Denis","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>In the current COVID-19 pandemic, various Automated Exposure Notification (AEN) systems have been proposed to help quickly identify potential contacts of infected individuals. All these systems try to leverage the current understanding of the following factors: transmission risk, technology to address risk modeling, system policies and privacy considerations. While AEN holds promise for mitigating the spread of COVID-19, using short-range communication channels (Bluetooth) in smartphones to detect close individual contacts may be inaccurate for modeling and informing transmission risk. This work finds that the current close contact definitions may be inadequate to reduce viral spread using AEN technology. Consequently, relying on distance measurements from Bluetooth Low-Energy may not be optimal for determining risks of exposure and protecting privacy. This paper's literature analysis suggests that AEN may perform better by using broadly accessible technologies to sense the respiratory activity, mask status, or environment of participants. Moreover, the paper remains cognizant that smartphone sensors can leak private information and thus recommends additional objectives for maintaining user privacy without compromising utility for population health. This literature review and analysis will simultaneously interest (i) health professionals who desire a fundamental understanding of the design and utility of AEN systems and (ii) technologists interested in understanding their epidemiological basis in the light of recent research. Ultimately, the two disparate communities need to understand each other to assess the value of AEN systems in mitigating viral spread, whether for the COVID-19 pandemic or for future ones.</p>","PeriodicalId":74021,"journal":{"name":"Journal of young investigators","volume":"25 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10321550/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10161629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structural Analysis of a New Saccharomyces cerevisiae α-glucosidase Homology Model and Identification of Potential Inhibitor Enzyme Docking Sites","authors":"J. Turner, L. Thomas, S. Kennedy","doi":"10.22186/JYI.38.4.27-33","DOIUrl":"https://doi.org/10.22186/JYI.38.4.27-33","url":null,"abstract":"Publication date: October 2020 (Robinson et al., 1991). There have been countless studies on inhibition of the active site in α-glucosidase using sugar mimics, which lead to the creation of Acarbose and Miglitol medications (Clissold and Edwards, 1988; Laube, 2002; Scott and Spencer, 2000; Sels et. al., 1999). However, these drugs induce side effects, including gastrointestinal pain, and constipation/diarrhea (Aoki et. al., 2010). The use of sugar mimicking drugs brings about the complication of interaction with other naturally occurring sugar-binding enzymes, which can lead to gastrointestinal distress. The identification of natural allosteric inhibitors, which do not mimic sugars and bind to an area on the enzyme distinct from the active site, may reveal more potent inhibitors with fewer adverse effects; the inhibition studies of α-glucosidase in vitro and in vivo have created a pool of known and potential inhibitors with a specific flavonoid scaffold (Kim et. al., 2000; Singh et. al., 2014; Tadera et. al., 2006; Xu, 2010). Flavonoids consist of two specific chemical moieties: a benzopyran containing the A and C-rings, and a phenyl group referred to as the B-ring (Figure 1) (Panche et. al., 2016). Several flavonoids have previously been studied for inhibitory effects on α-glucosidase (Proença et al., 2017). Our goal is to identify and confirm how and where these compounds are binding to α-glucosidase as well as to verify their inhibitory mechanism because this will broaden the understanding of how allosteric inhibition of α-glucosidase works at the molecular level and inform future drug design. After investigating published research and compiling a list of natural inhibitors with IC50 values similar to acarbose, we decided on a series of flavonoids was identified for docking INTRODUCTION α-glucosidase (EC 3.2.1.20) is a digestive enzyme which aids in the hydrolysis of α(1-4)-linked α-D-glucose molecules at the terminal end of polysaccharides (Jeske et. al., 2018). Inhibiting this protein slows the release of free glucose in the small intestines. The therapeutic advantage of inhibiting α-glucosidase is that it can be used to treat certain diseases associated with abnormally high blood glucose concentrations, such as Type II diabetes (diabetes mellitus). Those with diabetes mellitus do not secrete enough insulin following a meal, resulting in post-prandial hyperglycemia (Alberti and Zimmet, 1998). Inhibiting α-glucosidase can stop the body from entering a state of hyperglycemia by slowing the initial absorption of glucose in the blood stream, giving insulin a more manageable increase in blood-glucose levels Structural Analysis of a New Saccharomyces cerevisiae α-glucosidase Homology Model and Identification of Potential Inhibitor Enzyme Docking Sites","PeriodicalId":74021,"journal":{"name":"Journal of young investigators","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46800438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Does Providing Hiding Spaces for Zebrafish in Large Groups Reduce Aggressive Behaviour?","authors":"Aleksandra Czezyk, C. Burn, Claire Russell","doi":"10.22186/jyi.38.5.43-56","DOIUrl":"https://doi.org/10.22186/jyi.38.5.43-56","url":null,"abstract":"","PeriodicalId":74021,"journal":{"name":"Journal of young investigators","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41670499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Engineering of Natural Killer Cells as an Emerging Adoptive Cancer Immunotherapy","authors":"P. Senthil, Hariharan Balakrishnan","doi":"10.22186/jyi.38.5.36-42","DOIUrl":"https://doi.org/10.22186/jyi.38.5.36-42","url":null,"abstract":"T cells and but need to be genetically modified to recognize and kill targets. This can be achieved by introducing CARs into NK cells and cell lines. Scientists also face the challenge of properly manufacturing engineered NK cells. If successful, CAR NK cells could be safer, cheaper, easier to produce, and more widely applicable than T cells. This review focuses on recent advances in NK cell engineering and discusses how NK cells contribute to new immunotherapeutic approaches for treatment against refractory hematological malignancies.","PeriodicalId":74021,"journal":{"name":"Journal of young investigators","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46955481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Chan, Jacob Altholz, R. Weir, Matthew L. Davidson
{"title":"A Novel Nickel-Titanium Wire-Actuated Prosthetic Motor Clutch","authors":"A. Chan, Jacob Altholz, R. Weir, Matthew L. Davidson","doi":"10.22186/jyi.38.3.18-23","DOIUrl":"https://doi.org/10.22186/jyi.38.3.18-23","url":null,"abstract":"Publication date: September 202","PeriodicalId":74021,"journal":{"name":"Journal of young investigators","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43539388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aflatoxin and Its Toxic Tragedies in Kenya","authors":"Kaiming Tan","doi":"10.22186/jyi.38.2.10-12","DOIUrl":"https://doi.org/10.22186/jyi.38.2.10-12","url":null,"abstract":"are essential to prevent future aflatoxin outbreaks.","PeriodicalId":74021,"journal":{"name":"Journal of young investigators","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46518766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding Probable Frequency Sums to Reduce the Key Space of Homophonic Substitution Ciphers","authors":"Floe Foxon","doi":"10.22186/jyi.38.1.1-5","DOIUrl":"https://doi.org/10.22186/jyi.38.1.1-5","url":null,"abstract":"Publication date: July 2020 Clearly, brute-force decryption attempts are an inefficient means of decryption. Fortunately, patterns in the distribution of letter frequencies in languages may be used to immediately identify which cipher characters are likely to represent which plaintext characters. For example, the letter ‘e’ is the most frequent letter in English text (Friedman, 1938), therefore the most frequent cipher character in a given monoalphabetic substitution cipher text likely represents the letter ‘e’. This frequency analysis approach may be repeated for all character frequencies in the cipher text for complete decryption. Homophonic substitution ciphers circumvent frequency analysis by mapping each character in a plaintext alphabet to multiple cipher characters (e.g. a {e, !}, b {~, q}, c {z, X}, etc.). In this way, the ciphertext alphabet is greater than the plaintext alphabet, and the frequency distribution of ciphertext characters does not immediately resemble that of the underlying plaintext language. For a cipher of this kind with two unique homophones mapped to each character of the plaintext English alphabet, there are ~1.2 × 1060 possible keys. A machine capable of one trillion decryption attempts per second would take ~3.8 × 1040 years to brute-force the entire key space. Decrypting such a cipher exhaustively in a reasonable amount of time is far beyond the current technological grasp of cryptanalysts (Diffie and Hellman, 1977), and consequently many homophonic substitution ciphers remain unsolved (Kahn, 2005). Arguably, the strongest decryption method for homophonic substitution ciphers is the hill-climbing algorithm (Dhavare et al., 2013), wherein a parent key is generated and used to decrypt the ciphertext, and the fitness of this decryption attempt is measured. The key is then modified, and another decryption attempt is made with this modified key. If the fitness of the modified attempt is better than the initial attempt, the modified key is carried forward; otherwise, INTRODUCTION Substitution ciphers are a form of encryption whereby each character in a plaintext message is substituted for a corresponding cipher character. These cryptograms have existed in various forms for millennia (Whitman and Herbert, 2017) and, for some time, were secure means of exchanging data and information due to the nature of their encryption (Singh, 2000). For a plaintext alphabet of 26 characters like the English language, a monoalphabetic substitution cipher key which maps each of these to different singular cipher characters (e.g. a e, b h, c z, etc.) is concealed by the vast size of the key space, or the number of possible mixed alphabet cipher keys. In this case, the key space is 26! ≈ 4 × 1026. A single machine capable of one billion decryption attempts per second would take ~13 billion years to brute-force every solution of such a cipher, which implies trying every possible key exhaustively. This number is comparable to the age of the o","PeriodicalId":74021,"journal":{"name":"Journal of young investigators","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42114666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of Cat and Dog Interactions on Urban Wildlife Admitted to a Wildlife Center in Wisconsin","authors":"Makayla Timm, N. Kime","doi":"10.22186/jyi.38.6.61-66","DOIUrl":"https://doi.org/10.22186/jyi.38.6.61-66","url":null,"abstract":"","PeriodicalId":74021,"journal":{"name":"Journal of young investigators","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49310236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Targeting of a Tumor through Proton Beam Therapy","authors":"K. Pant, C. Campbell","doi":"10.22186/jyi.37.3.32-37","DOIUrl":"https://doi.org/10.22186/jyi.37.3.32-37","url":null,"abstract":"Publication date: March 2020 the prostate, esophagus, lung and liver. A large number of pediatric patients with central nervous system (CNS) tumors also benefit from PBT (Gondi et al., 2016). Protons interact with matter in three different ways: interactions with atomic electrons, interactions with the atomic nucleus, and interactions with the atom as a whole (Verhey et al., 1998). Protons that interact with the nucleus may produce Bremsstrahlung radiation, but this occurs so infrequently that its effects are negligible. There is also the possibility that protons will collide with an atom and produce secondary protons, neutrons, or excited nuclei, although these interactions are also rare. Protons primarily lose kinetic energy as they traverse matter via inelastic Coulombic interactions with atomic orbital electrons, which also deflect the proton trajectory (Newhauser and Zhang, 2015). The deflection due to a single interaction is generally quite small as the mass of a proton is much larger than that of an electron. However, the cumulative effect of many such interactions can be significant. The most complete theory of multiple Coulombic scattering was proposed by Molière (1947). Many simplifications of this theory have been proposed, although this simplicity often reduces the accuracy in modeling Coulombic scattering at large angles. Gottschalk et al. (1993) approximated Molière’s theory to take the form of a Gaussian function, assuming the small angle approximation in which sin(θ)≈θ:","PeriodicalId":74021,"journal":{"name":"Journal of young investigators","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43261768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Engineering a Cell-Penetrating Anti-HER2 Monoclonal Antibody for Efficient Delivery of Gold Nanoparticles into Cancer Cells To Enhance X-Ray Cancer Radiation Therapy","authors":"Kevin Guo, R. Hawkins, Bo-Sheng Wu","doi":"10.22186/jyi.38.2.13-22","DOIUrl":"https://doi.org/10.22186/jyi.38.2.13-22","url":null,"abstract":"13 INTRODUCTION Cancer heat therapy, also referred to as nanoparticle hyperthermia, utilizes the strong light absorptive properties of gold nanoparticles (GNPs) to create heat and free radicals in a small localized region to burn away cancer after GNPs absorb high energy photons from radiation (Kaur et al., 2016). Therefore, GNPs have been considered as good candidates to enhance the effect of cancer radiation therapy (Jain et al., 2012; Hu et al., 2015; Saha et al., 2016). Gold nanoparticles are gold coordination complexes with outstanding cytotoxic properties. When internalized into cells, these gold compounds can trigger direct mitochondrial damage and induce apoptosis (Gamberi, 2013). GNPs are small particles that can penetrate not only cancer cells, but also healthy tissues. Accumulation of these inherently toxic particles in healthy cells would lead to unwanted side effects and reduce the effective compound concentration at the tumor site. This lack of tumor selectivity can be addressed by attaching monoclonal antibodies (mAbs) that recognize specific cancer cell-surface proteins to the relatively large surface area of GNPs (Fay and Scott, 2011). The HER2 receptor is overexpressed in about 30% of breast cancers and regulates important pathways involved in cell survival and proliferation. Therapeutic antibodies targeting the HER2 receptor have provided satisfactory results. Additionally, HER2-targeted nanoparticles were exploited to deliver drug to tumor sites (Mazzucchelli et al., 2014). Therefore, in this study, an anti-HER2 antibody targeting HER2 receptor was conjugated to GNPs in order to specifically deliver nanoparticles to breast cancer cells for photothermal ablation. Journal of Young Investigators Research","PeriodicalId":74021,"journal":{"name":"Journal of young investigators","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48504596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}