scholarly journals Aspergillus Metabolome Database for Mass Spectrometry Metabolomics

2021 ◽  
Vol 7 (5) ◽  
pp. 387
Author(s):  
Alberto Gil-de-la-Fuente ◽  
Maricruz Mamani-Huanca ◽  
María C. Stroe ◽  
Sergio Saugar ◽  
Alejandra Garcia-Alvarez ◽  
...  

The Aspergillus Metabolome Database is a free online resource to perform metabolite annotation in mass spectrometry studies devoted to the genus Aspergillus. The database was created by retrieving and curating information on 2811 compounds present in 601 different species and subspecies of the genus Aspergillus. A total of 1514 scientific journals where these metabolites are mentioned were added as meta-information linked to their respective compounds in the database. A web service to query the database based on m/z (mass/charge ratio) searches was added to CEU Mass Mediator; these queries can be performed over the Aspergillus database only, or they can also include a user-selectable set of other general metabolomic databases. This functionality is offered via web applications and via RESTful services. Furthermore, the complete content of the database has been made available in .csv files and as a MySQL database to facilitate its integration into third-party tools. To the best of our knowledge, this is the first database and the first service specifically devoted to Aspergillus metabolite annotation based on m/z searches.

Cancers ◽  
2021 ◽  
Vol 13 (13) ◽  
pp. 3197
Author(s):  
Rita Casadonte ◽  
Mark Kriegsmann ◽  
Katharina Kriegsmann ◽  
Isabella Hauk ◽  
Rolf R. Meliß ◽  
...  

The discrimination of malignant melanoma from benign nevi may be difficult in some cases. For this reason, immunohistological and molecular techniques are included in the differential diagnostic toolbox for these lesions. These methods are time consuming when applied subsequently and, in some cases, no definitive diagnosis can be made. We studied both lesions by imaging mass spectrometry (IMS) in a large cohort (n = 203) to determine a different proteomic profile between cutaneous melanomas and melanocytic nevi. Sample preparation and instrument setting were tested to obtain optimal results in term of data quality and reproducibility. A proteomic signature was found by linear discriminant analysis to discern malignant melanoma from benign nevus (n = 113) with an overall accuracy of >98%. The prediction model was tested in an independent set (n = 90) reaching an overall accuracy of 93% in classifying melanoma from nevi. Statistical analysis of the IMS data revealed mass-to-charge ratio (m/z) peaks which varied significantly (Area under the receiver operating characteristic curve > 0.7) between the two tissue types. To our knowledge, this is the largest IMS study of cutaneous melanoma and nevi performed up to now. Our findings clearly show that discrimination of melanocytic nevi from melanoma is possible by IMS.


Author(s):  
Danning Huang ◽  
Marcos A. Bouza ◽  
David A. Gaul ◽  
Franklin E. Leach ◽  
I. Jonathan Amster ◽  
...  

2017 ◽  
Vol 10 (2) ◽  
pp. 359-363
Author(s):  
Rupal Sharma ◽  
Ravi Sheth

Today, web application security is most significant battlefield between victim, attacker and resource of web service. The owner of web applications can’t see security vulnerability in web application which develops in ASP.NET. This paper explain one algorithm which aim to identify broken authentication and session management vulnerability. The given method of this paper scan the web application files. The created scanner generator relies on studying the source character of the application limited ASP.NET files and the code be beholden files. A program develop for this motive is to bring about a report which describes vulnerabilities types by mentioning the indict name, disclose description and its location. The aim of the paper is to discover the broken authentication and session management vulnerabilities. The indicated algorithm will uphold organization and developer to repair the vulnerabilities and recover from one end to the other security.


2010 ◽  
pp. 556-564
Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


Molecules ◽  
2019 ◽  
Vol 24 (14) ◽  
pp. 2615 ◽  
Author(s):  
Panagiota-Kyriaki Revelou ◽  
Maroula G. Kokotou ◽  
Violetta Constantinou-Kokotou

Auxins are signaling molecules involved in multiple stages of plant growth and development. The levels of the most important auxin, indole-3-acetic acid (IAA), are regulated by the formation of amide and ester conjugates with amino acids and sugars. In this work, IAA and IAA amide conjugates with amino acids bearing a free carboxylic group or a methyl ester group, along with some selected IAA metabolites, were studied in positive and negative electrospray ionization (ESI) modes, utilizing high-resolution mass spectrometry (HRMS) as a tool for their structural analysis. HRMS/MS spectra revealed the fragmentation patterns that enable us to identify IAA metabolites in plant extracts from eight vegetables of the Brassicaceae family using a fast and reliable ultra-performance liquid chromatography quadrupole time-of-flight mass spectrometry (UPLC-QToF-MS) method. The accurate m/z (mass to charge) ratio and abundance of the molecular and fragment ions of the studied compounds in plant extracts matched those obtained from commercially available or synthesized compounds and confirmed the presence of IAA metabolites.


Author(s):  
Johan Lim ◽  
Donghyeon Yu ◽  
Hsun-chih Kuo ◽  
Hyungwon Choi ◽  
Scott Walmsley

Abstract In mass spectrometry (MS) experiments, more than thousands of peaks are detected in the space of mass-to-charge ratio and chromatographic retention time, each associated with an abundance measurement. However, a large proportion of the peaks consists of experimental noise and low abundance compounds are typically masked by noise peaks, compromising the quality of the data. In this paper, we propose a new measure of similarity between a pair of MS experiments, called truncated rank correlation (TRC). To provide a robust metric of similarity in noisy high-dimensional data, TRC uses truncated top ranks (or top m-ranks) for calculating correlation. A comprehensive numerical study suggests that TRC outperforms traditional sample correlation and Kendall’s τ. We apply TRC to measuring test-retest reliability of two MS experiments, including biological replicate analysis of the metabolome in HEK293 cells and metabolomic profiling of benign prostate hyperplasia (BPH) patients. An R package trc of the proposed TRC and related functions is available at https://sites.google.com/site/dhyeonyu/software.


Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


Sign in / Sign up

Export Citation Format

Share Document