Mitochondrial Medicine 2019: Washington DC 6FLHQWLÀFDQG&OLQLFDO0HHWLQJV June 26-29, 2019 Hilton Alexandria Mark Center Alexandria, VA

Total Page:16

File Type:pdf, Size:1020Kb

Mitochondrial Medicine 2019: Washington DC 6FLHQWLÀFDQG&OLQLFDO0HHWLQJV June 26-29, 2019 Hilton Alexandria Mark Center Alexandria, VA Mitochondrial Medicine 2019: Washington DC 6FLHQWLÀFDQG&OLQLFDO0HHWLQJV June 26-29, 2019 Hilton Alexandria Mark Center Alexandria, VA 2019 Course Chairs: Amel Karaa, MD and Carla Koehler, PhD 2019 CME Chair: Bruce H. Cohen, MD Mitochondrial Medicine 2019: Washington DC 6FLHQWLÀF&OLQLFDO3URJUDP June 26-29, 2019 Course Description The United Mitochondrial Disease Foundation and PeerPoint Medical Education Institute have joined efforts to sponsor and organize a CME-accredited symposium. Mitochondrial diseases are more common than previously recognized and mitochondrial pathophysiology is now a recognized part of many disease processes, including heart disease, cancer, AIDS and diabetes. There have been significant advances in the molecular genetics, proteomics, epidemiology and clinical aspects of mitochondrial pathophysiology. This conference is directed toward the scientist and clinician interested in all aspects of mitochondrial science. The content of this educational program was determined by rigorous assessment of educational needs and includes surveys, program feedback, expert faculty assessment, literature review, medical practice, chart review and new medical knowledge. The format will include didactic lectures from invited experts intermixed with peer-reviewed platform presentations. There will be ample time for professional discussion both in and out of the meeting room, and peer-reviewed poster presentations will be given throughout the meeting. This will be a four-day scientific meeting aimed at those with scientific and clinical interests. TARGET AUDIENCE Neurologists, Geneticists, Researchers/Scientists, Pediatrics, Internal Medicine, Nephrologists, Cardiologists, Endocrinologists, Genetic Counselors, Advanced Practice Nurses, Physicians Assistants, RNs, Occupational Therapy, Physical Therapy and Speech-Language Pathology, Nutritional Therapy, and Residents/Fellows/Students. LEARNING OBJECTIVES • Learn about new clinical trials investigating treatments for mitochondrial diseases in children and adults • Become familiar with new insights the technology of mitochondrial transfer as it relates to possible treatment for mitochondrial disease. • Learn how the use of true Whole Genome Sequencing can be applied to diagnose mitochondrial diseases • Summarize the development of consortium-based discovery and care networks are changing the face of clinical practice as it relates to mitochondrial medicine. • Discover the role of the US Food and Drug Administration in the approval process for treatments of rare diseases including mitochondrial disease. • Understand the application of iPS cells for Leigh syndrome diagnostics and possible therapy • Describe the interactions between mitochondrial and the microbiota. • Learn about innate immunity and the role of the mitochondria in innate immunity and immunity in those with known mitochondrial diseases. • Learn of the advances in the understanding of organelle cross-talk and mitochondrial dynamics • Discover the role of mitochondrial epigenetics and the process of DNA methylation of the mtDNA ACCREDITATION STATEMENT This activity has been planned and implemented in accordance with the accreditation requirements and policies of the Accreditation Council for Continuing Medical Education (ACCME) through the joint providership of PeerPoint Medical Education Institute, LLC and United Mitochondrial Disease Foundation. The PeerPoint Medical Education Institute, LLC is accredited by the ACCME to provide continuing medical education for physicians. DESIGNATION STATEMENT The PeerPoint Medical Education Institute, LLC designates this live activity for a maximum of 18.50 AMA PRA Category 1 Credit(s)™. Physicians should claim only the credit commensurate with the extent of their participation in the activity. Special Announcements Abstract Cash Awards will be presented on Friday, June 28 at 4:45pm in Plaza A. CME Certificate Instructions Attendees for this year’s meeting will generate their own CME Certificate through the PeerPoint CME Vault online system. Post meeting, you will receive an email within a week with instructions on how to access the CME Vault and secure your certificate. NOTE: Peerpoint will set up your login identities based on the information you confirmed at registration upon check-in. If you did not confirm and initial your information, please do so before you leave the meeting this week. Each attendee must have a unique email address; groups or partners cannot share an email address to access the CME Vault. Make sure you check your spam folders for emails coming from peerpt.com. For general information about PeerPoint, visit http://www.peerpt.com. Special Announcements Name Badges All attendees must wear a name badge to all course functions. Scientific Sessions Majority of scientific sessions will be held in Plaza A. On Friday morning, sessions will begin in Plaza C through 10:00am break and will resume in Plaza A. On Saturday morning, the MSeqDR Workshop session will be in Beech from 7:15am to 7:45am but the general scientific session will begin at 8:00am in Plaza A. Refreshment Breaks/Exhibits/Posters Exhibits will be open in the Plaza Foyer during all breaks and lunches. Posters will be in Arbors Room. All posters are assigned numbers in the back of this syllabus. Presenters will station themselves at their poster to field questions according to those numbers as follows: even numbers on Wednesday from 5:30 pm to 7:30 pm and odd numbers on Thursday from 5:30 pm to 7:30 pm. If a Lightning Round person speaks on Wednesday, they will station themselves at their poster on Wednesday evening (regardless of poster number). Meals Continental Breakfasts and Lunches will be held in Plaza C. 2019 Scientific/Clinician Meeting – Faculty • 2019 Scientific Meeting – Confirmed Faculty o Dario C. Altieri, MD, Wistar Institute Cancer Center, Philadelphia, PA o Ana Andreazza, PhD, University of Toronto, Toronto, Canada o Brendan Battersby, PhD, University of Helsinki, Institute of Biotechnology, Finland o William Copeland, PhD, NIEHS, Research Triangle Park, NC o Patrick Chinnery, PhD, FRCP, University of Cambridge, Cambridge, United Kingdom o David Dimmock, MD, Rady Children’s Institute for Genomic Medicine, San Diego, CA o Amy Goldstein, MD, Children’s Hospital of Philadelphia, Philadelphia, PA o Michio Hirano, MD, Columbia University, New York, NY o Adam Hughes, PhD, University of Utah School of Medicine, Salt Lake City, UT o Shilpa Iyer, PhD, University of Arkansas, Fayetteville, AR o Amel Karaa, MD, Massachusetts General Hospital, Boston, MA o Carla Koehler, PhD, University of California Los Angeles, Los Angeles, CA o Mary Kay Koenig, MD, University of Texas McGovern Medical School, Houston, TX o Danuta Krotoski, PhD, Eunice Kennedy Shriver National Institute of Child Health and Human Development, NIH, Bethesda, MD o Austin Larson, MD, Children’s Hospital Colorado, Denver, CO o David J. Livingston, PhD, Brown University, Providence, RI o David Lynch, MD, PhD, Children’s Hospital of Philadelphia, Philadelphia, PA o Peter McGuire, MS, MBBCh, Metabolism, Infection and Immunity Section, National Human Genome Research Institute, NIH, Bethesda, MD o Vamsi K. Mootha, MD, Harvard Medical School, Boston, MA o Sumit Parikh, MD, The Cleveland Clinic, Cleveland, OH o Anne Pariser, MD, NIH/National Center for Advancing Translational Sciences (NCATS), Bethesda, MD o William Prinz, PhD, NIH/National Institute of Diabetes and Digestive and Kidney Disease, Bethesda, MD o Shamima Rahman, MA, BMBCh, PhD, FRCP, FRCPCH, Great Ormond Street Hospital and the National Hospital for Neurology, London, UK o David Shackelford, PhD, University of California Los Angeles (UCLA) David Geffen School of Medicine, CA o Keshav K. Singh, PhD, University of Alabama at Birmingham, AL o Michael Teitell, MD, PhD, University of California, Los Angeles, Jonsson Comprehensive Cancer Center, CA o David Thorburn, PhD, Murdoch Children’s Research Institute, Melbourne, Australia o Douglas C. Wallace, PhD, Children’s Hospital of Philadelphia, Philadelphia, PA o A. Phillip West, PhD, Texas A&M University College of Medicine, College Station, TX o Takehiro Yasukawa, PhD, Department of Clinical Chemistry and Laboratory Medicine Graduate School of Medical Sciences, Kyushu University o Philip Yeske, PhD, UMDF, Science & Alliance Officer, Pittsburgh, PA 2019 Scientific/Clinician Meeting – Planning Committee • 2019 Scientific Planning Committee o Amel Karaa, MD, Course Co-Chair, Massachusetts General Hospital, Boston, MA o Carla Koehler, PhD, Course Co-Chair, University of California Los Angeles, Los Angeles, CA o Bruce H. Cohen, MD, CME Chair, Akron Children’s Hospital, Akron, OH o William Copeland, PhD, NIEHS, Research Triangle Park, NC o Amy Goldstein, MD, Children’s Hospital of Philadelphia, Philadelphia, PA o Larry Grossman, PhD, Wayne State University School of Medicine, Detroit, MI o Adam Hartman, MD, NINDS/NIH, Rockville, MD o Gene Kelly, UMDF Industry Advisor Council, Chair, Stealth BioTherapeutics, Boston, MA o Giovanni Manfredi, MD, PhD, Weill Cornell Medicine, New York, NY o Robert K. Naviaux, MD, PhD, UCSD, San Diego, CA o Sumit Parikh, MD, The Cleveland Clinic, Cleveland, OH o Russell Saneto, DO, PhD, Course Chair, Seattle Children’s Research Institute, Seattle, WA o Peter Stacpoole, PhD, MD, University of Florida, Gainesville, FL o Keshav K. Singh, PhD, University of Alabama at Birmingham, AL o Philip Yeske, PhD, UMDF Science & Alliance Officer o Kara Strittmatter, CMM, MA, UMDF Meeting Event Director 2019 Abstract
Recommended publications
  • Adoption Policy
    Adoption Policy West Virginia Department of Health and Human Resources Bureau for Children and Families Office of Children and Adult Services Jane McCallister, Director, Children and Adult Services Carla Harper, Program Manager II, Children and Adult Policy Revised September 16, 2015 Contents 1.0 Introduction and Overview ............................................................................................................ 7 1.1 Mission and Vision ........................................................................................................................ 7 1.2 Philosophy ..................................................................................................................................... 8 1.3 Legal/Regulatory Basis .................................................................................................................. 8 2.0 Definitions ...................................................................................................................................... 10 3.0 How Children Enter the State’s Custody .................................................................................. 12 3.1 How Children Enter Foster Care ............................................................................................ 12 3.2 Legal Authority for Adoptive Placement ................................................................................ 12 3.3 Permission to Accept Guardianship ...................................................................................... 13 3.4 Required Consents
    [Show full text]
  • Placement of Children with Relatives
    STATE STATUTES Current Through January 2018 WHAT’S INSIDE Placement of Children With Giving preference to relatives for out-of-home Relatives placements When a child is removed from the home and placed Approving relative in out-of-home care, relatives are the preferred placements resource because this placement type maintains the child’s connections with his or her family. In fact, in Placement of siblings order for states to receive federal payments for foster care and adoption assistance, federal law under title Adoption by relatives IV-E of the Social Security Act requires that they Summaries of state laws “consider giving preference to an adult relative over a nonrelated caregiver when determining a placement for a child, provided that the relative caregiver meets all relevant state child protection standards.”1 Title To find statute information for a IV-E further requires all states2 operating a title particular state, IV-E program to exercise due diligence to identify go to and provide notice to all grandparents, all parents of a sibling of the child, where such parent has legal https://www.childwelfare. gov/topics/systemwide/ custody of the sibling, and other adult relatives of the laws-policies/state/. child (including any other adult relatives suggested by the parents) that (1) the child has been or is being removed from the custody of his or her parents, (2) the options the relative has to participate in the care and placement of the child, and (3) the requirements to become a foster parent to the child.3 1 42 U.S.C.
    [Show full text]
  • Argon and Argon2
    Argon and Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg [email protected], [email protected], [email protected] https://www.cryptolux.org/index.php/Password https://github.com/khovratovich/Argon https://github.com/khovratovich/Argon2 Version 1.1 of Argon Version 1.0 of Argon2 31th January, 2015 Contents 1 Introduction 3 2 Argon 5 2.1 Specification . 5 2.1.1 Input . 5 2.1.2 SubGroups . 6 2.1.3 ShuffleSlices . 7 2.2 Recommended parameters . 8 2.3 Security claims . 8 2.4 Features . 9 2.4.1 Main features . 9 2.4.2 Server relief . 10 2.4.3 Client-independent update . 10 2.4.4 Possible future extensions . 10 2.5 Security analysis . 10 2.5.1 Avalanche properties . 10 2.5.2 Invariants . 11 2.5.3 Collision and preimage attacks . 11 2.5.4 Tradeoff attacks . 11 2.6 Design rationale . 14 2.6.1 SubGroups . 14 2.6.2 ShuffleSlices . 16 2.6.3 Permutation ...................................... 16 2.6.4 No weakness,F no patents . 16 2.7 Tweaks . 17 2.8 Efficiency analysis . 17 2.8.1 Modern x86/x64 architecture . 17 2.8.2 Older CPU . 17 2.8.3 Other architectures . 17 3 Argon2 19 3.1 Specification . 19 3.1.1 Inputs . 19 3.1.2 Operation . 20 3.1.3 Indexing . 20 3.1.4 Compression function G ................................. 21 3.2 Features . 22 3.2.1 Available features . 22 3.2.2 Server relief . 23 3.2.3 Client-independent update .
    [Show full text]
  • Social Constructivism and Cognitive Development in Child Counseling
    The Arts in Psychotherapy 33 (2006) 229–237 Sandplay and storytelling: Social constructivism and cognitive development in child counseling Mary Frances Russo ∗, Jody Vernam, Amanda Wolbert Department of Counseling and Development, 006 McKay Education Building, Slippery Rock University, Slippery Rock, PA 16057, USA Abstract Sandplay and storytelling are therapeutic techniques that are used to elicit significant themes in clients’ social-emotional lives, and social constructivism is an appropriate theoretical framework with which to conceptualize the process of play therapy [Dale, M. A., & Lyddon, W. J. (2000). Sandplay: A constructivist strategy for assessment and change. Journal of Constructivist Psychology, 13, 135–154; Russo, in press]. The purpose of this study was to use the combined sandplay-storytelling technique to explore counselors’ understanding of the manner in which children’s interpersonal relationships and developmental status are reflected in their reconstruction of their social worlds in the sandtray. This qualitative study focused on the language of play as expressed in the context of young clients’ cognitive developmental levels via sandplay-storytelling techniques. Six counselors participated in the study and worked with child and adolescent clients. Case analyses conducted by the counselors revealed themes that were consistent with clients’ cognitive developmental status according to Piagetian developmental stages. Younger children, 5–8 years of age, showed a transition from preoperational to concrete operational thought, whereas adolescents, 12–18 years of age, operated from a concrete to abstract orientation. In addition, counselors observed the stages of sandplay as outlined by Allan and Berry [Allan, J., & Berry, P. (1993). Sandplay. In C.E. Schaefer & D.M. Cangelosi (Eds.).
    [Show full text]
  • Modern Password Security for System Designers What to Consider When Building a Password-Based Authentication System
    Modern password security for system designers What to consider when building a password-based authentication system By Ian Maddox and Kyle Moschetto, Google Cloud Solutions Architects This whitepaper describes and models modern password guidance and recommendations for the designers and engineers who create secure online applications. A related whitepaper, Password security ​ for users, offers guidance for end users. This whitepaper covers the wide range of options to consider ​ when building a password-based authentication system. It also establishes a set of user-focused recommendations for password policies and storage, including the balance of password strength and usability. The technology world has been trying to improve on the password since the early days of computing. Shared-knowledge authentication is problematic because information can fall into the wrong hands or be forgotten. The problem is magnified by systems that don't support real-world secure use cases and by the frequent decision of users to take shortcuts. According to a 2019 Yubico/Ponemon study, 69 percent of respondents admit to sharing passwords with ​ ​ their colleagues to access accounts. More than half of respondents (51 percent) reuse an average of five passwords across their business and personal accounts. Furthermore, two-factor authentication is not widely used, even though it adds protection beyond a username and password. Of the respondents, 67 percent don’t use any form of two-factor authentication in their personal life, and 55 percent don’t use it at work. Password systems often allow, or even encourage, users to use insecure passwords. Systems that allow only single-factor credentials and that implement ineffective security policies add to the problem.
    [Show full text]
  • Definitions of Child Abuse and Neglect
    STATE STATUTES Current Through March 2019 WHAT’S INSIDE Defining child abuse or Definitions of Child neglect in State law Abuse and Neglect Standards for reporting Child abuse and neglect are defined by Federal Persons responsible for the child and State laws. At the State level, child abuse and neglect may be defined in both civil and criminal Exceptions statutes. This publication presents civil definitions that determine the grounds for intervention by Summaries of State laws State child protective agencies.1 At the Federal level, the Child Abuse Prevention and Treatment To find statute information for a Act (CAPTA) has defined child abuse and neglect particular State, as "any recent act or failure to act on the part go to of a parent or caregiver that results in death, https://www.childwelfare. serious physical or emotional harm, sexual abuse, gov/topics/systemwide/ or exploitation, or an act or failure to act that laws-policies/state/. presents an imminent risk of serious harm."2 1 States also may define child abuse and neglect in criminal statutes. These definitions provide the grounds for the arrest and prosecution of the offenders. 2 CAPTA Reauthorization Act of 2010 (P.L. 111-320), 42 U.S.C. § 5101, Note (§ 3). Children’s Bureau/ACYF/ACF/HHS 800.394.3366 | Email: [email protected] | https://www.childwelfare.gov Definitions of Child Abuse and Neglect https://www.childwelfare.gov CAPTA defines sexual abuse as follows: and neglect in statute.5 States recognize the different types of abuse in their definitions, including physical abuse, The employment, use, persuasion, inducement, neglect, sexual abuse, and emotional abuse.
    [Show full text]
  • Kin Relationships
    In H. T. Reis & S. Sprecher (Eds.), Encyclopedia of human relationships (pp. 951-954). Thousand Oaks, CA: Sage. Kin Relationships Kin relationships are traditionally defined as ties based on blood and marriage. They include lineal generational bonds (children, parents, grandparents, and great- grandparents), collateral bonds (siblings, cousins, nieces and nephews, and aunts and uncles), and ties with in-laws. An often-made distinction is that between primary kin (members of the families of origin and procreation) and secondary kin (other family members). The former are what people generally refer to as “immediate family,” and the latter are generally labeled “extended family.” Marriage, as a principle of kinship, differs from blood in that it can be terminated. Given the potential for marital break-up, blood is recognized as the more important principle of kinship. This entry questions the appropriateness of traditional definitions of kinship for “new” family forms, describes distinctive features of kin relationships, and explores varying perspectives on the functions of kin relationships. Questions About Definition Changes over the last thirty years in patterns of family formation and dissolution have given rise to questions about the definition of kin relationships. Guises of kinship have emerged to which the criteria of blood and marriage do not apply. Assisted reproduction is a first example. Births resulting from infertility treatments such as gestational surrogacy and in vitro fertilization with ovum donation challenge the biogenetic basis for kinship. A similar question arises for adoption, which has a history 2 going back to antiquity. Partnerships formed outside of marriage are a second example. Strictly speaking, the family ties of nonmarried cohabitees do not fall into the category of kin, notwithstanding the greater acceptance over time of consensual unions both formally and informally.
    [Show full text]
  • Attachment in the Classroom
    Educ Psychol Rev (2009) 21:141–170 DOI 10.1007/s10648-009-9104-0 REVIEW ARTICLE Attachment in the Classroom Christi Bergin & David Bergin Published online: 21 May 2009 # Springer Science + Business Media, LLC 2009 Abstract Attachment influences students’ school success. This is true of students’ attachment to their parents, as well as to their teachers. Secure attachment is associated with higher grades and standardized test scores compared to insecure attachment. Secure attachment is also associated with greater emotional regulation, social competence, and willingness to take on challenges, and with lower levels of ADHD and delinquency, each of which in turn is associated with higher achievement. These effects tend to be stronger for high-risk students. In this era of accountability, enhancing teacher–student relationships is not merely an add-on, but rather is fundamental to raising achievement. Understanding the role of attachment in the classroom will help educators be more effective, particularly with challenging students. Twelve suggestions to improve teacher–student relationships and school bonding are provided. Keywords Attachment . Achievement . School bonding . Teacher–student relationship Children’s socioemotional well-being is critical to school success, and attachment is the foundation of socioemotional well-being. Because of this, educators—from preschool to high school—can be more effective if they understand how attachment influences their students. Attachment influences school success through two routes: indirectly through attachment to parents, and directly through attachment to teachers and schools. In this article, we briefly review basic attachment concepts for readers who are not familiar with attachment research. We then show how attachment to parents is linked to school success, and we summarize the limited research on attachment-like relationships with teachers.
    [Show full text]
  • Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption
    S S symmetry Article Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption Rafael Álvarez 1,* , Alicia Andrade 2 and Antonio Zamora 3 1 Departamento de Ciencia de la Computación e Inteligencia Artificial (DCCIA), Universidad de Alicante, 03690 Alicante, Spain 2 Fac. Ingeniería, Ciencias Físicas y Matemática, Universidad Central, Quito 170129, Ecuador; [email protected] 3 Departamento de Ciencia de la Computación e Inteligencia Artificial (DCCIA), Universidad de Alicante, 03690 Alicante, Spain; [email protected] * Correspondence: [email protected] Received: 2 November 2018; Accepted: 22 November 2018; Published: 3 December 2018 Abstract: Password-based key derivation functions (PBKDFs) are commonly used to transform user passwords into keys for symmetric encryption, as well as for user authentication, password hashing, and preventing attacks based on custom hardware. We propose two optimized alternatives that enhance the performance of a previously published PBKDF. This design is based on (1) employing a symmetric cipher, the Advanced Encryption Standard (AES), as a pseudo-random generator and (2) taking advantage of the support for the hardware acceleration for AES that is available on many common platforms in order to mitigate common attacks to password-based user authentication systems. We also analyze their security characteristics, establishing that they are equivalent to the security of the core primitive (AES), and we compare their performance with well-known PBKDF algorithms, such as Scrypt and Argon2, with favorable results. Keywords: symmetric; encryption; password; hash; cryptography; PBKDF 1. Introduction Key derivation functions are employed to obtain one or more keys from a master secret. This is especially useful in the case of user passwords, which can be of arbitrary length and are unsuitable to be used directly as fixed-size cipher keys, so, there must be a process for converting passwords into secret keys.
    [Show full text]
  • How to Build a Healthy Stepfamily How Well Do You Keys to A
    TheHealthy Keys to a Successful MarriageHandbook IT’S ALL ABOUT THE TEAMWORK! Establishing a marriage mission Helpful marriage resources How well do you GOT TOUGH ISSUES? know your spouse? TAKE THE QUIZ ON PG. 10 How to build a Healthy Stepfamily ARCHIVEYOU CAN DO IT ALL! Myths about How to Manage 4domestic money, children, violence in-laws & MORE! TheHealthy Handbook Support for this handbook was provided by The Alabama Department of Child Abuse and Neglect Prevention/ The Children’s Trust Fund • Center for Children, Youth, and Families, Department of Human Development and Family Studies, Auburn University • Alabama Cooperative Extension System • The Family Assistance Division, Alabama Department of Human Resources Project Managers – Carol Whatley and Glenda Freeman, Alabama Cooperative Extension System Editor – Joanna Acorn Corley Graphic Design – Mary Ferguson Written and compiled by Francesca Adler-Baeder, Ph.D., CFLE Director, Center for Children,Youth, and Families, Department of Human Development and Family Studies, Auburn University, Extension Specialist, Alabama Cooperative Extension System Brian Higginbotham, Ph.D. Assistant Professor and Extension Specialist, Utah State University David Schramm, Ph.D. State Specialist, Assistant Professor, University of Missouri-Columbia Amber Paulk, M.S. Center for Children Youth and Families, Department of Human Development and Family Studies, Auburn University Acknowledgments: We gratefully acknowledge our colleagues in other states who are working to build strong, healthy marriages in their
    [Show full text]
  • Neuromuscular Disorders Neurology in Practice: Series Editors: Robert A
    Neuromuscular Disorders neurology in practice: series editors: robert a. gross, department of neurology, university of rochester medical center, rochester, ny, usa jonathan w. mink, department of neurology, university of rochester medical center,rochester, ny, usa Neuromuscular Disorders edited by Rabi N. Tawil, MD Professor of Neurology University of Rochester Medical Center Rochester, NY, USA Shannon Venance, MD, PhD, FRCPCP Associate Professor of Neurology The University of Western Ontario London, Ontario, Canada A John Wiley & Sons, Ltd., Publication This edition fi rst published 2011, ® 2011 by Blackwell Publishing Ltd Blackwell Publishing was acquired by John Wiley & Sons in February 2007. Blackwell’s publishing program has been merged with Wiley’s global Scientifi c, Technical and Medical business to form Wiley-Blackwell. Registered offi ce: John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK Editorial offi ces: 9600 Garsington Road, Oxford, OX4 2DQ, UK The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK 111 River Street, Hoboken, NJ 07030-5774, USA For details of our global editorial offi ces, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com/wiley-blackwell The right of the author to be identifi ed as the author of this work has been asserted in accordance with the UK Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.
    [Show full text]
  • Supplementary Materials
    Supplementary Materials COMPARATIVE ANALYSIS OF THE TRANSCRIPTOME, PROTEOME AND miRNA PROFILE OF KUPFFER CELLS AND MONOCYTES Andrey Elchaninov1,3*, Anastasiya Lokhonina1,3, Maria Nikitina2, Polina Vishnyakova1,3, Andrey Makarov1, Irina Arutyunyan1, Anastasiya Poltavets1, Evgeniya Kananykhina2, Sergey Kovalchuk4, Evgeny Karpulevich5,6, Galina Bolshakova2, Gennady Sukhikh1, Timur Fatkhudinov2,3 1 Laboratory of Regenerative Medicine, National Medical Research Center for Obstetrics, Gynecology and Perinatology Named after Academician V.I. Kulakov of Ministry of Healthcare of Russian Federation, Moscow, Russia 2 Laboratory of Growth and Development, Scientific Research Institute of Human Morphology, Moscow, Russia 3 Histology Department, Medical Institute, Peoples' Friendship University of Russia, Moscow, Russia 4 Laboratory of Bioinformatic methods for Combinatorial Chemistry and Biology, Shemyakin-Ovchinnikov Institute of Bioorganic Chemistry of the Russian Academy of Sciences, Moscow, Russia 5 Information Systems Department, Ivannikov Institute for System Programming of the Russian Academy of Sciences, Moscow, Russia 6 Genome Engineering Laboratory, Moscow Institute of Physics and Technology, Dolgoprudny, Moscow Region, Russia Figure S1. Flow cytometry analysis of unsorted blood sample. Representative forward, side scattering and histogram are shown. The proportions of negative cells were determined in relation to the isotype controls. The percentages of positive cells are indicated. The blue curve corresponds to the isotype control. Figure S2. Flow cytometry analysis of unsorted liver stromal cells. Representative forward, side scattering and histogram are shown. The proportions of negative cells were determined in relation to the isotype controls. The percentages of positive cells are indicated. The blue curve corresponds to the isotype control. Figure S3. MiRNAs expression analysis in monocytes and Kupffer cells. Full-length of heatmaps are presented.
    [Show full text]