Browse Articles

Blockchain databases: Encrypted for efficient and secure NoSQL key-store

Mehrota et al. | Mar 18, 2023

Blockchain databases: Encrypted for efficient and secure NoSQL key-store
Image credit: Ayushi Mehrota & David Kim

Although commonly associated with cryptocurrency, blockchains offer security that other databases could benefit from. These student authors tested a blockchain database framework, and by tracking runtime of four independent variables, they prove this framework is feasible for application.

Read More...

LawCrypt: Secret Sharing for Attorney-Client Data in a Multi-Provider Cloud Architecture

Zhang et al. | Jul 19, 2020

LawCrypt: Secret Sharing for Attorney-Client Data in a Multi-Provider Cloud Architecture

In this study, the authors develop an architecture to implement in a cloud-based database used by law firms to ensure confidentiality, availability, and integrity of attorney documents while maintaining greater efficiency than traditional encryption algorithms. They assessed whether the architecture satisfies necessary criteria and tested the overall file sizes the architecture could process. The authors found that their system was able to handle larger file sizes and fit engineering criteria. This study presents a valuable new tool that can be used to ensure law firms have adequate security as they shift to using cloud-based storage systems for their files.

Read More...

Colorism and the killing of unarmed African Americans by police

Hempfield et al. | Nov 08, 2021

Colorism and the killing of unarmed African Americans by police

The purpose of this study was to investigate the relationship between colorism and police killings of unarmed African American suspects. The authors collected data from the Washington Post database, which reports unarmed African American victims from 2015–2021, and found that the victims who were killed by police were darker on average than a control population of African Americans that had not encountered the police.

Read More...

Machine learning on crowd-sourced data to highlight coral disease

Narayan et al. | Jul 26, 2021

Machine learning on crowd-sourced data to highlight coral disease

Triggered largely by the warming and pollution of oceans, corals are experiencing bleaching and a variety of diseases caused by the spread of bacteria, fungi, and viruses. Identification of bleached/diseased corals enables implementation of measures to halt or retard disease. Benthic cover analysis, a standard metric used in large databases to assess live coral cover, as a standalone measure of reef health is insufficient for identification of coral bleaching/disease. Proposed herein is a solution that couples machine learning with crowd-sourced data – images from government archives, citizen science projects, and personal images collected by tourists – to build a model capable of identifying healthy, bleached, and/or diseased coral.

Read More...

Refinement of Single Nucleotide Polymorphisms of Atopic Dermatitis related Filaggrin through R packages

Naravane et al. | Oct 12, 2022

Refinement of Single Nucleotide Polymorphisms of Atopic Dermatitis related Filaggrin through R packages

In the United States, there are currently 17.8 million affected by atopic dermatitis (AD), commonly known as eczema. It is characterized by itching and skin inflammation. AD patients are at higher risk for infections, depression, cancer, and suicide. Genetics, environment, and stress are some of the causes of the disease. With the rise of personalized medicine and the acceptance of gene-editing technologies, AD-related variations need to be identified for treatment. Genome-wide association studies (GWAS) have associated the Filaggrin (FLG) gene with AD but have not identified specific problematic single nucleotide polymorphisms (SNPs). This research aimed to refine known SNPs of FLG for gene editing technologies to establish a causal link between specific SNPs and the diseases and to target the polymorphisms. The research utilized R and its Bioconductor packages to refine data from the National Center for Biotechnology Information's (NCBI's) Variation Viewer. The algorithm filtered the dataset by coding regions and conserved domains. The algorithm also removed synonymous variations and treated non-synonymous, frameshift, and nonsense separately. The non-synonymous variations were refined and ordered by the BLOSUM62 substitution matrix. Overall, the analysis removed 96.65% of data, which was redundant or not the focus of the research and ordered the remaining relevant data by impact. The code for the project can also be repurposed as a tool for other diseases. The research can help solve GWAS's imprecise identification challenge. This research is the first step in providing the refined databases required for gene-editing treatment.

Read More...

Transcriptomic profiling identifies differential gene expression associated with childhood abuse

Li et al. | Jul 23, 2024

Transcriptomic profiling identifies differential gene expression associated with childhood abuse
Image credit: The authors

Childhood abuse has severe and lasting effects throughout an individual's life, and may even have long-term biological effects on individuals who suffer it. To learn more about the effects of abuse in childhood, Li and Yearwood analyze gene expression data to look for genes differentially expressed genes in individuals with a history of childhood abuse.

Read More...

The correlation between bacteria and colorectal cancer

Zhang et al. | Oct 21, 2024

The correlation between bacteria and colorectal cancer

The authors looked at abundance of bacteria in stool samples from patients with colorectal cancer compared to controls. They found different bacteria that was more prevalent in patients with colorectal cancer as well as bacteria in control patients that may indicate a beneficial gut microbiome.

Read More...