Elena S. Peterson
Pacific Northwest National Laboratory
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Elena S. Peterson.
Infection and Immunity | 2011
Jason E. McDermott; Abigail L. Corrigan; Elena S. Peterson; Christopher S. Oehmen; George S. Niemann; Eric D. Cambronne; Danna Sharp; Joshua N. Adkins; Ram Samudrala; Fred Heffron
ABSTRACT In this review, we provide an overview of the methods employed in four recent studies that described novel methods for computational prediction of secreted effectors from type III and IV secretion systems in Gram-negative bacteria. We present the results of these studies in terms of performance at accurately predicting secreted effectors and similarities found between secretion signals that may reflect biologically relevant features for recognition. We discuss the Web-based tools for secreted effector prediction described in these studies and announce the availability of our tool, the SIEVE server (http://www.sysbep.org/sieve). Finally, we assess the accuracies of the three type III effector prediction methods on a small set of proteins not known prior to the development of these tools that we recently discovered and validated using both experimental and computational approaches. Our comparison shows that all methods use similar approaches and, in general, arrive at similar conclusions. We discuss the possibility of an order-dependent motif in the secretion signal, which was a point of disagreement in the studies. Our results show that there may be classes of effectors in which the signal has a loosely defined motif and others in which secretion is dependent only on compositional biases. Computational prediction of secreted effectors from protein sequences represents an important step toward better understanding the interaction between pathogens and hosts.
BMC Genomics | 2012
Elena S. Peterson; Lee Ann McCue; Alexandra C. Schrimpe-Rutledge; Jeffrey L. Jensen; Hyunjoo Walker; Markus A. Kobold; Samantha R Webb; Samuel H. Payne; Charles Ansong; Joshua N. Adkins; William R. Cannon; Bobbie-Jo M. Webb-Robertson
BackgroundThe procedural aspects of genome sequencing and assembly have become relatively inexpensive, yet the full, accurate structural annotation of these genomes remains a challenge. Next-generation sequencing transcriptomics (RNA-Seq), global microarrays, and tandem mass spectrometry (MS/MS)-based proteomics have demonstrated immense value to genome curators as individual sources of information, however, integrating these data types to validate and improve structural annotation remains a major challenge. Current visual and statistical analytic tools are focused on a single data type, or existing software tools are retrofitted to analyze new data forms. We present Visual Exploration and Statistics to Promote Annotation (VESPA) is a new interactive visual analysis software tool focused on assisting scientists with the annotation of prokaryotic genomes though the integration of proteomics and transcriptomics data with current genome location coordinates.ResultsVESPA is a desktop Java™ application that integrates high-throughput proteomics data (peptide-centric) and transcriptomics (probe or RNA-Seq) data into a genomic context, all of which can be visualized at three levels of genomic resolution. Data is interrogated via searches linked to the genome visualizations to find regions with high likelihood of mis-annotation. Search results are linked to exports for further validation outside of VESPA or potential coding-regions can be analyzed concurrently with the software through interaction with BLAST. VESPA is demonstrated on two use cases (Yersinia pestis Pestoides F and Synechococcus sp. PCC 7002) to demonstrate the rapid manner in which mis-annotations can be found and explored in VESPA using either proteomics data alone, or in combination with transcriptomic data.ConclusionsVESPA is an interactive visual analytics tool that integrates high-throughput data into a genomic context to facilitate the discovery of structural mis-annotations in prokaryotic genomes. Data is evaluated via visual analysis across multiple levels of genomic resolution, linked searches and interaction with existing bioinformatics tools. We highlight the novel functionality of VESPA and core programming requirements for visualization of these large heterogeneous datasets for a client-side application. The software is freely available at https://www.biopilot.org/docs/Software/Vespa.php.
Environmental Health Perspectives | 2011
Hongjun Jin; Bobbie-Jo M. Webb-Robertson; Elena S. Peterson; Ruimin Tan; Diana J. Bigelow; Mary Beth Scholand; John R. Hoidal; Joel G. Pounds; Richard C. Zangar
Background: Nitric oxide is a physiological regulator of endothelial function and hemodynamics. Oxidized products of nitric oxide can form nitrotyrosine, which is a marker of nitrative stress. Cigarette smoking decreases exhaled nitric oxide, and the underlying mechanism may be important in the cardiovascular toxicity of smoking. Even so, it is unclear if this effect results from decreased nitric oxide production or increased oxidative degradation of nitric oxide to reactive nitrating species. These two processes would be expected to have opposite effects on nitrotyrosine levels, a marker of nitrative stress. Objective: In this study, we evaluated associations of cigarette smoking and chronic obstructive pulmonary disease (COPD) with nitrotyrosine modifications of specific plasma proteins to gain insight into the processes regulating nitrotyrosine formation. Methods: A custom antibody microarray platform was developed to analyze the levels of 3-nitrotyrosine modifications on 24 proteins in plasma. In a cross-sectional study, plasma samples from 458 individuals were analyzed. Results: Average nitrotyrosine levels in plasma proteins were consistently lower in smokers and former smokers than in never smokers but increased in smokers with COPD compared with smokers who had normal lung-function tests. Conclusions: Smoking is associated with a broad decrease in 3-nitrotyrosine levels of plasma proteins, consistent with an inhibitory effect of cigarette smoke on endothelial nitric oxide production. In contrast, we observed higher nitrotyrosine levels in smokers with COPD than in smokers without COPD. This finding is consistent with increased nitration associated with inflammatory processes. This study provides insight into a mechanism through which smoking could induce endothelial dysfunction and increase the risk of cardiovascular disease.
BMC Bioinformatics | 2012
Susan C. Tilton; Tamara Tal; Sheena M Scroggins; Jill A. Franzosa; Elena S. Peterson; Robert L. Tanguay; Katrina M. Waters
BackgroundMicroRNAs (miRNAs) are noncoding RNAs that direct post-transcriptional regulation of protein coding genes. Recent studies have shown miRNAs are important for controlling many biological processes, including nervous system development, and are highly conserved across species. Given their importance, computational tools are necessary for analysis, interpretation and integration of high-throughput (HTP) miRNA data in an increasing number of model species. The Bioinformatics Resource Manager (BRM) v2.3 is a software environment for data management, mining, integration and functional annotation of HTP biological data. In this study, we report recent updates to BRM for miRNA data analysis and cross-species comparisons across datasets.ResultsBRM v2.3 has the capability to query predicted miRNA targets from multiple databases, retrieve potential regulatory miRNAs for known genes, integrate experimentally derived miRNA and mRNA datasets, perform ortholog mapping across species, and retrieve annotation and cross-reference identifiers for an expanded number of species. Here we use BRM to show that developmental exposure of zebrafish to 30 uM nicotine from 6–48 hours post fertilization (hpf) results in behavioral hyperactivity in larval zebrafish and alteration of putative miRNA gene targets in whole embryos at developmental stages that encompass early neurogenesis. We show typical workflows for using BRM to integrate experimental zebrafish miRNA and mRNA microarray datasets with example retrievals for zebrafish, including pathway annotation and mapping to human ortholog. Functional analysis of differentially regulated (p<0.05) gene targets in BRM indicates that nicotine exposure disrupts genes involved in neurogenesis, possibly through misregulation of nicotine-sensitive miRNAs.ConclusionsBRM provides the ability to mine complex data for identification of candidate miRNAs or pathways that drive phenotypic outcome and, therefore, is a useful hypothesis generation tool for systems biology. The miRNA workflow in BRM allows for efficient processing of multiple miRNA and mRNA datasets in a single software environment with the added capability to interact with public data sources and visual analytic tools for HTP data analysis at a systems level. BRM is developed using Java™ and other open-source technologies for free distribution (http://www.sysbio.org/dataresources/brm.stm).
intelligence and security informatics | 2013
Elena S. Peterson; Darren S. Curtis; Aaron R. Phillips; Jeremy R. Teuton; Christopher S. Oehmen
Many phenomena that we wish to discover are comprised of sequences of events or event primitives. Often signatures are constructed to identify such phenomena using either distributions or frequencies of attributes, or specific subsequences that are known to correlate to the phenomena. Distribution-based identification does not capture the essence of the sequence of behaviors and therefore may suffer from lack of specificity. At the other extreme, using specific subsequences to identify target phenomena is often too specific and suffers from lower sensitivity when natural variations arise in the phenomena, measuring process, or data analysis. We introduce here a method for discovering signatures for phenomena that are well characterized by sequences of event primitives. In this paper, we describe the steps taken and lessons learned in generalizing a sequence analysis method, BLAST, for use on non-biological datasets including expressing and operating on alphabets of varying length, constructing a reward/penalty model for arbitrary datasets, and discovering low complexity segments in sequence data by extending BLASTs native low-complexity estimating algorithms. We also present high-level overviews of several case studies that demonstrate the utility of this method to discovering signatures in a wide array of applications including network traffic, software analysis, server characterization, and others. Finally, we demonstrate how signatures discovered using this method can be expressed using a variety of model formalisms, each having its own relative benefit.
2013 6th International Symposium on Resilient Control Systems (ISRCS) | 2013
Jeremy R. Teuton; Elena S. Peterson; Douglas J. Nordwall; Bora A. Akyol; Christopher S. Oehmen
One essential component of resilient cyber applications is the ability to detect adversaries and protect systems with the same flexibility adversaries will use to achieve their goals. Current detection techniques do not enable this degree of flexibility because most existing applications are built using exact or regular-expression matching to libraries of rule sets. Further, network traffic defies traditional cyber security approaches that focus on limiting access based on the use of passwords and examination of lists of installed or downloaded programs. These approaches do not readily apply to network traffic occurring beyond the access control point, and when the data in question are combined control and payload data of ever increasing speed and volume. Manual analysis of network traffic is not normally possible because of the magnitude of the data that is being exchanged and the length of time that this analysis takes. At the same time, using an exact matching scheme to identify malicious traffic in real time often fails because the lists against which such searches must operate grow too large. In this work, we propose an adaptation of biosequence alignment as an alternative method for cyber network detection based on similarity-measuring algorithms for gene sequence analysis. These methods are ideal because they were designed to identify similar but non-identical sequences. We demonstrate that our method is generally applicable to the problem of network traffic analysis by illustrating its use in two different areas based on different attributes of network traffic. Our approach provides a logical framework for organizing large collections of network data, prioritizing traffic of interest to human analysts, and makes it possible to discover traffic signatures without the bias introduced by expert-directed signature generation. Pattern recognition on reduced representations of network traffic offers a fast, efficient, and more robust way to detect anomalies.
It Professional | 2015
Chris Oehmen; Elena S. Peterson; B. Ann Cox
The Department of Homeland Security Science and Technology Directorates Linebacker technology is a behavior-model approach that lets defenders express events and behaviors in terms of deviation from baseline models--for example, a characteristic change in entropy thats indicative of a particular bad event. Linebacker leverages bio-inspired techniques to analyze individual actors and create models of cyber behavior.
Journal of Laboratory Automation | 2012
Kevin A. Hobbie; Elena S. Peterson; Michael L. Barton; Katrina M. Waters; Kim A. Anderson
Large collaborative centers are a common model for accomplishing integrated environmental health research. These centers often include various types of scientific domains (e.g., chemistry, biology, bioinformatics) that are integrated to solve some of the nation’s key economic or public health concerns. The Superfund Research Center (SRP) at Oregon State University (OSU) is one such center established in 2008 to study the emerging health risks of polycyclic aromatic hydrocarbons while using new technologies both in the field and laboratory. With outside collaboration at remote institutions, success for the center as a whole depends on the ability to effectively integrate data across all research projects and support cores. Therefore, the OSU SRP center developed a system that integrates environmental monitoring data with analytical chemistry data and downstream bioinformatics and statistics to enable complete “source-to-outcome” data modeling and information management. This article describes the development of this integrated information management system that includes commercial software for operational laboratory management and sample management in addition to open-source custom-built software for bioinformatics and experimental data management.
Bioinformatics | 2007
Bobbie-Jo M. Webb-Robertson; Elena S. Peterson; Mudita Singhal; Kyle R. Klicker; Christopher S. Oehmen; Joshua N. Adkins; Susan L. Havre
UNLABELLED The visual Platform for Proteomics Peptide and Protein data exploration (PQuad) is a multi-resolution environment that visually integrates genomic and proteomic data for prokaryotic systems, overlays categorical annotation and compares differential expression experiments. PQuad requires Java 1.5 and has been tested to run across different operating systems. AVAILABILITY http://ncrr.pnl.gov/software.
ieee international conference on technologies for homeland security | 2017
Daniel M. Best; Jaspreet Bhatia; Elena S. Peterson; Travis D. Breaux
Information security can benefit from real-time cyber threat indicator sharing, in which companies and government agencies share their knowledge of emerging cyberattacks to benefit their sector and society at large. As attacks become increasingly sophisticated by exploiting behavioral dimensions of human computer operators, there is an increased risk to systems that store personal information. In addition, risk increases as individuals blur the boundaries between workplace and home computing (e.g., using workplace computers for personal reasons). This paper describes an architecture to leverage individual perceptions of privacy risk to compute privacy risk scores over cyber threat indicator data. Unlike security risk, which is a risk to a particular system, privacy risk concerns an individuals personal information being accessed and exploited. The architecture integrates tools to extract information entities from textual threat reports expressed in the STIX format and privacy risk estimates computed using factorial vignettes to survey individual risk perceptions. The architecture aims to optimize for scalability and adaptability to achieve real-time risk scoring.