key: cord-130778-d6jtz3pm authors: hardy, peter; marcolino, leandro soriano; fontanari, jos'e f. title: the paradox of productivity during quarantine: an agent-based simulation date: 2020-08-21 journal: nan doi: nan sha: doc_id: 130778 cord_uid: d6jtz3pm economies across the globe were brought to their knees due to lockdowns and social restriction measures to contain the spread of the sars-cov-2, despite the quick switch to remote working. this downfall may be partially explained by the"water cooler effect", which holds that higher levels of social interaction lead to higher productivity due to a boost in people's mood. somewhat paradoxically, however, there are reports of increased productivity in the remote working scenario. here we address quantitatively this issue using an agent-based model to simulate a workplace with extrovert and introvert agent stereotypes that differ solely on their propensities to initiate a social interaction. we find that the effects of curtailing social interactions depend on the proportion of the stereotypes in the working group: while the social restriction measures always have a negative impact on the productivity of groups composed predominantly of introverts, they may actually improve the productivity of groups composed predominantly of extroverts, which offers then an explanation for the paradox of productivity during quarantine. introduction. -the interest on the trade-off between work productivity and social interaction is not a present-day fad, as attested by this verse of the 19th century writer maria edgeworth: "all work and no play makes jack a dull boy, all play and no work makes jack a mere toy" [1] . in fact, this is a staple subject of social psychology that addresses the influence of loneliness or, more generally, of mood on human cognitive function, often with discrepant findings (see, e.g., [2, 3] ). recent lockdowns and social restriction measures that isolated workers from their peers have placed these issues at the forefront of public attention, with news outlets reminding their customers that they do not need to be productive, and to expect a reduction in overall productivity during this time. but why is it that productivity would decrease during a period that one would think people have more time on their hands than ever before? typical answers to this question are in line with the so-called "water cooler effect" that has been highlighted (and satirized) in how effective placing an inanimate object for people to congregate around can stir up casual conversations, with many psychologists believing that this can also increase company productivity [4] . however, this is not an obvious conclusion since for a singular worker the extra down time communicating may actually detract from its productivity as a whole. here we address quantitatively the productivity and social interaction issue using an agent-based model to simulate a workplace scenario where the agents exhibit two social stereotypes, viz., extroverts and introverts, that differ solely on their propensities to initiate a conversation. social distancing is modeled by controlling the number of attempts an agent makes to find a conversation partner and the motivation to work (mood) is assumed to increase with the time spent talking and decrease with the time spent alone. moreover, the instantaneous productivity of a lone agent increases linearly with its motivation to work. we find that the effect of curtailing social interactions depends on the proportion of the different stereotypes in the group. for instance, while social restriction measures always have a negative impact on the productivity of groups composed predominantly of introverts, they may actually improve the productivity of groups composed predominantly of extroverts. in addition, within a same working group the productivity of the two stereotypes is affected differently by those measures. these results may explain the paradoxical findings that productivity is increased in some remote work experiments [5] . model. -we model the dynamics of a group of n agents that interact socially and work during a 480minute (eight-hour) workday. we first make a strong assumption that for all agents they are more productive when they are motivated, and their motivations increase when they participated in some form of social interaction [6] [7] [8] . in this framework, motivation has both an emotional dimension, in the sense that talking with peers improves the mood of the agent and helps it to focus on the task, and an informational dimension, in that talking with peers may result in the acquisition of valuable information that can help the agent to consummate its task. we assume that the motivation of agent k = 1, . . . , n is determined by the integer parameter l k = 1, 2, . . . , l max and that at the beginning of the day, the agents' motivations are the lowest, i.e., l k = 1. in addition, we assume that the instantaneous productivity of an agent at time t = 0, 1, . . . , t is p k (t) = l k − 1 if agent k is not talking and p k (t) = 0 if agent k is talking. since we measure time in minutes, we set t = 480. hence, at time t = 0 the instantaneous productivity is zero for all agents. the only way an agent can increase its motivation and, consequently, its productivity, is by engaging in social interaction. we introduce two different social stereotypes our agents can be, viz., extroverts and introverts, which determine their propensities to seek and engage in social interaction. in particular, if agent k has stereotype l, arxiv:2008.09461v1 [cs.ma] 21 aug 2020 where l = e for extroverts and l = i for introverts, the probability that it instigates a conversation is for l k ≤ t /τ l and p l k = 0, otherwise. here τ e and τ i are parameters measured in minutes that are necessary to make eq. (1) dimensionally correct. throughout this paper we set τ e = 1 without loss of generality, but set τ i > 1 in order to guarantee that p e k ≥ p i k , i.e., that the extroverts are more likely to engage in social interaction than the introverts. in addition, p e k = p i k = 1 for l k = 1 so that when the motivation of agent k is at the bottom line, it will try to engage in social interaction with certainty. the propensity to instigate a conversation decreases linearly with the motivation to work until it vanishes altogether when the motivation parameter reaches a threshold value that differs for the two social stereotypes. regardless of its stereotype, once a target agent decides to instigate a conversation, it selects a number m of contact attempts, where m = 0, 1, . . . is a random variable drawn from a poisson distribution of parameter q. in each contact attempt, a peer is selected at random among the n − 1 agents in the group and, in case the selected agent is not in a conversation at that time, a conversation is initiated and the target agent halts its search for a partner. the duration of the conversation d is given by a random integer selected uniformly in {1, ..., d}. we note that a conversation involves two agents only and the agent that is approached by the target agent is obliged to accept the interaction, regardless of its motivation and stereotype. to complete the model we need to give a prescription for changing the motivation parameter l k with k = 1, . . . , n , which is the central factor in the determination of the social behavior of the agents. we assume simply that the motivation of agent k increases by one unit for each minute it spends in a conversation and decreases by one unit for each minute it spends working alone. moreover, we set l k = 1 as the lower bound of the motivation parameter so that a lone agent k at the motivation bottom line l k = 1 cannot have its motivation reduced any further. we note that our prescription to change the motivation of the agents implies that the motivation parameter is bounded from above by l max = 480, so that the probability that an extroverted agent instigates a conversation, eq. (1), is never zero during the eight-hour workday. this produces a qualitative distinction between the two stereotypes since the extroverts are, in principle, always willing to initiate a social interaction (i.e., p e k > 0), whereas the introverts will not instigate a conversation if their motivation to work is above the threshold t /τ i . throughout this paper we set τ i = 5 but note that this choice is immaterial, provided that t /τ i is sufficiently distinct from the upper bound t /τ e to justify the existence of two stereotypes. in summary, we implement the synchronous or parallel update of the n agents as follows. at t = 0 we set l k = 1 and p k = 0 for all agents k = 1, . . . , n . the update procedure at time t begins with the selection of a random order of update of the n agents, so that at the end of the procedure all agents are updated and we can increment the time from t to t + 1. then we check the status of the agent to be updated -the target agent -to determine if it is participating in a conversation or not. in case it is, we increment its motivation parameter by one unit. in case it is not, we decrement its motivation parameter by one unit and test whether it initiates a conversation or not using the probabilities given in eq. (1) in accord with the stereotype of the target agent. the simulation ends at t = t . results. -we consider working groups composed of n e extroverts and n i = n − n e introverts and focus mainly on the mean cumulative productivity of the stereotypes at time t = 1, . . . , t , where and the superscript l = e, i specifies the social stereotypes of the agents, as before. here the sum over k is restricted to the subset s l of agents with stereotype l, whose cardinality is n l . we recall that p k (0) = 0 for all k. the mean cumulative productivity of the whole group is simply π w = n e π e + n i π i /n , where we have omitted the dependence on t for simplicity. it is also of interest to know the mean motivation of the stereotype subgroups, with l = e, i as before. then the mean motivation of the whole group is λ w = n e λ e + n i λ i /n . our main interest here is π l (t) and λ l (t) evaluated at the end of the day, i.e, at t = t . these quantities are averaged over 10 3 independent runs for each setting of the model parameters. in particular, in the following we vary the fraction of extroverts η = n e /n and the mean number of contact attempts q, but fix the group size to n = 100 and the maximum duration of a conversation to d = 20. as already pointed out, we set τ e = 1 and τ i = 5. to better appreciate the assumptions of the model, fig. 1 shows typical time dependences of the motivation and mean cumulative productivity of two agents with distinct stereotypes for a single run. the time intervals where the mean cumulative productivity decreases correspond to the periods when the agent is participating in a social interaction and are associated with the increase of its motivation. we note that, whereas the cumulative productivity is a non-decreasing function of t, the mean cumulative productivity, eq. (3), decreases with increasing t in the time intervals where the instantaneous productivity of the agent is zero. in addition, the motivation decreases in the periods where the productivity increases. most of the time in this run, the introvert agent exhibits a higher mean productivity than the extrovert agent, despite its lower motivation. in fact, the motivation parameter of the introvert stabilizes and fluctuates around the value l = t /τ i = 96, whereas the motivation parameter of the extrovert shows a tendency to increase linearly with t on average. it is easy to understand the behavior pattern of the introvert's motivation if we note that an introvert agent with l ≥ t /τ i will not attempt to instigate any conversation and so the tendency of its motivation is to decrease only, except for the events when another agent engages it in a conversation. figure 2 shows the influence of the fraction of extroverts η on the motivation and mean cumulative productivity of the agents at the end of the day. this figure reveals some interesting features. first and foremost, the insertion of extroverts in groups composed predominantly of introverts results in a significant increase of the mean productivity of the introverts, whereas the mean productivity of the extroverts is barely changed. too many extroverts, however, cause a decrease on the productivity of both stereotypes, although they considerably boost the motivation of the introverts. in addition, there is an optimum group composition (η ≈ 0.5 for the parameters used in fig. 2 ) that maximizes the total productivity of the group. in fig. 3 , we examine the influence of the mean number of contact attempts q on the optimum composition of the group. for instance, for small q, say q = 0.5, it is difficult to find conversation partners to increase the agents' motivations and so the highest total productivity is achieved by all-extroverts groups, since this stereotype seeks for partners more frequently than the introverts. as q increases, the odds of finding a conversation partner increases as well, and so it becomes advantageous to insert a few introverts in the group. for very large q, so that the target agent attempts to contact all the other agents in the group, the maximum total productivity occurs for η ≈ 0.47. for groups composed predominantly of introverts (η < 0.5), increase of q and η lead always to higher total productivity. however, the scenario is more complicated for groups composed predominantly of extroverts. in fact, for η > 0.5 our results indicate that there is an optimum value of the mean number of contact attempts that maximizes the total productivity. for instance, this optimum value is located between q = 1 and q = 2 for η ≈ 1. it is worthwhile to examine the effects of the parameter q in more detail. in the context of the 2020 coronavirus pandemic, this is the leading parameter of the model since, at least for those adhering to social distancing norms, the mean number of attempts to interact socially was considerably curtailed during the pandemic. accordingly, fig. 4 shows that a moderate decrease of q actually increases the productivity of the group for η > 0.5. for instance, for η > 0.8 the decrease from q = 6 to q = 1 results in a productivity increase of about 10%, which is in agreement with the experiments of ref. [5] . we note that in both our simulations and those experiments the boost in productivity is modest, though altogether unexpected. it is interesting to look at how the productivities of the two stereotypes within a same working group are affected by the social restrictions. figure 5 shows that, for η = 0.5, a moderate decrease of q reduces the motivation of both stereotypes as well as the mean productivity of the introverts, but increases the mean productivity of the extroverts. this finding may explain sporadic personal reports of heightening productivity in the quarantine. further decrease of q leading to a scenario where social interactions happen very rarely results in a sharp drop of the mean productivity of both stereotypes. a word is in order about the effects of the parameters n and d that determine the group size and the maxi-mum duration of a conversation, respectively. reducing the group size has no effect on our results and our choice of fairly large groups (n = 100) is so as to smooth out the variation of the fraction of extroverts η. however, increase of the parameter d has a strong effect on the productivity of the extroverts. for instance, for long conversations, say d = 60, all-introverts groups yield the highest total productivity regardless of the number of contact attempts. our choice d = 20, which corresponds to conversations of average durationd = 10, are meant to model a "water cooler talk" scenario. conclusion. -in the spirit of sociophysics [9, 10] and computational social science [11] , our agent-based model assumes only linear relationships between the quantities relevant to study the influence of social restriction measures on the productivity of working groups. in that sense, it offers a proof of concept that, somewhat paradoxically, quarantining and social distancing may boost the productivity of extroverted people. * * * perceived social isolation and cognition feeling low, thinking slow? associations between situational cues, mood and cognitive function how social networks network best does working from home work? evidence from a chinese experiment positive affect facilitates creative problem solving resource allocation model of the effects of depressed mood states on memory putting mood in context: using smartphones to examine how people feel in different locations statistical physics of human cooperation the social physics collective key: cord-008495-gjn8kh2t authors: nan title: cumulative chapter titles keyword index, vol. 1–41 date: 2007-01-26 journal: annu rep med chem doi: 10.1016/s0065-7743(06)41034-4 sha: doc_id: 8495 cord_uid: gjn8kh2t nan antihyperlipidemics, 15, 162; 18, 161; 24, 147 antihypertensives, 1, 59; 2, 48; 3, 53; 4, 47; 5, 49; 6, 52; 7, 59; 8, 52; 9, 57; 11, 61; 12, 60; 13, 71; 14, 61; 15, 79; 16, 73; 17, 61; 18, 69; 19, 61; 21, 63; 22, 63; 23, 59; 24, 51; 25, 51 antiinfective agents, 28, 119 antiinflammatory agents, 28, 109; 29, 103 anti-inflammatories, 37, 217 anti-inflammatories, non-steroidal, 1, 224; 2, 217; 3, 215; 4, 207; 5, 225; 6, 182; 7, 208; 8, 214; 9, 193; 10, 172; 13, 167; 16, 189; 23, 181 anti-ischemic agents, 17, 71 antimalarial inhibitors, 34, 159 antimetabolite cancer chemotherapies, 39, 125 antimetabolite concept, drug design, 11, 223 antimicrobial drugs-clinical problems and opportunities, 21, 119 antimicrobial potentiation, 33, 121 antimicrobial peptides, 27, 159 antimitotic agents, 34, 139 antimycobacterial agents, 31, 161 antineoplastics, 2, 166; 3, 150; 4, 154; 5, 144; 7, 129; 8, 128; 9, 139; 10, 131; 11, 110; 12, 120; 13, 120; 14, 132; 15, 130; 16, 137; 17, 163; 18, 129; 19, 137; 20, 163; 22, 137; 24, 121; 28, 167 anti-obesity agents, centrally acting, 41, 77 antiparasitics, 1, 136, 150; 2, 131, 147; 3, 126, 140; 4, 126; 5, 116; 7, 145; 8, 141; 9, 115; 10, 154; 11, 121; 12, 140; 13, 130; 14, 122; 15, 120; 16, 125; 17, 129; 19, 147; 26, 161 antiparkinsonism drugs, 6, 42; 9, 19 antiplatelet therapies, 35, 103 antipsychotics, 1, 1; 2, 1; 3, 1; 4, 1; 5, 1; 6, 1; 7, 6; 8, 1; 9, 1; 10, 2; 11, 3; 12, 1; 13, 11; 14, 12; 15, 12; 16, 11; 18, 21; 19, 21; 21, 1; 22, 1; 23, 1; 24, 1; 25, 1; 26, 53; 27, 49; 28, 39; 33, 1 antiradiation agents, 1, 324; 2, 330; 3, 327; 5, 346 anti-resorptive and anabolic bone agents, 39, 53 anti-retroviral chemotherapy, 25, 149 antiretroviral drug therapy, 32, 131 antiretroviral therapies, 35, 177; 36, 129 antirheumatic drugs, 18, 41, 183 antisense oligonucleotides, 23, 295; 33, 313 antisense technology, 29, 297 antithrombotics, 7, 78; 8, 73; 9, 75; 10, 99; 12, 80; 14, 71; 17, 79; 27, 99; 32, 71 antithrombotic agents, 29, 103 antitumor agents, 24, 121 antitussive therapy, 36, 31 antiviral agents, 1, 129; 2, 122; 3, 116; 4, 117; 5, 101; 6, 118; 7, 119; 8, 150; 9, 128; 10, 161; 11, 128; 13, 139; 15, 149; 16, 149; 18, 139; 19, 117; 22, 147; 23, 161; 24, 129; 26, 133; 28, 131; 29, 145; 30, 139; 32, 141; 33, 163; 37, 133; 39, 241 antitussive therapy, 35, 53 anxiolytics, 26, 1 apoptosis, 31, 249 aporphine chemistry, 4, 331 arachidonate lipoxygenase, 16, 213 arachidonic acid cascade, 12, 182; 14, 178 arachidonic acid metabolites, 17, 203; 23, 181; 24, 71 arthritis, 13, 167; 16, 189; 17, 175; 18, 171; 21, 201; 23, 171, 181; 33, 203 arthritis, immunotherapy, 23, 171 aspartyl proteases, 36, 247 asthma, 29, 73; 32, 91 asymmetric synthesis, 13, 282 atherosclerosis, 1, 178; 2, 187; 3, 172; 4, 178; 5, 180; 6, 150; 7, 169; 8, 183; 15, 162; 18, 161; 21, 189; 24, 147; 25, 169; 28, 217; 32, 101; 34, 101; 36, 57; 40, 71 atherosclerosis hdl raising therapies, 40, 71 atherothrombogenesis, 31, 101 atrial natriuretic factor, 21, 273; 23, 101 attention deficit hyperactivity disorder, 37, 11; 39, 1 autoimmune diseases, 34, 257; 37, 217 autoreceptors, 19, 51 bace inhibitors, 40, 35 bacterial adhesins, 26, 239 bacterial genomics, 32, 121 bacterial resistance, 13, 239; 17, 119; 32, 111 bacterial toxins, 12, 211 bacterial virulence, 30, 111 basophil degranulation, biochemistry, 18, 247 bcl2 family, 31, 249; 33, 253 behavior, serotonin, 7, 47 benzodiazepine receptors, 16, 39, 155 bioinformatics, 36, 201 bioisosteric groups, 38, 333 bioisosterism, 21, 283 biological factors, 10, 39; 11, 42 biological membranes, 11, 222 biological systems, 37, 279 biopharmaceutics, 1, 331; 2, 340; 3, 337; 4, 302; 5, 313; 6, 264; 7, 259; 8, 332 biosensor, 30, 275 biosimulation, 37, 279 biosynthesis, antibotics, 12, 130 biotechnology, drug discovery, 25, 289 biowarfare pathegens, 39, 20, 305; 40, 403 blood enzymes, 1, 233 bone, metabolic disease, 12, 223; 15, 228; 17, 261; 22, 169 bone metabolism, 26, 38, 111 bradykinin b2 antagonists, 39, 89 brain, decade of, 27, 1 c5a antagonists, 39, 109 calcium antagonists/modulators, 16, 257; 17, 71; 18, 79; 21, 85 calcium channels, 30, 51 calmodulin antagonists, sar, 18, 203 cancer, 27, 169; 31, 241; 34, 121; 35, 123; 35, 167 cancer chemosensitization, 37, 115 cancer chemotherapy, 29, 165; 37, 125 cancer cytotoxics, 33, 151 cancer, drug resistance, 23, 265 cancer therapy, 2, 166; 3, 150; 4, 154; 5, 144; 7, 129; 8, 128; 9, 139, 151; 10, 131; 11, 110; 12, 120; 13, 120; 14, 132; 15, 130; 16, 137; 17, 163; 18, 129; 21, 257; 23, 151; 37, 225; 39, 125 cannabinoid receptors, 9, 253; 34, 199 cannabinoid, receptors, cb1, 40, 103 carbohydrates, 27, 301 carboxylic acid, metalated, 12, 278 carcinogenicity, chemicals, 12, 234 cardiotonic agents, 13, 92; 16, 93; 19, 71 cardiovascular, 10, 61 caspases, 33, 273 catalysis, intramolecular, 7, 279 catalytic antibodies, 25, 299; 30, 255 cathepsin k, 39, 63 ccr1 antagonists, 39, 117 ccr3 antagonists, 38 1, 99; 2, 91; 4, 56; 6, 68; 8, 93; 10, 90; 12, 91; 16, 83; 17, 89; 18, 89; 20, 117; 23, 201, 38 non-steroidal, 1, 191; 3, 184 hormones, peptide, 5, 210; 7, 194; 8, 204; 10, 202; 11, 158; 16, 199 hormones, steroid, 1, 213; 2, 208; 3, 207; 4, 199 host modulation, infection, 8, 160; 14, 146; 18, 149 hsp90 inhibitors, 40, 263 5-ht2c receptor modulator, 37, 21 human gene therapy, 26, 315; 28, 267 human retrovirus regulatory proteins, 26, 171 11 b-hydroxysteroid dehydrogenase type 1 inhibitors, 41, 2, 273; 7, 47; 21, 41 hypercholesterolemia, 24, 147 hypersensitivity, delayed, 8, 284 hypersensitivity, immediate, 7, 238; 8, 273 hypertension, 28, 69 hypertension, etiology, 9, 50 hypnotics, 1, 30; 2, 24; 3, 28; 4, 28; 7, 39; 8, 29; 10, 30; 11, 13; 12, 10; 13, 21; 14, 22; 15, 22, 16; 31; 17, 11; 18, 11; 19, 11; 22, 11 ice gene family, 31, 249 ige, 18, 247 immune cell signaling, 38, 275 immune mediated idiosyncratic drug hypersensitivity, 26, 181 immune system, 35, 281 immunity, cellular mediated, 17, 191; 18, 265 immunoassay, enzyme, 18, 285 immunomodulatory proteins, 35, 281 immunophilins, 28, 207 immunostimulants, arthritis, 11, 138; 14, 146 immunosuppressants, 26, 211; 29, 175 immunosuppressive drug action, 28, 207 immunosuppressives, arthritis, 11, 138 immunotherapy, cancer, 9, 151 17, 291; 19, 241; 24, 71 lhrh, 20, 203; 23, 211 lipid metabolism, 9, 172; 10, 182; 11, 180; 12, 191; 13, 184; 14, 198; 15, 162 , 19, 313; 20, 315; 21, 323; 22, 315; 23, 325; 24, 295; 25, 309; 26, 297; 27, 321; 28, 325; 29, 331; 30, 295; 31, 337; 32, 305; 33, 327 mass spectrometry, 31, 319; 34, 307 mass spectrometry, of peptides, 24, 253 mass spectrometry, tandem, 21, 213; 21, 313 mast cell degranulation, biochemistry, 18, 247 matrix metalloproteinase, 37, 209 matrix metalloproteinase inhibitors, 35, 167 mechanism based, anticancer agents, 25, 129 mechanism, drug allergy, 3, 240 mechanisms of antibiotic resistance, 7, 217; 13, 239; 17, 119 medicinal chemistry, 28, 343; 30, 329; 33, 385; 34, 40, 38, 31 melatonin, 32, 31 melatonin agonists, 39, 21 membrane function, 10, 317 membrane regulators, 11, 210 membranes, active transport, 11, 222 memory, 3, 279; 12, 30; 16, 51 metabolism, cell, 1, 267; 2, 286 metabolism, drug, 3, 227; 4, 259; 5, 246; 6, 205; 8, 234; 9, 290; 11, 190; 12, 201; 13, 196, 304; 14, 188; 23, 265, 315 metabolism, lipid, 9, 172; 10, 182; 11, 180; 12, 191; 14, 198 metabolism, mineral, 12, 223 metabonomics, 40, 387 metabotropic glutamate receptor, 35, 1, 38, 21 metal carbonyls, 8, 322 metalloproteinases, 31, 231; 33, 131 metals, disease, 14, 321 metastasis, 28, 151 microbial genomics, 37, 95 microbial products screening, 21, 149 microtubule stabilizing agents, 37, 37, 247 migraine, 22, 41; 32, 1 mitogenic factors, 21, 237 mitotic kinesin inhibitors, 39, 135 modified serum lipoproteins, 25, 169 molecular diversity, 26, 259, 271; 28, 315; 34, 287 molecular modeling, 22, 269; 23, 285 monoclonal antibodies, 16, 243; 27, 179; 29, 317 monoclonal antibody cancer therapies, 28, 237 monoxygenases, 9, basis of, 41, 337 multivalent ligand design, 35, 321 muscarinic agonists/antagonists, 23, 81; 24, 31; 29, 23 muscle relaxants, 1, 30; 2, 24; 3, 28; 4, 28; 8, 37 muscular disorders, 12, 260 mutagenicity, mutagens, 12, 234 mutagenesis, sar of proteins, 18, 237 myocardial ischemia, acute, 25, 71 narcotic antagonists, 7, 31; 8, 20; 9, 11; 10, 12; 11, 23; 13, 41 natriuretic agents, 19, 253 natural products, 6, 274; 15, 255; 17, 301; 26, 259; 32, 285 natural killer cells, 18, 265 neoplasia, 8, 160; 10, 142 neurodegeneration, 30, 31 neurodegenerative disease, 28, 11 neurokinin antagonists, 26, 43; 31, 111; 32, 51; 33, 71; 34, 51 neurological disorders, 31, 11 neuronal calcium channels, 26, 33 neuronal cell death, 29, 13 neuropathic pain, 38, 1 neuropeptides, 21, 51; 22, 51 neuropeptide y, 31, 1; 32, 21; 34, 31 neuropeptide y receptor modulators, 38, 61 neuropeptide receptor antagonists, 38, 11 neuroprotection, 29, 13 neuroprotective agents, 41, 39 neurotensin, 17, 31 neurotransmitters, 3, 264; 4, 270; 12, 249; 14, 42; 19, 303 neutrophic factors, 25, 245; 28, 11 neutrophil chemotaxis, 24, 233 nicotinic acetylcholine receptor, 22, 281; 35, 41 nicotinic acetylcholine receptor modulators, 40, 3 nitric oxide synthase, 29, 83; 31, 221 nmr, 27, 271 nmr in biological systems, 20, 267 nmr imaging, 20, 277; 24, 265 nmr methods, 31, 299 nmr, protein structure determination, 23, 14, 36, 119, 38, sweeteners, 17, 32, 37, 1, 224; 2, 217; 3, 215; 4, 207; 5, 225; 6, 182; 7, 208; 8, 214; 9, 193; 10, 172; 13, 167; 16, 189 novel analgesics, 35, 21 nsaids, 37, 197 nuclear orphan receptors, 32, 13, 316 nucleic acid, sequencing, 16, 299 nucleic acid, synthesis, 16, 299 nucleoside conformation, 5, 272 nucleosides, 1, 299; 2, 304; 3, 297; 5, 333; 39, 241 nucleotide metabolism, 21, 247 nucleotides, 1, 299; 2, 304; 3, 297; 5, 333; 39, 241 nucleotides, cyclic, 9, 203; 10, 192; 15, 182 obesity, 1, 51; 2, 44; 3, 47; 5, 40; 8, 42; 11, 200; 15, 172; 19, 157; 23, 191; 31, 201; 32, 21 obesity therapeutics, 38, 239 obesity treatment, 37, 1 oligomerisation, 35, 271 oligonucleotides, inhibitors, 23, 295 oncogenes, 18, 225; 21, 159, 237 opioid receptor, 11, 33; 12, 20; 13, 41; 14, 31; 15, 32; 16, 41; 17, 21; 18, 51; 20, 21; 21, 21 opioids, 12, 20; 16, 41; 17, 21; 18, 51; 20, 21; 21, 21 opportunistic infections, 29, 155 oral pharmacokinetics, 35, 299 organocopper reagents, 10, 327 osteoarthritis, 22, 179 osteoporosis, 22, 169; 26, 201; 29, 275; 31, 211 oxazolidinone antibacterials, 35, 135 oxytocin antagonists and agonists, 41, 409 p38a map kinase, 37, multidrug transporter, 25, 253 parallel synthesis, 34, 267 parasite biochemistry, 16, 269 parasitic infection, 36, 99 patents in medicinal chemistry, 22, 331 pathophysiology, plasma membrane, 10, 213 pde iv inhibitors, 31, 71 pde7 inhibitors, 40, 227 penicillin binding proteins, 18, 119 peptic ulcer, 1, 99; 2, 91; 4, 56; 6, 68; 8, 93; 10, 90; 12, 91; 16, 83; 17, 89; 18, 89; 19, 81; 20, 93; 22, 191; 25, 34, 189 peptide conformation, 13, 227; 23, 285 peptide hormones, 5, 210; 7, 194; 8, 204; 10, 202; 11, 158, 19, 303 peptide hypothalamus, 7, 194; 8, 204; 10, 202; 16, 199 peptide libraries, 26, 271 peptide receptors, 25, 281; 32, 277 peptide, sar, 5, 266 peptide stability, 28, 285 peptide synthesis, 5, 307; 7, 289; 16, 309 peptide synthetic, 1, 289; 2, 296 peptide thyrotropin, 17, 31 peptidomimetics, 24, 243 periodontal disease, 10, 38, 71 pet, 24, 277 pet imaging agents, 40, 49 pet ligands, 36, 267 pharmaceutics, 1, 331; 2, 340; 3, 337; 4, 302; 5, 313; 6, 254, 264; 7, 259; 8, 332 pharmaceutical innovation, 40, 431 pharmaceutical productivity, 38, 383 pharmaceutical proteins, 34, 237 pharmacogenetics, 35, 261; 40, 417 pharmacogenomics, 34, 339 pharmacokinetics, 3, 227, 337; 4, 259, 302; 5, 246, 313; 6, 205; 8, 234; 9, 290; 11, 190; 12, 201; 13, 196, 304; 14, 188, 309; 16, , 8, 37 sleep, 27, 11; 34, 15, 69; 16, 213; 17, 203, 291 snps, 38, 249 sodium/calcium exchange, 20, 215 sodium channel blockers, 41, 59 sodium channels, 33, 51 solid-phase synthesis, 31, 309 solid state organic chemistry, 20, 287 solute active transport, 11, 222 somatostatin, 14, 209; 18, 199; 34, 209 spider toxins, 24, 287 srs, 15, 69; 16, 213; 17, 203, 291 statins, 37, 197; 39, 187 statins, pleiotropic effects of, 39, 187 stats, 31, 269 stereochemistry, 25, 323 steroid hormones, 1, 213; 2, 208; 3, 207; 4, 199 stroidogenesis, adrenal, 2, 263 steroids, 2, 312; 3, 307; 4, 281; 5, 192, 296; 6, 162; 7, 182; 8, 194; 11, 192 stimulants, 1, 12; 2, 11; 3, 14; 4, 13; 5, 13; 6, 15; 7, 18; 8, 11 stroke, pharmacological approaches, 21, 108 stromelysin, biochemistry, 25, 177 structural genomics, 40, 27, 271; 30, 265; 34, 297 substance p, 17, 271; 18, 31 substituent constants, 2, 347 suicide enzyme inhibitors, 16, 289 superoxide dismutases, 10, 257 superoxide radical, 10, 257 sweeteners, non-nutritive, 17, 323 synthesis, asymmetric, 13, 282 synthesis, computer-assisted, 12, 288; 16, 281; 21, 203 synthesis, enzymic, 23, 305 t-cells, 27, 189; 30, 199; 34, 219 tachykinins, 28, 99 target identification, 41, 331 taxol, 28, 305 technology, providers and integrators, 33, 365 tetracyclines, 37, 105 thalidomide, 30, 319 therapeutic antibodies, 36, 237 thrombin, 30, 71, 31, 51; 34, 81 thrombolytic agents, 29, 93 thrombosis, 5, 237; 26, 93; 33, 81 thromboxane receptor antagonists, 25, 99 synthase inhibitors receptors, adenosine, 28, 295; 33, 111 receptors, adrenergic, 15, 217 receptors, 14, 81 receptors, benzodiazepine, 16, 21 receptors, cell surface, 12, 211 receptors, drug, 1, 236; 2, 227; 8, 262 receptors, 23, 221, 27, 291, receptors, 28, 29 receptors, histamine, 14, 91 receptors, muscarinic, 24, 31 receptors, neuropeptide, 28, 59 receptors, neuronal bzd, 28, 19 receptors, neurotransmitters, 3, 264; 12, 249 receptors, neuroleptic, 12, 249 receptors, opioid, 11, 33; 12, 20; 13, 41; 14, 31; 15, 32; 16, 41; 17 11, 138; 14, 219; 18, 171; 21, 201; 23, 171, 181 ribozymes, 30, 285 rnai, 38, 261 sar, quantitative, 6, 245; 8, 313; 11, 301; 13, 292; 17, 291 same brain, new decade, 36, 1 schizophrenia, treatment of, 41, 3 secretase inhibitors, 35, 31; 38, 7, 39; 8, 29; 11, 13; 12, 10; 13, 21; 14, 22; 15, 22; 16, 31; 17, 11; 18, 11; 19, 11; 22, 11 sedatives, 1, 30; 2, 24; 3, 28; 4, 28; 7, 39; 8, 29; 10, 30; 11, 13; 12, 10; 13, 21; 14, 22; 15; 22; 16, 31; 17, 11; 18, 11; 20, 1; 21, 26, 287 serine proteases, 32, 71 serms, 36, 149 serotonergics, central, 25, 41; 27, 21 serotonergics, selective, 40, 17 serotonin, 2, 273; 7, 47; 26, 103; 30, 1; 33, 21 serotonin receptor, 35, 11 serum lipoproteins, regulation, 13, 14, 114 sh2 domains, 30, 227 key: cord-264350-4zxp3uae authors: kelley, james l. title: chapter 12. antiviral agents date: 1984-12-31 journal: annual reports in medicinal chemistry doi: 10.1016/s0065-7743(08)60688-0 sha: doc_id: 264350 cord_uid: 4zxp3uae publisher summary this chapter discusses the agents with activity primarily against rna viruses. the communicable diseases of the respiratory tract are probably the most common cause of symptomatic human infections. the viruses that are causative agents for human respiratory disease comprise the five taxonomically distinct families: orthomyxoviridae, paramyxoviridae, picornaviridae, coronaviridae, and adenoviridae. the influenza viruses, which consist of types a, b, and c, belong to the family orthomyxoviridae. types a and b have been associated with significant increases in mortality during epidemics. the disease may be asymptomatic or cause symptoms ranging from the common cold to fatal pneumonia. immunization against influenza has been recommended for high-risk groups and antiviral chemotherapy (amantadine) is available for the treatment and prophylaxis of all influenza a infections. there is both a great need for and interest in developing a chemotherapeutic agent for the treatment of these two viral, respiratory tract pathogens. the family picornaviridae contains the genus rhinovirus that is composed of over a hundred distinct serotypes. amantadine and rimantadine are specifically active against influenza a virus infections. the amantadine recipients reported a higher incidence of side effects largely attributed to the central nervous system (cns) symptoms. this difference in side effects may be a pharmacokinetic phenomenon that results in higher plasma concentrations of amantadine. significant progress continues to be made in the clinical use and development of agents active against dna viruses. acyclovir (9-(2-h droxyethoxymethyl)guanine) has been the subject of several reviews and of a syrnposium. considerable progress has been made in evaluating the clinical promise of acyclovir; however, there remains much to be learned concerning the best use of this drug in clinical practice. significant strides have been made in the development of clinically useful antiviral agents, especially against the dna viruses of the herpes family. most of these agents are directed against viral nucleic acid synthesis and require activation by a virus-induced thymidine kinase. researchers have begun to focus on other strategies that may produce broader spectrum anti-viral agents with different mechanisms of action. the previous review of antiviral agents in annual reports in medicinal chemistry emphasized compounds with activity against dna viruses.' primarily against rna viruses. in anti-dna virus agents is provided. antiviral agents with activity against rna viruses were previously reviewed in the 1981 volume.2 neither interferons nor interferon inducers are included in this review as they were covered in the 1981 and 1982 volumes, respectively. several reviews have been published that give an overview of the most promising clinical and experimental antiviral agents3-5 or provide background on viral diseases. 6-8 with specific drugs are cited in the sections where these compounds are discussed. the focus of this year's chapter is on agents with activity a brief update of this year's advances more comprehensive reviews dealing viral respiratory disease rna viruses are the major causative factors of the various forms of acute respiratory disease .8 respiratory tract are probably the most common cause of symptomatic human infections. among both children and adults, acute respiratory tract illness results in significant morbidity, lost time from work, physician visits, and death. it has been calculated that throughout the world over two million deaths occur annually from acute respiratory disease.9 disease comprise the five taxonomically distinct families orthomyxoviridae, paramyxoviridae, picornaviridae, coronaviridae and adenoviridae. 9 the influenza viruses, which are comprised of types a, b and c, belong to the family orthomyxoviridae. types a and b have been associated with significant increases in mortality during epidemics. the disease may be asymptomatic or cause symptoms ranging from the common cold to fatal pneumonia. immunization against influenza has been recommended for high-risk groups, and antiviral chemotherapy (amantadine) is available for the treatment and prophylaxis of all influenza a infections. the family paramyxoviridae includes respiratory syncytial virus (rsv) and parainfluenza virus which are a major cause of lower respiratory tract infections. rsv is a factor in severe bronchiolitis and pneumonia in infants and young children. efforts to develop a vaccine for rsv have been ineffectual, but recent clinical trials with ribavirin as a small particle aerosol have been promising. the parainfluenza viruses, of which there are four human serotypes, are second only to rsv as a cause of lower respiratory tract illness. there is both a great need for and interest in developing a chemotherapeutic agent for treatment of these two viral, respiratory tract pathogens. the family picornaviridae contains the genus rhinovirus, which is composed of over a hundred distinct serotypes. viruses are recognized as the most important causative agents of the upper respiratory tract illness although technical difficulties appear to have hindered studies on vaccines and antiviral agents. the adenoviruses (family adenoviridae) are a ubiquitous group of doublestranded dna viruses which are responsible for a wide variety of respiratory illnesses. these infections are most common among children, although acute respiratory disease and pneumonia are also common among military recruits. two comprehensive reviews of viral respiratory diseases and measures for their control and treatment have been recently published. 8 p 9 the development of a vaccine has been precluded due to 'coronaviruse (family coronaviridae) also has an appreciable role in agents active primarily against rna viruses amantadine (l-adamantanamine) and rimantadine (a-methvl-l-adamantanemethvlaminel -amantadine (1) and rimantadine (2) are specifically active against influenza a virus infections. in 1966 amantadine was licensed for general use against in a large-scale trial, both drugs were highly effective with no significant differences between the rates of illness or infection in the two drug-treated groups. l3 the amantadine recipients reported a higher incidence of side effects largely attributed to central nervous system (cns) symptoms. l39 l4 effects may be a pharmacokinetic phen menon which results in higher plasma concentrations of amantadine. lg a controlled study of healthy, adult volunteers found 1 and 2 to have minor side effects comparable to those of a common antihistamine. l7 hospital employees receiving amantadine showed a high incidence of cns symptoms. l8 guidelines for the use of amantadine in patients with impaired renal function have been formulated from the results of pharmacokinetic studies on amantadine in patients with normal and impaired renal fun~tion.19,~~ since approximately 90% of an oral dose of amantadine is excreted unchanged in the urine, patients with renal insufficiency can accumulate the drug, resulting in toxic manifestations. the mechanism by which 1 and 2 inhibit influenza a virus replication had previously been narrowed to a virus-specific event after virus penetration but prior to primary transcription. with radioactive precursors seems to show that uncoating is a multistep process.21 rimantadine prevents the second step of uncoatin the release of matrix (m) protein from ribonucleoproteins (rnp) .$$ this blocks the penetration of rnp into the nucleus and prevents the nuclear phase of virus reproduction. amantadine produces the same effect on uncoating as rimantadine.21 these adamantyl amines may also have utility in the treatment of other types of viral infections. been shown to be an effective inhibitor of dengue virus replication & -vitr0.~3 the amelioration of post-herpetic neuralgia due to recurrent herpes simplex sciatica24 and from acute herpes zoster25 has been reported with early administration of amantadine. ribavirin (l-~-~-ribofuranosyl-1,2,~-triazole-3-carboxamide) -this nucleoside has activity against a broad range of dna and rna viruses in an tissue culture and in animal model systems.2 analysis of the status of ribavirin 3) as an is still unresolved but may involve guanosine nucleotides and inhibition of inosine monophosphate dehydrogenase.z6 in a clinical trial against influenza a, oral ribavirin failed to alter clinical signs and symptoms of the disease.2 however, it or or has recently been reported to have a therapeutic effect against both influenza a and influenza b virus infections when administered to patients by inhalation of small-particle aerosol through a face m a s k . 2 7~~~ find utility in those patients at high risk such as the elderly and the chronically ill. ribavirin has also been shown to inhibit respiratory syncytial virus (rsv) infection in an animal model when administered i.p. or by aerosol treat~nent.~g this in vivo activity has now been substantiated in two controlled, double-blind clinical t r i a l~. 3~, 3~ administration of a continuous aerosol of ribavirin to infants hospitalized with lower respiratory tract disease from rsv resulted in significant clinical improvement.3 several antiviral agents against colorado tick fever virus (ctfv), ribavirin inhibited ctfv in vitr0.3~ ribavirin did not protect mice inoculated intracerebrally with ctfv. however, the 2',3',5'-triacetate derivative 4 significantly increased the number of survivors when administered i.p., which suggests that this lipophilic prodrug of ribavirin is able to crass the blood-brain barrier .32 administration of 2 was also found to protect mice inoculated intracerebrally with dengue virus, under conditions where ribavirin had no significant protective effect.33 in another study, ribavirin reduced the growth of four types of dengue virus in vitro, but it had no effect on virus replication in human peripheral blood leukocytes (pbl) which have been implicated in the pathogenesis of dengue virus in viv0.3~ however, a combination of ribavirin with 6-mercapto-9-(tetrahydro-2furyl)purine, an inhibitor of hypoxanthine-guanine phosphoribosyl transferase, resulted in a marked suppression of dengue virus replication in human pbl.34 significant progress continues to be made in the clinical use and development of agents active against dna viruses. (9-(2-h droxyethoxymethy1)guanine) has been the subject of several r e v i e~s~3 -~~ and of a syrnposium69 during the past year. clinical trial results have been published that attest to the efficacy of oral acyclovir in the treatment of primary7o and re~urrent7~ genital herpes simplex virus (hsv) infections and in the protection of bone marrow transplant patients from herpes infe~tions.7~ was highly effective in suppressing recurrent herpes sim lex genitalis in a group of patients with unusually frequent episodes.y3 topical acyclovir cream was effective for treatment of recurrent herpes labiali~.7~ considerable progress has been made in evaluating the clinical promise of acyclovir; however, there remains much to be learned concerning the best use of this drug in clinical practice.75 some studies on candidate prodrug forms of acyclovir have recently been published. several esters of acyclovir were reported to have improved acyclovir chronic, oral acyclovir treatment water ~olubility.7~ hydroxyethoxymethyl)purine), which is metabolically deaminated to acyclovir by adenosine deaminase,77 has been reported to be better absorbed from the gut, resulting in higher plasma levels of acycl0vir.7~ several new reports have further documented the potent antiherpetic activity of 9-(2-hydroxy-l-(hydroxymethyl)ethoxymethyl)guanine. this compound has been reported to be highly effective in reducing the severity of both primary and recurrent lesions of hsv-2 in animal m0dels.79,~~ it also appears to hold substantial promise in the treatment of human cytome alovirus (hcmv) based on its specific anti-hcmv activity & i v i t ro . 8o 9 in an animal model , 9-( 2-hyd roxy-1 -( hydroxyme thy1 ) -ethoxymethy1)guanine was shown to be a potent orally active, chemotherapeutic agent against equid herpesvirus .82 l-6-d-arabinofuranosylcytosine) has been reported to stabilize cutaneous lesions in immunosuppressed patients suffering from acute herpesvirus infection.84 a minor metabolite of fiac, 2'-fluoro-5-methyl-l-f3-~arabinofuranosyluracil (fmau), is also antiherpetic, but, in addition, it has i.p. and p.0. activity against murine leukemias resistant to 1-6-garabinofuranosylcytosine. pharmacokinetic studies on fiac and fmau have been p~blished,~5 and the synthesis and & itro anti-hsv antiviral activity of bvdu ((e)-5-(2-bromovinyl)-2'-deoxyuridine) and other 5-substituted pyrimidine nucleoside analogs has been published ,87 several 2',3'-diester and 5'-monoester prodrug forms of ara-a (9-(l-b-q-arabinofuranosyl)adenine) have been evaluated with favorable results in hsv-2 induced genital infections in female guinea pigs. 88 the 5'-monophosphate of ara-a was found to be as effective as ara-a in the treatment of immunosuppressed patients suffering from varicella-zoster .89 a carbocyclic analog of ara-a, cyclaradine, and its 5'-methoxyacetate ester have been reported to have activity in an hsv-1 encephalitis animal model that was comparable to the activity demonstrated by ara-a.go these two compounds may possess some clinical advantage over ara-a due to their low systemic toxicity. acid (pfa, foscarnet sodium), which is presently in phase 111 clinical trials in eur0pe,~3 have been discussed in a recent re~iew.9~ synthesis and structural requirements for antiherpes activity of a series of pfa esters have also been rep0rted.9~ a diaminopurine analog a134u (2,6-diamino-9-(2-fiac (2'-fluoro-5-iodoactivities of a series of analogs have been reported. k a review of the the antiviral effects of phosphonoformic the approaches to the design of antiviral agents significant strides have been made in the development of clinically useful antiviral agents, especially against the dna viruses of the herpes family. most of these agents are directed against viral nucleic acid synthesis and require activation by a virus-induced thymidine kinase. researchers are beginning to focus on other strategies which may produce broader spectrum antiviral agents with different mechanisms of action. inhibition of polyamine biosynthesis may serve as a suitable target for antiviral drug design. bis(guany1hydrazone) and u-difluoromethylornithine, an inhibitor of polyamine biosynthesis have recently been reported to inhibit replication of human cmv in vitro.43 methylation reactions. for some viruses, efficient replication is dependent on viral mrna that has been methylated at its 5i-terminal guanosine residue. effective inhibitor of this cappin mrna( g~anine-'7-)methyltransferase.~~ another permutation of this theme is preservation of cellular s-adenosylhomocysteine (sah) by inhibition of sah hydrolase. sah is an endogenous inhibitor of transmethylation the polyamine antimetabolite methylglyoxal another target is the inhibition of essential ribavirin 5'-triphosphate has been reported to be an reaction which is catalyzed by a reactions in which s-adenosylmethionine is the methyl donor .95 system i effe~t.9~997 there has been substantial interest in exploiting this system as an approach to antiviral drug development. primarily been aimed at the synthesis of 2-5a core analogs that are permeable to cells and stable to degradative enzymes. during the process of infection some viruses change the permeability of infected cells. this allows cellular penetration by compounds that are normally excluded. the selective antiviral activity of hygromycin b supports the suggestion that screening for agents which are selectively permeable to virus infected cells could result in broad-spectrum antiviral agents .g8 a review of the concept of selective delivery of antiviral agents by con jugation with protein carriers has been published. 99 this activity appears to be mediated by an obligatory lysosomal step in the uncoating of enveloped viruses. amines such as chloroquine may prevent uncoating by increasing the lysosomal ph above a value required for release of the virus nucleocapsid into the cytoplasm. a better understanding of this process could lead to the development of broad-spectrum antiviral agents. the 2-5a one of the mechanisms by which interferon exerts its antiviral these efforts have advances in virus research abstracts, 185th american chemical society national meeting abstracts, north american medicinal chemistry symposium drugs of the future program and abstracts, 23rd icaac program and abstracts, 23rd icaac sect. 111 -chemotherapeutic agents sciavolino proc. natl. acad. sci. usa proc. natl. acad. sci. usa key: cord-016912-vnx74hft authors: kornguth, s. title: strategic actionable net-centric biological defense system date: 2005 journal: defense against bioterror doi: 10.1007/1-4020-3384-2_1 sha: doc_id: 16912 cord_uid: vnx74hft technologies required for strategic actionable net-centric biological defense systems consist of : 1) multiplexed multi-array sensors for threat agents and for signatures of the host response to infection; 2) novel vaccines and restricted access antivirals/bacterials to reduce emergence of drug resistant strains preand post-event; 3) telemedicine capabilities to deliver post-event care to 20,000 victims of a biological strike; and 4) communication systems with intelligent software for resource allocation and redundant pathways that survive catastrophic attack. the integrated system must detect all threat agents with minimal false positive/negative events, a seamless integrated broad-band communications capability that enables conversion of data to actionable information, and novel preand post-event treatments. the development of multiplexed multi-array sensors, appropriate vaccines and antibiotics, and integrated communication capabilities are critical to sustaining normal health, commerce, and international activities. the overarching objectives in developing effective countermeasures to biological threats are to protect the defense community and citizenry from such threats, and to develop agile responses to unanticipated events considering that successful terrorists do the unexpected. the need for protection against and responses to biological threats has been strikingly demonstrated by the use of anthrax contaminated letters that were sent through the u.s. mail in october 2001. that attack resulted in human illness, the loss of life, and discontinuity of government operations because of contamination of federal office buildings in washington, dc. a recent report prepared by the center for strategic and international studies (csis) and supported by the defense threat reduction agency (dtra) of the department of defense (dod) came to the conclusion that the u.s. is at present not well prepared for a similar attack using anthrax1. the major problems include a lack of: 1) a clear chain of command, and 2) tools to provide the public with information that permits appropriate responses. the incidence of congo-crimean hemorrhagic fever in afghanistan, an area where coalition forces are being deployed, increases this need. the potential threat posed by emergent disease (e.g., severe acute respiratory syndrome [sars] and west nile fever virus) or from a major release of a contagious biological agent such as smallpox, has been a growing concern at all levels of the international community. this article outlines and discusses a new strategy that is needed if we are to be fully capable of sensing, preventing, and managing biological threats. the current paradigm addresses biological and chemical terrorist threats in a vertical (stove-piped) response. in the arena of developing sensors for the detection of biological agents, the paradigm has been to develop separate detectors for each agent or to develop a platform for detecting 12-24 threat agents using a single probe for each agent. there is a lack of an interactive networked communication system that is capable of managing a devastating emergent disease. to establish a highly networked system that is rapid enough to permit effective protection, it is necessary to evolve from the stove-piped, compartmentalized model currently in use to an integrated, fused, probabilistic, and frequently updated information model. multiplexed multi-array sensor systems, capable of recognizing all bacterial or viral genomic materials related to pathogenicity or of recognizing antigenic domains that are specific indicators of pathogens are one component of a network needed for rapid detection and identification of biological threats. with respect to therapeutics, modern technologies for vaccine and antibiotic production provide decided advantages over older methods. the traditional vaccines require extensive development times before they become available for human use and undesired side effects commonly result from vaccines produced by these protocols. the cost associated with developing and testing vaccines, using traditional technology, approximates 50-100 million dollars per vaccine. the dissemination of antibiotics and antivirals through the world markets has resulted in the appearance of pathogenic bacteria and viruses that are resistant to these drugs. one approach to reduce the development of antibiotic resistance is to restrict the distribution of newly developed antibiotics. such an approach presents ethical and social dilemmas. the consideration of options available for reduction of drug resistance, prior to a threat event, may permit development of a rational policy. a major problem facing our nations in the event of a biological attack or emergent disease is the large numbers of patients that can be anticipated to require medical treatment. although improvements in emergency medical care and hospital equipment have been achieved during the past two decades, the ability of any community to manage an outbreak of infectious disease affecting >10,000 people is lacking. rapid progress has been achieved whereby medical care can be provided to patients at sites that are distant from primary caregivers using telecommunication systems (e.g., the armed services in theater, large scale hmo providers such as kaiser permanente, or the correctional institutions in the u.s.). the funds needed to acquire telecommunication equipment for such distributed medical care delivery are estimated to be less than 100 million dollars for the entire u.s. at the present time such a distributed care system is not readily available. the new paradigm couples a network centric integrated sensor alert system that can detect all threat agents simultaneously, with a seamlessly integrated communication software capability that converts large scale data to actionable information. for this to be effective, the sensor system must yield minimal false positive and false negative results. the new paradigm incorporates large-scale databases on normative values of threat agents in many regions of the world so that significant changes in real time can be detected. the paradigm also includes the development and implementation of novel pre-and post-event treatment capabilities. attention must be paid to the ability of high level decision makers and operators to recognize that a new state of threat has emerged, based upon output of the sensors, data fusion system, and iconographic display. ambiguity of data, lack of an autonomous processing system, and high stress on the operator (e.g., sleep deprivation, lack of training) may all compromise the utility of a highly networked system of systems. what is needed for this new paradigm to succeed? the needs include multiplexed multi-array sensors for biological agents that infect people, livestock, and edible crops. the agents of concern include many on the militarily critical technologies list prepared for the office of the secretary of defense. we need multiplexed multi-array sensor systems with high specificity and selectivity for the rapid detection of host responses to infection. we need a new generation of effective therapeutics, including vaccines, antibiotics, and antivirals. a network centric intelligent communication system that can provide accurate comprehensible information to decision makers (from command officers to unit operators) is required. to minimize morbidity and mortality and optimize containment of disease, a biosurveillance system based on archival health databases, statistical models, and data mining strategies that can provide an early alert to a disease outbreak is required. in many cases the operator may be required to understand the meaning of acquired data in very short time periods (seconds to minutes) if the response is anticipated to change the outcome of an engagement. the tactical decision making under stress (tadmus) program is one example of such a situation. in the biological threat arena, the detection and identification of toxins require rapid analysis and operator comprehension. the large increase in numbers of sensors (for high explosives [hx], biological and chemical agents, meteorological conditions) together with the rapid changes in op tempo required to manage emergence of clinical disease would suggest a need for the development of systems capable of autonomous generation of an alert when threat conditions arise. in the sensors area, the genomes of most biological threat agents have been sequenced and the signatures of toxins described. novel multiplexed multi-array sensor-platform systems utilize the genomic datasets to detect the appearance of threat levels of these agents. in the therapeutics area, researchers are working towards identifying critical antigenic epitopes of these agents. new therapeutics can emerge that have an antigen binding capacity significantly greater than antigen-cell receptor binding, resulting in the potential for agent neutralization. technologies have been developed over the past decade for the development of new drugs and dna based vaccines. restricted access antivirals/antibacterials will need to be developed to reduce the emergence of drug resistant strains pre-and post-event. a significant development in our program at the university of texas at austin (ut-austin)2 has been the novel design and production of an antibody that binds the anthrax pa antigen 1000 times stronger (kd<10-11) than any antibody to date. the antibodies were produced using phage display technology for selection of the antibodies. in tests with experimental rodents in a controlled facility, administering the bacillus anthracis pa antigen to the animals resulted in 100 percent fatalities, whereas the co-administration of the newly developed antibody against the pa antigen resulted in 100 percent survival2. research is also being conducted to determine unique nucleic acid sequences in the genome of pathogenic bacteria and viruses that contribute to the pathogenic properties of the organisms. this information is being used to develop multiplexed assay systems that can detect selected agents simultaneously. by quickly screening for multiple pathogenicity island sequences or pathogenic factors, end-users will have the capability to detect the first signs of emergent disease without requiring screening for each particular organism. in the communications area, researchers are developing 'belief maintenance' software to provide decision makers some estimate of the validity of incoming data. an estimate of information credibility is critical to effective decision-making in crisis situations when one must rely on an 80 percent solution (i.e., 80 percent of needed information is available). waiting for a 100 percent solution could have a catastrophic impact on response effectiveness. in the area of telecommunications, researchers are developing the means to provide effective medical triage to victims in a contaminated hot zone. the hot zone in this case refers to a region experiencing an outbreak of a highly contagious disease that causes death in a significant percentage of infected individuals. advanced telecommunications technology can permit physicians and other medical experts at remote locations to provide medical information and support care delivery to personnel in the hot zone. prior training of these personnel (from physicians to local citizens) is required. an extensive use of local persons will be necessary if it is deemed inadvisable to introduce health care workers and communications experts into the hot zone; the external support teams are required to provide 'back-fill' support to the overburdened local community. biosurveillance systems are being developed to serve as an early warning of emergent disease. a variety of databases are being developed that are health related. examples of these databases include school absenteeism, over-the counter drug sales, hospital emergency clinic visits, and archival records on the incidence of diseases in different geographic regions, conus and oconus. each database must be statistically characterized regarding parameters such as variance, confidence intervals, seasonality, etcetera, and be integrated into validated predictive models. once the reference databases are in place and suitably modeled, statistically significant departures from baseline values can be detected and transmitted in real time to decision makers through intelligent communication systems. a number of critical technology gaps exist that must be addressed if we are to recognize, prevent, and minimize the effect of biological agents. these gaps include: deficiencies in the availability of multiplexed multi-array agent sensors and platforms; critical reagents; capability for large-scale production of effective vaccines, antibiotics and antivirals; ability to treat a large number (10,000) of infected people 24/7 for several weeks in a biological hot zone; archival biosurveillance databases and intelligent and secure communications networks. with the new capabilities and devices anticipated during the next decade, approaches that address these gaps include the use of autonomous (e.g., cell phone-based) microelectronic detectors for the transmission of data on agent exposure, development of novel antibodies, antibiotics and antivirals to manage disease outbreaks, and establishment of global surveillance systems for emergent diseases (e.g., sars, west nile fever, congo-crimean hemorrhagic fever). because of the broad scope of needs for technology to prevent and minimize biological threats, a number of research areas have been identified as critical. these include: the scientific validation that a biological incident has occurred (requisite tools/capabilities include situation awareness systems, sensors and signatures); the availability of medical countermeasures (vaccines, pharmaceuticals, and medical transport); and a highly effective communications network for the secure transmission of data and the conversion of such data to comprehensible information so that decision makers can take appropriate actions. for effective sensors, a variety of materials are being developed that include effective high-affinity binders of biological threat agents. the high affinity binders include antibodies, cdna gene probes, polynucleotide aptamers, and combinatorial chemicals. using phage display methods, antibody fragments can be selected that have a high affinity for agents such as anthrax toxin and brucella. another binding system that has been examined uses polynucleotide aptamers about 31 nucleotides long that have good binding affinity to ricin toxin. these sensor materials require opto/electronic transduction platforms. sensor platform research currently is being focused on micro-electro-mechanical systems (mems) devices, microelectronics technology, microfluidics (laboratory-on-a-chip), dna/protein microarrays, and transduction devices. efforts are also being directed toward the development of multiplexed multi-array systems that detect approximately 100 biological threat agents of concern. for military application, it is essential that sensor systems can detect and identify agents present in samples rapidly, using platforms that are small and have low power requirements. with current approaches, the development-to-market of new vaccines, antibiotics, and antivirals is in the order of 5-10 years. a paradigm shift to newer culture and dna-based technology is needed if we are to have an effective response to a major biological or chemical event. current estimates regarding the time required for developing and fielding new vaccines and antibiotics/antivirals to specific threat agents, using new technology and expedited approval, is in the order of three years. while current computer/informatics research includes the development of telecommunications assets, a critical need in the communications area is the development of seamless integrated communication networks. these network centric systems enable the conversion of data to actionable information. research is being conducted to provide intelligent agent software designs for such communication systems. this will enable an enhanced accuracy in critical decision-making and resource allocations. the integrated system must have redundant pathways that can survive a catastrophic attack. the communication system must be capable of integrating data on an emerging threat in a timely manner, and provide useful information for public safety coordination and perimeter management. telemedicine capabilities can aid in the delivery of post-event care to 10,000-20,000 victims of a biological strike in a densely populated area for 24 hours a day, seven days a week, for several months. in the event of smallpox attack in which 10,000 people develop clinical symptoms of infection within 7-10 days following exposure, local hospitals and medical response capabilities would be overwhelmed if current treatment protocols were used. telemedicine allows physicians at a remote location from the hot zone to provide medical support via telemedicine capabilities (visual, audio) to aid local physicians in treating patients. a treatment level of 50 patients per day per physician would require 200 physicians to provide telemedicine care for 10,000 patients. each physician would require telemedicine devices; hence 200 telemedicine devices would be required at the remote location, and a similar number in the hot zone. a national telemedicine system could include the establishment of approximately eight telemedicine response centers nationally, interconnected via satellite to telepresence and telemedicine/robotic systems. the remote care capability reduces the likelihood of the dissemination of disease to physicians and communities in which the physicians reside. a telemedicine system would also retain health care delivery in communities providing health care back-fill. the end goal is achievement of a rapid appropriate action in response to detection of threat (within minutes of threat identification). in order to meet this time constraint in a real world scenario, it is probable that the man-inthe-loop may have a denial capability rather than an approval function. the tools required for autonomous weighting of data and subsequent reduction of data elements for particular missions remain to be developed and agreed upon. the technologies required for data acquisition, communication, and autonomous processing fundamentally differ from that required for comprehension by an operator. the three technologies are systems that must be developed prior to deployment and will have known probabilities of accuracy and reliability. the fourth element involves the training and state of vigilance/alertness of the operator as well as the development of software (e.g., icons, data mining, and compression) used to display threat conditions. the point of the fourth element is to permit an operator to have rapid comprehension of the state of threat in a rapidly changing environment. because there is a time factor involved in the comprehension of threat conditions by an operator, and in the translation of the information into action, the fourth element must include temporal qualities. since the time dependence (seconds to minutes) of an intense threat situation will differ from that involved in a peacekeeping or supply distribution situation (many minutes to hours on the average), the autonomous weighting factors and data reduction factors can be expected to vary widely. this variability complicates programming of autonomous systems. command teams on the modern information-age medical delivery front face an increasing variety of cognitive stressors: information ambiguity, information overload, fatigue, and fear of contagion and quarantine. there is a requirement for a useful, predictive model of the effect of these stressors on individual and collective cognition within the medical delivery team. a model to quantify stress experienced by the caregiver and to identify countermeasures and mitigators of stress, develop organizational strategies for optimum performance under stress is needed. psychological assessments that can predict individual and team cognitive functioning and physiological markers that can determine quantitatively and objectively the effect of stress experienced on an operators vigilance have been identified ( table 1 ). the identification of specific physiological markers that are predictive of stressinduced changes in complex cognitive functioning will aid in the construction of autonomous weighting systems. lessons from the anthrax attacks: implications for u.s. bioterrorism preparedness. csis funded by the defense threat reduction agency of the department of defense. david heyman investigator protection against anthrax toxin by recombinant antibody fragments correlates with antigen affinity the research reported in this document was performed in connection with contract number daad13-02-c-0079 with the u.s. edgewood chemical biological command. 1. perception/comprehension 2. primary issue of concern 3. full situation awareness is contingent on at least four elements including: 4. large scale acquisition of data (i.e., sigint, masint, humint, sensors) 5. high fidelity communication of data sets to autonomous processing centers 6. data fusion involving weighting of data and marked reduction in data volume to yield information that provides users a common operational picture 7. rapid comprehension of time dependent information by operators facilitated by new iconographic displays, training, measures of vigilance key: cord-349066-546ozkly authors: walker, d.h. title: principles of diagnosis of infectious diseases date: 2014-08-21 journal: pathobiology of human disease doi: 10.1016/b978-0-12-386456-7.01713-5 sha: doc_id: 349066 cord_uid: 546ozkly infectious diseases are diagnosed by detection of a bacterium, virus, fungus, protozoan, or helminth in a patient with a compatible clinical illness. the methods of detection include cultivation of bacteria and fungi on growth medium, isolation of viruses in cell culture, and identification of the agent biochemically, antigenically, or genetically. infectious diseases can also be identified by detection of a specific immune response, usually antibodies, that develop during the course of illness. visualization of an agent in infected tissue can provide a diagnosis based on specific morphological characteristics or identify the category of organism, for example, gram-positive or gram-negative bacterium or virus (e.g., eosinophilic cytoplasmic inclusion bodies in neurons in rabies virus infection). methods that detect and allow visualization of antigens (immunohistochemistry) or nucleic acid sequences (in situ hybridization) provide more specific diagnoses. detection of specific nucleic acid sequences amplified by polymerase chain reaction is a powerful molecular diagnostic tool. since the elucidation of the etiology of the first infectious disease, anthrax, more than 135 years ago, koch's postulates have been applied and modified as novel technologies and agents have emerged. during the last 45 years, more than 70 previously unknown agents of infections have been identified in emerging infectious diseases, a phenomenon that is likely to continue. dh walker, university of texas medical branch, galveston, tx, usa 2014 elsevier inc. all rights reserved. contagion the ability of a disease to spread by exposure of a person to an infected patient. cytopathic effect the microscopic observation of damage to a cell in culture after infection by a pathogenic agent, usually a virus. differential diagnoses a list of potential diagnoses in a patient who develops a particular set of clinical manifestations. immunohistochemistry a method by which antigens such as those of a particular agent are detected in a tissue section by microscopy by reaction with an antibody and subsequent colorimetric or fluorescent signal-generating methods. in situ hybridization a method for the detection of a genetic sequence in tissue by annealing with a complementary nucleic acid probe coupled with colorimetric, fluorescent, or radiographic detection. opportunistic infection infection with a normally nonpathogenic organism that occurs in an immunocompromised host. prior to the work of koch and pasteur demonstrating in 1876 that anthrax is caused by the microscopic bacterium bacillus anthracis, the concept of infectious diseases did not exist. indeed, at that point, there was only one curiosity that could be called an infectious disease, namely, anthrax. robert koch's teacher, jacob henle, had published in 1840 a theoretical treatise, 'on miasmata and contagia,' in which he put forth the criteria that one would have to meet to establish that a microorganism caused disease. these criteria now known as koch's postulates are considered the fundamental steps by which an agent is proven to cause a particular infectious disease (table 1) . three centuries earlier, hieronymus fracastoro had described clearly the principles of contagion, that is, that exposure of a person to a specific disease such as measles could result in the individual's development of measles, not smallpox, and exposure to smallpox resulted in cases of smallpox, not measles. the scientific identification of viruses, bacteria, fungi, algae, protozoa, and helminths as etiologic pathogens of specific diseases then exploded after elucidation of the etiology of anthrax from the late nineteenth century to today. progress employed available tools such as microscopy, experimental animals, and microbial cultivation techniques and advanced more rapidly with the knowledge of the nature of viruses, immunologic methods, electron microscopy, and molecular methods. when a patient seeks medical attention because of illness, the physician searches for evidence to establish a diagnosis that leads to treatment that will cure or ameliorate the illness. prior to the medical encounter, the diagnostic possibilities are enormous ranging from medical and surgical diseases to the field of psychiatry. infectious diseases in theory offer the greatest opportunities for specific nonsurgical treatment of illness. the key to a favorable outcome is an astute clinician who seeks appropriate clinical, occupational, social, and travel history; considers wisely the potential epidemiological exposures; and gathers incisive data from the physical examination, radiological studies, and laboratory testing. the intermediate result is a prioritized list of differential diagnoses with focus on identifying diseases with the highest clinical consequences and those that are amenable to treatment. specific diagnoses require isolation of the agent in culture, microscopic visualization of the pathogen in tissue lesions, and/or detection of a specific host immune response to the organism. these tasks are accomplished by clinical microbiology and immunology laboratories and pathologists. bacteria comprise the group of agents of the greatest volume and therapeutic consequence that are cultivated in the microbiology laboratory. the culture results must be interpreted with knowledge of the pathogenic potential of the bacterial species isolated and the normal microbial flora at the anatomical site that was the source of the cultured sample. the recognition of contaminants and opportunistic pathogens requires specific knowledge and judgment. escherichia coli could be the cause of septic shock or enterocolitis or merely normal flora or a contaminant. on the other hand, mycobacterium tuberculosis is always a pathologically significant isolate. there are numerous approaches to the isolation of bacteria that are designed to recover particular pathogens that involve the appropriate media containing particular nutrients, salts, inhibitors of other organisms, and growth conditions (e.g., temperature, ph, and anaerobic atmosphere). selection of culture media (nonselective, selective, and differential) for a particular specimen is mostly based on the clinical history and the specimen source (blood, feces, csf, and sputum). automation of blood culture systems has greatly expedited and improved the isolation of infectious agents from blood. it is necessary to specify whether the culture requested is routine, anaerobic, or other specific microbial groups (e.g., mycobacteria) or a particular agent (e.g., brucella). some bacteria grow slowly requiring that cultures be requested to be held longer if certain organisms are suspected. some bacteria have yet to be cultivated (e.g., treponema pallidum). although a few fungi grow on some standard bacterial media, most fungi are recovered in the mycology laboratory on media designed especially for their propagation. fungi that are widely disseminated as spores in the environment and may contaminate cultures or normal yeast flora of some body sites require judgment to initiate or withhold antifungal treatment. identification of fungi has been accelerated greatly in microbiology laboratories by performing either hybridization tests or polymerase chain reaction (pcr) on media growing a fungus that is not identifiable by conventional morphological techniques such as blood culture bottles that contain yeast growth. identification of mycobacteria has also been greatly improved by the availability of dna-based tests on specimens inoculated into liquid medium. once mycobacterial growth is flagged by the automated system, molecular identification is possible, shortening the time until appropriate treatment is initiated. viral infections can be diagnosed by propagation of viruses in cell culture. the presence of viral replication in monolayers of cells in the virology laboratory is classically recognized by injury to the cells caused by the viral infection, known as cytopathic effect. many viruses do not cause microscopically detectable injury to the cell monolayer, and there is no cell type that is universally susceptible to all families of viruses. moreover, there are viruses that have yet to be recovered in cell culture. it is wise to provide the name of the patient's condition (e.g., meningoencephalitis or pneumonia) to the virology laboratory and to indicate the particular viruses that are suspected in order that appropriate cells and procedures will be employed. viruses that are recovered in cell culture can be identified by immunologic and molecular methods. direct detection by such methods has replaced a large portion of viral isolation efforts. some viruses (e.g., the herpes viruses including herpes simplex virus types 1 and 2, cytomegalovirus, varicella-zoster virus, and epstein-barr virus) cause infections that persist long after the acute illness. recovery of any of these viruses other than in the classic acute infection may reflect asymptomatic viral shedding or an opportunistic reactivation causing clinical illness. the viral quantities are greater in clinically significant conditions. the immune system, which evolved to control infectious diseases, also provides an approach to determine the diagnosis of an infectious disease. the adaptive immune response recognizes antigens of the infecting agent by production of antibodies and generation of antigen-specific t lymphocytemediated cellular immunity. the antigens that are recognized range from epitopes that are present on only one species, subspecies, or strain to antigens that are shared by agents in a genus, family, or larger group. the patient's antibodies to particular antigens that are detected and measured in the serology laboratory frequently identify the agent of the infection. various serological tests employ the methods of immunofluorescence, enzyme immunoassay, agglutination, western immunoblot, or others. the drawbacks and pitfalls of the serological diagnostic approach include the frequent absence of antibodies in serum at the time of the patient's presentation for medical diagnosis early in the course of illness prior to their production, the occurrence of cross-reactive antibodies stimulated at an earlier time by other organisms that may be misinterpreted as diagnostic of the current illness, the occurrence of persistent specific antibodies stimulated by a previously resolved infection, and misinterpretation of the reported results owing to lack of knowledge of the levels of antibodies that are generally considered diagnostic. although it is sometimes possible to observe infectious organisms by direct examination of a clinical specimen macroscopically (e.g., worms passed in feces) or microscopically (e.g., t. pallidum by dark-field microscopy of a genital lesion of suspected syphilis), diagnostic evaluation usually begins with a stained smear of sputum, cerebrospinal fluid, urine, wound exudate, or other specimen. the pathologist examines microscopic sections stained routinely with hematoxylin and eosin (h&e). large organisms such as helminths are readily observed and can be identified by their specific morphological characteristics by one with particular expertise. routinely stained sections reveal brown-pigmented fungi, which stand out from the pink and blue of eosin and hematoxylin. table 1 henle-koch postulates for the demonstration that a microorganism causes a disease 1. the organism occurs in every case of the disease in question and under circumstances that can account for the pathological changes and clinical course of the disease 2. it occurs in no other disease as a fortuitous and nonpathogenic parasite 3. after being fully isolated from the body and repeatedly grown in pure culture, it can induce the disease anew some eukaryotic protozoa and fungi can be detected and identified by the presence of pigment (e.g., some malarial parasites), subcellular structures (e.g., kinetoplasts of leishmania), or particular size, reproductive process, and cell wall structure (e.g., broad-based budding and refractile cell wall of blastomyces dermatitidis and large sporangiophores containing endospores of coccidioides immitis). some viruses cause pathological changes in the infected cells such as the formation of syncytial multinucleated giant cells and accumulations of proteins often of viral origin that are stained with eosin or hematoxylin (viral inclusions) in the nucleus or cytoplasm. recognition of the cytopathic effects and eosinophilic or basophilic cytoplasmic or intranuclear inclusions can lead to a specific diagnosis such as rabies or cytomegalovirus infection or point to a group of viruses that cause similar pathological changes such as herpes simplex viruses 1 and 2 and varicella-zoster virus. more often, infectious organisms are detected in smears of clinical samples or histological sections that have been stained by methods such as the gram stain that color gram-positive bacteria dark blue and gram-negative bacteria pink. the morphology of the bacteria as cocci or bacilli further characterizes the agent. the acid-fast stain is particularly useful for detecting mycobacteria and diagnosing tuberculosis. bacteria that stain poorly or not at all by the gram method can be visualized after silver impregnation staining (e.g., the warthin-starry method), which can detect treponema, legionella, leptospira, and indeed nearly all bacteria. a separate silver-staining technique (e.g., gomori's method) is very useful for detecting fungal yeast and hyphae. the only pathogenic fungus with a mucin capsule, cryptococcus, is identified by a stain such as mucicarmine. the most powerful tool for specific microscopic diagnosis of infectious diseases is immunohistochemistry. antibodies to antigens of particular bacteria, viruses, fungi, and protozoa have been produced, standardized, and made commercially available to react with the agents after appropriate processing of the tissue sections. after incubation of the antibody with the appropriately prepared microscopic section, the unbound antibody is washed away. only antibody bound to the infectious agent's antigens remains bound to the tissue section. the bound antibody is reacted with a series of reagents that deposit a colored precipitate on the antigen, allowing the detection, anatomical localization, and morphological analysis that has the ability to identify the agent and establish the diagnosis. the location of the agent is often very particular, and the expected size and shape of an organism add weight to confidence in the diagnosis. each infectious species contains a unique genome, dna for bacteria, fungi, protozoa, and some viruses and rna for the other viruses. transcription of the genetic dna into messenger rna results in many copies of some rna sequences. in situ hybridization is the method of detecting specific dna or rna sequences by annealing complementary dna or rna containing a label that is used to generate a visible product at the location of the target nucleic acid sequence in infected tissues. those powerful techniques have not been exploited for the diagnosis of infectious diseases as extensively as immunohistochemistry. however, they are very effective and can be used to distinguish among even closely related organisms. detection of dna or rna with nucleic acid sequence of a specific infectious agent powerful methods for the amplification of the nucleic acid sequences of few genomes of a bacterium, virus, or other agent to produce and detect millions of copies of the targeted sequence have provided a sensitive approach to the diagnosis of infections. the key to the technique is polymerase chain reaction (pcr), a heat-stable dna polymerase from organisms that reside in thermal springs. thirty or more thermal cycles of dna synthesis initiated by primers with specific dna sequences yield logarithmic increase in the particular dna fragment. for rna genomes such as those of rna viruses, a step of enzymatic conversion of rna to dna is performed using reverse transcriptase. identification of a novel, causative agent of a previously unknown infectious disease is a special challenge. in 1967, the us surgeon general stated, "it's time to close the book on infectious diseases. the war on infectious diseases is over, and we have won." it was believed for the next quarter of a century that vaccines and antibiotics had controlled infectious diseases. in reality, approximately 70 previously unknown agents of infectious diseases have been identified beginning in 1967 with marburg virus, the original agent of an african viral hemorrhagic fever. because it is clear that the emergence of infectious diseases will be a continuing occurrence, medical personnel should understand how these mysteries are solved. there are four steps in the discovery of emerging pathogens: (1) awareness of the presence of an unknown disease, (2) detection of an infectious agent in association with the disease, (3) determination that the agent causes the disease (koch's postulates revisited), and (4) determination that the etiologic agent is novel. awareness of an unknown disease may occur because of the abrupt onset of a cluster of cases of a severe illness or recognition of distinctive gross or microscopic pathological lesions. severe acute respiratory syndrome caused by a novel coronavirus is a recent example. in contrast, a syndrome of unknown etiology may have been well defined clinically for many years prior to discovery of an infectious etiology. gastric and duodenal ulcers caused by helicobacter pylori and cat scratch disease caused by bartonella henselae are examples of such diseases for which a microbial agent was unsuspected or long elusive, respectively. the methods for the initial detection of a previously unknown agent have included microscopy, bacterial culture, cell culture, animal inoculation, electron microscopy, cross-reaction of antigens in serological tests, immunohistochemistry, and pcr amplification followed by dna sequencing of the products. these are the same methods used to diagnose infection experimentally and characterize the agents. the methods used to support the etiologic role of the pathogen have included experimental animal infection, self-experimentation, laboratory accident, and demonstration of the development of a specific immune response to the agent. demonstration that the pathogen is novel includes classical biochemical phenotyping, antigenic analyses, dna or rna gene sequencing, unique ultrastructural morphology, and identification of a novel toxin. the field of emerging infectious diseases is where diagnostic infectious diseases and basic science meet to solve current biomedical infectious challenges. the roles of the astute clinician, pathologist, and laboratory technologist have been important. knowledge of microbiology, virology, immunology, molecular biology, and both cutting-edge and classic technologies has been critical to effective application to the discovery of novel pathogens. often, identification of the genus of the agent allows the selection of effective antimicrobial treatment that would have been previously unknown. the payoff of knowledge is noteworthy. pathology of infectious diseases infectious diseases: atlas, cases, text. the mcgraw-hill companies emerging pathogens: challenges and success of molecular diagnostics immunohistochemistry of infectious diseases diagnosing emerging and re-emerging infectious diseases: the pivotal role of the pathologist koneman's color atlas and textbook of diagnostic microbiology infectious disease pathology: clinical cases detection of infection or infectious agents by use of cytologic and histologic stains key: cord-020568-c5425959 authors: blatny, janet martha title: detecting and responding to bioterrorism date: 2007 journal: risk assessment and risk communication strategies in bioterrorism preparedness doi: 10.1007/978-1-4020-5808-0_7 sha: doc_id: 20568 cord_uid: c5425959 nan preparedness, 77-92. janet martha blatny incapacitate or kill man, or to destroy livestock, crops or food. toxins may to bioterrorism their production is by "dual-use" equipment. for civilian purposes such equipment is used for production of beer, yoghurt, vaccines, and antibiotics. there are several barriers in obtaining an effective bw, and two of the major challenges are (i) the development of a sufficiently virulent and infectious strain for the seed stock and (ii) the selection of the most appropriate dissemination method of the biological threat agent. the centers for disease control and prevention (cdc) has established a list of biological agents and toxins that may pose a severe threat to public health and safety (http://www.cdc.gov/od/sap). the requirements for including the agent or toxin to this "select agent list" are based on the effect on human health of exposure, the degree of contagiousness, the availability and effectiveness of medical treatment, and the vulnerability of various populations. since october 2005, the reconstructed 1918 pandemic influenza virus has been added to this list. table 1 provides examples of potential biological threat agents. the australia group has provided guidelines and control lists for national export of equipment, technology, and biological material that could contribute to bw activities (http://www.australiagroup.net/). [9] . there is a strong focus on the use of anthrax as a bw. this is due to the great stability of the anthrax spores ( 80 years), > the effectiveness as an infectious agent by inhalation, and the easy dissemination of the spores. many experts believe that biological threat agents may be more useful for obtaining panic and anxiety causing serious psychological impact instead of resulting in high preserved tissue samples [10, 11] . the 1918 flu virus killed approximately 40 million people and might be regarded as one of the most effective bioweapon known. newly emerging (e.g., sars, hendra, nipah, and avian flu) and re-emerging (e.g., west nile, human monkeypox, multidrug-resistant mycobacterium tuberculosis) pathogenic microorganisms are of global concern urging the needs for national preparedness plans, and the development and production of vaccines, antivirals, and other therapeutics. these infectious agents could potentially be used in a deliberate biological attack. three accidental escapes of the 2003 and 2004 [12] . gene sequences may be purchased from various bars and supermarkets in oregon, usa, in 1984, causing an outbreak of salmonellosis where 751 people fell ill [6] . the dissemination of rity of incidents between 1960 and 1999 using biological material in order to kill, incapacitate, or threaten, included frequent use of ricin, hiv-infected blood, and food contaminants (e.g., salmonella spp. and shigella spp.). 80 into account; the capability (technology and skills) and intention of the in order to assess a bioterrorism threat several factors need to be taken to minimize the effects of a biological attack, public health authorities need to be aware of the threat biological agents may have in biological warfare and bioterrorism. physicians need to be alerted and well-trained, have a high suspicion for these agents, and must recognize the clinical symptoms derived from such an infection. symptoms of those exposed to such agents may be nonspecific and resemble common flu-like diseases. many biological threat agents are zoonotic. animals may show the first symptoms of a clinical infectious disease after a deliberate release of a biological agent. in such cases, veterinarians may be the first to encounter the disease caused by a zoonotic threat agent. planning for necessary actions, national and global coordination, responsibility, enhanced law enforcement, medical countermeasures, and implementing efficient syndromic surveillance systems are all essential parts of bioterrorism preparedness. in addition, designing efficient detection systems for early warning, and rapid and reliable diagnostic systems contributes to improve the response efforts. the avian flu outbreak in several asian countries killing approximately 50 million chickens has revealed the need for establishing rapid molecular diagnostics for mass screening of the biological threat agents may be difficult to detect and identify quickly and reliable both from a civilian (public health) and a military point of view. there is a distinction between the terms "detection" and "identification". the establishment of the presence or absence of a biological agent is termed genes synthesis firms by e-mail requests. few companies check and compare the ordered sequences against sequences from biological threat agents and there are no national regulations requiring these firms to do so. thus, there is a concern that terrorists may order specific virulence genes and perform genetic engineering to create new or altered pathogenic microorganisms [13] . to a release of biological agents may decrease the infectious rate and the people exposed ( figure 1 ). by the time the clinical symptoms have emerged, it might be too late for treatment. in some cases, antibiotics may be effective as postexposure prophylaxis, but this treatment needs to start before the onset of symptoms. flu carriers to improve public health responses [14] . early detection 81 detecting and responding to bioterrorism responding to bioterrorism 5. detection, while identification is the determination of the precise nature of the biological agent. many systems can only detect, and not identify the biological agent. the identification system is usually dependent on specific signatures (dna, protein) of the microorganism. identification of s. typhimurium as the causing strain for the deliberate outbreak of salmonellosis by the rajneeshee cult took 4 days, but it took more than a year to identify and confirm that only a single strain of s. typhimurium had been used (in addition to the confession by one of the cult members about the deliberate release). this illustrates that, in some cases, identification may be time-consuming. many bacterial threat agents occur naturally, and some may be closely related to other bacteria found in the environment. thus, it is necessary to distinguish between terrorist events, naturally occurring outbreaks, and background levels. false positives (i.e., alarm, but no agent) may arise when the biological detector device responds to detect and identify an interfering substance in the sample (contamination), which is not the actual biological agent. if a biological agent exists, but below an instrument's threshold value for detection and identification, a false negative may occur. thus, the detection and identification schemes need to be carefully designed. a biological point detector for environmental (air) monitoring contains several components (figure 2) . a trigger may determine in real time any change in the biological background in air and discriminate between a biological threat agent and other particles in air, i.e., nonspecific detection. particle sizers may be used as a trigger, exemplified by the model 3321 aerodynamic particle sizer from tsi and the fluorescence aerodynamic particle sizer flaps2 from defence r&d canada. the flaps2 measures the intrinsic fluorescence produced by living microorganisms. using an ultraviolet (uv) laser, the wavelength 266 nm excites fluorescence from the amino acids tryptophan and tyrosine, while 355 nm excites fluorescence ranging (lidar) may also be used as a trigger and for detecting potential biological threat clouds. lidar is regarded as a detect-to-warn system false alarms. so far, lidar is not sufficiently operative during full daylight and needs good environmental conditions to function efficiently. a collector is used for concentrating the biological particles in air usually into a liquid. spores, bacteria, and viruses are usually together or detecting acpla is to collect large enough air samples through a collector. the impinger spincon® air sampler from sceptor industries collects particles at a flow rate of 450 l/min in the range of 0.2-10 µm into a liquid. omni 3000, based on the spincon® technology, and the biotrace intelligent cyclone air sampler (icas) collects air with a flow rate of 300 and 750 l/min, respectively. the biocapture 650 from mesosystems is a portable handheld air collector, suitable for first responders, sampling at a flow rate of 200 l/min. the efficiency of air collection is also dependent on the size of the particles. ffi is using both the spincon® and omni 3000 air collector for outdoor and indoor sampling of air (figure 3) . these air samples are spiked with biological threat agents for polymerase chain characterize to a certain extent the biological origin of the aerosols. even [15]. short-range lidars can detect at a radius of approximately 5 km from the instrument. most lidars use uv radiation at 266 nm or 355 nm such that biological material will fluoresce, but uv excitation may also fluoresce fuel oils, diesel, and agrochemicals causing efficient and reliable biodetection depends on the selectivity and sensitivity of the assay and system, as well as the collection and handling of the sample. from the cofactor nadh. a stand-off detector, such as light detection and attached to dust and other particles in air. thus, the term "agent-containing particles per liter of air" (acpla) has been adopted. the first step in reaction (pcr) analyses and determination of the detection limit (unpublished results). in many biodetection devices the trigger and detector have overlapping or the same functions. a detector is used to determine and 83 detecting and responding to bioterrorism usually consists of a trigger, collector, detector, and identifier. reliable and efficient though biological agents are detected, further identification of the agent is usually needed. an identifier performs specific identification of the nonbacterial atp (yeast, somatic, or free atp), and to detect spores. spores are deficient in atp and a germination step is required before there are several methods available for identifying biological threat viable cells, inspection of colony morphology, and determination of antibiotic sensitivity. such classical microbiology may identify the bacterial agent at the genus level and to a certain extent at the species level. however, these methods do not identify toxins, they are time-consuming, and not suitable for first responders. immunoassays include the use of specific antibodies targeted against a toxin or a particular antigen at the surface of a bacterial cell or spore. immunological methods usually provide quick results and are suitable for fast screening of a large number of samples. however, the method is less specific and sensitive, and the detection limit may be a 100-1,000-fold devices are the bioveris detection system, meso scale discovery sector pr, and luminex 100. assay combined with specific phage-associated lytic enzymes may be used for further identification of the bacteria. performing the bioluminescence assay [16, 17] . the bioluminescence higher than the infective dose [20, 22] . in general, immunoassays are good for presumptive detection but confirmatory analysis is needed, usually by nucleic acid-based detection methods. antibody specificity and affinity are often the limiting factors of immunoassays. tetracore's biological threat agents may be present as vegetative cells, spores, or in a dormant state (viable but nonculturable state; vbnc) in environmental detection of viable bacterial cells (bioluminescence assays). some of these assays have been further improved to separate bacterial atp from samples (such as water, air, and soil). atp is frequently used for nonspecific biothreat alert test strips are reagent strips using a lateral flow immunochromatography technique allowing biological threat agents to be identified within 15 min. examples of commercially available immunological agents, but there is no single approach for identification. definitive identification requires several methods; conventional culture-based methods as well as clinical diagnosis of those exposed to such agents. the cultivation of bacteria in selective growth medium allows detection of 85 immunoassays, and nucleic acid-based methods (reviewed in [18] [19] [20] [21] ), detecting and responding to bioterrorism 8. real-time pcr is the most commonly used nucleic acid-based method for specific and sensitive identification of biological threat agents. pcr may detect as low as 10-100 cells, but this method usually requires a clean sample. disruption of bacterial cells and spores is often needed in order to make the dna available for amplification in the pcr assay. an effective sample preparation may also reduce the presence of false negatives since impurities from the sample may inhibit the pcr assay. specific identification by pcr is obtained by using specific primers and probe combinations. each probe (e.g., taqman probes, fluorescence resonance energy transfer [fret]-prober, and molecular beacons) has a different method of separating the fluorophore from the quencher when reporting the amplification process. different reporter dyes (fluorophores) may be attached to the probes allowing simultaneous identification of several biological threat agents (multiplex identification). the pcr assay should include internal controls to avoid false positive signals. internal controls may consist of either a plasmid or a dna fragment in which the amplified dna sequence is several real-time pcr assays have been outlined for a number of biological threat agents, and commercial kits containing the specific reagents are available. the target genes and regions for pcr identification are specifically chosen for each microorganism. for bacillus anthracis, several genes located on the virulence pxo1 and pxo2 plasmids, respectively. however, plasmid-free b. anthracis cells will only be identified by pcr when using specific chromosomal targets. the closest relative of b. anthracis is the opportunistic human pathogen b. cereus (soil bacterium) and the insect pathogen b. thuringiensis. these are functionally different, mainly distinguish by plasmid-encoded genes. the genomes of b. anthracis, regions that may be suitable as specific targets for pcr identification unique in the assay [23, 24] . genetic targets located on the chromosome are used for identification [25] [26] [27] in addition to the well-known target lef, cya, pga toxin, and cap capsule b. cereus, and b. thuringiensis strains show a close similarity [28] complicating the search for unique chromosomal targets for thier differentiation and identification. however, genome sequencing of many biological threat agents has provided significant data about unique [29] . ffi has identified one unique chromosomal target for specific identification of b. anthracis (unpublished results). several real-time pcr smartcycler from cepheid and the lightcycler from roche applied assays for identification of various biological threat agents listed in table 1 have been established at ffi (exemplified in figure 4 ) using either the 86 8.2. nucleic acid-based methods science ( figure 5 ). idaho technologies and smiths detection (bio-seeq) have developed handheld pcr devices suitable for military use and first responders, such as ruggedized advanced pathogen identification device (rapid), and razor, and bio-seeq, respectively. bruker daltonik gmbh has constructed a microarray system based on pcr for bioidentification. for review of various nucleic acid detection assays and systems see [18, 19, 21] . tm (lightcycler ) using specific primers and probes (19) . pcr can detect dna from both viable and dead cells, and thus, culturebased methods are needed for the assessment of bacterial viability. nucleic acid sequence-based amplification (nasba) is a method in which rna biodetection equipment for use in a battlefield is different from the use in a civilian community. if deployed in the right place and at the right time, valuable information of a bioterrorism event would be provided. the joint biological point detection system (jbpds) is an automatic point detector for real-time identification of biological threat agents within 15 min and suitable for military use. it contains a trigger, collector, detector, and identifier, and will be used by the us air force and marine corps. integrated systems for identification of various biological threat agents in large areas (e.g., arenas, airports) and postal service systems have been constructed, such as the autonomous pathogen detection system (apds) from lawrence livermore national laboratory and the biohazard detection system (bds) from northrop grumman, respectively. other biodetection techniques in advance are light scattering surface plasmon resonance (lsspr), surface-enhanced raman spectroscopy (sers), and matrix-assisted laser desorption/ionization time-of-flight mass spectroscopy (maldi-tof-ms). there have been many attempts to develop biosensors based on electrochemics, micro-fluidics, nanocrystals (quantum dots), and optics, combined with immuno-and nucleic acid-based assays, classification of bacterial strains is often based on the identification of dna polymorphisms. when the genetic diversity within a bacterial species is high, it is often adequate to sequence only a few number of dna instead of dna is amplified (reviewed in [30] [31] [32] ). nasba can be used to detect viable cells since mrna is specifically detected and amplified. the design of specific primers and molecular beacons is crucial for the nasba assay. nasba has been widely used for virus diagnostics, and only few reports describe the use of this technique for bacterial detection. this technique has been used together with liposomal-based biosensors to identify b. anthracis, escherichia coli, and cryptosporidium parvum [33] [34] [35] . ffi has used nasba for identification of vibrio cholerae in water samples [36] . but only few are commercially available (reviewed in [37, 21] ). integrated and advanced detection methods 9. fragments in order to classify the strain. in contrast, strains belonging to more homogenous species, in which little sequence divergence has occurred, it is necessary to sequence long dna regions or to analyze several loci with high mutation rates. variable number of tandem repeats (vntr) is a linear arrangement of multiple copies of short repeated dna sequences biological threat agents for the use in biological warfare or bioterrorism are infectious microorganisms or toxins with the intent to incapacitate or kill man, or to destroy livestock, crops, or food. an essential part of bioterrorism preparedness and response includes the design of efficient and reliable systems for detection and identification of biological threat agents. various biodetection systems for environmental monitoring are available. many of these systems have been primarily constructed for military use. there is no single approach for identification of biological threat agents, and several methods are needed for verification. classical microbiology, immunoassays, and nucleic acid-based methods, including molecular forensics, are laboratory approaches for detecting, identifying, and verifying various biological threat agents. to identify the b. anthracis ames strain used in the anthrax attacks to the origin of the bacterial agent [39] . vntr analysis was used from sample collection to molecular typing. mlva techniques have already been established at ffi and are used for genetic fingerprinting of b. cereus and v. cholerae strains (unpublished results). the size of the dna fragments containing vntrs is measured by pcr. most bacterial genomes contain several vntrs, and multi-locus vntr (mlva) analysis is now a suitable tool for strain typing and for tracing back in the united states in bioterrorism: from threat to reality the abcs of bioterrorism for veterinarians, focusing on category a agents sensitive detection of bacteria and spores using a portable bioluminescence atp measurement assay system distinguishing from white powder materials usamriid's medical management of biological casualties handbook smittsomme sykdommer fra mat. høyskoleforlaget large community outbreak of salmonellosis caused by intentional contamination of restaurant salad bars the national anthrax epidemiologic investigation team. investigation of bioterrorism-related anthrax bioterrorism and threat assessment. the weapons of mass destruction commission characterization of the 1918 influenza virus polymerase genes characterization of the reconstructed 1918 spanish influenza pandemic virus the 1918 flu virus is resurrected the bioweapon is in the post the necessity of molecular diagnostics for avian flu set lasers to…detect. nbc international rapid atp method for a review of molecular recognition technologies for detection of biological threat agents rapid diagnostic assays in the genomic biology era: detection and identification of infectious disease and biological weapon peruski ah, peruski jr. lf. immunological methods for detection and identification of infectious disease and biological warfare agents current and developing technologies for monitoring agents of bioterrorism and biowarfare multi-pathogens sequence containing plasmids as positive controls for universal detection of potential agents of bioterrorism preparation of a positive control dna for molecular diagnosis of bacillus anthracis identification of anthrax-specific signature sequence from bacillus anthracis use of 16s rrna, 23s rrna, and gyrb gene sequences analysis to determine phylogenetic relationships of bacillus cereus group microorganisms real-time pcr assay for a unique chromosomal sequence of bacillus anthracis bacillus anthracis, bacillus cereus, and bacillus thuringiensisone species on the basis of genetic evidence a genomics-based approach to biodefence preparedness nasba and other transcription-based amplification methods for research and diagnostic microbiology characteristics and applications of nucleic acid sequence-based amplification (nasba) the use of nasba for the detection of microbial pathogens in food and environmental samples biosensor for the detection of a single viable b. anthracis spore nucleic acid approaches for detection and identification of biological warfare and infectious disease agents hort-sequence dna repeats in prokaryotic genomes multiple-locus variable number tandem repeats analysis for genetic fingerprinting of pathogenic bacteria multiple-locus variable-number tandem repeat analysis reveals genetic relationships within bacillus anthracis the genome sequence of bacillus anthracis ames and comparison to closely related bacteria toward a system of microbial forensics: from sample collection to interpretation of evidence biosensors for the detection of bacteria detection of viable vibrio cholerae cells by nasba universal nucleic acid sequence biosensor with nanomolar detection limits a rapid biosensor for viable b. anthracis spores key: cord-354130-mi7saerx authors: compton, susan r.; homberger, felix r.; clark, judy macarthur title: microbiological monitoring in individually ventilated cage systems date: 2004 journal: lab anim (ny) doi: 10.1038/laban1104-36 sha: doc_id: 354130 cord_uid: mi7saerx housing rodents in ivc racks has many advantages over conventional cages but also presents unique challenges related to health monitoring. the authors review the issues to consider in design of a sentinel program using ivc systems. there exist many methods and strategies for monitoring rodent colonies for microbial agents. several general principles are applicable when developing and assessing the efficacy of a microbiological monitoring program, irrespective of the type of caging used for rodent housing. first and foremost, the monitoring program must specifically target the infectious agents of concern. in particular, there should be consideration of the route and duration of transmission of the infectious agents, the probability that the agents will be found, and the likelihood that the agents will cause disease or affect research results. second, the monitoring program should make the most efficient use of personnel and resources. finally, the outcome of a successful monitoring program should aid research, not hinder it, and should result in animals that are sufficiently pathogen free for research and should facilitate exchange of animals between institutions. rodents in contemporary animal colonies live in several types of caging. the three types of caging systems commonly used are open-top cages, static isolator cages, and individually ventilated cages (ivcs). the type of housing used affects the ease with which infectious agents can be spread between rodents housed in separate cages. rodents housed in open cages and serviced in the open have the highest risk of transmitting infectious agents from cage to cage via aerosols and fomites. this is one reason why this type of housing is being eliminated in many facilities. rodents housed in static isolator cages have a lower risk of infectious-agent transmission than do rodents housed in opentop caging, because the filter lid serves as a physical barrier to infectious-agent transmission, although transmission can occur if filter lids are not properly installed 1 or during cage changes. it has also been shown that the exhaust gases do not actu-ally pass through the filter material in the lid but escape through the gap between the cage and the cage lid 2 . this is the reason that many facilities have instituted the use of ventilated cage change stations for husbandry and experimental manipulations of rodents housed in static isolator cages. ivcs differ from static isolator cages in several ways. each cage receives a supply of hepa filtered air at a rate of between 30 and 120 air changes per hour (ach). this results in lower temperature and humidity as well as lower concentrations of ammonia and carbon dioxide than in static isolator cages 3 . some ivc systems balance the air supply with the air exhaust system, thus permitting control of differential pressure at the cage level. thus each cage, theoretically at least, is its own biocontainment zone. an alternative approach in some ivc systems is to seal the cages to achieve biocontainment (instead of balancing differential pressure). this approach has, however, the obvious disadvantage of being potentially lethal in the event of cage ventilation failure 4, 5 . rodents housed in ivcs have the lowest risk of cage-to-cage spread of infection [6] [7] [8] [9] [10] [11] (j. schmidt, personal communication). transmission between animals housed in ivc systems generally occurs as a result of dissemination during husbandry procedures or experimental manipulations by investigators, thus justifying the use of ventilated cage change stations for such activities. nevertheless, it is essential to exercise great care to ensure against transmission by fomites on hands or equipment, such as watering valves, particularly when active infections are present 11, 12 . monitoring methods, such as placement of room sentinels adjacent to the hvac exhaust duct, as used traditionally with mice housed in open-top caging, require reassessment with regard to their efficacy in static isolator cages and in ivc systems. tion of the testing methods (e.g., serology on immunodeficient animals). the use of sentinel mice to monitor a colony decreases the number of mice needed to detect an infection within a colony, because each sentinel can serve in monitoring of many colony mice. there are three types of sentinel animals. first, contact sentinels (i.e., mice housed in the same cage as the colony mice to be monitored) are highly reliable at detecting infectious agents transmitted by all routes (air, feces, urine, wounds, contact, etc.). second, soiled-bedding sentinels (i.e., mice housed on soiled bedding that has been removed from several cages of colony mice) are most effective at detecting agents that are transmitted in feces or urine. third, exhaust air sentinels (i.e., mice that are exposed to rack exhaust air) are effective at detecting agents that are transmitted in respiratory excretions. lipman and homberger 13 provide an overview of the advantages and disadvantages of the three types of sentinels. finally, direct detection of infectious agents present within the environment of a colony is feasible by swabbing such surfaces as cage and cage racks, by taking appropriate samples from rack exhaust air, and so on. several methods exist for testing samples collected from mice or from their environment. traditionally, most viral infections are detected using serological assays. the advantages of serological assays are that they are inexpensive and can provide a historical picture of which agents are present in the colony (i.e., at any time after a mouse becomes seropositive, antibodies to the rel-evant agent can be detected). the primary disadvantage of serological assays is that mice infected with an agent may not become seropositive until 2 or more weeks after the infection's initiation. therefore, in the midst of an outbreak, many mice may become infected and may potentially be transmitting virus to other mice, yet may still be seronegative. additionally, immunocompromised mice, especially those with b-cell deficiencies, may produce few or no antibodies in response to an infection. recently, molecular methods have augmented our arsenal of testing methods. molecular methods, in particular pcr and rt-pcr, detect the nucleic acids present within a bacteria or virus. in general, these methods are highly sensitive and rapid, and can be very effective means to determine which animals are infected with a particular agent. molecular methods are particularly useful during outbreaks, when it is essential to determine rapidly (within a few hours) the location of infected mice within a rack, so as to develop a strategy for containing the spread of the agent. the limitations of molecular methods are that they are relatively expensive, they can yield both false negative and false positive results, their high sensitivity makes them prone to cross-contamination, and many substances found in blood, feces, and other animal tissues can function methods such as exposing sentinels to soiled bedding, as used traditionally with mice housed in static isolator cages, also require reassessment for their applicability in ivc systems. moreover, we should add to our monitoring approach new methods specifically designed to exploit ivc system characteristics by the sampling of air exhausted from the ivc system. there are two ways of monitoring the exhausted air, either from individual cages or from the whole ivc rack. small gauze filters placed on the cage exhaust opening, on the exhaust opening from a zone of the rack (e.g., a row or column of cages), or on the exhaust manifold of the entire rack can permit periodic monitoring of the effluent air. after removal from the rack, molecular pcr-based methods can detect infectious agents on the filters. additionally, there can be continuous monitoring of exhaust air from the ivc rack (or a selected zone of the rack) that is achieved by testing of sentinels housed in a specially designed cage (bioscreen system; biozone inc., fort mill, sc, and biozone ltd., margate, uk) that receives as its air supply a portion of the mixed exhaust air from several cages on the rack, before hepa filtration (fig. 1) . the effectiveness of such a system is clearly dependent on the uniformity of ventilation of all cages on the rack so as to be confident that a low incidence of infection will be represented in the exhaust air without regard to the location on the rack of the infected animals 12 . there are many ways of detecting an infectious agent that has been transmitted to one or more rodents housed in ivcs. the most direct method of surveillance is to monitor the colony mice themselves for evidence of an infection. this method seems highly reliable on first consideration, but it presents significant drawbacks. if the animals are properly screened, considering that each cage is essentially a self-contained unit, then it is by far the least cost-effective method, because it requires the largest investment of mice, staff, and testing reagents. moreover, the age, genotype, and experimental use of the animals may interfere with the applicaas inhibitors of the enzymes used in these assays, causing false negative results. finally, the nucleic acids detected may be present in a noninfectious form of the agent, such as in inactivated material present on the surface of cages or change stations. detection of bacteria usually follows culture of fecal, cecal, nasopharyngeal, or other tissue samples on specialized agar plates. specific identification of pathogenic bacteria after culture usually involves a combination of enzymatic and fermentation tests. microscopy is the usual method for visual detection in diagnostic specimens of endoparasites and ectoparasites. there are several infectious agent-specific variables that affect the ease with which an agent can be detected in mice housed in an ivc system. the first influence is the route(s) by which the agent is shed from the animal ( table 1 ). agents that are transmitted only through animal-animal contact, such as mites, are very difficult to detect in mice housed in an ivc system. it is possible to detect these agents directly in colony animals or using contact sentinels. one can effectively detect agents that are transmitted via the fecal-oral route, such as mouse parvovirus (mpv), using contact sentinels, sentinels exposed to soiled bedding, or molecular testing of feces from colony animals, but exhaust air sentinels are not effective at detecting these 12 . in contrast, the use of contact sentinels, exhaust air sentinels, or molecular testing of cage surfaces is effective in detecting agents that are shed in respiratory secretions, such as sendai virus, but sentinels exposed to soiled bedding are ineffective at detecting these 12 . the methods used to sample the cage or rack surfaces for air-borne infectious agents (cage wipe material or protocols, filter material, or placement location) may influence the effectiveness of detecting the agent of interest. for example, our lab detected sendai virus rna on the cages of experimentally infected mice for 2 weeks using calcium alginate swabs wet with saline, whereas another group was able to detect sendai virus rna on the cages of experimentally infected mice for only 3 days using alcohol wipes 12, 14 . a second major influence that affects the ease with which an infectious agent can be detected in mice housed in an ivc system is the infectious-agent load to which the sentinel mice are exposed. infectiousagent load depends on the duration of shedding, on the concentration of agent shed, and on the stability of the agent after it is shed ( table 1) . detection of agents such as murine rotavirus (epizootic diarrhea of infant mice, or edim), which causes an acute infection in adult immuno erally shed at high concentrations, are much easier to detect using all monitoring methods, but the reliability of detection is still a problem [10] [11] [12] . the stability of the infectious agent in the environment also influences the difficulty of its detection ( table 1) . for agents that persist as infectious particles in the environment for only short periods of time, such as most enveloped viruses, detection is more difficult than for agents that are stable as infectious particles for long periods in the environment, such as parvoviruses or pinworm eggs. labile agents can be missed if the timing of exposure by contact, exhaust air, or soiled bedding does not coincide with the period of shedding. even though many enveloped viruses, such as coronaviruses, lose their infectivity upon drying and rupture of the envelope, the nucleic acids inside the viral particles remain detectable 15 . therefore, molecular assays can detect the recent presence of agents even after they lose their infectivity and transmissibility to mice within the colony. for monitoring methods that detect infectious agents in the exhaust air, the size of an agent should theoretically affect its detectability. exhaust air and particulates should carry smaller agents such as viruses more effectively than larger agents such as parasites ( table 1) . for example, mpv and helicobacter hepaticus both cause chronic intestinal infections and are shed in feces, yet mpv, a 20-nm virus, was detectable on filters placed in the rack exhaust air, whereas h. hepaticus, a 5-to 10-µm bacterium, was not 12 . there are several system-specific conditions that may influence the efficacy of microbiological monitoring of mice housed in an ivc system. the air change rate that is achievable in an ivc rack is much higher (30-120 ach) than that achieved in static isolator cages (>5 ach) 2 . a recent study showed that the higher air change rate in an ivc system compared with static isolator cages resulted in lower relative humidity 3 . furthermore, the mean bedding weight gain per mouse was 50% greater in static isolator cages than in the ivc system. the less humid cage environment present in the ivc system could result in the dehydration and inactivation of many infectious agents. this effect, together with the dilution of organisms in the exhaust air by the higher ventilation rate, could lead to decreased transmission of agents to colony and sentinel mice. the decreased intercage spread of an infectious agent means that infections are sporadic and confined to just a few cages at a time, and it is therefore essential to use an adequate sample size when monitoring mice housed in ivc systems. several studies have shown that the high airflow achieved in ivc systems results in lower ammonia levels than those seen in static isolator cages at 5-7 days after cage change 3,16-18 . the lower ammonia levels measured in ivcs are probably the direct result of lower relative humidity, because high humidity has been linked to proliferation of urease-positive bacteria that can convert urea to ammonia 19 . furthermore, the type of bedding used in ivc systems can affect the rate of ammonia accumulation, because some bedding types may contain endogenous ureases 20 . the frequency of cage change generally depends on the time required for intracage ammonia concentrations to rise to a level considered irritating to the mucous membranes of husbandry personnel (generally >25 p.p.m.) 21 . because ammonia levels rise more quickly in static isolator cages, it is generally necessary to change static isolator cages at least once a week, whereas mice housed in ivc systems may need changing only once every 2 weeks. less frequent cage changing decreases demands on personnel time, decreases the quantity of bedding used, increases cage longevity, and may decrease pup mortality 22 , but it can also decrease the efficacy of soiled-bedding monitoring. if husbandry personnel add soiled bedding to sentinel cages only during routine biweekly cage changes, then this reduces the number of times that soiled bedding will be added to the sentinel cage in the ivc system as compared with static isolators, and agents pre-competent mice, with shedding of virus for ∼5 days, can be very difficult. direct tests for the agent in the animal or the environment must occur during the short window of shedding and therefore are quite unreliable at detecting a low-level infection within a colony. detection of edim using serology and sentinels exposed to soiled bedding has the limitation that the timing of the soiled-bedding transfer must coincide with the short period of shedding to be effective. in ivc systems, a biweekly cage-changing schedule, with biweekly addition of soiled bedding to sentinel cages, has the disadvantage that the bedding transferred may or may not contain infectious virus. for agents that cause acute infections, methods that monitor the mice continuously over an extended period, such as seroconversion of colony mice, contact sentinels, exhaust air sentinels, or long-term placement of gauze filters in the exhaust air stream, are most effective. frequent monitoring, using sentinels exposed to soiled bedding or shortterm placement of gauze filters in the exhaust air stream, can also be effective. periodic monitoring methods, such as sentinels exposed to soiled bedding, and continuous monitoring methods, such as exhaust air sentinels, are both likely to be effective at detecting agents that cause chronic or persistent infections. the concentration of an excreted infectious agent influences the difficulty of its detection. agents, such as mpv, that cause a chronic infection with low-level fecal shedding, can be difficult to detect. detection of these agents necessitates testing an adequate sample size. a sample size that is too small or a monitoring protocol that samples a nonrepresentative group of cages can result in sporadic detection of the agent within a colony. for example, in a recent study, mice that received a single dose of soiled bedding from a group of cages in which 20% of the cages housed mpvinfected mice seroconverted, whereas those that received several doses of soiled bedding from a group of cages in which only 5% of the cages housed mpv-infected mice did not seroconvert 12 . agents, such as mouse hepatitis virus (mhv), that are gen-volume 33, no. 10 lab animal november 2004 sent in the soiled bedding have a longer time in which to become noninfectious before being exposed to susceptible sentinel animals. it will be necessary to optimize soiled-bedding sentinel monitoring protocols used in ivc systems so they can accurately detect agents if they are present. this means following a strict protocol to avoid bias by regularly sampling all cages on the rack, and one should also consider supplemental sampling of soiled bedding between cage changes. both of these have implications for labor and may have the negative effect of increasing the probability of cageto-cage transmission during soiled-bedding collection. the rate at which a particulate accumulates on a filter may also affect the sensitivity of filter-based tests. agents such as mpv are present at low concentrations in exhaust air. recently, we reported that mpv dna was not detectable on filters placed on the rack exhaust filter for 24 h, but mpv dna was detectable on filters placed on the rack exhaust filter for 2 weeks 12 . the positioning of filters within the ivc rack can also influence the chance that an agent will be detected. for example, mpv, mhv, and sendai virus were all detectable on filters placed on the lids of cages housing infected animals for 24 h at 6 days after inoculation, but only mhv and sendai virus were detectable on filters placed on the rack exhaust filter for 24 h at 6 days after inoculation 12 . this indicates that the closer to the source of the infection, where the infectious-agent concentration in the exhaust air is highest, the greater the likelihood of detecting it. it will be necessary to determine for each ivc system the optimal positioning of test filters and the time required to accumulate adequate particulates, which serve as fomites to transport infectious agents through the air, and should consider the ventilation pattern of the system. theoretically, any location within the exhaust system of the ivc rack that a small (1 cm 2 ) filter can be temporarily placed can serve as a test site. the type of bedding used in ivc cages could affect the rate of particulate generation and accumulation on filters and therefore could affect air-testing efficacy. aspen chip bedding has been found to be substantially less dusty than wood fiber or straw pelleted bedding 23 . theoretically, the greater the amount of dust generated from bedding, on which agents can be carried through the air, the greater the chance of detecting the agent on a filter. the accuracy of monitoring methods involving exhaust air sampling is dependent on the uniformity of the airflow achieved in the ivc rack and thus on the ivc rack design. when infections are present in only a small number of cages on an ivc rack, as is often the case, the reliability of exhaust air monitoring, whether using gauze filters placed on the rack prefilter or using exhaust air sentinels, is likely to be highly dependent on the uniformity of exhaust airflow within the rack. nonuniform airflow resulting in large variations in exhaust airflow from individual cages may be a cause of inaccurate or unreliable sampling of cages housing infected mice seen in some studies (b. tiemann, personal communication). furthermore, some ivc systems have a single manifold that is used for supply air only, and exhaust air simply escapes from the cage into the room. in such ivc systems, it may be impossible to appropriately sample exhaust air either by using gauze filters or with exhaust air sentinels. one can operate ivc racks using either a positive or negative air pressure differential. under a positive air pressure differential (bioexclusion mode), the supply fan for the rack pushes more air into the rack than is pulled out by the exhaust fan, resulting in a small amount of air leaking out of the cages into the animal room. under a negative air pressure differential (biocontainment mode), the supply fan pushes less air into the rack than is pulled out by the exhaust fan, resulting in a small amount of air being sucked into the cages from the animal room. theoretically, different air pressure differentials might affect the efficacy of air monitoring methods, but in our experience the efficacy of microbiological monitoring was equivalent under positive and negative air pressure differentials 12 . it is important to remember that in an ivc system, the primary means of infectious-disease spread within a rack occurs during husbandry procedures or experimental manipulations. during an outbreak, monitoring exhausted air from individual cages using cage-top gauze filters, or monitoring exhausted air from the entire ivc system using filters placed on the rack exhaust manifold, can be highly efficient in determining the extent of an infection within a rack or within a facility, and in confirming elimination of an agent after such an outbreak. both of these filter-based methods do not require handling of potentially infected mice and can produce results within a few days. this can be very valuable when handling animals for sentinel bleeding or for collection of soiled bedding could lead to spread of the infection. rodent microbiological monitoring continues to be a highly dynamic, nonstandardized, and continually evolving process. monitoring strategies and approaches to diagnostic sample collection are confounded regularly by the convergence of innovative husbandry refinements, new developments in a wide array of caging systems, evolving pathogens, and novel rodent genotypes. in this environment of constant change, and often in the face of relatively meager financial resources for assessment of these mitigating influences, the validation of monitoring approaches has proved to be a challenge. consequently, we recommend a multifaceted approach to monitoring for infectious agents in ivc systems. each monitoring program should consider both infectious agent-related and equipment-related variables. the routes of transmission for the infectious agents to be monitored, the duration and infectiousload shed, and the stability of the agent in the environment should all inform the decision as to which approach to monitoring is appropriate. likewise, the frequency of testing should specifically target the battery of agents to be tested and the type of caging used. it is also essential to understand and consider airflow rates and uni-formity of airflow in each type of ivc system. until techniques and technology, still to be developed, simplify the monitoring process, a fully integrated program of microbiological monitoring should make use of a sensible combination of soiledbedding sentinels, contact sentinels, and, where possible, exhaust air monitoring. even a broad sentinel-based monitoring program, however, is unlikely to be fully reliable and completely sound. consequently, the most comprehensive monitoring program should also include health evaluations of colony rodents that present as clinical cases. received 6/11/04; accepted 8/11/04. the international joint meeting twelfth iclas general assembly & conference, seventh felasa symposium assessment of static isolator cages with automatic watering when used with conventional husbandry techniques as a factor in the transmission of mouse hepatitis virus efficacy of three microbiological monitoring methods in a ventilated cage rack rodent quality assurance testing: use of sentinel animal systems detection of sendai virus and pneumonia virus of mice by use of fluorogenic nuclease reverse transcriptase polymerase chain reaction analysis reverse-transcriptase polymerase chain reaction-based diagnosis and molecular characterization of a new coronavirus strain isolator rodent caging systems (state of the art): a critical view the effects of intracage ventilation on microenvironmental conditions in filter-top cages micoenvironment in ventilated animal cages with differing ventilation rates, mice populations and frequency of bedding changes ammonia build-up in animal boxes and its effect on fat tracheal epithelium characterization and qualification of microenvironmental contaminants in isolator cages with a variety of contact beddings american conference of governmental industrial hygienists. threshold limit values for chemical substances and physical agents and biological exposure indices the impact of reduced frequency of cage changes on the health of mice housed in ventilated cages the bedding of laboratory animals as a source of airborne contaminants the influence of filter top caging on the transmission of pinworm infections in mice an evaluation of intra-cage ventilation in three animal caging systems comparison of environment and mice in static and mechanically ventilated cages with different air velocities and ventilation designs failed air supply to individually ventilated caging system causes acute hypoxia and mortality in rats carbon dioxide concentrations in unventilated ivc cages evaluation of isolator caging systems for protection of mice against challenge with mouse hepatitis virus effectiveness of pressurized individually ventilated (piv) cages in reducing transmission of pneumonia virus microbiological validation of the m.i.c.e. caging system performance evaluation of a positive/negative ventilated murine rack system following direct and indirect aerosol exposure to bacillus subtilis spf status of mice can be maintained in spfmice in ventilated cage systems key: cord-315617-mhm9wh9q authors: gottschalk, rené; preiser, wolfgang title: bioterrorism: is it a real threat? date: 2004-09-02 journal: med microbiol immunol doi: 10.1007/s00430-004-0228-z sha: doc_id: 315617 cord_uid: mhm9wh9q the geneva protocol of 1925 commits the signatory nations to refraining from the use of biological weapons. however, the terrorist assaults of september 2001 and, subsequently, the anthrax-containing letters are cause for great concerns: new threats to the security of nations are expected, as terrorist organizations seem to increasingly explore novel ways of spreading terror. in this context, naturally emerging diseases such as sars, monkeypox or west nile fever assume new importance because it is difficult to distinguish between natural epidemics and possible bioweapon assaults. great efforts on the part of governments and public health authorities are necessary to counteract these threats. the geneva protocol of 1925 relating to the protection of civilian persons in time of war and additional protocols commit the signatory nations to refraining from the use of biological weapons since these not only have disastrous effects on the armed opponents involved in the conflict but also on the civilian population [26] . nevertheless, efforts to develop such weapons continued throughout the cold war and even after its end; not least because compared to nuclear weapons, biological ones are relatively cheap to develop and produce, earning them the attribute ''a poor man's atomic bomb''. however, it is the developments over the past years that are causing the greatest concern: new threats to the security of nations are emerging in the form of terrorist organizations that seem to increasingly explore novel ways of spreading terror [1] . smallpox was declared eradicated in 1980, following a global eradication campaign led by the world health organization (who). the only officially remaining smallpox virus stocks are maintained at the centers for disease control and prevention (cdc) in atlanta and at vector, the russian viral research institute at koltsovo in siberia. these stocks were supposed to be destroyed in 1999, making the smallpox virus officially extinct. but the us president at the time, bill clinton, persuaded who members to postpone destroying them until 2002, so more research could be done on new vaccines and drugs and on smallpox genetics. the reason for the delay was a growing fear of smallpox as a bioweapon in a world no longer vaccinated against the disease, for routine smallpox vaccinations had been stopped after eradication had been achieved. therefore, who members agreed to a smallpox research plan [35] . on october 4, 2001 , cdc and state and local public health authorities reported a case of inhalational anthrax in florida. additional cases of anthrax were subsequently reported from florida and new york city [5, 8] . this was the first known ''successful'' attack after the ineffective aerosolization of a bacillus anthracis suspension in july 1993 by the aum shinrikyo sect in tokyo (also responsible for the sarin nerve gas attack on the tokyo subway system in 1995) [32] . epidemiological findings indicated that these cases of inhalational anthrax most likely occurred through aerosols generated when opening or processing letters containing b. anthracis powder. there is some evidence that these attacks may have been carried out by a us scientist, although their exact background and circumstances remain officially unresolved until now. they resulted in 22 people developing anthrax, 11 of whom suffered the pulmonary form and of whom 5 died [17] . following the anthrax attacks in the us, the us department of defense decided that smallpox stocks should not be destroyed before two anti-smallpox drugs and a new, safer vaccine were licensed, along with new diagnostic methods. not surprisingly, russia consequently also refused to destroy its stocks. following this, the government of the federal republic of germany-like those of several other states-decided to acquire and to stockpile sufficient smallpox vaccine for an emergency vaccination program for the whole population of germany (around 82 million people) in case of a smallpox attack [4] . preparations were made for such a program, such as training of medical staff to conduct the vaccinations, etc. compared to other vaccines currently in routine use, smallpox vaccination using vaccinia virus entails a considerable rate of side effects. based on previous experiences, 1 in 1,000 vaccinees will develop a serious illness requiring symptomatic medical treatment, and there will be about 30 cases of permanent damage and 1-2 deaths per million vaccinees [10, 15] . in addition, it is likely that during a mass vaccination program, some individuals, who have unrecognized contraindications, will receive the vaccination, increasing the rate of complications further. transmission of the vaccinia virus to contacts with or without contraindications is another risk. in the case of biological warfare, the aim of which would be to kill or to incapacitate the largest possible number of enemy soldiers, the aggressor will consider measures to protect his own army and civilian population. in contrast, the aim of bioterrorism is to cause maximum disruption and to seed terror. this may be achieved by actual acts or by simply causing panic. while this does not necessarily imply actually harming more than a few people, many modern terrorist groups on the other hand do not seem to pay much attention to the safety, well being or even survival of their own followers. terrorists will know that using highly infectious agents such as the smallpox virus for biological attacks might well mean their spread also to their own followers because they do not have smallpox vaccine or other preventative measures available. how likely is a bioweapon attack and, more tightly focused, how real is the chance of such an attack by a terrorist group? it has to be taken into account that sophisticated microbiological and biochemical techniques are required to cultivate highly pathogenic biological agents and to make them suitable for use as bioweapons. due to the high infectiousness of many potential bioweapon agents, all handling and manipulation would have to be done under biosafety level 3 (bsl 3) or bsl 4 conditions to protect the handlers [36] . the cdc have developed a classification system for potential biological agents [9, 29] ; table 1 lists their definitions and gives some prominent examples for each of the three categories. particularly categories b and c may be of interest to bioterrorists, due to the fact that some of these agents are not as infectious as those in category a and that dealing with them is, therefore, much easier. for example, multidrug-resistant mycobacterium tuberculosis is relatively easy to cultivate at a relatively low biohazard level, and with its incubation period between weeks and years it would be very difficult for public health systems to realize that a large number of patients were the result of a bioweapon attack. however, the insidious course might compromise its terrorising effect. on the other hand, marburg or ebola viruses are, despite their fearsome reputation, rather unsuitable, not only because those involved in their propagation are likely to succumb to them before achieving their goals, but also because of their low ability to survive outside the human body. efforts are underway to develop refined methods for assessing the suitability of biological agents as bioweapons [6] . however, even such ''impractical'' agents might still be utilized, for it might be much more efficient to paralyze public health organs and healthcare systems through threats and alarms rather than doing much direct damage. hoaxes were common in many countries table 1 classification system for potential biological agents [9] category a diseases/agents (e.g., variola virus, bacillus anthracis) high-priority agents include organisms that pose a risk to national security because they: -can be easily disseminated or transmitted from person to person -result in high mortality rates and have the potential for major public health impact -might cause public panic and social disruption -require special action for public health preparedness category b diseases/agents (e.g., brucella species, ricin toxin) second highest priority agents include those that: -are moderately easy to disseminate -result in moderate morbidity rates and low mortality rates -require specific enhancements of diagnostic capacity and enhanced disease surveillance category c diseases/agents (e.g. drug resistant m. tuberculosis, nipah virus) third highest priority agents include emerging pathogens that could be engineered for mass dissemination in the future because of: -availability -ease of production and dissemination -potential for high morbidity and mortality rates and major health impact in the aftermath of the 2001 anthrax attacks, with numerous letters allegedly containing b. anthracis spores causing considerable disruption and costs. cleverly planned arrangements pretending biological attacks can indeed wreak havoc and can cause great expense, particularly because of a lack of systems for the rapid and accurate detection of real bioterrorism incidents and their reliable distinction from hoaxes [3] . natural threats: lessons to be learned west nile virus (wnv) emerged in the new world for the first time in late summer 1999 when an outbreak of human encephalitis occurred in new york, concurrent with extensive mortality in free-living crows as well as deaths of several exotic birds at a zoological park in the same area [7, 24] . the strain of wnv found in new york in 1999 was indistinguishable from one isolated 1 year earlier in israel. how this virus covered such a vast distance is unknown; possibilities include importation of infected birds, infected mosquitoes, or viremic human beings [18, 20] . although there is no evidence that the virus was introduced deliberately, it nonetheless would represent an extremely effective biological weapon. despite intensive control efforts, wnv has now firmly established itself in the americas, spreading across the continent and reaching the west coast, and so far has caused almost ten thousand of cases of clinical illness and hundreds of deaths in humans in the united states alone [11] . in addition, surveillance and control measures such as the implementation of blood-donor testing for wnv by polymerase chain reaction have caused enormous expenditure. severe acute respiratory syndrome it can be difficult to distinguish between natural epidemics and possible bioweapon assaults. in the first half year of 2003, a novel infectious disease termed severe acute respiratory syndrome (sars) impacted significantly on the medical and scientific world. with approximately 800 deaths in total, the sars outbreak did not reach the number of annual influenza victims by far, but it nevertheless became the nightmare of public health systems all over the world. in addition, sars had grave social and economic consequences for several countries in east and southeast asia as well as in the western world. in china, unemployment especially among the migrant workforce nearly doubled to over eight million; air traffic to hong kong fell by 80% in may 2003; tourism to southeast asia virtually came to a standstill; and in canada, the loss of tourism and airport revenues amounted to $950 million, $570 million in toronto alone [22] . through an unprecedented level of international cooperation led by who, the agent responsible for this first epidemic of the new century was soon identified as a previously unknown coronavirus and the outbreak was brought under control within a few months [2] . although the source of the new virus is still not known for sure, it is likely to be linked to the so-called ''wet markets'' of southern china and not to have been caused by bioterrorist activity. instead, sars was another example of how infections may be triggered by agents originating in animals when they adapt to new hosts in whom they may cause dangerous diseases [21] . another virus so far limited to the old world recently entered the americas: in summer 2003, 72 humans were infected with monkeypox in the united states [27] . these cases were quickly linked to contact with pet animals, mostly prairie dogs, obtained from pet shops. while being held prior to sale to the public, these animals appear to have been infected through contact with gambian giant rats and other animals originating in ghana that were carrying the monkeypox virus [16] . thus, the obviously badly conducted and poorly regulated international trade in wild animals was responsible for the introduction of a potentially very harmful pathogen from west africa into the united states-at a time when mass vaccinations against smallpox were undertaken in military personnel and were (albeit with little success due to wide-spread refusal) envisaged for large numbers of civilians! again, there is no evidence that anything but human ignorance and greed were at play, but this event again shows the potential for a bioweapon attack [12] . to date, most discussions regarding the creation of a national biodefense strategy have focused largely on addressing existing threats posed by naturally occurring pathogens and toxins. with the advent of recombinant dna technology, however, researchers have techniques at their disposal for altering an organism's genetic makeup and thus biological properties. this might allow enhancing the usability of ''traditional'' biological warfare agents [31] . therefore, genetically modified bioweapon agents have been classified as a separate category (advanced biological warfare agents, abw) [25] . in addition to increasing a pathogen's virulence [23] , its ability to survive under different environmental conditions such as high temperature, ultraviolet radiation and desiccation could potentially be improved (table 2) ; by enhancing dissemination, this might make some hitherto rather unsuitable candidate agents such as filoviruses more likely to be utilized. not only will advances in biotechnology facilitate novel agents engineered to attack specific human biological systems at the molecular level, but they will permit modification of existing agricultural pathogens and the development of new anti-agricultural and even anti-material agents. likewise, technology targeted towards development of transgenic plants and insects that produce a desired protein could also be diverted toward nefarious ends. the more sophisticated the biowarfare agent to be developed, the more it requires in terms of highly skilled scientific staff and other personnel. but will such individuals be available? a study concerning the willingness of physicians to participate in the death penalty [14] is interesting in this context. it showed that one in five american physicians would be prepared to give the deadly injection to prisoners sentenced to death, 36% would establish the death of the offender, and 41% agreed to participate in the procedure in a subordinate way. it should therefore not come as a surprise if there were enough scientists to develop deadly and poisonous weapons, not only in the former ussr. following the recent developments outlined above, the center of competence for highly contagious diseases in hesse, germany, developed a catalogue listing fac-tors to facilitate the detection of a biological attack. these include: unusual, unexpected clusters of cases (large numbers of patients with similar symptoms, a large number of unclear illnesses, unexplained increase in incidence of an endemic disease), an unusual distribution (appearance of the same agent from different geographical and temporal sources, clusters occurring in geographically distinct areas, etc.), unusual modes of spread (absence of typical vectors or reservoirs, unusual spread of an agent through water, air, food, or a vector), atypical clinical courses (unusually high morbidity and mortality for a given illness, failure of normally adequate therapy, etc.), unknown or atypical infectious agents (genetically modified, atypical, or currently non-endemic strain, etc.), indirect evidence for increases in disease incidence (e.g., increase in requests for certain laboratory tests or in prescriptions for certain antibiotics, etc.), and non-medical criteria (threats, intelligence information, etc.) [34] . there are indeed possibilities to defend society against attacks with suspected biological agents [37] . besides assuring an heightened awareness among health care workers to increase the likelihood of early detection, letters can be humidified, for instance, to decrease the risk of aerosolization of the content, or they can be irradiated as done in some us post offices. in case of a real or doubtful contamination, there are pharmaceuticals, vaccines and therapeutic regimens available to treat exposed individuals [33] . it should not be forgotten either that efficient public health systems are able to fight epidemics successfully even in the absence of specific preventative measures such as vaccines, just by applying ''good basic public health measures'' [13] , as was recently shown with sars. attacks with biological weapons are indeed a real threat and the responsible government agencies need to be aware of this. however, the actual likelihood of such attacks currently seems to be low compared to that of naturally emerging agents. an effective implementation of a national biosecurity strategy will require a variety of independent efforts across federal and public health organizations as well as bioscience research. there has to be a discussion whether the current cost-intensive smallpox vaccination programs are efficient. while the above-mentioned unwanted side effects were acceptable when there was still the danger of a smallpox epidemic, this is no longer true after its eradication. neither does the immunity induced against the closely related cowpox or monkeypox viruses justify widespread vaccination with vaccinia virus, so that it should only be considered in case of an acute smallpox threat. it is certainly beneficial to allocate grants for investigations into the ways in which microbiological agents change hosts and into virulence factors. on the other hand we have to ensure that scientists comply with regulations and accept the ethical constraints of their activities, as well as apply the necessary safety precautions in their work [19] . increased funding of bioweapon research programs will lead to more individuals with training and skills in this area and might thus have paradox effects [28] . therefore, new initiatives to deal with broader threats that may result from misuse of technology need to be pursued, in parallel with existing and planned programs. ultimately, whenever novel infectious agents appear suddenly, it is probably inevitable that there will be speculations and rumors: that they were designed in biowarfare laboratories or emerged from biomedical research (as was argued for hiv), that they came from space (as suggested for sars), or that they represent a bioterrorist attack. however, reality is more banal but nevertheless painful: nature itself is the best bioreactor for apocalyptic biological agents and, through evolution, has at the same time developed the best defense strategies against them [30] . biological warfare and bioterrorism severe acute respiratory syndrome (sars)-paradigm of an emerging viral infection evaluating detection and diagnostic decision support systems for bioterrorism response index case of fatal inhalational anthrax due to bioterrorism in the united states the weapon potential of a microbe outbreak of west nile-like viral encephalitis update: investigation of anthrax associated with intentional exposure and interim public health guidelines bioterrorism agents/diseases; last modification smallpox vaccination and adverse reactions: guidance for clinicians west nile virus activity in the united states (reported as of human monkeypox: an emerging zoonosis epidemiology: modeling the sars epidemic physicians' willingness to participate in the process of lethal injection for capital punishment developments in vaccination and control between 1900 and 1966 zaki sr, the veterinary monkeypox virus working group (2004) monkeypox transmission and pathogenesis in prairie dogs investigation of bioterrorism-related anthrax, united states, 2001: epidemiologic findings genetic analysis of west nile new york 1999 encephalitis virus mixing bugs and bombs origin of the west nile virus responsible for an outbreak of encephalitis in the northeastern united states viral zoonoses-a threat under control? sars down but still a threat. national intelligence council intelligence community assessment creation of killer poxvirus could have been predicted the outbreak of west nile virus infection in the new york city area in 1999 opened for signature: 17 the detection of monkeypox in humans in the western hemisphere buying biosafety-is the price right? public health assessment of potential biological terrorism agents the best defence against bioweapons has already been invented by evolution preparedness and response to bioterrorism bacillus anthracis incident emea/cpmp guidance document on use of medicinal products for treatment and prophylaxis of biological agents that might be used as weapons of bioterrorism. cpmp/ 4048/01 management of an attack with biological agents. reflections on the necessary infrastructure for states and towns smallpox eradication: destruction of variola virus stocks public health response to biological and chemical weapons: who guidance, 2nd edn. world health organization key: cord-209269-7ojtwe78 authors: parisi, daniel r.; patterson, germ'an a.; pagni, lucio; osimani, agustina; bacigalupo, tomas; godfrid, juan; bergagna, federico m.; brizi, manuel rodriguez; momesso, pedro; gomez, fermin l.; lozano, jimena; baader, juan martin; ribas, ignacio; meyer, facundo p. astiz; luca, miguel di; barrera, nicol'as e.; 'alvarez, ezequiel m. keimel; oyhanarte, maite m. herran; pingarilho, pedro r.; zuberbuhler, ximena; gorostiaga, felipe title: social distance characterization by means of pedestrian simulation date: 2020-09-08 journal: nan doi: nan sha: doc_id: 209269 cord_uid: 7ojtwe78 in the present work, we study how the number of simulated clients (occupancy) affects the social distance in an ideal supermarket. for this, we account for realistic typical dimensions and process time (picking products and checkout). from the simulated trajectories, we measure events of social distance less than 2 m and its duration. between other observables, we define a social distance coefficient that informs how many events (of a given duration) suffer each agent in the system. these kinds of outputs could be useful for building procedures and protocols in the context of a pandemic allowing to keep low health risks while setting a maximum operating capacity. recent works [2, 3] propose to combine microscopic agent simulation with general disease-transmission mechanisms. however, because of the complexity and uncertainties in the actual knowledge for quantifying these transmission processes, we will not consider in this work any particular contagion mechanism, instead, we will focus on studying the distance between people in an everyday pedestrian facility as an isolated aspect to be integrated in the future by experts considering all mechanism for any particular disease propagation. an antecedent of this kind of analysis was recently reported considering field data from a train station [4] . one of the key questions we try to answer is how to describe the realized social distance for a given occupation of an establishment. for solving this problem, it is necessary to consider the pedestrian displacements and trajectories that they do while performing certain tasks, and thus, a natural tool is to use pedestrian simulation. the time evolution of positions from simulated agents can provide not only the relative distance between agents, but also the duration of events in which the recommended social distance is not kept. many industries and shops were closed in different phases of the covid-19 pandemic. however, grocery shops had to be kept open, in particular supermarkets. to avoid crowding and to keep some physical distance between clients, the authorities lowered the allowed capacity. different countries regulation adopt social distance requirements between 1 and 2 m [4] . in the present study we will consider a distance of 2 m as the social distance threshold, because this distance is an upper bound for the saliva droplets from a human cough which cannot travel more than 2 m in space at approximately zero wind speed [5] . we propose to investigate how the value of the allowed capacity affects the social distance in an ideal supermarket of 448 m 2 . the results should not be directly extrapolated to other supermarkets or facilities, nevertheless, the methodology and indicators can be useful for applying them to other source of data, being from simulations or field data of other pedestrian systems. in order to simulate the complex environment and the agent's behavior, the proposed model involves three levels of complexity: operational, tactical, and strategic [6] . the more general level of the model is in charge of providing a master plan for the agent when it is created. in practical terms for the present system, it gives a list of n p products for agents to acquire (a shopping list). each one of the n p items is randomly chosen between a total of m p products available. also, they are identified with a unique target location (x pn ) in the supermarket. once the agent is initialized with its shopping list, the strategic level shows the first item in the list to the agent. the agent will move toward it using the lower levels of the model. when the agent reaches the position of the product, it will spend a picking time (t p ) choosing and taking the product, after which the strategic level will provide to the agent the next item on the list. after the list of products is completed, the agent must proceed to the less busy supermarket checkout line. it will adopt a queuing behavior until it gets the checkout desk and spends a time t co processing its purchase. the function of the tactical level is to provide successive visible targets to the agent that will guide it to the location of the desired product (x pn ) or checkout line. as inputs, the tactical module takes the current agent position (x i (t)) and the position of the current product (x pn ) in the list. the output is a temporal target (x v (t)) visible from the current position of the agent. the definition of visibility is that if we take a virtual segment between (x i (t)) and (x v (t)), this segment does not intersect any of the walls or obstacles (shelves). the information delivered by the tactical module is obtained by implementing a squared network connecting all the accessible areas of the simulated layout (see fig.2 ). given any two points in the walkable domain, the corresponding nearest points on the network are found and then the shorter path between these points is computed by using the a* algorithm [7] . once the path on the network is defined, the temporary target x v (t) is chosen as the farthest visible point on that path seen from the current agent position. clearly, x v (t) will change with time, as the position of the agent changes. when the product target is visible from the agent, this is set as the visible target and the network path is no longer considered until a new product should be found. as the lower level describing the short-range movements of agents we propose an extended version of the "contractile particle model" [8] . this extension will provide an efficient navigation allowing to avoid potential collisions with other agents and obstacles. the basic model is a first-order model in which particles have continuous variable radii, positions and velocities that change following certain rules. specifically, the position is updated as where v i is the desired velocity and x i (t) the position at time t. the radius of the i th particle (r i ) is dynamically adjusted between r i min and r i max . when this radius has large values, it represents a personal distance necessary for taking steps, but when it has low values, it represents a hard incompressible nucleus which limits maximum densities. when particles are not in contact, the desired velocity v i points toward the visible target with a magnitude proportional to its radius, where the direction e i t and the magnitude v are defined by the following equations where v d is the desired speed. while the radius has not reached the maximum r max , it increases in each time step following being τ a characteristic time in which the agent reaches its desired speed as if it was free, and ∆t is the simulation time step of eq. 1. when two particles enter into contact (d ij = |x i − x j | − (r i + r j ) < 0) both radius instantaneously collapse to the minimum values while an escape velocity appears moving the particles in the directions that will separate the overlap: the escape velocity has the magnitude of the free speed and, thus, it can be written as v i e = v d e ij . this velocity is only applied during one simulation step because, as the radii are simultaneously collapsing, the agents are no longer overlapping. up to here, we described the basic cpm as it appears in ref. [8] . this model satisfactorily described experimental data of specific flow rates and fundamental diagrams of pedestrian dynamics. however, particles do not anticipate any collisions, and this capacity is a fundamental requirement for simulating the ideal supermarket (displaying low and medium densities, and agents circulating in different directions). for this, we propose to extend the calculation of the agent velocity (eq. 2) by considering a simple avoidance mechanism. the general idea is that the self-propelled particle will produce any action only through changing its desired velocity v i (t) as stated in ref. [9] . in this case, the new mechanism will only change the direction of desired velocity v depending on the neighbor particles and obstacles. first, the collision vector (n c i ) is calculated where j indicates the nearest visible neighbor, k the nearest point of the nearest visible wall or obstacle, andη is a noise term for breaking possible symmetric situations. visibility field of agent "i" then the avoidance direction is obtained from and finally the velocity of the particle to be used in eq in fig.1 the vectors associated with the original and modified model can be seen in detail. because the agents must perform different tasks, more complex than just going from one point to another, it was necessary to define five behavioral states. this was achieved by setting different model parameters and movement patterns. more concisely, the five behavioral states of agents were: -going: this is the normal walking behavior when going from one arbitrary point to another with the standard velocity and model parameters. only in this state, the agent uses the modified cpm velocity (eq. 9) for avoiding potential collisions. the rest of the behavioral states only use the basic cpm (eq. 1 to 6). -approximating: when the agent is closer than 2 m of the current product, it reduces its desired speed and, because of how parameters are set, it will not be forced to reach it if there is another agent buying a product in the same target x pn . -picking: once the agent reaches the product (closer than 0.1 m) a timer starts and it will remain in the same position (eq. 1 does not update its position) until the picking time (t p ) is up. -leaving: after spending the time t p , the agent leaves the current location going to the next product on the list. while abandoning this position, it could find other waiting agents (in approximating behavioral state) and, thus, its parameters must be such that it can make its way through. once the agent is farther than 2 m from the past product, it changes to the "going" behavioral state. -queuing: finally, when the agent completes the shopping list, it proceeds to the checkout desks by choosing the one with the smaller line. it waits at a distance of 1.5 m from the previous queuing agent, and when it reaches the checkout position, it remains there for a t co time. by considering these behavioral states in the agent model, the conflicts and deadlock situations are minimized. in this way, this model improvement allows us to simulate higher densities than with the basic operational models. finally, as a closure for this general section (2) about the model, we point out that for the sake of comparison, we also implement other operational models: the "social force model" [10, 11] , and the "predictive collision avoidance model" (pca) [12] . the results for all models will be compared in selected observables, while the more deep study is performed using the modified cpm described above. the plant of 448 m 2 of the ideal supermarket to be simulated is shown in fig. 2 . the dimension of shelves (1 m x 10 m) and corridor width (2 m) are taken from typical real systems. also, the different process time and other data considered were provided by a supermarket chain from argentina. we define n as the allowed capacity or the occupation of the supermarket as the total number of agents buying simultaneously inside the system. this is the more important input to be varied in our study and it ranges from n = 2 to n = 92. the agent generator produces an inflow of 1 agent every 5 seconds until it reaches the n value for the simulation. from that moment on, the agent generator monitors the occupation, and it generates a new agent every time an existing agent completes its tasks and is removed from the simulation. by doing this, the value of n is maintained constant over the whole simulation. every agent created by the generator is equipped with a shopping list of exactly n p = 15 items, which are chosen randomly from a total of 228 items available (shown in fig.2 b) . the corresponding product locations (x pn ) are separated by one meter between adjacent locations. agents visiting the products on its lists, spend a picking time with a uniform distribution (t p ∈ [60s, 90s]). after completing the lists, agents choose the shortest queue to one of the eight checkout points shown in fig. (2 b) . the ideal supermarket has a maximum of four queues, and each of them leads to two checkout desks. the distance between the agents that form the queue is 1.5 m. the first positions on these queues are at a distance of 3 m (at y = 4 m, in fig.2 ) from the checkout points. once an agent reaches the cashier (at y = 1 m, in fig.2) it spends a checkout time t co uniformly distribute between t co ∈ [120s, 240s]. for each value of n , we simulated two hours (7200 s) and recorded the state of the system every ∆t2 = 0.5 s, thus producing 14400 data files with positions, velocity, and behavioral state of agents. the rest of the model parameters depends on the behavioral state of the agent. for the case of "going", the parameters of the avoidance mechanism described in eq. (7) we first show general results of the simulated supermarket by displaying typical trajectories (fig. 3) and density fields (fig. 4) . figure 3 plots ten random chosen trajectories in the second hour of simulations for the selected n values. qualitatively it can be seen more intricate trajectory patterns as the occupancy increases. however, in all cases, it can be observed that the available area is uniformly visited by simulated agents while visiting their product list. complementary information is shown in fig.4 , where the density is averaged over all the simulation time (2 hours). as expected, greater occupancy presents greater mean density values. besides, these density fields present higher values at the spots that agents stay longer, revealing picking points of products and predefined places at queuing. also, as a macroscopic observable of the system, we study the number of agents that could be processed (i. e. fulfill the shopping list and exit the supermarket between the two hours simulated) and the mean residence time for those agents. the results are presented in fig. 5 . as can be observed, both quantities increase monotonically with the allowed occupancy for the studied range of values and the supermarket set up, considering eighth checkout desks. also, it can be seen that different operational models display similar observables. the sfm [10, 11] and pca [12, 10] models are force-based models which present more limitations in terms of the maximum density they can simulate before forces get balanced (generating dead-locks) for the complex scenarios and behavior considered. this is the reason why the maximum occupancy studied with these models is lower than that simulated with the cpm described in sec.2. in this subsection, we characterize distance between agents during the simulations with the modified contractile particle model (cpm) for different allowed capacities. an interesting outcome is the distance to the first neighbor for each agent shown in fig. 6 . the pdf of first-neighbor distances (d f n ) shows that for lower occupations of the simulated supermarket, the probability of having the first neighbors further away than d f n ∼ 5 m is greater. on the other hand, higher occupancy values display higher probabilities of having a distance shorter than 5 m. in particular, all distributions show a maximum probable value around d f n ∼ 4 m. moreover, the height of these probability peaks decreases for lower occupancy values. now we take the social distance threshold of 2 m, as discussed in sec.1, and calculate related probabilities of agents below this critical social distance. the first observable we calculate is the probability of having the first neighbor closer than 2 m (p f n<2m ). in other words, this is the probability of having at least one neighboring agent within 2 m. it is determined by averaging over recorded data every ∆t2 = 0.5 s, from minute 20 to 120 as shown in eq.(10) where n ti = 12000 = 14400 − 2400 is the data at recorded times after 20 minutes, n is the occupancy and n f n2m is the number of particles having a first neighbor at less than 2 m. note that if two particles i and j are the only particles at less than 2 m, n f n2m = 2. also, if j is the first neighbor of i, not necessarily, i will be the first neighbor of j. the above probability (p f n<2m ) only considers if the first neighbor is closer than 2 m, but it does not take into account if there are many occurrences of neighbors at less than 2 m. for this reason, we now take into account the number of pairs having distance less than 2 m, and the corresponding probability (p pair<2m ) where n p2m is the number of pairs of particles at distance closer than 2 m and [n (n − 1)]/2 is the total number of possible pairs, having n particles in the system. in this case, if only particles i and j are closer than 2 m, n p2m = 1 because one pair is counted. in fig. 7 both probabilities ( p f n<2m and p pair<2m ) are displayed for the modified contractile particle model (cpm) and also by comparison with the social force model (sfm) and predictive collision avoidance model (pca). it can be seen that the probability of having the nearest neighbor at less than 2 m increases monotonically with the allowed capacity. however, the pair probability quickly increases for low occupancy, and after n ∼ 15, it remains nearly constant indicating that the number of pairs n p2m scaled with n as the number of total possible pairs (∼ n 2 ). furthermore, fig. 7 indicates that different operational models display similar macroscopic behavior regarding social distances, at least for values bellow or above 2 m. in the above analysis, the occurrence of certain distances between simulated agents was studied, but the duration of these events was not considered explicitly. this will be done in the following subsection. here we study the time that lasts the events when pairs of agents are found at less than 2 m (see sec.1). the main sources of these events are when agents are picking products at neighbor product locations or when queuing for checking out from the supermarket. if two particles i and j encounter at a given time, then they separate for more than 2 m, and the same particles re-encounter at a future time, it is considered as two separate events. considering that: (a) the parameter we choose to maintain constant during each simulation is the allowed capacity n , and this capacity is reached at the beginning of each simulation in a very short time comparing to other processes, and (b) all agents have the same number of items in their list, and thus the required time to complete it is similar in average. the first group of n agents will go to the checkout points at nearly the same time, producing the greater demand for checkout, which generates the longest queues. after that, the new agents will enter slowly as other agents exit the simulation, and thus the described behavior will relax. this dynamic lead to more queuing agents during the first hour of simulation and less during the second hour. because of it, we analyze separately the duration of encounters occurred during the first and the second simulation hour in fig. 8 . the different time scales and the number of cases in its both panels confirm that the first hour is dominated by particular long lines waiting for checkout, while in the second hour (fig. 8 b) the duration of social distance events less than 2 m are dominated by the shorter process, i.e.: the picking time at products. events in the queuing line are much long-lasting because of two reasons. first, the particular process at the checkout desk takes between 2 to 4 minutes (instead of 1 to 1.5 minutes in the picking process). second, a line with n l agents will produce that the last agents will spend about n l times t co , which for a few agents, namely n l = 5, it could represent 20 minutes of waiting time at a distance of 1.5 m from another agent. this problem of high exposure time between pairs of agents at queuing lines could be avoided if a slower ramp of inflow of agents was adopted in the start of the process, let's say something above the maximum average outflow of the system (eight agents in three minutes, i.e. ∼ 1 agent every 23 s). we did not adopt this in the simulations because it would take too long for simulations to reach the desired occupation n . but it is clear that the problem noted above at the beginning could be solved in a real operation by allowing a low flow rate of agents at the opening (of about twice the capacity of the checkout). also, this problem would be a transient behavior only at opening, being the most part of the day operation as described in our second simulation hour. furthermore, fig.8 shows that, as expected, fewer social distance events occur when the time thresholds increase. and in all cases, the number of events seems to grow quadratically with n . now, looking for a criterion that determines which would be a reasonable allowed capacity in the ideal supermarket, we define the social distance coefficient (sd c (t e )), for the threshold distance of 2 m, as where t e is the minimum duration of a particular social distance event (r ij ≤ 2 m), n e (t e ) is the number of these events which last at least t e , and n p is the total number of agents processed by the system in the same period of time in which n e is computed. factor 2 is needed for taking into account the number of agents in the numerator since 2 agents (i and j) participate in each event. this coefficient allows us to compare how many agents have participated in social distance events of duration greater than t e concerning the number of people who have passed by the system. thus, a value of sd c (t e > 2min.) = 1 indicates that, on average, each agent has participated in one event of social distance less than 2 m that lasts at least 2 minutes. if sd c (t e > 2min.) < 1, it would indicate that only a fraction of the agents have participated in such events. having established in subsec. 4.3 that the event duration of the first simulation hour is dominated by checkout lines, we now concentrate on looking at the second hour of simulation when the impact of these lines is very low and stationary. this situation is representative of the daily operation of the supermarket, and it is shown in fig.9 displaying the social distance coefficient as a function of the occupation for different event duration limits t e . first, we note in fig. 9 a that the curve corresponding to t e > 1 min. grows steeply with n. this could be related to the fact that the picking time range between 1 minute and 1.5 minutes, and that the products are spaced by 1 m, so if two agents must go simultaneously to the same product or the first or second nearest product, they could generate a 2 m social event lasting at most 1.5 minutes, in particular many events lasting more than 1 minute would occur. also, the social distance coefficient seems to follow a linear relation with n for this particular time limit t e . a change of regime can be observed for t e > 1.5 min. in which curves are more similar between themselves for the different t e presented, and they follow a quadratic relation with n . because the maximum picking time is 1.5 minutes, this is the maximum possible overlapping time for two agents in neighbor (or the same) products. greater time events will arise when more than two agents are waiting for the same or near products, as is in the cases of products near any of the short lines for checking out. finally, we could use fig. 9 b, as a guide for deciding on the allowed occupancy. if based on epidemiological knowledge or criteria, it was decided that it would be acceptable to allow that all agents participate once in a 2-m social event lasting at most 1 minute, then the allowed occupation would be very small, n ∼ 10. alternatively, if events up to 1.5 minutes were accepted, then the allowed occupation would be n = 40. in the case of t e = 2 min., the capacity could rise to n = 70. also, it could be established that even for n = 90 the events of the social distance of 2 m, lasting more than 3 minutes, would only affect the 40% of the processed agents. of course, the same fig. 9 b could be used for finding another allowed occupancy if the criterion would consider that, for example, only 25% of the agents can participate in the analyzed events. in this work, we investigate and characterize the social distance realization in an everyday pedestrian system by simulating the dynamics of an ideal supermarket. many sources of complexity were successfully taken into account with a multi-level model, which allows us to simulate not only translation but also more complex behaviors like waiting times when picking for particular products and queuing for checkout points. the main process that keeps pedestrians near one to another is the queuing lines for checkout. therefore, advice for the operation would be to keep these lines as small as possible either by increasing the number of checkout points or by decreasing the occupancy. different operational models, display similar macroscopic observables regarding social distances at values greater than 2 m indicating that the results are robust with respect to microscopic collision avoidance resolution and also suggesting that the simulated paths of the particles are more influenced by the geometry, shopping list, and time-consuming process, than by the particular avoidance mechanism. however, first-order models as the cpm presented in [8] and sec.2 seem more suitable for simulation of high populated scenarios with complex behavioral agents. taking a social distance threshold of 2 m [5] , probabilities and duration of such events were studied. the social distance coefficient was defined as an indicator of the fraction of the population passing by the system that is involved in one or many of these events lasting at least a certain time threshold t e . the same analysis can be done for a different set of parameters and, of course, for other pedestrian facilities, being other specific supermarkets or any different systems (transport, entertainment, etc.). of course, existing facilities can be monitored with measurement methods [4] providing high-quality trajectory data. this kind of data could also be interpreted in terms of the analysis performed in the present work. by setting a distance and a time threshold, and what fraction of the population would be tolerable to be exposed to these conditions, the maximum occupancy can be established in any particular system by performing simulations and using the observables defined in this work. therefore, this analysis could be used for determining which is the ideal occupation of a pedestrian facility, keeping low contagion risk, and maximizing the number of users per unit of time. world health organization. coronavirus disease (covid-19) advice for the public a microscopic approach to study the onset of a highly infectious disease spreading agent-based simulation of pedestrian dynamics for exposure time estimation in epidemic risk assessment monitoring physical distancing for crowd management: real-time trajectory and group analysis on coughing and airborne droplet transmission to humans pedestrian route-choice and activity scheduling theory and models path planning for virtual human motion using improved a* star algorithm continuous-space automaton model for pedestrian dynamics pedestrian collision avoidance with a local dynamic goal simulating dynamical features of escape panic specification of the social force pedestrian model by evolutionary adjustment to video tracking data a predictive collision avoidance model for pedestrian simulation the authors acknowledge the information and data provided by the argentinean supermarket chain "la anónima". this work was founded by project pid2015-003 (anpcyt) argentina. key: cord-300731-i2ow33bk authors: cowan, fred m.; broomfield, clarence a.; stojiljkovic, milos p.; smith, william j. title: a review of multi-threat medical countermeasures against chemical warfare and terrorism date: 2004-11-17 journal: mil med doi: 10.7205/milmed.169.11.850 sha: doc_id: 300731 cord_uid: i2ow33bk the multi-threat medical countermeasure (mtmc) hypothesis has been proposed with the aim of developing a single countermeasure drug with efficacy against different pathologies caused by multiple classes of chemical warfare agents. although sites and mechanisms of action and the pathologies caused by different chemical insults vary, common biochemical signaling pathways, molecular mediators, and cellular processes provide targets for mtmc drugs. this article will review the mtmc hypothesis for blister and nerve agents and will expand the scope of the concept to include other chemicals as well as briefly consider biological agents. the article will also consider how common biochemical signaling pathways, molecular mediators, and cellular processes that contribute to clinical pathologies and syndromes may relate to the toxicity of threat agents. discovery of mtmc provides the opportunity for the integration of diverse researchers and clinicians, and for the exploitation of cutting-edge technologies and drug discovery. the broad-spectrum nature of mtmc can augment military and civil defense to combat chemical warfare and chemical terrorism. t he list of military chemical threat agents has lengthened over the last century. world war i saw the development and deployment of edemagenic and choking agents such as chlorine, phosgene, and cyanide, and blister gases such as sulfur mustard (sm). [1] [2] [3] world war ii cultivated germany's development of nerve gases such as tabun, sarin, and soman, [3] [4] [5] [6] and this class of agent was used in the 1980 to 1988 iraq-iran conflict 7, 8 and in the 1994 to 1995 terrorist attacks in japan. [9] [10] [11] the cold war yielded more lethality refinements in nerve agents to include development of vx. 12 consistent with past experience, new threat agents with novel mechanisms of toxicity may evolve. countermeasures for defending deployed military personnel against weaponized chemical warfare agents do not seamlessly transition to military force protection and civil defense against chemical terrorism. terrorist threat agents include all classes of chemical warfare agents, toxins, and a broader menu of toxic industrial chemicals. the large number of threats and potential for use of multiple toxic substances in combination can complicate agent identification and medical response. a terrorist assault might more closely resemble the chemical accident at bhopal, india, than a chemical warfare attack. symptoms may be closer to smoke inhalation and acute respiratory distress syndrome (ards) than to the cholinergic crisis caused by nerve agent poisoning. research into medical countermeasures against weaponized battlefield chemical warfare agents has focused on distinct classes of nerve, blister, choking, or edemagenic agents and pathologies specific to these agents, e.g., nerve agent-induced seizure, phosgene-induced ards, and sm blistering. the present challenge of defending against the myriad of threat chemicals and toxins necessitates a more collective and comprehensive strategy that more generally addresses the symptoms and pathology of chemical toxicity rather than a specific chemical mechanism. the multi-threat medical countermeasure (mtmc) hypothesis for chemical toxicity is analogous to the broad-spectrum approach used for protecting against infectious agents authored by dr. ken alibek, former deputy chief of biopreparat, the civilian arm of the former soviet union's biological weapons program. 13, 14 it may be possible to exploit the fact that the diverse chemistry, sites, and mechanisms of action of toxic chemicals often involve common underlying biochemical signal pathways. these common pathways are key in initiating the cellular processes that contribute to clinical pathologies caused by chemical exposures. clinically defined syndromes or symptoms that represent pathologies of respiratory, neuronal, cardiac, cutaneous, or other systems to include anaphylactic shock, bronchospasm, ards, seizure, excitotoxin-like neuronal degeneration, and blistering are observed after exposure to chemical warfare agents, hazardous chemicals, toxins, and even infectious agents. the mtmc hypothesis suggests that common biochemical pathways contribute to the toxicity that causes the pathologies associated with different classes of toxic chemicals. mtmc drugs that target these key pathways might create a physiological "quiescent" state that protects against various chemical insults. 14 the fact that inflammation causes or contributes to numerous pathologies and that many toxic chemicals provoke an inflammatory response is well established (for review, see refs. [14] [15] [16] . although evidence for a significant role for inflammation in chemical toxicity continues to accumulate, inflammatory response is still often regarded as merely collateral to chemical insult and secondary to toxicity. [14] [15] [16] the evolution over the last decade of the concept that inflammatory response is a key element of chemical toxicity that allows for the development of anti-inflammatory drugs as multi-agent countermeasures is unique to the mtmc hypothesis. [14] [15] [16] the mtmc hypothesis encompasses the interaction of multiple toxic agents and diverse countermeasure drugs on mediators and signaling pathways that cause or sustain inflammation. whether inflamma-tion is a collateral biomarker or causative contributor to chemical toxicity is controversial. however, in either case inflammation can provide a common denominator to facilitate deciphering the relationships between agents, drugs, signaling pathways, and cellular processes pertinent to predicting candidate mtmc drugs. 14 a major tenet of the pharmacology of anti-inflammatory drugs is that drug action can result from the specific inhibition of molecular mediators of inflammation or from modulation of the underlying biochemistry that initiates or sustains an inflammatory response. different inflammatory mediators, pathways, and cell populations can be induced or recruited by different conditions or insults. this multifaceted nature of inflammation may require the use of numerous pharmacologically distinct antiinflammatory drugs to contend with the different manifestations of inflammatory pathology. however, enough uniformity of biochemical pathways of inflammation exists to allow for development of broad-spectrum anti-inflammatory drugs. the biochemical pathways associated with chemical toxicity can involve proteases, inflammatory cytokines such as tumor necrosis factor (tnf), interleukin (il)-1, il-8, and other molecules such as platelet activating factor (paf), n-methyl-d-aspartate (nmda) glutamate receptors, acetylcholine (ach), substance p, and poly(adp-ribose) polymerase (parp) (for review, see ref. 14). these mediators and receptors can influence inflammatory responses associated with cellular processes such as degranulation, apoptosis, and necrosis that contribute to pathologies caused by chemical agents. therefore, many classes of compounds used as countermeasures to chemical warfare agents such as parp inhibitors, proteases inhibitors, adenosine agonists, and nmda receptor antagonist, although not chiefly thought of as anti-inflammatory drugs, have anti-inflammatory pharmacology (table i ) (for review, see ref. 14) . the diverse biochemical pathways that influence inflammatory responses may explain why many pathologies associated with intoxication by chemical agents have an inflammatory component. along this line of reasoning, it is not surprising that the majority of countermeasure drugs that have shown efficacy against edemagenic, vesicant, and nerve agents have anti-inflammatory pharmacology (for review, see ref. 14) . the presence of inflammatory responses and anti-inflammatory actions of countermeasures implicates inflammation as a cause or a resulting biomarker of the toxicity of these agents. the extent to which common inflammatory mechanisms are coupled to chemical agent toxicity will determine the feasibility of developing anti-inflammatory mtmc. inflammatory response induced by the prototypic edemagenic agent phosgene is the primary cause of the frequently lethal ards. 17, 18 ards is also associated with pulmonary toxicity of the acetyl-cholinesterase-inhibiting organophosphorus insecticide thionazine, 19 sm, 14 and other toxic chemicals, as well as toxins, infectious-agent pneumonia, shock, sepsis, burns, and other trauma (table ii) . sm dermal-epidermal separation is similar to that caused by proteolysis and certain bullous diseases, and this has fostered the hypotheses that sm vesication involves proteolytic and/or inflammatory responses. [15] [16] [17] [18] [19] [20] experimental evidence has accumulated over the last decade demonstrating sm-increased proteases and the expression of inflammatory enzymes, gene products, mediators, and receptors in tissue or cell cultures. 14, 15, [19] [20] [21] [22] [23] inflammatory enzymes and cytokines have also been reported in the skin of sm-exposed animals. 24, 25 cholinergic crisis is the paramount toxicological event in nerve agent intoxication, causing acute toxicity and precipitating seizure and neuronal degeneration. 26 however, along with cholinergic crisis anaphylactoid reactions, pathological proteolytic activity and inflammatory cytokines have also been reported in nerve agent-intoxicated animals. 14,27-31 the initial observations of anaphylactoid reactions associated with soman poisoning reported by doebler et al. 28 and newball et al. 29 nearly a quarter century ago have recently again been considered by gilat et al. 30 in sarin-intoxicated animals. anaphylactoid reactions, by definition, occur upon initial exposure to a chemical independent of antibody production. anaphylactoid reactions and nerve agent intoxication can generate acute symptoms such as convulsions, bronchoconstriction, respiratory failure, circulatory collapse, and death within a few minutes. 14,16 thus, anaphylactoid reactions, 14, 16 like the more extensively investigated cholinergic crisis and excitotoxin-like neuronal degeneration, are a clinically well-defined and potentially lethal syndrome associated with nerve agent intoxication. mcleod 32 noted neuronal and neurophil degeneration and necrosis associated with soman-induced brain lesions. the pattern of injury was similar to that caused by epilepsy and ischacute lung/organ dysfunction emic brain injury. some animals also had cardiac lesions characterized by acute necrosis with subsequent mild inflammation and fibrosis. inflammatory cytokines such as tnf, il-1, and il-8 are associated with recruitment of inflammatory cells and cellular processes such as degranulation, apoptosis, and necrosis. inflammatory cytokines are causative factors in phosgeneassociated ards, they contribute to sm injury, and they are implicated in nerve agent seizure and neuronal degeneration. 14, 17, 18, 24, 25, 31, 32 skin from mice sm exposure sites and the brains of soman-intoxicated rats demonstrate increased il-1␤ mrna. 22,23,31 il-1 is an inflammatory cytokine that can precipitate other cytokines such as tnf, il-6, and il-8, and such a cytokine cascade is implicated in sm toxicity. 22 svensson et al. 31 have demonstrated that soman induces the inflammatory cytokine il-1␤ in rat brain, and this activity is highly correlated with convulsions. williams et al. 33 confirmed il-1␤, and further observed an acute and transient upregulation of other inflammatory gene response, i.e., tnf, il-6, e-selectin, and intercellular adhesion molecule-1 caused by exposure to soman. the authors suggest that these molecules may be involved in soman-induced brain injury. eriksson et al. 34 demonstrated that nmda antagonists could suppress excitotoxin-induced il-1␤ mrna in the rat brain. furthermore, vezzani et al. 35 have protected mice against nmda receptor-dependent seizures with soluble il-1 receptors that specifically antagonize il-1 activity. the authors suggest that the interaction between il-1 and il-1 receptors represents a crucial mechanism of seizure and a target for development of anticonvulsant drugs. the role of inflammatory cytokines in edemagenic, nerve, and blister agent toxicity supports cytokine antagonists as candidate mtmc. anti-inflammatory drugs such as ibuprofen are the drugs of choice in reducing phosgene toxicity. 17, 18 the majority of drugs that have shown efficacy against sm in animal models have anti-inflammatory pharmacology (for review, see ref. 14). our institute has screened more than 400 compounds in the mouse ear vesicant model (mevm) for cutaneous injury; 19 compounds reduced sm histopathology greater than 50%. 36 -38 the 19 compounds include seven listed as antiinflammatory drugs, consisting of five capsaicin analogs, a single cyclooxygenase inhibitor, indomethacin, and a calmodulin antagonist, fluphenazine. 36 -38 the three protease inhibitors and three parp inhibitors included in the list of antivesicant drugs also have the potential to inhibit inflammatory responses. 14, 39 the remaining six anti-vesicant drugs, sodium 3-sulfonatopropyl glutathionyl disulfide, 3% hydrogen peroxide gel, dimercaprol, and three other mercaptopyridines analogs are listed as sm scavengers. 36, 38 however, mercaptopyridine-like compounds have demonstrated anti-inflammatory pharmacology to include inhibition of the cellular release of the inflammatory cytokine il-1. 40 therefore, 17 of the 19 compounds with efficacy against sm toxicity have anti-inflammatory pharmacology, the exceptions being two of the listed sm scavengers. furthermore, antivesicant drugs with anti-inflammatory pharmacology generally demonstrate inhibition of hd-increased il-8 in human epidermal keratinocyte (hek) cultures (ref. 41; fm cowan, ca broomfield, and wj smith, unpublished observations). collectively, the mevm and in vitro sm-increased il-8 hek assays effectively screen, not just for vesicant countermeasures, but also for anti-inflammatory drugs that inhibit il-8. these models further identified drugs such as capsaicin analogs as better antivesicants and anticytokine drugs than major classes of currently available corticosteroids and nonsteroidal anti-inflammatory drugs. the anti-inflammatory action of nerve agent countermeasures to include atropine, carbamates, and benzodiazepines has been extensively reviewed. 14, 16, 42 for example, a role for synergy between mediators of anaphylactic response and cholinergic status "hypersensitivity" is accepted for asthma-related lethal bronchoconstriction, and has been implicated for nerve agentinduced lethal bronchoconstriction. 14, 16, 43, 44 kotev 44 has demonstrated that soman-induced bronchial spasm was greatly intensified not only by ach, but also by histamine. hypersensitivity to inhalation of the cholinergic compounds such as methylcholine or the autacoid histamine is a diagnostic test for asthma, and anticholinergics are sometimes used as supplementary treatment. 45 inflammatory, neurological, and tissue pathology pathways involve proteolytic processes. 14 synthesized mediators such as paf and serine proteases such as tryptase and tissue plasminogen activator (t-pa) in addition to autacoids such as histamine are significant factors in inflammatory and anaphylactic responses. 14, 16, 46 carbamates can inhibit serine proteases that mediate anaphylaxis and prevent anaphylactic response. 47 the benzodiazepine diazepam is food and drug administration approved for the treatment of seizures associated with nerve agent poisoning. 48 benzodiazepines can, in addition to acting as ␥-aminobutyric acid receptor agonists, also inhibit paf receptors. 49 paf is a dual proinflammatory and neuromessenger phospholipid molecule that participates in pathological phenomena that include protease synthesis, lethal anaphylaxis, vesication and nmda glutamate receptor excitotoxicity, seizure, and neuronal degeneration (for review, see ref. 14) . mice are protected from lethal anaphylaxis by serine protease inhibitors or paf antagonists. 46, 49 the ␥-aminobutyric acid receptor agonist and paf receptor antagonist actions of benzodiazepines might synergistically protect against nerve agent cholinergic and inflammatory toxicities. furthermore, proteolytic and inflammatory pathways are also strongly implicated in nmda receptor-mediated seizure and neuronal degeneration. knockout mice deficient in the protease t-pa were resistant to seizure and neuronal pathology caused by excitotoxins (for review, see ref. 50) . furthermore, the synthetic protease inhibitor tpa-stop (american diagnostica, greenwich, ct) suppressed excitotoxin-induced seizure and neuronal degeneration (for review, see ref. 50 ). experimental evidence generated in in vitro and in vivo models of chemical agent toxicity supports the concept of anti-inflammatory mtmc drugs. sm exposure increases the inflammatory il-8 in hek and human small airway cell (hsac) cultures. 40,51 sm-increased il-8 in hek cultures is a biomarker of dermal inflammatory pathology that is used as an in vitro drug screening and treatment model to complement in vivo studies in the mevm. 40 likewise, sm-increased il-8 in hsac has recently been developed as an in vitro model for treatment of inhalation toxicity. 51 hsac cultures exposed to 25 to 200 m sm or 0.2 to 6.4 ppm/min phosgene demonstrated significantly increased il-8. 52 a maximum increase of approximately 1,000 pg/ml il-8 in hsac cultures exposed to phosgene or sm was observed. 52 the pattern of il-8 response, increase to maximum levels followed by inhibition at higher cytotoxic doses, was similar for both agents. ibuprofen (62, 125, 250, 500, and 1 ,000 m) significantly diminished phosgene-increased il-8 in sac cultures exposed to 2 ppm/min phosgene. 52 furthermore, the doses of ibuprofen that decreased phosgene-increased il-8 approximately 50% in hsac (125 and 250 m) also inhibited sm-increased il-8 in hek cultures to about the same extent. 51, 53 serine protease inhibitors and parp inhibitors can have antiinflammatory pharmacology, and members of these two distinct classes of compounds have shown efficacy for nerve and blister agents in vivo. 14, 36, 46, 53 serine protease inhibitors can prolong the survival of animals intoxicated with the nerve agent soman, 41 and can also protect against vesication caused by the blister agent sm. 36 parp inhibitors can reduce soman-induced neuronal degeneration 53 and sm-induced epidermal necrosis. 36 candidate anti-inflammatory mtmc drugs to include protease inhibitors, paf antagonists, parp inhibitors, nmda receptor antagonist, and adenosine agonists have been suggested (table i) . 14 adenosine receptor agonists illustrate the potential and the complexity of mtmc drugs. van helden et al. 54 used the adenosine a1 receptor agonist n6-cyclopentyl adenosine as a countermeasure to soman poisoning. without any supportive treatment with atropine, oxime, or diazepam, n6-cyclopentyl adenosine protected rats from convulsive activity and respiratory distress and improved 24-hour survival. 54 reduced ach levels in rat brains were reported in this study, and the protection was attributed to cholinergic mechanisms wherein the adenosine a1 receptor agonists binding to the a1 adenosine receptor caused inhibition of ach release. 54 however, the cholinesterase-inhibiting nerve agents sarin, tabun, and soman can interact directly with brain a1 adenosine receptors and may competitively alter the action of these agents at adenosine receptor sites. 14, 55 adenosine receptors can moderate the activation of other receptors that influence neurotransmitter release and/or synaptic transmission, e.g., ach and nmda receptors. 54,56 a2, a3, and a1 adenosine receptor agonists can further influence mast cell degranulation, and adenosine-directed treatment modalities have been suggested for asthma. 57 neutrophil infiltration of dermal inflammatory sites, similar to that also observed in sm pathogenesis, was inhibited by administration of adenosine a1 receptor agonists. 14, 58 this anti-inflammatory action of adenosine agonists was reversed by an nmda agonist and was mimicked by a glutamate nmda receptor antagonist. 58 hence, in this model, central nmda receptor activity can control peripheral neutrophil accumulation, and adenosine a1 receptor agonists can influence this nmda receptor excitation-mediated inflam-mation. 58 virag and szabo 59 have further demonstrated that adenosine can inhibit the activation of parp, and they propose that this may affect cell death and inflammation. thus, adenosine agonists can influence multiple inflammatory biochemical pathways associated with nerve and blister agent toxicity and are candidate mtmc (table iii) . the activation of inflammatory responses that contribute to pathology is not restricted to chemical agents. t-2 toxin, as a major trichothecene mycotoxin, has some radiomimetic properties, and the results of its action, like the blistering induced by sm, can be alleviated by treatment with glucocorticoid hormones. 60, 61 moreover, paf seems to have an important role in the pathophysiology of t-2 toxicosis because its selective antagonist bn 520121 can prolong survival of rats exposed to lethal doses of this toxin. 62 trichothecene mycotoxin also induce mesenteric 63 and subcutaneous mast cell degranulation 64 and increased secretion of interleukins il-1␤ and il-6 in vitro. this suggests that superinduction of cytokines might be one of the mechanisms of t-2 toxin-induced tissue damage. 65 the inflammagenic properties of mycotoxin may further contribute to core pathologies such as ards. likewise, inflammatory cytokines and the complication of ards are associated with the pathology of infectious agents such as anthrax, smallpox, ebola, and, of course, the corona virus infection that causes severe acute respiratory syndrome. [66] [67] [68] the mtmc hypothesis suggests that inflammation is not just a biomarker, but is also a major cause of toxicity for many chemical warfare agents and toxic chemicals. as a counterpoint to the anti-inflammatory mtmc drugs, substances that increase inflammation can synergistically augment chemical toxicity. roth and coworkers (for review, see ref. 69 ) demonstrated that a small dose of the inflammagenic endotoxin lipopolysaccharide (lps), which is without effect by itself, markedly enhances the hepatotoxic effects of aflatoxin b 1 . a similar effect of lps endotoxin occurs with other toxic chemicals and other target organs (for review, see ref. 69 ). stone et al. 70 have reported that lps or the inflammatory cytokines tnf or il-1 enhanced the cytotoxic effects of the sm stimulant 2-chloroethyl ethyl sulfide. whether the results of coexposure to an inflammagen such as lps or an intrinsic property of a toxic agent, the inflammatory response can augment sensitivity to chemical toxicities. thus, inflammation associated with chemical toxicity is a target for anti-inflammatory mtmc. the mtmc hypothesis is supported by experimental evidence that distinct classes of drugs such as protease inhibitors and anti-inflammatory parp inhibitors have demonstrated efficacy against the nerve agent soman and the blister agent sm. 33, 36, 41, 53 moreover, t-2 mycotoxin and sm injury can be alleviated by treatment with glucocorticoid hormones. 60, 61 by focusing on key biochemical signal pathways and cellular processes that ultimately contribute to pathologies associated with chemical toxicity, the mtmc hypothesis provides the possibility of developing single countermeasure drugs with prophylactic or therapeutic efficacy against distinct pathologies caused by multiple classes of toxic chemical agents. 14 furthermore, the mtmc concept may not be limited to chemical agents. many biological toxins and infectious agents cause inflammatory responses that contribute to pathology. finally, because mtmc addresses clinically recognized pathologies such as ards, collateral improvements in general health care and emergency medicine are possible. once one looks past the diverse chemistry, sites of action, and symptoms, common biochemical pathways may exist for many chemical threat agents. even when threats extend to mixtures of agents and toxic industrial chemicals, or new threat agents evolve, such biochemical signaling pathways may remain more constant and amenable to medical intervention. defining and interdicting these pathways provide strategies for developing civil defense and military preparedness against chemical threats. of perhaps equal significance, the mtmc hypothesis provides an incentive for dialogue and cross-fertilization between diverse chemical defense, academic, clinical, and drug discovery research interests to combat chemical warfare and chemical terrorism. using mtmc to blunt pathological actions of chemical agents is an attractive possibility. a higher form of killing: the secret story of gas and germ warfare chemical and biological weapons: the silent killers organophosphorus compounds as chemical warfare agents organophosphate poisoning: an overview iraq's chemical warfare: case proved analysis of two chemical weapons samples from the iran-iraq war nerve gases as means of chemical terrorism in japan anatomy of aum shinrikyo's organization and terrorist attacks with chemical and biological weapons the first mass chemical terrorism using sarin in matsumoto at war with chemistry putative role of proteolysis and inflammatory response in the toxicity of nerve and blister chemical warfare agents: implications for multi-threat medical countermeasures putative roles of inflammation in the dermatopathology of sulfur mustard a hypothesis for synergistic toxicity of organophosphorus poisoning-induced cholinergic crisis and anaphylactoid reactions efficacy of ibuprofen and pentoxifylline in the treatment of phosgene-induced acute lung injury the temporal profile of cytokines in the bronchoalveolar lavage fluid in mice exposed to the industrial gas phosgene severe poisoning with the organophosphorus insecticide thionazine-2 cases with the development of ards (adult respiratory distress syndrome) molecular basis for mustard-induced vesication protease released in organ culture by acute inflammatory lesions produced in vivo in rabbit skin by sulfur mustard: hydrolysis of synthetic peptide substrates for trypsin-like and chymotrypsin-like enzymes response of normal human keratinocytes to sulfur mustard (hd): cytokine release using a non-enzymatic detachment procedure inflammatory gene expression in mouse skin following sulfur mustard exposure mcp-1, il-1a , and gro in rabbit inflammatory skin lesions produced by the chemical irritant sulfur mustard inflammatory cytokine response in sulfur mustard-exposed mouse skin neuropharmacological mechanisms of nerve agent induced seizure and neuropathology biochemical changes associated with muscle fibre necrosis after experimental organophosphate poisoning quantitative cytophotometric analyses of mesenteric mast cell granulation in acute soman intoxicated rats organophosphateinduced histamine release from mast cells comparative efficacy of antidotal oximes: protection and inflammatory markers following exposure of guinea-pigs to sarin vapor soman-induced interleukin-1a mrma and protein in rat brain pathology of nerve agents: perspectives on medical management central neuro-inflammatory gene response following soman exposure in the rat inhibition of kainic acid induced expression of interleukin-1 a and interleukin-1 receptor antagonist mrna in the rat brain by nmda receptor antagonists powerful anticonvulsant action of il-1 receptor antagonist on intracerebral injection and astrocytic overexpression in mice development of medical countermeasures to sulfur mustard vesication systemic administration of candidate antivesicants to protect against topically applied sulfur mustard in the mouse ear vesicant model (mevm) in vivo therapeutic prophylactic protection against cutaneous sulfur mustard injury using the mouse ear vesicant model (mevm) army medical research institute of chemical defense antiinflammatory effects of a novel, potent inhibitor of poly (adp-ribose) polymerase 4-substituted-5-acetyl-2-methyl-6-phenyl-3(2h)pyridazinones as pge2 and il-1 release inhibitors from mouse adherent macrophages suppression of sulfur mustard-increased il-8 in human keratinocyte cell cultures by serine protease inhibitors: implications for toxicity and medical countermeasures protective action of the serine protease inhibitor n-tosyl-l-lysine chloromethyl ketone (tlck) against acute soman poisoning mechanisms of and experimental therapy for acute soman-induced bronchial spasm the cholinergic "pitfall": acetylcholine, a universal cell molecule in biological systems, including humans anticholinergic therapy for airway diseases proteases and protease inhibitors in experimental shock states action of 2-pam and of acetylcholinesterase inhibitors on anaphylactic shock in the rabbit vesicants and nerve agents in chemical warfare. decontamination and treatment strategies for a changed world paf-acether-induced mortality in mice: protection by benzodiazepines neuronal death in the hippocampus is promoted by plasmin-catalyzed degradation of laminin suppression of sulfur mustard-increased il-8 in human keratinocyte cell cultures by the cox inhibitor indomethacin, the poly(adp-ribose) polymerase (parp) inhibitor 3-(4ј-bromophenyl)ureidobenzamide and the calmodulin antagonist fluphenazine sulfur mustard-and phosgene-increased il-8 in human small airway cell cultures: implications for medical countermeasures against inhalation toxicity adp-ribose) polymerase inhibitor, is neuroprotective against soman-induced seizure-related brain damage new generic approach to the treatment of organophosphate poisoning: adenosine receptor mediated inhibition of ach-release binding of some organophosphorus compounds at adenosine receptors in guinea pig brain membranes adenosine a2a receptor interactions with receptors for other neurotransmitters and neuromodulators adenosine, mast cells and asthma spinal cord adenosine receptor stimulation in rats inhibits peripheral neutrophil accumulation. the role of n-methyl-daspartate receptors purines inhibit poly(adp-ribose) polymerase activation and modulate oxidant-induced cell death attenuation of general toxic effect of t-2 toxin in rats treated with various formulations of methylprednisolone potential antiinflammatory treatments against cutaneous sulfur mustard injury using the mouse ear vesicant model protective effect of paf-acether antagonist, bn 52021, in trichothecene toxicosis mesenteric mast cell degranulation in acute t-2 toxin poisoning cutaneous injury by topical t-2 toxin: involvement of microvessels and mast cells the effect of t-2 toxin on il-1a and il-6 secretion in human fetal chondrocytes acute respiratory distress syndrome cutting edge: impairment of dendritic cells and adaptive immunity by ebola and lassa viruses on the role of macrophages in anthrax bacterial lipopolysaccharide exposure alters aflatoxin b(1) hepatotoxicity: benchmark dose analysis for markers of liver injury lipopolysaccharide enhances the cytotoxicity of 2-chloroethyl ethyl sulfide key: cord-288348-b10e023s authors: estes, mary kolb; graham, david yates title: epidemic viral gastroenteritis date: 1979-06-30 journal: the american journal of medicine doi: 10.1016/0002-9343(79)90457-1 sha: doc_id: 288348 cord_uid: b10e023s abstract epidemic viral gastroenteritis is a significant world wide problem. in developed countries, gastroenteritis accounts for significant morbidity and loss of time from work; in the third world it is the leading cause of mortality among infants and children. recent technologic advances have been associated with an explosion of research activity. two virus groups, the norwalk-like agents and the rotaviruses, are currently accepted as causative agents of viral gastroenteritis in man. the problem of viral gastroenteritis is reviewed both from a current and a historic perspective. epidemic viral gastroenteritis is a significant world wide problem. in developed countries, gastroenteritis accounts for significant morbidity and loss of time from work; in the third world it is the leading cause of mortality among infants and children. recent technologic advances have been associated with an explosion of research activity. two virus groups, the norwalk-like agents and the rotaviruses, are currently accepted as causative agents of viral gastroenteritis in man. the problem of viral gastroenteritis is reviewed both from a current and a historic perspective. viral gastroenteritis, more correctly termed acute enteritis or enteropathy, is a common cause of illness in man. in the united states, the illness is usually not of significant severity or duration to cause the patient to seek medical attention. therefore, even widespread outbreaks remain unrecognized unless they are brought to the attention of the health authorities because of the large number of people involved. viral gastroenteritis is a more significant problem in underdeveloped countries; estimates are that it is responsible for more than 500 million episodes of diarrhea and 5 to 18 million deaths annually [il. a large number of viral agents have been implicated as causative factors of gastroenteritis. many studies have consisted simply of screening stool specimens of diarrhea1 patients for viral agents; the frequency of positive cultures may or may not have been compared with results obtained in a control population. such studies have accumulated data to foster epidemiologic hypotheses which require further testing; they have not provided definite evidence of causation. current knowledge of the viral stool-shedding patterns is rudimentary. for example, in a recent study virus excretions in the stools of 27 babies were followed for one year [2] . the study revealed that babies frequently shed viruses and that the viral excretion patterns change rapidly. fifteen per cent of the stools from healthy babies contained viruses, including rotaviruses, adenoviruses, astroviruses, caliciviruses and small unidentified viruses. during hospitalization, the proportion of infants who excreted viruses increased to 44 per cent, with many of the viruses appearing to be hospital-acquired. this study emphasized the current problems in interpreting data from studies of fecal viral excretion, including the need for concurrent strict control populations. with these problems in mind, one can critically evaluate previous studies and carefully plan future studies to differentiate between diarrheal-associated viruses and proved enteritis-inducing agents. proof of causation of infectious disease was codified by robert koch in 1890 [3]. koch's postulates stated that an organism must be regularly isolated from patients with the illness and in a logical relationship to the pathologic changes observed. the isolated organism should be grown in pure culture and shown to be capable of causing the same illness in susceptible animals or human subjects. finally, the organism should be reisolated from the subject with the experimentallyinduced disease. noting that many viruses cannot be cultured, thomas rivers [4] and later robert huebner [5] proposed modifications of koch's postulates that would allow proof of causation of viral illnesses. they suggested that for viral diseases the specific virus must be regularly associated with the disease, that the illness must be transmissible to susceptible hosts from material known to be free from nonviral agents, and that control and immunologic studies be carried out to exclude that the virus was fortuitously present or picked up from the experimental host. supporting immunologic critera are also important, including evidence that specific viral antibody is absent before infection and that it is produced by the infection; the absence or presence of antibody should correlate with disease susceptibility and protection, respectively. of the many viruses identified in stools, only two groups have met the criteria as definite etiologic agents of epidemic gastroenteritis in human subjects: rotaviruses and the small 27 nm agents [norwalk-like agents) ( of investigations which began with an epidemic of gastroenteritis occurring in the newborn in the baltimore-washington area in the fall of 1941. they were able to obtain multiple passages of the infectious agent (the baltimore agent) by administering filtered stool to calves. calves were found to be uniformly susceptible with an incubation period of two to five days. the illness in calves had a mortality rate of 13 per cent, and infection was followed by homologous immunity. horizontal infection was evident, and strict isolation procedures were employed. the baltimore agent is the only isolate from the early studies that was saved, and recent characterizations revealed that it is probably a rotavirus [71. in 1945 reimann, hodges and price [8] reported the results of an investigation of an epidemic occurring in philadelphia between september and december 1943 and recurring in 1944. they also provided the first overview of the problem. they were the first to use volunteer subjects to passage their material. however, the results were inconclusive because an epidemic of viral enteritis was ongoing in the community, and no attempts were made to isolate the subjects. on december 16,1946, an epidemic of gastroenteritis began in the marcy state hospital near utica, new york. subsequently, gordon and his associates [9,10] published a series of papers on the marcy strain that included volunteer studies showing the transmission of a nonbacterial gastroenteritis. at the same time, an outbreak of gastroenteritis occurred in a group of families being followed in cleveland as part of a long-term study of illnesses. this group observed that nonbacterial gastroenteritis was the second most common disease in their families. the family study (fs) gastroenteritis agent was also passed in vol-unteer subjects and compared with the marcy strain [ll] . clear differences were found between the two isolates with respect to symptoms, incubation period, disease duration and immunity. infection with each agent conferred homologous but not heterologous immunity. japanese workers showed that infection with a japanese agent, the niigata strain, conferred protection against infection with the marcy strain [el. work was largely abandoned during the 1950s and 1960s because of the inability to either propagate or to visualize the infectious agents. advances in knowledge and methodology for the detection of fastidious and noncultivatable viral agents in the 1960s led to a renewal of interest in gastroenteritis viruses in the 1970s. the application of immune electron microscopy, the technique used to identify hepatitis a virus particles in stools, to diarrhea1 samples brought about the successful identification of two enteritis viruses in human subjects. the recent development of rapid and very sensitive tests (radioimmunoassay, immune adherence hemagglutination and enzyme-linked immunosorbent assays) which can detect symptomatic and asymptomatic infections should quickly expand our knowledge of the natural history and epidemiology of these diseases. the history of investigations in viral gastroenteritis is a good example of the fact that major scientific advances often require and parallel new technologic opportunities. 27 nm particles (norwalk-like agents). on october 30,1968, an attack of viral gastroenteritis occurred in an elementary school in norwalk, ohio [13] . in this attack, 50 per cent of the teachers and students were affected within a 24-hour period with an illness characterized by nausea, vomiting and abdominal cramps. the symptoms lasted from 12 to 24 hours. no patient required hospitalization, and recovery was complete. because of the suddenness of the attack and the large number of persons involved, public health authorities including the center for disease control were asked to investigate the outbreak. no evidence of food or water spread was found. no pathogenic bacteria were discovered, and the symptomatic characteristics of the illness were different from common bacterial diarrheas. investigators at the national institutes of health began work with this "norwalk agent." the disease was transmitted to volunteer subjects which provided enough infectious material (stool filtrates] for the performance of detailed clinical studies and preliminary laboratory analyses of the physical and biochemical properties of the agent [14, 15] . stool filtrates were characterized as being free from bacteria, fungi, bacteriophages and enterotoxin. although no viral agent could be propagated in a variety of tissue culture systems or in laboratory animals [including primates), the studies in volunteer subjects demonstrated that the infectious agent would pass through a 60 pm filter but that it was retained by a 20 frn filter. it was also heat stable, resistant to ether and acid treatments, and produced ho-mologous immunity following infection [15] . subsequently, the agent was propagated briefly in culture of material from intestinal organs [16] and in 1972 kapikian and co-workers [l7] succeeded in identifying a 27 nm particle by immune electron microscopy of stools from infected volunteer subjects. in 1973, two groups described histologic studies of small bowel mucosa in volunteer subjects infected with the agent [18, 19] . histologic changes included abnormalities in the mucosal absorptive cells, mucosal inflammation, villus shortening and secondary crypt hypertrophy. in addition, there were decreases in specific activities of intestinal brush border enzymes. these changes were associated with malabsorption of the carbohydrates, d-xylose and lactose, and transient steatorrhea. the histologic findings became apparent several hours prior to the onset of symptoms and persisted for several days. histologic abnormalities were also found in patients without symptoms, but severe lesions tended to be associated with the severe illnesses. two other norwalk-like agents have been obtained in outbreaks of gastroenteritis: the h agent in honolulu in march 1971 and the mc agent, in an attack in montgomery county, maryland, in june 1971. studies in volunteer subjects suggested that the norwalk and hawaii agents were antigenically dissimilar, whereas the norwalk agent conferred immunity to challenge with the mc agent [zo] . rechallenge studies in volunteer subjects with the norwalk agent revealed a pattern of susceptibility to re-infection with the same agent [zl] . six of 12 subjects became ill with the first challenge, and, when rechallenged many months ltiter, the same six subjects became ill again. subsequent rechalienge of five of the six "susceptible" subjects several weeks later revealed immunity in four of them. an increase in serum antibody titer was demonstrable in those patients who became ill but apparently offered no protection. work with these agents has been hampered by the lack of a reliable cultivation method in vitro. in recent studies the transmission of infection to chimpanzees has been reported but, unfortunately, no signs of clinical illness (such as vomiting or diarrhea] occurred [22] . the illness in chimpanzees was identified by use of a highly-sensitive solid phase microtiter radioimmunoassay [23] which detected both virus excretion in the stool and increase in serum antibody. in recent immunologic studies it has been demonstrated that serum antibody to the norwalk agent is acquired gradually; by the fifth decade, one half of the adults tested had antibody [23, 24] . similar 27 nm viral agents have been under investigation in the united kingdom and in japan [25, 26] . the 27 nm particles have been called "parvovirus-like agents," dna viruses, based on their small size, density in cesium chloride of 1.38 to 1.41 g/ml, and stability to ether, acid and heat. however, this provisional designation may be a misnomer. correct classification of these agents must await propagation of the agent(s) to sufficient titers to allow biochemical characterization, including type of nucleic acid. the limited information available about 27 nm agents is also consistent with their classification as caliciviruses, rna viruses which have recently been demonstrated to cause enteritis in animals [27] . until a reproducible system is devised for the propagation of the 27 nm agents, future investigations will continue to progress at a slow rate. rotaviruses. in 1973, bishop et al. [28] reported finding viral particles in biopsy specimens of duodenal mucosa from children with gastroenteritis in melbourne, australia. this same year flewett and associates [29] in england described similar viral particles in diarrhea1 feces. it was soon recognized that the particles are morphologically similar to the epizootic diarrhea virus of infant mice and to the nebraska calf diarrhea virus [30] . rotaviruses are a major cause of diarrhea1 illnesses in young mammals of a wide variety of species. these isolates have also been termed infantile gastroenteritis virus, reo-like virus and duovirus; however, the designation of "rotavirus" as a separate genus of the reoviridae family has recently been accepted by the international committee on taxonomy of viruses as their official name. the derivation of that terminology is based on the electron microscopic appearance of a wheel with radiating spokes. rotaviruses have been established as enteritis viruses by isolation and purification from stools of subjects suffering from gastroenteritis, and by induction of disease and seroconversion in both animals and volunteer subjects with purified preparations, epidemiologic studies on the prevalence of rotavirus infections have shown these ubiquitous agents to be a major cause of gastroenteritis in children. in a typical study, davidson et al. [31] found that 52 per cent of the cases of acute gastroenteritis in 378 children hospitalized in australia were caused by rotavirus. an etiologic agent was identified in 76 per cent of these cases, and the remaining causes were shigella 1 per cent, escherichia coli 2 per cent, enterovirus 2 per cent, adenovirus 7 per cent and salmonella 11 per cent. similar findings have been repeated the world over. rotavirus infections usually predominate during the winter season with an incubation period of two to four days. symptomatic infections are most common in children aged six months to six years, and transmission of rotavirus gastroenteritis appears tb be by the fecal-oral route. clinical features of rotavirus gastroenteritis in infants and children include diarrhea, vomiting, fever and abdominal pain [32] . in contrast to the clinical illness seen in hospitalized infants, adult contacts often become infected, as evidenced by-seroconversion, but they suffer only mild symptoms and the virus is rarely detected in the stool [32, 33] . the failure to identify virus in the stool may reflect the insensitive methods used for viral detection. the ubiquitous nature of rotaviruses can also be demonstrated by measuring the prevalence of immunity in the population. by age six, 60 to 90 per cent of children have serum antibody titers [34, 35] . the protective nature of the circulating antibodies remains unclear, since it is known that both human subjects and animals can become infected even when they possess detectable immunity [33, 36] . local immune factors, such as secretory immunoglobulin a or interferon, may therefore be important in protection against rotavirus infection, alternatively, reinfection in the presence of circulating antibody could reflect the presence of multiple serotypes of virus [37] ; at least four agents in human subjects have been characterized to date [38-411. asymptomatic infections are common in infants before the age of six months, the time during which protective antibody acquired passively by newborns should be present and active [42, 43] , and breast-fed babies excrete fewer particles/g feces than bottle-fed babies although both groups of babies become infected [42] . rotavirus antibody has been detected in colostrum for up to nine months postpartum [44] . other investigations have emphasized characterization of rotavirus particles and replication patterns in an attempt to understand the mechanism of infection and pathogenesis. such studies have shown that the rotavirus agents in human subjects are very similar in physical properties to the diarrhea1 agents in animals recognized by veterinary researchers since 1969 [30] . rotaviruses contain segmented double-stranded rna genomes with the pattern of rna segments varying according to the species of origin [45] . the rna pattern is becoming increasingly important as a method of identifying species of origin of rotavirus isolates as laboratory contamination and cross-species infections occur. the rotaviruses are double-shelled particles with an average diameter of 70 nm. the outer-shelled particle contains type-specific antigenic components, whereas the inner shell contains type-common antigenic determinants [46, 47] . the outer shell presumably contains a hemagglutinin [48] and glycoproteins [49] , but the role(s) of the various protein components in viral infectivity or virus neutralization remain(s) to be elucidated. the double-shelled particles exhibit a density of 1.36 g/ml in cesium chloride and have been referred to as smooth particles. these particles appear to be the infectious particles as determined by their ability to induce viral antigen detectable by immunofluorescence in cells in tissue culture [50] , particles lacking the outer shell have a density of 1.38 g/ml in cesium chloride and have been referred to as rough particles. the single-shell particles contain an rna-dependent rna polymerase activity which can be assayed directly. alternatively, the polymerase can be activated from the double-shell particles by treatment with chelating agents which reportedly remove the outer shell from the particles [51] . the rotaviruses appear to be stable entities. their resistance to acid, like most enteric viruses, guarantees their survival after transversing the acidic environment of the stomach, in addition, these viruses are stable to freezing, sonication, treatment with liquid solvents and heating (50"c). the rotaviruses, unlike the polioviruses, are not stable to heating in the presence of 1 m magnesium chloride, although they are stabilized in the presence of magnesium sulfate [52] . such stabilization could be useful to prepare vaccines not requiring refrigeration for distribution in tropical climates. biologically, the rotaviruses are fastidious organisms. the agents from human subjects have not been successfully cultured in vitro in most laboratories, although wyatt et al. [53] reported limited success in growing one isolate in human embryonic kidney cells for up to 14 passages. rotavirus agents isolated from animals, including calves, pigs and monkeys, have been able to be cultured or adapted to growth in tissue culture in the laboratory. success with cultivation and development of plaque assays for the calf and simian agents have required the use of proteolytic enzymes, such as pancreatin or trypsin [54, 55] . the agents from the calf and monkey, now easily grown in tissue culture, are being used as model viruses to study rotavirus replication, and to enhance and develop methods for rotavirus detection. the inner coat of all known rotaviruses contains common antigens. this property has allowed the development of diagnostic procedures for infected human subjects using calf and simian viruses in place of the more fastidious agent isolated from human subjects. rotaviruses from many species, including human subjects, have been used successfully in experimental infections of colostrum-deprived gnotobiotic animals [56, 67] . such studies have suggested that cross infection between species may occur. our knowledge of the histopathology and pathophysiology of rotavirus infections has come from analyses of such infections in animals and from limited studies of mucosal biopsy specimens from infected children. the general pattern of infection involves virus penetration and infection of the differentiated enterocytes in the villi of the small intestine [58] . rotaviruses multiply in the cytoplasm of these cells and damage the absorptive cells, resulting in damage to both the digestive and the absorptive functions. available evidence suggests that such damaged cells are sloughed into the small intestine; lysis of the infected cells releases the virus into the intestine, resulting in the large quantities of virus detected in stools of infected subjects. these studies suggest that the diarrhea caused by rotavirus infection is due to malabsorption which also includes impaired glucose-sodium absorption. the highly differentiated absorptive villous cells are replaced by immature crypt cells that are not able to immediately compensate for the absorptive defect [59] . treatment of viral gastroenteritis. treatment of viral gastroenteritis is supportive. death is associated with loss of electrolytes and water, leading to dehydration, acidosis and shock; it is not due to an irreversible effect of the causative agent. due to the damage to the intestinal digestive and absorptive functions, initial therapy should include withdrawal of milk or lactose-containing products, dehydration should be combatted with the oral replacement of fluids and electrolytes. recent studies have suggested that oral therapy, using sugar and electrolyte solutions, is as effective as intravenous therapy in most infants and children. of great interest are two recent controlled doubleblind studies that compared the use of sucrose-electrolyte solutions with glucose-electrolyte solutions; both sugar electrolyte solutions were found to be effective in the treatment of rotavirus diarrhea [60, 61] . this is an important observation since sucrose is less expensive and more readily available than glucose, particularly in developing countries in which the mortality from rotavirus infection is a significant problem. in addition, it appeared that oral glucose-electrolyte solutions are effective therapy for diarrhea1 disease of both bacterial and viral etiology. although limited knowledge exists, widely administered antidiarrheal agents, such as kaolin-pectin or lomotip, do not appear to be useful in the relief of viral diarrhea in children [62] . areas for further research. despite the tremendous amount of investigative work carried out in viral gastroenteritis, an understanding of the natural history and epidemiology of this disease is still lacking. both rotaviruses and the norwalk-like viral agents have been established as etiologic agents in some cases of viral gastroenteritis. the role and clinical significance of other viral agents that have been associated with diarrhea in man, including adenoviruses, enteroviruses, astroviruses, coronaviruses and caliciviruses, remain to be elucidated. the inability to cultivate rotaviruses and norwalk-like viruses from human subjects has hampered progress in elucidating the natural history, virology and epidemiology of these illnesses. to date, no small animal model has been identified which would permit the study of the replication of these viruses in vivo. due to the inability to cultivate the viruses in vitro, there has been slow development of rapid, reliable and sensitive means for detecting the agenfs and comparing the antigenic variations of viral isolates or strains recovered from differing geographic areas. four strains of rotavirus from human subjects and at least two strains of norwalk-like viruses have been reported; future studies need to determine the clinical significance of these strain differences. it remains to be established whether avirulent as well as virulent strains exist, whether defective strains are produced and whether recombinant viruses occur. recombinant viruses are a particular possibility if one considers that the segmented rna genomes of the rotaviruses are similar to those of the influenza viruses. the role of the immune response in viral gastroenteritis requires further analysis, including the possible protective effects of serum and local intestinal antibody, interferon and cellular immunity. in addition, the effect of host nutritional status is unknown. our knowledge of the epidemiology of viral gastroenteritis infections is still in its infancy. most studies have focused on hospitalized children and adults; these studies may reflect a considerable bias in relatic iship to the occurrence of infections in the population at arge, since most of the illnesses are of insignificant severity and duration for the patient to seek medical attention. transmission of both the norwalk-like agent and rotaviruses appears to be by fecal-oral routes. the role of contaminated food and water in the transmission of gastroenteritis requires further examination, as does the effectiveness of our present sanitation procedures for eradication of the agents. the role of rotaviruses in persistent and recurrent infections is unknown. it has been demonstrated that rotaviruses can establish persistent infections in cell culture [63] , but the control mechanisms responsible for chronic infections in animals and/or cell lines have yet to be unraveled. lastly, the hosts and reservoirs of these viruses remain to be established. unfortunately, possible cross-species infections and the lack of reliable sensitive methods to detect rotavirus strain differences do not make these goals easily attainable. finally, the possible role of these viral agents in the establishment and maintenance of chronic diarrhea1 disease warrants further investigation, both with respect to chronic diarrhea of childhood and the relationship to inflammatory bowel disease. although prevention of gastroenteritis by vaccination is suggested in many publications, the primitive state of our knowledge of gastroenteritis viruses makes such discussions truly academic at the present time. acute infectious nonbacterial gastroenteritis: intestinal histopathology. histologic and enzymatic alterations during illness produced by the norwalk agent in man comparison of three aeents of acute infectious nonbacterial eastroenteritis bv c;oss-challenge in volunteers experimental infection of chimpanzees with the norwalk agent of epidemic viral gastroenteritis solid-phase microtiter radioimmunoassav for detection of the norwalk strain of acute nonbacterial, "epidemic gastroenteritis virus and its antibodies prevalence of antibodv to the norwalk aeent bv a newlv develoned immune adherence hemaggl