A PHP Error was encountered

Severity: Warning

Message: file_get_contents(https://...@gmail.com&api_key=61f08fa0b96a73de8c900d749fcb997acc09): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests

Filename: helpers/my_audit_helper.php

Line Number: 143

Backtrace:

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 143
Function: file_get_contents

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 209
Function: simplexml_load_file_from_url

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 994
Function: getPubMedXML

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3134
Function: GetPubMedArticleOutput_2016

File: /var/www/html/application/controllers/Detail.php
Line: 574
Function: pubMedSearch_Global

File: /var/www/html/application/controllers/Detail.php
Line: 488
Function: pubMedGetRelatedKeyword

File: /var/www/html/index.php
Line: 316
Function: require_once

Sensitive Detection of Francisella tularensis Directly from Whole Blood by Use of the GeneXpert System. | LitMetric

AI Article Synopsis

  • Francisella tularensis is a highly infectious bacterium that poses bioterrorism risks, and current diagnostic methods like blood cultures and nucleic acid tests lack sufficient sensitivity.* -
  • A new assay was developed that combines sample processing and detection in a single cartridge, demonstrating high sensitivity for detecting F. tularensis DNA in both human and macaque blood.* -
  • The new assay showed significantly better detection rates in infected macaques compared to conventional methods, with results indicating a 100% specificity, making it a promising tool for rapid point-of-care testing during early infections.*

Article Abstract

Francisella tularensis is a potential bioterrorism agent that is highly infectious at very low doses. Diagnosis of tularemia by blood culture and nucleic acid-based diagnostic tests is insufficiently sensitive. Here, we demonstrate a highly sensitive F. tularensis assay that incorporates sample processing and detection into a single cartridge suitable for point-of-care detection. The assay limit of detection (LOD) and dynamic range were determined in a filter-based cartridge run on the GeneXpert system. F. tularensis DNA in buffer or CFU of F. tularensis was spiked into human or macaque blood. To simulate detection in human disease, the assay was tested on blood drawn from macaques infected with F. tularensis Schu S4 at daily intervals. Assay detection was compared to that with a conventional quantitative PCR (qPCR) assay and blood culture. The assay LOD was 0.1 genome equivalents (GE) per reaction and 10 CFU/ml F. tularensis in both human and macaque blood. In infected macaques, the assay detected F. tularensis on days 1 to 4 postinfection in 21%, 17%, 60%, and 83% of macaques, respectively, compared to conventional qPCR positivity rates of 0%, 0%, 30%, and 100% and CFU detection of blood culture at 0%, 0%, 0%, and 10% positive, respectively. Assay specificity was 100%. The new cartridge-based assay can rapidly detect F. tularensis in bloodstream infections directly in whole blood at the early stages of infection with a sensitivity that is superior to that of other methods. The simplicity of the automated testing procedures may make this test suitable for rapid point-of-care detection.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC5228242PMC
http://dx.doi.org/10.1128/JCM.01126-16DOI Listing

Publication Analysis

Top Keywords

blood culture
12
tularensis
9
assay
9
francisella tularensis
8
blood
8
directly blood
8
genexpert system
8
point-of-care detection
8
human macaque
8
macaque blood
8

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!

A PHP Error was encountered

Severity: Notice

Message: fwrite(): Write of 34 bytes failed with errno=28 No space left on device

Filename: drivers/Session_files_driver.php

Line Number: 272

Backtrace:

A PHP Error was encountered

Severity: Warning

Message: session_write_close(): Failed to write session data using user defined save handler. (session.save_path: /var/lib/php/sessions)

Filename: Unknown

Line Number: 0

Backtrace: