Why AIDS? The Mystery of How HIV Attacks the Immune System.
ERIC Educational Resources Information Center
Christensen, Damaris
1999-01-01
Reviews differing theories surrounding the mystery of how human immunodeficiency virus (HIV) attacks the immune system. Claims that understanding how HIV triggers immune-cell depletion may enable researchers to block its effects. New knowledge could reveal strategies for acquired immune deficiency syndrome (AIDS) therapies that go beyond the drugs…
... rejection (attack of a transplanted organ by the immune system of a person receiving the organ) in people ... It works by decreasing the activity of the immune system to prevent it from attacking the transplanted organ.
... rejection (attack of a transplanted organ by the immune system of a person receiving the organ) of kidney ... It works by decreasing the activity of the immune system to prevent it from attacking the transplanted kidney.
... rejection (attack of the transplanted organ by the immune system of the person receiving the organ) in people ... works by decreasing the activity of the body's immune system so it will not attack the transplanted organ.
Anti-Immune Strategies of Pathogenic Fungi
Marcos, Caroline M.; de Oliveira, Haroldo C.; de Melo, Wanessa de Cássia M. Antunes; da Silva, Julhiany de Fátima; Assato, Patrícia A.; Scorzoni, Liliana; Rossi, Suélen A.; de Paula e Silva, Ana C. A.; Mendes-Giannini, Maria J. S.; Fusco-Almeida, Ana M.
2016-01-01
Pathogenic fungi have developed many strategies to evade the host immune system. Multiple escape mechanisms appear to function together to inhibit attack by the various stages of both the adaptive and the innate immune response. Thus, after entering the host, such pathogens fight to overcome the immune system to allow their survival, colonization and spread to different sites of infection. Consequently, the establishment of a successful infectious process is closely related to the ability of the pathogen to modulate attack by the immune system. Most strategies employed to subvert or exploit the immune system are shared among different species of fungi. In this review, we summarize the main strategies employed for immune evasion by some of the major pathogenic fungi. PMID:27896220
Center for Cancer Research investigators have discovered that some cancer cells catch immune signaling molecules called cytokines on their surfaces then slowly release the molecules. The results suggest that the immune system may exploit this weak spot to mount a prolonged attack on the tumor. Read more...
Vitamin E, immunity, and infection
USDA-ARS?s Scientific Manuscript database
A normally functioning immune system is critical for the body to fight and eliminate invading pathogens from the environment. On the other hand, the immune system also protects the body from internal risks such as neoplasia growing within and autoimmune responses that attack self. The immune system ...
Lupus: When the Body Attacks Itself | NIH MedlinePlus the Magazine
... of this page please turn JavaScript on. Feature: Lupus Lupus: When the Body Attacks Itself Past Issues / Spring 2014 Table of Contents fast facts 1 Lupus occurs when the body's immune system attacks the ...
... blood pressure and water and salt balance. Addison disease happens if the adrenal glands don't make ... problem with your immune system usually causes Addison disease. The immune system mistakenly attacks your own tissues, ...
... of the transplanted organ by the transplant recipient's immune system) in people who have received kidney, liver, or ... It works by decreasing the activity of the immune system to prevent it from attacking the transplanted organ.
... Disease Symptoms Alopecia areata (Al-uh-PEE-shuh AR-ee-AYT-uh) The immune system attacks hair ... spine is involved. Rheumatoid arthritis (ROO-muh-toid ar-THREYE-tuhss) A disease in which the immune ...
... Cell Lymphoma (AITL) is a rare, aggressive type accounting for about seven percent of all patients with ... as autoimmune hemolytic anemia (AIHA; where the immune system attacks red blood cells) and immune thrombocytopenia (ITP; ...
Genetics Home Reference: Omenn syndrome
... cells attack the body's own cells and tissues, accounting for the autoimmune features of Omenn syndrome . Learn ... Immune Response Encyclopedia: Immunodeficiency Disorders Health Topic: Immune System and Disorders Genetic and Rare Diseases Information Center ( ...
Immune system and melanoma biology: a balance between immunosurveillance and immune escape.
Passarelli, Anna; Mannavola, Francesco; Stucci, Luigia Stefania; Tucci, Marco; Silvestris, Francesco
2017-12-01
Melanoma is one of the most immunogenic tumors and its relationship with host immune system is currently under investigation. Many immunomodulatory mechanisms, favoring melanomagenesis and progression, have been described to interfere with the disablement of melanoma recognition and attack by immune cells resulting in immune resistance and immunosuppression. This knowledge produced therapeutic advantages, such as immunotherapy, aiming to overcome the immune evasion. Here, we review the current advances in cancer immunoediting and focus on melanoma immunology, which involves a dynamic interplay between melanoma and immune system, as well as on effects of "targeted therapies" on tumor microenvironment for combination strategies.
Proposed method to construct Boolean functions with maximum possible annihilator immunity
NASA Astrophysics Data System (ADS)
Goyal, Rajni; Panigrahi, Anupama; Bansal, Rohit
2017-07-01
Nonlinearity and Algebraic(annihilator) immunity are two core properties of a Boolean function because optimum values of Annihilator Immunity and nonlinearity are required to resist fast algebraic attack and differential cryptanalysis respectively. For a secure cypher system, Boolean function(S-Boxes) should resist maximum number of attacks. It is possible if a Boolean function has optimal trade-off among its properties. Before constructing Boolean functions, we fixed the criteria of our constructions based on its properties. In present work, our construction is based on annihilator immunity and nonlinearity. While keeping above facts in mind,, we have developed a multi-objective evolutionary approach based on NSGA-II and got the optimum value of annihilator immunity with good bound of nonlinearity. We have constructed balanced Boolean functions having the best trade-off among balancedness, Annihilator immunity and nonlinearity for 5, 6 and 7 variables by the proposed method.
A Novel Receptor-Like Kinase Involved in Fungal Pathogen Defense in Arabidopsis thaliana
USDA-ARS?s Scientific Manuscript database
Plants are under constant attack from a variety of disease causing organisms. Lacking an adaptive immune system, plants repel pathogen attack via an array of pathogen recognition machinery. Receptor-like kinases (RLKs) are involved in the recognition of pathogen-associated molecular patterns (PAMPs)...
Testicular defense systems: immune privilege and innate immunity
Zhao, Shutao; Zhu, Weiwei; Xue, Shepu; Han, Daishu
2014-01-01
The mammalian testis possesses a special immunological environment because of its properties of remarkable immune privilege and effective local innate immunity. Testicular immune privilege protects immunogenic germ cells from systemic immune attack, and local innate immunity is important in preventing testicular microbial infections. The breakdown of local testicular immune homeostasis may lead to orchitis, an etiological factor of male infertility. The mechanisms underlying testicular immune privilege have been investigated for a long time. Increasing evidence shows that both a local immunosuppressive milieu and systemic immune tolerance are involved in maintaining testicular immune privilege status. The mechanisms underlying testicular innate immunity are emerging based on the investigation of the pattern recognition receptor-mediated innate immune response in testicular cells. This review summarizes our current understanding of testicular defense mechanisms and identifies topics that merit further investigation. PMID:24954222
Expanding the Playing Field: Immune-Based Therapy Shows Potential for Lung, Other Cancers
Results from two early-phase clinical trials presented at the 2012 American Society of Clinical Oncology annual meeting provide further evidence that priming the immune system to attack tumors has potential as a treatment for certain cancers.
A surgeons' guide to renal transplant immunopathology, immunology, and immunosuppression.
Gaber, Lillian W; Knight, Richard J; Patel, Samir J
2013-12-01
The response to allografting involves adaptive and innate immune mechanisms. In the adaptive system, activated T cells differentiate to cytotoxic effectors that attack the graft and trigger B cells to differentiation to plasma cells that produce anti-HLA antibodies. The innate immune system recognizes antigens in a non-specific manner and recruits immune cells to the graft through the productions of chemotactic factors, and activation of cytokines and the complement cascade. In the kidney the tubules and the endothelium are the targets of the rejection response. Immune suppression is effective in modulating the adaptive immune system effect on graft histology. Copyright © 2013 Elsevier Inc. All rights reserved.
Basics of cancer immunotherapy.
Fujioka, Yuki; Nishikawa, Hiroyoshi
2016-01-01
The immune system is the body's defense against infectious organisms and other invaders including cancer cells. Cancer immunotherapy, which employs our own immune systems to attack cancer cells, is now emerging as a promising modality of cancer treatment based upon the clinical successes of immune checkpoint blockade and adoptive T cell transfer. In hematologic malignancies, clinical application of anti-PD-1 mAb and CAR (chimeric antigen receptor) T therapy is now being extensively tested in Hodgkin's disease, multiple myeloma, and CD19 + acute lymphocytic leukemia. In sharp contrast to conventional anti-cancer reagents which directly kill cancer cells, cancer immunotherapy activates various types of immune effector cells to attack cancer cells. However, more than half of the treated patients showed no activation of anti-tumor CD8 + killer T cells and CD4 + helper T cells and failed to respond to immune therapies such as immune checkpoint blockade, even when administered in combination regimens. Thus, development of novel immunotherapies to achieve more effective activation of anti-cancer immunity and immuno-monitoring of biomarkers, allowing proper evaluation of immune responses in cancer patients in order to detect responders, are urgent issues. Additionally, we must pay attention to characteristic immunological side effects not observed following treatment with conventional anti-cancer reagents. Herein, we present a summary outline and discuss the future direction of cancer immunotherapy.
Review of DoD Malaria Research Programs,
1992-05-01
the irraliated sporozoite vaccine. Work in the mouse model system and then extrapolate to human malarias. Study naturally acquired immune ...recombinant vaccines. Work simultaneously in the mouse model system and with human malarias. 3. Identify targets and mechanisms of protective immunity not...multivalent vaccines that attack these same targets. 3. Working again in the mouse model, non- human primate model, andI human systems we
... in autoimmune diseases such as HIV and Sjögren's syndrome where the body's immune system attacks the salivary glands causing significant inflammation. Dry mouth or dry eyes are common. This may occur with other systemic ...
Rheumatoid arthritis is an autoimmune disease in which the body's immune system attacks itself. The pattern of joints ... other joints and is worse in the morning. Rheumatoid arthritis is also a systemic disease, involving other body ...
... the body's defense (immune) system mistakenly attacks part of the nervous system. This leads to nerve inflammation that causes muscle ... Nerve supply to the pelvis Brain and nervous system References Katirji B. Disorders of peripheral nerves. In: Daroff RB, Jankovic J, Mazziotta ...
Guillain-Barre syndrome is a rare disorder that causes your immune system to attack your peripheral nervous system (PNS). The PNS ... your brain. No one knows what causes the syndrome. Sometimes it is triggered by an infection, surgery, ...
T-Cell Warriors—Equipped to Kill Cancer Cells | Center for Cancer Research
When the body recognizes tumor cells as foreign, a natural immune response arises to attack them. Unfortunately, tumors have ways to evade immune surveillance systems and antitumor responses are often too weak to defeat the disease. Rather than relying on the body’s natural response, scientists can now manipulate a patient’s own immune cells so that they latch on to tumor
New Approach for Producing and Purifying IL-15 Heterodimers That Have Potent Immune Effect | Poster
By Nancy Parrish, Staff Writer Cytokines are proteins that play a crucial role in the human immune system by delivering messages that trigger the activation of immune cells to fight off attacks from viruses or other invaders. Cristina Bergamaschi, Ph.D., NCI Center for Cancer Research, has been studying the mechanism of expression and function of a cytokine known as
Forbes-Beadle, Lauren; Crossman, Tova; Johnson, Travis K; Burke, Richard; Warr, Coral G; Whisstock, James C
2016-10-01
Pore-forming members of the membrane attack complex/perforin-like (MACPF) protein superfamily perform well-characterized roles as mammalian immune effectors. For example, complement component 9 and perforin function to directly form pores in the membrane of Gram-negative pathogens or virally infected/transformed cells, respectively. In contrast, the only known MACPF protein in Drosophila melanogaster, Torso-like, plays crucial roles during development in embryo patterning and larval growth. Here, we report that in addition to these functions, Torso-like plays an important role in Drosophila immunity. However, in contrast to a hypothesized effector function in, for example, elimination of Gram-negative pathogens, we find that torso-like null mutants instead show increased susceptibility to certain Gram-positive pathogens such as Staphylococcus aureus and Enterococcus faecalis We further show that this deficit is due to a severely reduced number of circulating immune cells and, as a consequence, an impaired ability to phagocytose bacterial particles. Together these data suggest that Torso-like plays an important role in controlling the development of the Drosophila cellular immune system. Copyright © 2016 by the Genetics Society of America.
Plant Responses to Pathogen Attack: Small RNAs in Focus.
Islam, Waqar; Noman, Ali; Qasim, Muhammad; Wang, Liande
2018-02-08
Small RNAs (sRNA) are a significant group of gene expression regulators for multiple biological processes in eukaryotes. In plants, many sRNA silencing pathways produce extensive array of sRNAs with specialized roles. The evidence on record advocates for the functions of sRNAs during plant microbe interactions. Host sRNAs are reckoned as mandatory elements of plant defense. sRNAs involved in plant defense processes via different pathways include both short interfering RNA (siRNA) and microRNA (miRNA) that actively regulate immunity in response to pathogenic attack via tackling pathogen-associated molecular patterns (PAMPs) and other effectors. In response to pathogen attack, plants protect themselves with the help of sRNA-dependent immune systems. That sRNA-mediated plant defense responses play a role during infections is an established fact. However, the regulations of several sRNAs still need extensive research. In this review, we discussed the topical advancements and findings relevant to pathogen attack and plant defense mediated by sRNAs. We attempted to point out diverse sRNAs as key defenders in plant systems. It is hoped that sRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases.
Plant Responses to Pathogen Attack: Small RNAs in Focus
2018-01-01
Small RNAs (sRNA) are a significant group of gene expression regulators for multiple biological processes in eukaryotes. In plants, many sRNA silencing pathways produce extensive array of sRNAs with specialized roles. The evidence on record advocates for the functions of sRNAs during plant microbe interactions. Host sRNAs are reckoned as mandatory elements of plant defense. sRNAs involved in plant defense processes via different pathways include both short interfering RNA (siRNA) and microRNA (miRNA) that actively regulate immunity in response to pathogenic attack via tackling pathogen-associated molecular patterns (PAMPs) and other effectors. In response to pathogen attack, plants protect themselves with the help of sRNA-dependent immune systems. That sRNA-mediated plant defense responses play a role during infections is an established fact. However, the regulations of several sRNAs still need extensive research. In this review, we discussed the topical advancements and findings relevant to pathogen attack and plant defense mediated by sRNAs. We attempted to point out diverse sRNAs as key defenders in plant systems. It is hoped that sRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases. PMID:29419801
The Role of Hypoxia in the Tumor Microenvironment: Implications for Ovarian Cancer Therapy
2017-07-01
microenvironmental factor promoting metastatic progression. A critical step in metastatic tumor progression is the ability of tumor cells to evade immune attack...Tumor cells utilize a complex set of mechanisms that prevent the immune system from mounting effective anti-tumor responses. Moreover, the hypoxic...promote the immunosuppressive phenotypes of both tumor cells as well as infiltrating immune cells . However, the mechanisms by which hypoxia promotes
Tomar, Namrata; De, Rajat K.
2013-01-01
Response of an immune system to a pathogen attack depends on the balance between the host immune defense and the virulence of the pathogen. Investigation of molecular interactions between the proteins of a host and a pathogen helps in identifying the pathogenic proteins. It is necessary to understand the dynamics of a normally behaved host system to evaluate the capacity of its immune system upon pathogen attack. In this study, we have compared the behavior of an unperturbed and pathogen perturbed host system. Moreover, we have developed a formalism under Flux Balance Analysis (FBA) for the optimization of conflicting objective functions. We have constructed an integrated pathway system, which includes Staphylococcal Superantigen (SAg) expression regulatory pathway and TCR signaling pathway of Homo sapiens. We have implemented the method on this pathway system and observed the behavior of host signaling molecules upon pathogen attack. The entire study has been divided into six different cases, based on the perturbed/unperturbed conditions. In other words, we have investigated unperturbed and pathogen perturbed human TCR signaling pathway, with different combinations of optimization of concentrations of regulatory and signaling molecules. One of these cases has aimed at finding out whether minimization of the toxin production in a pathogen leads to the change in the concentration levels of the proteins coded by TCR signaling pathway genes in the infected host. Based on the computed results, we have hypothesized that the balance between TCR signaling inhibitory and stimulatory molecules can keep TCR signaling system into resting/stimulating state, depending upon the perturbation. The proposed integrated host-pathogen interaction pathway model has accurately reflected the experimental evidences, which we have used for validation purpose. The significance of this kind of investigation lies in revealing the susceptible interaction points that can take back the Staphylococcal Enterotoxin (SE)-challenged system within the range of normal behavior. PMID:24324645
One of the hallmarks of cancer that is now more clearly recognized is tumors’ ability to avoid recognition and destruction by the immune system. A novel class of treatments, dubbed immunotherapy, attempts to overcome this aspect by stimulating the immune system to attack cancer cells. The cytokine interleukin-2 (IL-2), which is approved for the treatment of renal cancer and
[Application to allergic diseases].
Saito, Hirohisa
2005-04-01
The increasing prevalence of allergic diseases in developed countries is considered to be caused, at least in part, by rapid improvement of human hygiene. In human beings, the immune system developed as an ingenious device for defending against frequent attacks by microbes. Therefore, our immune system seems to have become deranged in our recent, unprecedentedly hygienic environment. It is now necessary to understand the total functional elements comprising the immune system, not just a single molecule present in an immunocyte working in our immune system. Microarray analysis is now becoming capable of detecting the whole transcripts present in a cell. It is anticipated that we can understand the deranged human immunity using the system biology. It is also expected to predict previously unexpected drug-related adverse events caused by interaction of a drug with responsible molecules present in vital organs.
Artificial Immune System Approaches for Aerospace Applications
NASA Technical Reports Server (NTRS)
KrishnaKumar, Kalmanje; Koga, Dennis (Technical Monitor)
2002-01-01
Artificial Immune Systems (AIS) combine a priori knowledge with the adapting capabilities of biological immune system to provide a powerful alternative to currently available techniques for pattern recognition, modeling, design, and control. Immunology is the science of built-in defense mechanisms that are present in all living beings to protect against external attacks. A biological immune system can be thought of as a robust, adaptive system that is capable of dealing with an enormous variety of disturbances and uncertainties. Biological immune systems use a finite number of discrete "building blocks" to achieve this adaptiveness. These building blocks can be thought of as pieces of a puzzle which must be put together in a specific way-to neutralize, remove, or destroy each unique disturbance the system encounters. In this paper, we outline AIS models that are immediately applicable to aerospace problems and identify application areas that need further investigation.
... process in which the body's immune system sends eosinophils (white blood cells distinguished by their lobulated nuclei ... orange eosin stain) to attack fungi, and the eosinophils irritate the membranes in the nose. As long ...
... cells) Plasma and cryoprecipitate Gamma globulin Albumin Blood Irradiation A rare but potentially life-threatening complication of ... who are considered to have impaired immune system. Irradiation prevents white cells from attacking. Red Cell Transfusion ...
Robustness trade-offs and host–microbial symbiosis in the immune system
Kitano, Hiroaki; Oda, Kanae
2006-01-01
The immune system provides organisms with robustness against pathogen threats, yet it also often adversely affects the organism as in autoimmune diseases. Recently, the molecular interactions involved in the immune system have been uncovered. At the same time, the role of the bacterial flora and its interactions with the host immune system have been identified. In this article, we try to reconcile these findings to draw a consistent picture of the host defense system. Specifically, we first argue that the network of molecular interactions involved in immune functions has a bow-tie architecture that entails inherent trade-offs among robustness, fragility, resource limitation, and performance. Second, we discuss the possibility that commensal bacteria and the host immune system constitute an integrated defense system. This symbiotic association has evolved to optimize its robustness against pathogen attacks and nutrient perturbations by harboring a broad range of microorganisms. Owing to the inherent propensity of a host immune system toward hyperactivity, maintenance of bacterial flora homeostasis might be particularly important in the development of preventive strategies against immune disorders such as autoimmune diseases. PMID:16738567
Plant innate immunity: an updated insight into defense mechanism.
Muthamilarasan, Mehanathan; Prasad, Manoj
2013-06-01
Plants are invaded by an array of pathogens of which only a few succeed in causing disease. The attack by others is countered by a sophisticated immune system possessed by the plants. The plant immune system is broadly divided into two, viz. microbial-associated molecular-patterns-triggered immunity (MTI) and effector-triggered immunity (ETI). MTI confers basal resistance, while ETI confers durable resistance, often resulting in hypersensitive response. Plants also possess systemic acquired resistance (SAR), which provides long-term defense against a broad-spectrum of pathogens. Salicylic-acid-mediated systemic acquired immunity provokes the defense response throughout the plant system during pathogen infection at a particular site. Trans-generational immune priming allows the plant to heritably shield their progeny towards pathogens previously encountered. Plants circumvent the viral infection through RNA interference phenomena by utilizing small RNAs. This review summarizes the molecular mechanisms of plant immune system, and the latest breakthroughs reported in plant defense. We discuss the plant–pathogen interactions and integrated defense responses in the context of presenting an integral understanding in plant molecular immunity.
... is an autoimmune disease, meaning the body's immune (defense) system attacks and destroys the cells in the ... Age: It often develops in childhood. Family health history: Having a parent or brother or sister with ...
... and sometimes other medications to treat severe active rheumatoid arthritis (RA; a condition in which the body attacks ... to stop scales from forming. Methotrexate may treat rheumatoid arthritis by decreasing the activity of the immune system.
CD8+ T Cells Need a Little Help(er) for Sustained Antitumor Response | Center for Cancer Research
The immune system comprises a powerful army of specialized cells and molecules that protect the body against invading foreign agents. For years, researchers have been trying to find a way to turn the wrath of the immune system against cancer. A significant amount of work related to cancer immunotherapy has focused on the potential of CD8+ cytotoxic T cells to attack and
... and sometimes other medications to treat severe active rheumatoid arthritis (RA; a condition in which the body attacks ... to stop scales from forming. Methotrexate may treat rheumatoid arthritis by decreasing the activity of the immune system.
... pain, tingling, a loss of feeling, problems digesting food, and erectile dysfunction Kidney problems , which can lead to kidney failure Weakened immune system, which can lead to more frequent infections Increased chance of having a heart attack or stroke
Technique Selectively Represses Immune System
... from attacking myelin in a mouse model of multiple sclerosis. Dr David Furness, Wellcome Images. All rights reserved ... devised a way to successfully treat symptoms resembling multiple sclerosis in a mouse model. With further development, the ...
Genetics Home Reference: glycoprotein VI deficiency
... protein called glycoprotein VI (GPVI). This protein is embedded in the outer membrane of blood cell fragments ... erythematosus (SLE). Autoimmune disorders occur when the immune system malfunctions and attacks the body's own cells and ...
ENGINEERING NANO- AND MICRO-PARTICLES TO TUNE IMMUNITY
Moon, James J.; Irvine, Darrell J.; Huang, Bonnie
2013-01-01
The immune system can be a cure or cause of disease, fulfilling a protective role in attacking cancer or pathogenic microbes but also causing tissue destruction in autoimmune disorders. Thus, therapies aimed to amplify or suppress immune reactions are of great interest. However, the complex regulation of the immune system, coupled with the potential systemic side effects associated with traditional systemic drug therapies, has presented a major hurdle for the development of successful immunotherapies,. Recent progress in the design of synthetic micro- and nano-particles that can target drugs, deliver imaging agents, or stimulate immune cells directly through their physical and chemical properties is leading to new approaches to deliver vaccines, promote immune responses against tumors, and suppress autoimmunity. In addition, novel strategies, such as the use of particle-laden immune cells as living targeting agents for drugs, are providing exciting new approaches for immunotherapy. This progress report describes recent advances in the design of micro- and nano-particles in immunotherapies and diagnostics. PMID:22641380
Recognition of bacterial plant pathogens: local, systemic and transgenerational immunity.
Henry, Elizabeth; Yadeta, Koste A; Coaker, Gitta
2013-09-01
Bacterial pathogens can cause multiple plant diseases and plants rely on their innate immune system to recognize and actively respond to these microbes. The plant innate immune system comprises extracellular pattern recognition receptors that recognize conserved microbial patterns and intracellular nucleotide binding leucine-rich repeat (NLR) proteins that recognize specific bacterial effectors delivered into host cells. Plants lack the adaptive immune branch present in animals, but still afford flexibility to pathogen attack through systemic and transgenerational resistance. Here, we focus on current research in plant immune responses against bacterial pathogens. Recent studies shed light onto the activation and inactivation of pattern recognition receptors and systemic acquired resistance. New research has also uncovered additional layers of complexity surrounding NLR immune receptor activation, cooperation and sub-cellular localizations. Taken together, these recent advances bring us closer to understanding the web of molecular interactions responsible for coordinating defense responses and ultimately resistance. © 2013 The Authors. New Phytologist © 2013 New Phytologist Trust.
Epigenetic Modulation as a Therapeutic Prospect for Treatment of Autoimmune Rheumatic Diseases.
Ciechomska, Marzena; O'Reilly, Steven
2016-01-01
Systemic inflammatory rheumatic diseases are considered as autoimmune diseases, meaning that the balance between recognition of pathogens and avoidance of self-attack is impaired and the immune system attacks and destroys its own healthy tissue. Treatment with conventional Disease Modifying Antirheumatic Drugs (DMARDs) and/or Nonsteroidal Anti-Inflammatory Drugs (NSAIDs) is often associated with various adverse reactions due to unspecific and toxic properties of those drugs. Although biologic drugs have largely improved the outcome in many patients, such drugs still pose significant problems and fail to provide a solution to all patients. Therefore, development of more effective treatments and improvements in early diagnosis of rheumatic diseases are badly needed in order to increase patient's functioning and quality of life. The reversible nature of epigenetic mechanisms offers a new class of drugs that modulate the immune system and inflammation. In fact, epigenetic drugs are already in use in some types of cancer or cardiovascular diseases. Therefore, epigenetic-based therapeutics that control autoimmunity and chronic inflammatory process have broad implications for the pathogenesis, diagnosis, and management of rheumatic diseases. This review summarises the latest information about potential therapeutic application of epigenetic modification in targeting immune abnormalities and inflammation of rheumatic diseases.
ANCA / MPO / PR3 Antibodies Test
... normal limits." For more information, please read the article Reference Ranges and What They Mean . What is being tested? Antineutrophil cytoplasmic antibodies (ANCA) are autoantibodies produced by a person's immune system that mistakenly target and attack proteins within the ...
T-Cell Warriors—Equipped to Kill Cancer Cells | Center for Cancer Research
When the body recognizes tumor cells as foreign, a natural immune response arises to attack them. Unfortunately, tumors have ways to evade immune surveillance systems and antitumor responses are often too weak to defeat the disease. Rather than relying on the body’s natural response, scientists can now manipulate a patient’s own immune cells so that they latch on to tumor cells by recognizing specific proteins on their surface. A type of immune cell that has been explored for this purpose is the killer (cytotoxic) T cell, which eliminates cells infected by viruses, damaged cells, and tumor cells.
76 FR 72713 - Government-Owned Inventions; Availability for Licensing
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-25
... pitfall to avermectins is central nervous system (CNS) toxicities in herding dogs. As a result, all new... containing the canine wild-type gene (Yancy 2 line). The paired mouse system can be utilized to assess the... xerostomia (dry mouth) that is caused by immune system attack on moisture producing salivary glands...
Dizdar, Omer; Kalyoncu, Umut; Karadag, Omer; Akdogan, Ali; Kiraz, Sedat; Ertenli, Ihsan; Barista, Ibrahim; Calguneri, Meral
2007-01-01
The aim of this study is to investigate the relationship between chemokines and the inflammation in Familial Mediterranean Fever (FMF). Forty-nine patients with FMF (41 in remission and 8 in acute attack period) and 20 healthy controls were included in the study. Serum levels of macrophage inflammatory protein-1alpha (MIP-1alpha) were assessed in the patients and the controls, along with other parameters of disease activity, i.e., fibrinogen, C-reactive protein and erythrocyte sedimentation rate. Serum MIP-1alpha levels of the patients with FMF in acute attack period were significantly higher than the patients in remission and healthy controls (p=0.02 and p=0.038, respectively). MIP-1alpha levels were weakly correlated with CRP (r=0.32, p=0.032) levels. MIP-1alpha may have a role in the pathogenesis of FMF attacks. MIP-1alpha and other chemokines may constitute a link between the innate immune system and FMF.
Nest predation risk modifies nestlings' immune function depending on the level of threat.
Roncalli, Gianluca; Colombo, Elisa; Soler, Manuel; Tieleman, B Irene; Versteegh, Maaike A; Ruiz-Raya, Fran; Gómez Samblas, Mercedes; Ibáñez-Álamo, Juan Diego
2018-05-20
Predation risk is thought to modify the physiology of prey mainly through the stress response. However, little is known about its potential effects on the immunity of animals, particularly in young individuals, despite the importance of overcoming wounding and pathogen aggression following a predator attack. We investigated the effect of four progressive levels of nest predation risk on several components of the immune system in common blackbird ( Turdus merula ) nestlings by presenting them with four different calls during 1 h: non-predator calls, predator calls, parental alarm calls and conspecific distress calls to induce a null, moderate, high and extreme level of risk, respectively. Nest predation risk induced an increase in ovotransferrin, immunoglobulin and the number of lymphocytes and eosinophils. Thus, the perception of a potential predator per se could stimulate the mobilization of a nestling's immune function and enable the organism to rapidly respond to the immune stimuli imposed by a predator attack. Interestingly, only high and extreme levels of risk caused immunological changes, suggesting that different immunological parameters are modulated according to the perceived level of threat. We also found a mediator role of parasites (i.e. Leucocytozoon ) and the current health status of the individual, as only nestlings not parasitized or in good body condition were able to modify their immune system. This study highlights a previously unknown link between predation risk and immunity, emphasizing the complex relationship among different selective pressures (predation, parasitism) in developing organisms and accentuating the importance of studying predation from a physiological point of view. © 2018. Published by The Company of Biologists Ltd.
Is lipid signaling through cannabinoid 2 receptors part of a protective system?
Pacher, P.; Mechoulam, R.
2011-01-01
The mammalian body has a highly developed immune system which guards against continuous invading protein attacks and aims at preventing, attenuating or repairing the inflicted damage. It is conceivable that through evolution analogous biological protective systems have been evolved against non-protein attacks. There is emerging evidence that lipid endocannabinoid signaling through cannabinoid 2 (CB2) receptors may represent an example/part of such a protective system/armamentarium. Inflammation/tissue injury triggers rapid elevations in local endocannabinoid levels, which in turn regulate signaling responses in immune and other cells modulating their critical functions. Changes in endocannabinoid levels and/or CB2 receptor expressions have been reported in almost all diseases affecting humans, ranging from cardiovascular, gastrointestinal, liver, kidney, neurodegenerative, psychiatric, bone, skin, auto-immune, lung disorders to pain and cancer, and modulating CB2 receptor activity holds tremendous therapeutic potential in these pathologies. While CB2 receptor activation in general mediates immunosuppressive effects, which limit inflammation and associated tissue injury in large number of pathological conditions, in some disease states activation of the CB2 receptor may enhance or even trigger tissue damage, which will also be discussed alongside the protective actions of the CB2 receptor stimulation with endocannabinoids or synthetic agonists, and the possible biological mechanisms involved in these effects. PMID:21295074
Survival and Evolution of CRISPR–Cas System in Prokaryotes and Its Applications
Shabbir, Muhammad Abu Bakr; Hao, Haihong; Shabbir, Muhammad Zubair; Hussain, Hafiz Iftikhar; Iqbal, Zahid; Ahmed, Saeed; Sattar, Adeel; Iqbal, Mujahid; Li, Jun; Yuan, Zonghui
2016-01-01
Prokaryotes have developed numerous innate immune mechanisms in order to fend off bacteriophage or plasmid attack. One of these immune systems is clustered regularly interspaced short palindromic repeats (CRISPR). CRISPR-associated proteins play a key role in survival of prokaryotes against invaders, as these systems cleave DNA of foreign genetic elements. Beyond providing immunity, these systems have significant impact in altering the bacterial physiology in term of its virulence and pathogenicity, as well as evolution. Also, due to their diverse nature of functionality, cas9 endoribonuclease can be easily reprogrammed with the help of guide RNAs, showing unprecedented potential and significance for gene editing in treating genetic diseases. Here, we also discuss the use of NgAgo–gDNA system in genome editing of human cells. PMID:27725818
Plant-bacterial pathogen interactions mediated by type III effectors.
Feng, Feng; Zhou, Jian-Min
2012-08-01
Effectors secreted by the bacterial type III system play a central role in the interaction between Gram-negative bacterial pathogens and their host plants. Recent advances in the effector studies have helped cementing several key concepts concerning bacterial pathogenesis, plant immunity, and plant-pathogen co-evolution. Type III effectors use a variety of biochemical mechanisms to target specific host proteins or DNA for pathogenesis. The identifications of their host targets led to the identification of novel components of plant innate immune system. Key modules of plant immune signaling pathways such as immune receptor complexes and MAPK cascades have emerged as a major battle ground for host-pathogen adaptation. These modules are attacked by multiple type III effectors, and some components of these modules have evolved to actively sense the effectors and trigger immunity. Copyright © 2012 Elsevier Ltd. All rights reserved.
MBCP - Approach - Immunotherapy | Center for Cancer Research
Immunotherapy CCR investigators pioneered the use of the tuberculosis vaccine—Bacillus Calmette-Guerin (BCG)—in the treatment of bladder cancer. In cases where the tumor burden is not too high and direct contact can be made with the urothelium surface of the bladder, BCG application appears to elicit an immune response that attacks the tumor as well as the attenuated virus. Ongoing clinical trials focusing on enhancing the patient’s immune system are listed below.
Lucas, Alexandra; Liu, Liying; Dai, Erbin; Bot, Ilze; Viswanathan, Kasinath; Munuswamy-Ramunujam, Ganesh; Davids, Jennifer A; Bartee, Mee Y; Richardson, Jakob; Christov, Alexander; Wang, Hao; Macaulay, Colin; Poznansky, Mark; Zhong, Robert; Miller, Leslie; Biessen, Erik; Richardson, Mary; Sullivan, Collin; Moyer, Richard; Hatton, Mark; Lomas, David A; McFadden, Grant
2009-01-01
Serine proteinase inhibitors, also called serpins, are an ancient grouping of proteins found in primitive organisms from bacteria, protozoa and horseshoe crabs and thus likely present at the time of the dinosaurs, up to all mammals living today. The innate or inflammatory immune system is also an ancient metazoan regulatory system, providing the first line of defense against infection or injury. The innate inflammatory defense response evolved long before acquired, antibody dependent immunity. Viruses have developed highly effective stratagems that undermine and block a wide variety of host inflammatory and immune responses. Some of the most potent of these immune modifying strategies utilize serpins that have also been developed over millions of years, including the hijacking by some viruses for defense against host immune attacks. Serpins represent up to 2-10 percent of circulating plasma proteins, regulating actions as wide ranging as thrombosis, inflammation, blood pressure control and even hormone transport. Targeting serpin-regulated immune or inflammatory pathways makes evolutionary sense for viral defense and many of these virus-derived inhibitory proteins have proven to be highly effective, working at very low concentrations--even down to the femptomolar to picomolar range. We are studying these viral anti-inflammatory proteins as a new class of immunomodulatory therapeutic agents derived from their native viral source. One such viral serpin, Serp-1 is now in clinical trial (conducted by VIRON Therapeutics, Inc.) for acute unstable coronary syndromes (unstable angina and small heart attacks), representing a 'first in class' therapeutic study. Several other viral serpins are also currently under investigation as anti-inflammatory or anti-immune therapeutics. This chapter describes these original studies and the ongoing analysis of viral serpins as a new class of virus-derived immunotherapeutic.
Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy
Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P
2002-01-01
Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044
Immune checkpoint failures in inflammatory myopathies: An overview.
Herbelet, Sandrine; De Bleecker, Jan L
2018-06-06
Dermatomyositis (DM), polymyositis (PM), inclusion body myositis (IBM), immune mediated necrotizing myopathy (IMNM) and overlap myositis (OM) are classified as inflammatory myopathies (IM) with involvement of autoimmune features such as autoreactive lymphocytes and autoantibodies. Autoimmunity can be defined as a loss in self-tolerance and attack of autoantigens by the immune system. Self-tolerance is achieved by a group of immune mechanisms occurring in central and periphal lymphoid organs and tissues, called immune checkpoints, that work in synergy to protect the body from harmful immune reactions. Autoimmune disorders appear when immune checkpoints fail. In this review, the different immune checkpoint failures are discussed in DM, PM, IBM and IMNM. Exploring research contribution in each of these immune checkpoints might help to highlight research perspectives in the field and obtain a more complete picture of IM disease pathology. Copyright © 2018 Elsevier B.V. All rights reserved.
van Esch, Edith M G; Welters, Marij J P; Jordanova, Ekaterina S; Trimbos, J Baptist M Z; van der Burg, Sjoerd H; van Poelgeest, Mariëtte I E
2012-07-01
Failure of the immune system to launch a strong and effective immune response to high-risk HPV is related to viral persistence and the development of anogenital (pre)malignant lesions such as vulvar intraepithelial neoplasia (VIN). Different forms of immunotherapy, aimed at overcoming the inertia of the immune system, have been developed and met with clinical success. Unfortunately these, in principal successful, therapeutic approaches also fail to induce clinical responses in a substantial number of cases. In this review, the authors summarize the traits of the immune response to HPV in healthy individuals and in patients with HPV-induced neoplasia. The potential mechanisms involved in the escape of HPV-induced lesions from the immune system indicate gaps in our knowledge. Finally, the interaction between the immune system and VIN is discussed with a special focus on the different forms of immunotherapy applied to treat VIN and the potential causes of therapy failure. The authors conclude that there are a number of pre-existing conditions that determine the patients' responsiveness to immunotherapy. An immunotherapeutic strategy in which different aspects of immune failure are attacked by complementary approaches, will improve the clinical response rate.
Novel immunotherapeutic approaches for treatment of infertility.
Abdolmohammadi-Vahid, Samaneh; Danaii, Shahla; Hamdi, Kobra; Jadidi-Niaragh, Farhad; Ahmadi, Majid; Yousefi, Mehdi
2016-12-01
One of the most important reasons of infertility and human reproductive failure is related to uncontrolled immunological response of maternal immune system to early embryo or fetus, that cause rejection of this semi-allograft. Therefore, a tolerance in the immune system is essential to modulate the reactions against the fetus to avoid rejection. The immune system imbalance during implantation or pregnancy may lead to implantation failure or miscarriage. So, use of immunosuppressive or immunomodulator agents can be helpful to prevent immunological attack. Initially, there was a focus on steroids like prednisolone or intralipids in treatment of miscarriage that suppressed the activity of most immune cells, Intravenous Immunoglobulin (IVIG) was then introduced with various mechanisms. Nowadays, novel and specific strategies are established such as monoclonal antibodies and cytokines. More recently, Tacrolimus and Cyclosporine, which were utilized in prevention of transplantation reject, are used as immunosuppressive factors in modulation of immune responses against the fetus. This review is focused on the main immunotherapeutic methods of infertility treatment. Copyright © 2016 Elsevier Masson SAS. All rights reserved.
Nature, nurture, and microbes: The development of multiple sclerosis.
Wekerle, H
2017-11-01
This paper argues that multiple sclerosis (MS) is the result of an autoimmune attack against components of the central nervous system (CNS). The effector cells involved in the pathogenic process are CNS-autoreactive T cells present in the healthy immune system in a resting state. Upon activation, these cells cross the blood-brain barrier and attack the CNS target tissue. Recent evidence indicates that autoimmune activation may happen in the intestine, following an interaction of bacterial components of the gut flora with local CNS autoreactive T cells. The consequences of this concept are discussed. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
T-cell selection and intestinal homeostasis
Ai, Teresa L.; Solomon, Benjamin D.; Hsieh, Chyi-Song
2014-01-01
Summary Although intestinal bacteria live deep within the body, they are topographically on the exterior surface and thus outside the host. According to the classic notion that the immune system targets non-self rather than self, these intestinal bacteria should be considered foreign and therefore attacked and eliminated. While this appears to be true for some commensal bacterial species, recent data suggests that the immune system actively becomes tolerant to many bacterial organisms. The induction or activation of regulatory T (Treg) cells that inhibit, rather than promote, inflammatory responses to commensal bacteria appears to be a central component of mucosal tolerance. Loss of this mechanism can lead to inappropriate immune reactivity toward commensal organisms, perhaps contributing to mucosal inflammation characteristic of disorders such as inflammatory bowel disease. PMID:24712459
DuPage, Michel; Cheung, Ann; Mazumdar, Claire; Winslow, Monte M.; Bronson, Roderick; Schmidt, Leah M.; Crowley, Denise; Chen, Jianzhu; Jacks, Tyler
2010-01-01
SUMMARY Neoantigens derived from somatic mutations in tumors may provide a critical link between the adaptive immune system and cancer. Here we describe a system to introduce exogenous antigens into genetically engineered mouse lung cancers to mimic tumor neoantigens. We show that endogenous T cells respond to and infiltrate tumors, significantly delaying malignant progression. Despite continued antigen expression, T cell infiltration does not persist and tumors ultimately escape immune attack. Transplantation of cell lines derived from these lung tumors or prophylactic vaccination against the autochthonous tumors, however, results in rapid tumor eradication or selection of tumors that lose antigen expression. These results provide insight into the dynamic nature of the immune response to naturally arising tumors. PMID:21251614
Trauer-Kizilelma, Ute; Hilker, Monika
2015-09-01
Insect parents that experienced an immune challenge are known to prepare (prime) the immune activity of their offspring for improved defence. This phenomenon has intensively been studied by analysing especially immunity-related proteins. However, it is unknown how transgenerational immune priming affects transcript levels of immune-relevant genes of the offspring upon an actual threat. Here, we investigated how an immune challenge of Manduca sexta parents affects the expression of immune-related genes in their eggs that are attacked by parasitoids. Furthermore, we addressed the question whether the transgenerational immune priming of expression of genes in the eggs is still traceable in adult offspring. Our study revealed that a parental immune challenge did not affect the expression of immune-related genes in unparasitised eggs. However, immune-related genes in parasitised eggs of immune-challenged parents were upregulated to a higher level than those in parasitised eggs of unchallenged parents. Hence, this transgenerational immune priming of the eggs was detected only "on demand", i.e. upon parasitoid attack. The priming effects were also traceable in adult female progeny of immune-challenged parents which showed higher transcript levels of several immune-related genes in their ovaries than non-primed progeny. Some of the primed genes showed enhanced expression even when the progeny was left unchallenged, whereas other genes were upregulated to a greater extent in primed female progeny than non-primed ones only when the progeny itself was immune-challenged. Thus, the detection of transgenerational immune priming strongly depends on the analysed genes and the presence or absence of an actual threat for the offspring. We suggest that M. sexta eggs laid by immune-challenged parents "afford" to upregulate the transcription of immunity-related genes only upon attack, because they have the chance to be endowed by parentally directly transferred protective proteins. Copyright © 2015 Elsevier Ltd. All rights reserved.
CHECKPOINT INHIBITOR IMMUNE THERAPY: Systemic Indications and Ophthalmic Side Effects.
Dalvin, Lauren A; Shields, Carol L; Orloff, Marlana; Sato, Takami; Shields, Jerry A
2018-06-01
To review immune checkpoint inhibitor indications and ophthalmic side effects. A literature review was performed using a PubMed search for publications between 1990 and 2017. Immune checkpoint inhibitors are designed to treat system malignancies by targeting one of three ligands, leading to T-cell activation for attack against malignant cells. These ligands (and targeted drug) include cytotoxic T-lymphocyte antigen-4 (CTLA-4, ipilimumab), programmed death protein 1 (PD-1, pembrolizumab, nivolumab), and programmed death ligand-1 (PD-L1, atezolizumab, avelumab, durvalumab). These medications upregulate the immune system and cause autoimmune-like side effects. Ophthalmic side effects most frequently manifest as uveitis (1%) and dry eye (1-24%). Other side effects include myasthenia gravis (n = 19 reports), inflammatory orbitopathy (n = 11), keratitis (n = 3), cranial nerve palsy (n = 3), optic neuropathy (n = 2), serous retinal detachment (n = 2), extraocular muscle myopathy (n = 1), atypical chorioretinal lesions (n = 1), immune retinopathy (n = 1), and neuroretinitis (n = 1). Most inflammatory side effects are managed with topical or periocular corticosteroids, but advanced cases require systemic corticosteroids and cessation of checkpoint inhibitor therapy. Checkpoint inhibitors enhance the immune system by releasing inhibition on T cells, with risk of autoimmune-like side effects. Ophthalmologists should include immune-related adverse events in their differential when examining cancer patients with new ocular symptoms.
Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.
Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat
2015-01-01
A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.
Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm
2015-01-01
A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001
... the risk of HIV drug resistance . ART can’t cure HIV, but HIV medicines help people with HIV live longer, healthier lives. ART also reduces the risk of HIV transmission (the spread of HIV to others). HIV attacks and destroys the CD4 cells of the immune system . CD4 cells are a ...
CD8+ T Cells Need a Little Help(er) for Sustained Antitumor Response | Center for Cancer Research
The immune system comprises a powerful army of specialized cells and molecules that protect the body against invading foreign agents. For years, researchers have been trying to find a way to turn the wrath of the immune system against cancer. A significant amount of work related to cancer immunotherapy has focused on the potential of CD8+ cytotoxic T cells to attack and eliminate cancer cells. However, this approach has proved challenging for two reasons. First, there are several mechanisms in place to make sure that T cells and other components of the immune system ignore “self” molecules and cells, even if these cells become cancerous. Second, tumor microenvironments are often characterized by the presence of immunosuppressive factors capable of stifling T cell activation (a process called tolerization).
Intersections between immune responses and morphological regulation in plants.
Uchida, Naoyuki; Tasaka, Masao
2010-06-01
Successful plant pathogens have developed strategies to interfere with the defence mechanisms of their host plants through evolution. Conversely, host plants have evolved systems to counteract pathogen attack. Some pathogens induce pathogenic symptoms on plants that include morphological changes in addition to interference with plant growth. Recent studies, based on molecular biology and genetics using Arabidopsis thaliana, have revealed that factors derived from pathogens can modulate host systems and/or host factors that play important roles in the morphological regulation of host plants. Other reports, meanwhile, have shown that factors known to have roles in plant morphology also function in plant immune responses. Evolutionary conservation of these factors and systems implies that host-pathogen interactions and the evolution they drive have yielded tight links between morphological processes and immune responses. In this review, recent findings about these topics are introduced and discussed.
DAMPs, MAMPs, and NAMPs in plant innate immunity.
Choi, Hyong Woo; Klessig, Daniel F
2016-10-26
Multicellular organisms have evolved systems/mechanisms to detect various forms of danger, including attack by microbial pathogens and a variety of pests, as well as tissue and cellular damage. Detection via cell-surface receptors activates an ancient and evolutionarily conserved innate immune system. Potentially harmful microorganisms are recognized by the presence of molecules or parts of molecules that have structures or chemical patterns unique to microbes and thus are perceived as non-self/foreign. They are referred to as Microbe-Associated Molecular Patterns (MAMPs). Recently, a class of small molecules that is made only by nematodes, and that functions as pheromones in these organisms, was shown to be recognized by a wide range of plants. In the presence of these molecules, termed Nematode-Associated Molecular Patterns (NAMPs), plants activate innate immune responses and display enhanced resistance to a broad spectrum of microbial and nematode pathogens. In addition to pathogen attack, the relocation of various endogenous molecules or parts of molecules, generally to the extracellular milieu, as a result of tissue or cellular damage is perceived as a danger signal, and it leads to the induction of innate immune responses. These relocated endogenous inducers are called Damage-Associated Molecular Patterns (DAMPs). This mini-review is focused on plant DAMPs, including the recently discovered Arabidopsis HMGB3, which is the counterpart of the prototypic animal DAMP HMGB1. The plant DAMPs will be presented in the context of plant MAMPs and NAMPs, as well as animal DAMPs.
Apoptosis in the homeostasis of the immune system and in human immune mediated diseases.
Giovannetti, A; Pierdominici, M; Di Iorio, A; Cianci, R; Murdaca, G; Puppo, F; Pandolfi, F; Paganelli, R
2008-01-01
The immune system has evolved sophisticated mechanisms controlling the development of responses to dangerous antigens while avoiding unnecessary attacks to innocuous, commensal or self antigens. The risk of autoimmunity is continuously checked and balanced against the risk of succumbing to exogenous infectious agents. It is therefore of paramount importance to understand the molecular events linking the breakdown of tolerance and the development of immunodeficiency. Apoptotic mechanisms are used to regulate the development of thymocytes, the shaping of T cell repertoire, its selection and the coordinate events leading to immune responses in the periphery. Moreover, they are at the heart of the homeostatic controls restoring T cell numbers and establishing T cell memory. T lymphocytes shift continuously from survival to death signals to ensure immune responsiveness without incurring in autoimmune damage. In this review we shall consider some key facts on the relationship of lymphopenia to autoreactivity, the mechanisms controlling positive and negative selection in the thymus, the role of apoptosis in selected primary immunodeficiency states and in systemic and organ-specific autoimmunity, with examples from human diseases and their animal models.
Basics of PD-1 in self-tolerance, infection, and cancer immunity.
Chikuma, Shunsuke
2016-06-01
Successful cancer treatment requires understanding host immune response against tumor cells. PD-1 belongs to the CD28 superfamily of receptors that work as "checkpoints" of immune activation. PD-1 maintains immune self-tolerance to prevent autoimmunity and controls T-cell reaction during infection to prevent excessive tissue damage. Tumor cells that arise from normal tissue acquire mutations that can be targeted by lymphocytes. Accumulating lines of evidence suggest that tumor cells evade host immune attack by expressing physiological PD-1 ligands and stimulating PD-1 on the lymphocytes. Based on this idea, researchers have successfully demonstrated that systemic administration of monoclonal antibodies that inhibit the binding of PD-1 to the ligands reactivated T cells and augmented the anti-cancer immune response. In this review, I summarize the basics of T-cell biology and its regulation by PD-1 and discuss the current understanding and questions about this multifaceted molecule.
BDP Supports First-in-Human Clinical Trials | Frederick National Laboratory for Cancer Research
Cancer immunotherapy is a type of treatment in which the body’s own immune system is used to attack and kill cancer cells or keep them from spreading. To date, the immunotherapy agent interleukin-2 (IL-2) has been approved by the U.S. Food and Drug
A review of the latest concepts in molecular plant pathology and applications to potato breeding
USDA-ARS?s Scientific Manuscript database
Co-evolution between pathogens and plants has led to the development of a range of constitutive and inducible resistance mechanisms that help plants survive pathogen attack. Different models have been proposed to describe the plant immune system. The most popular current model indicates that plants ...
Incubation period and immune function: A comparative field study among coexisting birds
Palacios, M.G.; Martin, T.E.
2006-01-01
Developmental periods are integral components of life history strategies that can have important fitness consequences and vary enormously among organisms. However, the selection pressures and mechanisms causing variation in length of developmental periods are poorly understood. Particularly puzzling are prolonged developmental periods, because their selective advantage is unclear. Here we tested the hypotheses that immune function is stronger in species that are attacked at a higher rate by parasites and that prolonged embryonic development allows the development of this stronger immune system. Through a comparative field study among 12 coexisting passerine bird species, we show that species with higher blood parasite prevalence mounted stronger cellular immune responses than species with lower prevalence. These results provide support for the hypothesis that species facing greater selection pressure from parasites invest more in immune function. However, species with longer incubation periods mounted weaker cellular immune responses than species with shorter periods. Therefore, cellular immune responses do not support the hypothesis that longer development time enhances immunocompentence. Future studies should assess other components of the immune system and test alternative causes of variation in incubation periods among bird species. ?? Springer-Verlag 2005.
Current progress in the development of a prophylactic vaccine for HIV-1
Gamble, Lena J; Matthews, Qiana L
2011-01-01
Since its discovery and characterization in the early 1980s as a virus that attacks the immune system, there has been some success for the treatment of human immunodeficiency virus-1 (HIV-1) infection. However, due to the overwhelming public health impact of this virus, a vaccine is needed urgently. Despite the tireless efforts of scientist and clinicians, there is still no safe and effective vaccine that provides sterilizing immunity. A vaccine that provides sterilizing immunity against HIV infection remains elusive in part due to the following reasons: 1) degree of diversity of the virus, 2) ability of the virus to evade the hosts’ immunity, and 3) lack of appropriate animal models in which to test vaccine candidates. There have been several attempts to stimulate the immune system to provide protection against HIV-infection. Here, we will discuss attempts that have been made to induce sterilizing immunity, including traditional vaccination attempts, induction of broadly neutralizing antibody production, DNA vaccines, and use of viral vectors. Some of these attempts show promise pending continued research efforts. PMID:21267356
Thunder and lightning: immunotherapy and oncolytic viruses collide.
Melcher, Alan; Parato, Kelley; Rooney, Cliona M; Bell, John C
2011-06-01
For the last several decades, the development of antitumor immune-based strategies and the engineering and testing of oncolytic viruses (OVs) has occurred largely in parallel tracks. Indeed, the immune system is often thought of as an impediment to successful oncolytic virus delivery and efficacy. More recently, however, both preclinical and clinical results have revealed potential synergy between these two promising therapeutic strategies. Here, we summarize some of the evidence that supports combining OVs with immuno-therapeutics and suggest new ways to mount a multipronged biological attack against cancers.
Thunder and Lightning: Immunotherapy and Oncolytic Viruses Collide
Melcher, Alan; Parato, Kelley; Rooney, Cliona M; Bell, John C
2011-01-01
For the last several decades, the development of antitumor immune-based strategies and the engineering and testing of oncolytic viruses (OVs) has occurred largely in parallel tracks. Indeed, the immune system is often thought of as an impediment to successful oncolytic virus delivery and efficacy. More recently, however, both preclinical and clinical results have revealed potential synergy between these two promising therapeutic strategies. Here, we summarize some of the evidence that supports combining OVs with immuno-therapeutics and suggest new ways to mount a multipronged biological attack against cancers. PMID:21505424
Letting Our Cells Do the Fighting: Flight-Induced Changes in the Immune Response
NASA Technical Reports Server (NTRS)
Pierson, Duane; Bloomberg, Jacob; Lee, Angie (Technical Monitor)
2002-01-01
The organisms that make us ill, such as bacteria, viruses, and fungi, are like attacking armies. We now know a great deal more about this unseen world of microscopic invaders. Fortunately for us, the human immune system is ever vigilant against them. Microorganisms such as bacteria, viruses, and fungi occupy almost every corner of the Earth, and even parts of the human body. Some organisms are beneficial to us, helping to produce milk, cheese or yogurt. Others are potentially harmful, yet we don#t always develop illnesses from them; they are kept in check by the sentinels of our immune system. Our immune system is routinely challenged by these organisms every day. When the immune response is diminished, our ability to fight off these "bugs" is lowered. And that's when we become ill. Space flight presents a challenge to the immune system. Scientists believe that the stressful conditions of space flight - launch into orbit, adapting to microgravity, heavy workloads, and isolation from family and friends, to name but a few - reduce the astronauts' immunity. This immune suppression makes them more susceptible to common illnesses from bacteria and to re-infections from latent viruses in the body. In addition, risk of spreading illness in the confined environment of the Space Shuttle is high. Understanding changes in immune function will help scientists develop ways to keep astronauts healthy in space. This knowledge can also benefit earthbound populations. This experiment will give scientists insight into the immune system by comparing how certain cells of astronauts' innate immune system - the first line of defense against invaders - function after flight compared to before flight.
SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?
NASA Astrophysics Data System (ADS)
Rührmair, Ulrich
This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.
Autoimmune Addison's disease - An update on pathogenesis.
Hellesen, Alexander; Bratland, Eirik; Husebye, Eystein S
2018-06-01
Autoimmunity against the adrenal cortex is the leading cause of Addison's disease in industrialized countries, with prevalence estimates ranging from 93-220 per million in Europe. The immune-mediated attack on adrenocortical cells cripples their ability to synthesize vital steroid hormones and necessitates life-long hormone replacement therapy. The autoimmune disease etiology is multifactorial involving variants in immune genes and environmental factors. Recently, we have come to appreciate that the adrenocortical cell itself is an active player in the autoimmune process. Here we summarize the complex interplay between the immune system and the adrenal cortex and highlight unanswered questions and gaps in our current understanding of the disease. Copyright © 2018 Elsevier Masson SAS. All rights reserved.
Immunotherapy for liver tumors: present status and future prospects
Matar, Pablo; Alaniz, Laura; Rozados, Viviana; Aquino, Jorge B; Malvicini, Mariana; Atorrasagasti, Catalina; Gidekel, Manuel; Silva, Marcelo; Scharovsky, O Graciela; Mazzolini, Guillermo
2009-01-01
Increasing evidence suggests that immune responses are involved in the control of cancer and that the immune system can be manipulated in different ways to recognize and attack tumors. Progress in immune-based strategies has opened new therapeutic avenues using a number of techniques destined to eliminate malignant cells. In the present review, we overview current knowledge on the importance, successes and difficulties of immunotherapy in liver tumors, including preclinical data available in animal models and information from clinical trials carried out during the lasts years. This review shows that new options for the treatment of advanced liver tumors are urgently needed and that there is a ground for future advances in the field. PMID:19272130
Sherer, Morgan L; Posillico, Caitlin K; Schwarz, Jaclyn M
2017-11-01
There is strong evidence that the immune system changes dramatically during pregnancy in order to prevent the developing fetus from being "attacked" by the maternal immune system. Due to these alterations in peripheral immune function, many women that suffer from autoimmune disorders actually find significant relief from their symptoms throughout pregnancy; however, these changes can also leave the mother more susceptible to infections that would otherwise be mitigated by the inflammatory response (Robinson and Klein, 2012). Only one other study has looked at changes in microglial number and morphology during pregnancy and the postpartum period (Haim et al., 2016), but no one has yet examined the neuroimmune response following an immune challenge during this time. Therefore, in this study, we investigated the impact of an immune challenge during various time-points throughout pregnancy and the postpartum period on the expression of immune molecules in the brain of the mother and fetus. Our results indicate that similar to the peripheral immune suppression measured during pregnancy, we also see significant suppression of the immune response in the maternal brain, particularly during late gestation. In contrast to the peripheral immune system, immune modulation in the maternal brain extends moderately into the postpartum period. Additionally, we found that the fetal immune response in the brain and placenta is also suppressed just before parturition, suggesting that cytokine production in the fetus and placenta are mirroring the peripheral cytokine response of the mother. Copyright © 2017 Elsevier Inc. All rights reserved.
Is lipid signaling through cannabinoid 2 receptors part of a protective system?
Pacher, P; Mechoulam, R
2011-04-01
The mammalian body has a highly developed immune system which guards against continuous invading protein attacks and aims at preventing, attenuating or repairing the inflicted damage. It is conceivable that through evolution analogous biological protective systems have been evolved against non-protein attacks. There is emerging evidence that lipid endocannabinoid signaling through cannabinoid 2 (CB₂) receptors may represent an example/part of such a protective system/armamentarium. Inflammation/tissue injury triggers rapid elevations in local endocannabinoid levels, which in turn regulate signaling responses in immune and other cells modulating their critical functions. Changes in endocannabinoid levels and/or CB₂ receptor expressions have been reported in almost all diseases affecting humans, ranging from cardiovascular, gastrointestinal, liver, kidney, neurodegenerative, psychiatric, bone, skin, autoimmune, lung disorders to pain and cancer, and modulating CB₂ receptor activity holds tremendous therapeutic potential in these pathologies. While CB₂ receptor activation in general mediates immunosuppressive effects, which limit inflammation and associated tissue injury in large number of pathological conditions, in some disease states activation of the CB₂ receptor may enhance or even trigger tissue damage, which will also be discussed alongside the protective actions of the CB₂ receptor stimulation with endocannabinoids or synthetic agonists, and the possible biological mechanisms involved in these effects. Published by Elsevier Ltd.
Okuda, Ken-ichi; Yanagihara, Sae; Sugayama, Tomomichi; Zendo, Takeshi; Nakayama, Jiro; Sonomoto, Kenji
2010-06-01
Lantibiotics are peptide-derived antibacterial substances produced by some Gram-positive bacteria and characterized by the presence of unusual amino acids, like lanthionines and dehydrated amino acids. Because lantibiotic producers may be attacked by self-produced lantibiotics, they express immunity proteins on the cytoplasmic membrane. An ATP-binding cassette (ABC) transport system mediated by the LanFEG protein complex is a major system in lantibiotic immunity. Multiple-sequence alignment analysis revealed that LanF proteins contain the E loop, a variant of the Q loop, which is a well-conserved motif in the nucleotide-binding domains (NBDs) of general ABC transporters. To elucidate E loop function, we introduced a mutation in the NukF protein, which is involved in the nukacin-ISK-1 immunity system. Amino acid replacement of glutamic acid in the E loop with glutamine (E85Q) resulted in slight decreases in the immunity level and transport activity. Additionally, the E85A mutation severely impaired the immunity level and transport activity. On the other hand, ATPase activities of purified E85Q and E85A mutants were almost similar to that of the wild type. These results suggested that the E loop found in ABC transporters involved in lantibiotic immunity plays a significant role in the function of these transporters, especially in the structural change of transmembrane domains.
Du, Sienmi; Itoh, Noriko; Askarinam, Sahar; Hill, Haley; Arnold, Arthur P.; Voskuhl, Rhonda R.
2014-01-01
Women are more susceptible to multiple sclerosis (MS) and have more robust immune responses than men. However, men with MS tend to demonstrate a more progressive disease course than women, suggesting a disconnect between the severity of an immune attack and the CNS response to a given immune attack. We have previously shown in an MS model, experimental autoimmune encephalomyelitis, that autoantigen-sensitized XX lymph node cells, compared with XY, are more encephalitogenic. These studies demonstrated an effect of sex chromosomes in the induction of immune responses, but did not address a potential role of sex chromosomes in the CNS response to immune-mediated injury. Here, we examined this possibility using XX versus XY bone marrow chimeras reconstituted with a common immune system of one sex chromosomal type. We found that experimental autoimmune encephalomyelitis mice with an XY sex chromosome complement in the CNS, compared with XX, demonstrated greater clinical disease severity with more neuropathology in the spinal cord, cerebellum, and cerebral cortex. A candidate gene on the X chromosome, toll-like receptor 7, was then examined. Toll-like receptor 7 expression in cortical neurons was higher in mice with XY compared with mice with XX CNS, consistent with the known neurodegenerative role for toll-like receptor 7 in neurons. These results suggest that sex chromosome effects on neurodegeneration in the CNS run counter to effects on immune responses, and may bear relevance to the clinical enigma of greater MS susceptibility in women but faster disability progression in men. This is a demonstration of a direct effect of sex chromosome complement on neurodegeneration in a neurological disease. PMID:24550311
Du, Sienmi; Itoh, Noriko; Askarinam, Sahar; Hill, Haley; Arnold, Arthur P; Voskuhl, Rhonda R
2014-02-18
Women are more susceptible to multiple sclerosis (MS) and have more robust immune responses than men. However, men with MS tend to demonstrate a more progressive disease course than women, suggesting a disconnect between the severity of an immune attack and the CNS response to a given immune attack. We have previously shown in an MS model, experimental autoimmune encephalomyelitis, that autoantigen-sensitized XX lymph node cells, compared with XY, are more encephalitogenic. These studies demonstrated an effect of sex chromosomes in the induction of immune responses, but did not address a potential role of sex chromosomes in the CNS response to immune-mediated injury. Here, we examined this possibility using XX versus XY bone marrow chimeras reconstituted with a common immune system of one sex chromosomal type. We found that experimental autoimmune encephalomyelitis mice with an XY sex chromosome complement in the CNS, compared with XX, demonstrated greater clinical disease severity with more neuropathology in the spinal cord, cerebellum, and cerebral cortex. A candidate gene on the X chromosome, toll-like receptor 7, was then examined. Toll-like receptor 7 expression in cortical neurons was higher in mice with XY compared with mice with XX CNS, consistent with the known neurodegenerative role for toll-like receptor 7 in neurons. These results suggest that sex chromosome effects on neurodegeneration in the CNS run counter to effects on immune responses, and may bear relevance to the clinical enigma of greater MS susceptibility in women but faster disability progression in men. This is a demonstration of a direct effect of sex chromosome complement on neurodegeneration in a neurological disease.
Krams, Indrikis; Daukste, Janina; Kivleniece, Inese; Krama, Tatjana; Rantala, Markus J
2013-12-01
Immune defenses of insects show either broad reactions or specificity and durability of induced protection against attacking parasites and pathogens. In this study, we tested whether encapsulation response against nylon monofilament increases between two attempts of activation of immune system in mealworm beetles Tenebrio molitor, and whether previous exposure to nylon monofilament may also increase protection against an entomopathogenic fungus. We found that survival of beetles subjected to immune activation by nylon implant and subsequent fungal exposure a week later was significantly higher than survival of beetles which had been subjected to fungal infection only. This result suggests that previous immune activation by the nylon implant may be considered as broad spectrum "immune priming" which helps to fight not only the same intruder but also other parasites. © 2012 Institute of Zoology, Chinese Academy of Sciences.
Paz, M. L.; Leoni, J.
2016-01-01
Sunlight, composed of different types of radiation, including ultraviolet wavelengths, is an essential source of light and warmth for life on earth but has strong negative effects on human health, such as promoting the malignant transformation of skin cells and suppressing the ability of the human immune system to efficiently detect and attack malignant cells. UV-induced immunosuppression has been extensively studied since it was first described by Dr. Kripke and Dr. Fisher in the late 1970s. However, skin exposure to sunlight has not only this and other unfavorable effects, for example, mutagenesis and carcinogenesis, but also a positive one: the induction of Vitamin D synthesis, which performs several roles within the immune system in addition to favoring bone homeostasis. The impact of low levels of UV exposure on the immune system has not been fully reported yet, but it bears interesting differences with the suppressive effect of high levels of UV radiation, as shown by some recent studies. The aim of this article is to put some ideas in perspective and pose some questions within the field of photoimmunology based on established and new information, which may lead to new experimental approaches and, eventually, to a better understanding of the effects of sunlight on the human immune system. PMID:28070504
Epigenetic Aspects of Systemic Lupus Erythematosus.
Relle, Manfred; Foehr, Bernd; Schwarting, Andreas
2015-06-01
Autoimmune diseases such as systemic lupus erythematosus (SLE), rheumatoid arthritis, multiple sclerosis, autoimmune hepatitis, and inflammatory bowel disease have complex pathogeneses and the courses of events leading to these diseases are not well understood. The immune surveillance is a delicate balance between self and foreign as well as between tolerance and immune response. Exposure to certain environmental factors may impair this equilibrium, leading to autoimmune diseases, cancer, and the so-called "lifestyle diseases" such as atherosclerosis, heart attack, stroke, and obesity, among others. These external stimuli may also alter the epigenetic status quo and may trigger autoimmune diseases such as SLE in genetically susceptible individuals. This review aims to highlight the role of epigenetic (dys-)regulation in the pathogenesis of SLE.
The eye: A window to the soul of the immune system.
Perez, V L; Saeed, A M; Tan, Y; Urbieta, M; Cruz-Guilloty, F
2013-09-01
The eye is considered as an immune privileged site, and with good reason. It has evolved a variety of molecular and cellular mechanisms that limit immune responses to preserve vision. For example, the cornea is mainly protected from autoimmunity by the lack of blood and lymphatic vessels, whereas the retina-blood barrier is maintained in an immunosuppressive state by the retinal pigment epithelium. However, there are several scenarios in which immune privilege is altered and the eye becomes susceptible to immune attack. In this review, we highlight the role of the immune system in two clinical conditions that affect the anterior and posterior segments of the eye: corneal transplantation and age-related macular degeneration. Interestingly, crosstalk between the innate and adaptive immune systems is critical in both acute and chronic inflammatory responses in the eye, with T cells playing a central role in combination with neutrophils and macrophages. In addition, we emphasize the advantage of using the eye as a model for in vivo longitudinal imaging of the immune system in action. Through this technique, it has been possible to identify functionally distinct intra-graft motility patterns of responding T cells, as well as the importance of chemokine signaling in situ for T cell activation. The detailed study of ocular autoimmunity could provide novel therapeutic strategies for blinding diseases while also providing more general information on acute versus chronic inflammation. Copyright © 2013 Elsevier Ltd. All rights reserved.
Host-pathogen interaction in Fusarium oxysporum infections: where do we stand?
Husaini, Amjad M; Sakina, Aafreen; Cambay, Souliha R
2018-03-16
Fusarium oxysporum, a ubiquitous soil-borne pathogen causes devastating vascular wilt in more than 100 plant species and ranks fifth among top ten fungal plant pathogens. It has emerged as a human pathogen too, causing infections in immune-compromised patients. It is, therefore, important to gain insight into the molecular processes involved in the pathogenesis of this trans-kingdom pathogen. A complex network comprising of interconnected and over lapping signal pathways; mitogen-activated protein kinase (MAPK) signaling pathways, Ras proteins, G-protein signaling components and their downstream pathways, components of the velvet (LaeA/VeA/VelB) complex and cAMP pathways, is involved in perceiving the host. This network regulates the expression of various pathogenicity genes. Plants have however evolved an elaborate protection system to combat this attack. They too possess intricate mechanisms at molecular level, which once triggered by pathogen attack transduce signals to activate defense response. This review focuses on understanding and presenting a wholistic picture of the molecular mechanisms of F. oxysporum-host interactions in plant immunity.
Molecular mechanisms of Ebola virus pathogenesis: focus on cell death
Falasca, L; Agrati, C; Petrosillo, N; Di Caro, A; Capobianchi, M R; Ippolito, G; Piacentini, M
2015-01-01
Ebola virus (EBOV) belongs to the Filoviridae family and is responsible for a severe disease characterized by the sudden onset of fever and malaise accompanied by other non-specific signs and symptoms; in 30–50% of cases hemorrhagic symptoms are present. Multiorgan dysfunction occurs in severe forms with a mortality up to 90%. The EBOV first attacks macrophages and dendritic immune cells. The innate immune reaction is characterized by a cytokine storm, with secretion of numerous pro-inflammatory cytokines, which induces a huge number of contradictory signals and hurts the immune cells, as well as other tissues. Other highly pathogenic viruses also trigger cytokine storms, but Filoviruses are thought to be particularly lethal because they affect a wide array of tissues. In addition to the immune system, EBOV attacks the spleen and kidneys, where it kills cells that help the body to regulate its fluid and chemical balance and that make proteins that help the blood to clot. In addition, EBOV causes liver, lungs and kidneys to shut down their functions and the blood vessels to leak fluid into surrounding tissues. In this review, we analyze the molecular mechanisms at the basis of Ebola pathogenesis with a particular focus on the cell death pathways induced by the virus. We also discuss how the treatment of the infection can benefit from the recent experience of blocking/modulating cell death in human degenerative diseases. PMID:26024394
Molecular mechanisms of Ebola virus pathogenesis: focus on cell death.
Falasca, L; Agrati, C; Petrosillo, N; Di Caro, A; Capobianchi, M R; Ippolito, G; Piacentini, M
2015-08-01
Ebola virus (EBOV) belongs to the Filoviridae family and is responsible for a severe disease characterized by the sudden onset of fever and malaise accompanied by other non-specific signs and symptoms; in 30-50% of cases hemorrhagic symptoms are present. Multiorgan dysfunction occurs in severe forms with a mortality up to 90%. The EBOV first attacks macrophages and dendritic immune cells. The innate immune reaction is characterized by a cytokine storm, with secretion of numerous pro-inflammatory cytokines, which induces a huge number of contradictory signals and hurts the immune cells, as well as other tissues. Other highly pathogenic viruses also trigger cytokine storms, but Filoviruses are thought to be particularly lethal because they affect a wide array of tissues. In addition to the immune system, EBOV attacks the spleen and kidneys, where it kills cells that help the body to regulate its fluid and chemical balance and that make proteins that help the blood to clot. In addition, EBOV causes liver, lungs and kidneys to shut down their functions and the blood vessels to leak fluid into surrounding tissues. In this review, we analyze the molecular mechanisms at the basis of Ebola pathogenesis with a particular focus on the cell death pathways induced by the virus. We also discuss how the treatment of the infection can benefit from the recent experience of blocking/modulating cell death in human degenerative diseases.
Eberhardt, Martin; Lai, Xin; Tomar, Namrata; Gupta, Shailendra; Schmeck, Bernd; Steinkasserer, Alexander; Schuler, Gerold; Vera, Julio
2016-01-01
The understanding of the immune response is right now at the center of biomedical research. There are growing expectations that immune-based interventions will in the midterm provide new, personalized, and targeted therapeutic options for many severe and highly prevalent diseases, from aggressive cancers to infectious and autoimmune diseases. To this end, immunology should surpass its current descriptive and phenomenological nature, and become quantitative, and thereby predictive.Immunology is an ideal field for deploying the tools, methodologies, and philosophy of systems biology, an approach that combines quantitative experimental data, computational biology, and mathematical modeling. This is because, from an organism-wide perspective, the immunity is a biological system of systems, a paradigmatic instance of a multi-scale system. At the molecular scale, the critical phenotypic responses of immune cells are governed by large biochemical networks, enriched in nested regulatory motifs such as feedback and feedforward loops. This network complexity confers them the ability of highly nonlinear behavior, including remarkable examples of homeostasis, ultra-sensitivity, hysteresis, and bistability. Moving from the cellular level, different immune cell populations communicate with each other by direct physical contact or receiving and secreting signaling molecules such as cytokines. Moreover, the interaction of the immune system with its potential targets (e.g., pathogens or tumor cells) is far from simple, as it involves a number of attack and counterattack mechanisms that ultimately constitute a tightly regulated multi-feedback loop system. From a more practical perspective, this leads to the consequence that today's immunologists are facing an ever-increasing challenge of integrating massive quantities from multi-platforms.In this chapter, we support the idea that the analysis of the immune system demands the use of systems-level approaches to ensure the success in the search for more effective and personalized immune-based therapies.
Li, Shuyu; Wang, Bao; Huang, Tingting; Du, Minmin; Sun, Jiaqiang; Kang, Le; Li, Chang-Bao; Li, Chuanyou
2013-01-01
In response to insect attack and mechanical wounding, plants activate the expression of genes involved in various defense-related processes. A fascinating feature of these inducible defenses is their occurrence both locally at the wounding site and systemically in undamaged leaves throughout the plant. Wound-inducible proteinase inhibitors (PIs) in tomato (Solanum lycopersicum) provide an attractive model to understand the signal transduction events leading from localized injury to the systemic expression of defense-related genes. Among the identified intercellular molecules in regulating systemic wound response of tomato are the peptide signal systemin and the oxylipin signal jasmonic acid (JA). The systemin/JA signaling pathway provides a unique opportunity to investigate, in a single experimental system, the mechanism by which peptide and oxylipin signals interact to coordinate plant systemic immunity. Here we describe the characterization of the tomato suppressor of prosystemin-mediated responses8 (spr8) mutant, which was isolated as a suppressor of (pro)systemin-mediated signaling. spr8 plants exhibit a series of JA-dependent immune deficiencies, including the inability to express wound-responsive genes, abnormal development of glandular trichomes, and severely compromised resistance to cotton bollworm (Helicoverpa armigera) and Botrytis cinerea. Map-based cloning studies demonstrate that the spr8 mutant phenotype results from a point mutation in the catalytic domain of TomLoxD, a chloroplast-localized lipoxygenase involved in JA biosynthesis. We present evidence that overexpression of TomLoxD leads to elevated wound-induced JA biosynthesis, increased expression of wound-responsive genes and, therefore, enhanced resistance to insect herbivory attack and necrotrophic pathogen infection. These results indicate that TomLoxD is involved in wound-induced JA biosynthesis and highlight the application potential of this gene for crop protection against insects and pathogens. PMID:24348260
Yan, Liuhua; Zhai, Qingzhe; Wei, Jianing; Li, Shuyu; Wang, Bao; Huang, Tingting; Du, Minmin; Sun, Jiaqiang; Kang, Le; Li, Chang-Bao; Li, Chuanyou
2013-01-01
In response to insect attack and mechanical wounding, plants activate the expression of genes involved in various defense-related processes. A fascinating feature of these inducible defenses is their occurrence both locally at the wounding site and systemically in undamaged leaves throughout the plant. Wound-inducible proteinase inhibitors (PIs) in tomato (Solanum lycopersicum) provide an attractive model to understand the signal transduction events leading from localized injury to the systemic expression of defense-related genes. Among the identified intercellular molecules in regulating systemic wound response of tomato are the peptide signal systemin and the oxylipin signal jasmonic acid (JA). The systemin/JA signaling pathway provides a unique opportunity to investigate, in a single experimental system, the mechanism by which peptide and oxylipin signals interact to coordinate plant systemic immunity. Here we describe the characterization of the tomato suppressor of prosystemin-mediated responses8 (spr8) mutant, which was isolated as a suppressor of (pro)systemin-mediated signaling. spr8 plants exhibit a series of JA-dependent immune deficiencies, including the inability to express wound-responsive genes, abnormal development of glandular trichomes, and severely compromised resistance to cotton bollworm (Helicoverpa armigera) and Botrytis cinerea. Map-based cloning studies demonstrate that the spr8 mutant phenotype results from a point mutation in the catalytic domain of TomLoxD, a chloroplast-localized lipoxygenase involved in JA biosynthesis. We present evidence that overexpression of TomLoxD leads to elevated wound-induced JA biosynthesis, increased expression of wound-responsive genes and, therefore, enhanced resistance to insect herbivory attack and necrotrophic pathogen infection. These results indicate that TomLoxD is involved in wound-induced JA biosynthesis and highlight the application potential of this gene for crop protection against insects and pathogens.
One of the hallmarks of cancer that is now more clearly recognized is tumors’ ability to avoid recognition and destruction by the immune system. A novel class of treatments, dubbed immunotherapy, attempts to overcome this aspect by stimulating the immune system to attack cancer cells. The cytokine interleukin-2 (IL-2), which is approved for the treatment of renal cancer and melanoma, is the prototypic immunotherapy. Treatment with IL-2 enhances the proliferation of effector immune cells, such as cytotoxic T lymphocytes and natural killer (NK) cells. Unfortunately, IL-2 also exerts immunosuppressive activity through maintenance of regulatory T cells and activation-induced cell death. The related cytokine, interleukin-15 (IL-15), displays similar immune cell stimulatory activity, but without the inhibitory effects of IL-2. These findings, suggest that IL-15 may have greater potential as an immunotherapeutic agent and is consistent with the results seen in melanoma and prostate and colon cancer mouse models.
The "Trojan Horse" approach to tumor immunotherapy: targeting the tumor microenvironment.
Nelson, Delia; Fisher, Scott; Robinson, Bruce
2014-01-01
Most anticancer therapies including immunotherapies are given systemically; yet therapies given directly into tumors may be more effective, particularly those that overcome natural suppressive factors in the tumor microenvironment. The "Trojan Horse" approach of intratumoural delivery aims to promote immune-mediated destruction by inducing microenvironmental changes within the tumour at the same time as avoiding the systemic toxicity that is often associated with more "full frontal" treatments such as transfer of large numbers of laboratory-expanded tumor-specific cytotoxic T lymphocytes or large intravenous doses of cytokine. Numerous studies have demonstrated that intratumoural therapy has the capacity to minimizing local suppression, inducing sufficient "dangerous" tumor cell death to cross-prime strong immune responses, and rending tumor blood vessels amenable to immune cell traffic to induce effector cell changes in secondary lymphoid organs. However, the key to its success is the design of a sound rational approach based on evidence. There is compelling preclinical data for local immunotherapy approaches in tumor immunology. This review summarises how immune events within a tumour can be modified by local approaches, how this can affect systemic antitumor immunity such that distal sites are attacked, and what approaches have been proven most successful so far in animals and patients.
ImmuneQuest: Assessment of a Video Game as a Supplement to an Undergraduate Immunology Course.
Raimondi, Stacey L
2016-05-01
The study of immunology, particularly in this day and age, is an integral aspect of the training of future biologists, especially health professionals. Unfortunately, many students lose interest in or lack true comprehension of immunology due to the jargon of the field, preventing them from gaining a true conceptual understanding that is essential to all biological learning. To that end, a new video game, ImmuneQuest, has been developed that allows undergraduate students to "be" cells in the immune system, finding and attacking pathogens, while answering questions to earn additional abilities. The ultimate goal of ImmuneQuest is to allow students to understand how the major cells in the immune system work together to fight disease, rather than focusing on them as separate entities as is more commonly done in lecture material. This work provides the first assessment of ImmuneQuest in an upper-level immunology course. Students had significant gains in learning of information presented in ImmuneQuest compared with information discussed in lecture only. Furthermore, while students found the game "frustrating" at times, they agreed that the game aided their learning and recommended it for future courses. Taken together, these results suggest that ImmuneQuest appears to be a useful tool to supplement lecture material and increase student learning and comprehension.
Current immunotherapeutic strategies in pancreatic cancer.
Plate, Janet M D
2007-10-01
The immune systems of patients with newly diagnosed pancreatic cancers are functional, with T-cell responses capable of responding to tumor antigen presentation. Pancreatic tumors have been demonstrated to express tumor antigens as mutated, altered, underglycosylated and/or inappropriately overexpressed proteins. Considering these two facts, it should be possible for patients' bodies to recognize their tumors as foreign and to reject them. A number of clinical trials have been initiated to exploit this immune activation to eradicate or stabilize tumor growth. Immunotherapeutic trials include the specific testing of a variety of tumor vaccines, of cytokines as adjuvants or directed cytotoxicity, and of monoclonal antibodies to target specific molecules. This article reviews evidence for immune-cell activation and function in patients with pancreatic cancer, and evidence that pancreatic tumor cells express tumor antigens, or mutated (or altered) proteins. Nevertheless, tumors survive immune attacks by producing products that help them to circumvent effector T cells. The article thus examines complications of immune evasion by cancer cells, as well as the challenges of trying to exploit the immune system in solid tumors where tumor cell products can turn off invading immune T cells set to kill them. Finally, the article discusses the choices of a variety of clinical trials using immune modulation for patients with pancreatic cancer.
Secure VM for Monitoring Industrial Process Controllers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dasgupta, Dipankar; Ali, Mohammad Hassan; Abercrombie, Robert K
2011-01-01
In this paper, we examine the biological immune system as an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial counterpart. Our study focuses on building an autonomic defense system, using some immunological metaphors for information gathering, analyzing, decision making and launching threat and attack responses. In order to detection Stuxnet like malware, we propose to include a secure VM (or dedicatedmore » host) to the SCADA Network to monitor behavior and all software updates. This on-going research effort is not to mimic the nature but to explore and learn valuable lessons useful for self-adaptive cyber defense systems.« less
Paraneoplastic neurological syndromes
Leypoldt, F; Wandinger, K-P
2014-01-01
Paraneoplastic neurological syndromes are immune-mediated erroneous attacks on the central or peripheral nervous systems, or both, directed originally against the tumour itself. They have been known for more than 40 years, but recently the discovery of new subgroups of paraneoplastic encephalitis syndromes with a remarkably good response to immune therapy has ignited new clinical and scientific interest. Knowledge of these subgroups and their associated autoantibodies is important in therapeutic decision-making. However, the abundance of new autoantibodies and syndromes can be confusing. This review paper summarizes current knowledge and new developments in the field of paraneoplastic neurological syndromes, their classification, pathophysiology and treatment. PMID:23937626
Immune effector mechanisms against schistosomiasis: looking for a chink in the parasite's armour
Wilson, R Alan; Coulson, Patricia S
2009-01-01
A recombinant antigen vaccine against Schistosoma mansoni remains elusive, in part because the parasite deploys complex defensive and offensive strategies to combat immune attack. Nevertheless, research on rodent and primate models has shown that schistosomes can be defeated when appropriate responses are elicited. Acquired protection appears to involve protracted inhibition of larval migration or key molecular processes at the adult surfaces, not rapid cytolytic killing mechanisms. A successful vaccine will likely require a cocktail of antigens rather than a single recombinant protein. In addition, ways need to be found of keeping the immune system on permanent alert, either to achieve adequate inhibition of protein function in adults, or because a trickle of incoming parasites does not amplify the secondary response. PMID:19717340
Macrophages and the Viral Dissemination Super Highway
Klepper, Arielle; Branch, Andrea D
2016-01-01
Monocytes and macrophages are key components of the innate immune system yet they are often the victims of attack by infectious agents. This review examines the significance of viral infection of macrophages. The central hypothesis is that macrophage tropism enhances viral dissemination and persistence, but these changes may come at the cost of reduced replication in cells other than macrophages. PMID:26949751
Immune Deficiency State in a Girl with Eczema and Low Serum IgM
Evans, D. I. K.; Holzel, A.
1970-01-01
This report concerns an immune deficiency disorder in a girl with eczema. She has had recurrent infections including three severe attacks of herpes simplex and five attacks of pneumococcal meningitis. There is a moderate lymphopenia, dysgammaglobulinaemia with high IgG, high IgA, and low IgM; lymphocyte transformation with phytohaemagglutinin is impaired. Production of circulating antibody is abnormal, as are delayed hypersensitivity reactions. Although there is no thrombocytopenia, the resemblance to the Wiskott-Aldrich syndrome is discussed. ImagesFIG. 1.FIG. 2.FIG. 3 PMID:5506938
Salazar-Jaramillo, Laura; Jalvingh, Kirsten M; de Haan, Ammerins; Kraaijeveld, Ken; Buermans, Henk; Wertheim, Bregje
2017-04-27
Parasitoid resistance in Drosophila varies considerably, among and within species. An immune response, lamellocyte-mediated encapsulation, evolved in a subclade of Drosophila and was subsequently lost in at least one species within this subclade. While the mechanisms of resistance are fairly well documented in D. melanogaster, much less is known for closely related species. Here, we studied the inter- and intra-species variation in gene expression after parasitoid attack in Drosophila. We used RNA-seq after parasitization of four closely related Drosophila species of the melanogaster subgroup and replicated lines of D. melanogaster experimentally selected for increased resistance to gain insights into short- and long-term evolutionary changes. We found a core set of genes that are consistently up-regulated after parasitoid attack in the species and lines tested, regardless of their level of resistance. Another set of genes showed no up-regulation or expression in D. sechellia, the species unable to raise an immune response against parasitoids. This set consists largely of genes that are lineage-restricted to the melanogaster subgroup. Artificially selected lines did not show significant differences in gene expression with respect to non-selected lines in their responses to parasitoid attack, but several genes showed differential exon usage. We showed substantial similarities, but also notable differences, in the transcriptional responses to parasitoid attack among four closely related Drosophila species. In contrast, within D. melanogaster, the responses were remarkably similar. We confirmed that in the short-term, selection does not act on a pre-activation of the immune response. Instead it may target alternative mechanisms such as differential exon usage. In the long-term, we found support for the hypothesis that the ability to immunologically resist parasitoid attack is contingent on new genes that are restricted to the melanogaster subgroup.
... are now immunized that diphtheria was forced to change its plan of attack. The disease now targets adults who have not had the ... but attacks can happen anytime, especially in warmer climates. Criminal Record Years ago, diphtheria was a common disease among children. And, it was also a common ...
Genetic alterations and tumor immune attack in Yo paraneoplastic cerebellar degeneration.
Small, Mathilde; Treilleux, Isabelle; Couillault, Coline; Pissaloux, Daniel; Picard, Géraldine; Paindavoine, Sandrine; Attignon, Valery; Wang, Qing; Rogemond, Véronique; Lay, Stéphanie; Ray-Coquard, Isabelle; Pfisterer, Jacobus; Joly, Florence; Du Bois, Andreas; Psimaras, Dimitri; Bendriss-Vermare, Nathalie; Caux, Christophe; Dubois, Bertrand; Honnorat, Jérôme; Desestret, Virginie
2018-04-01
Paraneoplastic cerebellar degenerations with anti-Yo antibodies (Yo-PCD) are rare syndromes caused by an auto-immune response against neuronal antigens (Ags) expressed by tumor cells. However, the mechanisms responsible for such immune tolerance breakdown are unknown. We characterized 26 ovarian carcinomas associated with Yo-PCD for their tumor immune contexture and genetic status of the 2 onconeural Yo-Ags, CDR2 and CDR2L. Yo-PCD tumors differed from the 116 control tumors by more abundant T and B cells infiltration occasionally organized in tertiary lymphoid structures harboring CDR2L protein deposits. Immune cells are mainly in the vicinity of apoptotic tumor cells, revealing tumor immune attack. Moreover, contrary to un-selected ovarian carcinomas, 65% of our Yo-PCD tumors presented at least one somatic mutation in Yo-Ags, with a predominance of missense mutations. Recurrent gains of the CDR2L gene with tumor protein overexpression were also present in 59% of Yo-PCD patients. Overall, each Yo-PCD ovarian carcinomas carried at least one genetic alteration of Yo-Ags. These data demonstrate an association between massive infiltration of Yo-PCD tumors by activated immune effector cells and recurrent gains and/or mutations in autoantigen-encoding genes, suggesting that genetic alterations in tumor cells trigger immune tolerance breakdown and initiation of the auto-immune disease.
Rainer, Johannes; Rambach, Günter; Kaltseis, Josef; Hagleitner, Magdalena; Heiss, Silvia; Speth, Cornelia
2011-10-01
Representatives of the genus Pseudallescheria (anamorph: Scedosporium) are saprobes and the aetiologic agent of invasive mycosis in humans. After dissemination, the central nervous system (CNS) is one of the most affected organs. Prerequisites for the survival of Pseudallescheria/Scedosporium in the host are the ability to acquire nutrients and to evade the immune attack. The cleavage of complement compounds via the secretion of fungal proteases might meet both challenges since proteolytic degradation of proteins can provide nutrients and destroy the complement factors, a fast and effective immune weapon in the CNS. Therefore, we studied the capacity of different Pseudallescheria/Scedosporium species to degrade key elements of the complement cascade in the cerebrospinal fluid and investigated a correlation with the phylogenetic background. The majority of the Pseudallescheria apiosperma isolates tested were demonstrated to efficiently eliminate proteins like complement factors C3 and C1q, thus affecting two main components of a functional complement cascade, presumably by proteolytic degradation, and using them as nutrient source. In contrast, the tested strains of Pseudallescheria boydii have no or only weak capacity to eliminate these complement proteins. We hypothesise that the ability of Pseudallescheria/Scedosporium strains to acquire nutrients and to undermine the complement attack is at least partly phylogenetically determined. © 2011 Blackwell Verlag GmbH.
Development of an Aotus nancymaae Model for Shigella Vaccine Immunogenicity and Efficacy Studies
Gregory, Michael; Lugo-Roman, Luis A.; Galvez Carrillo, Hugo; Tilley, Drake Hamilton; Baldeviano, Christian; Simons, Mark P.; Reynolds, Nathanael D.; Ranallo, Ryan T.; Suvarnapunya, Akamol E.; Venkatesan, Malabi M.; Oaks, Edwin V.
2014-01-01
Several animal models exist to evaluate the immunogenicity and protective efficacy of candidate Shigella vaccines. The two most widely used nonprimate models for vaccine development include a murine pulmonary challenge model and a guinea pig keratoconjunctivitis model. Nonhuman primate models exhibit clinical features and gross and microscopic colonic lesions that mimic those induced in human shigellosis. Challenge models for enterotoxigenic Escherichia coli (ETEC) and Campylobacter spp. have been successfully developed with Aotus nancymaae, and the addition of a Shigella-Aotus challenge model would facilitate the testing of combination vaccines. A series of experiments were designed to identify the dose of Shigella flexneri 2a strain 2457T that induces an attack rate of 75% in the Aotus monkey. After primary challenge, the dose required to induce an attack rate of 75% was calculated to be 1 × 1011 CFU. Shigella-specific immune responses were low after primary challenge and subsequently boosted upon rechallenge. However, preexisting immunity derived from the primary challenge was insufficient to protect against the homologous Shigella serotype. A successive study in A. nancymaae evaluated the ability of multiple oral immunizations with live-attenuated Shigella vaccine strain SC602 to protect against challenge. After three oral immunizations, animals were challenged with S. flexneri 2a 2457T. A 70% attack rate was demonstrated in control animals, whereas animals immunized with vaccine strain SC602 were protected from challenge (efficacy of 80%; P = 0.05). The overall study results indicate that the Shigella-Aotus nancymaae challenge model may be a valuable tool for evaluating vaccine efficacy and investigating immune correlates of protection. PMID:24595138
ERIC Educational Resources Information Center
Adesina, Modupe Olutayo
2015-01-01
This paper attempted to look at the Trado-cultural practices in the spread of HIV/AIDS in Nigeria. Human Immunodeficiency Virus (HIV) is virus that gradually attack and weaken the body immune system, whose task is to fight off infections and illness. Eventually, the body loses its ability to fight off and defend itself and thereby become…
Bartonella and Brucella—Weapons and Strategies for Stealth Attack
Ben-Tekaya, Houchaima; Gorvel, Jean-Pierre; Dehio, Christoph
2013-01-01
Bartonella spp. and Brucella spp. are closely related α-proteobacterial pathogens that by distinct stealth-attack strategies cause chronic infections in mammals including humans. Human infections manifest by a broad spectrum of clinical symptoms, ranging from mild to fatal disease. Both pathogens establish intracellular replication niches and subvert diverse pathways of the host’s immune system. Several virulence factors allow them to adhere to, invade, proliferate, and persist within various host-cell types. In particular, type IV secretion systems (T4SS) represent essential virulence factors that transfer effector proteins tailored to recruit host components and modulate cellular processes to the benefit of the bacterial intruders. This article puts the remarkable features of these two pathogens into perspective, highlighting the mechanisms they use to hijack signaling and trafficking pathways of the host as the basis for their stealthy infection strategies. PMID:23906880
Di Rosso, María Emilia; Palumbo, María Laura; Genaro, Ana María
2016-07-01
Selective serotonin reuptake inhibitors are frequently used antidepressants. In particular, fluoxetine is usually chosen for the treatment of the symptoms of depression, obsessive-compulsive, panic attack and bulimia nervosa. Antidepressant therapy has been associated with immune dysfunction. However, there is contradictory evidence about the effect of fluoxetine on the immune system. Experimental findings indicate that lymphocytes express the serotonin transporter. Moreover it has been shown that fluoxetine is able to modulate the immune function through a serotonin-dependent pathway and through a novel independent mechanism. In addition, several studies have shown that fluoxetine can alter tumor cell viability. Thus, it was recently demonstrated in vivo that chronic fluoxetine treatment inhibits tumor growth by increasing antitumor T-cell activity. Here we briefly review some of the literature referring to how fluoxetine is able to modify, for better or worse, the functionality of the immune system. These results of our analysis point to the relevance of the novel pharmacological action of this drug as an immunomodulator helping to treat several pathologies in which immune deficiency and/or deregulation is present. Copyright © 2015 Elsevier Ltd. All rights reserved.
Functions of Calcium-Dependent Protein Kinases in Plant Innate Immunity
Gao, Xiquan; Cox, Kevin L.; He, Ping
2014-01-01
An increase of cytosolic Ca2+ is generated by diverse physiological stimuli and stresses, including pathogen attack. Plants have evolved two branches of the immune system to defend against pathogen infections. The primary innate immune response is triggered by the detection of evolutionarily conserved pathogen-associated molecular pattern (PAMP), which is called PAMP-triggered immunity (PTI). The second branch of plant innate immunity is triggered by the recognition of specific pathogen effector proteins and known as effector-triggered immunity (ETI). Calcium (Ca2+) signaling is essential in both plant PTI and ETI responses. Calcium-dependent protein kinases (CDPKs) have emerged as important Ca2+ sensor proteins in transducing differential Ca2+ signatures, triggered by PAMPs or effectors and activating complex downstream responses. CDPKs directly transmit calcium signals by calcium binding to the elongation factor (EF)-hand domain at the C-terminus and substrate phosphorylation by the catalytic kinase domain at the N-terminus. Emerging evidence suggests that specific and overlapping CDPKs phosphorylate distinct substrates in PTI and ETI to regulate diverse plant immune responses, including production of reactive oxygen species, transcriptional reprogramming of immune genes, and the hypersensitive response. PMID:27135498
McIlvried, Lisa A; Borghesi, Lisa A; Gold, Michael S
2015-01-01
Background Migraine attacks are associated with sterile inflammation of the dura. Immune cells are a primary source of inflammatory mediators, and we therefore sought to further explore the link between dural immune cells and migraine. Objective Based on the observations that migraine is more common in women than in men, stress is the most common trigger for a migraine attack, and sympathetic post-ganglionic innervation of the dura enables local control of dural immune cells, we hypothesized that stress shifts the balance of inflammatory mediator expression in dural immune cells toward those that trigger a migraine attack, where these changes are larger in females and dependent, at least in part, on sympathetic post-ganglionic innervation of the dura. Our objective was to test this hypothesis. Methods Dura were obtained from naïve or stressed, intact or surgically sympathectomized, adult male and female rats. Dura were assessed immediately or 24 hrs after termination of four continuous days of unpredictable, mild stressors. Following enzymatic digestion of each dura, myeloid and lymphoid derived dural immune cells were isolated by fluorescence activated cell sorting for semi-quantitative polymerase chain reaction analysis. Results In myeloid derived dural immune cells there was an increase in pro-inflammatory mediator mRNA following stress, particularly in females, which remained elevated with a 24 hr delay after stress. There was a stress-induced decrease in anti-inflammatory mediator mRNA immediately after stress in females, but not males. The stress-induced changes were attenuated in sympathectomized females. In lymphoid derived dural immune cells, there was a persistent increase in pro-inflammatory mediator mRNA following stress, particularly in females. A stress-induced increase in anti-inflammatory mediator mRNA was also observed in both males and females, and was further attenuated in sympathectomized females. Conclusions Consistent with our hypothesis, there is a stress-induced shift in the balance of pro- and anti-inflammatory mediator expression in dural immune cells that is more pronounced in females, and is dependent, at least in part, on sympathetic post-ganglionic innervation in females. This shift in the balance of inflammatory mediator expression may not only play an important role in triggering migraine attacks, but suggests it may be possible, if not necessary to employ different strategies to most effectively treat migraine in men and women. PMID:26126992
Oncolytic Immunotherapy for Treatment of Cancer.
Tsun, A; Miao, X N; Wang, C M; Yu, D C
2016-01-01
Immunotherapy entails the treatment of disease by modulation of the immune system. As detailed in the previous chapters, the different modes of achieving immune modulation are many, including the use of small/large molecules, cellular therapy, and radiation. Oncolytic viruses that can specifically attack, replicate within, and destroy tumors represent one of the most promising classes of agents for cancer immunotherapy (recently termed as oncolytic immunotherapy). The notion of oncolytic immunotherapy is considered as the way in which virus-induced tumor cell death (known as immunogenic cancer cell death (ICD)) allows the immune system to recognize tumor cells and provide long-lasting antitumor immunity. Both immune responses toward the virus and ICD together contribute toward successful antitumor efficacy. What is now becoming increasingly clear is that monotherapies, through any of the modalities detailed in this book, are neither sufficient in eradicating tumors nor in providing long-lasting antitumor immune responses and that combination therapies may deliver enhanced efficacy. After the rise of the genetic engineering era, it has been possible to engineer viruses to harbor combination-like characteristics to enhance their potency in cancer immunotherapy. This chapter provides a historical background on oncolytic virotherapy and its future application in cancer immunotherapy, especially as a combination therapy with other treatment modalities.
Protein-linked glycans in periodontal bacteria: prevalence and role at the immune interface.
Settem, Rajendra P; Honma, Kiyonobu; Stafford, Graham P; Sharma, Ashu
2013-10-17
Protein modification with complex glycans is increasingly being recognized in many pathogenic and non-pathogenic bacteria, and is now thought to be central to the successful life-style of those species in their respective hosts. This review aims to convey current knowledge on the extent of protein glycosylation in periodontal pathogenic bacteria and its role in the modulation of the host immune responses. The available data show that surface glycans of periodontal bacteria orchestrate dendritic cell cytokine responses to drive T cell immunity in ways that facilitate bacterial persistence in the host and induce periodontal inflammation. In addition, surface glycans may help certain periodontal bacteria protect against serum complement attack or help them escape immune detection through glycomimicry. In this review we will focus mainly on the generalized surface-layer protein glycosylation system of the periodontal pathogen Tannerella forsythia in shaping innate and adaptive host immunity in the context of periodontal disease. In addition, we will also review the current state of knowledge of surface protein glycosylation and its potential for immune modulation in other periodontal pathogens.
The pancreas, a large gland that sits behind the stomach, produces enzymes that aid digestion and hormones that regulate blood sugar. Pancreatic cancer develops when cells that make up the ducts in the pancreas start to grow out of control. Udo Rudloff, M.D., is leading a clinical trial of a combination immunotherapy regimen to optimally help the immune system attack the tumor.
A new study published August 10, 2017, in Molecular Cell reveals how changes in the architecture of the nucleus can enable B lymphocytes to spring to action during an immune system attack and help fight infection. The discovery could lead scientists to a better understanding of how some tumor cells, especially blood cancer cells, make similar transitions from a dormant to an
Gérardin, Patrick; Guernier, Vanina; Perrau, Joëlle; Fianu, Adrian; Le Roux, Karin; Grivard, Philippe; Michault, Alain; de Lamballerie, Xavier; Flahault, Antoine; Favier, François
2008-01-01
Background Chikungunya virus (CHIKV) caused a major two-wave seventeen-month-long outbreak in La Réunion Island in 2005–2006. The aim of this study was to refine clinical estimates provided by a regional surveillance-system using a two-stage serological assessment as gold standard. Methods Two serosurveys were implemented: first, a rapid survey using stored sera of pregnant women, in order to assess the attack rate at the epidemic upsurge (s1, February 2006; n = 888); second, a population-based survey among a random sample of the community, to assess the herd immunity in the post-epidemic era (s2, October 2006; n = 2442). Sera were screened for anti-CHIKV specific antibodies (IgM and IgG in s1, IgG only in s2) using enzyme-linked immunosorbent assays. Seroprevalence rates were compared to clinical estimates of attack rates. Results In s1, 18.2% of the pregnant women were tested positive for CHIKV specific antibodies (13.8% for both IgM and IgG, 4.3% for IgM, 0.1% for IgG only) which provided a congruent estimate with the 16.5% attack rate calculated from the surveillance-system. In s2, the seroprevalence in community was estimated to 38.2% (95% CI, 35.9 to 40.6%). Extrapolations of seroprevalence rates led to estimate, at 143,000 and at 300,000 (95% CI, 283,000 to 320,000), the number of people infected in s1 and in s2, respectively. In comparison, the surveillance-system estimated at 130,000 and 266,000 the number of people infected for the same periods. Conclusion A rapid serosurvey in pregnant women can be helpful to assess the attack rate when large seroprevalence studies cannot be done. On the other hand, a population-based serosurvey is useful to refine the estimate when clinical diagnosis underestimates it. Our findings give valuable insights to assess the herd immunity along the course of epidemics. PMID:18662384
Cannabinoids inhibit neurodegeneration in models of multiple sclerosis.
Pryce, Gareth; Ahmed, Zubair; Hankey, Deborah J R; Jackson, Samuel J; Croxford, J Ludovic; Pocock, Jennifer M; Ledent, Catherine; Petzold, Axel; Thompson, Alan J; Giovannoni, Gavin; Cuzner, M Louise; Baker, David
2003-10-01
Multiple sclerosis is increasingly being recognized as a neurodegenerative disease that is triggered by inflammatory attack of the CNS. As yet there is no satisfactory treatment. Using experimental allergic encephalo myelitis (EAE), an animal model of multiple sclerosis, we demonstrate that the cannabinoid system is neuroprotective during EAE. Mice deficient in the cannabinoid receptor CB1 tolerate inflammatory and excitotoxic insults poorly and develop substantial neurodegeneration following immune attack in EAE. In addition, exogenous CB1 agonists can provide significant neuroprotection from the consequences of inflammatory CNS disease in an experimental allergic uveitis model. Therefore, in addition to symptom management, cannabis may also slow the neurodegenerative processes that ultimately lead to chronic disability in multiple sclerosis and probably other diseases.
Experimental Measurement-Device-Independent Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S.; Fejer, M. M.; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei
2013-09-01
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.
Experimental measurement-device-independent quantum key distribution.
Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S; Fejer, M M; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei
2013-09-27
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.
NASA Astrophysics Data System (ADS)
Coelho, Flavio Codeço; Carvalho, Luiz Max De
2015-12-01
Quantifying the attack ratio of disease is key to epidemiological inference and public health planning. For multi-serotype pathogens, however, different levels of serotype-specific immunity make it difficult to assess the population at risk. In this paper we propose a Bayesian method for estimation of the attack ratio of an epidemic and the initial fraction of susceptibles using aggregated incidence data. We derive the probability distribution of the effective reproductive number, Rt, and use MCMC to obtain posterior distributions of the parameters of a single-strain SIR transmission model with time-varying force of infection. Our method is showcased in a data set consisting of 18 years of dengue incidence in the city of Rio de Janeiro, Brazil. We demonstrate that it is possible to learn about the initial fraction of susceptibles and the attack ratio even in the absence of serotype specific data. On the other hand, the information provided by this approach is limited, stressing the need for detailed serological surveys to characterise the distribution of serotype-specific immunity in the population.
Zheng, Yadong
2013-11-01
Echinococcus species have been studied as a model to investigate parasite-host interactions. Echinococcus spp. can actively communicate dynamically with a host to facilitate infection, growth and proliferation partially via secretion of molecules, especially in terms of harmonization of host immune attacks. This review systematically outlines our current knowledge of how the Echinococcus species have evolved to adapt to their host's microenvironment. This understanding of parasite-host interplay has implications in profound appreciation of parasite plasticity and is informative in designing novel and effective tools including vaccines and drugs for the treatment of echinococcosis and other diseases. © 2013.
Scurfy mice: A model for autoimmune disease
DOE Office of Scientific and Technical Information (OSTI.GOV)
Godfrey, V.L.
1993-01-01
Autoimmune disease-the condition in which the body attacks its own tissue-has been an object of public concern recently. Former President George Bush and his wife Barbara both are afflicted with Graves' disease in which the body's own immune system attakcs the thyroid gland. The safety of breast implants was called into question because of evidence that some recipients had developed autoimmune disorders such a rheumatoid arthritis, systemic lupus erythematosus, and scleroderma. Women, the media pointed out, have a higher-than-average incidence of many autoimmune disorders. These events suggest the need to know more about what makes the immune system work somore » well and what makes it go awry. At ORNL's Biology Division, progress is being in understanding the underlying causes of immune disease by studying mice having a disease that causes them to be underdeveloped; to have scaly skin, small ears, and large spleens; to open their eyes late; and to die early. These [open quotes]scurfy[close quotes]mice are helping us better understand the role of the thymus gland in autoimmune disease.« less
Security challenge to using smartphones for SHM
NASA Astrophysics Data System (ADS)
Abueh, Yeka; Liu, Hong
2016-04-01
Pervasive smartphones have demonstrated great potential in structural health monitoring (SHM) of civil infrastructures. Their sensing, processing, and communication capabilities along with crowdsourcing facility ease technical difficulties and reduce financial burdens of instrumentation and monitoring for SHM in civil infrastructures. However, smartphones are vulnerable to unintentional misuses and malicious attacks. This paper analyzes the vulnerabilities of smartphones in performing SHM and reveals the exploitation of those vulnerabilities. The work probes the attack surface of both devices and data. Device attack scenarios include hacking individual smartphones to modify the data stored on them and orchestrating smartphones to launch a distributed denial-of-service attack. Specifically, experiments are conducted to remotely access an Android smartphone and modify the sensing data of structural health stored on it. The work also presents a case study that reveals the sensitivity of a popular perturbation analysis method to faulty data delivered by a smartphone. The paper provides the direction of meeting the security challenge to using smartphones for SHM. As the first line of defense, device authentication is implemented in the smartphone to stop spoofing. Subsequently, message authentication is devised to maintain data integrity. There is a need to apply data science for the SHM immunity system against the sensitivity to data inaccuracy. The work also evaluates the cost-effectiveness of the proposed security measures, recommending varying levels of security to mitigate the adversaries to smartphones used in SHM systems. It calls for security solutions at the design stage of SHM systems rather than patching up after their implementations.
Hevein-Like Antimicrobial Peptides of Plants.
Slavokhotova, A A; Shelenkov, A A; Andreev, Ya A; Odintsova, T I
2017-12-01
Plant antimicrobial peptides represent one of the evolutionarily oldest innate immunity components providing the first line of host defense to pathogen attacks. This review is dedicated to a small, currently actively studied family of hevein-like peptides that can be found in various monocot and dicot plants. The review thoroughly describes all known peptides belonging to this family including data on their structures, functions, and antimicrobial activity. The main features allowing to assign these peptides to a separate family are given, and the specific characteristics of each peptide are described. Further, the mode of action for hevein-like peptides, their role in plant immune system, and the applications of these molecules in biotechnology and medicine are considered.
Pombo, Marina A; Zheng, Yi; Fernandez-Pozo, Noe; Dunham, Diane M; Fei, Zhangjun; Martin, Gregory B
2014-01-01
Plants have two related immune systems to defend themselves against pathogen attack. Initially,pattern-triggered immunity is activated upon recognition of microbe-associated molecular patterns by pattern recognition receptors. Pathogenic bacteria deliver effector proteins into the plant cell that interfere with this immune response and promote disease. However, some plants express resistance proteins that detect the presence of specific effectors leading to a robust defense response referred to as effector-triggered immunity. The interaction of tomato with Pseudomonas syringae pv. tomato is an established model system for understanding the molecular basis of these plant immune responses. We apply high-throughput RNA sequencing to this pathosystem to identify genes whose expression changes specifically during pattern-triggered or effector-triggered immunity. We then develop reporter genes for each of these responses that will enable characterization of the host response to the large collection of P. s. pv. tomato strains that express different combinations of effectors. Virus-induced gene silencing of 30 of the effector-triggered immunity-specific genes identifies Epk1 which encodes a predicted protein kinase from a family previously unknown to be involved in immunity. Knocked-down expression of Epk1 compromises effector-triggered immunity triggered by three bacterial effectors but not by effectors from non-bacterial pathogens. Epistasis experiments indicate that Epk1 acts upstream of effector-triggered immunity-associated MAP kinase signaling. Using RNA-seq technology we identify genes involved in specific immune responses. A functional genomics screen led to the discovery of Epk1, a novel predicted protein kinase required for plant defense activation upon recognition of three different bacterial effectors.
'Order from disorder sprung': recognition and regulation in the immune system
NASA Astrophysics Data System (ADS)
Mak, Tak W.
2003-06-01
Milton's epic poem Paradise lost supplies a colourful metaphor for the immune system and its responses to pathogens. With the role of Satan played by pathogens seeking to destroy the paradise of human health, GOD intervenes and imposes order out of chaos. In this context, GOD means 'generation of diversity': the capacity of the innate and specific immune responses to recognize and eliminate a universe of pathogens. Thus, the immune system can be thought of as an entity that self-assembles the elements required to combat bodily invasion and injury. In so doing, it brings to bear the power of specific recognition: the ability to distinguish self from non-self, and the threatening from the benign. This ability to define and protect self is evolutionarily very old. Self-recognition and biochemical and barrier defences can be detected in primitive organisms, and elements of these mechanisms are built upon in an orderly way to establish the mammalian immune system. Innate immune responses depend on the use of a limited number of germline-encoded receptors to recognize conserved molecular patterns that occur on the surfaces of a broad range of pathogens. The B and T lymphocytes of the specific immune response use complex gene-rearrangement machinery to generate a diversity of antigen receptors capable of recognizing any pathogen in the universe. Binding to receptors on both innate and specific immune-system cells triggers intricate intracellular signalling pathways that lead to new gene transcription and effector-cell activation. And yet, regulation is imposed on these responses so that Paradise is not lost to the turning of the immune system onto self-tissues, the spectre of autoimmunity. Lymphocyte activation requires multiple signals and intercellular interactions. Mechanisms exist to establish tolerance to self by the selection and elimination of cells recognizing self-antigens. Immune system cell populations are reduced by programmed cell death once the pathogen threat is resolved. Once Paradise has been regained, memory cells remain in the body to sharply reduce the impact of a second exposure to a pathogen. Vaccination programs take advantage of this capacity of the human immune system for immunological memory, sparing millions the suffering associated with disease scourges. Thus does the order of the immune response spring from the disorder of pathogen attacks, and thus is Paradise preserved.
'Order from disorder sprung': recognition and regulation in the immune system.
Mak, Tak W
2003-06-15
Milton's epic poem Paradise lost supplies a colourful metaphor for the immune system and its responses to pathogens. With the role of Satan played by pathogens seeking to destroy the paradise of human health, GOD intervenes and imposes order out of chaos. In this context, GOD means 'generation of diversity': the capacity of the innate and specific immune responses to recognize and eliminate a universe of pathogens. Thus, the immune system can be thought of as an entity that self-assembles the elements required to combat bodily invasion and injury. In so doing, it brings to bear the power of specific recognition: the ability to distinguish self from non-self, and the threatening from the benign. This ability to define and protect self is evolutionarily very old. Self-recognition and biochemical and barrier defences can be detected in primitive organisms, and elements of these mechanisms are built upon in an orderly way to establish the mammalian immune system. Innate immune responses depend on the use of a limited number of germline-encoded receptors to recognize conserved molecular patterns that occur on the surfaces of a broad range of pathogens. The B and T lymphocytes of the specific immune response use complex gene-rearrangement machinery to generate a diversity of antigen receptors capable of recognizing any pathogen in the universe. Binding to receptors on both innate and specific immune-system cells triggers intricate intracellular signalling pathways that lead to new gene transcription and effector-cell activation. And yet, regulation is imposed on these responses so that Paradise is not lost to the turning of the immune system onto self-tissues, the spectre of autoimmunity. Lymphocyte activation requires multiple signals and intercellular interactions. Mechanisms exist to establish tolerance to self by the selection and elimination of cells recognizing self-antigens. Immune system cell populations are reduced by programmed cell death once the pathogen threat is resolved. Once Paradise has been regained, memory cells remain in the body to sharply reduce the impact of a second exposure to a pathogen. Vaccination programs take advantage of this capacity of the human immune system for immunological memory, sparing millions the suffering associated with disease scourges. Thus does the order of the immune response spring from the disorder of pathogen attacks, and thus is Paradise preserved.
Effectiveness of previous mumps vaccination during a summer camp outbreak.
Schaffzin, Joshua K; Pollock, Lynn; Schulte, Cynthia; Henry, Kyle; Dayan, Gustavo; Blog, Debra; Smith, Perry
2007-10-01
Mumps is a vaccine-preventable disease that may cause outbreaks. In July 2005, an outbreak of mumps occurred during a children's summer camp in upstate New York. An investigation was initiated to describe the cases and evaluate vaccine effectiveness. A retrospective cohort study was conducted among 541 children from the United States and abroad who attended a 1- or 2-month overnight summer camp. Patients with mumps were interviewed; serologic analysis was conducted for 6 case patients. Vaccine effectiveness was calculated by retrospective review of immunization records for 507 attendees who were eligible for vaccination and had verified immunization history. Thirty-one camp attendees were identified as having mumps (attack rate: 5.7%); 5 (83%) of 6 patients tested had positivity for mumps immunoglobulin M. Of the 507 participants (including 29 patients) with available immunization history, 440 (including 16 [87%] patients) were 2-dose recipients of mumps vaccine (attack rate: 3.6%); 46 participants (including 4 [9%] patients) were 1-dose recipients (attack rate: 8.7%); and 21 (including 9 [4%] patients) were unvaccinated (attack rate: 42.9%). Vaccine effectiveness was 92% for 2 doses and 80% for 1 dose. Outbreaks of mumps in settings such as summer camps can occur despite high vaccination rates. Vaccine effectiveness for 2 mumps vaccinations was greater than vaccine effectiveness for 1 mumps vaccination. Therefore, recommendation of 2 mumps vaccinations for summer camp participants continues to be appropriate. Control of mumps disease relies on broad vaccination coupled with correct clinical diagnosis and strict control measures.
[Auto-immune disorders as a possible cause of neuropsychiatric syndromes].
Martinez-Martinez, P; Molenaar, P C; Losen, M; Hoffmann, C; Stevens, J; de Witte, L D; van Amelsvoort, T; van Os, J; Rutten, B P F
2015-01-01
Changes that occur in the behaviour of voltage-gated ion channels and ligand-gated receptor channels due to gene mutations or auto-immune attack are the cause of channelopathies in the central and peripheral nervous system. Although the relation between molecular channel defects and clinical symptoms has been explained in the case of many neuromuscular channelopathies, the pathophysiology of auto-immunity in neuropsychiatric syndromes is still unclear. To review recent findings regarding neuronal auto-immune reactions in severe neuropsychiatric syndromes. Using PubMed, we consulted the literature published between 1990 and August 2014 relating to the occurrence of auto-immune antibodies in severe and persistent neuropsychiatric syndromes. Auto-antibodies have only limited access to the central nervous system, but if they do enter the system they can, in some cases, cause disease. We discuss recent findings regarding the occurrence of auto-antibodies against ligand-activated receptor channels and potassium channels in neuropsychiatric and neurological syndromes, including schizophrenia and limbic encephalitis. Although the occurrence of several auto-antibodies in schizophrenia has been confirmed, there is still no proof of a causal relationship in the syndrome. We still have no evidence of the prevalence of auto-immunity in neuropsychiatric syndromes. The discovery that an antibody against an ion channel is associated with some neuropsychiatric disorders may mean that in future it will be possible to treat patients by means of immunosuppression, which could lead to an improvement in a patient's cognitive abilities.
A new study published August 10, 2017, in Molecular Cell reveals how changes in the architecture of the nucleus can enable B lymphocytes to spring to action during an immune system attack and help fight infection. The discovery could lead scientists to a better understanding of how some tumor cells, especially blood cancer cells, make similar transitions from a dormant to an active state. Read more. . .
The Kombucha mushroom, also known as Manchurian mushroom, is a mail-order product touted to lower blood pressure and raise T-cell counts. No controlled trials have been conducted to test these claims. Aspergillus, a mold that may grow on the Kombucha mushroom, attacks the brain and may be fatal to persons with weakened immune systems. Reported toxicity reactions have included stomach problems and yeast infections. Taking Kombucha in combination with other drugs may affect the drugs potency.
Hidaka, Yoshihiko; Inaba, Yuji; Matsuda, Kazuyuki; Itoh, Makoto; Kaneyama, Tomoki; Nakazawa, Yozo; Koh, Chang-Sung; Ichikawa, Motoki
2014-05-15
Multiple sclerosis (MS) is a chronic demyelinating disease often displaying a relapsing-remitting course of neurological manifestations that is mimicked by experimental autoimmune encephalomyelitis (EAE) in animal models of MS. In particular, NOD mice immunized with myelin oligodendrocyte glycoprotein peptide 35-55 develop chronic relapsing-remitting EAE (CREAE). To elucidate the mechanisms that cause MS relapse, we investigated the histopathology and cytokine production of spleen cells and mRNA expression levels in the central nervous system (CNS) of CREAE mice. During the first attack, inflammatory cell infiltration around small vessels and in the subarachnoid space was observed in the spinal cord. Spleen cell production and mRNA expression in the CNS of several cytokines, including IFN-γ, TNF-α, IL-6, IL-17, and CC chemokine ligand 2 (CCL2), were higher in CREAE mice than in controls. Afterwards, parenchymal infiltration and demyelination were observed histologically in the spinal cord and corresponded with the more severe clinical symptoms of the first and second relapses. IL-17 and CCL2, but not IFN-γ, TNF-α, or IL-6, were also produced by spleen cells during recurrences. Our results suggested that the immune mechanisms in relapses were different from those in the first attack for CREAE. Further investigation of CREAE mechanisms may provide important insights into successful therapies for human relapsing-remitting MS. Copyright © 2014 Elsevier B.V. All rights reserved.
Early growth response 2 and Egr3 are unique regulators in immune system.
Taefehshokr, Sina; Key, Yashar Azari; Khakpour, Mansour; Dadebighlu, Pourya; Oveisi, Amin
2017-01-01
The immune system is evolved to defend the body against pathogens and is composed of thousands of complicated and intertwined pathways, which are highly controlled by processes such as transcription and repression of cellular genes. Sometimes the immune system malfunctions and a break down in self-tolerance occurs. This lead to the inability to distinguish between self and non-self and cause attacks on host tissues, a condition also known as autoimmunity, which can result in chronic debilitating diseases. Early growth response genes are family of transcription factors comprising of four members, Egr1, Egr2, Egr3 and Egr4. All of which contain three cyc2-His2 zinc fingers. Initially, Egr2 function was identified in the regulation of peripheral nerve myelination, hindbrain segmentation. Egr3, on the other hand, is highly expressed in muscle spindle development. Egr2 and Egr3 are induced due to the antigen stimulation and this signaling is implemented through the B and T cell receptors in the adaptive immunity. T cell receptor signaling plays a key role in Egr 2 and 3 expressions via their interaction with NFAT molecules. Egr 2 and 3 play a crucial role in regulation of the immune system and their involvement in B and T cell activation, anergy induction and preventing the autoimmune disease has been investigated. The deficiency of these transcription factors has been associated to deficient Cbl-b expression, a resistant to anergy phenotype, and expression of effector and activated T cells.
Protein Poly(ADP-ribosyl)ation Regulates Arabidopsis Immune Gene Expression and Defense Responses
Feng, Baomin; Liu, Chenglong; de Oliveira, Marcos V. V.; Intorne, Aline C.; Li, Bo; Babilonia, Kevin; de Souza Filho, Gonçalo A.; Shan, Libo; He, Ping
2015-01-01
Perception of microbe-associated molecular patterns (MAMPs) elicits transcriptional reprogramming in hosts and activates defense to pathogen attacks. The molecular mechanisms underlying plant pattern-triggered immunity remain elusive. A genetic screen identified Arabidopsis poly(ADP-ribose) glycohydrolase 1 (atparg1) mutant with elevated immune gene expression upon multiple MAMP and pathogen treatments. Poly(ADP-ribose) glycohydrolase (PARG) is predicted to remove poly(ADP-ribose) polymers on acceptor proteins modified by poly(ADP-ribose) polymerases (PARPs) with three PARPs and two PARGs in Arabidopsis genome. AtPARP1 and AtPARP2 possess poly(ADP-ribose) polymerase activity, and the activity of AtPARP2 was enhanced by MAMP treatment. AtPARG1, but not AtPARG2, carries glycohydrolase activity in vivo and in vitro. Importantly, mutation (G450R) in atparg1 blocks its activity and the corresponding residue is highly conserved and essential for human HsPARG activity. Consistently, mutant atparp1atparp2 plants exhibited compromised immune gene activation and enhanced susceptibility to pathogen infections. Our study indicates that protein poly(ADP-ribosyl)ation plays critical roles in plant immune gene expression and defense to pathogen attacks. PMID:25569773
Endogenous small RNAs and antibacterial immunity in plants.
Jin, Hailing
2008-08-06
Small RNAs are non-coding regulatory RNA molecules that control gene expression by mediating mRNA degradation, translational inhibition, or chromatin modification. Virus-derived small RNAs induce silencing of viral RNAs and are essential for antiviral defense in both animal and plant systems. The role of host endogenous small RNAs on antibacterial immunity has only recently been recognized. Host disease resistance and defense responses are achieved by activation and repression of a large array of genes. Certain endogenous small RNAs in plants, including microRNAs (miRNAs) and small interfering RNAs (siRNAs), are induced or repressed in response to pathogen attack and subsequently regulate the expression of genes involved in disease resistance and defense responses by mediating transcriptional or post-transcriptional gene silencing. Thus, these small RNAs play an important role in gene expression reprogramming in plant disease resistance and defense responses. This review focuses on the recent findings of plant endogenous small RNAs in antibacterial immunity.
Lineweaver, Charles H.; Davies, Paul C.W.; Vincent, Mark D.
2014-01-01
In the atavistic model of cancer progression, tumor cell dedifferentiation is interpreted as a reversion to phylogenetically earlier capabilities. The more recently evolved capabilities are compromised first during cancer progression. This suggests a therapeutic strategy for targeting cancer: design challenges to cancer that can only be met by the recently evolved capabilities no longer functional in cancer cells. We describe several examples of this target-the-weakness strategy. Our most detailed example involves the immune system. The absence of adaptive immunity in immunosuppressed tumor environments is an irreversible weakness of cancer that can be exploited by creating a challenge that only the presence of adaptive immunity can meet. This leaves tumor cells more vulnerable than healthy tissue to pathogenic attack. Such a target-the-weakness therapeutic strategy has broad applications, and contrasts with current therapies that target the main strength of cancer: cell proliferation. PMID:25043755
General immunity and superadditivity of two-way Gaussian quantum cryptography.
Ottaviani, Carlo; Pirandola, Stefano
2016-03-01
We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks.
General immunity and superadditivity of two-way Gaussian quantum cryptography
Ottaviani, Carlo; Pirandola, Stefano
2016-01-01
We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks. PMID:26928053
NASA Astrophysics Data System (ADS)
de Santo, Carmela; Serafini, Paolo; Marigo, Ilaria; Dolcetti, Luigi; Bolla, Manlio; del Soldato, Piero; Melani, Cecilia; Guiducci, Cristiana; Colombo, Mario P.; Iezzi, Manuela; Musiani, Piero; Zanovello, Paola; Bronte, Vincenzo
2005-03-01
Active suppression of tumor-specific T lymphocytes can limit the immune-mediated destruction of cancer cells. Of the various strategies used by tumors to counteract immune attacks, myeloid suppressors recruited by growing cancers are particularly efficient, often resulting in the induction of systemic T lymphocyte dysfunction. We have previously shown that the mechanism by which myeloid cells from tumor-bearing hosts block immune defense strategies involves two enzymes that metabolize L-arginine: arginase and nitric oxide (NO) synthase. NO-releasing aspirin is a classic aspirin molecule covalently linked to a NO donor group. NO aspirin does not possess direct antitumor activity. However, by interfering with the inhibitory enzymatic activities of myeloid cells, orally administered NO aspirin normalized the immune status of tumor-bearing hosts, increased the number and function of tumor-antigen-specific T lymphocytes, and enhanced the preventive and therapeutic effectiveness of the antitumor immunity elicited by cancer vaccination. Because cancer vaccines and NO aspirin are currently being investigated in independent phase I/II clinical trials, these findings offer a rationale to combine these treatments in subjects with advanced neoplastic diseases. arginase | immunosuppression | myeloid cells | nitric oxide | immunotherapy
The Future of State Bar Residence Requirements under the Privileges and Immunities Clause.
ERIC Educational Resources Information Center
Horneber, Alice Schumacher
1980-01-01
Following the recent decision of the New York Court of Appeals in Gordon v. Committee on Character and Fitness, state residency requirements may prove vulnerable to future attacks based on the privileges and immunities clause. (Available from: University of South Dakota School of Law, Vermillion, SD 57069) (Author/MLW)
NASA Astrophysics Data System (ADS)
Vatansever, Fatma; Kawakubo, Masayoshi; Chung, Hoon; Hamblin, Michael R.
2013-02-01
We have previously shown that photodynamic therapy mediated by a vascular regimen of benzoporphyrin derivative and 690nm light is capable of inducing a robust immune response in the mouse CT26.CL25 tumor model that contains a tumor-rejection antigen, beta-galactosidase (β-gal). For the first time we show that PDT can stimulate the production of serum IgG antibodies against the β-gal antigen. It is known that a common cause of death from cancer, particularly lung cancer, is brain metastases; especially the inoperable ones that do not respond to traditional cytotoxic therapies either. We asked whether PDT of a primary tumor could stimulate immune response that could attack the distant brain metastases. We have developed a mouse model of generating brain metastases by injecting CT26.CL25 tumor cells into the brain as well as injecting the same cancer cells under the skin at the same time. When the subcutaneous tumor was treated with PDT, we observed a survival advantage compared to mice that had untreated brain metastases alone.
NASA Astrophysics Data System (ADS)
Zhang, Sheng; Wang, Jian; Tang, Chao-Jing
2012-06-01
Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal particles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept-resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency.
Immune cell landscape in therapy-naïve squamous cell and adenocarcinomas of the lung.
Brcic, Luka; Stanzer, Stefanie; Krenbek, Dagmar; Gruber-Moesenbacher, Ulrike; Absenger, Gudrun; Quehenberger, Franz; Valipour, Arschang; Lindenmann, Joerg; Stoeger, Herbert; Al Effah, Mohamed; Fediuk, Melanie; Balic, Marija; Popper, Helmut H
2018-04-01
Squamous cell and adenocarcinomas of the lung develop different mechanisms during carcinogenesis to evade attacks of the immune system. Besides the well-known check-point control programmed death 1 and its ligand, many more mechanisms, acting either tumoricidal or in favor of tumor progression, exist. Analysis of the immune cell profiles in resected tissues and bronchoalveolar lavage samples and correlation between them and with overall survival data was performed. In all tumor samples in this study, cells of the immune system expressed a tumor-cooperating phenotype. High numbers of regulatory T cells, or alternatively expression of Vista on lymphocytes was present. Tumoricidal dendritic cells were absent in tumor tissue, and barely present in bronchoalveolar lavage, whereas tumor-friendly monocytoid and plasmocytoid dendritic cells were seen in both. Alveolar macrophages were predominantly differentiated into tumor-cooperating M2 types, whereas tumoricidal M1 macrophages were absent or rare. The expression of PDL1 on tumor cells did not correlate with any other immune cells. Expression of PD1 on lymphocytes was frequently encountered. None of analyzed immune cells showed correlation with overall survival. Immune cells in bronchoalveolar lavage and tissue did not correlate. For the first time, a tissue-based analysis of different immune cells in squamous cell and adenocarcinomas of the lung is provided, trying to explain their potential role in tumor development and progression. Discordant numbers of cells with bronchoalveolar lavage are most probably due to the fact that bronchoalveolar lavage reflects the situation in the whole lung, where chronic obstructive lung disease and other conditions are present.
Jasmonate-triggered plant immunity.
Campos, Marcelo L; Kang, Jin-Ho; Howe, Gregg A
2014-07-01
The plant hormone jasmonate (JA) exerts direct control over the production of chemical defense compounds that confer resistance to a remarkable spectrum of plant-associated organisms, ranging from microbial pathogens to vertebrate herbivores. The underlying mechanism of JA-triggered immunity (JATI) can be conceptualized as a multi-stage signal transduction cascade involving: i) pattern recognition receptors (PRRs) that couple the perception of danger signals to rapid synthesis of bioactive JA; ii) an evolutionarily conserved JA signaling module that links fluctuating JA levels to changes in the abundance of transcriptional repressor proteins; and iii) activation (de-repression) of transcription factors that orchestrate the expression of myriad chemical and morphological defense traits. Multiple negative feedback loops act in concert to restrain the duration and amplitude of defense responses, presumably to mitigate potential fitness costs of JATI. The convergence of diverse plant- and non-plant-derived signals on the core JA module indicates that JATI is a general response to perceived danger. However, the modular structure of JATI may accommodate attacker-specific defense responses through evolutionary innovation of PRRs (inputs) and defense traits (outputs). The efficacy of JATI as a defense strategy is highlighted by its capacity to shape natural populations of plant attackers, as well as the propensity of plant-associated organisms to subvert or otherwise manipulate JA signaling. As both a cellular hub for integrating informational cues from the environment and a common target of pathogen effectors, the core JA module provides a focal point for understanding immune system networks and the evolution of chemical diversity in the plant kingdom.
Modify the Histone to Win the Battle: Chromatin Dynamics in Plant–Pathogen Interactions
Ramirez-Prado, Juan S.; Piquerez, Sophie J. M.; Bendahmane, Abdelhafid; Hirt, Heribert; Raynaud, Cécile; Benhamed, Moussa
2018-01-01
Relying on an immune system comes with a high energetic cost for plants. Defense responses in these organisms are therefore highly regulated and fine-tuned, permitting them to respond pertinently to the attack of a microbial pathogen. In recent years, the importance of the physical modification of chromatin, a highly organized structure composed of genomic DNA and its interacting proteins, has become evident in the research field of plant–pathogen interactions. Several processes, including DNA methylation, changes in histone density and variants, and various histone modifications, have been described as regulators of various developmental and defense responses. Herein, we review the state of the art in the epigenomic aspects of plant immunity, focusing on chromatin modifications, chromatin modifiers, and their physiological consequences. In addition, we explore the exciting field of understanding how plant pathogens have adapted to manipulate the plant epigenomic regulation in order to weaken their immune system and thrive in their host, as well as how histone modifications in eukaryotic pathogens are involved in the regulation of their virulence. PMID:29616066
Complement System Part II: Role in Immunity
Merle, Nicolas S.; Noe, Remi; Halbwachs-Mecarelli, Lise; Fremeaux-Bacchi, Veronique; Roumenina, Lubka T.
2015-01-01
The complement system has been considered for a long time as a simple lytic cascade, aimed to kill bacteria infecting the host organism. Nowadays, this vision has changed and it is well accepted that complement is a complex innate immune surveillance system, playing a key role in host homeostasis, inflammation, and in the defense against pathogens. This review discusses recent advances in the understanding of the role of complement in physiology and pathology. It starts with a description of complement contribution to the normal physiology (homeostasis) of a healthy organism, including the silent clearance of apoptotic cells and maintenance of cell survival. In pathology, complement can be a friend or a foe. It acts as a friend in the defense against pathogens, by inducing opsonization and a direct killing by C5b–9 membrane attack complex and by triggering inflammatory responses with the anaphylatoxins C3a and C5a. Opsonization plays also a major role in the mounting of an adaptive immune response, involving antigen presenting cells, T-, and B-lymphocytes. Nevertheless, it can be also an enemy, when pathogens hijack complement regulators to protect themselves from the immune system. Inadequate complement activation becomes a disease cause, as in atypical hemolytic uremic syndrome, C3 glomerulopathies, and systemic lupus erythematosus. Age-related macular degeneration and cancer will be described as examples showing that complement contributes to a large variety of conditions, far exceeding the classical examples of diseases associated with complement deficiencies. Finally, we discuss complement as a therapeutic target. PMID:26074922
Jiang, Jingwei; Zhou, Zunchun; Dong, Ying; Zhao, Zelong; Sun, Hongjuan; Wang, Bai; Jiang, Bei; Chen, Zhong; Gao, Shan
2018-01-01
In order to preliminarily explore the joint involvement of different immune-related factors during the same immune process in Apostichopus japonicus, the transcriptional expression of Cu/Zn superoxide dismutase (Cu/Zn-SOD), catalase (CAT), c-type lysozyme (c-LYZ), i-type lysozyme (i-LYZ), cathepsin D, melanotransferrin (MTF), Toll, c-type lectin (c-LCT) and complement 3 (C3) during the development from fertilized eggs to juveniles and after challenging the juveniles with Vibrio splendidus, Pseudoalteromonas nigrifaciens, Shewanella baltica and Bacillus cereus, respectively, was measured using the method of quantitative real-time PCR (qRT-PCR), and then the correlations among different immune-related factors were analyzed. The results showed that the selected immune-related factors were expressed at all of the determined developmental stages and significantly up-regulated at doliolaria stage, suggesting the selected factors are indispensable immune components and the immune system might be broadly activated at doliolaria stage in A. japonicus. After challenged with four pathogenic bacteria, Cu/Zn-SOD, CAT, i-LYZ, cathepsin D, MTF, Toll, C3 were all significantly down-regulated at 4 h, indicating that some components of A. japonicus immune system might be inhibited at the beginning of pathogenic bacteria invasion. The immune-responsive analysis also showed that the significant regulation in Toll after challenged with four tested bacteria, that in MTF after challenged with S. baltica and that in C3 after challenged with P. nigrifaciens were all minus, suggesting Toll, MTF and C3 are probably the primary targets of pathogenic bacteria attack. Furthermore, the correlation analysis indicated that, all of the selected immune-related factors except cathepsin D might be in the same immune regulatory network during A. japonicus development, while all of the selected immune-related factors except c-LYZ might be in the same responsive regulatory network after challenged with four pathogenic bacteria. Altogether, A. japonicus immune system exhibited high complexity in regulation during organism development and after bacterial challenges. Copyright © 2017 Elsevier Ltd. All rights reserved.
Kent, S
1979-06-01
Because the advantage that women have over men in a lower heart attack rate is gradually lost after menopause, it has been suggested that estrogen may exert a protective effect against heart disease. The situation is complex, and the available data are open to various interpretations. Available data show a gradual, predictable increase in the death rate from heart disease among women with advancing age, despite the apparent increase in cardiovascular events around the time of menopause. This suggests that men may be particularly susceptible to heart disease, rather than that women have an immunity to the disease. The theory that estrogen exerts a protective effect against heart disease was examined when men who had had heart attacks were treated with estrogen in the Coronary Drug Project. The practice was discontinued when it was found that men receiving estrogen had an elevated incidence of myocardial infarction, a finding that suggests that estrogen may promote heart disease. Additional evidence that estrogen may have a harmful effect on the cardiovascular system comes from a recent study by Gerald B. Phillips who found that men who had suffered heart attacks before age 43 had higher levels of estradiol in their blood than men who had not had heart attacks. A noteworthy finding from th e Framingham study was the fact that the relative risk of cardiovascular events in postmenopausal compared with premenopausal women seemed to decrease with age. Hans Selye identifies stress as "the final, decisive eliciting factor" in precipitating heart attack. Broda O. Barnes also maintains that stress is a major cause of heart attack, but adds that most stress-prone individuals suffer from thyroid deficiency, which is the underlying cause of their increased susceptibility to heart attacks.
NASA Astrophysics Data System (ADS)
Liu, Qi; Wang, Ying; Wang, Jun; Wang, Qiong-Hua
2018-02-01
In this paper, a novel optical image encryption system combining compressed sensing with phase-shifting interference in fractional wavelet domain is proposed. To improve the encryption efficiency, the volume data of original image are decreased by compressed sensing. Then the compacted image is encoded through double random phase encoding in asymmetric fractional wavelet domain. In the encryption system, three pseudo-random sequences, generated by three-dimensional chaos map, are used as the measurement matrix of compressed sensing and two random-phase masks in the asymmetric fractional wavelet transform. It not only simplifies the keys to storage and transmission, but also enhances our cryptosystem nonlinearity to resist some common attacks. Further, holograms make our cryptosystem be immune to noises and occlusion attacks, which are obtained by two-step-only quadrature phase-shifting interference. And the compression and encryption can be achieved in the final result simultaneously. Numerical experiments have verified the security and validity of the proposed algorithm.
2013-01-01
Background Plasmodium infections trigger complex immune reactions from their hosts against several life stages of the parasite, including gametocytes. These immune responses are highly variable, depending on age, genetics, and exposure history of the host as well as species and strain of parasite. Although the effects of host antibodies that act against gamete stages in the mosquito (due to uptake in the blood meal) are well documented, the effects of host immunity upon within-host gametocytes are not as well understood. This report consists of a theoretical population biology-based analysis to determine constraints that host immunity impose upon gametocyte population growth. The details of the mathematical models used for the analysis were guided by published reports of clinical and animal studies, incorporated plausible modalities of immune reactions to parasites, and were tailored to the life cycl es of the two most widespread human malaria pathogens, Plasmodium falciparum and Plasmodium vivax. Results For the same ability to bind and clear a target, the model simulations suggest that an antibody attacking immature gametocytes would tend to lower the overall density of transmissible mature gametocytes more than an antibody attacking the mature forms directly. Transmission of P. falciparum would be especially vulnerable to complete blocking by antibodies to its immature forms since its gametocytes take much longer to reach maturity than those of P. vivax. On the other hand, antibodies attacking the mature gametocytes directly would reduce the time the mature forms can linger in the host. Simulation results also suggest that varying the standard deviation in the time necessary for individual asexual parasites to develop and produce schizonts can affect the efficiency of production of transmissible gametocytes. Conclusions If mature gametocyte density determines the probability of transmission, both Plasmodium species, but especially P. falciparum, could bolster this probability through evasion or suppression of host immune responses against the immature gametocytes. However, if the long term lingering of mature gametocytes at low density in the host is also important to ensure transmission, then evasion or suppression of antibodies against the mature stages would bolster probability of transmission as well. PMID:23767770
McCormick, Gail L; Langkilde, Tracy
2014-08-01
Prolonged elevations of glucocorticoids due to long-duration (chronic) stress can suppress immune function. It is unclear, however, how natural stressors that result in repeated short-duration (acute) stress, such as frequent agonistic social encounters or predator attacks, fit into our current understanding of the immune consequences of stress. Since these types of stressors may activate the immune system due to increased risk of injury, immune suppression may be reduced at sites where individuals are repeatedly exposed to potentially damaging stressors. We tested whether repeated acute elevation of corticosterone (CORT, a glucocorticoid) suppresses immune function in eastern fence lizards (Sceloporus undulatus), and whether this effect varies between lizards from high-stress (high baseline CORT, invaded by predatory fire ants) and low-stress (low baseline CORT, uninvaded) sites. Lizards treated daily with exogenous CORT showed higher hemagglutination of novel proteins by their plasma (a test of constitutive humoral immunity) than control lizards, a pattern that was consistent across sites. There was no significant effect of CORT treatment on bacterial killing ability of plasma. These results suggest that repeated elevations of CORT, which are common in nature, produce immune effects more typical of those expected at the acute end of the acute-chronic spectrum and provide no evidence of modulated consequences of elevated CORT in animals from high-stress sites. Copyright © 2014 Elsevier Inc. All rights reserved.
Plant innate immunity – sunny side up?
Stael, Simon; Kmiecik, Przemyslaw; Willems, Patrick; Van Der Kelen, Katrien; Coll, Nuria S.; Teige, Markus; Van Breusegem, Frank
2016-01-01
Reactive oxygen species (ROS)- and calcium- dependent signaling pathways play well-established roles during plant innate immunity. Chloroplasts host major biosynthetic pathways and have central roles in energy production, redox homeostasis, and retrograde signaling. However, the organelle’s importance in immunity has been somehow overlooked. Recent findings suggest that the chloroplast also has an unanticipated function as a hub for ROS- and calcium-signaling that affects immunity responses at an early stage after pathogen attack. In this opinion article, we discuss a chloroplastic calcium-ROS signaling branch of plant innate immunity. We propose that this chloroplastic branch acts as a light-dependent rheostat that, through the production of ROS, influences the severity of the immune response. PMID:25457110
Cancer vaccines: the challenge of developing an ideal tumor killing system.
Mocellin, Simone
2005-09-01
Despite the evidence that the immune system plays a significant role in controlling tumor growth in natural conditions and in response to therapeutic vaccination, cancer cells can survive their attack as the disease progresses and no vaccination regimen should be currently proposed to patients outside experimental clinical trials. Clinical results show that the immune system can be actively polarized against malignant cells by means of a variety of vaccination strategies, and that in some cases this is associated with tumor regression. This implies that under some unique circumstances, the naturally "dormant" immune effectors can actually be put at work and used as endogenous weapons against malignant cells. Consequently, the main challenge of tumor immunologists appears to lie on the ability of reproducing those conditions in a larger set of patients. The complexity of the immune network and the still enigmatic host-tumor interactions make these tasks at the same time challenging and fascinating. Recent tumor immunology findings are giving new impetus to the development of more effective vaccination strategies and might revolutionize the way of designing the next generation of cancer vaccines. In the near future, the implementation of these insights in the clinical setting and the completion/conduction of comparative randomized phase III trials will allow oncologists to define the actual role of cancer vaccines in the fight against malignancy.
Langut, Yael; Talhami, Alaa; Mamidi, Samarasimhareddy; Shir, Alexei; Zigler, Maya; Joubran, Salim; Sagalov, Anna; Flashner-Abramson, Efrat; Edinger, Nufar; Klein, Shoshana; Levitzki, Alexander
2017-12-26
There is an urgent need for an effective treatment for metastatic prostate cancer (PC). Prostate tumors invariably overexpress prostate surface membrane antigen (PSMA). We designed a nonviral vector, PEI-PEG-DUPA (PPD), comprising polyethylenimine-polyethyleneglycol (PEI-PEG) tethered to the PSMA ligand, 2-[3-(1, 3-dicarboxy propyl)ureido] pentanedioic acid (DUPA), to treat PC. The purpose of PEI is to bind polyinosinic/polycytosinic acid (polyIC) and allow endosomal release, while DUPA targets PC cells. PolyIC activates multiple pathways that lead to tumor cell death and to the activation of bystander effects that harness the immune system against the tumor, attacking nontargeted neighboring tumor cells and reducing the probability of acquired resistance and disease recurrence. Targeting polyIC directly to tumor cells avoids the toxicity associated with systemic delivery. PPD selectively delivered polyIC into PSMA-overexpressing PC cells, inducing apoptosis, cytokine secretion, and the recruitment of human peripheral blood mononuclear cells (PBMCs). PSMA-overexpressing tumors in nonobese diabetic/severe combined immunodeficiency (NOD/SCID) mice with partially reconstituted immune systems were significantly shrunken following PPD/polyIC treatment, in all cases. Half of the tumors showed complete regression. PPD/polyIC invokes antitumor immunity, but unlike many immunotherapies does not need to be personalized for each patient. The potent antitumor effects of PPD/polyIC should spur its development for clinical use.
Langut, Yael; Talhami, Alaa; Mamidi, Samarasimhareddy; Shir, Alexei; Zigler, Maya; Joubran, Salim; Sagalov, Anna; Flashner-Abramson, Efrat; Edinger, Nufar; Klein, Shoshana; Levitzki, Alexander
2017-01-01
There is an urgent need for an effective treatment for metastatic prostate cancer (PC). Prostate tumors invariably overexpress prostate surface membrane antigen (PSMA). We designed a nonviral vector, PEI-PEG-DUPA (PPD), comprising polyethylenimine–polyethyleneglycol (PEI–PEG) tethered to the PSMA ligand, 2-[3-(1, 3-dicarboxy propyl)ureido] pentanedioic acid (DUPA), to treat PC. The purpose of PEI is to bind polyinosinic/polycytosinic acid (polyIC) and allow endosomal release, while DUPA targets PC cells. PolyIC activates multiple pathways that lead to tumor cell death and to the activation of bystander effects that harness the immune system against the tumor, attacking nontargeted neighboring tumor cells and reducing the probability of acquired resistance and disease recurrence. Targeting polyIC directly to tumor cells avoids the toxicity associated with systemic delivery. PPD selectively delivered polyIC into PSMA-overexpressing PC cells, inducing apoptosis, cytokine secretion, and the recruitment of human peripheral blood mononuclear cells (PBMCs). PSMA-overexpressing tumors in nonobese diabetic/severe combined immunodeficiency (NOD/SCID) mice with partially reconstituted immune systems were significantly shrunken following PPD/polyIC treatment, in all cases. Half of the tumors showed complete regression. PPD/polyIC invokes antitumor immunity, but unlike many immunotherapies does not need to be personalized for each patient. The potent antitumor effects of PPD/polyIC should spur its development for clinical use. PMID:29229829
A Survey of Antiviral Drugs for Bioweapons: Review
2005-01-01
person . An attack with these viruses would result in high morbidity and mortality and cause widespread panic. With the exception of smallpox and...infected cells and are not dependent upon the host cell nucleus. Possible targets for these viruses are the DNA polymerase, virus -encoded immune modulators... person to person . An attack with these viruses would result in high morbidity and mortality and cause widespread panic. With the
Establishment of Chronic Infection: Brucella's Stealth Strategy
Ahmed, Waqas; Zheng, Ke; Liu, Zheng-Fei
2016-01-01
Brucella is a facultative intracellular pathogen that causes zoonotic infection known as brucellosis which results in abortion and infertility in natural host. Humans, especially in low income countries, can acquire infection by direct contact with infected animal or by consumption of animal products and show high morbidity, severe economic losses and public health problems. However for survival, host cells develop complex immune mechanisms to defeat and battle against attacking pathogens and maintain a balance between host resistance and Brucella virulence. On the other hand as a successful intracellular pathogen, Brucella has evolved multiple strategies to evade immune response mechanisms to establish persistent infection and replication within host. In this review, we mainly summarize the “Stealth” strategies employed by Brucella to modulate innate and the adaptive immune systems, autophagy, apoptosis and possible role of small noncoding RNA in the establishment of chronic infection. The purpose of this review is to give an overview for recent understanding how this pathogen evades immune response mechanisms of host, which will facilitate to understanding the pathogenesis of brucellosis and the development of novel, more effective therapeutic approaches to treat brucellosis. PMID:27014640
Virus infection, antiviral immunity, and autoimmunity
Getts, Daniel R.; Chastain, Emily M. L.; Terry, Rachael L.; Miller, Stephen D.
2014-01-01
Summary As a group of disorders, autoimmunity ranks as the third most prevalent cause of morbidity and mortality in the Western World. However, the etiology of most autoimmune diseases remains unknown. Although genetic linkage studies support a critical underlying role for genetics, the geographic distribution of these disorders as well as the low concordance rates in monozygotic twins suggest that a combination of other factors including environmental ones are involved. Virus infection is a primary factor that has been implicated in the initiation of autoimmune disease. Infection triggers a robust and usually well-coordinated immune response that is critical for viral clearance. However, in some instances, immune regulatory mechanisms may falter, culminating in the breakdown of self-tolerance, resulting in immune-mediated attack directed against both viral and self-antigens. Traditionally, cross-reactive T-cell recognition, known as molecular mimicry, as well as bystander T-cell activation, culminating in epitope spreading, have been the predominant mechanisms elucidated through which infection may culminate in an T-cell-mediated autoimmune response. However, other hypotheses including virus-induced decoy of the immune system also warrant discussion in regard to their potential for triggering autoimmunity. In this review, we discuss the mechanisms by which virus infection and antiviral immunity contribute to the development of autoimmunity. PMID:23947356
Advancing Cancer Therapy with Present and Emerging Immuno-Oncology Approaches
Kamta, Jeff; Chaar, Maher; Ande, Anusha; Altomare, Deborah A.; Ait-Oudhia, Sihem
2017-01-01
Immuno-oncology (I-O) is a young and growing field on the frontier of cancer therapy. Contrary to cancer therapies that directly target malignant cells, I-O therapies stimulate the body’s immune system to target and attack the tumor, which is otherwise invisible to, or inhibiting the immune response. To this end, several methods have been developed: First, passive therapies that enable T-cells to fight the tumor without direct manipulation, typically through binding and modifying the intracellular signaling of surface receptors. Checkpoint inhibitors, perhaps the most well known of I-O therapies; are an example of such. These are monoclonal antibodies that block binding of the tumor cell at receptors that inactivate the T-cell. A variety of small molecules can achieve the same effect by affecting metabolic or signaling pathways to boost the immune response or prevent its attenuation. Drugs originally formulated for unrelated disease states are now being used to treat cancer under the I-O approach. Second, active therapies which often involve direct manipulations that occur in vitro and once introduced to the patient will directly attack the tumor. Adoptive cell transfer is the oldest of these methods. It involves the removal of T-cells from the body, which are then expanded and genetically modified for specificity toward tumor-associated antigens (TAAs), and then reintroduced to the patient. A similar approach is taken with cancer vaccines, where TAAs are identified and reintroduced with adjuvants to stimulate an immune response, sometimes in the context of antigen-presenting cells or viral vectors. Oncolytic viruses are genetically modified natural viruses for selectivity toward tumor cells. The resulting cytotoxicity has the potential to elicit an immune response that furthers tumor cell killing. A final active approach is bi-specific T-cell engagers. These modified antibodies act to link a T-cell and tumor cell through surface receptors and thereby forcibly generate immune recognition. The therapies in each of these subfields are all still very new and ongoing clinical trials could provide even further additions. The full therapeutic potential of the aforementioned therapies, alone or in combination, has yet to be realized, but holds great promise for the future of cancer treatment. PMID:28459041
An artificial bioindicator system for network intrusion detection.
Blum, Christian; Lozano, José A; Davidson, Pedro Pinacho
An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks, and on the other hand, contrary to most of the existing systems for network intrusion detection, it does not need any previous training. We experimentally compare our proposal with three state-of-the-art algorithms and show that it outperforms the competing approaches on widely used benchmark data.
Self-referenced continuous-variable measurement-device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Wang, Yijun; Wang, Xudong; Li, Jiawei; Huang, Duan; Zhang, Ling; Guo, Ying
2018-05-01
We propose a scheme to remove the demand of transmitting a high-brightness local oscillator (LO) in continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, which we call as the self-referenced (SR) CV-MDI QKD. We show that our scheme is immune to the side-channel attacks, such as the calibration attacks, the wavelength attacks and the LO fluctuation attacks, which are all exploiting the security loopholes introduced by transmitting the LO. Besides, the proposed scheme waives the necessity of complex multiplexer and demultiplexer, which can greatly simplify the QKD processes and improve the transmission efficiency. The numerical simulations under collective attacks show that all the improvements brought about by our scheme are only at the expense of slight transmission distance shortening. This scheme shows an available method to mend the security loopholes incurred by transmitting LO in CV-MDI QKD.
Three-party quantum secure direct communication against collective noise
NASA Astrophysics Data System (ADS)
He, Ye-Feng; Ma, Wen-Ping
2017-10-01
Based on logical quantum states, two three-party quantum secure direct communication protocols are proposed, which can realize the exchange of the secret messages between three parties with the help of the measurement correlation property of six-particle entangled states. These two protocols can be immune to the collective-dephasing noise and the collective-rotation noise, respectively; neither of them has information leakage problem. The one-way transmission mode ensures that they can congenitally resist against the Trojan horse attacks and the teleportation attack. Furthermore, these two protocols are secure against other active attacks because of the use of the decoy state technology.
Respiratory and Metabolic Impacts of Crustacean Immunity: Are there Implications for the Insects?
Burnett, Karen G; Burnett, Louis E
2015-11-01
Extensive similarities in the molecular architecture of the crustacean immune system to that of insects give credence to the current view that the Hexapoda, including Insecta, arose within the clade Pancrustacea. The crustacean immune system is mediated largely by hemocytes, relying on suites of pattern recognition receptors, effector functions, and signaling pathways that parallel those of insects. In crustaceans, as in insects, the cardiovascular system facilitates movement of hemocytes and delivery of soluble immune factors, thereby supporting immune surveillance and defense along with other physiological functions such as transport of nutrients, wastes, and hormones. Crustaceans also rely heavily on their cardiovascular systems to mediate gas exchange; insects are less reliant on internal circulation for this function. Among the largest crustaceans, the decapods have developed a condensed heart and a highly arteriolized cardiovascular system that supports the metabolic demands of their often large body size. However, recent studies indicate that mounting an immune response can impair gas exchange and metabolism in their highly developed vascular system. When circulating hemocytes detect the presence of potential pathogens, they aggregate rapidly with each other and with the pathogen. These growing aggregates can become trapped in the microvasculature of the gill where they are melanized and may be eliminated at the next molt. Prior to molting, trapped aggregates of hemocytes also can impair hemolymph flow and oxygenation at the gill. Small shifts to anaerobic metabolism only partially compensate for this decrease in oxygen uptake. The resulting metabolic depression is likely to impact other energy-expensive cellular processes and whole-animal performance. For crustaceans that often live in microbially-rich, but oxygen-poor aquatic environments, there appear to be distinct tradeoffs, based on the gill's multiple roles in respiration and immunity. Insects have developed a separate tracheal system for the delivery of oxygen to tissues, so this particular tradeoff between oxygen transport and immune function is avoided. Few studies in crustaceans or insects have tested whether mounting an immune response might impact other functions of the cardiovascular system or alter integrity of the gut, respiratory, and reproductive epithelia where processes of the attack on pathogens, defense by the host, and physiological functions play out. Such tradeoffs might be fruitfully addressed by capitalizing on the ease of molecular and genetic manipulation in insects. Given the extensive similarities between the insect and the crustacean immune systems, such models of epithelial infection could benefit our understanding of the physiological consequences of immune defense in all of the Pancrustacea. © The Author 2015. Published by Oxford University Press on behalf of the Society for Integrative and Comparative Biology. All rights reserved. For permissions please email: journals.permissions@oup.com.
Dow, Geoffrey S; McCarthy, William F; Reid, Mark; Smith, Bryan; Tang, Douglas; Shanks, G Dennis
2014-02-06
In 2000/2001, the Australian Defense Forces (ADF), in collaboration with SmithKline Beecham and the United States Army, conducted a field trial to evaluate the safety, tolerability and efficacy of tafenoquine and mefloquine/primaquine for the prophylaxis of malaria amongst non-immune Australian soldiers deployed to East Timor (now called Timor Leste) for peacekeeping operations. The lack of a concurrent placebo control arm prevented an internal estimate of the malaria attack rate and so the protective efficacy of the study regimens was not determined at the time. In a retrospective analysis of the trial results, the all species malaria attack rate was estimated for the prophylactic phase of the study which was defined as the period between administration of the first prophylactic dose and the first dose of post-deployment medication. First, the Plasmodium vivax attack rate was estimated during the prophylactic phase of the deployment by adjusting the observed P. vivax relapse rate during post-deployment to account for the known anti-relapse efficacies (or effectiveness) of the study medications (determined from prior studies). The all species malaria attack rate (P. vivax and Plasmodium falciparum) was then determined by adjusting the P. vivax attack rate based on the ratio of P. falciparum to P. vivax observed during prior ADF deployments to Timor Leste. This estimated all species malaria attack rate was then used as the 'constant estimated attack rate' in the calculation of the protective efficacy of tafenoquine and mefloquine during the prophylactic phase of the deployment. The estimated attack rate during the prophylactic phase of the study was determined to be 7.88%. The protective efficacies of tafenoquine and mefloquine, with corresponding 95% confidence intervals (95% CI), were determined to be 100% (93%-100%) and 100% (79%-100%) respectively. The protective efficacy of tafenoquine (200 mg per day for three days, followed by weekly 200 mg maintenance doses) is similar to that of the weekly standard of care (mefloquine, 250 mg).
2014-01-01
Background In 2000/2001, the Australian Defense Forces (ADF), in collaboration with SmithKline Beecham and the United States Army, conducted a field trial to evaluate the safety, tolerability and efficacy of tafenoquine and mefloquine/primaquine for the prophylaxis of malaria amongst non-immune Australian soldiers deployed to East Timor (now called Timor Leste) for peacekeeping operations. The lack of a concurrent placebo control arm prevented an internal estimate of the malaria attack rate and so the protective efficacy of the study regimens was not determined at the time. Methods In a retrospective analysis of the trial results, the all species malaria attack rate was estimated for the prophylactic phase of the study which was defined as the period between administration of the first prophylactic dose and the first dose of post-deployment medication. First, the Plasmodium vivax attack rate was estimated during the prophylactic phase of the deployment by adjusting the observed P. vivax relapse rate during post-deployment to account for the known anti-relapse efficacies (or effectiveness) of the study medications (determined from prior studies). The all species malaria attack rate (P. vivax and Plasmodium falciparum) was then determined by adjusting the P. vivax attack rate based on the ratio of P. falciparum to P. vivax observed during prior ADF deployments to Timor Leste. This estimated all species malaria attack rate was then used as the ‘constant estimated attack rate’ in the calculation of the protective efficacy of tafenoquine and mefloquine during the prophylactic phase of the deployment. Results The estimated attack rate during the prophylactic phase of the study was determined to be 7.88%. The protective efficacies of tafenoquine and mefloquine, with corresponding 95% confidence intervals (95% CI), were determined to be 100% (93%-100%) and 100% (79%-100%) respectively. Conclusions The protective efficacy of tafenoquine (200 mg per day for three days, followed by weekly 200 mg maintenance doses) is similar to that of the weekly standard of care (mefloquine, 250 mg). PMID:24502679
The potential of targeting Ras proteins in lung cancer.
McCormick, Frank
2015-04-01
The Ras pathway is a major driver in lung adenocarcinoma: over 75% of all cases harbor mutations that activate this pathway. While spectacular clinical successes have been achieved by targeting activated receptor tyrosine kinases in this pathway, little, if any, significant progress has been achieved targeting Ras proteins themselves or cancers driven by oncogenic Ras mutants. New approaches to drug discovery, new insights into Ras function, new ways of attacking undruggable proteins through RNA interference and new ways of harnessing the immune system could change this landscape in the relatively near future.
[Clinical case of management of a patient with Guillain-Barre syndrome].
Popov, A V; Babak, C I; Murashko, N K
2012-01-01
Syndrome of Giyena-Barre can arise up in any age, in different regions, for men more frequent, than for women. There are descriptions of clinical supervisions of syndrome in domestic literature, combining with the defeat of the nervous system as a result of different pathogens which are procatarxiss in the start of mechanisms of immune attack on the albumens of mielina. However this disease continues to remain one of most heavy, requiring neyroreanimacionnykh measures, that causes the necessity of development of new methods of treatment in same queue.
Gliadin Detection in Food by Immunoassay
NASA Astrophysics Data System (ADS)
Grant, Gordon; Sporns, Peter; Hsieh, Y.-H. Peggy
Immunoassays are very sensitive and efficient tests that are commonly used to identify a specific protein. Examples of applications in the food industry include identification of proteins expressed in genetically modified foods, allergens, or proteins associated with a disease, including celiac disease. This genetic disease is associated with Europeans and affects about one in every 200 people in North America. These individuals react immunologically to wheat proteins, and consequently their own immune systems attack and damage their intestines. This disease can be managed if wheat proteins, specifically "gliadins," are avoided in foods.
Paraneoplastic Neurological Disorder in Nasopharyngeal Carcinoma.
Ng, Sze Yin; Kongg, Min Han; Yunus, Mohd Razif Mohamad
2017-03-01
Paraneoplastic neurological disorder (PND) is a condition due to immune cross-reactivity between the tumour cells and the normal tissue, whereby the "onconeural" antibodies attack the normal host nervous system. It can present within weeks to months before or after the diagnosis of malignancies. Nasopharyngeal carcinoma is associated with paraneoplastic syndrome, for example, dermatomyositis, and rarely with a neurological disorder. We report on a case of nasopharyngeal carcinoma with probable PND. Otolaryngologists, oncologists and neurologists need to be aware of this condition in order to make an accurate diagnosis and to provide prompt treatment.
NASA Technical Reports Server (NTRS)
Denning, Peter J.
1988-01-01
The worm, Trojan horse, bacterium, and virus are destructive programs that attack information stored in a computer's memory. Virus programs, which propagate by incorporating copies of themselves into other programs, are a growing menace in the late-1980s world of unprotected, networked workstations and personal computers. Limited immunity is offered by memory protection hardware, digitally authenticated object programs,and antibody programs that kill specific viruses. Additional immunity can be gained from the practice of digital hygiene, primarily the refusal to use software from untrusted sources. Full immunity requires attention in a social dimension, the accountability of programmers.
DNA Damage by Ionizing Radiation: Tandem Double Lesions by Charged Particles
NASA Technical Reports Server (NTRS)
Huo, Winifred M.; Chaban, Galina M.; Wang, Dunyou; Dateo, Christopher E.
2005-01-01
Oxidative damages by ionizing radiation are the source of radiation-induced carcinogenesis, damage to the central nervous system, lowering of the immune response, as well as other radiation-induced damages to human health. Monte Carlo track simulations and kinetic modeling of radiation damages to the DNA employ available molecular and cellular data to simulate the biological effect of high and low LET radiation io the DNA. While the simulations predict single and double strand breaks and base damages, so far all complex lesions are the result of stochastic coincidence from independent processes. Tandem double lesions have not yet been taken into account. Unlike the standard double lesions that are produced by two separate attacks by charged particles or radicals, tandem double lesions are produced by one single attack. The standard double lesions dominate at the high dosage regime. On the other hand, tandem double lesions do not depend on stochastic coincidences and become important at the low dosage regime of particular interest to NASA. Tandem double lesions by hydroxyl radical attack of guanine in isolated DNA have been reported at a dosage of radiation as low as 10 Gy. The formation of two tandem base lesions was found to be linear with the applied doses, a characteristic of tandem lesions. However, tandem double lesions from attack by a charged particle have not been reported.
No-hardware-signature cybersecurity-crypto-module: a resilient cyber defense agent
NASA Astrophysics Data System (ADS)
Zaghloul, A. R. M.; Zaghloul, Y. A.
2014-06-01
We present an optical cybersecurity-crypto-module as a resilient cyber defense agent. It has no hardware signature since it is bitstream reconfigurable, where single hardware architecture functions as any selected device of all possible ones of the same number of inputs. For a two-input digital device, a 4-digit bitstream of 0s and 1s determines which device, of a total of 16 devices, the hardware performs as. Accordingly, the hardware itself is not physically reconfigured, but its performance is. Such a defense agent allows the attack to take place, rendering it harmless. On the other hand, if the system is already infected with malware sending out information, the defense agent allows the information to go out, rendering it meaningless. The hardware architecture is immune to side attacks since such an attack would reveal information on the attack itself and not on the hardware. This cyber defense agent can be used to secure a point-to-point, point-to-multipoint, a whole network, and/or a single entity in the cyberspace. Therefore, ensuring trust between cyber resources. It can provide secure communication in an insecure network. We provide the hardware design and explain how it works. Scalability of the design is briefly discussed. (Protected by United States Patents No.: US 8,004,734; US 8,325,404; and other National Patents worldwide.)
Immunization of complex networks
NASA Astrophysics Data System (ADS)
Pastor-Satorras, Romualdo; Vespignani, Alessandro
2002-03-01
Complex networks such as the sexual partnership web or the Internet often show a high degree of redundancy and heterogeneity in their connectivity properties. This peculiar connectivity provides an ideal environment for the spreading of infective agents. Here we show that the random uniform immunization of individuals does not lead to the eradication of infections in all complex networks. Namely, networks with scale-free properties do not acquire global immunity from major epidemic outbreaks even in the presence of unrealistically high densities of randomly immunized individuals. The absence of any critical immunization threshold is due to the unbounded connectivity fluctuations of scale-free networks. Successful immunization strategies can be developed only by taking into account the inhomogeneous connectivity properties of scale-free networks. In particular, targeted immunization schemes, based on the nodes' connectivity hierarchy, sharply lower the network's vulnerability to epidemic attacks.
Strategies for the prevention of a successful biological warfare aerosol attack.
Wiener, S L
1996-05-01
Biological warfare (BW) aerosol attacks are different from chemical attacks in that they may provide no warning/all clear signals that allow the soldier to put on or remove his M17/M40 protective mask. Methods are now being perfected to detect a BW aerosol cloud using an airborne (helicopter) pulsed laser system to scan the lower altitudes upwind from a troop concentration of corps size, and to sample and analyze the nature of the aerosol within a brief time interval. This system has certain limitations and vulnerabilities, since it is designed specifically to detect a line-type aerosol attack. Provision of, training with, and field use of a lightweight dust mist or HEPA filter respirator for each soldier is proposed for protection against undetected aerosol attacks. This particulate filter respirator would be issued in addition to the M17/M40 mask. Such a BW respirator will be able to purify the soldier's air by removing particles in the 0.3- to 15-micro m-diameter range with an efficiency of 98 to 100%. Particle size of BW aerosols is in the same range, with an optimum size for high-efficiency casualty production of 1 to 5 micro m mass median diameter. The proposed BW respirator will be lightweight; will require low inhalation pressures; will be comfortable to wear for prolonged periods; will not interfere with vision, hearing, and communication; and will not degrade overall effectiveness and performance to the degree observed with the M17/M40 masks. Such respirators would be worn as part of a contingency defense against an enemy likely to use BW agents. This respirator could be worn for prolonged periods when under threat of an undetectable BW attack during weather conditions favorable to the success of such an attack (i.e., low wind velocity and temperature inversion in the target area). In addition, tactically important assets such as command and control centers and missile batteries can also be protected continuously by air filtration systems powered by electricity (modular collective protection equipment). Vaccinations against anthrax, botulism, Q fever, plague, and tularemia are now available and immune protection against ricin and staphylococcal toxins appears feasible in the near future. Chemotherapy can also be provided for prophylaxis of infectious agents released on the battlefield. The vaccines and antibiotics can provide back-up protection against an unexpected BW attack during a period when the BW respirator is not in use or malfunctions due to a poor seal or filter leak. Enemy sites of biological weapon production, assembly, testing, and storage, and delivery vehicles can be targeted for destruction by bombs and/or missiles. An integrated, well-planned, BW defense with multiple components can decrease the likelihood of a successful enemy BW aerosol attack.
A secure and robust information hiding technique for covert communication
NASA Astrophysics Data System (ADS)
Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.
2015-08-01
The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.
Characterization of immune cells and perforin mutations in familiar venous thromboembolism.
Duan, Qianglin; Lv, Wei; Yang, Minjun; Yang, Fan; Zhu, Yongqiang; Kang, Hui; Song, Haoming; Wang, Shengyue; Dong, Hui; Wang, Lemin
2015-01-01
This study was to carry out exome sequencing in a Han Chinese family with venous thromboembolism. Three venous thromboembolism (VTE) patients and five members from a Han Chinese family were evaluated by exome sequencing. Among the 3 VTE patients, mutations of 2 genes including PRF1 and HTR2A were identified and predicted to be functionally damaged to their encoded proteins. In addition, the PRF1 mutation and the HTR2A mutation identified in our study were absent in 100 non-related controls, indicating that venous thromboembolism has a genetic component. The R357W mutation is located in the membrane attack complex/perforin domain of PRF1 protein, which exists in both the perforin. The steps of killing foreign or pathological antigen cells by NK cells, CD8 (+)T cells and the membrane attack complex include membrane perforation and release of the granzyme, either of which is abnormal can lead to immune dysfunction. The mutations of immune related genes in familial VTE might provide new understanding of the pathogenesis of familial venous thromboembolism.
The evolution of the EGFRvIII (rindopepimut) immunotherapy for glioblastoma multiforme patients.
Paff, Michelle; Alexandru-Abrams, Daniela; Hsu, Frank P K; Bota, Daniela A
2014-01-01
Glioblastoma Multiforme (GBM) is the most common type of brain tumor and it is uniformly fatal. The community standard of treatment for this disease is gross or subtotal resection of the tumor, followed by radiation and temozolomide. At recurrence bevacizumab can be added for increased progression free survival. Many challenges are encountered while trying to devise new drugs to treat GBM, such as the presence of the blood brain barrier which is impermeable to most drugs. Therefore in the past few years attention was turned to immunological means for the treatment of this devastating disease. EGFRvIII targeting has proven a good way to attack glioblastoma cells by using the immune system. Although in still in development, this approach holds the promise as a great first step toward immune-tailored drugs for the treatment of brain cancers.
Engineering synthetic vaccines using cues from natural immunity
Irvine, Darrell J.; Swartz, Melody A.; Szeto, Gregory L.
2014-01-01
Vaccines aim to protect against or treat diseases through manipulation of the immune response, promoting either immunity or tolerance. The former generate antibodies and T-cells poised to protect against future pathogen encounter or attack diseased cells such as tumors; the latter, which are far less developed, block pathogenic autoreactive T-cells and autoantibodies that target self tissue. Enormous challenges remain, however, as a consequence of our incomplete understanding of human immunity. A rapidly growing field of research is the design of synthetic materials in vaccines to 1) target organs, tissues, cells, or intracellular compartments; 2) co-deliver immunomodulatory signals that control the quality of the immune response; or 3) directly act as immune regulators, and there exists great potential for well-defined materials to further our understanding of immunity. Here we describe recent advances in the design of synthetic materials to direct immune responses, highlighting successes and challenges in prophylactic, therapeutic, and tolerance-inducing vaccines. PMID:24150416
Plant immunity: a lesson from pathogenic bacterial effector proteins.
Cui, Haitao; Xiang, Tingting; Zhou, Jian-Min
2009-10-01
Phytopathogenic bacteria inject an array of effector proteins into host cells to alter host physiology and assist the infection process. Some of these effectors can also trigger disease resistance as a result of recognition in the plant cell by cytoplasmic immune receptors. In addition to effector-triggered immunity, plants immunity can be triggered upon the detection of Pathogen/Microbe-Associated Molecular Patterns by surface-localized immune receptors. Recent progress indicates that many bacterial effector proteins use a variety of biochemical properties to directly attack key components of PAMP-triggered immunity and effector-triggered immunity, providing new insights into the molecular basis of plant innate immunity. Emerging evidence indicate that the evolution of disease resistance in plants is intimately linked to the mechanism by which bacterial effectors promote parasitism. This review focuses on how these studies have conceptually advanced our understanding of plant-pathogen interactions.
A novel metaheuristic for continuous optimization problems: Virus optimization algorithm
NASA Astrophysics Data System (ADS)
Liang, Yun-Chia; Rodolfo Cuevas Juarez, Josue
2016-01-01
A novel metaheuristic for continuous optimization problems, named the virus optimization algorithm (VOA), is introduced and investigated. VOA is an iteratively population-based method that imitates the behaviour of viruses attacking a living cell. The number of viruses grows at each replication and is controlled by an immune system (a so-called 'antivirus') to prevent the explosive growth of the virus population. The viruses are divided into two classes (strong and common) to balance the exploitation and exploration effects. The performance of the VOA is validated through a set of eight benchmark functions, which are also subject to rotation and shifting effects to test its robustness. Extensive comparisons were conducted with over 40 well-known metaheuristic algorithms and their variations, such as artificial bee colony, artificial immune system, differential evolution, evolutionary programming, evolutionary strategy, genetic algorithm, harmony search, invasive weed optimization, memetic algorithm, particle swarm optimization and simulated annealing. The results showed that the VOA is a viable solution for continuous optimization.
Pondman, Kirsten M; Sobik, Martin; Nayak, Annapurna; Tsolaki, Anthony G; Jäkel, Anne; Flahaut, Emmanuel; Hampel, Silke; Ten Haken, Bennie; Sim, Robert B; Kishore, Uday
2014-08-01
Carbon nanotubes (CNTs) have promised a range of applications in biomedicine. Although influenced by the dispersants used, CNTs are recognized by the innate immune system, predominantly by the classical pathway of the complement system. Here, we confirm that complement activation by the CNT used continues up to C3 and C5, indicating that the entire complement system is activated including the formation of membrane-attack complexes. Using recombinant forms of the globular regions of human C1q (gC1q) as inhibitors of CNT-mediated classical pathway activation, we show that C1q, the first recognition subcomponent of the classical pathway, binds CNTs via the gC1q domain. Complement opsonisation of CNTs significantly enhances their uptake by U937 cells, with concomitant downregulation of pro-inflammatory cytokines and up-regulation of anti-inflammatory cytokines in both U937 cells and human monocytes. We propose that CNT-mediated complement activation may cause recruitment of cellular infiltration, followed by phagocytosis without inducing a pro-inflammatory immune response. This study highlights the importance of the complement system in response to carbon nanontube administration, suggesting that the ensuing complement activation may cause recruitment of cellular infiltration, followed by phagocytosis without inducing a pro-inflammatory immune response. Copyright © 2014 Elsevier Inc. All rights reserved.
Olsen, Sonja J; Miller, Gayle; Breuer, Thomas; Kennedy, Malinda; Higgins, Charles; Walford, Jim; McKee, Gary; Fox, Kim; Bibb, William; Mead, Paul
2002-04-01
In the summer of 1998, a large outbreak of Escherichia coli O157:H7 infections occurred in Alpine, Wyoming. We identified 157 ill persons; stool from 71 (45%) yielded E. coli O157:H7. In two cohort studies, illness was significantly associated with drinking municipal water (town residents: adjusted odds ratio=10.1, 95% confidence intervals [CI]=1.8-56.4; visitors attending family reunion: relative risk=9.0, 95% CI=1.3-63.3). The unchlorinated water supply had microbiologic evidence of fecal organisms and the potential for chronic contamination with surface water. Among persons exposed to water, the attack rate was significantly lower in town residents than in visitors (23% vs. 50%, p<0.01) and decreased with increasing age. The lower attack rate among exposed residents, especially adults, is consistent with the acquisition of partial immunity following long-term exposure. Serologic data, although limited, may support this finding. Contamination of small, unprotected water systems may be an increasing public health risk.
Miller, Gayle; Breuer, Thomas; Kennedy, Malinda; Higgins, Charles; Walford, Jim; McKee, Gary; Fox, Kim; Bibb, William; Mead, Paul
2002-01-01
In the summer of 1998, a large outbreak of Escherichia coli O157:H7 infections occurred in Alpine, Wyoming. We identified 157 ill persons; stool from 71 (45%) yielded E. coli O157:H7. In two cohort studies, illness was significantly associated with drinking municipal water (town residents: adjusted odds ratio=10.1, 95% confidence intervals [CI]=1.8-56.4; visitors attending family reunion: relative risk=9.0, 95% CI=1.3-63.3). The unchlorinated water supply had microbiologic evidence of fecal organisms and the potential for chronic contamination with surface water. Among persons exposed to water, the attack rate was significantly lower in town residents than in visitors (23% vs. 50%, p<0.01) and decreased with increasing age. The lower attack rate among exposed residents, especially adults, is consistent with the acquisition of partial immunity following long-term exposure. Serologic data, although limited, may support this finding. Contamination of small, unprotected water systems may be an increasing public health risk. PMID:11971769
Mumps in the US Army 1980-86: should recruits be immunized?
Arday, D R; Kanjarpane, D D; Kelley, P W
1989-01-01
The US Army's experience with mumps hospitalizations was examined for the years 1980 through 1986. One hundred fifty-two cases among active duty Army soldiers were identified. Mumps rates declined from 3.85 per 100,000 active duty soldiers per year in 1980 to 1.28 in 1985, but an outbreak during 1986 caused rates to jump to 6.65. Attack rates were found to decline dramatically with increasing age or length of military service, with 74 per cent of cases occurring in soldiers with three years or less of service. Rates for Blacks and Whites were similar, but were higher for other minorities. Complications reported were mild. A cost-benefit analysis, assuming all recruits were to be vaccinated, estimated average annual vaccination program costs of $286,789; this figure exceeds average annual reported hospitalized mumps disease costs of $61,525 by a factor of 4.7. Mumps attack rates would have to reach at least 15.0 per 100,000 per year before savings would equal recruit vaccination costs. Failure to show that a vaccine program would be cost-saving may be due to limitations in identifying cases or to the requirement that all recruits be immunized regardless of prior immune status. It is likely that a program to immunize susceptible individuals alone would show benefit. PMID:2494895
Systemic Acquired Resistance and Salicylic Acid: Past, Present and Future.
Klessig, Daniel F; Choi, Hyong Woo; Dempsey, D'Maris Amick
2018-05-21
Salicylic acid (SA) is a critical plant hormone that regulates numerous aspects of plant growth and development, as well as the activation of defenses against biotic and abiotic stress. Here we present a historical overview of the progress that has been made to date in elucidating SA's role in signaling plant immune responses. The ability of plants to develop acquired immunity after pathogen infection was first proposed in 1933. However, most of our knowledge about plant immune signaling was generated over the last three decades, following the discovery that SA is an endogenous defense signal. During this time-frame, researchers have identified i) two pathways through which SA can be synthesized, ii) numerous proteins that regulate SA synthesis and metabolism, and iii) some of the signaling components that function downstream of SA, including a large number of SA targets/receptors. In addition, it has become increasingly evident that SA does not signal immune responses by itself, but rather as part of an intricate network that involves many other plant hormones. Future efforts to develop a comprehensive understanding of SA-mediated immune signaling will therefore need to close knowledge gaps that exist within the SA pathway itself, as well as clarify how crosstalk among the different hormone signaling pathways leads to an immune response that is both robust and optimized for maximal efficacy, depending on identity of the attacking pathogen.
Immune pathways and defence mechanisms in honey bees Apis mellifera
Evans, J D; Aronstein, K; Chen, Y P; Hetru, C; Imler, J-L; Jiang, H; Kanost, M; Thompson, G J; Zou, Z; Hultmark, D
2006-01-01
Social insects are able to mount both group-level and individual defences against pathogens. Here we focus on individual defences, by presenting a genome-wide analysis of immunity in a social insect, the honey bee Apis mellifera. We present honey bee models for each of four signalling pathways associated with immunity, identifying plausible orthologues for nearly all predicted pathway members. When compared to the sequenced Drosophila and Anopheles genomes, honey bees possess roughly one-third as many genes in 17 gene families implicated in insect immunity. We suggest that an implied reduction in immune flexibility in bees reflects either the strength of social barriers to disease, or a tendency for bees to be attacked by a limited set of highly coevolved pathogens. PMID:17069638
A new quantum sealed-bid auction protocol with secret order in post-confirmation
NASA Astrophysics Data System (ADS)
Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian
2015-10-01
A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.
The age distribution of mortality due to influenza: pandemic and peri-pandemic
2012-01-01
Background Pandemic influenza is said to 'shift mortality' to younger age groups; but also to spare a subpopulation of the elderly population. Does one of these effects dominate? Might this have important ramifications? Methods We estimated age-specific excess mortality rates for all-years for which data were available in the 20th century for Australia, Canada, France, Japan, the UK, and the USA for people older than 44 years of age. We modeled variation with age, and standardized estimates to allow direct comparison across age groups and countries. Attack rate data for four pandemics were assembled. Results For nearly all seasons, an exponential model characterized mortality data extremely well. For seasons of emergence and a variable number of seasons following, however, a subpopulation above a threshold age invariably enjoyed reduced mortality. 'Immune escape', a stepwise increase in mortality among the oldest elderly, was observed a number of seasons after both the A(H2N2) and A(H3N2) pandemics. The number of seasons from emergence to escape varied by country. For the latter pandemic, mortality rates in four countries increased for younger age groups but only in the season following that of emergence. Adaptation to both emergent viruses was apparent as a progressive decrease in mortality rates, which, with two exceptions, was seen only in younger age groups. Pandemic attack rate variation with age was estimated to be similar across four pandemics with very different mortality impact. Conclusions In all influenza pandemics of the 20th century, emergent viruses resembled those that had circulated previously within the lifespan of then-living people. Such individuals were relatively immune to the emergent strain, but this immunity waned with mutation of the emergent virus. An immune subpopulation complicates and may invalidate vaccine trials. Pandemic influenza does not 'shift' mortality to younger age groups; rather, the mortality level is reset by the virulence of the emerging virus and is moderated by immunity of past experience. In this study, we found that after immune escape, older age groups showed no further mortality reduction, despite their being the principal target of conventional influenza vaccines. Vaccines incorporating variants of pandemic viruses seem to provide little benefit to those previously immune. If attack rates truly are similar across pandemics, it must be the case that immunity to the pandemic virus does not prevent infection, but only mitigates the consequences. PMID:23234604
Convergent and Divergent Signaling in PAMP-Triggered Immunity and Effector-Triggered Immunity.
Peng, Yujun; van Wersch, Rowan; Zhang, Yuelin
2018-04-01
Plants use diverse immune receptors to sense pathogen attacks. Recognition of pathogen-associated molecular patterns (PAMPs) by pattern recognition receptors localized on the plasma membrane leads to PAMP-triggered immunity (PTI). Detection of pathogen effectors by intracellular or plasma membrane-localized immune receptors results in effector-triggered immunity (ETI). Despite the large variations in the magnitude and duration of immune responses triggered by different PAMPs or pathogen effectors during PTI and ETI, plasma membrane-localized immune receptors activate similar downstream molecular events such as mitogen-activated protein kinase activation, oxidative burst, ion influx, and increased biosynthesis of plant defense hormones, indicating that defense signals initiated at the plasma membrane converge at later points. On the other hand, activation of ETI by immune receptors localized to the nucleus appears to be more directly associated with transcriptional regulation of defense gene expression. Here, we review recent progress in signal transductions downstream of different groups of plant immune receptors, highlighting the converging and diverging molecular events.
Chakraborty, Subhra; Harro, Clayton; DeNearing, Barbara; Brubaker, Jessica; Connor, Sean; Maier, Nicole; Dally, Len; Flores, Jorge; Bourgeois, A Louis; Walker, Richard; Sack, David A
2018-04-01
A reliable and effective human challenge model is needed to help down-select the most promising ETEC vaccines currently under development. Such a model would need to reliably induce diarrhea in a high proportion of volunteers using the lowest possible inoculum to maximize safety and sensitivity. Previously we validated a challenge model that utilized a dose of 2x107 CFU of ETEC strain H10407 (LT+, ST+, CFA/I+ and O78+) to induce attack rates for moderate to severe diarrhea (MSD) of ~60-70%. Here we detail efforts to further refine the model in an attempt to determine if a lower challenge dose of H10407 can be used. Thirty subjects were randomized 1:1 to receive an oral administration of H10407 at doses of 106 or 105 CFU in bicarbonate buffer. After challenge, subjects were monitored for signs and symptoms of enteric illness and stool samples were collected to detect shedding of the challenge strain. Systemic and mucosal immune responses were measured using serum, antibody in lymphocyte supernatant and fecal samples. The attack rate was 13.3% (2/15) and 26.7% (4/15) for MSD in the 105 and 106 groups, respectively. Four MSD cases met criteria for early antibiotic treatment. All subjects but one shed the challenge strain in fecal samples. The frequency and magnitude of anti-LT toxin, CFA/I and LPS O78 immune responses were antigen, dose, severity of diarrhea and shedding levels dependent. Notably, although of lower magnitude, there were considerable immune responses in the subjects with no diarrhea. This may indicate that immune responses to asymptomatic infections of ETEC in children in the endemic countries may contribute to protection. Based on this and our prior studies, we conclude that a dose of 2x107 H10407 remains the lowest practical dose for use in future volunteer studies evaluating candidate vaccines and other preventive or therapeutic ETEC interventions. ClinicalTrials.gov NCT00844493.
DeNearing, Barbara; Brubaker, Jessica; Connor, Sean; Maier, Nicole; Dally, Len; Flores, Jorge; Bourgeois, A. Louis; Walker, Richard; Sack, David A.
2018-01-01
A reliable and effective human challenge model is needed to help down-select the most promising ETEC vaccines currently under development. Such a model would need to reliably induce diarrhea in a high proportion of volunteers using the lowest possible inoculum to maximize safety and sensitivity. Previously we validated a challenge model that utilized a dose of 2x107 CFU of ETEC strain H10407 (LT+, ST+, CFA/I+ and O78+) to induce attack rates for moderate to severe diarrhea (MSD) of ~60–70%. Here we detail efforts to further refine the model in an attempt to determine if a lower challenge dose of H10407 can be used. Thirty subjects were randomized 1:1 to receive an oral administration of H10407 at doses of 106 or 105 CFU in bicarbonate buffer. After challenge, subjects were monitored for signs and symptoms of enteric illness and stool samples were collected to detect shedding of the challenge strain. Systemic and mucosal immune responses were measured using serum, antibody in lymphocyte supernatant and fecal samples. The attack rate was 13.3% (2/15) and 26.7% (4/15) for MSD in the 105 and 106 groups, respectively. Four MSD cases met criteria for early antibiotic treatment. All subjects but one shed the challenge strain in fecal samples. The frequency and magnitude of anti-LT toxin, CFA/I and LPS O78 immune responses were antigen, dose, severity of diarrhea and shedding levels dependent. Notably, although of lower magnitude, there were considerable immune responses in the subjects with no diarrhea. This may indicate that immune responses to asymptomatic infections of ETEC in children in the endemic countries may contribute to protection. Based on this and our prior studies, we conclude that a dose of 2x107 H10407 remains the lowest practical dose for use in future volunteer studies evaluating candidate vaccines and other preventive or therapeutic ETEC interventions. Trial registration: ClinicalTrials.gov NCT00844493. PMID:29702652
Gene silencing-based disease resistance.
Wassenegger, Michael
2002-12-01
The definition of a disease is fundamentally difficult, even if one considers only genetically based diseases. In its broadest sense, disease can be defined as any deviation from the norm that results in a physiological disadvantage. Natural selection ensures that the norm for any given species is constantly changing. In addition, some disadvantages are latent and might only manifest under certain environmental conditions. Conversely, an apparent disadvantage can carry a benefit, for example, the disease sickle-cell anemia that is an advantage in malarial areas. Because of the difficulties in giving disease a precise definition, in this review, gene silencing-based disease resistance will be restricted to the description of gene inactivation processes that contribute to maintain the physical fitness of an organism. In this sense, we are concerned with the elimination of invasive nucleic acid expressing. In numerous organisms, a variety of severe diseases are caused by the attack of invasive nucleic acids such as viruses and retroviral or transposable elements. Organisms have developed diverse mechanisms to defend themselves against such attack that include immune responses and apoptosis. Fungi, plants, invertebrates and vertebrates also enlist gene silencing systems to counteract the harmful effects of invasive nucleic acids. In particular, plants that lack interferon and immune responses have established efficient transcriptional and post-transcriptional gene silencing systems. In this review, we describe how plants defend against invasive nucleic acids and focus on the continual evolutionary battle between plants and viruses. In addition, the importance of controlling transposon activity is outlined. Finally, gene silencing-related mechanisms of genomic imprinting and X-chromosome inactivation are discussed in the context of disease resistance.
Plant cell wall-mediated immunity: cell wall changes trigger disease resistance responses.
Bacete, Laura; Mélida, Hugo; Miedes, Eva; Molina, Antonio
2018-02-01
Plants have evolved a repertoire of monitoring systems to sense plant morphogenesis and to face environmental changes and threats caused by different attackers. These systems integrate different signals into overreaching triggering pathways which coordinate developmental and defence-associated responses. The plant cell wall, a dynamic and complex structure surrounding every plant cell, has emerged recently as an essential component of plant monitoring systems, thus expanding its function as a passive defensive barrier. Plants have a dedicated mechanism for maintaining cell wall integrity (CWI) which comprises a diverse set of plasma membrane-resident sensors and pattern recognition receptors (PRRs). The PRRs perceive plant-derived ligands, such as peptides or wall glycans, known as damage-associated molecular patterns (DAMPs). These DAMPs function as 'danger' alert signals activating DAMP-triggered immunity (DTI), which shares signalling components and responses with the immune pathways triggered by non-self microbe-associated molecular patterns that mediate disease resistance. Alteration of CWI by impairment of the expression or activity of proteins involved in cell wall biosynthesis and/or remodelling, as occurs in some plant cell wall mutants, or by wall damage due to colonization by pathogens/pests, activates specific defensive and growth responses. Our current understanding of how these alterations of CWI are perceived by the wall monitoring systems is scarce and few plant sensors/PRRs and DAMPs have been characterized. The identification of these CWI sensors and PRR-DAMP pairs will help us to understand the immune functions of the wall monitoring system, and might allow the breeding of crop varieties and the design of agricultural strategies that would enhance crop disease resistance. © 2017 The Authors The Plant Journal © 2017 John Wiley & Sons Ltd.
Functional genomics of the evolution of increased resistance to parasitism in Drosophila.
Wertheim, Bregje; Kraaijeveld, Alex R; Hopkins, Meirion G; Walther Boer, Mark; Godfray, H Charles J
2011-03-01
Individual hosts normally respond to parasite attack by launching an acute immune response (a phenotypic plastic response), while host populations can respond in the longer term by evolving higher level of defence against parasites. Little is known about the genetics of the evolved response: the identity and number of genes involved and whether it involves a pre-activation of the regulatory systems governing the plastic response. We explored these questions by surveying transcriptional changes in a Drosophila melanogaster strain artificially selected for resistance against the hymenopteran endoparasitoid Asobara tabida. Using micro-arrays, we profiled gene expression at seven time points during development (from the egg to the second instar larva) and found a large number of genes (almost 900) with altered expression levels. Bioinformatic analysis showed that some were involved in immunity or defence-associated functions but many were not. Previously, we had defined a set of genes whose level of expression changed after parasitoid attack and a comparison with the present set showed a significant though comparatively small overlap. This suggests that the evolutionary response to parasitism is not a simple pre-activation of the plastic, acute response. We also found overlap in the genes involved in the evolutionary response to parasitism and to other biotic and abiotic stressors, perhaps suggesting a 'module' of genes involved in a generalized stress response as has been found in other organisms. © 2010 Blackwell Publishing Ltd.
Chemical and genetic defenses against disease in insect societies.
Stow, Adam; Beattie, Andrew
2008-10-01
The colonies of ants, bees, wasps and termites, the social insects, consist of large numbers of closely related individuals; circumstances ideal for contagious diseases. Antimicrobial assays of these animals have demonstrated a wide variety of chemical defenses against both bacteria and fungi that can be broadly classified as either external antiseptic compounds or internal immune molecules. Reducing the disease risks inherent in colonies of social insects is also achieved by behaviors, such as multiple mating or dispersal, that lower genetic relatedness both within- and among colonies. The interactions between social insects and their pathogens are complex, as illustrated by some ants that require antimicrobial and behavioral defenses against highly specialized fungi, such as those in the genus Cordyceps that attack larvae and adults and species in the genus Escovopsis that attack their food supplies. Studies of these defenses, especially in ants, have revealed remarkably sophisticated immune systems, including peptides induced by, and specific to, individual bacterial strains. The latter may be the result of the recruitment by the ants of antibiotic-producing bacteria but the extent of such three-way interactions remains unknown. There is strong experimental evidence that the evolution of sociality required dramatic increases in antimicrobial defenses and that microbes have been powerful selective agents. The antimicrobial chemicals and the insect-killing fungi may be useful in medicine and agriculture, respectively.
NASA Astrophysics Data System (ADS)
1993-02-01
The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-attitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence.
Tirant, M; Bayer, P; Hercogovấ, J; Fioranelli, M; Gianfaldoni, S; Chokoeva, A A; Tchernev, G; Wollina, U; Novotny, F; Roccia, M G; Maximov, G K; França, K; Lotti, T
2016-01-01
Systemic lupus erythematosus (SLE) is a complex autoimmune disease in which the bodys immune system mistakenly attacks healthy tissue. It can affect the skin, joints, kidneys, brain and other organs. We report the case of a 7-year-old female patient with facial lesions of SLE since the age of 5. There was no significant family history and patient had been a healthy child from birth. The child presented with a malar rash, also known as a butterfly rash, with distribution over the cheeks but sparing the nasal bridge. This case represents the efficacy of the Dr. Michaels® (Soratinex®) product family in the successful resolution of facial lesions of SLE.
Medina-Aparicio, L.; Rebollar-Flores, J. E.; Gallego-Hernández, A. L.; Vázquez, A.; Olvera, L.; Gutiérrez-Ríos, R. M.; Calva, E.; Hernández-Lucas, I.
2011-01-01
Prokaryotes have developed multiple strategies to survive phage attack and invasive DNA. Recently, a novel genetic program denominated the CRISPR/Cas system was demonstrated to have a role in these biological processes providing genetic immunity. This defense mechanism is widespread in the Archaea and Bacteria, suggesting an ancient origin. In the last few years, progress has been made regarding the functionality of the CRISPR/Cas system; however, many basic aspects of the system remain unknown. For instance, there are few studies about the conditions and regulators involved in its transcriptional control. In this work, we analyzed the transcriptional organization of the CRISPR/Cas system as well as the positive and negative regulators involved in its genetic expression in Salmonella enterica serovar Typhi. The results obtained show that in S. Typhi the CRISPR/Cas system is a LeuO-dependent operon silenced by the global regulator LRP, in addition to the previously known nucleoid-associated protein H-NS; both LRP and H-NS bind upstream and downstream of the transcriptional start site of casA. In this study, relevant nucleotides of the casA regulatory region that mediate its LeuO transcriptional activation were identified. Interestingly, specific growth conditions (N-minimal medium) were found for the LeuO-independent expression of the CRISPR/Cas system in S. Typhi. Thus, our work provides evidence that there are multiple modulators involved in the genetic expression of this immune system in S. Typhi IMSS-1. PMID:21398529
Bernsdorff, Friederike; Döring, Anne-Christin; Gruner, Katrin; Schuck, Stefan; Bräutigam, Andrea; Zeier, Jürgen
2016-01-01
We investigated the relationships of the two immune-regulatory plant metabolites, salicylic acid (SA) and pipecolic acid (Pip), in the establishment of plant systemic acquired resistance (SAR), SAR-associated defense priming, and basal immunity. Using SA-deficient sid2, Pip-deficient ald1, and sid2 ald1 plants deficient in both SA and Pip, we show that SA and Pip act both independently from each other and synergistically in Arabidopsis thaliana basal immunity to Pseudomonas syringae. Transcriptome analyses reveal that SAR establishment in Arabidopsis is characterized by a strong transcriptional response systemically induced in the foliage that prepares plants for future pathogen attack by preactivating multiple stages of defense signaling and that SA accumulation upon SAR activation leads to the downregulation of photosynthesis and attenuated jasmonate responses systemically within the plant. Whereas systemic Pip elevations are indispensable for SAR and necessary for virtually the whole transcriptional SAR response, a moderate but significant SA-independent component of SAR activation and SAR gene expression is revealed. During SAR, Pip orchestrates SA-dependent and SA-independent priming of pathogen responses in a FLAVIN-DEPENDENT-MONOOXYGENASE1 (FMO1)-dependent manner. We conclude that a Pip/FMO1 signaling module acts as an indispensable switch for the activation of SAR and associated defense priming events and that SA amplifies Pip-triggered responses to different degrees in the distal tissue of SAR-activated plants. PMID:26672068
Aicardi-Goutières syndrome: a model disease for systemic autoimmunity.
Lee-Kirsch, M A; Wolf, C; Günther, C
2014-01-01
Systemic autoimmunity is a complex disease process that results from a loss of immunological tolerance characterized by the inability of the immune system to discriminate self from non-self. In patients with the prototypic autoimmune disease systemic lupus erythematosus (SLE), formation of autoantibodies targeting ubiquitous nuclear antigens and subsequent deposition of immune complexes in the vascular bed induces inflammatory tissue injury that can affect virtually any organ system. Given the extraordinary genetic and phenotypic heterogeneity of SLE, one approach to the genetic dissection of complex SLE is to study monogenic diseases, for which a single gene defect is responsible. Considerable success has been achieved from the analysis of the rare monogenic disorder Aicardi-Goutières syndrome (AGS), an inflammatory encephalopathy that clinically resembles in-utero-acquired viral infection and that also shares features with SLE. Progress in understanding the cellular and molecular functions of the AGS causing genes has revealed novel pathways of the metabolism of intracellular nucleic acids, the major targets of the autoimmune attack in patients with SLE. Induction of autoimmunity initiated by immune recognition of endogenous nucleic acids originating from processes such as DNA replication/repair or endogenous retro-elements represents novel paradigms of SLE pathogenesis. These findings illustrate how investigating rare monogenic diseases can also fuel discoveries that advance our understanding of complex disease. This will not only aid the development of improved tools for SLE diagnosis and disease classification, but also the development of novel targeted therapeutic approaches. © 2013 British Society for Immunology.
Bernsdorff, Friederike; Döring, Anne-Christin; Gruner, Katrin; Schuck, Stefan; Bräutigam, Andrea; Zeier, Jürgen
2016-01-01
We investigated the relationships of the two immune-regulatory plant metabolites, salicylic acid (SA) and pipecolic acid (Pip), in the establishment of plant systemic acquired resistance (SAR), SAR-associated defense priming, and basal immunity. Using SA-deficient sid2, Pip-deficient ald1, and sid2 ald1 plants deficient in both SA and Pip, we show that SA and Pip act both independently from each other and synergistically in Arabidopsis thaliana basal immunity to Pseudomonas syringae. Transcriptome analyses reveal that SAR establishment in Arabidopsis is characterized by a strong transcriptional response systemically induced in the foliage that prepares plants for future pathogen attack by preactivating multiple stages of defense signaling and that SA accumulation upon SAR activation leads to the downregulation of photosynthesis and attenuated jasmonate responses systemically within the plant. Whereas systemic Pip elevations are indispensable for SAR and necessary for virtually the whole transcriptional SAR response, a moderate but significant SA-independent component of SAR activation and SAR gene expression is revealed. During SAR, Pip orchestrates SA-dependent and SA-independent priming of pathogen responses in a FLAVIN-DEPENDENT-MONOOXYGENASE1 (FMO1)-dependent manner. We conclude that a Pip/FMO1 signaling module acts as an indispensable switch for the activation of SAR and associated defense priming events and that SA amplifies Pip-triggered responses to different degrees in the distal tissue of SAR-activated plants. © 2016 American Society of Plant Biologists. All rights reserved.
Complement System in Dermatological Diseases – Fire Under the Skin
Panelius, Jaana; Meri, Seppo
2015-01-01
The complement system plays a key role in several dermatological diseases. Overactivation, deficiency, or abnormality of the control proteins are often related to a skin disease. Autoimmune mechanisms with autoantibodies and a cytotoxic effect of the complement membrane attack complex on epidermal or vascular cells can cause direct tissue damage and inflammation, e.g., in systemic lupus erythematosus (SLE), phospholipid antibody syndrome, and bullous skin diseases like pemphigoid. By evading complement attack, some microbes like Borrelia spirochetes and staphylococci can persist in the skin and cause prolonged symptoms. In this review, we present the most important skin diseases connected to abnormalities in the function of the complement system. Drugs having an effect on the complement system are also briefly described. On one hand, drugs with free hydroxyl on amino groups (e.g., hydralazine, procainamide) could interact with C4A, C4B, or C3 and cause an SLE-like disease. On the other hand, progress in studies on complement has led to novel anti-complement drugs (recombinant C1-inhibitor and anti-C5 antibody, eculizumab) that could alleviate symptoms in diseases associated with excessive complement activation. The main theme of the manuscript is to show how relevant the complement system is as an immune effector system in contributing to tissue injury and inflammation in a broad range of skin disorders. PMID:25688346
Serological level of ICAM and ELAM adhesion molecules in allergic vascularitis.
Alecu, M; Coman, G; Gălăţescu, E
1997-01-01
A 24-patient lot with hypersensitivity vasculitis was investigated for serological determinations of ICAM and ELAM adhesion molecules. Determinations were made in attack and in remission. Over two thirds of the cases presented elevated serological levels of ICAM and ELAM in attack, with twofold higher values than normal. In remission, in the absence of clinical signs, ICAM and ELAM values were normal in 19 cases (ICAM) and 22 cases (ELAM). Serological level of ICAM and ELAM was concordant with serological level of IL-2, IL-6, circulating immune complexes and clinical status. The increased values of ICAM and ELAM are due to the expression of these molecules both on the surface of endothelial cells and on immune cells. The adherence of leukocytes on the endothelial cells, by adhesion molecules involvement, followed by their extravasation represents an important event in the vascular lesion pathogeny of the hypersensitivity vasculitis.
Epidemiological and ecological determinants of Zika virus transmission in an urban setting.
Lourenço, José; Maia de Lima, Maricelia; Faria, Nuno Rodrigues; Walker, Andrew; Kraemer, Moritz Ug; Villabona-Arenas, Christian Julian; Lambert, Ben; Marques de Cerqueira, Erenilde; Pybus, Oliver G; Alcantara, Luiz Cj; Recker, Mario
2017-09-09
The Zika virus has emerged as a global public health concern. Its rapid geographic expansion is attributed to the success of Aedes mosquito vectors, but local epidemiological drivers are still poorly understood. Feira de Santana played a pivotal role in the Chikungunya epidemic in Brazil and was one of the first urban centres to report Zika infections. Using a climate-driven transmission model and notified Zika case data, we show that a low observation rate and high vectorial capacity translated into a significant attack rate during the 2015 outbreak, with a subsequent decline in 2016 and fade-out in 2017 due to herd-immunity. We find a potential Zika-related, low risk for microcephaly per pregnancy, but with significant public health impact given high attack rates. The balance between the loss of herd-immunity and viral re-importation will dictate future transmission potential of Zika in this urban setting.
Epidemiological and ecological determinants of Zika virus transmission in an urban setting
Maia de Lima, Maricelia; Faria, Nuno Rodrigues; Walker, Andrew; Kraemer, Moritz UG; Villabona-Arenas, Christian Julian; Lambert, Ben; Marques de Cerqueira, Erenilde; Pybus, Oliver G; Alcantara, Luiz CJ; Recker, Mario
2017-01-01
The Zika virus has emerged as a global public health concern. Its rapid geographic expansion is attributed to the success of Aedes mosquito vectors, but local epidemiological drivers are still poorly understood. Feira de Santana played a pivotal role in the Chikungunya epidemic in Brazil and was one of the first urban centres to report Zika infections. Using a climate-driven transmission model and notified Zika case data, we show that a low observation rate and high vectorial capacity translated into a significant attack rate during the 2015 outbreak, with a subsequent decline in 2016 and fade-out in 2017 due to herd-immunity. We find a potential Zika-related, low risk for microcephaly per pregnancy, but with significant public health impact given high attack rates. The balance between the loss of herd-immunity and viral re-importation will dictate future transmission potential of Zika in this urban setting. PMID:28887877
Cyber Incidents Involving Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert J. Turk
2005-10-01
The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Managementmore » Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).« less
Honti, Viktor; Csordás, Gábor; Kurucz, Éva; Márkus, Róbert; Andó, István
2014-01-01
In the animal kingdom, innate immunity is the first line of defense against invading pathogens. The dangers of microbial and parasitic attacks are countered by similar mechanisms, involving the prototypes of the cell-mediated immune responses, the phagocytosis and encapsulation. Work on Drosophila has played an important role in promoting an understanding of the basic mechanisms of phylogenetically conserved modules of innate immunity. The aim of this review is to survey the developments in the identification and functional definition of immune cell types and the immunological compartments of Drosophila melanogaster. We focus on the molecular and developmental aspects of the blood cell types and compartments, as well as the dynamics of blood cell development and the immune response. Further advances in the characterization of the innate immune mechanisms in Drosophila will provide basic clues to the understanding of the importance of the evolutionary conserved mechanisms of innate immune defenses in the animal kingdom. Copyright © 2013 Elsevier Ltd. All rights reserved.
Avoiding horror autotoxicus: The importance of dendritic cells in peripheral T cell tolerance
Steinman, Ralph Marvin; Nussenzweig, Michel C.
2002-01-01
The immune system generally avoids horror autotoxicus or autoimmunity, an attack against the body's own constituents. This avoidance requires that self-reactive T cells be actively silenced or tolerized. We propose that dendritic cells (DCs) play a critical role in establishing tolerance, especially in the periphery, after functioning T cells have been produced in the thymus. In the steady state, meaning in the absence of acute infection and inflammation, DCs are in an immature state and not fully differentiated to carry out their known roles as inducers of immunity. Nevertheless, immature DCs continuously circulate through tissues and into lymphoid organs, capturing self antigens as well as innocuous environmental proteins. Recent experiments have provided direct evidence that antigen-loaded immature DCs silence T cells either by deleting them or by expanding regulatory T cells. This capacity of DCs to induce peripheral tolerance can work in two opposing ways in the context of infection. In acute infection, a beneficial effect should occur. The immune system would overcome the risk of developing autoimmunity and chronic inflammation if, before infection, tolerance were induced to innocuous environmental proteins as well as self antigens captured from dying infected cells. For chronic or persistent pathogens, a second but dire potential could take place. Continuous presentation of a pathogen by immature DCs, HIV-1 for example, may lead to tolerance and active evasion of protective immunity. The function of DCs in defining immunologic self provides a new focus for the study of autoimmunity and chronic immune-based diseases. PMID:11773639
Transmembrane mucins as novel therapeutic targets.
Constantinou, Pamela E; Danysh, Brian P; Dharmaraj, Neeraja; Carson, Daniel D
2011-11-01
Membrane-tethered mucin glycoproteins are abundantly expressed at the apical surfaces of simple epithelia, where they play important roles in lubricating and protecting tissues from pathogens and enzymatic attack. Notable examples of these mucins are MUC1, MUC4 and MUC16 (also known as cancer antigen 125). In adenocarcinomas, apical mucin restriction is lost and overall expression is often highly increased. High-level mucin expression protects tumors from killing by the host immune system, as well as by chemotherapeutic agents, and affords protection from apoptosis. Mucin expression can increase as the result of gene duplication and/or in response to hormones, cytokines and growth factors prevalent in the tumor milieu. Rises in the normally low levels of mucin fragments in serum have been used as markers of disease, such as tumor burden, for many years. Currently, several approaches are being examined that target mucins for immunization or nanomedicine using mucin-specific antibodies.
Janus Kinase Inhibitors for the Treatment of Rheumatoid Arthritis.
Turan, Senir; Walker, Scot
2017-11-01
Rheumatoid arthritis (RA) is a disease where the immune system attacks the linings of the joints, resulting in joint pain, stiffness, swelling, and destruction. Although many products are available for the treatment of RA, limitations such as adverse reactions and tolerance greatly affect adherence. Many of the current biologic disease-modifying antirheumatic drugs on the market are injectables, leaving a void to be filled for a product that can be taken orally. The most advanced of these approaches, the Janus kinase (JAK) inhibitors, are oral drugs that have not only made a breakthrough in RA, but also other skin conditions.
Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less
Zhang, Xudong; Mou, Zhonglin
2012-09-01
Plant systemic acquired resistance (SAR) is a long-lasting, broad-spectrum immune response that is mounted after primary pathogen infection. Although SAR has been extensively researched, the molecular mechanisms underlying its activation have not been completely understood. We have previously shown that the electron carrier NAD(P) leaks into the plant extracellular compartment upon pathogen attack and that exogenous NAD(P) activates defense gene expression and disease resistance in local treated leaves, suggesting that extracellular NAD(P) [eNAD(P)] might function as a signal molecule activating plant immune responses. To further establish the function of eNAD(P) in plant immunity, we tested the effect of exogenous NAD(P) on resistance gene-mediated hypersensitive response (HR) and SAR. We found that exogenous NAD(P) completely suppresses HR-mediated cell death but does not affect HR-mediated disease resistance. Local application of exogenous NAD(P) is unable to induce SAR in distal tissues, indicating that eNAD(P) is not a sufficient signal for SAR activation. Using transgenic Arabidopsis plants expressing the human NAD(P)-metabolizing ectoenzyme CD38, we demonstrated that altering eNAD(P) concentration or signaling compromises biological induction of SAR. This result suggests that eNAD(P) may play a critical signaling role in activation of SAR.
Llorens, Eugenio; Agustí-Brisach, Carlos; González-Hernández, Ana I; Troncho, Pilar; Vicedo, Begonya; Yuste, Teresa; Orero, Mayte; Ledó, Carlos; García-Agustín, Pilar; Lapeña, Leonor
2017-05-01
Developments of alternatives to the use of chemical pesticides to control pests are focused on the induction of natural plant defences. The study of new compounds based on liquid bioassimilable sulphur and its effect as an inductor of the immune system of plants would provide an alternative option to farmers to enhance plant resistance against pathogen attacks such as powdery mildew. In order to elucidate the efficacy of this compound in tomato against powdery mildew, we tested several treatments: curative foliar, preventive foliar, preventive in soil drench and combining preventive in soil drench and curative foliar. In all cases, treated plants showed lower infection development, better physiological parameters and a higher level of chlorophyll. We also observed better performance in parameters involved in plant resistance such as antioxidant response, callose deposition and hormonal levels. The results indicate that preventive and curative treatments can be highly effective for the prevention and control of powdery mildew in tomato plants. Foliar treatments are able to stop the pathogen development when they are applied as curative. Soil drench treatments induce immune response mechanisms of plants, increasing significantly callose deposition and promoting plant development. © 2016 Society of Chemical Industry. © 2016 Society of Chemical Industry.
Yang, Yuting; Tai, Xiaowei; Shi, Kairong; Ruan, Shaobo; Qiu, Yue; Zhang, Zhirong; Xiang, Bing; He, Qin
2016-01-01
The enhanced permeability and retention (EPR) effect has been comfortably accepted, and extensively assumed as a keystone in the research on tumor-targeted drug delivery system. Due to the unsatisfied tumor-targeting efficiency of EPR effect being one conspicuous drawback, nanocarriers that merely relying on EPR effect are difficult to access the tumor tissue and consequently trigger efficient tumor therapy in clinic. In the present contribution, we break up the shackles of EPR effect on nanocarriers thanks to their universal distribution characteristic. We successfully design a paclitaxel (PTX) and alpha-galactosylceramide (αGC) co-loaded TH peptide (AGYLLGHINLHHLAHL(Aib)HHIL-Cys) -modified liposome (PTX/αGC-TH-Lip) and introduce a new concept of immuno-chemotherapy combination via accumulation of these liposomes at both spleen and tumor sites naturally and simultaneously. The PTX-initiated cytotoxicity attacks tumor cells at tumor sites, meanwhile, the αGC-triggered antitumor immune response emerges at spleen tissue. Different to the case that liposomes are loaded with sole drug, in this concept two therapeutic processes effectively reinforce each other, thereby elevating the tumor therapy efficiency significantly. The data demonstrates that the PTX/αGC-TH-Lip not only possess therapeutic effect against highly malignant B16F10 melanoma tumor, but also adjust the in vivo immune status and induce a more remarkable systemic antitumor immunity that could further suppress the growth of tumor at distant site. This work exhibits the capability of the PTX/αGC-TH-Lip in improving immune-chemotherapy against tumor after systemic administration. PMID:27698946
Long non-coding RNAs as molecular players in plant defense against pathogens.
Zaynab, Madiha; Fatima, Mahpara; Abbas, Safdar; Umair, Muhammad; Sharif, Yasir; Raza, Muhammad Ammar
2018-05-31
Long non-coding RNAs (lncRNAs) has significant role in of gene expression and silencing pathways for several biological processes in eukaryotes. lncRNAs has been reported as key player in remodeling chromatin and genome architecture, RNA stabilization and transcription regulation, including enhancer-associated activity. Host lncRNAs are reckoned as compulsory elements of plant defense. In response to pathogen attack, plants protect themselves with the help of lncRNAs -dependent immune systems in which lncRNAs regulate pathogen-associated molecular patterns (PAMPs) and other effectors. Role of lncRNAs in plant microbe interaction has been studied extensively but regulations of several lncRNAs still need extensive research. In this study we discussed and provide as overview the topical advancements and findings relevant to pathogen attack and plant defense mediated by lncRNAs. It is hoped that lncRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases. Copyright © 2018. Published by Elsevier Ltd.
Engineering synthetic vaccines using cues from natural immunity.
Irvine, Darrell J; Swartz, Melody A; Szeto, Gregory L
2013-11-01
Vaccines aim to protect against or treat diseases through manipulation of the immune response, promoting either immunity or tolerance. In the former case, vaccines generate antibodies and T cells poised to protect against future pathogen encounter or attack diseased cells such as tumours; in the latter case, which is far less developed, vaccines block pathogenic autoreactive T cells and autoantibodies that target self tissue. Enormous challenges remain, however, as a consequence of our incomplete understanding of human immunity. A rapidly growing field of research is the design of vaccines based on synthetic materials to target organs, tissues, cells or intracellular compartments; to co-deliver immunomodulatory signals that control the quality of the immune response; or to act directly as immune regulators. There exists great potential for well-defined materials to further our understanding of immunity. Here we describe recent advances in the design of synthetic materials to direct immune responses, highlighting successes and challenges in prophylactic, therapeutic and tolerance-inducing vaccines.
Engineering synthetic vaccines using cues from natural immunity
NASA Astrophysics Data System (ADS)
Irvine, Darrell J.; Swartz, Melody A.; Szeto, Gregory L.
2013-11-01
Vaccines aim to protect against or treat diseases through manipulation of the immune response, promoting either immunity or tolerance. In the former case, vaccines generate antibodies and T cells poised to protect against future pathogen encounter or attack diseased cells such as tumours; in the latter case, which is far less developed, vaccines block pathogenic autoreactive T cells and autoantibodies that target self tissue. Enormous challenges remain, however, as a consequence of our incomplete understanding of human immunity. A rapidly growing field of research is the design of vaccines based on synthetic materials to target organs, tissues, cells or intracellular compartments; to co-deliver immunomodulatory signals that control the quality of the immune response; or to act directly as immune regulators. There exists great potential for well-defined materials to further our understanding of immunity. Here we describe recent advances in the design of synthetic materials to direct immune responses, highlighting successes and challenges in prophylactic, therapeutic and tolerance-inducing vaccines.
Tran, Giang T; Hodgkinson, Suzanne J; Carter, Nicole M; Killingsworth, Murray; Nomura, Masaru; Verma, Nirupama D; Plain, Karren M; Boyd, Rochelle; Hall, Bruce M
2010-12-15
Antibody deposition and complement activation, especially membrane attack complex (MAC) formation are considered central for immune mediated demyelination. To examine the role of MAC in immune mediated demyelination, we studied experimental allergic neuritis (EAN) in Lewis rats deficient in complement component 6 (C6) that cannot form MAC. A C6 deficient Lewis (Lewis/C6-) strain of rats was bred by backcrossing the defective C6 gene, from PVG/C6- rats, onto the Lewis background. Lewis/C6- rats had the same C6 gene deletion as PVG/C6- rats and their sera did not support immune mediated haemolysis unless C6 was added. Active EAN was induced in Lewis and Lewis/C6- rats by immunization with bovine peripheral nerve myelin in complete Freund's adjuvant (CFA), and Lewis/C6- rats had delayed clinical EAN compared to the Lewis rats. Peripheral nerve demyelination in Lewis/C6- was also delayed but was similar in extent at the peak of disease. Compared to Lewis, Lewis/C6- nerves had no MAC deposition, reduced macrophage infiltrate and IL-17A, but similar T cell infiltrate and Th1 cytokine mRNA expression. ICAM-1 and P-selectin mRNA expression and immunostaining on vascular endothelium were delayed in Lewis C6- compared to Lewis rats' nerves. This study found that MAC was not required for immune mediated demyelination; but that MAC enhanced early symptoms and early demyelination in EAN, either by direct lysis or by sub-lytic induction of vascular endothelial expression of ICAM-1 and P-selectin. Copyright © 2010 Elsevier B.V. All rights reserved.
CCR scientists tease out mechanisms of immune cell communication | Center for Cancer Research
Researchers from the Cancer and Inflammation Program at the Center for Cancer Research and the Ben-Gurion University of the Negev in Israel have discovered that the simple processes of molecular diffusion and absorption control the spread of cytokines through dense body tissues. The simple control mechanisms enable the immune response to tailor itself to the nature and severity of a pathogenic attack and to prevent dangerous autoimmune reactions. Read more...
Friedrichs, Björn; Heuser, Claudia; Guhlke, Stefan; Abken, Hinrich; Hombach, Andreas A.
2012-01-01
Successful immunotherapy of Hodgkin's disease is so far hampered by the striking unresponsiveness of lymphoma infiltrating immune cells. To mobilize both adoptive and innate immune cells for an anti-tumor attack we fused the pro-inflammatory cytokines IL2 and IL12 to an anti-CD30 scFv antibody in a dual cytokine fusion protein to accumulate both cytokines at the malignant CD30+ Hodgkin/Reed-Sternberg cells in the lymphoma lesion. The tumor-targeted IL12-IL2 fusion protein was superior in activating resting T cells to amplify and secrete pro-inflammatory cytokines compared to targeted IL2 or IL12 alone. NK cells were also activated by the dual cytokine protein to secrete IFN-γ and to lyse target cells. The tumor-targeted IL12-IL2, when applied by i.v. injection to immune-competent mice with established antigen-positive tumors, accumulated at the tumor site and induced tumor regression. Data demonstrate that simultaneous targeting of two cytokines in a spatial and temporal simultaneous fashion to pre-defined tissues is feasible by a dual-cytokine antibody fusion protein. In the case of IL12 and IL2, this produced superior anti-tumor efficacy implying the strategy to muster a broader immune cell response in the combat against cancer. PMID:23028547
Olofsson, Martin; Eriksson, Stephan; Jakobsson, Sven; Wiklund, Christer
2012-01-01
Many animals reduce the risk of being attacked by a predator through crypsis, masquerade or, alternatively, by advertising unprofitability by means of aposematic signalling. Behavioural attributes in prey employed after discovery, however, signify the importance of also having an effective secondary defence if a predator uncovers, or is immune to, the prey's primary defence. In butterflies, as in most animals, secondary defence generally consists of escape flights. However, some butterfly species have evolved other means of secondary defence such as deimatic displays/startle displays. The European swallowtail, Papilio machaon, employs what appears to be a startle display by exposing its brightly coloured dorsal wing surface upon disturbance and, if the disturbance continues, by intermittently protracting and relaxing its wing muscles generating a jerky motion of the wings. This display appears directed towards predators but whether it is effective in intimidating predators so that they refrain from attacks has never been tested experimentally. In this study we staged encounters between a passerine predator, the great tit, Parus major, and live and dead swallowtail butterflies in a two-choice experiment. Results showed that the dead butterfly was virtually always attacked before the live butterfly, and that it took four times longer before a bird attacked the live butterfly. When the live butterfly was approached by a bird this generally elicited the butterfly's startle display, which usually caused the approaching bird to flee. We also performed a palatability test of the butterflies and results show that the great tits seemed to find them palatable. We conclude that the swallowtail's startle display of conspicuous coloration and jerky movements is an efficient secondary defence against small passerines. We also discuss under what conditions predator-prey systems are likely to aid the evolution of deimatic behaviours in harmless and palatable prey.
Learning from history: The Glasgow Airport terrorist attack.
Crichton, Gillies
Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.
Du, Yiqun; Teng, Xiaoyan; Wang, Na; Zhang, Xin; Chen, Jianfeng; Ding, Peipei; Qiao, Qian; Wang, Qingkai; Zhang, Long; Yang, Chaoqun; Yang, Zhangmin; Chu, Yiwei; Du, Xiang; Zhou, Xuhui; Hu, Weiguo
2014-01-31
The complement system can be activated spontaneously for immune surveillance or induced to clear invading pathogens, in which the membrane attack complex (MAC, C5b-9) plays a critical role. CD59 is the sole membrane complement regulatory protein (mCRP) that restricts MAC assembly. CD59, therefore, protects innocent host cells from attacks by the complement system, and host cells require the constitutive and inducible expression of CD59 to protect themselves from deleterious destruction by complement. However, the mechanisms that underlie CD59 regulation remain largely unknown. In this study we demonstrate that the widely expressed transcription factor Sp1 may regulate the constitutive expression of CD59, whereas CREB-binding protein (CBP)/p300 bridge NF-κB and CREB, which surprisingly functions as an enhancer-binding protein to induce the up-regulation of CD59 during in lipopolysaccharide (LPS)-triggered complement activation, thus conferring host defense against further MAC-mediated destruction. Moreover, individual treatment with LPS, TNF-α, and the complement activation products (sublytic MAC (SC5b-9) and C5a) could increase the expression of CD59 mainly by activating NF-κB and CREB signaling pathways. Together, our findings identify a novel gene regulation mechanism involving CBP/p300, NF-κB, and CREB; this mechanism suggests potential drug targets for controlling various complement-related human diseases.
Method and tool for network vulnerability analysis
Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM
2006-03-14
A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."
Boosting innate immunity to sustainably control diseases in crops.
Nicaise, Valerie
2017-10-01
Viruses cause epidemics in all major crops, threatening global food security. The development of efficient and durable resistance able to withstand viral attacks represents a major challenge for agronomy, and relies greatly on the understanding of the molecular dialogue between viral pathogens and their hosts. Research over the last decades provided substantial advances in the field of plant-virus interactions. Remarkably, the advent of studies of plant innate immunity has recently offered new strategies exploitable in the field. This review summarizes the recent breakthroughs that define the mechanisms underlying antiviral innate immunity in plants, and emphasizes the importance of integrating that knowledge into crop improvement actions, particularly by exploiting the insights related to immune receptors. Copyright © 2017 Elsevier B.V. All rights reserved.
Research Finds Link Between Statin Use and Progressive Muscle Disease
... Syndrome Press Release | October 29, 2015 NIAMS launches new Spanish-language website Press Release | September 10, 2015 In uveitis, bacteria in gut may instruct immune cells to attack the eye Press Release | August 18, 2015 High-resolution 3D ...
Hybrid attacks on model-based social recommender systems
NASA Astrophysics Data System (ADS)
Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao
2017-10-01
With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.
Immune functions of insect βGRPs and their potential application.
Rao, Xiang-Jun; Zhan, Ming-Yue; Pan, Yue-Min; Liu, Su; Yang, Pei-Jin; Yang, Li-Ling; Yu, Xiao-Qiang
2018-06-01
Insects rely completely on the innate immune system to sense the foreign bodies and to mount the immune responses. Germ-line encoded pattern recognition receptors play crucial roles in recognizing pathogen-associated molecular patterns. Among them, β-1,3-glucan recognition proteins (βGRPs) and gram-negative bacteria-binding proteins (GNBPs) belong to the same pattern recognition receptor family, which can recognize β-1,3-glucans. Typical insect βGRPs are comprised of a tandem carbohydrate-binding module in the N-terminal and a glucanase-like domain in the C-terminal. The former can recognize triple-helical β-1,3-glucans, whereas the latter, which normally lacks the enzymatic activity, can recruit adapter proteins to initiate the protease cascade. According to studies, insect βGRPs possess at least three types of functions. Firstly, some βGRPs cooperate with peptidoglycan recognition proteins to recognize the lysine-type peptidoglycans upstream of the Toll pathway. Secondly, some directly recognize fungal β-1,3-glucans to activate the Toll pathway and melanization. Thirdly, some form the 'attack complexes' with other immune effectors to promote the antifungal defenses. The current review will focus on the discovery of insect βGRPs, functions of some well-characterized members, structure-function studies and their potential application. Copyright © 2017 Elsevier Ltd. All rights reserved.
Yunger, Elad; Safra, Modi; Levi-Ferber, Mor; Haviv-Chesner, Anat
2017-01-01
In C. elegans, removal of the germline triggers molecular events in the neighboring intestine, which sends an anti-aging signal to the rest of the animal. In this study, we identified an innate immunity related gene, named irg-7, as a novel mediator of longevity in germlineless animals. We consider irg-7 to be an integral downstream component of the germline longevity pathway because its expression increases upon germ cell removal and its depletion interferes with the activation of the longevity-promoting transcription factors DAF-16 and DAF-12 in germlineless animals. Furthermore, irg-7 activation by itself sensitizes the animals' innate immune response and extends the lifespan of animals exposed to live bacteria. This lifespan-extending pathogen resistance relies on the somatic gonad as well as on many genes previously associated with the reproductive longevity pathway. This suggests that these genes are also relevant in animals with an intact gonad, and can affect their resistance to pathogens. Altogether, this study demonstrates the tight association between germline homeostasis and the immune response of animals, and raises the possibility that the reproductive system can act as a signaling center to divert resources towards defending against putative pathogen attacks. PMID:28196094
Description of a large measles epidemic in Democratic Republic of Congo, 2010-2013.
Mancini, Silvia; Coldiron, Matthew E; Ronsse, Axelle; Ilunga, Benoît Kebela; Porten, Klaudia; Grais, Rebecca F
2014-01-01
Although measles mortality has declined dramatically in Sub-Saharan Africa, measles remains a major public health problem in countries like the Democratic Republic of Congo (DRC). Here, we describe the large measles epidemic that occurred in the Democratic Republic of Congo between 2010 and 2013 using data from the national surveillance system as well as vaccine coverage surveys to provide a snapshot of the epidemiology of measles in DRC. Standardized national surveillance data were used to describe measles cases from 2010 to 2013. Attack rates and case fatality ratios were calculated and the temporal and spatial evolution of the epidemic described. Data on laboratory confirmation and vaccination coverage surveys as a part of routine program monitoring are also presented. Between week 1 of 2010 and week 45 of 2013, a total of 294,455 cases and 5,045 deaths were reported. The cumulative attack rate (AR) was 0.4%. The Case Fatality Ratio (CFR) was 1.7% among cases reported in health structures through national surveillance. A total of 186,178 cases (63%) were under 5 years old, representing an estimated AR of 1.4% in this age group. Following the first mass vaccination campaigns, weekly reported cases decreased by 21.5%. Results of post-vaccination campaign coverage surveys indicated sub-optimal (under 95%) vaccination coverage among children surveyed. The data reported here highlight the need to seek additional means to reinforce routine immunization as well as ensure the timely implementation of Supplementary Immunization Activities to prevent large and repeated measles epidemics in DRC. Although reactive campaigns were conducted in response to the epidemic, strategies to ensure that children are vaccinated in the routine system remains the foundation of measles control.
Finite Energy and Bounded Attacks on Control System Sensor Signals
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less
Therapeutic decision making in a new drug era in multiple sclerosis.
Keegan, B Mark
2013-02-01
Multiple sclerosis is a presumed autoimmune, inflammatory disease of the central nervous system. Since the early 1990s, medications have been devised, tested, and approved for relapsing forms of multiple sclerosis (MS). MS treatments work by altering the immune system to reduce inflammatory MS activity, thus curtailing clinical relapses (attacks), thereby reducing short-term disability related to the MS attacks. The promise of long-term improvement in MS-related disability remains the most desirable therapeutic goal; to what degree current MS therapies are effective in reducing this is controversial. Recent years have seen a surge in novel MS therapies delivered both parenterally and orally that offer new therapeutic alternatives to MS patients and their treating providers. It remains essential to make an unequivocal diagnosis of MS and identify its clinical course prior to initiating therapies. Switching and altering MS therapies can now be done by rational approaches based on therapeutic efficacy and tolerability; however, these remain nonevidence-based for the most part. The high cost of MS therapies remains a significant concern. A new therapeutic era is at hand offering new hope for patients affected by this chronic, frequently disabling disease. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.
Metabolic Induction of Trained Immunity through the Mevalonate Pathway.
Bekkering, Siroon; Arts, Rob J W; Novakovic, Boris; Kourtzelis, Ioannis; van der Heijden, Charlotte D C C; Li, Yang; Popa, Calin D; Ter Horst, Rob; van Tuijl, Julia; Netea-Maier, Romana T; van de Veerdonk, Frank L; Chavakis, Triantafyllos; Joosten, Leo A B; van der Meer, Jos W M; Stunnenberg, Henk; Riksen, Niels P; Netea, Mihai G
2018-01-11
Innate immune cells can develop long-term memory after stimulation by microbial products during infections or vaccinations. Here, we report that metabolic signals can induce trained immunity. Pharmacological and genetic experiments reveal that activation of the cholesterol synthesis pathway, but not the synthesis of cholesterol itself, is essential for training of myeloid cells. Rather, the metabolite mevalonate is the mediator of training via activation of IGF1-R and mTOR and subsequent histone modifications in inflammatory pathways. Statins, which block mevalonate generation, prevent trained immunity induction. Furthermore, monocytes of patients with hyper immunoglobulin D syndrome (HIDS), who are mevalonate kinase deficient and accumulate mevalonate, have a constitutive trained immunity phenotype at both immunological and epigenetic levels, which could explain the attacks of sterile inflammation that these patients experience. Unraveling the role of mevalonate in trained immunity contributes to our understanding of the pathophysiology of HIDS and identifies novel therapeutic targets for clinical conditions with excessive activation of trained immunity. Copyright © 2017 Elsevier Inc. All rights reserved.
Historical perspective and human consequences of Africanized bee stings in the Americas.
Ferreira, R S; Almeida, R A M B; Barraviera, S R C S; Barraviera, B
2012-01-01
In 1956, Africanized bees began to spread in the American continent from southern Brazil, where original African bees mated with European bees. A few years later, in 1990, these Africanized bees reached the United States and were found in Texas. Currently, these hybrid bees are found in several North American states and will probably reach the Canadian border in the future. Although the presence of Africanized bees had produced positive effects on Brazilian economy, including improvement in crop pollination and in honey production, turning Brazil into a major exporter, the negative impacts-such as swarming, aggressive behavior, and the ability to mass attack-resulted in serious and fatal envenomation with humans and animals. Victims of bee attacks usually develop a severe envenomation syndrome characterized by the release of a large amount of cytokines [interleukins (IL) IL-1, IL-6, IL-8], and tumor necrosis factor (TNF). Subsequently, such cytokines produce an acute inflammatory response that triggers adverse effects on skeletal muscles; bone marrow; hepatic and renal functions; and cardiovascular, central nervous, and immune systems. Finally, the aim of the present review is to study historical characteristics and current status of Africanized bees' spread, the composition of their venom, the impact of the bees on the Brazilian economy and ecology, and clinical aspects of their stings including immune response, and to suggest a protocol for bee sting management since there is no safe and effective antivenom available.
CRISPR-Cas adaptation: insights into the mechanism of action.
Amitai, Gil; Sorek, Rotem
2016-02-01
Since the first demonstration that CRISPR-Cas systems provide bacteria and archaea with adaptive immunity against phages and plasmids, numerous studies have yielded key insights into the molecular mechanisms governing how these systems attack and degrade foreign DNA. However, the molecular mechanisms underlying the adaptation stage, in which new immunological memory is formed, have until recently represented a major unresolved question. In this Progress article, we discuss recent discoveries that have shown both how foreign DNA is identified by the CRISPR-Cas adaptation machinery and the molecular basis for its integration into the chromosome to form an immunological memory. Furthermore, we describe the roles of each of the specific CRISPR-Cas components that are involved in memory formation, and consider current models for their evolutionary origin.
Cao, Pengxing; Yan, Ada W C; Heffernan, Jane M; Petrie, Stephen; Moss, Robert G; Carolan, Louise A; Guarnaccia, Teagan A; Kelso, Anne; Barr, Ian G; McVernon, Jodie; Laurie, Karen L; McCaw, James M
2015-08-01
Influenza is an infectious disease that primarily attacks the respiratory system. Innate immunity provides both a very early defense to influenza virus invasion and an effective control of viral growth. Previous modelling studies of virus-innate immune response interactions have focused on infection with a single virus and, while improving our understanding of viral and immune dynamics, have been unable to effectively evaluate the relative feasibility of different hypothesised mechanisms of antiviral immunity. In recent experiments, we have applied consecutive exposures to different virus strains in a ferret model, and demonstrated that viruses differed in their ability to induce a state of temporary immunity or viral interference capable of modifying the infection kinetics of the subsequent exposure. These results imply that virus-induced early immune responses may be responsible for the observed viral hierarchy. Here we introduce and analyse a family of within-host models of re-infection viral kinetics which allow for different viruses to stimulate the innate immune response to different degrees. The proposed models differ in their hypothesised mechanisms of action of the non-specific innate immune response. We compare these alternative models in terms of their abilities to reproduce the re-exposure data. Our results show that 1) a model with viral control mediated solely by a virus-resistant state, as commonly considered in the literature, is not able to reproduce the observed viral hierarchy; 2) the synchronised and desynchronised behaviour of consecutive virus infections is highly dependent upon the interval between primary virus and challenge virus exposures and is consistent with virus-dependent stimulation of the innate immune response. Our study provides the first mechanistic explanation for the recently observed influenza viral hierarchies and demonstrates the importance of understanding the host response to multi-strain viral infections. Re-exposure experiments provide a new paradigm in which to study the immune response to influenza and its role in viral control.
Cao, Pengxing; Yan, Ada W. C.; Heffernan, Jane M.; Petrie, Stephen; Moss, Robert G.; Carolan, Louise A.; Guarnaccia, Teagan A.; Kelso, Anne; Barr, Ian G.; McVernon, Jodie; Laurie, Karen L.; McCaw, James M.
2015-01-01
Influenza is an infectious disease that primarily attacks the respiratory system. Innate immunity provides both a very early defense to influenza virus invasion and an effective control of viral growth. Previous modelling studies of virus–innate immune response interactions have focused on infection with a single virus and, while improving our understanding of viral and immune dynamics, have been unable to effectively evaluate the relative feasibility of different hypothesised mechanisms of antiviral immunity. In recent experiments, we have applied consecutive exposures to different virus strains in a ferret model, and demonstrated that viruses differed in their ability to induce a state of temporary immunity or viral interference capable of modifying the infection kinetics of the subsequent exposure. These results imply that virus-induced early immune responses may be responsible for the observed viral hierarchy. Here we introduce and analyse a family of within-host models of re-infection viral kinetics which allow for different viruses to stimulate the innate immune response to different degrees. The proposed models differ in their hypothesised mechanisms of action of the non-specific innate immune response. We compare these alternative models in terms of their abilities to reproduce the re-exposure data. Our results show that 1) a model with viral control mediated solely by a virus-resistant state, as commonly considered in the literature, is not able to reproduce the observed viral hierarchy; 2) the synchronised and desynchronised behaviour of consecutive virus infections is highly dependent upon the interval between primary virus and challenge virus exposures and is consistent with virus-dependent stimulation of the innate immune response. Our study provides the first mechanistic explanation for the recently observed influenza viral hierarchies and demonstrates the importance of understanding the host response to multi-strain viral infections. Re-exposure experiments provide a new paradigm in which to study the immune response to influenza and its role in viral control. PMID:26284917
Sinkovics, J G
2008-12-01
The author of the monograph "Cytolytic Immune Lymphocytes..." (published in 2008 by Schenk Buchverlag Campus Dialog, Budapest, Passau, Pécs) proposed several research projects and described certain clinical events that require further elaboration and documentation. In this article the author provides what is required and has since become available. The first subject matter in question concerns the fusogenic viruses. The ancient fusogenic viruses might have created the first eukaryotic cell(s) by uniting archaeabacterial and prokaryotic/protobacterial protospheroplasts. Extant fusogenic viruses either produce tumor cell syncytia and lyse them, thus practicing viral oncolysis. Or, create chimaeric fusion products, the so-called "natural hybridomas", of lymphoma cells exhibiting transmembrane budding of retrovirus particles or envelope proteins, and anti-viral specific antibody-producing plasma cells. The second topic concerns the horizontal-lateral mode of acquisition of those genes, which were "present in the waiting" in the amphioxus, sea urchin, and the agnathans, and met in the primitive gnatostomata sharks to encode in unison the entire adaptive immune system. The consensus of opinion is such that these genes derived from newly acquired transposons/retrotransposons. The author points out that the extant Epstein-Barr virus harbors genes displaying sequence homology with those genes from the sharks up to mammals that regulate the somatic hypermutation of specific antibody production. The author proposes that an ancient herpesvirus might have propagated the V(D)J and RAG genes from sea urchins to sharks. The third area is that of lymphocytes cytotoxic/cytolytic to virally infected or malignantly transformed host cells. This discovery led to the adoptive immune lymphocyte therapy of tumors. Installed in the adaptive immune system are regulatory T cells and myeloid-derived suppressor cells for he protection of "self". Tumor cells masquerading as "self" are protected by these cells from attacks launched by immune T cells. The author supports the replacement of IL-2 by IL-15, inasmuch as IL-2 stimulates not only immune T cells, but also regulatory T cells expressing the CD25 IL-2 receptor. The administration of low dose whole body radiotherapy prior to immune lymphocyte therapy increases the efficacy of immune lymphocyte therapy. The author observed this phenomenon in the mid-1960s. The explanation of this phenomenon revealed itself just recently. In pre-irradiated hosts the intestinal wall becomes permeable to the gut flora; the intestinal bacteria activate the entire innate immune system in the mesenteric lymph nodes and a rapid activation of the adaptive immune faculties follows.
Talmadge, J E; Talmadge, C B; Zbar, B; McEwen, R; Meeker, A K; Tribble, H
1987-06-01
The mechanism by which tumor allografts escape host immunologic attack was investigated. B16-BL6 cells (the bladder 6 subline of the B16 melanoma) (H-2b) were transfected with a gene (Dd) encoding an allogeneic class I major histocompatibility complex antigen. Clones that expressed Dd antigen were injected into the footpads of nonimmune syngeneic mice, syngeneic immune mice, and nude mice. Under conditions of immunologic selection a clone that contained multiple copies of the transfected gene formed variants that lacked the transfected gene. Primary tumors and pulmonary metastases of immunized mice and pulmonary metastases of nonimmunized mice had lost the Dd gene and, in most cases, all of the associated plasmid. In contrast, in immunodeficient nude mice, primary tumors and pulmonary metastases retained the Dd gene and the associated plasmid. Deletion of genes encoding cell surface antigens may be one of the mechanisms by which allogeneic tumors escape immunologic attack.
Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy
NASA Astrophysics Data System (ADS)
Kwon, Cheolhyeon
Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.
A graph-based system for network-vulnerability analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.
1998-06-01
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Targeted Therapy: Attacking Cancer with Molecular and Immunological Targeted Agents.
Wilkes, Gail M
2018-01-01
Today, personalized cancer therapy with targeted agents has taken center stage, and offers individualized treatment to many. As the mysteries of the genes in a cell's DNA and their specific proteins are defined, advances in the understanding of cancer gene mutations and how cancer evades the immune system have been made. This article provides a basic and simplified understanding of the available (Food and Drug Administration- approved) molecularly and immunologically targeted agents in the USA. Other agents may be available in Asia, and throughout the USA and the world, many more agents are being studied. Nursing implications for drug classes are reviewed.
Targeted Therapy: Attacking Cancer with Molecular and Immunological Targeted Agents
Wilkes, Gail M.
2018-01-01
Today, personalized cancer therapy with targeted agents has taken center stage, and offers individualized treatment to many. As the mysteries of the genes in a cell's DNA and their specific proteins are defined, advances in the understanding of cancer gene mutations and how cancer evades the immune system have been made. This article provides a basic and simplified understanding of the available (Food and Drug Administration- approved) molecularly and immunologically targeted agents in the USA. Other agents may be available in Asia, and throughout the USA and the world, many more agents are being studied. Nursing implications for drug classes are reviewed. PMID:29607374
Secure TRNG with random phase stimulation
NASA Astrophysics Data System (ADS)
Wieczorek, Piotr Z.
2017-08-01
In this paper a novel TRNG concept is proposed which is a vital part of cryptographic systems. The proposed TRNG involves phase variability of a pair of ring oscillators (ROs) to force the multiple metastable events in a flip-flop (FF). In the solution, the ROs are periodically activated to ensure the violation of the FF timing and resultant state randomness, while the TRNG circuit adapts the structure of ROs to obtain the maximum entropy and circuit security. The TRNG can be implemented in inexpensive re-programmable devices (CPLDs or FPGAs) without the use of Digital Clock Managers (DCMs). Preliminary test results proved the circuit's immunity to the intentional frequency injection attacks.
Roussilhon, Christian; Brasseur, Philippe; Agnamey, Patrice; Pérignon, Jean-Louis; Druilhe, Pierre
2010-01-01
Background Former studies have pointed to a monocyte-dependant effect of antibodies in protection against malaria and thereby to cytophilic antibodies IgG1 and IgG3, which trigger monocyte receptors. Field investigations have further documented that a switch from non-cytophilic to cytophilic classes of antimalarial antibodies was associated with protection. The hypothesis that the non-cytophilic isotype imbalance could be related to concomittant helminthic infections was supported by several interventions and case-control studies. Methods and Findings We investigated here the hypothesis that the delayed acquisition of immunity to malaria could be related to a worm-induced Th2 drive on antimalarial immune responses. IgG1 to IgG4 responses against 6 different parasite-derived antigens were analyzed in sera from 203 Senegalese children, half carrying intestinal worms, presenting 421 clinical malaria attacks over 51 months. Results show a significant correlation between the occurrence of malaria attacks, worm carriage (particularly that of hookworms) and a decrease in cytophilic IgG1 and IgG3 responses and an increase in non-cytophilic IgG4 response to the merozoite stage protein 3 (MSP3) vaccine candidate. Conclusion The results confirm the association with protection of anti-MSP3 cytophilic responses, confirm in one additional setting that worms increase malaria morbidity and show a Th2 worm-driven pattern of anti-malarial immune responses. They document why large anthelminthic mass treatments may be worth being assessed as malaria control policies. PMID:20174576
Multiple operating system rotation environment moving target defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Evans, Nathaniel; Thompson, Michael
Systems and methods for providing a multiple operating system rotation environment ("MORE") moving target defense ("MTD") computing system are described. The MORE-MTD system provides enhanced computer system security through a rotation of multiple operating systems. The MORE-MTD system increases attacker uncertainty, increases the cost of attacking the system, reduces the likelihood of an attacker locating a vulnerability, and reduces the exposure time of any located vulnerability. The MORE-MTD environment is effectuated by rotation of the operating systems at a given interval. The rotating operating systems create a consistently changing attack surface for remote attackers.
Barcia, Carlos; Sanderson, Nicholas S R; Barrett, Robert J; Wawrowsky, Kolja; Kroeger, Kurt M; Puntel, Mariana; Liu, Chunyan; Castro, Maria G; Lowenstein, Pedro R
2008-08-20
Astrocytes usually respond to trauma, stroke, or neurodegeneration by undergoing cellular hypertrophy, yet, their response to a specific immune attack by T cells is poorly understood. Effector T cells establish specific contacts with target cells, known as immunological synapses, during clearance of virally infected cells from the brain. Immunological synapses mediate intercellular communication between T cells and target cells, both in vitro and in vivo. How target virally infected astrocytes respond to the formation of immunological synapses established by effector T cells is unknown. Herein we demonstrate that, as a consequence of T cell attack, infected astrocytes undergo dramatic morphological changes. From normally multipolar cells, they become unipolar, extending a major protrusion towards the immunological synapse formed by the effector T cells, and withdrawing most of their finer processes. Thus, target astrocytes become polarized towards the contacting T cells. The MTOC, the organizer of cell polarity, is localized to the base of the protrusion, and Golgi stacks are distributed throughout the protrusion, reaching distally towards the immunological synapse. Thus, rather than causing astrocyte hypertrophy, antiviral T cells cause a major structural reorganization of target virally infected astrocytes. Astrocyte polarization, as opposed to hypertrophy, in response to T cell attack may be due to T cells providing a very focused attack, and thus, astrocytes responding in a polarized manner. A similar polarization of Golgi stacks towards contacting T cells was also detected using an in vitro allogeneic model. Thus, different T cells are able to induce polarization of target astrocytes. Polarization of target astrocytes in response to immunological synapses may play an important role in regulating the outcome of the response of astrocytes to attacking effector T cells, whether during antiviral (e.g. infected during HIV, HTLV-1, HSV-1 or LCMV infection), anti-transplant, autoimmune, or anti-tumor immune responses in vivo and in vitro.
Martínez, Osmarie; Bravo Cruz, Ariana; Santos, Saritza; Ramírez, Maite; Miranda, Eric; Shisler, Joanna; Otero, Miguel
2017-10-20
Smallpox is a disease caused by Variola virus (VARV). Although eradicated by WHO in 1980, the threat of using VARV on a bioterror attack has increased. The current smallpox vaccine ACAM2000, which consists of live vaccinia virus (VACV), causes complications in individuals with a compromised immune system or with previously reported skin diseases. Thus, a safer and efficacious vaccine needs to be developed. Previously, we reported that our virus-free DNA vaccine formulation, a pVAX1 plasmid encoding codon-optimized VACV A27L gene (pA27LOPT) with and without Imiquimod adjuvant, stimulates A27L-specific production of IFN-γ and increases humoral immunity 7days post-vaccination. Here, we investigated the immune response of our novel vaccine by measuring the frequency of splenocytes producing IFN-γ by ELISPOT, the TH1 and TH2 cytokine profiles, and humoral immune responses two weeks post-vaccination, when animals were challenged with VACV. In all assays, the A27-based DNA vaccine conferred protective immune responses. Specifically, two weeks after vaccination, mice were challenged intranasally with vaccinia virus, and viral titers in mouse lungs and ovaries were significantly lower in groups immunized with pA27LOPT and pA27LOPT+Imiquimod. These results demonstrate that our vaccine formulation decreases viral replication and dissemination in a virus-free DNA vaccine platform, and provides an alternative towards a safer an efficacious vaccine. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.
Towards functional antibody-based vaccines to prevent pre-erythrocytic malaria infection.
Sack, Brandon; Kappe, Stefan H I; Sather, D Noah
2017-05-01
An effective malaria vaccine would be considered a milestone of modern medicine, yet has so far eluded research and development efforts. This can be attributed to the extreme complexity of the malaria parasites, presenting with a multi-stage life cycle, high genome complexity and the parasite's sophisticated immune evasion measures, particularly antigenic variation during pathogenic blood stage infection. However, the pre-erythrocytic (PE) early infection forms of the parasite exhibit relatively invariant proteomes, and are attractive vaccine targets as they offer multiple points of immune system attack. Areas covered: We cover the current state of and roadblocks to the development of an effective, antibody-based PE vaccine, including current vaccine candidates, limited biological knowledge, genetic heterogeneity, parasite complexity, and suboptimal preclinical models as well as the power of early stage clinical models. Expert commentary: PE vaccines will need to elicit broad and durable immunity to prevent infection. This could be achievable if recent innovations in studying the parasites' infection biology, rational vaccine selection and design as well as adjuvant formulation are combined in a synergistic and multipronged approach. Improved preclinical assays as well as the iterative testing of vaccine candidates in controlled human malaria infection trials will further accelerate this effort.
Anthrax vaccination strategies
Cybulski, Robert J.; Sanz, Patrick; O'Brien, Alison D.
2009-01-01
The biological attack conducted through the U.S. postal system in 2001 broadened the threat posed by anthrax from one pertinent mainly to soldiers on the battlefield to one understood to exist throughout our society. The expansion of the threatened population placed greater emphasis on the reexamination of how we vaccinate against Bacillus anthracis. The currently-licensed Anthrax Vaccine, Adsorbed (AVA) and Anthrax Vaccine, Precipitated (AVP) are capable of generating a protective immune response but are hampered by shortcomings that make their widespread use undesirable or infeasible. Efforts to gain U.S. Food and Drug Administration (FDA) approval for licensure of a second generation recombinant protective antigen (rPA)-based anthrax vaccine are ongoing. However, this vaccine's reliance on the generation of a humoral immune response against a single virulence factor has led a number of scientists to conclude that the vaccine is likely not the final solution to optimal anthrax vaccine design. Other vaccine approaches, which seek a more comprehensive immune response targeted at multiple components of the B. anthracis organism, are under active investigation. This review seeks to summarize work that has been done to build on the current PA-based vaccine methodology and to evaluate the search for future anthrax prophylaxis strategies. PMID:19729034
Bacterial virulence effectors and their activities.
Hann, Dagmar R; Gimenez-Ibanez, Selena; Rathjen, John P
2010-08-01
The major virulence strategy for plant pathogenic bacteria is deployment of effector molecules within the host cytoplasm. Each bacterial strain possesses a set of 20-30 effectors which have overlapping activities, are functionally interchangeable, and diverge in composition between strains. Effectors target host molecules to suppress immunity. Two main strategies are apparent. Effectors that target host proteins seem to attack conserved structural domains but otherwise lack specificity. On the other hand, those that influence host gene transcription directly do so with extreme specificity. In both cases, examples are known where the host has exploited effector-target affinities to establish immune recognition of effectors. The molecular activity of each effector links virulence and immune outcomes. Copyright 2010 Elsevier Ltd. All rights reserved.
Immune Response of Mormon Crickets that Survived Infection by Beauveria Bassiana
USDA-ARS?s Scientific Manuscript database
Beauveria bassiana is an entomopathogenic Ascomycete fungus that serves as a biological control agent of Mormon crickets (Anabrus simplex Haldeman) and other grasshopper pests. To measure the dose dependent response of Mormon crickets to fungal attack, we applied B. bassiana strain GHA topically to...
Evolution and diversity of NLR proteins in sugar beets
USDA-ARS?s Scientific Manuscript database
Plants have developed several layers of immunity in order to defend against unrelenting pathogenic attacks. One of these layers is resistance genes. NLR genes are a type of resistance gene, and are involved in pathogen recognition and activation of a hypersensitive response. Genetic data and inferen...
Sweet smells prepare plants for future stress: airborne induction of plant disease immunity.
Yi, Hwe-Su; Ryu, Choong-Min; Heil, Martin
2010-05-01
Plants require protection against a wide range of attackers such as insects and pathogens. The adequate plant defense responses are regulated via sophisticated signal cascades, which are activated following the perception of specific cues of the attackers. Plants might, however, gain a significant fitness advantage when pre-empting enemy attack before it actually occurs. Monitoring cues from attacked neighbors can permit plants to reach this goal. We have recently found airborne disease resistance against a bacterial pathogen in uninfected lima bean plants when these were located close to conspecific, resistance-expressing neighbors. The emitters could be chemically induced with benzothiadiazole or biologically with an avirulent pathogen. Unexpectedly, receiver plants, although expressing a functioning resistance, did not show reduced growth rates, which represent a common side-effect of directly induced pathogen resistance. Nonanal was identified as an active volatile and, rather than directly inducing full resistance, primed defense gene expression, which became fully activated only when the plants were subsequently challenged by a virulent pathogen. Priming by airborne signals allows for a more efficient and less costly preparation of plants for future attack and airborne signaling can affect resistance against both major groups of plant enemies: herbivores and pathogens.
Improve sensitization and corrosion resistance of an Al-Mg alloy by optimization of grain boundaries
NASA Astrophysics Data System (ADS)
Yan, Jianfeng; Heckman, Nathan M.; Velasco, Leonardo; Hodge, Andrea M.
2016-05-01
The sensitization and subsequent intergranular corrosion of Al-5.3 wt.% Mg alloy has been shown to be an important factor in stress corrosion cracking of Al-Mg alloys. Understanding sensitization requires the review of grain boundary character on the precipitation process which can assist in developing and designing alloys with improved corrosion resistance. This study shows that the degree of precipitation in Al-Mg alloy is dependent on grain boundary misorientation angle, adjacent grain boundary planes and grain boundary types. The results show that the misorientation angle is the most important factor influencing precipitation in grain boundaries of the Al-Mg alloy. Low angle grain boundaries (≤15°) have better immunity to precipitation and grain boundary acid attack. High angle grain boundaries (>15°) are vulnerable to grain boundary acid attack. Grain boundaries with adjacent plane orientations near to {100} have potential for immunity to precipitation and grain boundary acid attack. This work shows that low Σ (Σ ≤ 29) coincident site lattice (CSL) grain boundaries have thinner β precipitates. Modified nitric acid mass loss test and polarization test demonstrated that the global corrosion resistance of sputtered Al-Mg alloy is enhanced. This may be attributed to the increased fractions of low Σ (Σ ≤ 29) CSL grain boundaries after sputtering.
Identifying and tracking attacks on networks: C3I displays and related technologies
NASA Astrophysics Data System (ADS)
Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.
2003-09-01
Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.
On resilience studies of system detection and recovery techniques against stealthy insider attacks
NASA Astrophysics Data System (ADS)
Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.
2016-05-01
With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.
Monitoring of continuous-variable quantum key distribution system in real environment.
Liu, Weiqi; Peng, Jinye; Huang, Peng; Huang, Duan; Zeng, Guihua
2017-08-07
How to guarantee the practical security of continuous-variable quantum key distribution (CVQKD) system has been an important issue in the quantum cryptography applications. In contrast to the previous practical security strategies, which focus on the intercept-resend attack or the Gaussian attack, we investigate the practical security strategy based on a general attack, i.e., an arbitrated individual attack or collective attack on the system by Eve in this paper. The low bound of intensity disturbance of the local oscillator signal for eavesdropper successfully concealing herself is obtained, considering all noises can be used by Eve in the practical environment. Furthermore, we obtain an optimal monitoring condition for the practical CVQKD system so that legitimate communicators can monitor the general attack in real-time. As examples, practical security of two special systems, i.e., the Gaussian modulated coherent state CVQKD system and the middle-based CVQKD system, are investigated under the intercept-resend attacks.
NASA Astrophysics Data System (ADS)
Krajewski, Grzegorz; Wegrzyński, Wojciech
2018-01-01
In this paper, the Authors present results of a complex case study, in which a natural smoke ventilation system was introduced into a historical mall Koszyki Market Hall located in the centre of Warsaw. As historical authorities protected the building, the only solution possible was to use a natural system - known for deficient performance in façade applications. To maximise the performance of the smoke control system, a Computational Wind Engineering exercise was performed. The goal was to find the most difficult wind attack angles, and optimise the performance at these conditions. Once the wind influence was known, a transient analysis was performed that included the growth of the fire within the building, as well as a numerical evacuation study. The resulting system was immune to the wind effects, and provided safe evacuation to users of the building, even in difficult wind conditions.
CRISPR-mediated defense mechanisms in the hyperthermophilic archaeal genus Sulfolobus
Manica, Andrea; Schleper, Christa
2013-01-01
CRISPR (clustered regularly interspaced short palindromic repeats)-mediated virus defense based on small RNAs is a hallmark of archaea and also found in many bacteria. Archaeal genomes and, in particular, organisms of the extremely thermoacidophilic genus Sulfolobus, carry extensive CRISPR loci each with dozens of sequence signatures (spacers) able to mediate targeting and degradation of complementary invading nucleic acids. The diversity of CRISPR systems and their associated protein complexes indicates an extensive functional breadth and versatility of this adaptive immune system. Sulfolobus solfataricus and S. islandicus represent two of the best characterized genetic model organisms in the archaea not only with respect to the CRISPR system. Here we address and discuss in a broader context particularly recent progress made in understanding spacer recruitment from foreign DNA, production of small RNAs, in vitro activity of CRISPR-associated protein complexes and attack of viruses and plasmids in in vivo test systems. PMID:23535277
ERIC Educational Resources Information Center
Poremba, Sue Marquette
2012-01-01
Who hasn't received mail from a company notifying them that their personal information may have been compromised? No organization--not Amazon, not the CIA--is immune to cyberattacks, and higher education is no exception. Indeed, colleges and universities may be even more susceptible to security breaches than their corporate brethren, and the…
Forecastable and Guidable Bubble-Propelled Microplate Motors for Cell Transport.
Hu, Narisu; Zhang, Bin; Gai, Meiyu; Zheng, Ce; Frueh, Johannes; He, Qiang
2017-06-01
Cell transport is important to renew body functions and organs with stem cells, or to attack cancer cells with immune cells. The main hindrances of this method are the lack of understanding of cell motion as well as proper transport systems. In this publication, bubble-propelled polyelectrolyte microplates are used for controlled transport and guidance of HeLa cells. Cells survive attachment on the microplates and up to 22 min in 5% hydrogen peroxide solution. They can be guided by a magnetic field whereby increased friction of cells attached to microplates decreases the speed by 90% compared to pristine microplates. The motion direction of the cell-motor system is easier to predict due to the cell being opposite to the bubbles. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Liang, Wen-Ye; Wang, Shuang; Li, Hong-Wei; Yin, Zhen-Qiang; Chen, Wei; Yao, Yao; Huang, Jing-Zheng; Guo, Guang-Can; Han, Zheng-Fu
2014-01-01
We have demonstrated a proof-of-principle experiment of reference-frame-independent phase coding quantum key distribution (RFI-QKD) over an 80-km optical fiber. After considering the finite-key bound, we still achieve a distance of 50 km. In this scenario, the phases of the basis states are related by a slowly time-varying transformation. Furthermore, we developed and realized a new decoy state method for RFI-QKD systems with weak coherent sources to counteract the photon-number-splitting attack. With the help of a reference-frame-independent protocol and a Michelson interferometer with Faraday rotator mirrors, our system is rendered immune to the slow phase changes of the interferometer and the polarization disturbances of the channel, making the procedure very robust. PMID:24402550
Peptidoglycan from Fermentation By-Product Triggers Defense Responses in Grapevine
Chen, Yang; Takeda, Taito; Aoki, Yoshinao; Fujita, Keiko; Suzuki, Shunji; Igarashi, Daisuke
2014-01-01
Plants are constantly under attack from a variety of microorganisms, and rely on a series of complex detection and response systems to protect themselves from infection. Here, we found that a by-product of glutamate fermentation triggered defense responses in grapevine, increasing the expression of defense response genes in cultured cells, foliar chitinase activity, and resistance to infection by downy mildew in leaf explants. To identify the molecule that triggered this innate immunity, we fractionated and purified candidates extracted from Corynebacterium glutamicum, a bacterium used in the production of amino acids by fermentation. Using hydrolysis by lysozyme, a silkworm larva plasma detection system, and gel filtration analysis, we identified peptidoglycan as inducing the defense responses. Peptidoglycans of Escherichia coli, Bacillus subtilis, and Staphylococcus aureus also generated similar defensive responses. PMID:25427192
Bremer, Daniel; Pache, Florence; Günther, Robert; Hornow, Jürgen; Andresen, Volker; Leben, Ruth; Mothes, Ronja; Zimmermann, Hanna; Brandt, Alexander U.; Paul, Friedemann; Hauser, Anja E.; Radbruch, Helena; Niesner, Raluca
2016-01-01
A hallmark of autoimmune retinal inflammation is the infiltration of the retina with cells of the innate and adaptive immune system, leading to detachment of the retinal layers and even to complete loss of the retinal photoreceptor layer. As the only optical system in the organism, the eye enables non-invasive longitudinal imaging studies of these local autoimmune processes and of their effects on the target tissue. Moreover, as a window to the central nervous system (CNS), the eye also reflects general neuroinflammatory processes taking place at various sites within the CNS. Histological studies in murine neuroinflammatory models, such as experimental autoimmune uveoretinitis (EAU) and experimental autoimmune encephalomyelitis, indicate that immune infiltration is initialized by effector CD4+ T cells, with the innate compartment (neutrophils, macrophages, and monocytes) contributing crucially to tissue degeneration that occurs at later phases of the disease. However, how the immune attack is orchestrated by various immune cell subsets in the retina and how the latter interact with the target tissue under in vivo conditions is still poorly understood. Our study addresses this gap with a novel approach for intravital two-photon microscopy, which enabled us to repeatedly track CD4+ T cells and LysM phagocytes during the entire course of EAU and to identify a specific radial infiltration pattern of these cells within the inflamed retina, starting from the optic nerve head. In contrast, highly motile CX3CR1+ cells display an opposite radial motility pattern, toward the optic nerve head. These inflammatory processes induce modifications of the microglial network toward an activated morphology, especially around the optic nerve head and main retinal blood vessels, but do not affect the neurons within the ganglion cell layer. Thanks to the new technology, non-invasive correlation of clinical scores of CNS-related pathologies with immune infiltrate behavior and subsequent tissue dysfunction is now possible. Hence, the new approach paves the way for deeper insights into the pathology of neuroinflammatory processes on a cellular basis, over the entire disease course. PMID:28066446
Using the Domain Name System to Thwart Automated Client-Based Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Taylor, Curtis R; Shue, Craig A
2011-09-01
On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less
Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems
NASA Astrophysics Data System (ADS)
Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.
2017-01-01
The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.
Localized attacks on spatially embedded networks with dependencies.
Berezin, Yehiel; Bashan, Amir; Danziger, Michael M; Li, Daqing; Havlin, Shlomo
2015-03-11
Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures-even of finite fraction-if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems.
Eshbaugh, Robert; Chen, Fang; Atwell, Susana
2017-01-01
To respond to pathogen attack, selection and associated evolution has led to the creation of plant immune system that are a highly effective and inducible defense system. Central to this system are the plant defense hormones jasmonic acid (JA) and salicylic acid (SA) and crosstalk between the two, which may play an important role in defense responses to specific pathogens or even genotypes. Here, we used the Arabidopsis thaliana-Botrytis cinerea pathosystem to test how the host’s defense system functions against genetic variation in a pathogen. We measured defense-related phenotypes and transcriptomic responses in Arabidopsis wild-type Col-0 and JA- and SA-signaling mutants, coi1-1 and npr1-1, individually challenged with 96 diverse B. cinerea isolates. Those data showed genetic variation in the pathogen influences on all components within the plant defense system at the transcriptional level. We identified four gene coexpression networks and two vectors of defense variation triggered by genetic variation in B. cinerea. This showed that the JA and SA signaling pathways functioned to constrain/canalize the range of virulence in the pathogen population, but the underlying transcriptomic response was highly plastic. These data showed that plants utilize major defense hormone pathways to buffer disease resistance, but not the metabolic or transcriptional responses to genetic variation within a pathogen. PMID:29042403
Zhang, Wei; Corwin, Jason A; Copeland, Daniel; Feusier, Julie; Eshbaugh, Robert; Chen, Fang; Atwell, Susana; Kliebenstein, Daniel J
2017-11-01
To respond to pathogen attack, selection and associated evolution has led to the creation of plant immune system that are a highly effective and inducible defense system. Central to this system are the plant defense hormones jasmonic acid (JA) and salicylic acid (SA) and crosstalk between the two, which may play an important role in defense responses to specific pathogens or even genotypes. Here, we used the Arabidopsis thaliana - Botrytis cinerea pathosystem to test how the host's defense system functions against genetic variation in a pathogen. We measured defense-related phenotypes and transcriptomic responses in Arabidopsis wild-type Col-0 and JA- and SA-signaling mutants, coi1-1 and npr1-1 , individually challenged with 96 diverse B. cinerea isolates. Those data showed genetic variation in the pathogen influences on all components within the plant defense system at the transcriptional level. We identified four gene coexpression networks and two vectors of defense variation triggered by genetic variation in B. cinerea This showed that the JA and SA signaling pathways functioned to constrain/canalize the range of virulence in the pathogen population, but the underlying transcriptomic response was highly plastic. These data showed that plants utilize major defense hormone pathways to buffer disease resistance, but not the metabolic or transcriptional responses to genetic variation within a pathogen. © 2017 American Society of Plant Biologists. All rights reserved.
Olofsson, Martin; Eriksson, Stephan; Jakobsson, Sven; Wiklund, Christer
2012-01-01
Background Many animals reduce the risk of being attacked by a predator through crypsis, masquerade or, alternatively, by advertising unprofitability by means of aposematic signalling. Behavioural attributes in prey employed after discovery, however, signify the importance of also having an effective secondary defence if a predator uncovers, or is immune to, the prey’s primary defence. In butterflies, as in most animals, secondary defence generally consists of escape flights. However, some butterfly species have evolved other means of secondary defence such as deimatic displays/startle displays. The European swallowtail, Papilio machaon, employs what appears to be a startle display by exposing its brightly coloured dorsal wing surface upon disturbance and, if the disturbance continues, by intermittently protracting and relaxing its wing muscles generating a jerky motion of the wings. This display appears directed towards predators but whether it is effective in intimidating predators so that they refrain from attacks has never been tested experimentally. Methodology/Principal Findings In this study we staged encounters between a passerine predator, the great tit, Parus major, and live and dead swallowtail butterflies in a two-choice experiment. Results showed that the dead butterfly was virtually always attacked before the live butterfly, and that it took four times longer before a bird attacked the live butterfly. When the live butterfly was approached by a bird this generally elicited the butterfly’s startle display, which usually caused the approaching bird to flee. We also performed a palatability test of the butterflies and results show that the great tits seemed to find them palatable. Conclusions/Significance We conclude that the swallowtail’s startle display of conspicuous coloration and jerky movements is an efficient secondary defence against small passerines. We also discuss under what conditions predator-prey systems are likely to aid the evolution of deimatic behaviours in harmless and palatable prey. PMID:23056590
Structure, Biology, and Therapeutic Application of Toxin-Antitoxin Systems in Pathogenic Bacteria.
Lee, Ki-Young; Lee, Bong-Jin
2016-10-22
Bacterial toxin-antitoxin (TA) systems have received increasing attention for their diverse identities, structures, and functional implications in cell cycle arrest and survival against environmental stresses such as nutrient deficiency, antibiotic treatments, and immune system attacks. In this review, we describe the biological functions and the auto-regulatory mechanisms of six different types of TA systems, among which the type II TA system has been most extensively studied. The functions of type II toxins include mRNA/tRNA cleavage, gyrase/ribosome poison, and protein phosphorylation, which can be neutralized by their cognate antitoxins. We mainly explore the similar but divergent structures of type II TA proteins from 12 important pathogenic bacteria, including various aspects of protein-protein interactions. Accumulating knowledge about the structure-function correlation of TA systems from pathogenic bacteria has facilitated a novel strategy to develop antibiotic drugs that target specific pathogens. These molecules could increase the intrinsic activity of the toxin by artificially interfering with the intermolecular network of the TA systems.
Structure, Biology, and Therapeutic Application of Toxin–Antitoxin Systems in Pathogenic Bacteria
Lee, Ki-Young; Lee, Bong-Jin
2016-01-01
Bacterial toxin–antitoxin (TA) systems have received increasing attention for their diverse identities, structures, and functional implications in cell cycle arrest and survival against environmental stresses such as nutrient deficiency, antibiotic treatments, and immune system attacks. In this review, we describe the biological functions and the auto-regulatory mechanisms of six different types of TA systems, among which the type II TA system has been most extensively studied. The functions of type II toxins include mRNA/tRNA cleavage, gyrase/ribosome poison, and protein phosphorylation, which can be neutralized by their cognate antitoxins. We mainly explore the similar but divergent structures of type II TA proteins from 12 important pathogenic bacteria, including various aspects of protein–protein interactions. Accumulating knowledge about the structure–function correlation of TA systems from pathogenic bacteria has facilitated a novel strategy to develop antibiotic drugs that target specific pathogens. These molecules could increase the intrinsic activity of the toxin by artificially interfering with the intermolecular network of the TA systems. PMID:27782085
Trimming Surface Sugars Protects Histoplasma from Immune Attack.
Brown, Gordon D
2016-04-26
Dectin-1 is an essential innate immune receptor that recognizes β-glucans in fungal cell walls. Its importance is underscored by the mechanisms that fungal pathogens have evolved to avoid detection by this receptor. One such pathogen is Histoplasma capsulatum, and in a recent article in mBio, Rappleye's group presented data showing that yeasts of this organism secrete a β-glucanase, Eng1, which acts to prune β-glucans that are exposed on the fungal cell surface [A. L. Garfoot et al., mBio 7(2):e01388-15, 2016, http://dx.doi.org/10.1128/mBio.01388-15]. The trimming of these sugars reduces immune recognition through Dectin-1 and subsequent inflammatory responses, enhancing the pathogenesis of H. capsulatum. Copyright © 2016 Brown.
Genetics and biology of pancreatic ductal adenocarcinoma
Ying, Haoqiang; Dey, Prasenjit; Yao, Wantong; Kimmelman, Alec C.; Draetta, Giulio F.; Maitra, Anirban; DePinho, Ronald A.
2016-01-01
With 5-year survival rates remaining constant at 6% and rising incidences associated with an epidemic in obesity and metabolic syndrome, pancreatic ductal adenocarcinoma (PDAC) is on track to become the second most common cause of cancer-related deaths by 2030. The high mortality rate of PDAC stems primarily from the lack of early diagnosis and ineffective treatment for advanced tumors. During the past decade, the comprehensive atlas of genomic alterations, the prominence of specific pathways, the preclinical validation of such emerging targets, sophisticated preclinical model systems, and the molecular classification of PDAC into specific disease subtypes have all converged to illuminate drug discovery programs with clearer clinical path hypotheses. A deeper understanding of cancer cell biology, particularly altered cancer cell metabolism and impaired DNA repair processes, is providing novel therapeutic strategies that show strong preclinical activity. Elucidation of tumor biology principles, most notably a deeper understanding of the complexity of immune regulation in the tumor microenvironment, has provided an exciting framework to reawaken the immune system to attack PDAC cancer cells. While the long road of translation lies ahead, the path to meaningful clinical progress has never been clearer to improve PDAC patient survival. PMID:26883357
Importance of Apolipoprotein A-I in Multiple Sclerosis.
Gardner, Lidia A; Levin, Michael C
2015-01-01
Jean-Martin Charcot has first described multiple sclerosis (MS) as a disease of the central nervous system (CNS) over a century ago. MS remains incurable today, and treatment options are limited to disease modifying drugs. Over the years, significant advances in understanding disease pathology have been made in autoimmune and neurodegenerative components. Despite the fact that brain is the most lipid rich organ in human body, the importance of lipid metabolism has not been extensively studied in this disorder. In MS, the CNS is under attack by a person's own immune system. Autoantigens and autoantibodies are known to cause devastation of myelin through up regulation of T-cells and cytokines, which penetrate through the blood-brain barrier to cause inflammation and myelin destruction. The anti-inflammatory role of high-density lipoproteins (HDLs) has been implicated in a plethora of biological processes: vasodilation, immunity to infection, oxidation, inflammation, and apoptosis. However, it is not known what role HDL plays in neurological function and myelin repair in MS. Understanding of lipid metabolism in the CNS and in the periphery might unveil new therapeutic targets and explain the partial success of some existing MS therapies.
Cyber-Physical Attacks With Control Objectives
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
2017-08-18
This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less
Cyber-Physical Attacks With Control Objectives
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less
Physics of phagocytosis of foreign versus self-tolerance
NASA Astrophysics Data System (ADS)
Tsai, Richard; Rodriguez, Pia; Discher, Dennis
2009-03-01
The first cells to `attack' an implanted or injected foreign material or microbe are phagocytic cells of the innate immune system. These cells actively and rapidly phagocytose foreign cells, surfaces, or particles, but the process that is inefficient when faced with ``self'' cells. We have examined the biochemistry and some of the physics of this decision to eat or not eat. One particular protein on all animal cell membranes, called CD47, seems to engage phagocytic cell couter-receptors, and deactivate the force-generating myosin machinery that otherwise makes phagocytosis efficient. We will map the phagocytic synapse between phagocytes and particles or cells and describe the physicochemical dynamics that mediate this key decision in compatability.
NASA Astrophysics Data System (ADS)
Li, Qian; Zhu, Changhua; Ma, Shuquan; Wei, Kejin; Pei, Changxing
2018-04-01
Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all detector side-channel attacks. However, practical implementations of MDI-QKD, which require two-photon interferences from separated independent single-photon sources and a nontrivial reference alignment procedure, are still challenging with current technologies. Here, we propose a scheme that significantly reduces the experimental complexity of two-photon interferences and eliminates reference frame alignment by the combination of plug-and-play and reference frame independent MDI-QKD. Simulation results show that the secure communication distance can be up to 219 km in the finite-data case and the scheme has good potential for practical MDI-QKD systems.
Understanding, preventing and eradicating Klebsiella pneumoniae biofilms.
Ribeiro, Suzana Meira; Cardoso, Marlon Henrique; Cândido, Elizabete de Souza; Franco, Octávio Luiz
2016-01-01
The ability of pathogenic bacteria to aggregate and form biofilm represents a great problem for public health, since they present extracellular components that encase these micro-organisms, making them more resistant to antibiotics and host immune attack. This may become worse when antibiotic-resistant bacterial strains form biofilms. However, antibiofilm screens with different compounds may reveal potential therapies to prevent/treat biofilm infections. Here, we focused on Klebsiella pneumoniae, an opportunistic bacterium that causes different types of infections, including in the bloodstream, meninges, lungs, urinary system and at surgical sites. We also highlight aspects involved in the formation and maintenance of K. pneumoniae biofilms, as well as resistance and the emergence of new trends to combat this health challenge.
Long distance measurement-device-independent quantum key distribution with entangled photon sources
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xu, Feihu; Qi, Bing; Liao, Zhongfa
2013-08-05
We present a feasible method that can make quantum key distribution (QKD), both ultra-long-distance and immune, to all attacks in the detection system. This method is called measurement-device-independent QKD (MDI-QKD) with entangled photon sources in the middle. By proposing a model and simulating a QKD experiment, we find that MDI-QKD with one entangled photon source can tolerate 77 dB loss (367 km standard fiber) in the asymptotic limit and 60 dB loss (286 km standard fiber) in the finite-key case with state-of-the-art detectors. Our general model can also be applied to other non-QKD experiments involving entanglement and Bell state measurements.
Eigen model with general fitness functions and degradation rates
NASA Astrophysics Data System (ADS)
Hu, Chin-Kun; Saakian, David B.
2006-03-01
We present an exact solution of Eigen's quasispecies model with a general degradation rate and fitness functions, including a square root decrease of fitness with increasing Hamming distance from the wild type. The found behavior of the model with a degradation rate is analogous to a viral quasi-species under attack by the immune system of the host. Our exact solutions also revise the known results of neutral networks in quasispecies theory. To explain the existence of mutants with large Hamming distances from the wild type, we propose three different modifications of the Eigen model: mutation landscape, multiple adjacent mutations, and frequency-dependent fitness in which the steady state solution shows a multi-center behavior.
How type II CRISPR-Cas establish immunity through Cas1-Cas2-mediated spacer integration.
Xiao, Yibei; Ng, Sherwin; Nam, Ki Hyun; Ke, Ailong
2017-10-05
CRISPR (clustered regularly interspaced short palindromic repeats) and the nearby Cas (CRISPR-associated) operon establish an RNA-based adaptive immunity system in prokaryotes. Molecular memory is created when a short foreign DNA-derived prespacer is integrated into the CRISPR array as a new spacer. Whereas the RNA-guided CRISPR interference mechanism varies widely among CRISPR-Cas systems, the spacer integration mechanism is essentially identical. The conserved Cas1 and Cas2 proteins form an integrase complex consisting of two distal Cas1 dimers bridged by a Cas2 dimer. The prespacer is bound by Cas1-Cas2 as a dual-forked DNA, and the terminal 3'-OH of each 3' overhang serves as an attacking nucleophile during integration. The prespacer is preferentially integrated into the leader-proximal region of the CRISPR array, guided by the leader sequence and a pair of inverted repeats inside the CRISPR repeat. Spacer integration in the well-studied Escherichia coli type I-E CRISPR system also relies on the bacterial integration host factor. In type II-A CRISPR, however, Cas1-Cas2 alone integrates spacers efficiently in vitro; other Cas proteins (such as Cas9 and Csn2) have accessory roles in the biogenesis phase of prespacers. Here we present four structural snapshots from the type II-A system of Enterococcus faecalis Cas1 and Cas2 during spacer integration. Enterococcus faecalis Cas1-Cas2 selectively binds to a splayed 30-base-pair prespacer bearing 4-nucleotide 3' overhangs. Three molecular events take place upon encountering a target: first, the Cas1-Cas2-prespacer complex searches for half-sites stochastically, then it preferentially interacts with the leader-side CRISPR repeat, and finally, it catalyses a nucleophilic attack that connects one strand of the leader-proximal repeat to the prespacer 3' overhang. Recognition of the spacer half-site requires DNA bending and leads to full integration. We derive a mechanistic framework to explain the stepwise spacer integration process and the leader-proximal preference.
How Type II CRISPR-Cas establish immunity through Cas1-Cas2 mediated spacer integration
Xiao, Yibei; Ng, Sherwin; Nam, Ki Hyun; Ke, Ailong
2017-01-01
CRISPR (Clustered Regularly Interspaced Short Palindromic Repeats) and the nearby cas (CRISPR-associated) operon establish an RNA-based adaptive immunity system in prokaryotes1–5. Molecular memory is created when a short foreign DNA-derived prespacer is integrated into the CRISPR array as a new spacer6–9. Whereas the RNA-guided CRISPR interference mechanism varies widely among CRISPR-Cas systems, the spacer integration mechanism is essentially identical7–9. The conserved Cas1 and Cas2 proteins form an integrase complex consisting two distal Cas1 dimers bridged by a Cas2 dimer in the middle6,10. The prespacer is bound by Cas1-Cas2 as a dual forked DNA, and the terminal 3′-OH of each 3′-overhang serves as an attacking nucleophile during integration11–14. Importantly, the prespacer is preferentially integrated into the leader-proximal region of the CRISPR array1,7,10,15, guided by the leader sequence and a pair of inverted repeats (IRs) inside the CRISPR repeat7,15–20. Spacer integration in the most well-studied Escherichia coli Type I-E CRISPR system further relies on the bacterial Integration Host Factor (IHF)21,22. In Type II-A CRISPR, however, Cas1-Cas2 alone integrates spacer efficiently in vitro18; other Cas proteins (Cas9 and Csn2) play accessory roles in prespacer biogenesis17,23. Focusing on the Enterococcus faecalis Type II-A system24, here we report four structure snapshots of Cas1-Cas2 during spacer integration. EfaCas1-Cas2 selectively binds to a splayed 30-bp prespacer bearing 4-nt 3′-overhangs. Three molecular events take place upon encountering a target: Cas1-Cas2/prespacer first searches for half-sites stochastically, then preferentially interacts with the leader-side CRISPR repeat and catalyzes a nucleophilic attack that connects one strand of the leader-proximal repeat to the prespacer 3′-overhang. Recognition of the spacer half-site requires DNA bending and leads to full integration. We derive a mechanistic framework explaining the stepwise spacer integration process and the leader-proximal preference. PMID:28869593
New Strategies Using Antibody Combinations to Increase Cancer Treatment Effectiveness
Corraliza-Gorjón, Isabel; Somovilla-Crespo, Beatriz; Santamaria, Silvia; Garcia-Sanz, Jose A.; Kremer, Leonor
2017-01-01
Antibodies have proven their high value in antitumor therapy over the last two decades. They are currently being used as the first-choice to treat some of the most frequent metastatic cancers, like HER2+ breast cancers or colorectal cancers, currently treated with trastuzumab (Herceptin) and bevacizumab (Avastin), respectively. The impressive therapeutic success of antibodies inhibiting immune checkpoints has extended the use of therapeutic antibodies to previously unanticipated tumor types. These anti-immune checkpoint antibodies allowed the cure of patients devoid of other therapeutic options, through the recovery of the patient’s own immune response against the tumor. In this review, we describe how the antibody-based therapies will evolve, including the use of antibodies in combinations, their main characteristics, advantages, and how they could contribute to significantly increase the chances of success in cancer therapy. Indeed, novel combinations will consist of mixtures of antibodies against either different epitopes of the same molecule or different targets on the same tumor cell; bispecific or multispecific antibodies able of simultaneously binding tumor cells, immune cells or extracellular molecules; immunomodulatory antibodies; antibody-based molecules, including fusion proteins between a ligand or a receptor domain and the IgG Fab or Fc fragments; autologous or heterologous cells; and different formats of vaccines. Through complementary mechanisms of action, these combinations could contribute to elude the current limitations of a single antibody which recognizes only one particular epitope. These combinations may allow the simultaneous attack of the cancer cells by using the help of the own immune cells and exerting wider therapeutic effects, based on a more specific, fast, and robust response, trying to mimic the action of the immune system. PMID:29312320
2015-09-01
resistant to an attack. However, with techniques and motives ever-changing, it is not realistic to think that any organization is immune to threat...Berkeley, CA: McGraw- Hill/Osborne. Sikorski, M., & Honig, A. (2012). Practical malware analysis. San Francisco: No Starch Press. Skoudis, E
Effective Management of Information Security and Privacy
ERIC Educational Resources Information Center
Anderson, Alicia
2006-01-01
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
ERIC Educational Resources Information Center
O'Neal, Steven E.; Range, Lillian M.
1993-01-01
Undergraduates (n=141) read vignette about suicidal person with either Acquired Immune Deficiency Syndrome, depression, drug abuse, anxiety, or adjustment problems. Found that suicidal person who was human immunodeficiency virus-positive engendered significantly less helpful responses from students than did suicidal person who had panic attacks.…
Gouma, Sigrid; Schurink-Van't Klooster, Tessa M; de Melker, Hester E; Kerkhof, Jeroen; Smits, Gaby P; Hahné, Susan J M; van Els, Cécile A C M; Boland, Greet J; Vossen, Ann C T M; Goswami, Pulak R; Koopmans, Marion P G; van Binnendijk, Rob S
2014-12-01
Since 2009, various mumps outbreaks have occurred in the Netherlands, affecting mostly young adults vaccinated against mumps. In this retrospective study, we estimated attack rates for symptomatic and asymptomatic mumps virus infection based on mumps-specific immunoglobulin (Ig)G concentrations in paired blood samples obtained before and after the mumps outbreaks, collected in 2 university cities. We aimed to identify a serological correlate of immune protection and risk factors for mumps virus infection. Mumps-specific IgG levels were measured by Luminex technology in paired pre- and post-outbreak samples from students from Leiden (n = 135) and Utrecht (n = 619). Persons with a 4-fold increase in mumps IgG concentrations or mumps IgG concentrations >1500 RU/mL were assumed to have had a mumps virus infection. Attack rates for symptomatic and asymptomatic mumps virus infection were 2.0% and 3.8%, respectively. Pre-outbreak mumps-specific IgG concentrations were lower among cases than among noncases (P = .005) despite vaccination history, but no serological cutoff for immune protection could be established. Mumps among housemates was significantly associated with serological evidence for mumps virus infection (odds ratio, 7.25 [95% confidence interval, 3.20-16.40]; P < .001). Symptomatic and asymptomatic mumps virus infections in vaccinated persons can be identified by retrospective assessment of mumps-specific IgG antibodies in blood samples.
Targeting the immune system in cancer.
Chaudhuri, Devyani; Suriano, Robert; Mittelman, Abraham; Tiwari, Raj K
2009-02-01
The concept of cancer immunotherapy provides a fresh perspective as it is not associated with many of the drawbacks of conventional therapies such as chemotherapy, radiotherapy and surgery. When fully activated the immune system has immense potential as is evident from mis-matched transplanted organs undergoing rapid immunological attack and rejection. However, the development of immune strategies for cancer therapy has been associated with challenges of their own. Early attempts at cancer vaccination were carried out in an empirical manner that did not always lead to reproducibility. This led to a search of tumor associated antigens with the belief that specific targeting of these antigens would lead to successful tumor elimination. Active vaccination with TAA peptides or passive vaccination with specific lymphocytes against these TAAs did not however demonstrate encouraging results in clinical trials. This was mainly because of the lack of an activating immune response which is required for continuous stimulation of lymphocytes and also because of the selection of tumor escape variants that did not express the particular TAA. On the positive side, attempts at characterizing TAAs illuminated the molecular changes that attribute a malignant phenotype to cancer cells. Attempts at cytokine therapy were also met with challenges of high systemic toxicity and a lack of specific lymphocyte activation. It was therefore realized that an ideal vaccinating agent should be able to combine the effects of both these therapeutic strategies, i.e., it should be able to induce an innate immune response which can be tailored to a tumor specific adaptive immune response. By this, the immunosuppressive tumor environment can be altered to become immune activating, thus facilitating the infiltration of myeloid and lymphoid cells that can act in concert leading to tumor regression. In this regard, immunotherapeutic approaches such as DNA vaccines, dendritic cell based vaccines, HSP based vaccines and gene transfer technology, are being developed and further refined to overcome their inherent limitations. Animal experiments with these therapeutic modalities have demonstrated exciting results, although their evaluation in clinical trials has not indicated exceptional tumor protection in a large percentage of the patients. These observations only further underscore the multivariate and dynamic nature of the immune system and the many ways in which tumor cells modulate themselves and their surroundings to escape immune surveillance. Assessment of successful therapeutic intervention will require periodic evaluations of the suppressive nature of the tumor microenvironment accompanied by qualitative and quantitative measurements of lymphocyte responses in patients. With the development of advanced genetic technologies and continuous identification of tumor antigens, the field of cancer immunotherapy is progressing at an exciting pace giving us hope for the advent of effective treatment modalities that will prolong tumor free survival and enhance the quality of life in patients with malignant disease.
Detecting malicious chaotic signals in wireless sensor network
NASA Astrophysics Data System (ADS)
Upadhyay, Ranjit Kumar; Kumari, Sangeeta
2018-02-01
In this paper, an e-epidemic Susceptible-Infected-Vaccinated (SIV) model has been proposed to analyze the effect of node immunization and worms attacking dynamics in wireless sensor network. A modified nonlinear incidence rate with cyrtoid type functional response has been considered using sleep and active mode approach. Detailed stability analysis and the sufficient criteria for the persistence of the model system have been established. We also established different types of bifurcation analysis for different equilibria at different critical points of the control parameters. We performed a detailed Hopf bifurcation analysis and determine the direction and stability of the bifurcating periodic solutions using center manifold theorem. Numerical simulations are carried out to confirm the theoretical results. The impact of the control parameters on the dynamics of the model system has been investigated and malicious chaotic signals are detected. Finally, we have analyzed the effect of time delay on the dynamics of the model system.
Fiber Optic System Test Results In A Tactical Military Aircraft
NASA Astrophysics Data System (ADS)
Uhlhorn, Roger W.; Greenwell, Roger A.
1980-09-01
The YAV-8B Electromagnetic Immunity and Flight-Test Program was established to evaluate the susceptibility of wire and optical fiber signal transmission lines to electromagnetic interference when these lines are installed in a graphite/epoxy composite wing and to demonstrate the flightworthiness of fiber optics interconnects in the vertical/ short takeoff and landing aircraft environment. In response, two fiber optic systems were designed, fabricated, and flight tested by McDonnell Aircraft Co. (MCAIR), a division of the McDonnell Douglas Corporation, on the two YAV-8B V/STOL flight test aircraft. The program successfully demonstrated that fiber optics are compatible with the attack aircraft environment. As a result, the full scale development AV-8B will incorporate fiber optics in a point-to-point data link. We describe here the fiber optic systems designs, test equipment development, cabling and connection requirements, fabrication and installation experience, and flight test program results.
NASA Astrophysics Data System (ADS)
Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin
2016-10-01
Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.
Ben Khaled, Sara; Postma, Jelle; Robatzek, Silke
2015-01-01
A significant challenge for plants is to induce localized defense responses at sites of pathogen attack. Therefore, host subcellular trafficking processes enable accumulation and exchange of defense compounds, which contributes to the plant on-site defenses in response to pathogen perception. This review summarizes our current understanding of the transport processes that facilitate immunity, the significance of which is highlighted by pathogens reprogramming membrane trafficking through host cell translocated effectors. Prominent immune-related cargos of plant trafficking pathways are the pattern recognition receptors (PRRs), which must be present at the plasma membrane to sense microbes in the apoplast. We focus on the dynamic localization of the FLS2 receptor and discuss the pathways that regulate receptor transport within the cell and their link to FLS2-mediated immunity. One emerging theme is that ligand-induced late endocytic trafficking is conserved across different PRR protein families as well as across different plant species.
Effector-triggered immunity: from pathogen perception to robust defense.
Cui, Haitao; Tsuda, Kenichi; Parker, Jane E
2015-01-01
In plant innate immunity, individual cells have the capacity to sense and respond to pathogen attack. Intracellular recognition mechanisms have evolved to intercept perturbations by pathogen virulence factors (effectors) early in host infection and convert it to rapid defense. One key to resistance success is a polymorphic family of intracellular nucleotide-binding/leucine-rich-repeat (NLR) receptors that detect effector interference in different parts of the cell. Effector-activated NLRs connect, in various ways, to a conserved basal resistance network in order to transcriptionally boost defense programs. Effector-triggered immunity displays remarkable robustness against pathogen disturbance, in part by employing compensatory mechanisms within the defense network. Also, the mobility of some NLRs and coordination of resistance pathways across cell compartments provides flexibility to fine-tune immune outputs. Furthermore, a number of NLRs function close to the nuclear chromatin by balancing actions of defense-repressing and defense-activating transcription factors to program cells dynamically for effective disease resistance.
Tanhapour, M; Vaisi-Raygani, A; Bahrehmand, F; Khazaei, M; Kiani, A; Rahimi, Z; Nomani, H; Tavilani, H; Pourmotabbed, T
2016-10-31
The cytotoxic T lymphocyte antigen-4 (CTLA-4) also known as CD152 (cluster of differentiation 152) is a crucial negative regulator of the immune system. This protein receptor provides negative signals in order to suppress T-cell activation and immune attack against self-antigens, although its role is unclear. The ability of CTLA-4 to limit T cell-mediated immune response has made it a major target in treatment of tumors and autoimmune diseases such as systemic lupus erythematosus (SLE). In this study, we investigated whether CTLA-4 G-1661A and CTLA-4 T-1722C mutations are associated with SLE. So one hundred nine SLE patients and 101 gender and age-matched unrelated healthy controls were recruited for this case-control study. The promoter mutations were detected by PCR-RFLP, neopterin, malondialdehyde (MDA) and serum lipid concentration were determined by HPLC and enzyme assay, respectively. We found that both codominant (AA vs. GG) and recessive (AA vs. GA+GG) CTLA-4 G-1661A mutation significantly decreased the risk of SLE by 1.7 and 3.7 times, respectively. Interestingly, SLE patients with AA genotypes of CTLA-4 G-1661A have lower neopterin and MDA concentration compared with GA+GG genotypes. The overall distribution of CTLA-4 T-1722C genotypes and alleles in SLE patients were similar to those in control group. In conclusion, our findings showed, that there is an association between systemic inflammatory markers, oxidative stress and the CTLA-4 G-1661A GG+AG genotypes, MDA and neopterin which are the most conventional risk factors for coronary heart disease, therefore these mutations may be consider as a risk factor for susceptibility to heart disease in SLE patients.
A mathematical model of atherogenesis as an inflammatory response.
Ibragimov, A I; McNeal, C J; Ritter, L R; Walton, J R
2005-12-01
We construct a mathematical model of the early formation of an atherosclerotic lesion based on a simplification of Russell Ross' paradigm of atherosclerosis as a chronic inflammatory response. Atherosclerosis is a disease characterized by the accumulation of lipid-laden cells in the arterial wall. This disease results in lesions within the artery that may grow into the lumen restricting blood flow and, in critical cases, can rupture causing complete, sudden occlusion of the artery resulting in heart attack, stroke and possibly death. It is now understood that when chemically modified low-density lipoproteins (LDL cholesterol) enter into the wall of the human artery, they can trigger an immune response mediated by biochemical signals sent and received by immune and other cells indigenous to the vasculature. The presence of modified LDL can also corrupt the normal immune function triggering further immune response and ultimately chronic inflammation. In the construction of our mathematical model, we focus on the inflammatory component of the pathogenesis of cardiovascular disease (CVD). Because this study centres on the interplay between chemical and cellular species in the human artery and bloodstream, we employ a model of chemotaxis first given by E. F. Keller and Lee Segel in 1970 and present our model as a coupled system of non-linear reaction diffusion equations describing the state of the various species involved in the disease process. We perform numerical simulations demonstrating that our model captures certain observed features of CVD such as the localization of immune cells, the build-up of lipids and debris and the isolation of a lesion by smooth muscle cells.
The innate immune repertoire in cnidaria--ancestral complexity and stochastic gene loss.
Miller, David J; Hemmrich, Georg; Ball, Eldon E; Hayward, David C; Khalturin, Konstantin; Funayama, Noriko; Agata, Kiyokazu; Bosch, Thomas C G
2007-01-01
Characterization of the innate immune repertoire of extant cnidarians is of both fundamental and applied interest--it not only provides insights into the basic immunological 'tool kit' of the common ancestor of all animals, but is also likely to be important in understanding the global decline of coral reefs that is presently occurring. Recently, whole genome sequences became available for two cnidarians, Hydra magnipapillata and Nematostella vectensis, and large expressed sequence tag (EST) datasets are available for these and for the coral Acropora millepora. To better understand the basis of innate immunity in cnidarians, we scanned the available EST and genomic resources for some of the key components of the vertebrate innate immune repertoire, focusing on the Toll/Toll-like receptor (TLR) and complement pathways. A canonical Toll/TLR pathway is present in representatives of the basal cnidarian class Anthozoa, but neither a classic Toll/TLR receptor nor a conventional nuclear factor (NF)-kappaB could be identified in the anthozoan Hydra. Moreover, the detection of complement C3 and several membrane attack complex/perforin domain (MAC/PF) proteins suggests that a prototypic complement effector pathway may exist in anthozoans, but not in hydrozoans. Together with data for several other gene families, this implies that Hydra may have undergone substantial secondary gene loss during evolution. Such losses are not confined to Hydra, however, and at least one MAC/PF gene appears to have been lost from Nematostella. Consideration of these patterns of gene distribution underscores the likely significance of gene loss during animal evolution whilst indicating ancient origins for many components of the vertebrate innate immune system.
Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis
Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq
2015-01-01
Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-05-03
This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-01-01
This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Charre, Caroline; Ramière, Christophe; Roque-Afonso, Anne-Marie; Chidiac, Christian; Zoulim, Fabien; Godinot, Matthieu; Koffi, Joseph; Scholtès, Caroline; Livrozet, Jean-Michel; Hav Lyon Study Group; Cotte, Laurent
2017-11-01
Since 2016, an increase in the number of hepatitis A cases affecting mainly men who have sex with men (MSM) has been reported in low endemic countries in Europe. We calculated the attack rate in Lyon, France, in populations considered at high-risk: HIV-infected MSM and HIV-negative MSM receiving HIV pre-exposure prophylaxis (PrEP). In these populations, high level of immunity did not prevent the outbreak, indicating that vaccination should be reinforced, particularly in younger individuals.
Charre, Caroline; Ramière, Christophe; Roque-Afonso, Anne-Marie; Chidiac, Christian; Zoulim, Fabien; Godinot, Matthieu; Koffi, Joseph; Scholtès, Caroline; Livrozet, Jean-Michel; Cotte, Laurent
2017-01-01
Since 2016, an increase in the number of hepatitis A cases affecting mainly men who have sex with men (MSM) has been reported in low endemic countries in Europe. We calculated the attack rate in Lyon, France, in populations considered at high-risk: HIV-infected MSM and HIV-negative MSM receiving HIV pre-exposure prophylaxis (PrEP). In these populations, high level of immunity did not prevent the outbreak, indicating that vaccination should be reinforced, particularly in younger individuals. PMID:29208161
Park, Shin Yong; Kim, Kyoung Mi; Lee, Joon Ha; Seo, Sook Jae; Lee, In Hee
2007-01-01
We isolated Enterococcus faecalis from the body fluids of dead larvae of the greater wax moth, Galleria mellonella. Extracellular gelatinase (GelE) and serine protease (SprE), both of which are considered putative virulence factors of E. faecalis, were purified from the culture supernatant of E. faecalis. In an attempt to elucidate their virulence mechanisms, purified GelE and SprE were injected into hemolymph of G. mellonella and evaluated with regard to their effects on the immune system of insect hemolymph. As a result, it was determined that E. faecalis GelE degraded an inducible antimicrobial peptide (Gm cecropin) which is known to perform a critical role in host defense during the early phase of microbial infection. The results obtained from the G. mellonella-E. faecalis infection model compelled us to assess the virulence activity of GelE against the complement system in human serum. E. faecalis GelE hydrolyzed C3a and also mediated the degradation of the alpha chain of C3b, thereby inhibiting opsonization and the formation of the membrane attack complex resultant from the activation of the complement cascade triggered by C3 activation. In contrast, E. faecalis SprE exhibited no virulence effect against the immune system of insect hemolymph or human serum tested in this study. PMID:17261598
Buzea, C Gh; Agop, M; Moraru, Evelina; Stana, Bogdan A; Gîrţu, Manuela; Iancu, D
2011-08-07
We present a traveling-wave analysis of a reduced mathematical model describing the growth of a solid tumor in the presence of an immune system response in the framework of Scale Relativity theory. Attention is focused upon the attack of tumor cells by tumor-infiltrating cytotoxic lymphocytes (TICLs), in a small multicellular tumor, without necrosis and at some stage prior to (tumor-induced) angiogenesis. For a particular choice of parameters, the underlying system of partial differential equations is able to simulate the well-documented phenomenon of cancer dormancy and propagation of a perturbation in the tumor cell concentration by cnoidal modes, by depicting spatially heterogeneous tumor cell distributions that are characterized by a relatively small total number of tumor cells. This behavior is consistent with several immunomorphological investigations. Moreover, the alteration of certain parameters of the model is enough to induce soliton like modes and soliton packets into the system, which in turn result in tumor invasion in the form of a standard traveling wave. In the same framework of Scale Relativity theory, a very important feature of malignant tumors also results, that even in avascular stages they might propagate and invade healthy tissues, by means of a diffusion on a Newtonian fluid. Copyright © 2011 Elsevier Ltd. All rights reserved.
A Novel Network Attack Audit System based on Multi-Agent Technology
NASA Astrophysics Data System (ADS)
Jianping, Wang; Min, Chen; Xianwen, Wu
A network attack audit system which includes network attack audit Agent, host audit Agent and management control center audit Agent is proposed. And the improved multi-agent technology is carried out in the network attack audit Agent which has achieved satisfactory audit results. The audit system in terms of network attack is just in-depth, and with the function improvement of network attack audit Agent, different attack will be better analyzed and audit. In addition, the management control center Agent should manage and analyze audit results from AA (or HA) and audit data on time. And the history files of network packets and host log data should also be audit to find deeper violations that cannot be found in real time.
VACCINATION AGAINST YELLOW FEVER WITH IMMUNE SERUM AND VIRUS FIXED FOR MICE
Sawyer, W. A.; Kitchen, S. F.; Lloyd, Wray
1932-01-01
1. After preliminary experiments in monkeys, 15 persons were actively immunized by a single injection of a dried mixture of living yellow fever virus, fixed for mice, and human immune serum, with separate injections of enough additional serum to make up the amount required for protection. 2. One person was similarly immunized by injecting immune serum and dried virus separately. 3. By titration of the sera of vaccinated persons in mice, it was shown that the immunity rose in a few weeks to a height comparable to that reached after an attack of yellow fever, and remained there throughout an observation period of 6 months. 4. Yellow fever virus could not be recovered from the blood of vaccinated persons or monkeys, except when the latter had received less than the minimal effective amount of immune serum. 5. Neutralization of yellow fever virus by immune serum took place very slowly in vitro at room temperature in our experiments, and could not have been an appreciable factor in vaccination with the serum virus mixtures. 6. A mixture of fixed virus and immune serum retained its immunizing power for 8 months when dried in the frozen state and sealed in glass. 7. It appears that the immunizing reaction after yellow fever vaccination was a part of a true infectious process, as was also the observed leucopenia. PMID:19870044
Design and implementation of dynamic hybrid Honeypot network
NASA Astrophysics Data System (ADS)
Qiao, Peili; Hu, Shan-Shan; Zhai, Ji-Qiang
2013-05-01
The method of constructing a dynamic and self-adaptive virtual network is suggested to puzzle adversaries, delay and divert attacks, exhaust attacker resources and collect attacking information. The concepts of Honeypot and Honeyd, which is the frame of virtual Honeypot are introduced. The techniques of network scanning including active fingerprint recognition are analyzed. Dynamic virtual network system is designed and implemented. A virtual network similar to real network topology is built according to the collected messages from real environments in this system. By doing this, the system can perplex the attackers when Hackers attack and can further analyze and research the attacks. The tests to this system prove that this design can successfully simulate real network environment and can be used in network security analysis.
Damal, Kavitha; Stoker, Emily; Foley, John F
2013-01-01
Multiple sclerosis (MS) is a debilitating neurological disorder that affects nearly 2 million adults, mostly in the prime of their youth. An environmental trigger, such as a viral infection, is hypothesized to initiate the abnormal behavior of host immune cells: to attack and damage the myelin sheath surrounding the neurons of the central nervous system. While several other pathways and disease triggers are still being investigated, it is nonetheless clear that MS is a heterogeneous disease with multifactorial etiologies that works independently or synergistically to initiate the aberrant immune responses to myelin. Although there are still no definitive markers to diagnose the disease or to cure the disease per se, research on management of MS has improved many fold over the past decade. New disease-modifying therapeutics are poised to decrease immune inflammatory responses and consequently decelerate the progression of MS disease activity, reduce the exacerbations of MS symptoms, and stabilize the physical and mental status of individuals. In this review, we describe the mechanism of action, optimal dosing, drug administration, safety, and efficacy of the disease-modifying therapeutics that are currently approved for MS therapy. We also briefly touch upon the new drugs currently under investigation, and discuss the future of MS therapeutics. PMID:24324326
More than just immune evasion: Hijacking complement by Plasmodium falciparum.
Schmidt, Christoph Q; Kennedy, Alexander T; Tham, Wai-Hong
2015-09-01
Malaria remains one of the world's deadliest diseases. Plasmodium falciparum is responsible for the most severe and lethal form of human malaria. P. falciparum's life cycle involves two obligate hosts: human and mosquito. From initial entry into these hosts, malaria parasites face the onslaught of the first line of host defence, the complement system. In this review, we discuss the complex interaction between complement and malaria infection in terms of hosts immune responses, parasite survival and pathogenesis of severe forms of malaria. We will focus on the role of complement receptor 1 and its associated polymorphisms in malaria immune complex clearance, as a mediator of parasite rosetting and as an entry receptor for P. falciparum invasion. Complement evasion strategies of P. falciparum parasites will also be highlighted. The sexual forms of the malaria parasites recruit the soluble human complement regulator Factor H to evade complement-mediated killing within the mosquito host. A novel evasion strategy is the deployment of parasite organelles to divert complement attack from infective blood stage parasites. Finally we outline the future challenge to understand the implications of these exploitation mechanisms in the interplay between successful infection of the host and pathogenesis observed in severe malaria. Copyright © 2015 Elsevier Ltd. All rights reserved.
Damal, Kavitha; Stoker, Emily; Foley, John F
2013-01-01
Multiple sclerosis (MS) is a debilitating neurological disorder that affects nearly 2 million adults, mostly in the prime of their youth. An environmental trigger, such as a viral infection, is hypothesized to initiate the abnormal behavior of host immune cells: to attack and damage the myelin sheath surrounding the neurons of the central nervous system. While several other pathways and disease triggers are still being investigated, it is nonetheless clear that MS is a heterogeneous disease with multifactorial etiologies that works independently or synergistically to initiate the aberrant immune responses to myelin. Although there are still no definitive markers to diagnose the disease or to cure the disease per se, research on management of MS has improved many fold over the past decade. New disease-modifying therapeutics are poised to decrease immune inflammatory responses and consequently decelerate the progression of MS disease activity, reduce the exacerbations of MS symptoms, and stabilize the physical and mental status of individuals. In this review, we describe the mechanism of action, optimal dosing, drug administration, safety, and efficacy of the disease-modifying therapeutics that are currently approved for MS therapy. We also briefly touch upon the new drugs currently under investigation, and discuss the future of MS therapeutics.
Network Security Validation Using Game Theory
NASA Astrophysics Data System (ADS)
Papadopoulou, Vicky; Gregoriades, Andreas
Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.
39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.
Code of Federal Regulations, 2014 CFR
2014-07-01
... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.
Code of Federal Regulations, 2013 CFR
2013-07-01
... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.
Code of Federal Regulations, 2012 CFR
2012-07-01
... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
The epidemiology of mumps in southern Alberta 1980-1982.
Falk, W A; Buchan, K; Dow, M; Garson, J Z; Hill, E; Nosal, M; Tarrant, M; Westbury, R C; White, F M
1989-10-01
The full spectrum of mumps in Southern Alberta was studied over the years 1980-1982. In the community, a random sample of 3,497 children was tested for prevalence of immunity to mumps. The 1,816 who were not immune were retested after one year. The incidence of new immunity was 16.5%. Most seroconverters had no illness suggestive of mumps. History of previous mumps or immunization were found to be unreliable predictors of serologic immune status. In the family study, information was obtained on 342 cases diagnosed as mumps by family physician recorders. The overall complication rate was 10.8% and the secondary attack rate within families was 11.7%. Hospital records of all 25 patients admitted in Calgary with mumps during the same period were analyzed. Estimated costs of unopposed mumps over 20 years compared with the estimated costs of vaccination showed that a vaccination program could give a benefit-cost ratio between 6.4 and 247. These studies show that mumps is a mild disease with relatively few serious complications or sequelae. Even so, there would be definite medical and economic benefit with immunization. A low-cost addition of mumps vaccine to the immunization program would be justified.
Utilizing cell-based therapeutics to overcome immune evasion in hematologic malignancies.
Sun, Chuang; Dotti, Gianpietro; Savoldo, Barbara
2016-06-30
Hematologic malignancies provide a suitable testing environment for cell-based immunotherapies, which were pioneered by the development of allogeneic hematopoietic stem cell transplant. All types of cell-based therapies, from donor lymphocyte infusion to dendritic cell vaccines, and adoptive transfer of tumor-specific cytotoxic T cells and natural killer cells, have been clinically translated for hematologic malignancies. The recent success of chimeric antigen receptor-modified T lymphocytes in B-cell malignancies has stimulated the development of this approach toward other hematologic tumors. Similarly, the remarkable activity of checkpoint inhibitors as single agents has created enthusiasm for potential combinations with other cell-based immune therapies. However, tumor cells continuously develop various strategies to evade their immune-mediated elimination. Meanwhile, the recruitment of immunosuppressive cells and the release of inhibitory factors contribute to the development of a tumor microenvironment that hampers the initiation of effective immune responses or blocks the functions of immune effector cells. Understanding how tumor cells escape from immune attack and favor immunosuppression is essential for the improvement of immune cell-based therapies and the development of rational combination approaches. © 2016 by The American Society of Hematology.
The tripartite immune conflict in placentals and a hypothesis on fetal-->maternal microchimerism.
Apari, Péter; Rózsa, Lajos
2009-01-01
There is a two-way traffic of immune cells through the placenta; and fetal immune cells are often present in the maternal body even long after giving birth. We present an adaptationist theory to interpret fetal-->maternal microchimerism and the diverse set of concomitant medical phenomena. We handle fetal, maternal, and paternal adaptive interests separately and in interaction with one another. Fetuses may benefit from immunological information gathered by migrant cells in the maternal body, and also from improved maternal defence. However, they may be jeopardized by a selfish maternal usage of fetal-->maternal microchimerism - i.e., some mothers get pregnant only to improve their immune system and then to abort. The use of microchimeric cells by the maternal immune system may contribute to the adaptive benefits of female choosiness and polyandry. While fathers may enjoy an indirect benefit from enhanced fetal and maternal health, they also face the risk of wasting sexual efforts due to selfish pregnancies of cheating females. Paternal alleles acting via clones of microchimeric cells in the maternal body could launch an immunological attack against the non-kin sperm in the female genitalia, or against the non-kin fetus in the womb. Furthermore, an intraspecific version of Zahavi's Mafia Hypothesis could explain a potential interaction between the abortion of fetuses and a subsequent rise of an autoimmune disease. We suggest that males may be capable to provoke microchimerism-induced autoimmune-like diseases in the mother in revenge of selfish pregnancies. This hypothetic paternal threat could increase the maternal costs associated to selfish pregnancies. From a medical point of view, we propose new interpretations for autoimmune-like diseases, infertility, miscarriage, and also for the prevailing connections among them. Specifically, we argue that miscarriages may cause autoimmune diseases, a reversed causality as compared to the currently accepted one.
Verweij, Marieke C.; Horst, Daniëlle; Griffin, Bryan D.; Luteijn, Rutger D.; Davison, Andrew J.; Ressing, Maaike E.; Wiertz, Emmanuel J. H. J.
2015-01-01
Herpesviruses are large DNA viruses that are highly abundant within their host populations. Even in the presence of a healthy immune system, these viruses manage to cause lifelong infections. This persistence is partially mediated by the virus entering latency, a phase of infection characterized by limited viral protein expression. Moreover, herpesviruses have devoted a significant part of their coding capacity to immune evasion strategies. It is believed that the close coexistence of herpesviruses and their hosts has resulted in the evolution of viral proteins that specifically attack multiple arms of the host immune system. Cytotoxic T lymphocytes (CTLs) play an important role in antiviral immunity. CTLs recognize their target through viral peptides presented in the context of MHC molecules at the cell surface. Every herpesvirus studied to date encodes multiple immune evasion molecules that effectively interfere with specific steps of the MHC class I antigen presentation pathway. The transporter associated with antigen processing (TAP) plays a key role in the loading of viral peptides onto MHC class I molecules. This is reflected by the numerous ways herpesviruses have developed to block TAP function. In this review, we describe the characteristics and mechanisms of action of all known virus-encoded TAP inhibitors. Orthologs of these proteins encoded by related viruses are identified, and the conservation of TAP inhibition is discussed. A phylogenetic analysis of members of the family Herpesviridae is included to study the origin of these molecules. In addition, we discuss the characteristics of the first TAP inhibitor identified outside the herpesvirus family, namely, in cowpox virus. The strategies of TAP inhibition employed by viruses are very distinct and are likely to have been acquired independently during evolution. These findings and the recent discovery of a non-herpesvirus TAP inhibitor represent a striking example of functional convergent evolution. PMID:25880312
Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion
NASA Astrophysics Data System (ADS)
Annaby, M. H.; Rushdi, M. A.; Nehary, E. A.
2018-04-01
The recent tremendous proliferation of color imaging applications has been accompanied by growing research in data encryption to secure color images against adversary attacks. While recent color image encryption techniques perform reasonably well, they still exhibit vulnerabilities and deficiencies in terms of statistical security measures due to image data redundancy and inherent weaknesses. This paper proposes two encryption algorithms that largely treat these deficiencies and boost the security strength through novel integration of the random fractional Fourier transforms, phase retrieval algorithms, as well as chaotic scrambling and diffusion. We show through detailed experiments and statistical analysis that the proposed enhancements significantly improve security measures and immunity to attacks.
High angle of attack flying qualities criteria for longitudinal rate command systems
NASA Technical Reports Server (NTRS)
Wilson, David J.; Citurs, Kevin D.; Davidson, John B.
1994-01-01
This study was designed to investigate flying qualities requirements of alternate pitch command systems for fighter aircraft at high angle of attack. Flying qualities design guidelines have already been developed for angle of attack command systems at 30, 45, and 60 degrees angle of attack, so this research fills a similar need for rate command systems. Flying qualities tasks that require post-stall maneuvering were tested during piloted simulations in the McDonnell Douglas Aerospace Manned Air Combat Simulation facility. A generic fighter aircraft model was used to test angle of attack rate and pitch rate command systems for longitudinal gross acquisition and tracking tasks at high angle of attack. A wide range of longitudinal dynamic variations were tested at 30, 45, and 60 degrees angle of attack. Pilot comments, Cooper-Harper ratings, and pilot induced oscillation ratings were taken from five pilots from NASA, USN, CAF, and McDonnell Douglas Aerospace. This data was used to form longitudinal design guidelines for rate command systems at high angle of attack. These criteria provide control law design guidance for fighter aircraft at high angle of attack, low speed flight conditions. Additional time history analyses were conducted using the longitudinal gross acquisition data to look at potential agility measures of merit and correlate agility usage to flying qualities boundaries. This paper presents an overview of this research.
Towards an integrated defense system for cyber security situation awareness experiment
NASA Astrophysics Data System (ADS)
Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe
2015-05-01
In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.
Adaptive optimisation-offline cyber attack on remote state estimator
NASA Astrophysics Data System (ADS)
Huang, Xin; Dong, Jiuxiang
2017-10-01
Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.
NASA Astrophysics Data System (ADS)
Ko, Heasin; Choi, Byung-Seok; Choe, Joong-Seon; Youn, Chun Ju
2018-01-01
Even though unconditional security of B92 quantum key distribution (QKD) system is based on the assumption of perfect positive-operator-valued measures, practical B92 systems only utilize two projective measurements. Unfortunately, such implementation may degrade the security of the B92 QKD system due to Eve's potential attack exploiting the imperfection of system. In this paper, we propose an advanced attack strategy with an unambiguous state discrimination (USD) measurement which makes practical B92 QKD systems insecure even under a lossless channel. In addition, we propose an effective countermeasure against the advanced USD attack model by monitoring double-click events. We further address a fundamental approach to make the B92 QKD system tolerable to attack strategies with USD measurements using a multi-qubit scheme.
Simulations of centriole of polarized centrosome as a monopole antenna in immune and viral synapses.
Dvorak, Josef; Melichar, Bohuslav; Filipova, Alzbeta; Grimova, Jana; Grimova, Nela; Rozsypalova, Aneta; Buka, David; Voboril, Rene; Zapletal, Radek; Buchler, Tomas; Richter, Igor; Buka, David
2018-01-01
The immune synapse (IS) is a temporary interface between an antigen-presenting cell and an effector lymphocyte. Viral synapse is a molecularly organized cellular junction that is structurally similar to the IS. Primary cilium is considered as a functional homologue of the IS due to the morphological and functional similarities in architecture between both micotubule structures. It has been hypothesized that endogenous electromagnetic field in the cell is generated by a unique cooperating system between mitochondria and microtubules. We are extending this prior hypothesis of the endogenous electromagnetic field in the cell postulating that polarized centriole in immune and viral synapse could serve as a monopole antenna. This is an addition to our hypothesis that primary cilium could serve as a monopole antenna. We simulated the distribution of electric field of centriole of polarized centrosome as a monopole antenna in immune and viral synapse. Very weak electromagnetic field of polarized centriole of CD8+ T lymphocyte in IS can contribute to the transport of cytolytic granules into the attacked (cancer) cell. Analogically, very weak electromagnetic field of polarized centriole in viral synapse of infected CD4 cells can aid the transport of viruses (human immunodeficiency virus) to non-infected CD4 cells. We hypothesized that healthy organisms need these monopole antennas. If, during the neoplastic transformation, healthy cells lose monopole antennas in form of primary cilia, the IS aims to replace them by monopole antennas of polarized centrioles in IS to restore homeostasis.
The School District's Liability in Cases of Violent Attacks on Students and Employees.
ERIC Educational Resources Information Center
Maze, Jerry G.
The school's responsibility to provide a safe learning environment for students is examined in this paper. Failure to take preventative measures may result in loss of government tort immunity and charges of negligence liability. A review of case law indicates a trend toward successful litigation by plaintiffs against school districts--a decline in…
USDA-ARS?s Scientific Manuscript database
Fatty acid derivatives are of central importance for plant immunity against insect herbivores. However, major regulatory genes and the signals that modulate these defense metabolites are vastly understudied, especially in important agro-economic monocot species. Here we show that products and sign...
USDA-ARS?s Scientific Manuscript database
Candidatus Liberibacter asiaticus (Las) is a fastidious, phloem-restricted pathogen with a significantly reduced genome, and attacks all citrus species with no immune cultivars documented to date. Like other plant bacterial pathogens, Las deploys effector proteins into the organelles of plant cells,...
Bissell, M J; Radisky, D
2001-10-01
The interactions between cancer cells and their micro- and macroenvironment create a context that promotes tumour growth and protects it from immune attack. The functional association of cancer cells with their surrounding tissues forms a new 'organ' that changes as malignancy progresses. Investigation of this process might provide new insights into the mechanisms of tumorigenesis and could also lead to new therapeutic targets.
Rubella outbreak and outbreak management in a school setting, China, 2014.
Chang, Caiyun; Ma, Huilai; Liang, Wenjia; Hu, Pei; Mo, Xianghuan; An, Zhijie; Zheng, Huizhen
2017-04-03
An active response to a rubella outbreak may interrupt disease transmission, and outbreak response immunization (ORI) can increase immunity among persons who might otherwise not be protected. On March 17, 2014, a rubella outbreak was reported in a middle school in Guangzhou city, China. We conducted an investigation to assess impact of a policy of exclusion of cases from school and of ORI. Active surveillance was used to find cases of rubella. Investigators interviewed teachers and reviewed the absentee records to determine implementation details of school exclusion. ORI was recommended on 2 occasions during the outbreak, one small-scale and one large-scale. Laboratory confirmation tests included serum IgM and IgG measurements to distinguish between acute infection and immunity. A serological survey in 4 classes was used to determine immunity status and identify symptomatic and asymptomatic cases. From February 17 to May 23, 2014, 162 rubella cases (24 laboratory-confirmed and 138 epidemiologically linked) were detected among 1,621 students. Cases ultimately occurred in 27 classes (72.97%) across 37 classes. In 11 classes in which exclusion from school was delayed by 1 or more days, the secondary attack rate was 12.30%, compared with 2.35% in 15 classes with immediate exclusion. ORI increased vaccine coverage from 25.83 % to 86.92%, and the final case of the epidemic was reported one month later. A serological survey of 91 students in 4 classes identified 15 cases, 6 of which were asymptomatic. The outbreak happened in school with low rubella-containing vaccination coverage. Exclusion from school upon rash/fever onset was associated with lowering the secondary attack rate, but school exclusion alone was not able to stop this outbreak - a large ORI was needed. Assuring complete vaccination upon entry to school is likely to be necessary to ensure coverage is above the herd immunity threshold and prevent outbreaks from happening.
Machine Learning Methods for Attack Detection in the Smart Grid.
Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent
2016-08-01
Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.
Rigidity and resistance of larval- and adult schistosomes-medium interface
DOE Office of Scientific and Technical Information (OSTI.GOV)
Migliardo, Federica, E-mail: fmigliardo@unime.it; Tallima, Hatem; El Ridi, Rashika
Graphical abstract: - Highlights: • Schistosoma larvae and worms are studied by neutron scattering. • Measurements on larvae were repeated after one day and by increasing temperature. • The flexibility properties of larvae and adult parasites are compared. • The parasite rigidity is related to their resistance to the hostile environment. • Insight into the parasite defense mechanisms to the immune system attack is achieved. - Abstract: Schistosomiasis is second only to malaria in prevalence and severity, and is still a major health problem in many tropical countries worldwide with about 200–300 million cases and with more than 800 millionmore » people at risk of infection. Based on these data, the World Health Organization recommends fostering research efforts for understanding at any level the mechanisms of the infection and then decreasing the social and economical impact of schistosomiasis. A key role is played by the parasite apical lipid membrane, which is entirely impervious to the surrounding elements of the immune system. We have previously demonstrated that the interaction between schistosomes and surrounding medium is governed by a parasite surface membrane sphingomyelin-based hydrogen barrier. In the present article, the elastic contribution to the total motion as a function of the exchanged wave-vector Q and the mean square displacement values for Schistosoma mansoni larvae and worms and Schistosomahaematobium worms have been evaluated by quasi elastic neutron scattering (QENS). The results point out that S. mansoni larvae show a smaller mean square displacement in comparison to S. mansoni and S. haematobium worms. These values increased by repeating the measurements after one day. These differences, which are analogous to those observed for the diffusion coefficient we previously evaluated, are interpreted in terms of rigidity of the parasite-medium interaction. S. mansoni larvae are the most rigid systems, while S. haematobium worms are the most flexible. In addition, temperature and hypoxia induce a weakening of the schistosome-medium interaction. These evidences are related to the strength of the hydrogen-bonded interaction between parasites and environment that we previously determined. We have shown that S. mansoni worms are characterized by a weakened interaction in respect to the larvae, while the S. haematobium worms more weakly interact with the surrounding medium than S. mansoni. The present QENS analysis allowed us to characterize the rigidity of larval- and adult S. mansoni and S. haematobium-host interface and to relate it to the parasite resistance to the hostile elements of the surrounding medium and to the immune effectors attack.« less
Inducible defense against pathogens and parasites: optimal choice among multiple options.
Shudo, E; Iwasa, Y
2001-03-21
Defense against pathogen, parasites and herbivores is often enhanced after their invasion into the host's body. Sometimes different options are adopted depending on the identity and the quantity of the pathogen, exemplified by the switch between Th1 and Th2 systems in mammalian immunity. In this paper, we study the optimal defense of the host when two alternative responses are available, which differ in the effectiveness of suppressing the growth of pathogen (parasite, or herbivore), the damage to the host caused by the defense response, and the magnitude of time delay before the defense response becomes fully effective. The optimal defense is the one that minimizes the sum of the damages caused by the pathogen and the cost due to defense activities. The damage by pathogens increases in proportion to the time integral of the pathogen abundance, and the cost is proportional to the defense activity. We can prove that a single globally optimal combination of defense options always exists and there is no other local optimum. Depending on the parameters, the optimal is to adopt only the early response, only the late response, or both responses. The defense response with a shorter time delay is more heavily used when the pathogen grows fast, the initial pathogen abundance is large, and the difference in time delay is long. We also study the host's optimal choice between constitutive and inducible defenses. In the constitutive defense, the response to pathogen attack works without delay, but it causes the cost even when the pathogen attack does not occur. We discuss mammalian immunity and the plant chemical defense from the model's viewpoint. Copyright 2001 Academic Press.
NASA Astrophysics Data System (ADS)
Azevedo, Hátylas; Moreira-Filho, Carlos Alberto
2015-11-01
Biological networks display high robustness against random failures but are vulnerable to targeted attacks on central nodes. Thus, network topology analysis represents a powerful tool for investigating network susceptibility against targeted node removal. Here, we built protein interaction networks associated with chemoresistance to temozolomide, an alkylating agent used in glioma therapy, and analyzed their modular structure and robustness against intentional attack. These networks showed functional modules related to DNA repair, immunity, apoptosis, cell stress, proliferation and migration. Subsequently, network vulnerability was assessed by means of centrality-based attacks based on the removal of node fractions in descending orders of degree, betweenness, or the product of degree and betweenness. This analysis revealed that removing nodes with high degree and high betweenness was more effective in altering networks’ robustness parameters, suggesting that their corresponding proteins may be particularly relevant to target temozolomide resistance. In silico data was used for validation and confirmed that central nodes are more relevant for altering proliferation rates in temozolomide-resistant glioma cell lines and for predicting survival in glioma patients. Altogether, these results demonstrate how the analysis of network vulnerability to topological attack facilitates target prioritization for overcoming cancer chemoresistance.
Hybrid Intrusion Forecasting Framework for Early Warning System
NASA Astrophysics Data System (ADS)
Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo
Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.
Hanada, Katsuhiro; Yamaoka, Yoshio
2014-10-01
Helicobacter pylori is a gram-negative pathogenic bacterium that colonises the human stomach. The chronic infection it causes results in peptic ulcers and gastric cancers. H. pylori can easily establish a chronic infection even if the immune system attacks this pathogen with oxidative stress agents and immunoglobulins. This is attributed to bacterial defence mechanisms against these stresses. As a defence mechanism against oxidative stresses, in bacterial genomes, homologous recombination can act as a repair pathway of DNA's double-strand breaks (DSBs). Moreover, homologous recombination is also involved in the antigenic variation in H. pylori. Gene conversion alters genomic structures of babA and babB (encoding outer membrane proteins), resulting in escape from immunoglobulin attacks. Thus, homologous recombination in bacteria plays an important role in the maintenance of a chronic infection. In addition, H. pylori infection causes DSBs in human cells. Homologous recombination is also involved in the repair of DSBs in human cells. In this review, we describe the roles of homologous recombination with an emphasis on the maintenance of a chronic infection. Copyright © 2014 Institut Pasteur. Published by Elsevier Masson SAS. All rights reserved.
Wang, Guoshun
2016-09-01
Phagocytes, such as neutrophils and macrophages, engulf microbes into phagosomes and launch chemical attacks to kill and degrade them. Such a critical innate immune function necessitates ion participation. Chloride, the most abundant anion in the human body, is an indispensable constituent of the myeloperoxidase (MPO)-H2 O2 -halide system that produces the potent microbicide hypochlorous acid (HOCl). It also serves as a balancing ion to set membrane potentials, optimize cytosolic and phagosomal pH, and regulate phagosomal enzymatic activities. Deficient supply of this anion to or defective attainment of this anion by phagocytes is linked to innate immune defects. However, how phagocytes acquire chloride from their residing environment especially when they are deployed to epithelium-lined lumens, and how chloride is intracellularly transported to phagosomes remain largely unknown. This review article will provide an overview of chloride protein carriers, potential mechanisms for phagocytic chloride preservation and acquisition, intracellular chloride supply to phagosomes for oxidant production, and methods to measure chloride levels in phagocytes and their phagosomes. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
2018-01-01
ABSTRACT Pseudomonas aeruginosa produces an extracellular biofilm matrix that consists of nucleic acids, exopolysaccharides, lipid vesicles, and proteins. In general, the protein component of the biofilm matrix is poorly defined and understudied relative to the other major matrix constituents. While matrix proteins have been suggested to provide many functions to the biofilm, only proteins that play a structural role have been characterized thus far. Here we identify proteins enriched in the matrix of P. aeruginosa biofilms. We then focused on a candidate matrix protein, the serine protease inhibitor ecotin (PA2755). This protein is able to inhibit neutrophil elastase, a bactericidal enzyme produced by the host immune system during P. aeruginosa biofilm infections. We show that ecotin binds to the key biofilm matrix exopolysaccharide Psl and that it can inhibit neutrophil elastase when associated with Psl. Finally, we show that ecotin protects both planktonic and biofilm P. aeruginosa cells from neutrophil elastase-mediated killing. This may represent a novel mechanism of protection for biofilms to increase their tolerance against the innate immune response. PMID:29636440
Attacking cancer dormacy using game theory
NASA Astrophysics Data System (ADS)
Austin, Robert
Here is the problem: Cancer kills primarily by re-emergence from a period of dormancy after initial treatment. The presence of driver mutations and subsequent clonal expansion by Darwinian evolution does not explain dormancy and re-emergence of cancer from a community of cancer and host cells (including stromal and immune cells), nor does it explain our inability to predict the emergence of metastasis, by far the real killer in cancer. Dormancy appears to be a slow-driven, multi-cell interaction-dominated, threshold system with a poor prognosis once the cancer emerges from dormancy. The mission here is to try and model the phenomena of dormancy using game theory ideas, and in an in vitro complex ecology designed to emulate the true complexity of an in vivo tumor.
Measurement-Device-Independent Quantum Key Distribution over 200 km
NASA Astrophysics Data System (ADS)
Tang, Yan-Lin; Yin, Hua-Lei; Chen, Si-Jing; Liu, Yang; Zhang, Wei-Jun; Jiang, Xiao; Zhang, Lu; Wang, Jian; You, Li-Xing; Guan, Jian-Yu; Yang, Dong-Xu; Wang, Zhen; Liang, Hao; Zhang, Zhen; Zhou, Nan; Ma, Xiongfeng; Chen, Teng-Yun; Zhang, Qiang; Pan, Jian-Wei
2014-11-01
Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon detectors. Recently, several proof-of-principle demonstrations of MDIQKD have been achieved. Those experiments, although novel, are implemented through limited distance with a key rate less than 0.1 bit /s . Here, by developing a 75 MHz clock rate fully automatic and highly stable system and superconducting nanowire single-photon detectors with detection efficiencies of more than 40%, we extend the secure transmission distance of MDIQKD to 200 km and achieve a secure key rate 3 orders of magnitude higher. These results pave the way towards a quantum network with measurement-device-independent security.
Social barriers to pathogen transmission in wild animal populations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Loehle, C.
Diseases and pathogens are receiving increasing recognition as sources of mortality in animal populations. Immune system strength is clearly important in fending off pathogen attack. Physical barriers to pathogen entry are also important. Various individual behaviors are efficacious in reducing contact with diseases and pests. This paper focuses on a fourth mode of defense: social barriers to transmission. Various social behaviors have pathogen transmission consequences. Selective pressures on these social behaviors may therefore exist. Effects on pathogen transmission of mating strategies, social avoidance, group size, group isolation, and other behaviors are explored. It is concluded that many of these behaviorsmore » may have been affected by selection pressures to reduce transmission of pathogens. 84 refs., 1 tab.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weerakkody, Sean; Liu, Xiaofei; Sinopoli, Bruno
We consider the design and analysis of robust distributed control systems (DCSs) to ensure the detection of integrity attacks. DCSs are often managed by independent agents and are implemented using a diverse set of sensors and controllers. However, the heterogeneous nature of DCSs along with their scale leave such systems vulnerable to adversarial behavior. To mitigate this reality, we provide tools that allow operators to prevent zero dynamics attacks when as many as p agents and sensors are corrupted. Such a design ensures attack detectability in deterministic systems while removing the threat of a class of stealthy attacks in stochasticmore » systems. To achieve this goal, we use graph theory to obtain necessary and sufficient conditions for the presence of zero dynamics attacks in terms of the structural interactions between agents and sensors. We then formulate and solve optimization problems which minimize communication networks while also ensuring a resource limited adversary cannot perform a zero dynamics attacks. Polynomial time algorithms for design and analysis are provided.« less
NASA Astrophysics Data System (ADS)
1993-02-01
The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-altitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence. The GWEN system consists of a network of relay nodes, receive-only stations, and input/output stations. Each relay node, such as the one proposed in northwestern Nebraska, consists of a guyed radio tower facility similar to those used by commercial AM broadcast transmitters.
NASA Astrophysics Data System (ADS)
1993-02-01
The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-altitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence. The GWEN system consists of a network of relay nodes, receive-only stations, and input/output stations. Each relay node, such as the one proposed in southern Nevada consists of a guyed radio tower facility similar to those used by commercial AM broadcast transmitters.
NASA Astrophysics Data System (ADS)
1993-03-01
The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-altitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence. The GWEN system consists of a network of relay nodes, receive-only stations, and input/output stations. Each relay node, such as the one proposed in southern Nevada consists of a guyed radio tower facility similar to those used by commercial AM broadcast transmitters.
Ie, Kenya; Yoshizawa, Atsuto; Hirano, Satoru; Izumi, Sinyuu; Hojo, Masaaki; Sugiyama, Haruhito; Kobayasi, Nobuyuki; Kudou, Kouichirou; Maehara, Yasuhiro; Kawachi, Masaharu; Miyakoshi, Kouichi
2010-07-01
We investigated the risk factor of perioperative asthmatic attack and effectiveness of preventing treatment for asthmatic attack before operation. We performed retrospective chart review of one hundred eleven patients with asthma underwent general anesthesia and surgical intervention from January 2006 to October 2007 in our hospital. The rate of perioperative asthmatic attack were as follows; 10.2% (5 in 49 cases) in no pretreatment group, 7.5% (3 in 40 cases) in any pretreatments except for systemic steroid, and 4.5% (1 in 22 cases) in systemic steroid pretreatment group. Neither preoperative asthma severity nor duration from the last attack had significant relevancy to perioperative attack rate. The otolaryngological surgery, especially those have nasal polyp and oral surgery had high perioperative asthma attack rate, although there was no significant difference. We recommend the systemic steroid pretreatment for asthmatic patients, especially when they have known risk factor such as administration of the systemic steroid within 6 months, or possibly new risk factor such as nasal polyp, otolaryngological and oral surgery.
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems
NASA Astrophysics Data System (ADS)
Une, Masashi; Otsuka, Akira; Imai, Hideki
This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.
Planning guidance for emergency response to a hypothetical nuclear attack on Riyadh, Saudi Arabia
NASA Astrophysics Data System (ADS)
Shubayr, Nasser Ali M.
The threat of nuclear attack will remain imminent in an ever-advancing society. Saudi Arabia is not immune to this threat. This dissertation establishes planning guidance for response to a nuclear attack on Riyadh, the capital of Saudi Arabia, based on a hypothetical scenario of a nuclear detonation. A case scenario of a one-megaton thermonuclear bomb detonated at ground level over Riyadh is used to support the thesis. Previous nuclear tests and the Hiroshima and Nagasaki bombings have been used to present possible effects on Riyadh. US planning guidance and lessons learned from the Chernobyl and Fukushima nuclear plants accidents have been used to develop the emergency response guidance. The planning guidance outlines a rapid response to the nuclear detonation. Four damage zones have been identified; severe damage zone, moderate damage zone, light damage zone and dangerous fallout zone. Actions that are recommended, and those that should be avoided, have been determined for each zone. Shelter/ evacuation evaluation for blast-affected and fallout-affected areas is the basis for the recommendation that shelter in place is the best decision for the first hours to days after the attack. Guidelines for medical care response and population monitoring and decontamination are included to reduce the early and long-term effects of the attack. Recommendations to the Saudi Arabian authorities have been made to facilitate suitable preparedness and response for such an event.
NASA Astrophysics Data System (ADS)
Navare, Jyoti; Gemikonakli, Orhan
Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.
Cryptanalysis and improvement of a quantum communication-based online shopping mechanism
NASA Astrophysics Data System (ADS)
Huang, Wei; Yang, Ying-Hui; Jia, Heng-Yue
2015-06-01
Recently, Chou et al. (Electron Commer Res 14:349-367, 2014) presented a novel controlled quantum secure direct communication protocol which can be used for online shopping. The authors claimed that their protocol was immune to the attacks from both external eavesdropper and internal betrayer. However, we find that this protocol is vulnerable to the attack from internal betrayer. In this paper, we analyze the security of this protocol to show that the controller in this protocol is able to eavesdrop the secret information of the sender (i.e., the customer's shopping information), which indicates that it cannot be used for secure online shopping as the authors expected. Accordingly, an improvement of this protocol, which could resist the controller's attack, is proposed. In addition, we present another protocol which is more appropriate for online shopping. Finally, a discussion about the difference in detail of the quantum secure direct communication process between regular quantum communications and online shopping is given.
Gouma, Sigrid; Schurink-van't Klooster, Tessa M.; de Melker, Hester E.; Kerkhof, Jeroen; Smits, Gaby P.; Hahné, Susan J. M.; van Els, Cécile A. C. M.; Boland, Greet J.; Vossen, Ann C. T. M.; Goswami, Pulak R.; Koopmans, Marion P. G.; van Binnendijk, Rob S.
2014-01-01
Background Since 2009, various mumps outbreaks have occurred in the Netherlands, affecting mostly young adults vaccinated against mumps. In this retrospective study, we estimated attack rates for symptomatic and asymptomatic mumps virus infection based on mumps-specific immunoglobulin (Ig)G concentrations in paired blood samples obtained before and after the mumps outbreaks, collected in 2 university cities. We aimed to identify a serological correlate of immune protection and risk factors for mumps virus infection. Methods Mumps-specific IgG levels were measured by Luminex technology in paired pre- and post-outbreak samples from students from Leiden (n = 135) and Utrecht (n = 619). Persons with a 4-fold increase in mumps IgG concentrations or mumps IgG concentrations >1500 RU/mL were assumed to have had a mumps virus infection. Results Attack rates for symptomatic and asymptomatic mumps virus infection were 2.0% and 3.8%, respectively. Pre-outbreak mumps-specific IgG concentrations were lower among cases than among noncases (P = .005) despite vaccination history, but no serological cutoff for immune protection could be established. Mumps among housemates was significantly associated with serological evidence for mumps virus infection (odds ratio, 7.25 [95% confidence interval, 3.20–16.40]; P < .001). Conclusions Symptomatic and asymptomatic mumps virus infections in vaccinated persons can be identified by retrospective assessment of mumps-specific IgG antibodies in blood samples. PMID:25734169
Serological levels of apoptotic bodies, sFAS and TNF in lupus erythematosus.
Alecu, M; Coman, G; Alecu, S
In our study we have investigated the presence of apoptotic bodies, soluble FAS receptor and TNF (tumor necrosis factor) in three clinical forms of lupus erythematosus. Determinations were performed in attack period of: systemic lupus erythematosus (SLE) for 20 patients, 20 patients with subacute cutaneous lupus erythematosus (SCLE), 20 patients with chronic discoid lupus erythematosus (DLE). Determinations were performed by ELISA (for apoptotic bodies, kit Boehringer, normal values 400-800 mU), (for sFAS, kit R&D Systems, normal values 4500-17000 pg/ml) (for TNF, ELISA kit R&D Systems, normal values 0.4-3.6 pg/ml). Results in SLE: apoptotic bodies were increased in 16 cases (980-1030); sFAS in 18 cases (17000-24000 pg/ml) TNF was increased in all 20 cases (40-140 pg/ml). In SCLE with multiple cutaneous lesions and without internal organs disturbance the apoptotic bodies were increased in 10 cases (960-1030 pg/ml), sFAS in 9 cases (17000-22000 pg/ml), and TNF alpha in 9 cases. In DLE, apoptotic bodies were increased in 2 patients (980-1010 pg/ml), sFAS in 3 patients (17000-20000 pg/ml) and TNF in 2 patients (20-40 pg/mil). Investigated values were slightly correlated with immune parameters (anti dsDNA antibodies), but they were correlated with the presence of renal disturbances or extension of cutaneous lesions. We consider that the presence of increased apoptotic bodies as a result of peripheral mononuclear cells apoptosis appear as a nauto-limiting mechanism in a pathological immune response. The increase of sFAS in lupus patients serum might be interpreted as an alteration of apoptosis respectively a deficit in apoptosis which has as a first consequence the persistence of B and T lymphocytes, activated, in the pathogen immune response.
Li, Xihong; Cui, Zhaoxia; Liu, Yuan; Song, Chengwen; Shi, Guohui
2013-01-01
Background The Chinese mitten crab Eriocheir sinensis is an important economic crustacean and has been seriously attacked by various diseases, which requires more and more information for immune relevant genes on genome background. Recently, high-throughput RNA sequencing (RNA-seq) technology provides a powerful and efficient method for transcript analysis and immune gene discovery. Methods/Principal Findings A cDNA library from hepatopancreas of E. sinensis challenged by a mixture of three pathogen strains (Gram-positive bacteria Micrococcus luteus, Gram-negative bacteria Vibrio alginolyticus and fungi Pichia pastoris; 108 cfu·mL−1) was constructed and randomly sequenced using Illumina technique. Totally 39.76 million clean reads were assembled to 70,300 unigenes. After ruling out short-length and low-quality sequences, 52,074 non-redundant unigenes were compared to public databases for homology searching and 17,617 of them showed high similarity to sequences in NCBI non-redundant protein (Nr) database. For function classification and pathway assignment, 18,734 (36.00%) unigenes were categorized to three Gene Ontology (GO) categories, 12,243 (23.51%) were classified to 25 Clusters of Orthologous Groups (COG), and 8,983 (17.25%) were assigned to six Kyoto Encyclopedia of Genes and Genomes (KEGG) pathways. Potentially, 24, 14, 47 and 132 unigenes were characterized to be involved in Toll, IMD, JAK-STAT and MAPK pathways, respectively. Conclusions/Significance This is the first systematical transcriptome analysis of components relating to innate immune pathways in E. sinensis. Functional genes and putative pathways identified here will contribute to better understand immune system and prevent various diseases in crab. PMID:23874555
Identification of NY-BR-1-specific CD4(+) T cell epitopes using HLA-transgenic mice.
Gardyan, Adriane; Osen, Wolfram; Zörnig, Inka; Podola, Lilli; Agarwal, Maria; Aulmann, Sebastian; Ruggiero, Eliana; Schmidt, Manfred; Halama, Niels; Leuchs, Barbara; von Kalle, Christof; Beckhove, Philipp; Schneeweiss, Andreas; Jäger, Dirk; Eichmüller, Stefan B
2015-06-01
Breast cancer represents the second most common cancer type worldwide and has remained the leading cause of cancer-related deaths among women. The differentiation antigen NY-BR-1 appears overexpressed in invasive mammary carcinomas compared to healthy breast tissue, thus representing a promising target antigen for T cell based tumor immunotherapy approaches. Since efficient immune attack of tumors depends on the activity of tumor antigen-specific CD4(+) effector T cells, NY-BR-1 was screened for the presence of HLA-restricted CD4(+) T cell epitopes that could be included in immunological treatment approaches. Upon NY-BR-1-specific DNA immunization of HLA-transgenic mice and functional ex vivo analysis, a panel of NY-BR-1-derived library peptides was determined that specifically stimulated IFNγ secretion among splenocytes of immunized mice. Following in silico analyses, four candidate epitopes were determined which were successfully used for peptide immunization to establish NY-BR-1-specific, HLA-DRB1*0301- or HLA-DRB1*0401-restricted CD4(+) T cell lines from splenocytes of peptide immunized HLA-transgenic mice. Notably, all four CD4(+) T cell lines recognized human HLA-DR-matched dendritic cells (DC) pulsed with lysates of NY-BR-1 expressing human tumor cells, demonstrating natural processing of these epitopes also within the human system. Finally, CD4(+) T cells specific for all four CD4(+) T cell epitopes were detectable among PBMC of breast cancer patients, showing that CD4(+) T cell responses against the new epitopes are not deleted nor inactivated by self-tolerance mechanisms. Our results present the first NY-BR-1-specific HLA-DRB1*0301- and HLA-DRB1*0401-restricted T cell epitopes that could be exploited for therapeutic intervention against breast cancer. © 2014 UICC.
The innate immune repertoire in Cnidaria - ancestral complexity and stochastic gene loss
Miller, David J; Hemmrich, Georg; Ball, Eldon E; Hayward, David C; Khalturin, Konstantin; Funayama, Noriko; Agata, Kiyokazu; Bosch, Thomas CG
2007-01-01
Background Characterization of the innate immune repertoire of extant cnidarians is of both fundamental and applied interest - it not only provides insights into the basic immunological 'tool kit' of the common ancestor of all animals, but is also likely to be important in understanding the global decline of coral reefs that is presently occurring. Recently, whole genome sequences became available for two cnidarians, Hydra magnipapillata and Nematostella vectensis, and large expressed sequence tag (EST) datasets are available for these and for the coral Acropora millepora. Results To better understand the basis of innate immunity in cnidarians, we scanned the available EST and genomic resources for some of the key components of the vertebrate innate immune repertoire, focusing on the Toll/Toll-like receptor (TLR) and complement pathways. A canonical Toll/TLR pathway is present in representatives of the basal cnidarian class Anthozoa, but neither a classic Toll/TLR receptor nor a conventional nuclear factor (NF)-κB could be identified in the anthozoan Hydra. Moreover, the detection of complement C3 and several membrane attack complex/perforin domain (MAC/PF) proteins suggests that a prototypic complement effector pathway may exist in anthozoans, but not in hydrozoans. Together with data for several other gene families, this implies that Hydra may have undergone substantial secondary gene loss during evolution. Such losses are not confined to Hydra, however, and at least one MAC/PF gene appears to have been lost from Nematostella. Conclusion Consideration of these patterns of gene distribution underscores the likely significance of gene loss during animal evolution whilst indicating ancient origins for many components of the vertebrate innate immune system. PMID:17437634
DOE Office of Scientific and Technical Information (OSTI.GOV)
Venkatachari, Narasimhan J.; Majumder, Biswanath; Ayyavoo, Velpandi
2007-02-20
Human immunodeficiency virus type 1 (HIV-1) viral proteins disrupt the normal host cellular immune pathways thus exploiting the cellular machinery for replication, survival and to escape host immune attack. Here we evaluated the direct effects of HIV-1 Vpr-mediated immune modulation of infected T cells. Vpr specifically downregulated the expression of CD28 and increased the expression of CTLA-4, whereas no significant difference in the expression of CD25 and HLA-DR was observed. Interferon gamma (IFN-{gamma}) production in T cells was evaluated as a measure of the downstream effector functions. Results indicate that Vpr significantly inhibited IFN-{gamma} production and this may, in part,more » due to Vpr's ability to inhibit the nuclear translocation of NF-{kappa}B, and its transcriptional regulation. Together these results support that HIV-1 Vpr selectively dysregulates the immune functions at multiple levels and exerts its inhibitory effects in the presence of other viral proteins.« less
Boettler, Tobias; Schneider, Darius; Cheng, Yang; Kadoya, Kuniko; Brandon, Eugene P; Martinson, Laura; von Herrath, Matthias
2016-01-01
Type 1 diabetes (T1D) is characterized by destruction of glucose-responsive insulin-producing pancreatic β-cells and exhibits immune infiltration of pancreatic islets, where CD8 lymphocytes are most prominent. Curative transplantation of pancreatic islets is seriously hampered by the persistence of autoreactive immune cells that require high doses of immunosuppressive drugs. An elegant approach to confer graft protection while obviating the need for immunosuppression is the use of encapsulation devices that allow for the transfer of oxygen and nutrients, yet prevent immune cells from making direct contact with the islet grafts. Here we demonstrate that macroencapsulation devices (TheraCyte) loaded with neonatal pancreatic tissue and transplanted into RIP-LCMV.GP mice prevented disease onset in a model of virus-induced diabetes mellitus. Histological analyses revealed that insulin-producing cells survived within the device in animal models of diabetes. Our results demonstrate that these encapsulation devices can protect from an immune-mediated attack and can contain a sufficient amount of insulin-producing cells to prevent overt hyperglycemia.
Impact Assessment of GNSS Spoofing Attacks on INS/GNSS Integrated Navigation System.
Liu, Yang; Li, Sihai; Fu, Qiangwen; Liu, Zhenbo
2018-05-04
In the face of emerging Global Navigation Satellite System (GNSS) spoofing attacks, there is a need to give a comprehensive analysis on how the inertial navigation system (INS)/GNSS integrated navigation system responds to different kinds of spoofing attacks. A better understanding of the integrated navigation system’s behavior with spoofed GNSS measurements gives us valuable clues to develop effective spoofing defenses. This paper focuses on an impact assessment of GNSS spoofing attacks on the integrated navigation system Kalman filter’s error covariance, innovation sequence and inertial sensor bias estimation. A simple and straightforward measurement-level trajectory spoofing simulation framework is presented, serving as the basis for an impact assessment of both unsynchronized and synchronized spoofing attacks. Recommendations are given for spoofing detection and mitigation based on our findings in the impact assessment process.
Optimal space-time attacks on system state estimation under a sparsity constraint
NASA Astrophysics Data System (ADS)
Lu, Jingyang; Niu, Ruixin; Han, Puxiao
2016-05-01
System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary's perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary's goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary's limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.
CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical Systems
2018-04-19
AFRL-AFOSR-JP-TR-2018-0035 CORESAFE:A Formal Approach against Code Replacement Attacks on Cyber Physical Systems Sandeep Shukla INDIAN INSTITUTE OF...Formal Approach against Code Replacement Attacks on Cyber Physical Systems 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA2386-16-1-4099 5c. PROGRAM ELEMENT...Institute of Technology Kanpur India Final Report for AOARD Grant “CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical
Live and let die--Arabidopsis nonhost resistance to powdery mildews.
Lipka, Ulrike; Fuchs, Rene; Kuhns, Christine; Petutschnig, Elena; Lipka, Volker
2010-01-01
The term "nonhost resistance" (NHR) describes the phenomenon that an entire plant species is resistant to all genetic variants of a non-adapted pathogen species. In nature, NHR represents the most robust form of plant immunity and is therefore of scientific as well as economic importance. Due to its highly complex nature, NHR has previously not been studied in detail. Recently, the establishment of model interaction systems utilizing Arabidopsis and non-adapted powdery mildews allowed the identification of several key components and conceptual conclusions. It is now generally accepted that NHR of Arabidopsis to powdery mildews comprises two distinct layers of defence: pre-invasion entry control at the cell periphery and post-invasion resistance based on cell death execution. The timely production and localised discharge of toxic compounds at sites of fungal attack appear to be pivotal for entry control. This process requires proteins involved in secretion and trans-membrane transport, synthesis and activation of indolic glucosinolates as well as gene regulation and post-translational protein modification. Post-invasion defence relies on lipase-like proteins and salicylic acid signalling. To what extent pathogen-associated molecular pattern- or effector-triggered immunity contribute to NHR remains to be investigated and is likely to depend on the model system studied. Copyright 2009 Elsevier GmbH. All rights reserved.
MBCP - Approach - Immunotherapy | Center for Cancer Research
Immunotherapy CCR investigators pioneered the use of the tuberculosis vaccine—Bacillus Calmette-Guerin (BCG)—in the treatment of bladder cancer. In cases where the tumor burden is not too high and direct contact can be made with the urothelium surface of the bladder, BCG application appears to elicit an immune response that attacks the tumor as well as the attenuated virus.
USDA-ARS?s Scientific Manuscript database
The need for resources is a major driver of animal migration and yet migration itself is energetically demanding. Mormon crickets and nymphal locusts readily engage in cannibalistic attacks that result in aligned, coordinated movement of individuals in massive bands that march daily for weeks at a ...
BioWar: A City-Scale Multi-Agent Network Model of Weaponized Biological Attacks
2004-01-01
Simplex Encephalitis Hypertensive Heart Disease Hypovolemic Shock Immune Deficiency Syndrome Acquired Aids Infectious Mononucleosis Malaria...mitigation and recovery strategies. Models developed for the spread of infectious diseases in human populations can be harnessed for the predicting the...Restaurant s Eating location University Post secondary education institutions Military Military bases Indiv infectious idual a ) agents each tick
The Interaction of Human Pathogenic Fungi With C-Type Lectin Receptors.
Goyal, Surabhi; Castrillón-Betancur, Juan Camilo; Klaile, Esther; Slevogt, Hortense
2018-01-01
Fungi, usually present as commensals, are a major cause of opportunistic infections in immunocompromised patients. Such infections, if not diagnosed or treated properly, can prove fatal. However, in most cases healthy individuals are able to avert the fungal attacks by mounting proper antifungal immune responses. Among the pattern recognition receptors (PRRs), C-type lectin receptors (CLRs) are the major players in antifungal immunity. CLRs can recognize carbohydrate ligands, such as β-glucans and mannans, which are mainly found on fungal cell surfaces. They induce proinflammatory immune reactions, including phagocytosis, oxidative burst, cytokine, and chemokine production from innate effector cells, as well as activation of adaptive immunity via Th17 responses. CLRs such as Dectin-1, Dectin-2, Mincle, mannose receptor (MR), and DC-SIGN can recognize many disease-causing fungi and also collaborate with each other as well as other PRRs in mounting a fungi-specific immune response. Mutations in these receptors affect the host response and have been linked to a higher risk in contracting fungal infections. This review focuses on how CLRs on various immune cells orchestrate the antifungal response and on the contribution of single nucleotide polymorphisms in these receptors toward the risk of developing such infections.
Recombinant protective antigen 102 (rPA102): profile of a second-generation anthrax vaccine.
Keitel, Wendy A
2006-08-01
Recent terrorist attacks involving the use of Bacillus anthracis spores have stimulated interest in the development of new vaccines for anthrax prevention. Studies of the pathogenesis of anthrax and of the immune responses following infection and immunization underscore the pivotal role that antibodies to the protective antigen play in protection. The most promising vaccine candidates contain purified recombinant protective antigen. Clinical trials of one of these, recombinant protective antigen (rPA)102, are underway. Initial results suggest that rPA102 is well tolerated and immunogenic. Additional trials are necessary to identify optimal formulations and immunization regimens for pre- and postexposure prophylaxis. Future licensure of these and other candidate vaccines will depend on their safety and immunogenicity profiles in humans, and their ability to confer protection in animal models of inhalational anthrax.
Towards A Taxonomy Of Attacks Against Energy Control Systems
NASA Astrophysics Data System (ADS)
Fleury, Terry; Khurana, Himanshu; Welch, Von
Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.
Three tenets for secure cyber-physical system design and assessment
NASA Astrophysics Data System (ADS)
Hughes, Jeff; Cybenko, George
2014-06-01
This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.
NASA Astrophysics Data System (ADS)
Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu; Qi, Bing; Qian, Li; Lo, Hoi-Kwong
2014-05-01
We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.
Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu; Qi, Bing; Qian, Li; Lo, Hoi-Kwong
2014-05-16
We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.
Robustness of networks formed from interdependent correlated networks under intentional attacks
NASA Astrophysics Data System (ADS)
Liu, Long; Meng, Ke; Dong, Zhaoyang
2018-02-01
We study the problem of intentional attacks targeting to interdependent networks generated with known degree distribution (in-degree oriented model) or distribution of interlinks (out-degree oriented model). In both models, each node's degree is correlated with the number of its links that connect to the other network. For both models, varying the correlation coefficient has a significant effect on the robustness of a system undergoing random attacks or attacks targeting nodes with low degree. For a system with an assortative relationship between in-degree and out-degree, reducing the broadness of networks' degree distributions can increase the resistance of systems against intentional attacks.
Xia, Xiaofeng; Yu, Liying; Xue, Minqian; Yu, Xiaoqiang; Vasseur, Liette; Gurr, Geoff M.; Baxter, Simon W.; Lin, Hailan; Lin, Junhan; You, Minsheng
2015-01-01
The diamondback moth, Plutella xylostella (L.), is a destructive pest that attacks cruciferous crops worldwide. Immune responses are important for interactions between insects and pathogens and information on these underpins the development of strategies for biocontrol-based pest management. Little, however, is known about immune genes and their regulation patterns in P. xylostella. A total of 149 immune-related genes in 20 gene families were identified through comparison of P. xylostella genome with the genomes of other insects. Complete and conserved Toll, IMD and JAK-STAT signaling pathways were found in P. xylostella. Genes involved in pathogen recognition were expanded and more diversified than genes associated with intracellular signal transduction. Gene expression profiles showed that the IMD pathway may regulate expression of antimicrobial peptide (AMP) genes in the midgut, and be related to an observed down-regulation of AMPs in experimental lines of insecticide-resistant P. xylostella. A bacterial feeding study demonstrated that P. xylostella could activate different AMPs in response to bacterial infection. This study has established a framework of comprehensive expression profiles that highlight cues for immune regulation in a major pest. Our work provides a foundation for further studies on the functions of P. xylostella immune genes and mechanisms of innate immunity. PMID:25943446
Xia, Xiaofeng; Yu, Liying; Xue, Minqian; Yu, Xiaoqiang; Vasseur, Liette; Gurr, Geoff M; Baxter, Simon W; Lin, Hailan; Lin, Junhan; You, Minsheng
2015-05-06
The diamondback moth, Plutella xylostella (L.), is a destructive pest that attacks cruciferous crops worldwide. Immune responses are important for interactions between insects and pathogens and information on these underpins the development of strategies for biocontrol-based pest management. Little, however, is known about immune genes and their regulation patterns in P. xylostella. A total of 149 immune-related genes in 20 gene families were identified through comparison of P. xylostella genome with the genomes of other insects. Complete and conserved Toll, IMD and JAK-STAT signaling pathways were found in P. xylostella. Genes involved in pathogen recognition were expanded and more diversified than genes associated with intracellular signal transduction. Gene expression profiles showed that the IMD pathway may regulate expression of antimicrobial peptide (AMP) genes in the midgut, and be related to an observed down-regulation of AMPs in experimental lines of insecticide-resistant P. xylostella. A bacterial feeding study demonstrated that P. xylostella could activate different AMPs in response to bacterial infection. This study has established a framework of comprehensive expression profiles that highlight cues for immune regulation in a major pest. Our work provides a foundation for further studies on the functions of P. xylostella immune genes and mechanisms of innate immunity.
Tuberculosis as a three-act play: A new paradigm for the pathogenesis of pulmonary tuberculosis.
Hunter, Robert L
2016-03-01
Lack of access to human tissues with untreated tuberculosis (TB) has forced generations of researchers to use animal models and to adopt a paradigm that granulomas are the characteristic lesion of both primary and post primary TB. An extended search of studies of human lung tissues failed to find any reports that support this paradigm. We found scores of publications from gross pathology in 1804 through high resolution CT scans in 2015 that identify obstructive lobular pneumonia, not granulomas, as the characteristic lesion of developing post-primary TB. This paper reviews this literature together with other relevant observations to formulate a new paradigm of TB with three distinct stages: a three-act play. First, primary TB, a war of attrition, begins with infection that spreads via lymphatics and blood stream before inducing systemic immunity that contains and controls the organisms within granulomas. Second, post-primary TB, a sneak attack, develops during latent TB as an asymptomatic obstructive lobular pneumonia in persons with effective systemic immunity. It is a paucibacillary process with no granulomas that spreads via bronchi and accumulates mycobacterial antigens and host lipids for 1-2 years before suddenly undergoing caseous necrosis. Third, the fallout, is responsible for nearly all clinical post primary disease. It begins with caseous necrotic pneumonia that is either retained to become the focus of fibrocaseous disease or is coughed out to leave a cavity. This three-stage paradigm suggests testable hypotheses and plausible answers to long standing questions of immunity to TB. Copyright © 2015 The Author. Published by Elsevier Ltd.. All rights reserved.
Measles outbreak investigation in Guji zone of Oromia Region, Ethiopia.
Belda, Ketema; Tegegne, Ayesheshem Ademe; Mersha, Amare Mengistu; Bayenessagne, Mekonnen Getahun; Hussein, Ibrahim; Bezabeh, Belay
2017-01-01
Despite the increase of immunization coverage (administrative) of measles in the country, there are widespread outbreaks of measles. In this respect, we investigated one of the outbreaks that occurred in hard to reach kebeles of Guji Zone, Oromia region, to identify the contributing factors that lead to the protracted outbreak of measles. We used a cross-sectional study design to investigate a measles outbreak in Guji zone, Oromia region. Data entry and analysis was performed using EPI-Info version 7.1.0.6 and MS-Microsoft Excel. In three months' time a total of 1059 suspected cases and two deaths were reported from 9 woredas affected by a measles outbreak in Guji zone. The cumulative attack rate of 81/100,000 population and case fatality ratio of 0.2% was recorded. Of these, 821 (77.5%) cases were < 15 years of age, and 742 (70%) were zero doses of measles vaccine. Although, all age groups were affected under five years old were more affected 495 (48%) than any other age groups. In response to the outbreak, an outbreak response immunization was organized at the 11th week of the epidemic, when the epidemic curve started to decline. 6 months to14 years old were targeted for outbreak response immunization and the overall coverage was 97 % (range: 90-103%). Case management with vitamin A supplementation, active case search, and health education was some of the activities carried out to curb the outbreak. We conclude that low routine immunization coverage in conjunction with low access to routine immunization in hard to reach areas, low community awareness in utilization of immunization service, inadequate cold chain management and delivery of a potent vaccine in hard to reach woredas/kebeles were likely contributed to the outbreak that's triggered a broad spread epidemic affecting mostly children without any vaccination. We also figured that the case-based surveillance lacks sensitivity and timely confirmation of the outbreak, which as a result outbreak response immunization were delayed. We recommend establishing reaching every child (REC) strategy in Guji zone with particular emphasis too hard reach areas to enhance the current immunization service, and furthermore to conduct data quality self-assessment or cluster coverage survey to verify the reported high vaccination coverage in some kebeles. We also recommend conducting the second opportunity as a form of supplemental immunization activities in 2-3 year interval or consider the national second dose introduction in the routine immunization system to improve population immunity. We further recommend that there is a need to boost the sensitivity of case-based surveillance system to be able to early detect, confirm and react to future epidemics.
2011-01-01
Trauma represents the leading cause of death among young people in industrialized countries. Recent clinical and experimental studies have brought increasing evidence for activation of the innate immune system in contributing to the pathogenesis of trauma-induced sequelae and adverse outcome. As the "first line of defense", the complement system represents a potent effector arm of innate immunity, and has been implicated in mediating the early posttraumatic inflammatory response. Despite its generic beneficial functions, including pathogen elimination and immediate response to danger signals, complement activation may exert detrimental effects after trauma, in terms of mounting an "innocent bystander" attack on host tissue. Posttraumatic ischemia/reperfusion injuries represent the classic entity of complement-mediated tissue damage, adding to the "antigenic load" by exacerbation of local and systemic inflammation and release of toxic mediators. These pathophysiological sequelae have been shown to sustain the systemic inflammatory response syndrome after major trauma, and can ultimately contribute to remote organ injury and death. Numerous experimental models have been designed in recent years with the aim of mimicking the inflammatory reaction after trauma and to allow the testing of new pharmacological approaches, including the emergent concept of site-targeted complement inhibition. The present review provides an overview on the current understanding of the cellular and molecular mechanisms of complement activation after major trauma, with an emphasis of emerging therapeutic concepts which may provide the rationale for a "bench-to-bedside" approach in the design of future pharmacological strategies. PMID:22129197
Fujimoto, Chisato; Kinoshita, Makoto; Kamogashira, Teru; Egami, Naoya; Sugasawa, Keiko; Yamasoba, Tatsuya; Iwasaki, Shinichi
2016-01-01
Vertigo attacks in IBV patients involving both the superior and inferior vestibular nerve systems were significantly more severe than vertigo attacks in patients with selective involvement of the inferior vestibular nerve system alone. To investigate the relationship between the frequency and duration of vertigo and the affected vestibular nerve system in idiopathic bilateral vestibulopathy (IBV). This study categorized 44 IBV patients into the following three sub-groups according to the affected vestibular nerve system: superior, inferior, and mixed type. These patients were also categorized into the following three sub-groups according to their clinical time course: progressive type showing no episodes of vertigo, sequential type showing recurrent vertigo attacks and single-attack type showing a single episode of vertigo. Ten, 11 and 23 patients were classified as the superior, the inferior, and the mixed type, respectively. Seventeen, 23, and four patients were classified as the progressive, the sequential, and the single-attack type, respectively. For the patients having one or more vertigo attacks, the duration of the vertigo attack was longer than 24 h in 69% of the mixed type, and the duration of vertigo in the mixed type was significantly longer than that in the inferior type (p < 0.05).
Randomness determines practical security of BB84 quantum key distribution.
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-11-10
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
Randomness determines practical security of BB84 quantum key distribution
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-01-01
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359
Randomness determines practical security of BB84 quantum key distribution
NASA Astrophysics Data System (ADS)
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-11-01
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
Face liveness detection for face recognition based on cardiac features of skin color image
NASA Astrophysics Data System (ADS)
Suh, Kun Ha; Lee, Eui Chul
2016-07-01
With the growth of biometric technology, spoofing attacks have been emerged a threat to the security of the system. Main spoofing scenarios in the face recognition system include the printing attack, replay attack, and 3D mask attack. To prevent such attacks, techniques that evaluating liveness of the biometric data can be considered as a solution. In this paper, a novel face liveness detection method based on cardiac signal extracted from face is presented. The key point of proposed method is that the cardiac characteristic is detected in live faces but not detected in non-live faces. Experimental results showed that the proposed method can be effective way for determining printing attack or 3D mask attack.
Possibility of spoof attack against robustness of multibiometric authentication systems
NASA Astrophysics Data System (ADS)
Hariri, Mahdi; Shokouhi, Shahriar Baradaran
2011-07-01
Multibiometric systems have been recently developed in order to overcome some weaknesses of single biometric authentication systems, but security of these systems against spoofing has not received enough attention. In this paper, we propose a novel practical method for simulation of possibilities of spoof attacks against a biometric authentication system. Using this method, we model matching scores from standard to completely spoofed genuine samples. Sum, product, and Bayes fusion rules are applied for score level combination. The security of multimodal authentication systems are examined and compared with the single systems against various spoof possibilities. However, vulnerability of fused systems is considerably increased against spoofing, but their robustness is generally higher than single matcher systems. In this paper we show that robustness of a combined system is not always higher than a single system against spoof attack. We propose empirical methods for upgrading the security of multibiometric systems, which contain how to organize and select biometric traits and matchers against various possibilities of spoof attack. These methods provide considerable robustness and present an appropriate reason for using combined systems against spoof attacks.
Non-harmful insertion of data mimicking computer network attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee
Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.
Game Theory and Uncertainty Quantification for Cyber Defense Applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna
Cyber-system defenders face the challenging task of protecting critical assets and information continually against multiple types of malicious attackers. Defenders typically operate within resource constraints while attackers operate at relatively low costs. As a result, design and development of resilient cyber-systems that can support mission goals under attack while accounting for the dynamics between attackers and defenders is an important research problem.
Control-system techniques for improved departure/spin resistance for fighter aircraft
NASA Technical Reports Server (NTRS)
Nguyen, L. T.; Gilbert, W. P.; Ogburn, M. E.
1980-01-01
Some fundamental information on control system effects on controllability of highly maneuverable aircraft at high angles of attack are summarized as well as techniques for enhancing fighter aircraft departure/spin resistance using control system design. The discussion includes: (1) a brief review of pertinent high angle of attack phenomena including aerodynamics, inertia coupling, and kinematic coupling; (2) effects of conventional stability augmentation systems at high angles of attack; (3) high angle of attack control system concepts designed to enhance departure/spin resistance; and (4) the outlook for applications of these concepts to future fighters, particularly those designs which incorporate relaxed static stability.
Ogasawara, Kimi; Yamada, Kenji; Hatsugai, Noriyuki; Imada, Chiaki; Nishimura, Mikio
2016-01-01
Marine algae have unique defense strategies against microbial infection. However, their mechanisms of immunity remain to be elucidated and little is known about the similarity of the immune systems of marine algae and terrestrial higher plants. Here, we suggest a possible mechanism underlying algal immunity, which involves hexose oxidase (HOX)-dependent production of hydrogen peroxide (H2O2). We examined crude extracts from five different red algal species for their ability to prevent bacterial growth. The extract from one of these algae, Ptilophora subcostata, was particularly active and prevented the growth of gram-positive and -negative bacteria, which was completely inhibited by treatment with catalase. The extract did not affect the growth of either a yeast or a filamentous fungus. We partially purified from P. subcostata an enzyme involved in its antibacterial activity, which shared 50% homology with the HOX of red seaweed Chondrus crispus. In-gel carbohydrate oxidase assays revealed that P. subcostata extract had the ability to produce H2O2 in a hexose-dependent manner and this activity was highest in the presence of galactose. In addition, Bacillus subtilis growth was strongly suppressed near P. subcostata algal fronds on GYP agar plates. These results suggest that HOX plays a role in P. subcostata resistance to bacterial attack by mediating H2O2 production in the marine environment. PMID:26867214
Co-option of endocytic functions of cellular caveolae by pathogens
Shin, J-S; Abraham, S N
2001-01-01
It is increasingly becoming clear that various immune cells are infected by the very pathogens that they are supposed to attack. Although many mechanisms for microbial entry exist, it appears that a common route of entry shared by certain bacteria, viruses and parasites involves cellular lipid-rich microdomains sometimes called caveolae. These cellular entities, which are characterized by their preferential accumulation of glycosylphosphatidylinositol (GPI)-anchored molecules, cholesterol and various glycolipids, and a distinct protein (caveolin), are present in many effector cells of the immune system including neutrophils, macrophages, mast cells and dendritic cells. These structures have an innate capacity to endocytoze various ligands and traffic them to different intracellular sites and sometimes, back to the extracellular cell surface. Because caveolae do not typically fuse with lysosomes, the ligands borne by caveolar vesicles are essentially intact, which is in marked contrast to ligands endocytozed via the classical endosome–lysosome pathway. A number of microbes or their exotoxins co-opt the unique features of caveolae to enter and traffic, without any apparent loss of viability and function, to different sites within immune and other host cells. In spite of their wide disparity in size and other structural attributes, we predict that a common feature among caveolae-utilizing pathogens and toxins is that their cognate receptor(s) are localized within plasmalemmal caveolae of the host cell. PMID:11168630
An Extracellular Subtilase Switch for Immune Priming in Arabidopsis
Mauch-Mani, Brigitte; Gil, Ma José; Vera, Pablo
2013-01-01
In higher eukaryotes, induced resistance associates with acquisition of a priming state of the cells for a more effective activation of innate immunity; however, the nature of the components for mounting this type of immunological memory is not well known. We identified an extracellular subtilase from Arabidopsis, SBT3.3, the overexpression of which enhances innate immune responses while the loss of function compromises them. SBT3.3 expression initiates a durable autoinduction mechanism that promotes chromatin remodeling and activates a salicylic acid(SA)-dependent mechanism of priming of defense genes for amplified response. Moreover, SBT3.3 expression-sensitized plants for enhanced expression of the OXI1 kinase gene and activation of MAP kinases following pathogen attack, providing additional clues for the regulation of immune priming by SBT3.3. Conversely, in sbt3.3 mutant plants pathogen-mediated induction of SA-related defense gene expression is drastically reduced and activation of MAP kinases inhibited. Moreover, chromatin remodeling of defense-related genes normally associated with activation of an immune priming response appear inhibited in sbt3.3 plants, further indicating the importance of the extracellular SBT3.3 subtilase in the establishment of immune priming. Our results also point to an epigenetic control in the regulation of plant immunity, since SBT3.3 is up-regulated and priming activated when epigenetic control is impeded. SBT3.3 represents a new regulator of primed immunity. PMID:23818851
An extracellular subtilase switch for immune priming in Arabidopsis.
Ramírez, Vicente; López, Ana; Mauch-Mani, Brigitte; Gil, Ma José; Vera, Pablo
2013-01-01
In higher eukaryotes, induced resistance associates with acquisition of a priming state of the cells for a more effective activation of innate immunity; however, the nature of the components for mounting this type of immunological memory is not well known. We identified an extracellular subtilase from Arabidopsis, SBT3.3, the overexpression of which enhances innate immune responses while the loss of function compromises them. SBT3.3 expression initiates a durable autoinduction mechanism that promotes chromatin remodeling and activates a salicylic acid(SA)-dependent mechanism of priming of defense genes for amplified response. Moreover, SBT3.3 expression-sensitized plants for enhanced expression of the OXI1 kinase gene and activation of MAP kinases following pathogen attack, providing additional clues for the regulation of immune priming by SBT3.3. Conversely, in sbt3.3 mutant plants pathogen-mediated induction of SA-related defense gene expression is drastically reduced and activation of MAP kinases inhibited. Moreover, chromatin remodeling of defense-related genes normally associated with activation of an immune priming response appear inhibited in sbt3.3 plants, further indicating the importance of the extracellular SBT3.3 subtilase in the establishment of immune priming. Our results also point to an epigenetic control in the regulation of plant immunity, since SBT3.3 is up-regulated and priming activated when epigenetic control is impeded. SBT3.3 represents a new regulator of primed immunity.
Enhancing the cyber-security of smart grids with applications to synchrophasor data
NASA Astrophysics Data System (ADS)
Pal, Seemita
In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of packet-drops and finally detect attacks, if any. In the case of PMU data manipulation attacks, the attacker may modify the data in the PMU packets in order to bias the system states and influence the control center into taking wrong decisions. The proposed detection technique is based on evaluating the equivalent impedances of the transmission lines and classifying the observed anomalies to determine the presence of attack and its location. The scheme for detecting data integrity attacks on SCADA systems is based on utilizing synchrophasor measurements from available PMUs in the grid. The proposed method uses a difference measure, developed in this thesis, to determine the relative divergence and mis-correlation between the datasets. Based on the estimated difference measure, tampered and genuine data can be distinguished. The proposed detection mechanisms have demonstrated high accuracy in real-time detection of attacks of various magnitudes, simulated on real PMU data obtained from the NY grid. By performing alarm clustering, the occurrence of false alarms has been reduced to almost zero. The solutions are computationally inexpensive, low on cost, do not add any overhead, and do not require any feedback from the network.
PD-1/PD-L1 Inhibitors for Immuno-oncology: From Antibodies to Small Molecules.
Geng, Qiaohong; Jiao, Peifu; Jin, Peng; Su, Gaoxing; Dong, Jinlong; Yan, Bing
2018-02-12
The recent regulatory approvals of immune checkpoint protein inhibitors, such as ipilimumab, pembrolizumab, nivolumab, atezolizumab, durvalumab, and avelumab ushered a new era in cancer therapy. These inhibitors do not attack tumor cells directly but instead mobilize the immune system to re-recognize and eradicate tumors, which endows them with unique advantages including durable clinical responses and substantial clinical benefits. PD-1/PD-L1 inhibitors, a pillar of immune checkpoint protein inhibitors, have demonstrated unprecedented clinical efficacy in more than 20 cancer types. Besides monoclonal antibodies, diverse PD- 1/PD-L1 inhibiting candidates, such as peptides, small molecules have formed a powerful collection of weapons to fight cancer. The goal of this review is to summarize and discuss the current PD-1/PD-L1 inhibitors including candidates under clinical development, their molecular interactions with PD-1 or PD-L1, the disclosed structureactivity relationships of peptides and small molecules as inhibitors. Current PD-1/PD-L1 inhibitors under clinical development are exclusively dominated by antibodies. The molecular interactions of therapeutic antibodies with PD-1 or PD-L1 have been gradually elucidated for the design of novel inhibitors. Various peptides and traditional small molecules have been investigated in preclinical model to discover novel PD-1/PD-L1 inhibitors. Peptides and small molecules may play an important role in immuno-oncology because they may bind to multiple immune checkpoint proteins via rational design, opening opportunity for a new generation of novel PD-1/PD-L1 inhibitors. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.
Pfeilmeier, Sebastian; Saur, Isabel Marie-Luise; Rathjen, John Paul; Zipfel, Cyril; Malone, Jacob George
2016-05-01
The plant innate immune system employs plasma membrane-localized receptors that specifically perceive pathogen/microbe-associated molecular patterns (PAMPs/MAMPs). This induces a defence response called pattern-triggered immunity (PTI) to fend off pathogen attack. Commensal bacteria are also exposed to potential immune recognition and must employ strategies to evade and/or suppress PTI to successfully colonize the plant. During plant infection, the flagellum has an ambiguous role, acting as both a virulence factor and also as a potent immunogen as a result of the recognition of its main building block, flagellin, by the plant pattern recognition receptors (PRRs), including FLAGELLIN SENSING2 (FLS2). Therefore, strict control of flagella synthesis is especially important for plant-associated bacteria. Here, we show that cyclic-di-GMP [bis-(3'-5')-cyclic di-guanosine monophosphate], a central regulator of bacterial lifestyle, is involved in the evasion of PTI. Elevated cyclic-di-GMP levels in the pathogen Pseudomonas syringae pv. tomato (Pto) DC3000, the opportunist P. aeruginosa PAO1 and the commensal P. protegens Pf-5 inhibit flagellin synthesis and help the bacteria to evade FLS2-mediated signalling in Nicotiana benthamiana and Arabidopsis thaliana. Despite this, high cellular cyclic-di-GMP concentrations were shown to drastically reduce the virulence of Pto DC3000 during plant infection. We propose that this is a result of reduced flagellar motility and/or additional pleiotropic effects of cyclic-di-GMP signalling on bacterial behaviour. © 2015 THE AUTHORS MOLECULAR PLANT PATHOLOGY PUBLISHED BY BRITISH SOCIETY FOR PLANT PATHOLOGY AND JOHN WILEY & SONS LTD.
Electronic patient registration and tracking at mass vaccination clinics: a clinical study.
Billittier, Anthony J; Lupiani, Patrick; Masterson, Gary; Masterson, Tim; Zak, Christopher
2003-01-01
To protect the citizens of the United States from the use of dangerous biological agents, the Center for Disease Control and Prevention (CDC) has been actively preparing to deal with the consequences of such an attack. Their plans include the deployment of mass immunization clinics to handle postevent vaccinations. As part of the planning efforts by the Western New York Public Health Alliance, a Web-based electronic patient registration and tracking system was developed and tested at a recent trial smallpox vaccination clinic. Initial goals were to determine what the pitfalls and benefits of using such a system might be in comparison to other methods of data collection. This exercise proved that use of an electronic system capable of scanning two-dimensional bar codes was superior to both paper-based and optical character recognition (OCR) methods of data collection and management. Major improvements in speed and/or accuracy were evident in all areas of the clinic, especially in patient registration, vaccine tracking and postclinic data analysis.
NASA Technical Reports Server (NTRS)
Gilbert, W. P.; Nguyen, L. T.; Vangunst, R. W.
1976-01-01
A piloted, fixed-base simulation was conducted to study the effectiveness of some automatic control system features designed to improve the stability and control characteristics of fighter airplanes at high angles of attack. These features include an angle-of-attack limiter, a normal-acceleration limiter, an aileron-rudder interconnect, and a stability-axis yaw damper. The study was based on a current lightweight fighter prototype. The aerodynamic data used in the simulation were measured on a 0.15-scale model at low Reynolds number and low subsonic Mach number. The simulation was conducted on the Langley differential maneuvering simulator, and the evaluation involved representative combat maneuvering. Results of the investigation show the fully augmented airplane to be quite stable and maneuverable throughout the operational angle-of-attack range. The angle-of-attack/normal-acceleration limiting feature of the pitch control system is found to be a necessity to avoid angle-of-attack excursions at high angles of attack. The aileron-rudder interconnect system is shown to be very effective in making the airplane departure resistant while the stability-axis yaw damper provided improved high-angle-of-attack roll performance with a minimum of sideslip excursions.
Dynamic defense and network randomization for computer systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.
The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissancemore » stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.« less
Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.
Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less
CPAD: Cyber-Physical Attack Detection
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ferragut, Erik M; Laska, Jason A
The CPAD technology relates to anomaly detection and more specifically to cyber physical attack detection. It infers underlying physical relationships between components by analyzing the sensor measurements of a system. It then uses these measurements to detect signs of a non-physically realizable state, which is indicative of an integrity attack on the system. CPAD can be used on any highly-instrumented cyber-physical system to detect integrity attacks and identify the component or components compromised. It has applications to power transmission and distribution, nuclear and industrial plants, and complex vehicles.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bri Rolston
2005-06-01
Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less
Phytohormone mediation of interactions between herbivores and plant pathogens.
Lazebnik, Jenny; Frago, Enric; Dicke, Marcel; van Loon, Joop J A
2014-07-01
Induced plant defenses against either pathogens or herbivore attackers are regulated by phytohormones. These phytohormones are increasingly recognized as important mediators of interactions between organisms associated with plants. In this review, we discuss the role of plant defense hormones in sequential tri-partite interactions among plants, pathogenic microbes, and herbivorous insects, based on the most recent literature. We discuss the importance of pathogen trophic strategy in the interaction with herbivores that exhibit different feeding modes. Plant resistance mechanisms also affect plant quality in future interactions with attackers. We discuss exemplary evidence for the hypotheses that (i) biotrophic pathogens can facilitate chewing herbivores, unless plants exhibit effector-triggered immunity, but (ii) facilitate or inhibit phloem feeders. (iii) Necrotrophic pathogens, on the other hand, can inhibit both phloem feeders and chewers. We also propose herbivore feeding mode as predictor of effects on pathogens of different trophic strategies, providing evidence for the hypotheses that (iv) phloem feeders inhibit pathogen attack by increasing SA induction, whereas (v) chewing herbivores tend not to affect necrotrophic pathogens, while they may either inhibit or facilitate biotrophic pathogens. Putting these hypotheses to the test will increase our understanding of phytohormonal regulation of plant defense to sequential attack by plant pathogens and insect herbivores. This will provide valuable insight into plant-mediated ecological interactions among members of the plant-associated community.
Immune mediated colitis caused by lung cancer treatment with atezolizumab.
González Vázquez, Santiago; de la Riva Onandía, Susana; Echeveste, José Ignacio; Muñoz Navas, Miguel
2017-12-01
Atezolizumab is an IgG1 isotype monoclonal antibody against the protein programmed cell death-ligand 1 (PD- L1). PD-L1 may be highly expressed in some tumors and is believed to inhibit immune cells that recognize and attack tumor cells. Inhibition of PD-L1 can remove its inhibitory effect and provoke an anti-tumor response. In October 2016, the Food and Drugs Administration (FDA) approved atezolizumab for the treatment of patients with metastatic non-small cell lung cancer after disease progression during or following platinum based chemotherapy. We present the case of a 43-year-old male with stage IV lung adenocarcinoma in progression, despite standard chemotherapy.
Integrating Lung Physiology, Immunology, and Tuberculosis.
Torrelles, Jordi B; Schlesinger, Larry S
2017-08-01
Lungs are directly exposed to the air, have enormous surface area, and enable gas exchange in air-breathing animals. They are constantly 'attacked' by microbes from both outside and inside and thus possess a unique, highly regulated local immune defense system which efficiently allows for microbial clearance while minimizing damaging inflammatory responses. As a prototypic host-adapted airborne pathogen, Mycobacterium tuberculosis traverses the lung and has several 'interaction points' (IPs) which it must overcome to cause infection. These interactions are critical, not only from a pathogenesis perspective but also in considering the effectiveness of therapies and vaccines in the lungs. Here we discuss emerging views on immunologic interactions occurring in the lungs for M. tuberculosis and their impact on infection and persistence. Copyright © 2017 Elsevier Ltd. All rights reserved.
Conversations between kingdoms: small RNAs.
Weiberg, Arne; Bellinger, Marschal; Jin, Hailing
2015-04-01
Humans, animals, and plants are constantly under attack from pathogens and pests, resulting in severe consequences on global human health and crop production. Small RNA (sRNA)-mediated RNA interference (RNAi) is a conserved regulatory mechanism that is involved in almost all eukaryotic cellular processes, including host immunity and pathogen virulence. Recent evidence supports the significant contribution of sRNAs and RNAi to the communication between hosts and some eukaryotic pathogens, pests, parasites, or symbiotic microorganisms. Mobile silencing signals—most likely sRNAs—are capable of translocating from the host to its interacting organism, and vice versa. In this review, we will provide an overview of sRNA communications between different kingdoms, with a primary focus on the advances in plant-pathogen interaction systems. Copyright © 2015 Elsevier Ltd. All rights reserved.
[Immune response of Hansen's disease. Review].
Rada, Elsa; Aranzazu, Nacarid; Convit, Jacinto
2009-12-01
Hansen's disease presents a wide spectrum of clinical and histopathological manifestations that reflect the nature of the immunological response of the host towards diverse Mycobacterium leprae components. The immunological system, composed by both innate and adaptive immunology, offers protection towards infections of various etiologies, among them bacterial. Bacteria, of course, have developed multiple strategies for evading host defenses, based on either very complex or simple mechanisms, but with a single purpose: to "resist" host attacks and to be able to survive. We have tried to summarize some recent studies in Hansen's disease, with more emphasis in the inmunology area. We think that in the future, all illnesses should also be very strongly related to other important aspects such as the social, environmental and economic, and whose development is not solved in a laboratory.
[Severe infection in critical emergency care].
Matsuda, Naoyuki; Takatani, Yudai; Higashi, Tomoko; Inaba, Masato; Ejima, Tadashi
2016-02-01
In the emergency and critical care medicine, infection is easy to merge to various basic conditions and diseases. In the social structure aging in critical care, the immune weakness was revealed as the result of severe infection and septic shock in the reduced function of neutrophils and lymphocytes. In the life-saving emergency care, cardiovascular diseases, diabetes, chronic renal failure and lever dysfunction are often observed, and the underlying diseases have the foundation of biological invasion after a first inflammatory attack of surgery, trauma, burn, and systemic injury. It will be placed into a susceptible situation such as artificial respiratory management. In this review, we discussed severe infection in emergency and critical care. It is necessary to pay attention to the drug resistance bacterias in own critical care setting by trends.
Manipulation of cells with laser microbeam scissors and optical tweezers: a review
NASA Astrophysics Data System (ADS)
Greulich, Karl Otto
2017-02-01
The use of laser microbeams and optical tweezers in a wide field of biological applications from genomic to immunology is discussed. Microperforation is used to introduce a well-defined amount of molecules into cells for genetic engineering and optical imaging. The microwelding of two cells induced by a laser microbeam combines their genetic outfit. Microdissection allows specific regions of genomes to be isolated from a whole set of chromosomes. Handling the cells with optical tweezers supports investigation on the attack of immune systems against diseased or cancerous cells. With the help of laser microbeams, heart infarction can be simulated, and optical tweezers support studies on the heartbeat. Finally, laser microbeams are used to induce DNA damage in living cells for studies on cancer and ageing.
Attacks on public telephone networks: technologies and challenges
NASA Astrophysics Data System (ADS)
Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet
2003-09-01
Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.
Intravenous immunoglobulin and Alzheimer's disease immunotherapy.
Solomon, Beka
2007-02-01
Amyloid-beta peptide (Abeta) contributes to the acute progression of Alzheimer's disease (AD) and has become the main target for therapeutics. Active immunization with Abeta in individuals with AD has been efficacious; however, some patients developed side effects, possibly related to an autoimmune response. Evidence that intravenous immunoglobulin (IVIg), an FDA-approved purified immunoglobulin fraction from normal human donor blood, shows promise of passive immunotherapy for AD is reviewed. Investigations into the molecular effects of IVIg on Abeta clearance, using the BV-2 cellular microglia line, demonstrate that IVIg dissolves Abeta fibrils in vitro, increases cellular tolerance to Abeta, enhances microglial migration toward Abeta deposits, and mediates phagocytosis of Abeta. Preliminary clinical results indicate that IVIg, which contains natural antibodies against the Abeta, warrants further study into its potential to deliver a controlled immune attack on the peptide, avoiding the immune toxicities that have had a negative impact on the first clinical trials of vaccine against Abeta.
Robustness and structure of complex networks
NASA Astrophysics Data System (ADS)
Shao, Shuai
This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks are much more vulnerable to localized attack compared with random attack. In the second part, we extend the tree-like generating function method to incorporating clustering structure in complex networks. We study the robustness of a complex network system, especially a network of networks (NON) with clustering structure in each network. We find that the system becomes less robust as we increase the clustering coefficient of each network. For a partially dependent network system, we also find that the influence of the clustering coefficient on network robustness decreases as we decrease the coupling strength, and the critical coupling strength qc, at which the first-order phase transition changes to second-order, increases as we increase the clustering coefficient.
Security attack detection algorithm for electric power gis system based on mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan
2017-05-01
Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.
Investigation on Covert Channel Attacks and Countermeasures in the Cloud
2017-03-29
ahead of the game and continue improving our security systems. Thus, investigating novel attack strategies and tactics is crucial to shaping the...step to stay ahead of the game and continue improving our security systems. Thus, investigating novel attack strategies and tactics is crucial to
Using Unix system auditing for detecting network intrusions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Christensen, M.J.
1993-03-01
Intrusion Detection Systems (IDSs) are designed to detect actions of individuals who use computer resources without authorization as well as legitimate users who exceed their privileges. This paper describes a novel approach to IDS research, namely a decision aiding approach to intrusion detection. The introduction of a decision tree represents the logical steps necessary to distinguish and identify different types of attacks. This tool, the Intrusion Decision Aiding Tool (IDAT), utilizes IDS-based attack models and standard Unix audit data. Since attacks have certain characteristics and are based on already developed signature attack models, experienced and knowledgeable Unix system administrators knowmore » what to look for in system audit logs to determine if a system has been attacked. Others, however, are usually less able to recognize common signatures of unauthorized access. Users can traverse the tree using available audit data displayed by IDAT and general knowledge they possess to reach a conclusion regarding suspicious activity. IDAT is an easy-to-use window based application that gathers, analyzes, and displays pertinent system data according to Unix attack characteristics. IDAT offers a more practical approach and allows the user to make an informed decision regarding suspicious activity.« less
Quantum key distribution with hacking countermeasures and long term field trial.
Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J
2017-05-16
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.
Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor
Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung
2018-01-01
Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies. PMID:29695113
Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor.
Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung
2018-04-24
Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.
Vulnerability of water supply systems to cyber-physical attacks
NASA Astrophysics Data System (ADS)
Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi
2016-04-01
The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.
Wu, Fan; Xu, Lili
2013-08-01
Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.
Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.
Feng, Zhi; Wen, Guanghui; Hu, Guoqiang
2017-05-01
This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.
NASA Astrophysics Data System (ADS)
Liu, Xuan
Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.
Cao, Yuan; Ye, Wenbin; Han, Qingbang; Pan, Xiaofang
2018-01-01
Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electromagnetic (EM) side-channel attack and the support vector machine (SVM) modelling attack. By employing an RO based PUF architecture with the current starved inverter as the delay cell, the oscillation power is significantly reduced to minimize the emitted EM signal, leading to greatly enhanced immunity to the EM side-channel analysis attack. In addition, featuring superior reconfigurability due to the conspicuously simplified circuitries, the proposed implementation is capable of withstanding the SVM modelling attack by generating and comparing a large number of RO frequency pairs. The reported experimental results validate the prototype of a 9-stage RO PUF fabricated using standard 65 nm complementary-metal-oxide-semiconductor (CMOS) process. Operating at the supply voltage of 1.2 V and the frequency of 100 KHz, the fabricated RO PUF occupies a compact silicon area of 250 μm2 and consumes a power as low as 5.16 μW per challenge-response pair (CRP). Furthermore, the uniqueness and the worst-case reliability are measured to be 50.17% and 98.30% for the working temperature range of −40∼120 ∘C and the supply voltage variation of ±2%, respectively. Thus, the proposed PUF is applicable for the low power, low cost and secure WSN communications. PMID:29360790
Cao, Yuan; Zhao, Xiaojin; Ye, Wenbin; Han, Qingbang; Pan, Xiaofang
2018-01-23
Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electromagnetic (EM) side-channel attack and the support vector machine (SVM) modelling attack. By employing an RO based PUF architecture with the current starved inverter as the delay cell, the oscillation power is significantly reduced to minimize the emitted EM signal, leading to greatly enhanced immunity to the EM side-channel analysis attack. In addition, featuring superior reconfigurability due to the conspicuously simplified circuitries, the proposed implementation is capable of withstanding the SVM modelling attack by generating and comparing a large number of RO frequency pairs. The reported experimental results validate the prototype of a 9-stage RO PUF fabricated using standard 65 nm complementary-metal-oxide-semiconductor (CMOS) process. Operating at the supply voltage of 1.2 V and the frequency of 100 KHz, the fabricated RO PUF occupies a compact silicon area of 250 μ m 2 and consumes a power as low as 5.16 μ W per challenge-response pair (CRP). Furthermore, the uniqueness and the worst-case reliability are measured to be 50.17% and 98.30% for the working temperature range of -40∼120 ∘ C and the supply voltage variation of ±2%, respectively. Thus, the proposed PUF is applicable for the low power, low cost and secure WSN communications.
DOT National Transportation Integrated Search
2012-03-01
Government regulators and transportation operators of public bus systems are concerned about terrorist attacks. Bus attacks in Israel between late September 2000 and the end of 2006, a period known as the Second Intifada, are particularly well known....
The Effect of Password Management Procedures on the Entropy of User Selected Passwords
ERIC Educational Resources Information Center
Enamait, John D.
2012-01-01
Maintaining the security of information contained within computer systems poses challenges for users and administrators. Attacks on information systems continue to rise. Specifically, attacks that target user authentication are increasingly popular. These attacks are based on the common perception that traditional alphanumeric passwords are weak…
Tseng, Boo Shan; Reichhardt, Courtney; Merrihew, Gennifer E; Araujo-Hernandez, Sophia A; Harrison, Joe J; MacCoss, Michael J; Parsek, Matthew R
2018-04-10
Pseudomonas aeruginosa produces an extracellular biofilm matrix that consists of nucleic acids, exopolysaccharides, lipid vesicles, and proteins. In general, the protein component of the biofilm matrix is poorly defined and understudied relative to the other major matrix constituents. While matrix proteins have been suggested to provide many functions to the biofilm, only proteins that play a structural role have been characterized thus far. Here we identify proteins enriched in the matrix of P. aeruginosa biofilms. We then focused on a candidate matrix protein, the serine protease inhibitor ecotin (PA2755). This protein is able to inhibit neutrophil elastase, a bactericidal enzyme produced by the host immune system during P. aeruginosa biofilm infections. We show that ecotin binds to the key biofilm matrix exopolysaccharide Psl and that it can inhibit neutrophil elastase when associated with Psl. Finally, we show that ecotin protects both planktonic and biofilm P. aeruginosa cells from neutrophil elastase-mediated killing. This may represent a novel mechanism of protection for biofilms to increase their tolerance against the innate immune response. IMPORTANCE Proteins associated with the extracellular matrix of bacterial aggregates called biofilms have long been suggested to provide many important functions to the community. To date, however, only proteins that provide structural roles have been described, and few matrix-associated proteins have been identified. We developed a method to identify matrix proteins and characterized one. We show that this protein, when associated with the biofilm matrix, can inhibit a bactericidal enzyme produced by the immune system during infection and protect biofilm cells from death induced by the enzyme. This may represent a novel mechanism of protection for biofilms, further increasing their tolerance against the immune response. Together, our results are the first to show a nonstructural function for a confirmed matrix-interacting protein. Copyright © 2018 Tseng et al.
2016-08-10
enable JCS managers to detect advanced cyber attacks, mitigate the effects of those attacks, and recover their networks following an attack. It also... managers of ICS networks to Detect, Mitigate, and Recover from nation-state-level cyber attacks (strategic, deliberate, well-trained, and funded...Successful Detection of cyber anomalies is best achieved when IT and ICS managers remain in close coordination. The Integrity Checks Table
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-03-31
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-01-01
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572
If it walks like a duck: nanosensor threat assessment
NASA Astrophysics Data System (ADS)
Chachis, George C.
2003-09-01
A convergence of technologies is making deployment of unattended ground nanosensors operationally feasible in terms of energy, communications for both arbitrated and self-organizing distributed, collective behaviors. A number of nano communications technologies are already making network-centric systems possible for MicroElectrical Mechanical (MEM) sensor devices today. Similar technologies may make NanoElectrical Mechanical (NEM) sensor devices operationally feasible a few years from now. Just as organizational behaviors of large numbers of nanodevices can derive strategies from social insects and other group-oriented animals, bio-inspired heuristics for threat assessment provide a conceptual approach for successful integration of nanosensors into unattended smart sensor networks. Biological models such as the organization of social insects or the dynamics of immune systems show promise as biologically-inspired paradigms for protecting nanosensor networks for security scene analysis and battlespace awareness. The paradox of nanosensors is that the smaller the device is the more useful it is but the smaller it is the more vulnerable it is to a variety of threats. In other words simpler means networked nanosensors are more likely to fall prey to a wide-range of attacks including jamming, spoofing, Janisserian recruitment, Pied-Piper distraction, as well as typical attacks computer network security. Thus, unattended sensor technologies call for network architectures that include security and countermeasures to provide reliable scene analysis or battlespace awareness information. Such network centric architectures may well draw upon a variety of bio-inspired approaches to safeguard, validate and make sense of large quantities of information.
Babayan, Simon A; Read, Andrew F; Lawrence, Rachel A; Bain, Odile; Allen, Judith E
2010-10-19
Humans and other mammals mount vigorous immune assaults against helminth parasites, yet there are intriguing reports that the immune response can enhance rather than impair parasite development. It has been hypothesized that helminths, like many free-living organisms, should optimize their development and reproduction in response to cues predicting future life expectancy. However, immune-dependent development by helminth parasites has so far eluded such evolutionary explanation. By manipulating various arms of the immune response of experimental hosts, we show that filarial nematodes, the parasites responsible for debilitating diseases in humans like river blindness and elephantiasis, accelerate their development in response to the IL-5 driven eosinophilia they encounter when infecting a host. Consequently they produce microfilariae, their transmission stages, earlier and in greater numbers. Eosinophilia is a primary host determinant of filarial life expectancy, operating both at larval and at late adult stages in anatomically and temporally separate locations, and is implicated in vaccine-mediated protection. Filarial nematodes are therefore able to adjust their reproductive schedules in response to an environmental predictor of their probability of survival, as proposed by evolutionary theory, thereby mitigating the effects of the immune attack to which helminths are most susceptible. Enhancing protective immunity against filarial nematodes, for example through vaccination, may be less effective at reducing transmission than would be expected and may, at worst, lead to increased transmission and, hence, pathology.
Faked state attacks on realistic round robin DPS quantum key distribution systems and countermeasure
NASA Astrophysics Data System (ADS)
Iwakoshi, T.
2015-05-01
In May 2014, a new quantum key distribution protocol named "Round Robin Differential-Phase-Shift Quantum Key Distribution (RR DPS QKD)" was proposed. It has a special feature that the key consumption via privacy amplification is a small constant because RR DPS QKD guarantees its security by information causality, not by information-disturbance trade-off. Therefore, the authors claimed that RR DPS QKD systems does not need to monitor the disturbance by an attacker in the quantum channel. However, this study shows that a modified Faked-State Attack (or so-called bright illumination attack) can hack a RR DPS QKD system almost perfectly if it is implemented with realistic detectors even information-causality guarantees the security of RR DPS QKD protocol. Therefore, this study also proposes a possible Measurement-Device-Independent RR DPS QKD system to avoid the modified Faked-State Attack.
Numerical investigation on properties of attack angle for an opposing jet thermal protection system
NASA Astrophysics Data System (ADS)
Lu, Hai-Bo; Liu, Wei-Qiang
2012-08-01
The three-dimensional Navier—Stokes equation and the k-in viscous model are used to simulate the attack angle characteristics of a hemisphere nose-tip with an opposing jet thermal protection system in supersonic flow conditions. The numerical method is validated by the relevant experiment. The flow field parameters, aerodynamic forces, and surface heat flux distributions for attack angles of 0°, 2°, 5°, 7°, and 10° are obtained. The detailed numerical results show that the cruise attack angle has a great influence on the flow field parameters, aerodynamic force, and surface heat flux distribution of the supersonic vehicle nose-tip with an opposing jet thermal protection system. When the attack angle reaches 10°, the heat flux on the windward generatrix is close to the maximal heat flux on the wall surface of the nose-tip without thermal protection system, thus the thermal protection has failed.
Jäger, Kristin; Garreis, Fabian; Posa, Andreas; Dunse, Matthias; Paulsen, Friedrich P
2010-04-20
The ocular surface, constantly exposed to environmental pathogens, is particularly vulnerable to infection. Hence an advanced immune defence system is essential to protect the eye from microbial attack. Antimicrobial peptides, such as beta-defensins, are essential components of the innate immune system and are the first line of defence against invaders of the eye. High concentrations of L-arginine and L-lysine are necessary for the expression of beta-defensins. These are supplied by epithelial cells in inflammatory processes. The limiting factor for initiation of beta-defensin production is the transport of L-arginine and L-lysine into the cell. This transport is performed to 80% by only one transporter system in the human, the y(+)-transporter. This group of proteins exclusively transports the cationic amino acids L-arginine, L-lysine and L-ornithine and is also known under the term cationic amino acid transporter proteins (CAT-proteins). Various infections associated with L-arginine deficiency (for example psoriasis, keratoconjuctivitis sicca) are also associated with an increase in beta-defensin production. For the first time, preliminary work has shown the expression of human CATs in ocular surface epithelia and tissues of the lacrimal apparatus indicating their relevance for diseases of the ocular surface. In this review, we summarize current knowledge on the human CATs that appear to be integrated in causal regulation cascades of beta-defensins, thereby offering novel concepts for therapeutic perspectives. Copyright 2010 Elsevier GmbH. All rights reserved.
Chivers, Douglas P; Wisenden, Brian D; Hindman, Carrie J; Michalak, Tracy A; Kusch, Robin C; Kaminskyj, Susan G W; Jack, Kristin L; Ferrari, Maud C O; Pollock, Robyn J; Halbgewachs, Colin F; Pollock, Michael S; Alemadi, Shireen; James, Clayton T; Savaloja, Rachel K; Goater, Cameron P; Corwin, Amber; Mirza, Reehan S; Kiesecker, Joseph M; Brown, Grant E; Adrian, James C; Krone, Patrick H; Blaustein, Andrew R; Mathis, Alicia
2007-10-22
Many fishes possess specialized epidermal cells that are ruptured by the teeth of predators, thus reliably indicating the presence of an actively foraging predator. Understanding the evolution of these cells has intrigued evolutionary ecologists because the release of these alarm chemicals is not voluntary. Here, we show that predation pressure does not influence alarm cell production in fishes. Alarm cell production is stimulated by exposure to skin-penetrating pathogens (water moulds: Saprolegnia ferax and Saprolegnia parasitica), skin-penetrating parasites (larval trematodes: Teleorchis sp. and Uvulifer sp.) and correlated with exposure to UV radiation. Suppression of the immune system with environmentally relevant levels of Cd inhibits alarm cell production of fishes challenged with Saprolegnia. These data are the first evidence that alarm substance cells have an immune function against ubiquitous environmental challenges to epidermal integrity. Our results indicate that these specialized cells arose and are maintained by natural selection owing to selfish benefits unrelated to predator-prey interactions. Cell contents released when these cells are damaged in predator attacks have secondarily acquired an ecological role as alarm cues because selection favours receivers to detect and respond adaptively to public information about predation.
Regulatory principles governing Salmonella and Yersinia virulence
Erhardt, Marc; Dersch, Petra
2015-01-01
Enteric pathogens such as Salmonella and Yersinia evolved numerous strategies to survive and proliferate in different environmental reservoirs and mammalian hosts. Deciphering common and pathogen-specific principles for how these bacteria adjust and coordinate spatiotemporal expression of virulence determinants, stress adaptation, and metabolic functions is fundamental to understand microbial pathogenesis. In order to manage sudden environmental changes, attacks by the host immune systems and microbial competition, the pathogens employ a plethora of transcriptional and post-transcriptional control elements, including transcription factors, sensory and regulatory RNAs, RNAses, and proteases, to fine-tune and control complex gene regulatory networks. Many of the contributing global regulators and the molecular mechanisms of regulation are frequently conserved between Yersinia and Salmonella. However, the interplay, arrangement, and composition of the control elements vary between these closely related enteric pathogens, which generate phenotypic differences leading to distinct pathogenic properties. In this overview we present common and different regulatory networks used by Salmonella and Yersinia to coordinate the expression of crucial motility, cell adhesion and invasion determinants, immune defense strategies, and metabolic adaptation processes. We highlight evolutionary changes of the gene regulatory circuits that result in different properties of the regulatory elements and how this influences the overall outcome of the infection process. PMID:26441883
Inflamed by the flames? The impact of terrorism and war on immunity.
Canetti, Daphna; Russ, Eric; Luborsky, Judith; Gerhart, James I; Hobfoll, Stevan E
2014-06-01
The physiological impact on citizens of prolonged exposure to violence and conflict is a crucial, yet underexplored, issue within the political science and biology literature. We examined the effect of high levels of exposure to rocket and terrorist attacks on biological markers of immunity and inflammation in a sample of 92 Israelis. A stratified random sample of individuals was drawn from a pool of subjects in Israel who had previously been interviewed regarding their stress exposure and psychological distress during a period of active rocket and terrorist attacks. These individuals were reinterviewed and blood samples were collected to assess antibodies to cytomegalovirus (CMV antibodies) and C-reactive protein (CRP). Posttraumatic stress disorder (PTSD) was significantly related to CRP, β = .33, p = .034, with body mass index, depression, and exposure to terrorism included in the model. Depression scores were not significantly associated with CRP or CMV antibody levels. In contrast to the established convention that psychological distress is the sole outcome of terrorism exposure, these findings reveal that individuals exposed to terrorism experience higher levels of both PTSD/depression, and inflammation. This study has important ramifications for how policy makers and medical health professionals should formulate public health policies and medically treat individuals living in conflict zones. Copyright © 2014 International Society for Traumatic Stress Studies.
Camacho, Anton; Ballesteros, Sébastien; Graham, Andrea L.; Carrat, Fabrice; Ratmann, Oliver; Cazelles, Bernard
2011-01-01
Influenza usually spreads through the human population in multiple-wave outbreaks. Successive reinfection of individuals over a short time interval has been explicitly reported during past pandemics. However, the causes of rapid reinfection and the role of reinfection in driving multiple-wave outbreaks remain poorly understood. To investigate these issues, we focus on a two-wave influenza A/H3N2 epidemic that occurred on the remote island of Tristan da Cunha in 1971. Over 59 days, 273 (96%) of 284 islanders experienced at least one attack and 92 (32%) experienced two attacks. We formulate six mathematical models invoking a variety of antigenic and immunological reinfection mechanisms. Using a maximum-likelihood analysis to confront model predictions with the reported incidence time series, we demonstrate that only two mechanisms can be retained: some hosts with either a delayed or deficient humoral immune response to the primary influenza infection were reinfected by the same strain, thus initiating the second epidemic wave. Both mechanisms are supported by previous empirical studies and may arise from a combination of genetic and ecological causes. We advocate that a better understanding and account of heterogeneity in the human immune response are essential to analysis of multiple-wave influenza outbreaks and pandemic planning. PMID:21525058
Susceptibility of SCADA systems and the energy sector
NASA Astrophysics Data System (ADS)
Goike, Lindsay
The research in this paper focused on analyzing SCADA systems in the energy sector for susceptibility to cyber attacks, in furtherance of providing suggestions to mitigate current and future cyber attacks. The research will be addressing the questions: how are SCADA systems susceptible to cyber attacks, and what are the suggested ways to mitigate both current and future cyber attacks. The five main categories of security vulnerabilities facing current SCADA systems were found to be: connectivity to the Internet, failure to plan, interdependency of sectors, numerous different types of threats, and outdated software. Some of the recommendations mentioned to mitigate current and future risks were: virtual private networks, risk assessments, increased physical security, updating of software, and firewalls.
NASA Astrophysics Data System (ADS)
Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan
2014-10-01
In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].
NASA Astrophysics Data System (ADS)
Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu
2017-05-01
This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.
Interval forecasting of cyber-attacks on industrial control systems
NASA Astrophysics Data System (ADS)
Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.
2018-03-01
At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.
Analysis of brute-force break-ins of a palmprint authentication system.
Kong, Adams W K; Zhang, David; Kamel, Mohamed
2006-10-01
Biometric authentication systems are widely applied because they offer inherent advantages over classical knowledge-based and token-based personal-identification approaches. This has led to the development of products using palmprints as biometric traits and their use in several real applications. However, as biometric systems are vulnerable to replay, database, and brute-force attacks, such potential attacks must be analyzed before biometric systems are massively deployed in security systems. This correspondence proposes a projected multinomial distribution for studying the probability of successfully using brute-force attacks to break into a palmprint system. To validate the proposed model, we have conducted a simulation. Its results demonstrate that the proposed model can accurately estimate the probability. The proposed model indicates that it is computationally infeasible to break into the palmprint system using brute-force attacks.
Modeling and Managing Risk in Billing Infrastructures
NASA Astrophysics Data System (ADS)
Baiardi, Fabrizio; Telmon, Claudio; Sgandurra, Daniele
This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded - thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components.
NASA Astrophysics Data System (ADS)
Atta Yaseen, Amer; Bayart, Mireille
2017-01-01
In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.
Analysis of Network Vulnerability Under Joint Node and Link Attacks
NASA Astrophysics Data System (ADS)
Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting
2018-03-01
The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept
NASA Astrophysics Data System (ADS)
Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto
We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system's critical states. Furthermore, we detail the implementation and provide experimental comparative results.
Coherent attacking continuous-variable quantum key distribution with entanglement in the middle
NASA Astrophysics Data System (ADS)
Zhang, Zhaoyuan; Shi, Ronghua; Zeng, Guihua; Guo, Ying
2018-06-01
We suggest an approach on the coherent attack of continuous-variable quantum key distribution (CVQKD) with an untrusted entangled source in the middle. The coherent attack strategy can be performed on the double links of quantum system, enabling the eavesdropper to steal more information from the proposed scheme using the entanglement correlation. Numeric simulation results show the improved performance of the attacked CVQKD system in terms of the derived secret key rate with the controllable parameters maximizing the stolen information.
NASA Astrophysics Data System (ADS)
Hu, Haibin
2017-05-01
Among numerous WEB security issues, SQL injection is the most notable and dangerous. In this study, characteristics and procedures of SQL injection are analyzed, and the method for detecting the SQL injection attack is illustrated. The defense resistance and remedy model of SQL injection attack is established from the perspective of non-intrusive SQL injection attack and defense. Moreover, the ability of resisting the SQL injection attack of the server has been comprehensively improved through the security strategies on operation system, IIS and database, etc.. Corresponding codes are realized. The method is well applied in the actual projects.
Hofman, Zonne L M; Relan, Anurag; Zeerleder, Sacha; Drouet, Christian; Zuraw, Bruce; Hack, C Erik
2016-08-01
Hereditary angioedema (HAE) caused by a deficiency of functional C1-inhibitor (C1INH) becomes clinically manifest as attacks of angioedema. C1INH is the main inhibitor of the contact system. Poor control of a local activation process of this system at the site of the attack is believed to lead to the formation of bradykinin (BK), which increases local vasopermeability and mediates angioedema on interaction with BK receptor 2 on the endothelium. However, several observations in patients with HAE are difficult to explain from a pathogenic model claiming a local activation process at the site of the angioedema attack. Therefore we postulate an alternative model for angioedema attacks in patients with HAE, which assumes a systemic, fluid-phase activation of the contact system to generate BK and its breakdown products. Interaction of these peptides with endothelial receptors that are locally expressed in the affected tissues rather than with receptors constitutively expressed by the endothelium throughout the whole body explains that such a systemic activation process results in local manifestations of an attack. In particular, BK receptor 1, which is induced on the endothelium by inflammatory stimuli, such as kinins and cytokines, meets the specifications of the involved receptor. The pathogenic model discussed here also provides an explanation for why angioedema can occur at multiple sites during an attack and why HAE attacks respond well to modest increases of circulating C1INH activity levels because inhibition of fluid-phase Factor XIIa and kallikrein requires lower C1INH levels than inhibition of activator-bound factors. Copyright © 2016 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.
Garcia, Patrick Vianna; Apolinário, Letícia Montanholi; Böckelmann, Petra Karla; Nunes, Iseu da Silva; Duran, Nelson; Fávaro, Wagner José
2015-01-01
The present study describes the role of the ubiquitin ligase Siah-2 and corepressor N-CoR in controlling androgen receptor (AR) and estrogen receptors (ERα and ERβ) signaling in an appropriate animal model (Fischer 344 female rats) of non-muscle invasive bladder cancer (NMIBC), especially under conditions of anti-androgen therapy with flutamide. Furthermore, this study describes the mechanisms of a promising therapeutic alternative for NMIBC based on Protein aggregate magnesium-ammonium phospholinoleate-palmitoleate anhydride (P-MAPA) intravesical immunotherapy combined with flutamide, involving the interaction among steroid hormone receptors, their regulators and Toll-like receptors (TLRs). Our results demonstrated that increased Siah-2 and AR protein levels and decreased N-CoR, cytochrome P450 (CYP450) and estrogen receptors levels played a critical role in the urothelial carcinogenesis, probably leading to escape of urothelial cancer cells from immune system attack. P-MAPA immunotherapy led to distinct activation of innate immune system TLRs 2 and 4-mediated, resulting in increase of interferon signaling pathway, which was more effective in recovering the immunosuppressive tumor immune microenvironment and in recovering the bladder histology features than BCG (Bacillus Calmette-Guerin) treatments. The AR blockade therapy was important in the modulating of downstream molecules of TLR2 and TLR4 signaling pathway, decreasing the inflammatory cytokines signaling and enhancing the interferon signaling pathway when associated with P-MAPA. Taken together, the data obtained suggest that interferon signaling pathway activation and targeting AR and Siah-2 signals by P-MAPA intravesical immunotherapy alone and/ or in combination with AR blockade may provide novel therapeutic approaches for NMIBC. PMID:26191134
Garcia, Patrick Vianna; Apolinário, Letícia Montanholi; Böckelmann, Petra Karla; da Silva Nunes, Iseu; Duran, Nelson; Fávaro, Wagner José
2015-01-01
The present study describes the role of the ubiquitin ligase Siah-2 and corepressor N-CoR in controlling androgen receptor (AR) and estrogen receptors (ERα and ERβ) signaling in an appropriate animal model (Fischer 344 female rats) of non-muscle invasive bladder cancer (NMIBC), especially under conditions of anti-androgen therapy with flutamide. Furthermore, this study describes the mechanisms of a promising therapeutic alternative for NMIBC based on Protein aggregate magnesium-ammonium phospholinoleate-palmitoleate anhydride (P-MAPA) intravesical immunotherapy combined with flutamide, involving the interaction among steroid hormone receptors, their regulators and Toll-like receptors (TLRs). Our results demonstrated that increased Siah-2 and AR protein levels and decreased N-CoR, cytochrome P450 (CYP450) and estrogen receptors levels played a critical role in the urothelial carcinogenesis, probably leading to escape of urothelial cancer cells from immune system attack. P-MAPA immunotherapy led to distinct activation of innate immune system TLRs 2 and 4-mediated, resulting in increase of interferon signaling pathway, which was more effective in recovering the immunosuppressive tumor immune microenvironment and in recovering the bladder histology features than BCG (Bacillus Calmette-Guerin) treatments. The AR blockade therapy was important in the modulating of downstream molecules of TLR2 and TLR4 signaling pathway, decreasing the inflammatory cytokines signaling and enhancing the interferon signaling pathway when associated with P-MAPA. Taken together, the data obtained suggest that interferon signaling pathway activation and targeting AR and Siah-2 signals by P-MAPA intravesical immunotherapy alone and/ or in combination with AR blockade may provide novel therapeutic approaches for NMIBC.
Mushtaq, Naseem; Redpath, Maria B; Luzio, J Paul; Taylor, Peter W
2004-05-01
Escherichia coli is a common cause of meningitis and sepsis in the newborn infant, and the large majority of isolates from these infections produce a polysialic acid (PSA) capsular polysaccharide, the K1 antigen, that protects the bacterial cell from immune attack. We determined whether a capsule-depolymerizing enzyme, by removing this protective barrier, could alter the outcome of systemic infection in an animal model. Bacteriophage-derived endosialidase E (endoE) selectively degrades the PSA capsule on the surface of E. coli K1 strains. Intraperitoneal administration of small quantities of recombinant endoE (20 micro g) to 3-day-old rats, colonized with a virulent strain of K1, prevented bacteremia and death from systemic infection. The enzyme had no effect on the viability of E. coli strains but sensitized strains expressing PSA to killing by the complement system. This study demonstrates the potential therapeutic efficacy of agents that cure infections by modification of the bacterial phenotype rather than by killing or inhibition of growth of the pathogen.
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong
2015-11-01
The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.
Heat Shock Proteins: A Review of the Molecular Chaperones for Plant Immunity.
Park, Chang-Jin; Seo, Young-Su
2015-12-01
As sessile organisms, plants are exposed to persistently changing stresses and have to be able to interpret and respond to them. The stresses, drought, salinity, chemicals, cold and hot temperatures, and various pathogen attacks have interconnected effects on plants, resulting in the disruption of protein homeostasis. Maintenance of proteins in their functional native conformations and preventing aggregation of non-native proteins are important for cell survival under stress. Heat shock proteins (HSPs) functioning as molecular chaperones are the key components responsible for protein folding, assembly, translocation, and degradation under stress conditions and in many normal cellular processes. Plants respond to pathogen invasion using two different innate immune responses mediated by pattern recognition receptors (PRRs) or resistance (R) proteins. HSPs play an indispensable role as molecular chaperones in the quality control of plasma membrane-resident PRRs and intracellular R proteins against potential invaders. Here, we specifically discuss the functional involvement of cytosolic and endoplasmic reticulum (ER) HSPs/chaperones in plant immunity to obtain an integrated understanding of the immune responses in plant cells.
Squeglia, Flavia; Berisio, Rita; Shibuya, Naoto; Kaku, Hanae
2017-11-24
Pattern recognition receptors on the plant cell surface mediate the recognition of microbe-associated molecular patterns, in a process which activates downstream immune signaling. These receptors are plasma membrane-localized kinases which need to be autophosphorylated to activate downstream responses. Perception of attacks from fungi occurs through recognition of chitin, a polymer of an N-acetylglucosamine which is a characteristic component of the cell walls of fungi. This process is regulated in Arabidopsis by chitin elicitor receptor kinase CERK1. A more complex process characterizes rice, in which regulation of chitin perception is operated by a complex composed of OsCERK1, a homolog of CERK1, and the chitin elicitor binding protein OsCEBiP. Recent literature has provided a mechanistic description of the complex regulation of activation of innate immunity in rice and an advance in the structural description of molecular players involved in this process. This review describes the current status of the understanding of molecular events involved in innate immunity activation in rice. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.
Meng, Lingjie; Du, Yishuai; Liu, Pengfei; Li, Xian; Liu, Ying
2017-05-01
Quorum sensing is a bacterial density dependent communication system, which regarded to regulate co-operative behaviors of community and mediated by extracellular signal molecules named autoinducers (AI). Among various signals, autoinducer-2 (AI-2) is believed to be the messengers inter species and produced by LuxS. For Aeromonas salmonicida (A. salmonicida), an opportunistic pathogen to many cold-water teleost, little information has been known about the function of AI-2 and LuxS. Therefore, our aim was to preliminarily clarify the function of LuxS in A. salmonicida. The consequences demonstrated that wild type A. salmonicida exhibited AI-2 activity and luxS defective mutant strain fail to produce AI-2 signals. Furthermore, it was suggested that luxS deficiency could impact bacterial morphology, surface properties and virulence dramatically. Challenge experiment showed a tendency that immune factors expressed earlier when Atlantic salmon was infected with ΔluxS strain. Overall, we hypothesis that AI-2 quorum sensing could regulate the expression of A-layer protein coding gene vapA, and then influence bacterial survival ability when suffered from attack of the host immune system. Though additional studies are warranted, our study will supply a new thinking to control the damage caused by A. salmonicida. Copyright © 2017 Elsevier Ltd. All rights reserved.
Yau, Wei-Chuen; Phan, Raphael C-W
2013-12-01
Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
Metrics for Assessment of Smart Grid Data Integrity Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Miles McQueen; Russell Bent
2012-07-01
There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less
Dopaminergic regulation of sleep and cataplexy in a murine model of narcolepsy.
Burgess, Christian R; Tse, Gavin; Gillis, Lauren; Peever, John H
2010-10-01
To determine if the dopaminergic system modulates cataplexy, sleep attacks and sleep-wake behavior in narcoleptic mice. Hypocretin/orexin knockout (i.e., narcoleptic) and wild-type mice were administered amphetamine and specific dopamine receptor modulators to determine their effects on sleep, cataplexy and sleep attacks. Hypocretin knockout (n = 17) and wild-type mice (n = 21). Cataplexy, sleep attacks and sleep-wake behavior were identified using electroencephalogram, electromyogram and videography. These behaviors were monitored for 4 hours after an i.p. injection of saline, amphetamine and specific dopamine receptor modulators (D1- and D2-like receptor modulators). Amphetamine (2 mg/kg), which increases brain dopamine levels, decreased sleep attacks and cataplexy by 61% and 67%, suggesting that dopamine transmission modulates such behaviors. Dopamine receptor modulation also had powerful effects on sleep attacks and cataplexy. Activation (SKF 38393; 20 mg/kg) and blockade (SCH 23390; 1 mg/kg) of D1-like receptors decreased and increased sleep attacks by 77% and 88%, without affecting cataplexy. Pharmacological activation of D2-like receptors (quinpirole; 0.5 mg/kg) increased cataplectic attacks by 172% and blockade of these receptors (eticlopride; 1 mg/kg) potently suppressed them by 97%. Manipulation of D2-like receptors did not affect sleep attacks. We show that the dopaminergic system plays a role in regulating both cataplexy and sleep attacks in narcoleptic mice. We found that cataplexy is modulated by a D2-like receptor mechanism, whereas dopamine modulates sleep attacks by a D1-like receptor mechanism. These results support a role for the dopamine system in regulating sleep attacks and cataplexy in a murine model of narcolepsy.
Arikoglu, Tugba; Kuyucu, Semanur; Karaismailoglu, Eda; Batmaz, Sehra Birgul; Balci, Senay
2015-01-01
Recent evidence about the various effects of vitamin D (vit D) on innate and adaptive immunity has led to a search for the role of vit D in asthma. It is postulated that a decrease in cathelicidin, a multifunctional host defense molecule, production due to low vit D status may predispose to infectious complications in children with asthma. The aim of this study was to determine the association of vit D, vit D-binding protein (VDBP) and cathelicidin with acute asthma attacks among children with allergic asthma. This prospective study included 35 patients with acute asthma attack and 32 children with controlled asthma, and all were matched by sampling season, sensitization to mites, and previous severity of asthma. A comprehensive questionnaire about risk factors, blood sampling for 25-hydroxyvitamin D vit D, VDBP, and cathelicidin levels; spirometric indices were used. Factors that influence serum vit D and cathelicidin levels and the development of asthma attacks were evaluated with multivariate analysis. The mean serum vit D levels of the attack group was significantly lower than that of the controlled asthma group (p < 0.001). The mean cathelicidin level was significantly higher in the acute asthma group than with the controlled subjects with asthma (p = 0.002). There was no difference between the acute and controlled asthma groups in terms of markers of allergy and serum VDBP levels. Risk factors that may influence vit D levels revealed that body mass index (BMI) (p = 0.038), duration of sun exposure (p < 0.001), and amount of dietary vit D (p < 0.001) independently affected serum vit D levels. Risk factors that may result in acute asthma showed that low serum levels of vit D were significantly related to the risk of asthma attacks (p < 0.001, adjusted odds ratio 16.11). Cathelicidin levels showed a significant positive association with asthma attacks and BMI. Vit D deficiency showed a significant relationship to the development of asthma attacks independent of cathelicidin deficiency and other factors associated with the severity of chronic asthma.
Evans, Robert G.
2015-01-01
Immunizing against influenza is tricky; against measles is not. Influenza comes in many constantly evolving strains, but one measles shot in childhood confers lifelong immunity. Unlike the flu, measles was wiped out. Its return represents an outbreak not of disease, but of stupidity. The matrix of stupidity is, however, reinforced by strong strands of malice, as when Andrew Wakefield's fraudulent 1998 paper linked the MMR vaccine to autism. The fraud was unmasked and the vaccine–autism link disproven, but the evil influence continues. Measles offers an illustration of Virchow's insights that medicine is a social science and that politics is medicine writ large. It is this “inconvenient truth” that is being suppressed by muzzling the Chief Public Health Officer (CPHO) and attacking public health for addressing “social determinants.” PMID:25947030
Pegylated interferon de novo-induce autoimmune haemolytic anaemia in chronic hepatitis C patient.
Said, Ashraf; Elbahrawy, Ashraf; Alfiomy, Mohamed; Abdellah, Mohamed; Shahat, Khaled; Salah, Mohamed; Mostafa, Sadek; Elwassief, Ahmed; Aboelfotoh, Attef; Abdelhafeez, Hafez; El-Sherif, Assem
2011-08-11
A 55-year-old Egyptian woman with chronic hepatitis C undergoing treatment with pegylated interferon (Peg-IFN) alfa-2a plus ribavirin was referred to our hospital on November 2010 with prolonged easy fatigability and an attack of syncope; she had no prior history of autoimmune disorders or allergy. Laboratory investigations documented the presence of Peg-IFN induced autoimmune haemolytic anaemia and autoimmune thyroiditis. Intravenous γ globulin (IVGG) failed to correct the autoimmune process; on the other hand steroid therapy dramatically corrected both haematological and thyroid values, and step down the immune process. Our report indicated that Peg-IFN de novo-induce autoimmune haemolysis, documenting a previous report. IVGG failed to step down the immune process in our case.
Pegylated interferon de novo-induce autoimmune haemolytic anaemia in chronic hepatitis C patient
Said, Ashraf; Elbahrawy, Ashraf; Alfiomy, Mohamed; Abdellah, Mohamed; Shahat, Khaled; Salah, Mohamed; Mostafa, Sadek; Elwassief, Ahmed; Aboelfotoh, Attef; Abdelhafeez, Hafez; El-Sherif, Assem
2011-01-01
A 55-year-old Egyptian woman with chronic hepatitis C undergoing treatment with pegylated interferon (Peg-IFN) alfa-2a plus ribavirin was referred to our hospital on November 2010 with prolonged easy fatigability and an attack of syncope; she had no prior history of autoimmune disorders or allergy. Laboratory investigations documented the presence of Peg-IFN induced autoimmune haemolytic anaemia and autoimmune thyroiditis. Intravenous γ globulin (IVGG) failed to correct the autoimmune process; on the other hand steroid therapy dramatically corrected both haematological and thyroid values, and step down the immune process. Our report indicated that Peg-IFN de novo-induce autoimmune haemolysis, documenting a previous report. IVGG failed to step down the immune process in our case. PMID:22688484
Cao, Lei; Mao, Fengfeng; Pang, Zheng; Yi, Yao; Qiu, Feng; Tian, Ruiguang; Meng, Qingling; Jia, Zhiyuan; Bi, Shengli
2015-08-01
Enterovirus-71 (EV71) is a viral pathogen that causes severe cases of hand, foot and mouth disease (HFMD) among young children, with significant mortality. Effective vaccines against HFMD are urgently required. Several EV71 virus-like particle (VLP) vaccine candidates were found to be protective in the neonatal mouse EV71 challenge model. However, to what extent the VLP vaccine protects susceptible organs against EV71 infection in vivo has remained elusive. In the present study, the comprehensive immunogenicity of a potential EV71 vaccine candidate based on VLPs was evaluated in a neonatal mouse model. Despite lower levels of neutralizing antibodies to EV71 in the sera of VLP-immunized mice compared with those in mice vaccinated with inactivated EV71, the VLP-based vaccine was shown to be able to induce immunoglobulin (Ig)G and IgA memory-associated cellular immune responses to EV71. Of note, the EV71 VLP vaccine candidate was capable of inhibiting viral proliferation in cardiac muscle, skeletal muscle, lung and intestine of immunized mice and provided effective protection against the pathological damage caused by viral attack. In particular, the VLP vaccine was able to inhibit the transportation of EV71 from the central nervous system to the muscle tissue and greatly protected muscle tissue from infection, along with recovery from the viral infection. This led to nearly 100% immunoprotective efficacy, enabling neonatal mice delivered by VLP-immunized female adult mice to survive and grow with good health. The present study provided valuable additional knowledge of the specific protective efficacy of the EV71 VLP vaccine in vivo, which also indicated that it is a promising potential candidate for being developed into an EV71 vaccine.
Lech, Patrycja J.; Tobin, Gregory J.; Bushnell, Ruth; Gutschenritter, Emily; Pham, Linh D.; Nace, Rebecca; Verhoeyen, Els; Cosset, François-Loïc; Muller, Claude P.; Russell, Stephen J.; Nara, Peter L.
2013-01-01
The measles virus (MV) is serologically monotypic. Life-long immunity is conferred by a single attack of measles or following vaccination with the MV vaccine. This is contrary to viruses such as influenza, which readily develop resistance to the immune system and recur. A better understanding of factors that restrain MV to one serotype may allow us to predict if MV will remain monotypic in the future and influence the design of novel MV vaccines and therapeutics. MV hemagglutinin (H) glycoprotein, binds to cellular receptors and subsequently triggers the fusion (F) glycoprotein to fuse the virus into the cell. H is also the major target for neutralizing antibodies. To explore if MV remains monotypic due to a lack of plasticity of the H glycoprotein, we used the technology of Immune Dampening to generate viruses with rationally designed N-linked glycosylation sites and mutations in different epitopes and screened for viruses that escaped monoclonal antibodies (mAbs). We then combined rationally designed mutations with naturally selected mutations to generate a virus resistant to a cocktail of neutralizing mAbs targeting four different epitopes simultaneously. Two epitopes were protected by engineered N-linked glycosylations and two epitopes acquired escape mutations via two consecutive rounds of artificial selection in the presence of mAbs. Three of these epitopes were targeted by mAbs known to interfere with receptor binding. Results demonstrate that, within the epitopes analyzed, H can tolerate mutations in different residues and additional N-linked glycosylations to escape mAbs. Understanding the degree of change that H can tolerate is important as we follow its evolution in a host whose immunity is vaccine induced by genotype A strains instead of multiple genetically distinct wild-type MVs. PMID:23300970
Natural Killer Cells in Antifungal Immunity.
Schmidt, Stanislaw; Tramsen, Lars; Lehrnbecher, Thomas
2017-01-01
Invasive fungal infections are still an important cause of morbidity and mortality in immunocompromised patients such as patients suffering from hematological malignancies or patients undergoing hematopoietic stem cell transplantion. In addition, other populations such as human immunodeficiency virus-patients are at higher risk for invasive fungal infection. Despite the availability of new antifungal compounds and better supportive care measures, the fatality rate of invasive fungal infection remained unacceptably high. It is therefore of major interest to improve our understanding of the host-pathogen interaction to develop new therapeutic approaches such as adoptive immunotherapy. As experimental methodologies have improved and we now better understand the complex network of the immune system, the insight in the interaction of the host with the fungus has significantly increased. It has become clear that host resistance to fungal infections is not only associated with strong innate immunity but that adaptive immunity (e.g., T cells) also plays an important role. The antifungal activity of natural killer (NK) cells has been underestimated for a long time. In vitro studies demonstrated that NK cells from murine and human origin are able to attack fungi of different genera and species. NK cells exhibit not only a direct antifungal activity via cytotoxic molecules but also an indirect antifungal activity via cytokines. However, it has been show that fungi exert immunosuppressive effects on NK cells. Whereas clinical data are scarce, animal models have clearly demonstrated that NK cells play an important role in the host response against invasive fungal infections. In this review, we summarize clinical data as well as results from in vitro and animal studies on the impact of NK cells on fungal pathogens.
Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hartman, Steven M
2012-01-01
Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both ofmore » these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.« less
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
NASA Astrophysics Data System (ADS)
Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu
Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.
A Common Fold Mediates Vertebrate Defense and Bacterial Attack
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rosado, Carlos J.; Buckle, Ashley M.; Law, Ruby H.P.
2008-10-02
Proteins containing membrane attack complex/perforin (MACPF) domains play important roles in vertebrate immunity, embryonic development, and neural-cell migration. In vertebrates, the ninth component of complement and perforin form oligomeric pores that lyse bacteria and kill virus-infected cells, respectively. However, the mechanism of MACPF function is unknown. We determined the crystal structure of a bacterial MACPF protein, Plu-MACPF from Photorhabdus luminescens, to 2.0 angstrom resolution. The MACPF domain reveals structural similarity with poreforming cholesterol-dependent cytolysins (CDCs) from Gram-positive bacteria. This suggests that lytic MACPF proteins may use a CDC-like mechanism to form pores and disrupt cell membranes. Sequence similarity between bacterialmore » and vertebrate MACPF domains suggests that the fold of the CDCs, a family of proteins important for bacterial pathogenesis, is probably used by vertebrates for defense against infection.« less
Dyck, Peter J; Taylor, Bruce V; Davies, Jenny L; Mauermann, Michelle L; Litchy, William J; Klein, Christopher J; Dyck, P James B
2015-10-01
Intravenous immunoglobulin [IVIg], plasma exchange [PE], and corticosteroids are efficacious treatment in chronic inflammatory demyelinating polyneuropathy [CIDP]. IVIg is effective in multifocal motor neuropathy [MMN]. NIS, NIS-weakness, sum scores of raw amplitudes of motor fiber (CMAPs) amplitudes, and Dyck/Rankin score provided reliable measures to detect and scale abnormality and reflect change; they are therefore ideal for office management of response-based immunotherapy (R-IRx) of CIDP. Using efficacious R-IRx, a large early and late therapeutic response (≥ one-fourth were in remission or had recovered) was demonstrated in CIDP. In MMN only an early improvement with late non-significant worsening was observed. The difference in immunotherapy response supports a fundamental difference between CIDP (immune attack on Schwann cells and myelin) and MMN (attack on nodes of Ranvier and axons). © 2015 Wiley Periodicals, Inc.
Dyck, Peter J.; Taylor, Bruce V.; Davies, Jenny L.; Mauermann, Michelle L.; Litchy, William J.; Klein, Christopher J.; Dyck, P. James B.
2015-01-01
Background Intravenous immunoglobulin [IVIg], plasma exchange [PE], and corticosteroids are efficacious treatment in chronic inflammatory demyelinating polyneuropathy [CIDP]. IVIg is effective in multifocal motor neuropathy [MMN]. Objective and Methods Results and Conclusions NIS, NIS-weakness, sum scores of raw amplitudes of motor fiber (CMAPs) amplitudes, and Dyck/Rankin score provided reliable measures to detect and scale abnormality and reflect change; they are therefore ideal for office management of response-basedimmunotherapy (R-IRx) of CIDP. Using efficacious R-IRx, a large early and late therapeutic response (≥ one-fourth were in remission or had recovered) was demonstrated in CIDP. In MMN only an early improvement with late non-significant worsening was observed. The difference in immunotherapy response supports a fundamental difference between CIDP (immune attack on Schwann cells and myelin) and MMN (attack on nodes of Ranvier and axons). PMID:25976871
DOE Office of Scientific and Technical Information (OSTI.GOV)
John Homer; Ashok Varikuti; Xinming Ou
Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability ofmore » the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.« less
Dong, Yimeng; Gupta, Nirupam; Chopra, Nikhil
2016-11-01
In this paper, vulnerability of a distributed consensus seeking multi-agent system (MAS) with double-integrator dynamics against edge-bound content modification cyber attacks is studied. In particular, we define a specific edge-bound content modification cyber attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Properties of MCoMA are utilized to design detection and mitigation algorithms so as to impart resilience in the considered MAS against MCoMA. Additionally, the proposed detection mechanism is extended to detect the general edge-bound content modification attacks (not just MCoMA). Finally, the efficacies of the proposed results are illustrated through numerical simulations.
Content modification attacks on consensus seeking multi-agent system with double-integrator dynamics
NASA Astrophysics Data System (ADS)
Dong, Yimeng; Gupta, Nirupam; Chopra, Nikhil
2016-11-01
In this paper, vulnerability of a distributed consensus seeking multi-agent system (MAS) with double-integrator dynamics against edge-bound content modification cyber attacks is studied. In particular, we define a specific edge-bound content modification cyber attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Properties of MCoMA are utilized to design detection and mitigation algorithms so as to impart resilience in the considered MAS against MCoMA. Additionally, the proposed detection mechanism is extended to detect the general edge-bound content modification attacks (not just MCoMA). Finally, the efficacies of the proposed results are illustrated through numerical simulations.
Human Capital Development - Resilient Cyber Physical Systems
2017-09-29
Human Capital Development – Resilient Cyber Physical Systems Technical Report SERC-2017-TR-113 September 29, 2017 Principal Investigator...4.2.2 Cyber Attack Taxonomy for Cyber Physical Systems .............................................................................. 43 4.2.3...Cyber- physical System Attack Taxonomy ................................................................................................ 44 4.2.4
[Dermatological features of auto-inflammatory recurrent fevers].
Escudier, A; Mauvais, F-X; Bastard, P; Boussard, C; Jaoui, A; Koskas, V; Lecoq, E; Michel, A; Orcel, M-C; Truelle, P-E; Wohrer, D; Piram, M
2018-02-01
Auto-inflammatory diseases are characterized by unexplained and recurrent attacks of systemic inflammation often involving the skin, joints, or serosal membranes. They are due to a dysfunction or dysregulation of the innate immunity, which is the first line of defense against pathogens. Early recognition of these diseases by the clinician, especially by pediatricians encountering such pathologies in pediatric patients, is primordial to avoid complications. Skin manifestations, common in most auto-inflammatory diseases, are helpful for prompt diagnosis. After a brief physiopathological review, we will describe auto-inflammatory recurrent fevers by their main dermatological presentations: urticarial lesions, neutrophilic dermatoses, panniculitis, other maculopapular eruptions, dyskeratosis, skin vasculitis, and oral aphthous. We finally suggest a decision tree to help clinicians better target genetic exams in patients with recurrent fevers and dermatological manifestations. Copyright © 2017 Elsevier Masson SAS. All rights reserved.
Kisker, Oliver; Onizuka, Shinya; Becker, Christian M; Fannon, Michael; Flynn, Evelyn; D'Amato, Robert; Zetter, Bruce; Folkman, Judah; Ray, Rahul; Swamy, Narasimha; Pirie-Shepherd, Steven
2003-01-01
We have isolated a selectively deglycosylated form of vitamin D binding protein (DBP-maf) generated from systemically available DBP by a human pancreatic cancer cell line. DBP-maf is antiproliferative for endothelial cells and antiangiogenic in the chorioallantoic membrane assay. DBP-maf administered daily was able to potently inhibit the growth of human pancreatic cancer in immune compromised mice (T/C=0.09). At higher doses, DBP-maf caused tumor regression. Histological examination revealed that treated tumors had a higher number of infiltrating macrophages as well as reduced microvessel density, and increased levels of apoptosis relative to untreated tumors. Taken together, these data suggest that DBP-maf is an antiangiogenic molecule that can act directly on endothelium as well as stimulate macrophages to attack both the endothelial and tumor cell compartment of a growing malignancy.
Entanglement swapping with independent sources over an optical-fiber network
NASA Astrophysics Data System (ADS)
Sun, Qi-Chao; Mao, Ya-Li; Jiang, Yang-Fan; Zhao, Qi; Chen, Si-Jing; Zhang, Wei; Zhang, Wei-Jun; Jiang, Xiao; Chen, Teng-Yun; You, Li-Xing; Li, Li; Huang, Yi-Dong; Chen, Xian-Feng; Wang, Zhen; Ma, Xiongfeng; Zhang, Qiang; Pan, Jian-Wei
2017-03-01
Establishing entanglement between two remote systems by the method of entanglement swapping is an essential step for a long-distance quantum network. Here we report a field-test entanglement swapping experiment with two independent telecommunication band entangled photon-pair sources over an optical fiber network in Hefei. The two sources are located at two nodes that are 12.5 km apart and the Bell-state measurement is performed at a third location which is connected to the two source nodes with 14.7-km and 10.6-km optical fibers, respectively. The observed average visibility is 79.9 ±4.8 % , which is sufficient for the violation of Bell inequalities. Furthermore, with the swapped entanglement, we demonstrate a source-independent quantum key distribution, which is also immune to any detection attacks at the measurement site.
Molecular pathogenesis of emphysema
Taraseviciene-Stewart, Laimute; Voelkel, Norbert F.
2008-01-01
Emphysema is one manifestation of a group of chronic, obstructive, and frequently progressive destructive lung diseases. Cigarette smoking and air pollution are the main causes of emphysema in humans, and cigarette smoking causes emphysema in rodents. This review examines the concept of a homeostatically active lung structure maintenance program that, when attacked by proteases and oxidants, leads to the loss of alveolar septal cells and airspace enlargement. Inflammatory and noninflammatory mechanisms of disease pathogenesis, as well as the role of the innate and adaptive immune systems, are being explored in genetically altered animals and in exposure models of this disease. These recent scientific advances support a model whereby alveolar destruction resulting from a coalescence of mechanical forces, such as hyperinflation, and more recently recognized cellular and molecular events, including apoptosis, cellular senescence, and failed lung tissue repair, produces the clinically recognized syndrome of emphysema. PMID:18246188
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.
Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
2017-03-31
This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less
Stem-Like Memory T Cells Are Discovered | Center for Cancer Research
T cells are the white blood cells that are the body’s first line of attack against foreign invaders. When designing immunotherapies to treat cancer the goal is to prolong the immune response of T cells a bit beyond what the body normally does when a bacterium or a virus is encountered. Nicholas P. Restifo, M.D., working with Luca Gattinoni, M.D., and other colleagues in
Expert Planning Processes in Writing
1990-12-17
For example, here are some target ideas from the immunity text: " protozoa attack red blood cells " agglutin clumps pathogens together * vaccination ...majors may have already understood (e.g., vaccination is an injection of a virus), we conducted a second analysis scoring only for the "hard" concepts...page texts, a clear and an unclear version on each of two topics, autism and statistics. The clear autism and the unclear statistics texts were
te Beest, Dennis E.; Birrell, Paul J; Wallinga, Jacco; De Angelis, Daniela; van Boven, Michiel
2015-01-01
Obtaining a quantitative understanding of the transmission dynamics of influenza A is important for predicting healthcare demand and assessing the likely impact of intervention measures. The pandemic of 2009 provides an ideal platform for developing integrative analyses as it has been studied intensively, and a wealth of data sources is available. Here, we analyse two complementary datasets in a disease transmission framework: cross-sectional serological surveys providing data on infection attack rates, and hospitalization data that convey information on the timing and duration of the pandemic. We estimate key epidemic determinants such as infection and hospitalization rates, and the impact of a school holiday. In contrast to previous approaches, our novel modelling of serological data with mixture distributions provides a probabilistic classification of individual samples (susceptible, immune and infected), propagating classification uncertainties to the transmission model and enabling serological classifications to be informed by hospitalization data. The analyses show that high levels of immunity among persons 20 years and older provide a consistent explanation of the skewed attack rates observed during the pandemic and yield precise estimates of the probability of hospitalization per infection (1–4 years: 0.00096 (95%CrI: 0.00078–0.0012); 5–19 years: 0.00036 (0.00031–0.0044); 20–64 years: 0.0015 (0.00091–0.0020); 65+ years: 0.0084 (0.0028–0.016)). The analyses suggest that in The Netherlands, the school holiday period reduced the number of infectious contacts between 5- and 9-year-old children substantially (estimated reduction: 54%; 95%CrI: 29–82%), thereby delaying the unfolding of the pandemic in The Netherlands by approximately a week. PMID:25540241
Mandai, Masaki; Hamanishi, Junzo; Abiko, Kaoru; Matsumura, Noriomi; Baba, Tsukasa; Konishi, Ikuo
2016-05-15
IFNγ is a cytokine that plays a pivotal role in antitumor host immunity. IFNγ elicits potent antitumor immunity by inducing Th1 polarization, CTL activation, and dendritic cell tumoricidal activity. However, there are significant discrepancies in our understanding of the role of IFNγ as an antitumor cytokine. In certain circumstances, IFNγ obviously acts to induce tumor progression. IFNγ treatment has negatively affected patient outcomes in some clinical trials, while it has favorably affected outcomes in other trials. Several mechanisms, including IFNγ insensitivity and the downregulation of the MHC complex, have been regarded as the reasons for this discrepancy, but they do not fully explain it. We propose IFNγ-induced programmed cell death 1 ligand 1 (PD-L1) expression as a novel mechanism by which IFNγ impairs tumor immunity. When tumor cells encounter CTLs in the local environment, they detect them via the high concentration of IFNγ secreted from CTLs, which induces PD-L1 expression in preparation for an immune attack. Thus, tumor cells acquire the capability to counterattack immune cells. These findings indicate that although IFNγ is thought to be a representative antitumor cytokine, it actually has dual roles: one as a hallmark of antitumor immunity and the other as an inducer of the immune escape phenomenon through various mechanisms, such as PD-L1 expression. In this context, the optimization of immunotherapy according to the local immune environment is important. Anti-PD-1/PD-L1 treatment may be particularly promising when efficient tumor immunity is present, but it is disturbed by PD-L1 expression. Clin Cancer Res; 22(10); 2329-34. ©2016 AACR. ©2016 American Association for Cancer Research.
The Security of Machine Learning
2008-04-24
Machine learning has become a fundamental tool for computer security, since it can rapidly evolve to changing and complex situations. That...adaptability is also a vulnerability: attackers can exploit machine learning systems. We present a taxonomy identifying and analyzing attacks against machine ...We use our framework to survey and analyze the literature of attacks against machine learning systems. We also illustrate our taxonomy by showing
Neural Network Based Intrusion Detection System for Critical Infrastructures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Todd Vollmer; Ondrej Linda; Milos Manic
2009-07-01
Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less
In-flight flow visualization results from the X-29A aircraft at high angles of attack
NASA Technical Reports Server (NTRS)
Delfrate, John H.; Saltzman, John A.
1992-01-01
Flow visualization techniques were used on the X-29A aircraft at high angles of attack to study the vortical flow off the forebody and the surface flow on the wing and tail. The forebody vortex system was studied because asymmetries in the vortex system were suspected of inducing uncommanded yawing moments at zero sideslip. Smoke enabled visualization of the vortex system and correlation of its orientation with flight yawing moment data. Good agreement was found between vortex system asymmetries and the occurrence of yawing moments. Surface flow on the forward-swept wing of the X-29A was studied using tufts and flow cones. As angle of attack increased, separated flow initiated at the root and spread outboard encompassing the full wing by 30 deg angle of attack. In general, the progression of the separated flow correlated well with subscale model lift data. Surface flow on the vertical tail was also studied using tufts and flow cones. As angle of attack increased, separated flow initiated at the root and spread upward. The area of separated flow on the vertical tail at angles of attack greater than 20 deg correlated well with the marked decrease in aircraft directional stability.
Kuwahara, Tomomi; Yamashita, Atsushi; Hirakawa, Hideki; Nakayama, Haruyuki; Toh, Hidehiro; Okada, Natsumi; Kuhara, Satoru; Hattori, Masahira; Hayashi, Tetsuya; Ohnishi, Yoshinari
2004-01-01
Bacteroides are predominant human colonic commensals, but the principal pathogenic species, Bacteroides fragilis (BF), lives closely associated with the mucosal surface, whereas a second major species, Bacteroides thetaiotaomicron (BT), concentrates within the colon. We find corresponding differences in their genomes, based on determination of the genome sequence of BF and comparative analysis with BT. Both species have acquired two mechanisms that contribute to their dominance among the colonic microbiota: an exceptional capability to use a wide range of dietary polysaccharides by gene amplification and the capacity to create variable surface antigenicities by multiple DNA inversion systems. However, the gene amplification for polysaccharide assimilation is more developed in BT, in keeping with its internal localization. In contrast, external antigenic structures can be changed more systematically in BF. Thereby, at the mucosal surface, where microbes encounter continuous attack by host defenses, BF evasion of the immune system is favored, and its colonization and infectious potential are increased. PMID:15466707
Berghi, Nicolae Ovidiu
2017-08-01
Autoimmunity represents the attack of the immune system of an organism against its own cells and tissues. Autoimmune diseases may affect one organ (Hashimoto thyroiditis) or can be systemic (chronic urticaria). Many factors are implicated in the pathogenesis of autoimmunity (white cells, cytokines, chemokines). Hashimoto thyroiditis has been associated with chronic urticaria in the last 3 decades in a number of clinical studies. Anti-thyroid antibodies have been documented in a proportion ranging from 10% to 30% in chronic urticaria patients in different countries from 3 continents. Two of the factors involved in the mechanism of autoimmunity are present both in the pathophysiology of Hashimoto thyroiditis and chronic urticaria. According to recent studies, IL6 is implicated in the pathogenesis of both diseases. TregsCD4+CD25+Foxp3+ cells have also been implicated in the pathological mechanisms of these 2 entities. This review offers an explanation of the clinical and statistical association between these two diseases from the pathophysiological point of view.
The physicist’s guide to one of biotechnology’s hottest new topics: CRISPR-Cas
NASA Astrophysics Data System (ADS)
Bonomo, Melia E.; Deem, Michael W.
2018-07-01
Clustered regularly interspaced short palindromic repeats (CRISPR) and CRISPR-associated proteins (Cas) constitute a multi-functional, constantly evolving immune system in bacteria and archaea cells. A heritable, molecular memory is generated of phage, plasmids, or other mobile genetic elements that attempt to attack the cell. This memory is used to recognize and interfere with subsequent invasions from the same genetic elements. This versatile prokaryotic tool has also been used to advance applications in biotechnology. Here we review a large body of CRISPR-Cas research to explore themes of evolution and selection, population dynamics, horizontal gene transfer, specific and cross-reactive interactions, cost and regulation, non-immunological CRISPR functions that boost host cell robustness, as well as applicable mechanisms for efficient and specific genetic engineering. We offer future directions that can be addressed by the physics community. Physical understanding of the CRISPR-Cas system will advance uses in biotechnology, such as developing cell lines and animal models, cell labeling and information storage, combatting antibiotic resistance, and human therapeutics.