240 resultados para immune protection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Hand, Foot and Mouth Disease (HFMD) is a self-limiting viral disease that mainly affects infants and children. In contrast with other HFMD causing enteroviruses, Enterovirus71 (EV71) has commonly been associated with severe clinical manifestation leading to death. Currently, due to a lack in understanding of EV71 pathogenesis, there is no antiviral therapeutics for the treatment of HFMD patients. Therefore the need to better understand the mechanism of EV71 pathogenesis is warranted. We have previously reported a human colorectal adenocarcinoma cell line (HT29) based model to study the pathogenesis of EV71. Using this system, we showed that knockdown of DGCR8, an essential cofactor for microRNAs biogenesis resulted in a reduction of EV71 replication. We also demonstrated that there are miRNAs changes during EV71 pathogenesis and EV71 utilise host miRNAs to attenuate antiviral pathways during infection. Together, data from this study provide critical information on the role of miRNAs during EV71 infection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Chlamydial infection in koalas is common across the east coast of Australia and causes significant morbidity, infertility and mortality. An effective vaccine to prevent the adverse consequences of chlamydial infections in koalas (particularly blindness and infertility in females) would provide an important management tool to prevent further population decline of this species. An important step towards developing a vaccine in koalas is to understand the host immune response to chlamydial infection. In this study, we used the Pepscan methodology to identify B cell epitopes across the Major Outer Membrane Protein (MOMP) of four C. pecorum strains/genotypes that are recognized, either following (a) natural live infection or (b) administration of a recombinant MOMP vaccine. Plasma antibodies from the koalas naturally infected with a C. pecorum G genotype strain recognised the epitopes located in the variable domain (VD) four of MOMP G and also VD4 of MOMP H. By comparison, plasma antibodies from an animal infected with a C. pecorum F genotype strain recognised epitopes in VD1, 2 and 4 of MOMP F, but not from other genotype MOMPs. When Chlamydia-free koalas were immunised with recombinant MOMP protein they produced antibodies not only against epitopes in the VDs but also in conserved domains of MOMP. Naturally infected koalas immunised with recombinant MOMP protein also produced antibodies against epitopes in the conserved domains. This work paves the way for further refinement of a MOMP-based Chlamydia vaccine that will offer wide cross-protection against the variety of chlamydial infections circulating in wild koala populations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Responsibility to Protect and Women, Peace and Security: Aligning the Protection Agendas, editors Davies, Nwokora, Stamnes and Teitt address the intersections of the Responsibility to Protect (R2P) principle and the Women, Peace, and Security (WPS) agenda. Widespread or systematic sexual or gender-based violence is a war crime, a crime against humanity and an act of genocide, all of which are clearly addressed in the R2P principle. The protection of those at risk of widespread sexual violence is therefore not only relative to the Women, Peace and Security (WPS) agenda, but a fundamental sovereign obligation for all states as part of their commitment to R2P. Contributions from policy-makers and academics consider both the merits and the utility of aligning the protection agendas of R2P and WPS. Ultimately, a number of actionable recommendations are made concerning a unification of the agendas to best support the global empowerment of women and prevention of mass atrocities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Combining facets of health physics with medicine, An Introduction to Radiation Protection in Medicine covers the background of the subject and the medical situations where radiation is the tool to diagnose or treat human disease. Encouraging newcomers to the field to properly and efficiently function in a versatile and evolving work setting, it familiarizes them with the particular problems faced during the application of ionizing radiation in medicine. The text builds a fundamental knowledge base before providing practical descriptions of radiation safety in medicine. It covers basic issues related to radiation protection, including the physical science behind radiation protection and the radiobiological basis of radiation protection. The text also presents operational and managerial tools for organizing radiation safety in a medical workplace. Subsequent chapters form the core of the book, focusing on the practice of radiation protection in different medical disciplines. They explore a range of individual uses of ionizing radiation in various branches of medicine, including radiology, nuclear medicine, external beam radiotherapy, and brachytherapy. With contributions from experienced practicing physicists, this book provides essential information about dealing with radiation safety in the rapidly shifting and diverse environment of medicine."--publisher website

Relevância:

20.00% 20.00%

Publicador:

Resumo:

1. Stream ecosystem health monitoring and reporting need to be developed in the context of an adaptive process that is clearly linked to identified values and objectives, is informed by rigorous science, guides management actions and is responsive to changing perceptions and values of stakeholders. To be effective, monitoring programmes also need to be underpinned by an understanding of the probable causal factors that influence the condition or health of important environmental assets and values. This is often difficult in stream and river ecosystems where multiple stressors, acting at different spatial and temporal scales, interact to affect water quality, biodiversity and ecosystem processes. 2. In this article, we describe the development of a freshwater monitoring programme in South East Queensland, Australia, and how this has been used to report on ecosystem health at a regional scale and to guide investments in catchment protection and rehabilitation. We also discuss some of the emerging science needs to identify the appropriate scale and spatial arrangement of rehabilitation to maximise river ecosystem health outcomes and, at the same time, derive other benefits downstream. 3. An objective process was used to identify potential indicators of stream ecosystem health and then test these across a known catchment land-use disturbance gradient. From the 75 indicators initially tested, 22 from five indicator groups (water quality, ecosystem metabolism, nutrient cycling, invertebrates and fish) responded strongly to the disturbance gradient, and 16 were subsequently recommended for inclusion in the monitoring programme. The freshwater monitoring programme was implemented in 2002, funded by local and State government authorities, and currently involves the assessment of over 120 sites, twice per year. This information, together with data from a similar programme on the region's estuarine and coastal marine waters, forms the basis of an annual report card that is presented in a public ceremony to local politicians and the broader community. 4. Several key lessons from the SEQ Healthy Waterways Programme are likely to be transferable to other regional programmes aimed at improving aquatic ecosystem health, including the importance of a shared common vision, the involvement of committed individuals, a cooperative approach, the need for defensible science and effective communication. 5. Thematic implications: this study highlights the use of conceptual models and objective testing of potential indicators against a known disturbance gradient to develop a freshwater ecosystem health monitoring programme that can diagnose the probable causes of degradation from multiple stressors and identify the appropriate spatial scale for rehabilitation or protection. This approach can lead to more targeted management investments in catchment protection and rehabilitation, greater public confidence that limited funds are being well spent and better outcomes for stream and river ecosystem health.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider secret sharing with binary shares. This model allows us to use the well developed theory of cryptographically strong boolean functions. We prove that for given secret sharing, the average cheating probability over all cheating and original vectors, i.e., ρ ¯= 1 n ⋅ 2 −n ∑ n c=1 ∑ α∈Vn ρ c,α , satisfies ρ ¯⩾ 1 2 , and the equality holds ⇔ ρc,α satisfies ρc,α = 1/2 for every cheating vector δc and every original vector α. In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions. This enables us to construct cheating-immune secret sharing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The work addresses the problem of cheating prevention in secret sharing. Two cheating scenarios are considered. In the first one, the cheaters always submit invalid shares to the combiner. In the second one, the cheaters collectively decide which shares are to be modified so the combiner gets a mixture of valid and invalid shares from the cheaters. The secret scheme is said to be k-cheating immune if any group of k cheaters has no advantage over honest participants. The paper investigates cryptographic properties of the defining function of secret sharing so the scheme is k-cheating immune. Constructions of secret sharing immune against k cheaters are given.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

language (such as C++ and Java). The model used allows to insert watermarks on three “orthogonal” levels. For the first level, watermarks are injected into objects. The second level watermarking is used to select proper variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic watermarking schemes were presented and their security discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A novel platform consisting of a multilayered substrate, activated graphite-like carbon film, and dense forest of long, vertically-aligned multiwall carbon nanotubes grown by the chemical vapor deposition is designed, fabricated, and tested for covalent immobilization of enzymatic biocatalysts with the aim of protecting them from shear forces and microbial attacks present in bioreactors. The covalent bonding ensures enzyme retention in a flow, while the dense nanotube forest may serve as a protection of the enzymes from microbial attack without impeding the flow of reactants and products. This platform was demonstrated for the two reference enzymes, horseradish peroxidase and catalase, which were immobilized without degrading their biological activity. This combination of an activated carbon layer for an efficient immobilization of biocatalysts with a protective layer of inert carbon nanotubes could dramatically improve the efficiency and longevity of enzymatic bio-catalysis employed in a large variety of advanced biotechnological processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internet and its widespread usage for multimedia document distribution put the copyright issue in a complete new setting. Multimedia documents, specifically those installed on a web page, are no longer passive as they typically include active applets. Copyright protection safeguards the intellectual property (IP) of multimedia documents, which are either sold or distributed free of charge. In this Chapter, the basic tools for copyright protection are discussed. First, general concepts and the vocabulary used in copyright protection of multimedia documents are discussed. Later, taxonomy of watermarking and fingerprinting techniques are studied. This part is concluded by a review of the literature dealing with IP security. The main part of the chapter discusses the generic watermarking scheme and illustrates it on three specific examples: collusion-free watermarking, spread spectrum watermarking, and software fingerprinting. Future trends and conclusions close the chapter.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper investigates the design of secret sharing that is immune against cheating (as defined by the Tompa-Woll attack). We examine secret sharing with binary shares and secrets. Bounds on the probability of successful cheating are given for two cases. The first case relates to secret sharing based on bent functions and results in a non-perfect scheme. The second case considers perfect secret sharing built on highly nonlinear balanced Boolean functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong boolean functions. In particular, we prove that for given secret sharing, the average cheating probability over all cheating vectors and all original vectors, i.e., 1/n 2n ∑c=1...n ∑α∈V n ρc,α , denoted by ρ, satisfies ρ ≥ ½, and the equality holds if and only if ρc,α satisfies ρc,α= ½ for every cheating vector δc and every original vector α. In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions.This enables us to construct cheating-immune secret sharing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis has developed a new approach to trace virtual protection signals in Electrical substation networks. The main goal of the research was to analyse the contents of the virtual signals transferred, using third party software. In doing so, a comprehensive test was done on a distance protection relay, using non-conventional test equipment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nature exists. Humans exist. The behaviour of one impacts upon the other. The behaviour of humans is governed by the artificial contrivance described as the law. While the law can in this way control the behaviour of humans and the impact that human behaviour has on nature, the behaviour of nature is governed – if at all- in accordance with nature’s own sets of values which are quintessentially a matter for nature. The relationship between nature and humans may be the object of rules of law, but traditional legal doctrine dictates that humans but not nature are the subjects of the rules of law. The jurisprudence of the earth – it would appear – seeks to equalise in the eyes of the law nature as part of the global environment and humans as part of the global environment. How might this be done?