5 resultados para Acquisition des connaissances
em Queensland University of Technology - ePrints Archive
Resumo:
BACKGROUND INFORMATION: Evidence has shown that mesenchymal-epithelial transition (MET) and epithelial-mesenchymal transition (EMT) are linked to stem cell properties. We currently lack a model showing how the occurrence of MET and EMT in immortalised cells influences the maintenance of stem cell properties. Thus, we established a project aiming to investigate the roles of EMT and MET in the acquisition of stem cell properties in immortalised oral epithelial cells. RESULTS: In this study, a retroviral transfection vector (pLXSN-hTERT) was used to immortalise oral epithelial cells by insertion of the hTERT gene (hTERT(+)-oral mucosal epithelial cell line [OME]). The protein and RNA expression of EMT transcriptional factors (Snail, Slug and Twist), their downstream markers (E-cadherin and N-cadherin) and embryonic stem cell markers (OCT4, Nanog and Sox2) were studied by reverse transcription PCR and Western blots in these cells. Some EMT markers were detected at both mRNA and protein levels. Adipocytes and bone cells were noted in the multi-differentiation assay, showing that the immortal cells underwent EMT. The differentiation assay for hTERT(+)-OME cells revealed the recovery of epithelial phenotypes, implicating the presence of MET. The stem cell properties were confirmed by the detection of appropriate markers. Altered expression of alpha-tubulin and gamma-tubulin in both two-dimensional-cultured (without serum) and three-dimensional-cultured hTERT(+)-OME spheroids indicated the re-programming of cytoskeleton proteins which is attributed to MET processes in hTERT(+)-OME cells. CONCLUSIONS: EMT and MET are essential for hTERT-immortalised cells to maintain their epithelial stem cell properties.
Resumo:
This paper identifies a number of critical infrastructure applications that are reliant on location services from cooperative location technologies such as GPS and GSM. We show that these location technologies can be represented in a general location model, such that the model components can be used for vulnerability analysis. We perform a vulnerability analysis on these components of GSM and GPS location systems as well as a number of augmentations to these systems.