963 resultados para algebraic immunity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Les virus ont besoin d’interagir avec des facteurs cellulaires pour se répliquer et se propager dans les cellules d’hôtes. Une étude de l'interactome des protéines du virus d'hépatite C (VHC) par Germain et al. (2014) a permis d'élucider de nouvelles interactions virus-hôte. L'étude a également démontré que la majorité des facteurs de l'hôte n'avaient pas d'effet sur la réplication du virus. Ces travaux suggèrent que la majorité des protéines ont un rôle dans d'autres processus cellulaires tel que la réponse innée antivirale et ciblées pas le virus dans des mécanismes d'évasion immune. Pour tester cette hypothèse, 132 interactant virus-hôtes ont été sélectionnés et évalués par silençage génique dans un criblage d'ARNi sur la production interferon-beta (IFNB1). Nous avons ainsi observé que les réductions de l'expression de 53 interactants virus-hôte modulent la réponse antivirale innée. Une étude dans les termes de gène d'ontologie (GO) démontre un enrichissement de ces protéines au transport nucléocytoplasmique et au complexe du pore nucléaire. De plus, les gènes associés avec ces termes (CSE1L, KPNB1, RAN, TNPO1 et XPO1) ont été caractérisé comme des interactant de la protéine NS3/4A par Germain et al. (2014), et comme des régulateurs positives de la réponse innée antivirale. Comme le VHC se réplique dans le cytoplasme, nous proposons que ces interactions à des protéines associées avec le noyau confèrent un avantage de réplication et bénéficient au virus en interférant avec des processus cellulaire tel que la réponse innée. Cette réponse innée antivirale requiert la translocation nucléaire des facteurs transcriptionnelles IRF3 et NF-κB p65 pour la production des IFNs de type I. Un essai de microscopie a été développé afin d'évaluer l’effet du silençage de 60 gènes exprimant des protéines associés au complexe du pore nucléaire et au transport nucléocytoplasmique sur la translocation d’IRF3 et NF-κB p65 par un criblage ARNi lors d’une cinétique d'infection virale. En conclusion, l’étude démontre qu’il y a plusieurs protéines qui sont impliqués dans le transport de ces facteurs transcriptionnelles pendant une infection virale et peut affecter la production IFNB1 à différents niveaux de la réponse d'immunité antivirale. L'étude aussi suggère que l'effet de ces facteurs de transport sur la réponse innée est peut être un mécanisme d'évasion par des virus comme VHC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptosystem using linear codes was developed in 1978 by Mc-Eliece. Later in 1985 Niederreiter and others developed a modified version of cryptosystem using concepts of linear codes. But these systems were not used frequently because of its larger key size. In this study we were designing a cryptosystem using the concepts of algebraic geometric codes with smaller key size. Error detection and correction can be done efficiently by simple decoding methods using the cryptosystem developed. Approach: Algebraic geometric codes are codes, generated using curves. The cryptosystem use basic concepts of elliptic curves cryptography and generator matrix. Decrypted information takes the form of a repetition code. Due to this complexity of decoding procedure is reduced. Error detection and correction can be carried out efficiently by solving a simple system of linear equations, there by imposing the concepts of security along with error detection and correction. Results: Implementation of the algorithm is done on MATLAB and comparative analysis is also done on various parameters of the system. Attacks are common to all cryptosystems. But by securely choosing curve, field and representation of elements in field, we can overcome the attacks and a stable system can be generated. Conclusion: The algorithm defined here protects the information from an intruder and also from the error in communication channel by efficient error correction methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis Entitled Spectral theory of bounded self-adjoint operators -A linear algebraic approach.The main results of the thesis can be classified as three different approaches to the spectral approximation problems. The truncation method and its perturbed versions are part of the classical linear algebraic approach to the subject. The usage of block Toeplitz-Laurent operators and the matrix valued symbols is considered as a particular example where the linear algebraic techniques are effective in simplifying problems in inverse spectral theory. The abstract approach to the spectral approximation problems via pre-conditioners and Korovkin-type theorems is an attempt to make the computations involved, well conditioned. However, in all these approaches, linear algebra comes as the central object. The objective of this study is to discuss the linear algebraic techniques in the spectral theory of bounded self-adjoint operators on a separable Hilbert space. The usage of truncation method in approximating the bounds of essential spectrum and the discrete spectral values outside these bounds is well known. The spectral gap prediction and related results was proved in the second chapter. The discrete versions of Borg-type theorems, proved in the third chapter, partly overlap with some known results in operator theory. The pure linear algebraic approach is the main novelty of the results proved here.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Communication is the process of transmitting data across channel. Whenever data is transmitted across a channel, errors are likely to occur. Coding theory is a stream of science that deals with finding efficient ways to encode and decode data, so that any likely errors can be detected and corrected. There are many methods to achieve coding and decoding. One among them is Algebraic Geometric Codes that can be constructed from curves. Cryptography is the science ol‘ security of transmitting messages from a sender to a receiver. The objective is to encrypt message in such a way that an eavesdropper would not be able to read it. A eryptosystem is a set of algorithms for encrypting and decrypting for the purpose of the process of encryption and decryption. Public key eryptosystem such as RSA and DSS are traditionally being prel‘en‘ec| for the purpose of secure communication through the channel. llowever Elliptic Curve eryptosystem have become a viable altemative since they provide greater security and also because of their usage of key of smaller length compared to other existing crypto systems. Elliptic curve cryptography is based on group of points on an elliptic curve over a finite field. This thesis deals with Algebraic Geometric codes and their relation to Cryptography using elliptic curves. Here Goppa codes are used and the curves used are elliptic curve over a finite field. We are relating Algebraic Geometric code to Cryptography by developing a cryptographic algorithm, which includes the process of encryption and decryption of messages. We are making use of fundamental properties of Elliptic curve cryptography for generating the algorithm and is used here to relate both.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We give a proof of Iitaka's conjecture C2,1 using only elementary methods from algebraic geometry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis work is dedicated to use the computer-algebraic approach for dealing with the group symmetries and studying the symmetry properties of molecules and clusters. The Maple package Bethe, created to extract and manipulate the group-theoretical data and to simplify some of the symmetry applications, is introduced. First of all the advantages of using Bethe to generate the group theoretical data are demonstrated. In the current version, the data of 72 frequently applied point groups can be used, together with the data for all of the corresponding double groups. The emphasize of this work is placed to the applications of this package in physics of molecules and clusters. Apart from the analysis of the spectral activity of molecules with point-group symmetry, it is demonstrated how Bethe can be used to understand the field splitting in crystals or to construct the corresponding wave functions. Several examples are worked out to display (some of) the present features of the Bethe program. While we cannot show all the details explicitly, these examples certainly demonstrate the great potential in applying computer algebraic techniques to study the symmetry properties of molecules and clusters. A special attention is placed in this thesis work on the flexibility of the Bethe package, which makes it possible to implement another applications of symmetry. This implementation is very reasonable, because some of the most complicated steps of the possible future applications are already realized within the Bethe. For instance, the vibrational coordinates in terms of the internal displacement vectors for the Wilson's method and the same coordinates in terms of cartesian displacement vectors as well as the Clebsch-Gordan coefficients for the Jahn-Teller problem are generated in the present version of the program. For the Jahn-Teller problem, moreover, use of the computer-algebraic tool seems to be even inevitable, because this problem demands an analytical access to the adiabatic potential and, therefore, can not be realized by the numerical algorithm. However, the ability of the Bethe package is not exhausted by applications, mentioned in this thesis work. There are various directions in which the Bethe program could be developed in the future. Apart from (i) studying of the magnetic properties of materials and (ii) optical transitions, interest can be pointed out for (iii) the vibronic spectroscopy, and many others. Implementation of these applications into the package can make Bethe a much more powerful tool.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Let G be finite group and K a number field or a p-adic field with ring of integers O_K. In the first part of the manuscript we present an algorithm that computes the relative algebraic K-group K_0(O_K[G],K) as an abstract abelian group. We solve the discrete logarithm problem, both in K_0(O_K[G],K) and the locally free class group cl(O_K[G]). All algorithms have been implemented in MAGMA for the case K = \IQ. In the second part of the manuscript we prove formulae for the torsion subgroup of K_0(\IZ[G],\IQ) for large classes of dihedral and quaternion groups.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The identification of chemical mechanism that can exhibit oscillatory phenomena in reaction networks are currently of intense interest. In particular, the parametric question of the existence of Hopf bifurcations has gained increasing popularity due to its relation to the oscillatory behavior around the fixed points. However, the detection of oscillations in high-dimensional systems and systems with constraints by the available symbolic methods has proven to be difficult. The development of new efficient methods are therefore required to tackle the complexity caused by the high-dimensionality and non-linearity of these systems. In this thesis, we mainly present efficient algorithmic methods to detect Hopf bifurcation fixed points in (bio)-chemical reaction networks with symbolic rate constants, thereby yielding information about their oscillatory behavior of the networks. The methods use the representations of the systems on convex coordinates that arise from stoichiometric network analysis. One of the methods called HoCoQ reduces the problem of determining the existence of Hopf bifurcation fixed points to a first-order formula over the ordered field of the reals that can then be solved using computational-logic packages. The second method called HoCaT uses ideas from tropical geometry to formulate a more efficient method that is incomplete in theory but worked very well for the attempted high-dimensional models involving more than 20 chemical species. The instability of reaction networks may lead to the oscillatory behaviour. Therefore, we investigate some criterions for their stability using convex coordinates and quantifier elimination techniques. We also study Muldowney's extension of the classical Bendixson-Dulac criterion for excluding periodic orbits to higher dimensions for polynomial vector fields and we discuss the use of simple conservation constraints and the use of parametric constraints for describing simple convex polytopes on which periodic orbits can be excluded by Muldowney's criteria. All developed algorithms have been integrated into a common software framework called PoCaB (platform to explore bio- chemical reaction networks by algebraic methods) allowing for automated computation workflows from the problem descriptions. PoCaB also contains a database for the algebraic entities computed from the models of chemical reaction networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an image-based rendering system using algebraic relations between different views of an object. The system uses pictures of an object taken from known positions. Given three such images it can generate "virtual'' ones as the object would look from any position near the ones that the two input images were taken from. The extrapolation from the example images can be up to about 60 degrees of rotation. The system is based on the trilinear constraints that bind any three view so fan object. As a side result, we propose two new methods for camera calibration. We developed and used one of them. We implemented the system and tested it on real images of objects and faces. We also show experimentally that even when only two images taken from unknown positions are given, the system can be used to render the object from other view points as long as we have a good estimate of the internal parameters of the camera used and we are able to find good correspondence between the example images. In addition, we present the relation between these algebraic constraints and a factorization method for shape and motion estimation. As a result we propose a method for motion estimation in the special case of orthographic projection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigate the differences --- conceptually and algorithmically --- between affine and projective frameworks for the tasks of visual recognition and reconstruction from perspective views. It is shown that an affine invariant exists between any view and a fixed view chosen as a reference view. This implies that for tasks for which a reference view can be chosen, such as in alignment schemes for visual recognition, projective invariants are not really necessary. We then use the affine invariant to derive new algebraic connections between perspective views. It is shown that three perspective views of an object are connected by certain algebraic functions of image coordinates alone (no structure or camera geometry needs to be involved).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

T-cell receptor gene rearrangements were studied in Aotus monkeys developing high antibody titers and sterilizing immunity against the Plasmodium falciparum malaria parasite upon vaccination with the modified synthetic peptide 24112, which was identified in the Merozoite Surface Protein 2 (MSP-2) and is known to bind to HLA-DR beta 1*0403 molecules with high capacity. Spectratyping analysis showed a preferential usage of V beta 12 and V beta 6 TCR gene families in 67% of HLA-DR beta 1*0403-like genotyped monkeys. Docking of peptide 24112 into the HLA-DR beta 1*0401-HA peptide-HA1.7TCR complex containing the VDJ rearrangements identified in fully protected monkeys showed a different structural signature compared to nonprotected monkeys. These striking results show the exquisite specificity of the TCR/pMHCII complex formation needed for inducing sterilizing immunity and provide important hints for a logical and rational methodology to develop multiepitopic, minimal subunit-based synthetic vaccines against infectious diseases, among them malaria.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen basado en el de la publicación

Relevância:

20.00% 20.00%

Publicador: