997 resultados para Kenneth Slessor


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Chlamydia pneumoniae commonly causes respiratory tract infections in children, and epidemiological investigations strongly link infection to the pathogenesis of asthma. The immune system in early life is immature and may not respond appropriately to pathogens. Toll-like receptor (TLR)2 and 4 are regarded as the primary pattern recognition receptors that sense bacteria, however their contribution to innate and adaptive immunity in early life remains poorly defined. We investigated the role of TLR2 and 4 in the induction of immune responses to Chlamydia muridarum respiratory infection, in neonatal wild-type (Wt) or TLR2-deficient (−/−), 4−/− or 2/4−/− BALB/c mice. Wt mice had moderate disease and infection. TLR2−/− mice had more severe disease and more intense and prolonged infection compared to other groups. TLR4−/− mice were asymptomatic. TLR2/4−/− mice had severe early disease and persistent infection, which resolved thereafter consistent with the absence of symptoms in TLR4−/− mice. Wt mice mounted robust innate and adaptive responses with an influx of natural killer (NK) cells, neutrophils, myeloid (mDCs) and plasmacytoid (pDCs) dendritic cells, and activated CD4+ and CD8+ T-cells into the lungs. Wt mice also had effective production of interferon (IFN)γ in the lymph nodes and lung, and proliferation of lymph node T-cells. TLR2−/− mice had more intense and persistent innate (particularly neutrophil) and adaptive cell responses and IL-17 expression in the lung, however IFNγ responses and T-cell proliferation were reduced. TLR2/4−/− mice had reduced innate and adaptive responses. Most importantly, neutrophil phagocytosis was impaired in the absence of TLR2. Thus, TLR2 expression, particularly on neutrophils, is required for effective control of Chlamydia respiratory infection in early life. Loss of control of infection leads to enhanced but ineffective TLR4-mediated inflammatory responses that prolong disease symptoms. This indicates that TLR2 agonists may be beneficial in the treatment of early life Chlamydia infections and associated diseases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Viral and bacterial respiratory tract infections in early-life are linked to the development of allergic airway inflammation and asthma. However, the mechanisms involved are not well understood. We have previously shown that neonatal and infant, but not adult, chlamydial lung infections in mice permanently alter inflammatory phenotype and physiology to increase the severity of allergic airway disease by increasing lung interleukin (IL)-13 expression, mucus hyper-secretion and airway hyper-responsiveness. This occurred through different mechanisms with infection at different ages. Neonatal infection suppressed inflammatory responses but enhanced systemic dendritic cell:T-cell IL-13 release and induced permanent alterations in lung structure (i.e., increased the size of alveoli). Infant infection enhanced inflammatory responses but had no effect on lung structure. Here we investigated the role of hematopoietic cells in these processes using bone marrow chimera studies. Methodology/Principal Findings Neonatal (<24-hours-old), infant (3-weeks-old) and adult (6-weeks-old) mice were infected with C. muridarum. Nine weeks after infection bone marrow was collected and transferred into recipient age-matched irradiated naïve mice. Allergic airway disease was induced (8 weeks after adoptive transfer) by sensitization and challenge with ovalbumin. Reconstitution of irradiated naïve mice with bone marrow from mice infected as neonates resulted in the suppression of the hallmark features of allergic airway disease including mucus hyper-secretion and airway hyper-responsiveness, which was associated with decreased IL-13 levels in the lung. In stark contrast, reconstitution with bone marrow from mice infected as infants increased the severity of allergic airway disease by increasing T helper type-2 cell cytokine release (IL-5 and IL-13), mucus hyper-secretion, airway hyper-responsiveness and IL-13 levels in the lung. Reconstitution with bone marrow from infected adult mice had no effects. Conclusions These results suggest that an infant chlamydial lung infection results in long lasting alterations in hematopoietic cells that increases the severity of allergic airway disease in later-life.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

IL-17 is believed to be important for protection against extracellular pathogens, where clearance is dependent on neutrophil recruitment and local activation of epithelial cell defences. However, the role of IL-17 in protection against intracellular pathogens such as Chlamydia is less clear. We have compared (i) the course of natural genital tract C. muridarum infection, (ii) the development of oviduct pathology and (iii) the development of vaccine-induced immunity against infection in wild type (WT) BALB/c and IL-17 knockout mice (IL-17-/-) to determine if IL-17-mediated immunity is implicated in the development of infection-induced pathology and/or protection. Both the magnitude and duration of genital infection was significantly reduced in IL-17-/- mice compared to BALB/c. Similarly, hydrosalpinx was also greatly reduced in IL-17-/- mice and this correlated with reduced neutrophil and macrophage infiltration of oviduct tissues. Matrix metalloproteinase (MMP) 9 and MMP2 were increased in WT oviducts compared to IL-17-/- animals at day 7 post-infection. In contrast, oviducts from IL-17-/- mice contained higher MMP9 and MMP2 at day 21. Infection also elicited higher levels of Chlamydia-neutralizing antibody in serum of IL-17-/- mice than WT mice. Following intranasal immunization with C. muridarum Major Outer Membrane Protein (MOMP) and cholera toxin plus CpG adjuvants, significantly higher levels of chlamydial MOMP-specific IgG and IgA were found in serum and vaginal washes of IL-17-/- mice. T cell proliferation and IFNγ production by splenocytes was greater in WT animals following in vitro re-stimulation, however vaccination was only effective at reducing infection in WT, not IL-17-/- mice. Intranasal or transcutaneous immunization protected WT but not IL-17-/- mice against hydrosalpinx development. Our data show that in the absence of IL-17, the severity of C. muridarum genital infection and associated oviduct pathology are significantly attenuated, however neither infection or pathology can be reduced further by vaccination protocols that effectively protect WT mice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Whether by using electronic banking, by using credit cards, or by synchronising a mobile telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic protocols daily. We reduced the gap that exists between the theory and the reality of the security of these cryptographic protocols involving humans, by creating tools and techniques for proofs and implementations of human-followable security. After three human research studies, we present a model for capturing human recognition; we provide a tool for generating values called Computer-HUman Recognisable Nonces (CHURNs); and we provide a model for capturing human perceptible freshness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We characterized the mutational landscape of melanoma, the form of skin cancer with the highest mortality rate, by sequencing the exomes of 147 melanomas. Sun-exposed melanomas had markedly more ultraviolet (UV)-like C>T somatic mutations compared to sun-shielded acral, mucosal and uveal melanomas. Among the newly identified cancer genes was PPP6C, encoding a serine/threonine phosphatase, which harbored mutations that clustered in the active site in 12% of sun-exposed melanomas, exclusively in tumors with mutations in BRAF or NRAS. Notably, we identified a recurrent UV-signature, an activating mutation in RAC1 in 9.2% of sun-exposed melanomas. This activating mutation, the third most frequent in our cohort of sun-exposed melanoma after those of BRAF and NRAS, changes Pro29 to serine (RAC1P29S) in the highly conserved switch I domain. Crystal structures, and biochemical and functional studies of RAC1P29S showed that the alteration releases the conformational restraint conferred by the conserved proline, causes an increased binding of the protein to downstream effectors, and promotes melanocyte proliferation and migration. These findings raise the possibility that pharmacological inhibition of downstream effectors of RAC1 signaling could be of therapeutic benefit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The formalin test is increasingly applied as a model of inflammatory pain using high formalin concentrations (5–15%). However, little is known about the effects of low formalin concentrations on related behavioural responses. To examine this, rat pups were subjected to various concentrations of formalin at four developmental stages: 7, 13, 22, and 82 days of age. At postnatal day (PND) 7, sex differences in flinching but not licking responses were observed with 0.5% formalin evoking higher flinching in males than in females. A dose response was evident in that 0.5% formalin also produced higher licking responses compared to 0.3% or 0.4% formalin. At PND 13, a concentration of 0.8% formalin evoked a biphasic response. At PND 22, a concentration of 1.1% evoked higher flinching and licking responses during the late phase (10–30 min) in both males and females. During the early phase (0–5 min), 1.1% evoked higher licking responses compared to 0.9% or 1% formalin. 1.1% formalin produced a biphasic response that was not evident with 0.9 or 1%. At PND 82, rats displayed a biphasic pattern in response to three formalin concentrations (1.25%, 1.75% and 2.25%) with the presence of an interphase for both 1.75% and 2.25% but not for 1.25%. These data suggest that low formalin concentrations induce fine-tuned responses that are not apparent with the high formalin concentration commonly used in the formalin test. These data also show that the developing nociceptive system is very sensitive to subtle changes in formalin concentrations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The thesis was a step forward in predicting the levels and sources of polycyclic aromatic hydrocarbons (PAHs) in sediments of Brisbane river, especially after the Brisbane floods in 2011. It employed different statistical techniques to provide valuable information that may assist source control and formulation of pollution mitigation measures for the river.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The mechanistic details of the pathogenesis of Chlamydia, an obligate intracellular pathogen of global importance, have eluded scientists due to the scarcity of traditional molecular genetic tools to investigate this organism. Here we report a chemical biology strategy that has uncovered the first essential protease for this organism. Identification and application of a unique CtHtrA inhibitor (JO146) to cultures of Chlamydia resulted in a complete loss of viable elementary body formation. JO146 treatment during the replicative phase of development resulted in a loss of Chlamydia cell morphology, diminishing inclusion size, and ultimate loss of inclusions from the host cells. This completely prevented the formation of viable Chlamydia elementary bodies. In addition to its effect on the human C. trachomatis strain, JO146 inhibited the viability of the mouse strain, Chlamydia muridarum, both in vitro and in vivo. Thus, we report a chemical biology approach to establish an essential role for Chlamydia CtHtrA. The function of CtHtrA for Chlamydia appears to be essential for maintenance of cell morphology during replicative the phase and these findings provide proof of concept that proteases can be targetted for anti-microbial therapy for intracellular pathogens.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Few patients diagnosed with lung cancer are still alive 5 years after diagnosis. The aim of the current study was to conduct a 10-year review of a consecutive series of patients undergoing curative-intent surgical resection at the largest tertiary referral centre to identify prognostic factors. Methods: Case records of all patients operated on for lung cancer between 1998 and 2008 were reviewed. The clinical features and outcomes of all patients with non-small cell lung cancer (NSCLC) stage I-IV were recorded. Results: A total of 654 patients underwent surgical resection with curative intent during the study period. Median overall survival for the entire cohort was 37 months. The median age at operation was 66 years, with males accounting for 62.7 %. Squamous cell type was the most common histological subtype, and lobectomies were performed in 76.5 % of surgical resections. Pneumonectomy rates decreased significantly in the latter half of the study (25 vs. 16.3 %), while sub-anatomical resection more than doubled (2 vs. 5 %) (p < 0.005). Clinico-pathological characteristics associated with improved survival by univariate analysis include younger age, female sex, smaller tumour size, smoking status, lobectomy, lower T and N status and less advanced pathological stage. Age, gender, smoking status and tumour size, as well as T and N descriptors have emerged as independent prognostic factors by multivariate analysis. Conclusion: We identified several factors that predicted outcome for NSCLC patients undergoing curative-intent surgical resection. Survival rates in our series are comparable to those reported from other thoracic surgery centres. © 2012 Royal Academy of Medicine in Ireland.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.