980 resultados para acquire immunology


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We hypothesized that normal human mesothelial cells acquire resistance to asbestos-induced toxicity via induction of one or more epidermal growth factor receptor (EGFR) - linked survival pathways (phosphoinositol-3-kinase/AKT/ mammalian target of rapamycin and extracellular signal - regulated kinase [ERK] 1/2) during simian virus 40 (SV40) transformation and carcinogenesis. Both isolated HKNM-2 mesothelial cells and a telomerase-immortalized mesothelial line (LP9/TERT-1) were more sensitive to crocidolite asbestos toxicity than an SV40 Tag-immortalized mesothelial line (MET5A) and malignant mesothelioma cell lines (HMESO and PPM Mill). Whereas increases in phosphorylation of AKT (pAKT) were observed in MET5A cells in response to asbestos, LP9/TERT-1 cells exhibited dose-related decreases in pAKT levels. Pretreatment with an EGFR phosphorylation or mitogen-activated protein kinase kinase 1/2 inhibitor abrogated asbestos-induced phosphorylated ERK (pERK) 1/2 levels in both LP9/TERT-1 and MET5A cells as well as increases in pAKT levels in MET5A cells. Transient transfection of small interfering RNAs targeting ERK1, ERK2, or AKT revealed that ERK1/2 pathways were involved in cell death by asbestos in both cell lines. Asbestos-resistant HMESO or PPM Mill cells with high endogenous levels of ERKs or AKT did not show dose-responsive increases in pERK1/ERK1, pERK2/ERK2, or pAKT/AKT levels by asbestos. However, small hairpin ERK2 stable cell lines created from both malignant mesothelioma lines were more sensitive to asbestos toxicity than shERK1 and shControl lines, and exhibited unique, tumor-specific changes in endogenous cell death - related gene expression. Our results suggest that EGFR phosphorylation is causally linkedto pERK and pAKT activation by asbestos in normal and SV40 Tag - immortalized human mesothelial cells. They also indicate that ERK2 plays a role in modulating asbestos toxicity by regulating genes critical to cell injury and survival that are differentially expressed in human mesotheliomas.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this paper is to document and explain the allocation of takeover purchase price to identifiable intangible assets (IIAs), purchased goodwill, and/or target net tangible assets in an accounting environment unconstrained with respect to IIA accounting policy choice. Using a sample of Australian acquisitions during the unconstrained accounting environment from 1988 to 2004, we find the percentage allocation of purchase price to IIAs averaged 19.09%. The percentage allocation to IIAs is significantly positively related to return on assets and insignificantly related to leverage, contrary to opportunism. Efficiency suggests an explanation: profitable firms acquire and capitalise a higher percentage of IIAs in acquisitions. The target's investment opportunity set is significantly positively related to the percentage allocation to IIAs, consistent with information-signalling. The paper contributes to the accounting policy choice literature by showing how Australian firms make the one-off accounting policy choice in regards allocation of takeover purchase price (which is often a substantial dollar amount to) in an environment where accounting for IIAs was unconstrained.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

tRNA-derived RNA fragments (tRFs) are 19mer small RNAs that associate with Argonaute (AGO) proteins in humans. However, in plants, it is unknown if tRFs bind with AGO proteins. Here, using public deep sequencing libraries of immunoprecipitated Argonaute proteins (AGO-IP) and bioinformatics approaches, we identified the Arabidopsis thaliana AGO-IP tRFs. Moreover, using three degradome deep sequencing libraries, we identified four putative tRF targets. The expression pattern of tRFs, based on deep sequencing data, was also analyzed under abiotic and biotic stresses. The results obtained here represent a useful starting point for future studies on tRFs in plants. © 2013 Loss-Morais et al.; licensee BioMed Central Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The nucleotide sequence of the coat protein gene of barley yellow dwarf virus (BYDV, PAV serotype) was determined, and the amino acid sequence was deduced. The open reading frame, encoding a protein of relative molecular mass (Mr) 22,047, was confirmed as the coat protein gene by comparison with amino acid sequences of tryptic peptides derived from dissociated virions. In addition, a fragment of this gene expressed in Escherichia coli produced a product which was recognized by antibodies prepared against purified BYDV virions. An overlapping reading frame encoding an Mr 17,147 protein is contained completely within the coat protein gene. © 1988.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The period of developmental vulnerability to toxicants begins at conception and extends through gestation, parturition, infanthood and childhood to adolescence. The concern is that children: (1) may experience quantitatively and qualitatively different exposures, and (2) may have different sensitivity to chemical pollutants. Traditional toxicological studies are inappropriate for assessing the results of chronic exposure at very low levels during critical periods of development. This paper will discuss (1) the health effects associated with exposure to selected emerging organic pollutants, including brominated flame retardants, perfluorinated compounds, organophosphate pesticides and bisphenol A; (2) difficulties in monitoring these substances in children, and (3) suggest techniques and strategies for overcoming these difficulties. Such biomonitoring data can be used to identify where policies should be directed in order to reduce exposure, and to document policies that have successfully reduced exposure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Bluetooth technology is being increasingly used, among the Automated Vehicle Identification Systems, to retrieve important information about urban networks. Because the movement of Bluetooth-equipped vehicles can be monitored, throughout the network of Bluetooth sensors, this technology represents an effective means to acquire accurate time dependant Origin Destination information. In order to obtain reliable estimations, however, a number of issues need to be addressed, through data filtering and correction techniques. Some of the main challenges inherent to Bluetooth data are, first, that Bluetooth sensors may fail to detect all of the nearby Bluetooth-enabled vehicles. As a consequence, the exact journey for some vehicles may become a latent pattern that will need to be estimated. Second, sensors that are in close proximity to each other may have overlapping detection areas, thus making the task of retrieving the correct travelled path even more challenging. The aim of this paper is twofold: to give an overview of the issues inherent to the Bluetooth technology, through the analysis of the data available from the Bluetooth sensors in Brisbane; and to propose a method for retrieving the itineraries of the individual Bluetooth vehicles. We argue that estimating these latent itineraries, accurately, is a crucial step toward the retrieval of accurate dynamic Origin Destination Matrices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

PROBLEM Estradiol regulates chemokine secretion from uterine epithelial cells, but little is known about estradiol regulation in vivo or the role of estrogen receptors (ERs). METHOD CCL20 and CXCL1 present in reproductive washes following treatment with selective estrogen receptor modulators (SERMs) were compared with that during estrous and following estradiol-treated ovariectomized BALB/c mice. Cellular regulation was determined using isolated vaginal and uterine epithelial/stromal cells in vitro. RESULTS Uterine and vaginal chemokine secretion is cyclically regulated with CCL20 at low levels but CXCL1 at high levels during high estradiol, generally mimicking estradiol effect in vivo. ERα but not ERβ regulated CCL20/CXCL1 secretion by uterine epithelial cells in vitro and vaginal CCL20 in vivo. Estradiol/SERMs failed to alter uterine CCL20 secretion in ovariectomized mice. Diminished uterine epithelial ERα staining following ovariectomy corresponded with estradiol unresponsiveness of uterine tissue. CONCLUSION Estrogen receptors α regulates CCL20/CXCL1 secretion in the female reproductive tract, and ERα antagonists directly oppose the regulation by estradiol. Understanding ER-mediated antimicrobial chemokine expression is important to elucidate cyclic susceptibility to sexually transmitted pathogens.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The studies presented in this review explore three distinct areas with potential for inhibiting HIV infection in women. Based on emerging information from the physiology, endocrinology and immunology of the female reproductive tract (FRT), we propose unique 'works in progress' for protecting women from HIV. Various aspects of FRT immunity are suppressed by estradiol during the menstrual cycle, making women more susceptible to HIV infection. By engineering commensal Lactobacillus to secrete the anti-HIV molecule Elafin as estradiol levels increase, women could be protected from HIV infection. Selective estrogen response modifiers enhance barrier integrity and enhance secretion of protective anti-HIV molecules. Finally, understanding the interactions and regulation of FRT endogenous antimicrobials, proteases, antiproteases, etc., all of which are under hormonal control, will open new avenues to therapeutic manipulation of the FRT mucosal microenvironment. By seeking new alternatives to preventing HIV infection in women, we may finally disrupt the HIV pandemic.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This review examines the multiple levels of pre-existing immunity in the upper and lower female reproductive tract. In addition, we highlight the need for further research of innate and adaptive immune protection of mucosal surfaces in the female reproductive tract. Innate mechanisms include the mucus lining, a tight epithelial barrier and the secretion of antimicrobial peptides and cytokines by epithelial and innate immune cells. Stimulation of the innate immune system also serves to bridge the adaptive arm resulting in the generation of pathogen-specific humoral and cell-mediated immunity. Less understood are the multiple components that act in a coordinated way to provide a network of ongoing protection. Innate and adaptive immunity in the human female reproductive tract are influenced by the stage of menstrual cycle and are directly regulated by the sex steroid hormones, progesterone and estradiol. Furthermore, the effect of hormones on immunity is mediated both directly on immune and epithelial cells and indirectly by stimulating growth factor secretion from stromal cells. The goal of this review is to focus on the diverse aspects of the innate and adaptive immune systems that contribute to a unique network of protection throughout the female reproductive tract.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The immune system in the female reproductive tract (FRT) does not mount an attack against HIV or other sexually transmitted infections (STI) with a single endogenously produced microbicide or with a single arm of the immune system. Instead, the body deploys dozens of innate antimicrobials to the secretions of the female reproductive tract. Working together, these antimicrobials along with mucosal antibodies attack many different viral, bacterial and fungal targets. Within the FRT, the unique challenges of protection against sexually transmitted pathogens coupled with the need to sustain the development of an allogeneic fetus have evolved in such a way that sex hormones precisely regulate immune function to accomplish both tasks. The studies presented in this review demonstrate that estradiol and progesterone secreted during the menstrual cycle act both directly and indirectly on epithelial cells and other immune cells in the reproductive tract to modify immune function in a way that is unique to specific sites throughout the FRT. As presented in this review, studies from our laboratory and others demonstrate that the innate immune response is under hormonal control, varies with the stage of the menstrual cycle, and as such is suppressed at mid-cycle to optimize conditions for successful fertilization and pregnancy. In doing so, a window of STI vulnerability is created during which potential pathogens including HIV enter the reproductive tract to infect host targets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Suspension bridges meet the steadily growing demand for lighter and longer bridges in today’s infrastructure systems. These bridges are designed to have long life spans, but with age, their main cables and hangers could suffer from corrosion and fatigue. There is a need for a simple and reliable procedure to detect and locate such damage, so that appropriate retrofitting can be carried out to prevent bridge failure. Damage in a structure causes changes in its properties (mass, damping and stiffness) which in turn will cause changes in its vibration characteristics (natural frequencies, modal damping and mode shapes). Methods based on modal flexibility, which depends on both the natural frequencies and mode shapes, have the potential for damage detection. They have been applied successfully to beam and plate elements, trusses and simple structures in reinforced concrete and steel. However very limited applications for damage detection in suspension bridges have been identified to date. This paper examines the potential of modal flexibility methods for damage detection and localization of a suspension bridge under different damage scenarios in the main cables and hangers using numerical simulation techniques. Validated finite element model (FEM) of a suspension bridge is used to acquire mass normalized mode shape vectors and natural frequencies at intact and damaged states. Damage scenarios will be simulated in the validated FE models by varying stiffness of the damaged structural members. The capability of damage index based on modal flexibility to detect and locate damage is evaluated. Results confirm that modal flexibility based methods have the ability to successfully identify damage in suspension bridge main cables and hangers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most recommender systems attempt to use collaborative filtering, content-based filtering or hybrid approach to recommend items to new users. Collaborative filtering recommends items to new users based on their similar neighbours, and content-based filtering approach tries to recommend items that are similar to new users' profiles. The fundamental issues include how to profile new users, and how to deal with the over-specialization in content-based recommender systems. Indeed, the terms used to describe items can be formed as a concept hierarchy. Therefore, we aim to describe user profiles or information needs by using concepts vectors. This paper presents a new method to acquire user information needs, which allows new users to describe their preferences on a concept hierarchy rather than rating items. It also develops a new ranking function to recommend items to new users based on their information needs. The proposed approach is evaluated on Amazon book datasets. The experimental results demonstrate that the proposed approach can largely improve the effectiveness of recommender systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fire incident in buildings is common, so the fire safety design of the framed structure is imperative, especially for the unprotected or partly protected bare steel frames. However, software for structural fire analysis is not widely available. As a result, the performance-based structural fire design is urged on the basis of using user-friendly and conventional nonlinear computer analysis programs so that engineers do not need to acquire new structural analysis software for structural fire analysis and design. The tool is desired to have the capacity of simulating the different fire scenarios and associated detrimental effects efficiently, which includes second-order P-D and P-d effects and material yielding. Also the nonlinear behaviour of large-scale structure becomes complicated when under fire, and thus its simulation relies on an efficient and effective numerical analysis to cope with intricate nonlinear effects due to fire. To this end, the present fire study utilizes a second order elastic/plastic analysis software NIDA to predict structural behaviour of bare steel framed structures at elevated temperatures. This fire study considers thermal expansion and material degradation due to heating. Degradation of material strength with increasing temperature is included by a set of temperature-stress-strain curves according to BS5950 Part 8 mainly, which implicitly allows for creep deformation. This finite element stiffness formulation of beam-column elements is derived from the fifth-order PEP element which facilitates the computer modeling by one member per element. The Newton-Raphson method is used in the nonlinear solution procedure in order to trace the nonlinear equilibrium path at specified elevated temperatures. Several numerical and experimental verifications of framed structures are presented and compared against solutions in literature. The proposed method permits engineers to adopt the performance-based structural fire analysis and design using typical second-order nonlinear structural analysis software.