770 resultados para false recognition
Resumo:
To elucidate the structural basis of T cell recognition of hapten-modified antigenic peptides, we studied the interaction of the T1 T cell antigen receptor (TCR) with its ligand, the H-2Kd-bound Plasmodium berghei circumsporozoite peptide 252-260 (SYIPSAEKI) containing photoreactive 4-azidobenzoic acid (ABA) on P. berghei circumsporozoite Lys259. The photoaffinity-labeled TCR residue(s) were mapped as Tyr48 and/or Tyr50 of complementary determining region 2beta (CDR2beta). Other TCR-ligand contacts were identified by mutational analysis. Molecular modeling, based on crystallographic coordinates of closely related TCR and major histocompatibility complex I molecules, indicated that ABA binds strongly and specifically in a cavity between CDR3alpha and CDR2beta. We conclude that TCR expressing selective Vbeta and CDR3alpha sequences form a binding domain between CDR3alpha and CDR2beta that can accommodate nonpeptidic moieties conjugated at the C-terminal portion of peptides binding to major histocompatibility complex (MHC) encoded proteins.
Resumo:
A variety of cellular proteins has the ability to recognize DNA lesions induced by the anti-cancer drug cisplatin, with diverse consequences on their repair and on the therapeutic effectiveness of this drug. We report a novel gene involved in the cell response to cisplatin in vertebrates. The RDM1 gene (for RAD52 Motif 1) was identified while searching databases for sequences showing similarities to RAD52, a protein involved in homologous recombination and DNA double-strand break repair. Ablation of RDM1 in the chicken B cell line DT40 led to a more than 3-fold increase in sensitivity to cisplatin. However, RDM1-/- cells were not hypersensitive to DNA damages caused by ionizing radiation, UV irradiation, or the alkylating agent methylmethane sulfonate. The RDM1 protein displays a nucleic acid binding domain of the RNA recognition motif (RRM) type. By using gel-shift assays and electron microscopy, we show that purified, recombinant chicken RDM1 protein interacts with single-stranded DNA as well as double-stranded DNA, on which it assembles filament-like structures. Notably, RDM1 recognizes DNA distortions induced by cisplatin-DNA adducts in vitro. Finally, human RDM1 transcripts are abundant in the testis, suggesting a possible role during spermatogenesis.
Resumo:
False identity documents represent a serious threat through their production and use in organized crime and by terrorist organizations. The present-day fight against this criminal problem and threats to national security does not appropriately address the organized nature of this criminal activity, treating each fraudulent document on its own during investigation and the judicial process, which causes linkage blindness and restrains the analysis capacity. Given the drawbacks of this case-by-case approach, this article proposes an original model in which false identity documents are used to inform a systematic forensic intelligence process. The process aims to detect links, patterns, and tendencies among false identity documents in order to support strategic and tactical decision making, thus sustaining a proactive intelligence-led approach to fighting identity document fraud and the associated organized criminality. This article formalizes both the model and the process, using practical applications to illustrate its powerful capabilities. This model has a general application and can be transposed to other fields of forensic science facing similar difficulties.
Resumo:
Plants activate direct and indirect defenses in response to insect egg deposition. In Arabidopsis thaliana, oviposition by the butterfly Pieris brassicae triggers cellular and molecular changes that are similar to the changes caused by biotrophic pathogens. Even though this innate immune response did not affect egg survival in Arabidopsis, we could show that different insect eggs elicit specific gene expression changes. Additionally, egg- induced necrosis could be observed in a variety of plants from different families ranging from dicotyledonous plants to monocots, suggesting that insect-egg detection by plants is a widespread mechanism and that different insect species contain elicitors of immune responses. Extracts from caterpillars and eggs contain elicitors that co-purified over several extraction steps. Chemical fractionation of caterpillar extracts lead to the characterisation of an active compound that was determined to be a triglyceride by NMR analysis. The exact structure of the side chains as well as the elicitor's presence in insect eggs have yet to be confirmed.We also found that the plant defense signal salicylic acid (SA) accumulates at the site of oviposition. This is unexpected, as the SA pathway controls the defense against fungal and bacterial pathogens whereas it negatively interacts with the jasmonic acid (JA) pathway, which is crucial for the defense against herbivores. Application of P. brassicae or Spodoptera littoralis egg extract onto leaves reduced the induction of insect-responsive genes after challenge with caterpillars, suggesting that egg-derived elicitors suppress plant defense. Consequently, larval growth of the generalist herbivore S. littoralis, but not of the specialist P. brassicae, was significantly higher on plants treated with egg extract than on control plants. In contrast, suppression of gene induction and enhanced S. littoralis performance were not found in the SA-deficient mutant sid2-l, indicating that SA mediates this phenomenon. These data reveal an intriguing facet of the crosstalk between SA- and JA-signalling pathways and suggest that insects have evolved a way to suppress the induction of defense genes by laying eggs that release elicitors. Additionally, we demonstrated that mutants of known crosstalk regulators, including nprl-1, tga2356, ein2-l and wrky70-l, are not affected in egg-induced suppression of herbivore defenses. JA treatment was not able to alleviate this SA/JA negative crosstalk, suggesting that this suppression operates through a novel mechanism downstream of JA biosynthesis.
Resumo:
The production and use of false identity and travel documents in organized crime represent a serious and evolving threat. However, a case-by-case perspective, thus suffering from linkage blindness and a limited analysis capacity, essentially drives the present-day fight against this criminal problem. To assist in overcoming these limitations, a process model was developed using a forensic perspective. It guides the systematic analysis and management of seized false documents to generate forensic intelligence that supports strategic and tactical decision-making in an intelligence-led policing approach. The model is articulated on a three-level architecture that aims to assist in detecting and following-up on general trends, production methods and links between cases or series. Using analyses of a large dataset of counterfeit and forged identity and travel documents, it is possible to illustrate the model, its three levels and their contribution. Examples will point out how the proposed approach assists in detecting emerging trends, in evaluating the black market's degree of structure, in uncovering criminal networks, in monitoring the quality of false documents, and in identifying their weaknesses to orient the conception of more secured travel and identity documents. The process model proposed is thought to have a general application in forensic science and can readily be transposed to other fields of study.
Resumo:
The ability to distinguish nestmates from foreign individuals is central to the functioning of insect societies. In ants, workers from multiple-queen colonies are often less aggressive than workers from single-queen ones. In line with this observation, it has been hypothesized that workers from multiple-queen colonies have less precise recognition abilities than workers from single-queen ones because their colonies contain genetically more diverse individuals, which results in a broader template of recognition cues. Here, we assessed the impact of social structure ( queen number) variation on nestmate recognition and aggression in a large population of the socially polymorphic ant Formica selysi. We staged unilateral aggression tests on the nest surface. Workers from single-and multiple-queen colonies had good nestmate recognition ability and did not differ significantly in their level of aggression towards foreign, immobilized workers ( cue-bearers). In particular, workers from multiple-queen colonies efficiently recognized non-nestmates despite the higher genetic diversity in their colony. Cue-bearers from single- and multiple-queen colonies elicited similar reactions. However, the level of aggression was higher between than within social forms, suggesting that workers detect a signal that is specific to the colony social structure. Finally, the level of aggression was not correlated with the genetic distance between colonies. Overall, we found no evidence for the hypothesis that the presence of multiple breeders in the same colony decreases recognition abilities and found no simple relationship between genetic diversity and aggression level. (c) 2007 The Association for the Study of Animal Behaviou
Resumo:
Forensic intelligence is a distinct dimension of forensic science. Forensic intelligence processes have mostly been developed to address either a specific type of trace or a specific problem. Even though these empirical developments have led to successes, they are trace-specific in nature and contribute to the generation of silos which hamper the establishment of a more general and transversal model. Forensic intelligence has shown some important perspectives but more general developments are required to address persistent challenges. This will ensure the progress of the discipline as well as its widespread implementation in the future. This paper demonstrates that the description of forensic intelligence processes, their architectures, and the methods for building them can, at a certain level, be abstracted from the type of traces considered. A comparative analysis is made between two forensic intelligence approaches developed independently in Australia and in Europe regarding the monitoring of apparently very different kind of problems: illicit drugs and false identity documents. An inductive effort is pursued to identify similarities and to outline a general model. Besides breaking barriers between apparently separate fields of study in forensic science and intelligence, this transversal model would assist in defining forensic intelligence, its role and place in policing, and in identifying its contributions and limitations. The model will facilitate the paradigm shift from the current case-by-case reactive attitude towards a proactive approach by serving as a guideline for the use of forensic case data in an intelligence-led perspective. A follow-up article will specifically address issues related to comparison processes, decision points and organisational issues regarding forensic intelligence (part II).
Resumo:
Perceiving the world visually is a basic act for humans, but for computers it is still an unsolved problem. The variability present innatural environments is an obstacle for effective computer vision. The goal of invariant object recognition is to recognise objects in a digital image despite variations in, for example, pose, lighting or occlusion. In this study, invariant object recognition is considered from the viewpoint of feature extraction. Thedifferences between local and global features are studied with emphasis on Hough transform and Gabor filtering based feature extraction. The methods are examined with respect to four capabilities: generality, invariance, stability, and efficiency. Invariant features are presented using both Hough transform and Gabor filtering. A modified Hough transform technique is also presented where the distortion tolerance is increased by incorporating local information. In addition, methods for decreasing the computational costs of the Hough transform employing parallel processing and local information are introduced.
Resumo:
In this paper we propose the inversion of nonlinear distortions in order to improve the recognition rates of a speaker recognizer system. We study the effect of saturations on the test signals, trying to take into account real situations where the training material has been recorded in a controlled situation but the testing signals present some mismatch with the input signal level (saturations). The experimental results shows that a combination of several strategies can improve the recognition rates with saturated test sentences from 80% to 89.39%, while the results with clean speech (without saturation) is 87.76% for one microphone.
Resumo:
One of the most important problems in optical pattern recognition by correlation is the appearance of sidelobes in the correlation plane, which causes false alarms. We present a method that eliminate sidelobes of up to a given height if certain conditions are satisfied. The method can be applied to any generalized synthetic discriminant function filter and is capable of rejecting lateral peaks that are even higher than the central correlation. Satisfactory results were obtained in both computer simulations and optical implementation.
Resumo:
Tumor antigen-specific CD4(+) T cells generally orchestrate and regulate immune cells to provide immune surveillance against malignancy. However, activation of antigen-specific CD4(+) T cells is restricted at local tumor sites where antigen-presenting cells (APCs) are frequently dysfunctional, which can cause rapid exhaustion of anti-tumor immune responses. Herein, we characterize anti-tumor effects of a unique human CD4(+) helper T-cell subset that directly recognizes the cytoplasmic tumor antigen, NY-ESO-1, presented by MHC class II on cancer cells. Upon direct recognition of cancer cells, tumor-recognizing CD4(+) T cells (TR-CD4) potently induced IFN-γ-dependent growth arrest in cancer cells. In addition, direct recognition of cancer cells triggers TR-CD4 to provide help to NY-ESO-1-specific CD8(+) T cells by enhancing cytotoxic activity, and improving viability and proliferation in the absence of APCs. Notably, the TR-CD4 either alone or in collaboration with CD8(+) T cells significantly inhibited tumor growth in vivo in a xenograft model. Finally, retroviral gene-engineering with T cell receptor (TCR) derived from TR-CD4 produced large numbers of functional TR-CD4. These observations provide mechanistic insights into the role of TR-CD4 in tumor immunity, and suggest that approaches to utilize TR-CD4 will augment anti-tumor immune responses for durable therapeutic efficacy in cancer patients.
Resumo:
The design and synthesis of two Janus-type heterocycles with the capacity to simultaneously recognize guanine and uracyl in G-U mismatched pairs through complementary hydrogen bond pairing is described. Both compounds were conveniently functionalized with a carboxylic function and efficiently attached to a tripeptide sequence by using solid-phase methodologies. Ligands based on the derivatization of such Janus compounds with a small aminoglycoside, neamine, and its guanidinylated analogue have been synthesized, and their interaction with Tau RNA has been investigated by using several biophysical techniques, including UV-monitored melting curves, fluorescence titration experiments, and 1H NMR. The overall results indicated that Janus-neamine/guanidinoneamine showed some preference for the +3 mutated RNA sequence associated with the development of some tauopathies, although preliminary NMR studies have not confirmed binding to G-U pairs. Moreover, a good correlation has been found between the RNA binding affinity of such Janus-containing ligands and their ability to stabilize this secondary structure upon complexation.
Resumo:
The RFLP/PCR approach (restriction fragment length polymorphism/polymerase chain reaction) to genotypic mutation analysis described here measures mutations in restriction recognition sequences. Wild-type DNA is restricted before the resistant, mutated sequences are amplified by PCR and cloned. We tested the capacity of this experimental design to isolate a few copies of a mutated sequence of the human c-Ha-ras1 gene from a large excess of wild-type DNA. For this purpose we constructed a 272 bp fragment with 2 mutations in the PvuII recognition sequence 1727-1732 and studied the rescue by RFLP/PCR of a few copies of this 'PvuII mutant standard'. Following amplification with Taq-polymerase and cloning into lambda gt10, plaques containing wild-type sequence, PvuII mutant standard or Taq-polymerase induced bp changes were quantitated by hybridization with specific oligonucleotide probes. Our results indicate that 10 PvuII mutant standard copies can be rescued from 10(8) to 10(9) wild-type sequences. Taq polymerase errors originating from unrestricted, residual wild-type DNA were sequence dependent and consisted mostly of transversions originating at G.C bp. In contrast to a doubly mutated 'standard' the capacity to rescue single bp mutations by RFLP/PCR is limited by Taq-polymerase errors. Therefore, we assessed the capacity of our protocol to isolate a G to T transversion mutation at base pair 1698 of the MspI-site 1695-1698 of the c-Ha-ras1 gene from excess wild-type ras1 DNA. We found that 100 copies of the mutated ras1 fragment could be readily rescued from 10(8) copies of wild-type DNA.