940 resultados para enchancesprotective immunity
Resumo:
Innate immunity now occupies a central role in immunology. However, artificial immune system models have largely been inspired by adaptive not innate immunity. This paper reviews the biological principles and properties of innate immunity and, adopting a conceptual framework, asks how these can be incorporated into artificial models. The aim is to outline a meta-framework for models of innate immunity.
Resumo:
The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present the blueprint of a T-cell inspired algorithm for computer security worm detection. We show how the three central T-cell processes, namely T-cell maturation, differentiation and proliferation, naturally map into this domain and further illustrate how such an algorithm fits into a complete immune inspired computer security system and framework.
Resumo:
NlmCategory="UNASSIGNED">Glycolytic activity in T cells governs T cell responses by controlling various cellular processes, including proliferation, survival, and effector functions. We recently showed that the tumor microenvironment diminishes T cell antitumor responses by depriving glucose to infiltrating T cells. Moreover, metabolic rewiring tumor-reactive T cells sustain T cell metabolic fitness and antitumor responses.
Resumo:
This review summarizes the research progress made over the past decade in the field of gastropod immunity resulting from investigations of the interaction between the snail Biomphalaria glabrata and its trematode parasites. A combination of integrated approaches, including cellular, genetic and comparative molecular and proteomic approaches have revealed novel molecular components involved in mediating Biomphalaria immune responses that provide insights into the nature of host-parasite compatibility and the mechanisms involved in parasite recognition and killing. The current overview emphasizes that the interaction between B. glabrata and its trematode parasites involves a complex molecular crosstalk between numerous antigens, immune receptors, effectors and anti-effector systems that are highly diverse structurally and extremely variable in expression between and within host and parasite populations. Ultimately, integration of these molecular signals will determine the outcome of a specific interaction between a B. glabrata individual and its interacting trematodes. Understanding these complex molecular interactions and identifying key factors that may be targeted to impairment of schistosome development in the snail host is crucial to generating new alternative schistosomiasis control strategies.
Resumo:
A critical step during Bacillus anthracis infection is the outgrowth of germinated spores into vegetative bacilli that proliferate and disseminate rapidly within the host. An important challenge exists for developing chemotherapeutic agents that act upon and kill B. anthracis immediately after germination initiation when antibiotic resistance is lost, but prior to the outgrowth into vegetative bacilli, which is accompanied by toxin production. Chemical agents must also function in a manner refractive to the development of antimicrobial resistance. In this thesis we have identified the lantibiotics as a class of chemotherapeutics that are predicted to satisfy these two criteria. The objective of this thesis was to evaluate the efficacy of nisin, a prototypical lantibiotic, in prevention of outgrowth of germinated B. anthracis spores. Like all lantibiotics, nisin is a ribosomally translated peptide that undergoes post-translational modification to form (methyl)lanthionine rings that are critical for antimicrobial activity. Our studies indicate that nisin rapidly inhibits the in vitro outgrowth of germinated B. anthracis Sterne 7702 spores. Although germination initiation was shown to be essential for nisin-dependent antimicrobial activity, nisin did not inhibit or promote germination initiation. Nisin irreversibly killed germinated spores by blocking the establishment of a membrane potential and oxidative metabolism, while not affecting the dissolution of the outer spore structures. The membrane permeability of the spore was increased by nisin, but germinated spores did not undergo full lysis. Nisin was demonstrated to localize to lipid II, which is the penultimate precursor for cell wall biogenesis. This localization suggests two possible independent mechanisms of action, membrane pore formation and inhibition of peptidoglycan synthesis. Structure-activity studies with a truncated form of nisin lacking the two C-terminal (methyl)lanthionine rings and with non-pore forming mutants indicated that membrane disruption is essential for nisin-dependent inhibition of spore outgrowth to prevent membrane potential establishment. Finally, utilizing an in vitro infection model, it was shown that nisin reduced the viability of B. anthracis spores within an infection resulting in increased survival of immune cells while reducing infection-mediated cytokine expression. Fluorescence microscopy indicated that nisin localizes with spores within phagosomes of peritioneal macrophages in germinating conditions. These data demonstrate the effectiveness of nisin, as a model lantibiotic, for preventing spore outgrowth. It is speculated that nisin targeting of lipid II, resulting in membrane perturbations, may be effective at inhibiting the outgrowth of spores prepared from bacteria across a number of species.
Resumo:
Network Intrusion Detection Systems (NIDS) monitor a net- work with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS’s rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alerts, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to an intrusion detection problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.
Resumo:
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antigen and signals interacting within a tissue compartment. Input data to the tissue comes in the form of realtime events generated by sensors monitoring a system under surveillance, and cells are actively able to affect the monitored system through response mechanisms. libtissue is being used by researchers on a project at the University of Nottingham to explore the application of a range of immune-inspired algorithms to problems in intrusion detection. This talk describes the architecture and design of libtissue, along with the implementation of a simple algorithm and its application to a computer security problem.
Resumo:
In a previous paper the authors argued the case for incorporating ideas from innate immunity into artificial immune systems (AISs) and presented an outline for a conceptualframework for such systems. A number of key general properties observed in the biological innate and adaptive immune systems were highlighted, and how such properties might be instantiated in artificial systems was discussed in detail. The next logical step is to take these ideas and build a software system with which AISs with these properties can be implemented and experimentally evaluated. This paper reports on the results of that step - the libtissue system.
Resumo:
The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present the blueprint of a T-cell inspired algorithm for computer security worm detection. We show how the three central T-cell processes, namely T-cell maturation, differentiation and proliferation, naturally map into this domain and further illustrate how such an algorithm fits into a complete immune inspired computer security system and framework.
Resumo:
Innate immunity now occupies a central role in immunology. However, artificial immune system models have largely been inspired by adaptive not innate immunity. This paper reviews the biological principles and properties of innate immunity and, adopting a conceptual framework, asks how these can be incorporated into artificial models. The aim is to outline a meta-framework for models of innate immunity.