921 resultados para Pattern recognition multivariate SIMCA
Resumo:
Il termine cloud ha origine dal mondo delle telecomunicazioni quando i provider iniziarono ad utilizzare servizi basati su reti virtuali private (VPN) per la comunicazione dei dati. Il cloud computing ha a che fare con la computazione, il software, l’accesso ai dati e servizi di memorizzazione in modo tale che l’utente finale non abbia idea della posizione fisica dei dati e la configurazione del sistema in cui risiedono. Il cloud computing è un recente trend nel mondo IT che muove la computazione e i dati lontano dai desktop e dai pc portatili portandoli in larghi data centers. La definizione di cloud computing data dal NIST dice che il cloud computing è un modello che permette accesso di rete on-demand a un pool condiviso di risorse computazionali che può essere rapidamente utilizzato e rilasciato con sforzo di gestione ed interazione con il provider del servizio minimi. Con la proliferazione a larga scala di Internet nel mondo le applicazioni ora possono essere distribuite come servizi tramite Internet; come risultato, i costi complessivi di questi servizi vengono abbattuti. L’obbiettivo principale del cloud computing è utilizzare meglio risorse distribuite, combinarle assieme per raggiungere un throughput più elevato e risolvere problemi di computazione su larga scala. Le aziende che si appoggiano ai servizi cloud risparmiano su costi di infrastruttura e mantenimento di risorse computazionali poichè trasferiscono questo aspetto al provider; in questo modo le aziende si possono occupare esclusivamente del business di loro interesse. Mano a mano che il cloud computing diventa più popolare, vengono esposte preoccupazioni riguardo i problemi di sicurezza introdotti con l’utilizzo di questo nuovo modello. Le caratteristiche di questo nuovo modello di deployment differiscono ampiamente da quelle delle architetture tradizionali, e i meccanismi di sicurezza tradizionali risultano inefficienti o inutili. Il cloud computing offre molti benefici ma è anche più vulnerabile a minacce. Ci sono molte sfide e rischi nel cloud computing che aumentano la minaccia della compromissione dei dati. Queste preoccupazioni rendono le aziende restie dall’adoperare soluzioni di cloud computing, rallentandone la diffusione. Negli anni recenti molti sforzi sono andati nella ricerca sulla sicurezza degli ambienti cloud, sulla classificazione delle minacce e sull’analisi di rischio; purtroppo i problemi del cloud sono di vario livello e non esiste una soluzione univoca. Dopo aver presentato una breve introduzione sul cloud computing in generale, l’obiettivo di questo elaborato è quello di fornire una panoramica sulle vulnerabilità principali del modello cloud in base alle sue caratteristiche, per poi effettuare una analisi di rischio dal punto di vista del cliente riguardo l’utilizzo del cloud. In questo modo valutando i rischi e le opportunità un cliente deve decidere se adottare una soluzione di tipo cloud. Alla fine verrà presentato un framework che mira a risolvere un particolare problema, quello del traffico malevolo sulla rete cloud. L’elaborato è strutturato nel modo seguente: nel primo capitolo verrà data una panoramica del cloud computing, evidenziandone caratteristiche, architettura, modelli di servizio, modelli di deployment ed eventuali problemi riguardo il cloud. Nel secondo capitolo verrà data una introduzione alla sicurezza in ambito informatico per poi passare nello specifico alla sicurezza nel modello di cloud computing. Verranno considerate le vulnerabilità derivanti dalle tecnologie e dalle caratteristiche che enucleano il cloud, per poi passare ad una analisi dei rischi. I rischi sono di diversa natura, da quelli prettamente tecnologici a quelli derivanti da questioni legali o amministrative, fino a quelli non specifici al cloud ma che lo riguardano comunque. Per ogni rischio verranno elencati i beni afflitti in caso di attacco e verrà espresso un livello di rischio che va dal basso fino al molto alto. Ogni rischio dovrà essere messo in conto con le opportunità che l’aspetto da cui quel rischio nasce offre. Nell’ultimo capitolo verrà illustrato un framework per la protezione della rete interna del cloud, installando un Intrusion Detection System con pattern recognition e anomaly detection.
Resumo:
Implementazione di un prototipo di un sistema di monitoraggio delle apnee notturne su un soggetto attraverso uno stetoscopio elettronico.
Resumo:
Neutrophile Granulozyten spielen eine wichtige Rolle in der ersten Phase der Inflammation. Sie infiltrieren den Infektionsort um den eingedrungenen Erreger zu bekämpfen und Ihre Effektor Funktion auszuführen. Neben den Mustererkennenden Rezeptoren des angeborenen Immunsystems (pattern recognition receptors) werden weitere Rezeptoren auf der Oberfläche von neutrophilen Granulozyten exprimiert, welche zur Aktivierung der Zelle beitragen können. In dieser arbeit wurden der Herpes Virus Entry Mediator (HVEM) und Triggering Receptor expressed on Myeloid Cells-1 (TREM-1) auf neutrophilen untersucht. Für HVEM konnte eine synergistische Aktivierung von neutrophilen Granulozyten im Zusammenspiel mit Toll like Rezeptor (TLR) Liganden nachgewiesen werden. Für TREM-1 konnte ein Vorhandensein eines Liganden auch Thrombozyten beschrieben. Es wurden weiterhin Mechanismen untersucht und beschrieben, welche für die synergistische Aktivierung von neutrophilen Granulozyten verantwortlich sind, welche nach TREM-1 und TLR Stimulation erkennbar ist.
Resumo:
Survivin, a unique member of the family of inhibitors of apoptosis (IAP) proteins, orchestrates intracellular pathways during cell division and apoptosis. Its central regulatory function in vertebrate molecular pathways as mitotic regulator and inhibitor of apoptotic cell death has major implications for tumor cell proliferation and viability, and has inspired several approaches that target survivin for cancer therapy. Analyses in early-branching Metazoa so far propose an exclusive role of survivin as a chromosomal passenger protein, whereas only later during evolution the second, complementary antiapoptotic function might have arisen, concurrent with increased organismal complexity. To lift the veil on the ancestral function(s) of this key regulatory molecule, a survivin homologue of the phylogenetically oldest extant metazoan taxon (phylum Porifera) was identified and functionally characterized. SURVL of the demosponge Suberites domuncula shares significant similarities with its metazoan homologues, ranging from conserved exon/intron structures to the presence of localization signal and protein-interaction domains, characteristic of IAP proteins. Whereas sponge tissue displayed a very low steady-state level, SURVL expression was significantly up-regulated in rapidly proliferating primmorph cells. In addition, challenge of sponge tissue and primmorphs with cadmium and the lipopeptide Pam3Cys-Ser-(Lys)4 stimulated SURVL expression, concurrent with the expression of newly discovered poriferan caspases (CASL and CASL2). Complementary functional analyses in transfected HEK-293 revealed that heterologous expression of poriferan survivin in human cells not only promotes cell proliferation but also augments resistance to cadmium-induced cell death. Taken together, these results demonstrate both a deep evolutionary conserved and fundamental dual role of survivin, and an equally conserved central position of this key regulatory molecule in interconnected pathways of cell cycle and apoptosis. Additionally, SDCASL, SDCASL2, and SDTILRc (TIR-LRR containing protein) may represent new components of the innate defense sentinel in sponges. SDCASL and SDCASL2 are two new caspase-homolog proteins with a singular structure. In addition to their CASc domains, SDCASL and SDCASL2 feature a small prodomain NH2-terminal (effector caspases) and a remarkably long COOH-terminal domain containing one or several functional double stranded RNA binding domains (dsrm). This new caspase prototype can characterize a caspase specialization coupling pathogen sensing and apoptosis, and could represent a very efficient defense mechanism. SDTILRc encompasses also a unique combination of domains: several leucine rich repeats (LRR) and a Toll/IL-1 receptor (TIR) domain. This unusual domain association may correspond to a new family of intracellular sensing protein, forming a subclass of pattern recognition receptors (PRR).
Resumo:
In the first part of my thesis I studied the mechanism of initiation of the innate response to HSV-1. Innate immune response is the first line of defense set up by the cell to counteract pathogens infection and it is elicited by the activation of a number of membrane or intracellular receptors and sensors, collectively indicated as PRRs, Patter Recognition Receptors. We reported that the HSV pathogen-associated molecular patterns (PAMP) that activate Toll-like receptor 2 (TLR2) and lead to the initiation of innate response are the virion glycoproteins gH/gL and gB, which constitute the conserved fusion core apparatus across the Herpesvirus. Specifically gH/gL is sufficient to initiate a signaling cascade which leads to NF-κB activation. Then, by gain and loss-of-function approaches, we found that αvβ3-integrin is a sensor of and plays a crucial role in the innate defense against HSV-1. We showed that αvβ3-integrin signals through a pathway that concurs with TLR2, affects activation/induction of interferons type 1, NF-κB, and a polarized set of cytokines and receptors. Thus, we demonstrated that gH/gL is sufficient to induce IFN1 and NF-κB via this pathway. From these data, we proposed that αvβ3-integrin is considered a class of non-TLR pattern recognition receptors. In the second part of my thesis I studied the capacity of human mesenchymal stromal cells isolated by fetal membranes (FM-hMSCs) to be used as carrier cells for the delivery of retargeted R-LM249 virus. The use of systemically administrated carrier cells to deliver oncolytic viruses to tumoral targets is a promising strategy in oncolytic virotherapy. We observed that FM-hMSCs can be infected by R-LM249 and we optimized the infection condition; then we demonstrate that stromal cells sustain the replication of retargeted R-LM249 and spread it to target tumoral cells. From these preliminary data FM-hMSCs resulted suitable to be used as carrier cells
Resumo:
In der Erdöl– und Gasindustrie sind bildgebende Verfahren und Simulationen auf der Porenskala im Begriff Routineanwendungen zu werden. Ihr weiteres Potential lässt sich im Umweltbereich anwenden, wie z.B. für den Transport und Verbleib von Schadstoffen im Untergrund, die Speicherung von Kohlendioxid und dem natürlichen Abbau von Schadstoffen in Böden. Mit der Röntgen-Computertomografie (XCT) steht ein zerstörungsfreies 3D bildgebendes Verfahren zur Verfügung, das auch häufig für die Untersuchung der internen Struktur geologischer Proben herangezogen wird. Das erste Ziel dieser Dissertation war die Implementierung einer Bildverarbeitungstechnik, die die Strahlenaufhärtung der Röntgen-Computertomografie beseitigt und den Segmentierungsprozess dessen Daten vereinfacht. Das zweite Ziel dieser Arbeit untersuchte die kombinierten Effekte von Porenraumcharakteristika, Porentortuosität, sowie die Strömungssimulation und Transportmodellierung in Porenräumen mit der Gitter-Boltzmann-Methode. In einer zylindrischen geologischen Probe war die Position jeder Phase auf Grundlage der Beobachtung durch das Vorhandensein der Strahlenaufhärtung in den rekonstruierten Bildern, das eine radiale Funktion vom Probenrand zum Zentrum darstellt, extrahierbar und die unterschiedlichen Phasen ließen sich automatisch segmentieren. Weiterhin wurden Strahlungsaufhärtungeffekte von beliebig geformten Objekten durch einen Oberflächenanpassungsalgorithmus korrigiert. Die Methode der „least square support vector machine” (LSSVM) ist durch einen modularen Aufbau charakterisiert und ist sehr gut für die Erkennung und Klassifizierung von Mustern geeignet. Aus diesem Grund wurde die Methode der LSSVM als pixelbasierte Klassifikationsmethode implementiert. Dieser Algorithmus ist in der Lage komplexe geologische Proben korrekt zu klassifizieren, benötigt für den Fall aber längere Rechenzeiten, so dass mehrdimensionale Trainingsdatensätze verwendet werden müssen. Die Dynamik von den unmischbaren Phasen Luft und Wasser wird durch eine Kombination von Porenmorphologie und Gitter Boltzmann Methode für Drainage und Imbibition Prozessen in 3D Datensätzen von Böden, die durch synchrotron-basierte XCT gewonnen wurden, untersucht. Obwohl die Porenmorphologie eine einfache Methode ist Kugeln in den verfügbaren Porenraum einzupassen, kann sie dennoch die komplexe kapillare Hysterese als eine Funktion der Wassersättigung erklären. Eine Hysterese ist für den Kapillardruck und die hydraulische Leitfähigkeit beobachtet worden, welche durch die hauptsächlich verbundenen Porennetzwerke und der verfügbaren Porenraumgrößenverteilung verursacht sind. Die hydraulische Konduktivität ist eine Funktion des Wassersättigungslevels und wird mit einer makroskopischen Berechnung empirischer Modelle verglichen. Die Daten stimmen vor allem für hohe Wassersättigungen gut überein. Um die Gegenwart von Krankheitserregern im Grundwasser und Abwässern vorhersagen zu können, wurde in einem Bodenaggregat der Einfluss von Korngröße, Porengeometrie und Fluidflussgeschwindigkeit z.B. mit dem Mikroorganismus Escherichia coli studiert. Die asymmetrischen und langschweifigen Durchbruchskurven, besonders bei höheren Wassersättigungen, wurden durch dispersiven Transport aufgrund des verbundenen Porennetzwerks und durch die Heterogenität des Strömungsfeldes verursacht. Es wurde beobachtet, dass die biokolloidale Verweilzeit eine Funktion des Druckgradienten als auch der Kolloidgröße ist. Unsere Modellierungsergebnisse stimmen sehr gut mit den bereits veröffentlichten Daten überein.
Resumo:
The incorporation of modified nucleotides into ribonucleic acids (RNAs) is important for their structure and proper function. These modifications are inserted by distinct catalytic macromolecules one of them being Dnmt2. It methylates the Cytidine (C) at position 38 in tRNA to 5-methylcytidine (m5C). Dnmt2 has been a paradigm in this respect, because all of its nearest neighbors in evolution are DNA-cytosine C5-methyltransferases and methylate DNA, while its (own) DNA methyltransferase activity is the subject of controversial reports with rates varying between zero and very weak. This work determines whether the biochemical potential for DNA methylation is present in the enzyme. It was discovered that DNA fragments, when presented as covalent RNA:DNA hybrids in the structural context of a tRNA, can be more efficiently methylated than the corresponding natural tRNA substrate. Additional minor deviations from a native tRNA structure that were seen to be tolerated by Dnmt2 were used for a stepwise development of a composite system of guide RNAs that enable the enzyme to perform cytidine methylation on single stranded DNA in vitro. Furthermore, a proof-of-principle is presented for utilizing the S-adenosyl methionine-analog cofactor SeAdoYn with Dnmt2 to search for new possible substrates in a SELEX-like approach.rnIn innate immunity, nucleic acids can function as pathogen associated molecular patterns (PAMPs) recognized by pattern recognition receptors (PRRs). The modification pattern of RNA is the discriminating factor for toll-like receptor 7 (TLR7) to distinguish between self and non-self RNA of invading pathogens. It was found that a 2'-O-methylated guanosine (Gm) at position18, naturally occurring at this position in some tRNAs, antagonizes recognition by TLR7. In the second part of this work it is pointed out, that recognition extends to the next downstream nucleotide and the effectively recognized molecular detail is actually a methylated dinucleotide. The immune silencing effect of the ribose methylation is most pronounced if the dinucleotide motif is composed of purin nucleobases whereas pyrimidines diminish the effect. Similar results were obtained when the Gm modification was transposed into other tRNA domains. Point mutations abolishing base pairings important for a proper tertiary structure had no effect on the immune stimulatory potential of a Gm modified tRNA. Taken together these results suggest a processive type of RNA inspection by TLR7.rn
Resumo:
Toll-like receptors are a group of pattern-recognition receptors that play a crucial role in "danger" recognition and induction of the innate immune response against bacterial and viral infections. TLR3 has emerged as a key sensor of viral dsRNA, resulting in the induction of the anti-viral molecule, IFN- . Thus, a clearer understanding of the biological processes that modulate TLR3 signaling is essential. Previous studies have shown that the TLR adaptor, Mal/TIRAP, an activator of TLR4, inhibits TLR3-mediated IFN- induction through a mechanism involving IRF7. In this study, we sought to investigate whether the TLR adaptor, MyD88, an activator of all TLRs except TLR3, has the ability to modulate TLR3 signaling. Although MyD88 does not significantly affect TLR3 ligand-induced TNF- induction, MyD88 negatively regulates TLR3-, but not TLR4-, mediated IFN- and RANTES production; this process is mechanistically distinct from that employed by Mal/TIRAP. We show that MyD88 inhibits IKK -, but not TBK1-, induced activation of IRF3. In doing so, MyD88 curtails TLR3 ligand-induced IFN- induction. The present study shows that while MyD88 activates all TLRs except TLR3, MyD88 also functions as a negative regulator of TLR3. Thus, MyD88 is essential in restricting TLR3 signaling, thereby protecting the host from unwanted immunopathologies associated with the excessive production of IFN- . Our study offers a new role for MyD88 in restricting TLR3 signaling through a hitherto unknown mechanism whereby MyD88 specifically impairs IKK -mediated induction of IRF3 and concomitant IFN- and RANTES production.
Resumo:
Pentraxin 3 (PTX3) is a soluble pattern recognition molecule playing a nonredundant role in resistance against Aspergillus fumigatus. The present study was designed to investigate the molecular pathways involved in the opsonic activity of PTX3. The PTX3 N-terminal domain was responsible for conidia recognition, but the full-length molecule was necessary for opsonic activity. The PTX3-dependent pathway of enhanced neutrophil phagocytic activity involved complement activation via the alternative pathway; Fc receptor (Fc R) IIA/CD32 recognition of PTX3-sensitized conidia and complement receptor 3 (CR3) activation; and CR3 and CD32 localization to the phagocytic cup. Gene targeted mice (ptx3, FcR common chain, C3, C1q) validated the in vivo relevance of the pathway. In particular, the protective activity of exogenous PTX3 against A fumigatus was abolished in FcR common chain-deficient mice. Thus, the opsonic and antifungal activity of PTX3 is at the crossroad between complement, complement receptor 3-, and Fc R-mediated recognition. Because short pentraxins (eg, C-reactive protein) interact with complement and Fc R, the present results may have general significance for the mode of action of these components of the humoral arm of innate immunity.
Resumo:
M-ficolin (ficolin-1) is a complement-activating pattern-recognition molecule structurally related to mannan-binding lectin. It is produced by monocytes and neutrophils, and is found in serum. Its biological role is largely unknown. We assessed M-ficolin concentration in serum from pediatric cancer patients. The aim of this study was to explore association of M-ficolin with clinical and hematological parameters, and to investigate whether the risk of chemotherapy-related infections was related to M-ficolin concentrations in serum.