1000 resultados para Immunostimulating complex (Iscom)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Rhoptries have been isolated from Toxoplasma gondii tachyzoites by subcellular fractionation in isopynic density sucrose gradient. Five bands were observed, and transmission electron microscopy of these indicated that rhoptries were in band 3. This band had a density of 1.17g/cm(3). Fraction 1 had membrane structures of the parasite. Fraction 2 contained membranes and mitochondria (Fig. 1 B). Fraction 4 had mostly conoid structure (Fig. 2B) and fraction 5 showed ghosts. The electrophoretic and Western blotting analysis of the fractions indicated the presence of a number of proteins. Iscoms were constructed from band 3, which contained the rhoptry structures. Iscom showed a only protein incorporated of 55 kDa. Isolation of the parasite organelles has got in this work is necessary to identification, characterization, and function elucidation of the organelle proteins. (C) 2004 Elsevier B.V. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A vaccine containing crude Toxoplasma gondii rhoptry proteins incorporated in the immunostimulating complexes (ISCOM) adjuvant was tested in pigs for protecting against tissue cyst formation. For this, 38 mixed breed pigs were divided into four groups, G1 (vaccinated challenged, n = 10) received two doses (100 mu g/dose) of the rhoptry vaccine at days 0 and 21, G2 (vaccinated challenged, n = 10) received viable tachyzoites (7 x 10(7)) of the RH strain at day 0, G3 (unvaccinated challenged, n = 10) and G4 (unvaccinated unchallenged, n = 8). Pigs were challenged with 4 x 10(4) VEG strain oocysts 57 days later. The G1 pigs produced high IgG antibody levels in the indirect enzyme-linked immunosorbent assay (ELISA) after the second dose of rhoptry vaccine, but were not clinically protected against a high dose oocyst challenge. Partial protection was observed in G1 at the chronic phase of infection, when compared with G3. Pigs in group 2 developed high antibody levels and were protected against clinic signs. T gondii was not detected in two (G1) and three (G2) pigs by mouse bioassay. The results indicate partial protection in pigs vaccinated with a rhoptry vaccine. (c) 2005 Elsevier B.V. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Pseudo-ternary diagrams for Quil A, phospholipid (phosphatidylcholine (PC) or phosphatidylethanolamine (PE)) and cholesterol were established in order to identify combinations that result in the formation of immune-stimulating complex (ISCOM) matrices and other colloidal structures produced by these three components in aqueous systems following lipid-film hydration or dialysis (methods that can be used to produce ISCOMs). In addition, the effect of equilibration time (1 month at 4degreesC) on the structures formed by the various combinations of the three components was investigated. Depending on the ratio of Quil A, cholesterol and phospholipid, different colloidal particles, including ISCOM matrices, liposomes and ring-like micelles, were found irrespective of the preparation method used. In contrast, worm-like micelles were only observed in systems prepared by lipid-film hydration. For samples prepared by dialysis, ISCOM matrices were predominantly found near the Quil A apex of the pseudo-ternary diagram (> 50% Quil A). On the other hand, for samples prepared by lipid-film hydration, ISCOM matrices were predominantly found near the phospholipid apex of the pseudo-ternary diagram (> 50% phospholipid). The regions in the pseudo-ternary diagrams in which ISCOM matrices were observed increased following an extended equilibration time, particularly for samples prepared by lipid-film hydration. Differences were also observed between pseudoternary diagrams prepared using either PE or PC as phospholipids.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The application of spectroscopy to the study of contaminants in soils is important. Among the many contaminants is arsenic, which is highly labile and may leach to non-contaminated areas. Minerals of arsenate may form depending upon the availability of specific cations for example calcium and iron. Such minerals include carminite, pharmacosiderite and talmessite. Each of these arsenate minerals can be identified by its characteristic Raman spectrum enabling identification.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Engineering assets such as roads, rail, bridges and other forms of public works are vital to the effective functioning of societies {Herder, 2006 #128}. Proficient provision of this physical infrastructure is therefore one of the key activities of government {Lædre, 2006 #123}. In order to ensure engineering assets are procured and maintained on behalf of citizens, government needs to devise the appropriate policy and institutional architecture for this purpose. The changing institutional arrangements around the procurement of engineering assets are the focus of this paper. The paper describes and analyses the transition to new, more collaborative forms of procurement arrangements which are becoming increasingly prevalent in Australia and other OECD countries. Such fundamental shifts from competitive to more collaborative approaches to project governance can be viewed as a major transition in procurement system arrangements. In many ways such changes mirror the shift from New Public Management, with its emphasis on the use of market mechanisms to achieve efficiencies {Hood, 1991 #166}, towards more collaborative approaches to service delivery, such as those under network governance arrangements {Keast, 2007 #925}. However, just as traditional forms of procurement in a market context resulted in unexpected outcomes for industry, such as a fragmented industry afflicted by chronic litigation {Dubois, 2002 #9}, the change to more collaborative forms of procurement is unlikely to be a panacea to the problems of procurement, and may well also have unintended consequences. This paper argues that perspectives from complex adaptive systems (CAS) theory can contribute to the theory and practice of managing system transitions. In particular the concept of emergence provides a key theoretical construct to understand the aggregate effect that individual project governance arrangements can have upon the structure of specific industries, which in turn impact individual projects. Emergence is understood here as the macro structure that emerges out of the interaction of agents in the system {Holland, 1998 #100; Tang, 2006 #51}.