1,515 research outputs found
An Integrated Analytical Approach for the Characterization of Probiotic Strains in Food Supplements
Research surrounding health benefits from probiotics is becoming popular because of the increasing demand for safer products with protective and therapeutic effects. Proven benefits are species- or genus-specific; however, no certified assays are available for their characterization and quantification at the strain level in the food supplement industry. The objective of this study was to develop a strain-specific Real-time quantitative polymerase chain reaction (RT-qPCR)-based method to be implemented in routine tests for the identification and quantification of Bifidobacterium longum, Bifidobacterium animalis spp. lactis, Lactobacillus paracasei, Lactobacillus rhamnosus, Lactobacillus casei, Bifidobacterium breve, Lactobacillus acidophilus, Lactobacillus plantarum, and Lactobacillus helveticus, starting from a powder mixture of food supplements. The method optimization was carried out in combination with flow cytometry to compare results between the two strategies and implement the analytical workflow with the information also regarding cell viability. These assays were validated in accordance with the International Council for Harmonization of Technical Requirements for Pharmaceuticals for Human Use (ICH) criteria using the plate count enumeration as the gold standard reference. Briefly, probiotic DNAs were extracted from two powder food supplements. Strain-specific primers targeting unique sequence regions of 16S RNA were identified and amplified by RT-qPCR. Primers were tested for specificity, sensitivity, and efficiency. Both RT-qPCR and flow-cytometry methods described in our work for the quantification and identification of Lactobacillus and Bifidobacterium strains were specific, sensitive, and precise, showing better performances with respect to the morphological colony identification. This work demonstrated that RT-qPCR can be implemented in the quality control workflow of commercial probiotic products giving more standardized and effective results regarding species discrimination
Minimizing the Cost of 5G Network Slice Broker
Network slicing is a key enabler of the fifth-generation (5G) of mobile networks. It allows creating multiple logical networks, i.e. network slices, with heterogeneous requirements over a common underlying infrastructure. The underlying infrastructure is composed of heterogeneous resources, such as network and computational resources. These resources are owned and managed by various Infrastructure Providers (InPs). In network slicing, a new actor, called Slice Broker (SB), purchases resources from the various InPs to create the network slices. In this paper, we address the problem of the allocation of network slices. Our target is to minimize the total cost of SB to acquire the resources from the InPs. The contributions are the following: (i) we define the addressed problem; (ii) we propose a heuristic solution to the problem; (iii) we evaluate the behavior of the proposed heuristic in various scenarios, and we compare it with a benchmark solution. The results show that a cost reduction from 60% to 80% is possible in all scenarios investigated.acceptedVersio
Resource allocation for cost minimization of a slice broker in a 5G-MEC scenario
The fifth generation (5G) of mobile networks may offer a custom logical and virtualized network called network slicing. This virtualization opens a new opportunity to share infrastructure resources and encourage cooperation between several Infrastructure Providers (InPs) to offer tailored network slices for the Slice Tenants (STs). The Slice Broker (SB) is emerging as intermediate entity that purchases resources from the InPs and it offers network slices to the STs. The main challenge of the SB is to jointly decide the purchase of heterogeneous (data and network) resources from multiple InPs and create the slices to meet the various requests from the STs. Being an economical entity, the target of the SB is to maximize its profit by minimizing the costs while satisfying all the ST requests. This paper formulated the SB cost minimization problem and used CPLEX to obtain the optimal solution. The problem formulation considers the realistic scenario that the InPs offer the computing, storage and network resources by using predetermined configurations. Therefore, for each of the computing platform and logical connection, the SB may select one of the configurations. The proposed cost-minimization problem is compared with three alternative problems that have three different objectives: computing platform consolidation, network connection consolidation, and both computing-network consolidation. The computing platform and network connection consolidation are currently the most common approaches for decreasing resource costs. However, the result shows that consolidating computing and network resources fails to reach the actual minimal cost. The proposed problem finds the cheapest solution, which can save at least 30% of the total cost of the other approaches in every evaluated scenario. Moreover, consolidating the number of computing platforms can lead to the most expensive solution, up to 40% higher than the optimal solution of our proposed problem.submittedVersio
Availability Model of a 5G-MEC System
Multi-access Edge Computing (MEC) is one of the enabling technologies of the
fifth generation (5G) of mobile networks. MEC enables services with strict
latency requirements by bringing computing capabilities close to the users. As
with any new technology, the dependability of MEC is one of the aspects that
need to be carefully studied. In this paper, we propose a two-level model to
compute the availability of a 5G-MEC system. We then use the model to evaluate
the availability of a 5G-MEC system under various configurations. The results
show that having a single redundancy of the 5G-MEC elements leads an acceptable
availability. To reach a high availability, the software failure intensity of
the management elements of 5G and MEC should be reduced.Comment: 10 pages, 11 figures, 3 tables. Accepted to be published at the 32nd
International Conference on Computer Communications and Networks (ICCCN 2023
Impact of SDN Controllers Deployment on Network Availability
Software-defined networking (SDN) promises to improve the programmability and
flexibility of networks, but it may bring also new challenges that need to be
explored. The purpose of this technical report is to assess how the deployment
of the SDN controllers affects the overall availability of SDN. For this, we
have varied the number, homing and location of SDN controllers. A two-level
modelling approach that is used to evaluate the availability of the studied
scenarios. Our results show how network operators can use the approach to find
the optimal cost implied by the connectivity of the SDN control platform by
keeping high levels of availability.Comment: Department of Telematics, NTNU, Tech. Rep., March 201
Role of glutathionylation in infection and inflammation
Glutathionylation, that is, the formation of mixed disulfides between protein cysteines and
glutathione (GSH) cysteines, is a reversible post-translational modification catalyzed by dierent
cellular oxidoreductases, by which the redox state of the cell modulates protein function. So far, most
studies on the identification of glutathionylated proteins have focused on cellular proteins, including
proteins involved in host response to infection, but there is a growing number of reports showing
that microbial proteins also undergo glutathionylation, with modification of their characteristics and
functions. In the present review, we highlight the signaling role of GSH through glutathionylation,
particularly focusing on microbial (viral and bacterial) glutathionylated proteins (GSSPs) and host
GSSPs involved in the immune/inflammatory response to infection; moreover, we discuss the
biological role of the process in microbial infections and related host responses
Counteraction of HCV-induced oxidative stress concurs to establish chronic infection in liver cell cultures
Hepatitis C virus (HCV) is a blood-borne pathogen causing acute and chronic hepatitis. A significant number of people chronically
infected with HCV develop cirrhosis and/or liver cancer. The pathophysiologic mechanisms of hepatocyte damage associated with
chronic HCV infection are not fully understood yet, mainly due to the lack of an in vitro system able to recapitulate the stages of
infection in vivo. Several studies underline that HCV virus replication depends on redox-sensitive cellular pathways; in addition, it
is known that virus itself induces alterations of the cellular redox state. However, the exact interplay between HCV replication and
oxidative stress has not been elucidated. In particular, the role of reduced glutathione (GSH) in HCV replication and infection is
still not clear. We set up an in vitro system, based on low m.o.i. of Huh7.5 cell line with a HCV infectious clone (J6/JFH1), that
reproduced the acute and persistent phases of HCV infection up to 76 days of culture. We demonstrated that the acute phase of
HCV infection is characterized by the elevated levels of reactive oxygen species (ROS) associated in part with an increase of
NADPH-oxidase transcripts and activity and a depletion of GSH accompanied by high rates of viral replication and apoptotic
cell death. Conversely, the chronic phase is characterized by a reestablishment of reduced environment due to a decreased ROS
production and increased GSH content in infected cells that might concur to the establishment of viral persistence. Treatment
with the prooxidant auranofin of the persistently infected cultures induced the increase of viral RNA titer, suggesting that a
prooxidant state could favor the reactivation of HCV viral replication that in turn caused cell damage and death. Our results
suggest that targeting the redox-sensitive host-cells pathways essential for viral replication and/or persistence may represent a
promising option for contrasting HCV infection
Resource Allocation in Networking and Computing Systems: A Security and Dependability Perspective
In recent years, there has been a trend to integrate networking and computing systems, whose management is getting increasingly complex. Resource allocation is one of the crucial aspects of managing such systems and is affected by this increased complexity. Resource allocation strategies aim to effectively maximize performance, system utilization, and profit by considering virtualization technologies, heterogeneous resources, context awareness, and other features. In such complex scenario, security and dependability are vital concerns that need to be considered in future computing and networking systems in order to provide the future advanced services, such as mission-critical applications. This paper provides a comprehensive survey of existing literature that considers security and dependability for resource allocation in computing and networking systems. The current research works are categorized by considering the allocated type of resources for different technologies, scenarios, issues, attributes, and solutions. The paper presents the research works on resource allocation that includes security and dependability, both singularly and jointly. The future research directions on resource allocation are also discussed. The paper shows how there are only a few works that, even singularly, consider security and dependability in resource allocation in the future computing and networking systems and highlights the importance of jointly considering security and dependability and the need for intelligent, adaptive and robust solutions. This paper aims to help the researchers effectively consider security and dependability in future networking and computing systems.publishedVersio
- …