22,186 research outputs found

    Dual effect of Thymosin Ī± 1 on human monocyte-derived dendritic cellin vitrostimulated with viral and bacterial toll-like receptor agonists

    Get PDF
    OBJECTIVES: Thymosin Ī± 1 (TĪ±1) recently gained interest as immune adjuvant for vaccines because of its ability to modulate the T-cell/dendritic cell (DC) axis and to improve antibody production. The objective of this study was to determine whether TĪ±1 would address in vitro the response of human primary monocyte-derived DC, crucial regulators of vaccine-induced immunity, upon exposure to different toll-like receptor (TLR) agonists or infection with viruses or bacteria. METHODS: DC maturation and production of pro-inflammatory cytokines were analyzed. RESULTS: Our data revealed a dual effect of TĪ±1 on DC biology upon viral or bacterial stimulation. Interestingly, TĪ±1 enhanced human leukocyte antigen (HLA)-I and II surface expression and secretion of IL-6, TNF-Ī± and IL-8 when DCs were treated with viral TLR3 and TLR7/8 agonists. Similarly, in pandemic H1N1 influenza A-infected DCs, TĪ±1 raised the expression of maturation markers and type I and III Interferon (IFN). In contrast, following bacterial TLR2 and 4 stimulation, as well as upon Bacillus Calmette-Guerin infection, the presence of TĪ±1 in DC cultures drastically lowered the analyzed cellular parameters. CONCLUSION: The knowledge that TĪ±1 pleiotropic effect might ameliorate anti-viral immune responses and, at the same time, dampen inflammation caused by bacterial infections could lay the groundwork for a more appropriate therapeutic application of this molecule

    HLA high performance and real-time simulation studies with CERTI

    Get PDF
    Our work takes place in the context of the HLA standard and its application in real-time systems context. Indeed, current HLA standard is inadequate for taking into consideration the different constraints involved in real-time computer systems. Many works have been invested in order to provide real-time capabilities to Run Time Infrastructures (RTI). This paper describes our approach focusing on achieving hard real-time properties for HLA federations through a complete state of the art on the related domain. Our paper also proposes a global bottom up approach from basic hardware and software basic requirements to experimental tests for validation of distributed real-time simulation with CERTI

    Developing interest management techniques in distributed interactive simulation using Java

    Get PDF
    Bandwidth consumption in distributed real time simulation, or networked real time simulation, is a major problem as the number of participants and the sophistication of joint simulation exercises grow in size. The paper briefly reviews distributed real time simulation and bandwidth reduction techniques and introduces the Generic Runtime Infrastructure for Distributed Simulation (GRIDS) as a research architecture for studying such problems. GRIDS uses Java abstract classes to promote distributed services called thin agents, a novel approach to implementing distributed simulation services, such as user defined bandwidth reduction mechanisms, and to distributing the executable code across the simulation. Thin agents offer the advantages of traditional agents without the overhead imposed by mobility or continuous state, which are unnecessary in this context. We present our implementation and some predicted results from message reduction studies using thin agent

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability
    • ā€¦
    corecore