211 research outputs found

    Preliminary design of a hybrid electric powertrain for a earthmoving machine

    Get PDF
    The goal of this work is to evaluate the benefit of the hybridization of a Compact Wheel Loader (CWL) and to put into evidence the effect of the component size on its performance. To do this, a mathematical model has been developed using a backward approach, i.e. starting from the power request on a typical duty cycle made available by an industrial partner. The goals for the choice of the hybridization architecture were: minimizing fuel consumption, ensuring the simplicity of driveline and power management and ensuring compatibility with the vehicle structure.. A reduction up to 14% of fuel consumption was estimated in this investigation by combining engine downsizing with the usage of a Continuous Variable Transmission together with an optimization of the battery capacity and voltage

    NLP-Based Techniques for Cyber Threat Intelligence

    Full text link
    In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior. Currently, CTI is assuming an always more crucial role in identifying and mitigating threats and enabling proactive defense strategies. In this context, NLP, an artificial intelligence branch, has emerged as a powerful tool for enhancing threat intelligence capabilities. This survey paper provides a comprehensive overview of NLP-based techniques applied in the context of threat intelligence. It begins by describing the foundational definitions and principles of CTI as a major tool for safeguarding digital assets. It then undertakes a thorough examination of NLP-based techniques for CTI data crawling from Web sources, CTI data analysis, Relation Extraction from cybersecurity data, CTI sharing and collaboration, and security threats of CTI. Finally, the challenges and limitations of NLP in threat intelligence are exhaustively examined, including data quality issues and ethical considerations. This survey draws a complete framework and serves as a valuable resource for security professionals and researchers seeking to understand the state-of-the-art NLP-based threat intelligence techniques and their potential impact on cybersecurity

    Development and application of a novel cervical lymph collection method to assess lymphatic transport in rats

    Get PDF
    Background: Fluids, solutes and immune cells have been demonstrated to drain from the brain and surrounding structures to the cervical lymph vessels and nodes in the neck via meningeal lymphatics, nasal lymphatics and/or lymphatic vessels associated with cranial nerves. A method to cannulate the efferent cervical lymph duct for continuous cervical lymph fluid collection in rodents has not been described previously and would assist in evaluating the transport of molecules and immune cells from the head and brain via the lymphatics, as well as changes in lymphatic transport and lymph composition with different physiological challenges or diseases.Aim: To develop a novel method to cannulate and continuously collect lymph fluid from the cervical lymph duct in rats and to analyze the protein, lipid and immune cell composition of the collected cervical lymph fluid.Methods: Male Sprague-Dawley rats were cannulated at the carotid artery with or without cannulation or ligation at the cervical lymph duct. Samples of blood, whole lymph and isolated lipoprotein fractions of lymph were collected and analyzed for lipid and protein composition using commercial kits. Whole lymph samples were centrifuged and isolated pellets were stained and processed for flow cytometry analysis of CD3+, CD4+, CD8a+, CD45R+ (B220) and viable cell populations.Results: Flow rate, phospholipid, triglyceride, cholesterol ester, free cholesterol and protein concentrations in cervical lymph were 0.094 ± 0.014 mL/h, 0.34 ± 0.10, 0.30 ± 0.04, 0.07 ± 0.02, 0.02 ± 0.01 and 16.78 ± 2.06 mg/mL, respectively. Protein was mostly contained within the non-lipoprotein fraction but all lipoprotein types were also present. Flow cytometry analysis of cervical lymph showed that 67.1 ± 7.4% of cells were CD3+/CD4+ T lymphocytes, 5.8 ± 1.6% of cells were CD3+/CD8+ T lymphocytes, and 10.8 ± 4.6% of cells were CD3-/CD45R+ B lymphocytes. The remaining 16.3 ± 4.6% cells were CD3-/CD45- and identified as non-lymphocytes.Conclusion: Our novel cervical lymph cannulation method enables quantitative analysis of the lymphatic transport of immune cells and molecules in the cervical lymph of rats for the first time. This valuable tool will enable more detailed quantitative analysis of changes to cervical lymph composition and transport in health and disease, and could be a valuable resource for discovery of biomarkers or therapeutic targets in future studies

    Prognostic value of circulating tumor cells in nonmuscle invasive bladder cancer: a CellSearch analysis

    Get PDF
    Background: Circulating tumor cells (CTCs) provide prognostic information in patients with metastatic tumors. Recent studies have shown that CTCs are released in circulation in an early phase of cancer disease so that their presence is under investigation in the adjuvant setting. Few studies investigated the prognostic significance of CTCs enumeration in patients with metastatic and advanced bladder cancer. The current study has analyzed the presence of CTC in patients with nonmuscle-invasive bladder cancer (NMIBC). Patients and methods: Forty-four NMIBC patients were enrolled and included in a 24-month follow-up program. Blood drawings were carried out in all patients at the first diagnosis. CellSearch system (Veridex; LLC, Raritan, NJ) was used for CTCs enumeration. Results: CTC were detectable in 8/44 patients (18%). Presence of CTC was found significantly associated to shorter time to first recurrence (6.5 versus 21.7 months, P < 0.001). Median time to progression was not reached, due to the short follow-up period. CTC presence was found associated to concomitant carcinoma in situ and higher T category. Conclusion: The detection of CTC in this setting of disease may allow to distinguish patients with high risk of recurrence from those with high risk of progression, as well as to early identify patients candidate for adjuvant treatment

    Lysine to arginine mutagenesis of chlorotoxin enhances its cellular uptake

    Get PDF
    Chlorotoxin (CTX), a disulfide-rich peptide from the scorpion Leiurus qu'mquestriatus, has several promising biopharmaceutical properties, including preferential affinity for certain cancer cells, high serum stability, and cell penetration. These properties underpin its potential for use as a drug design scaffold, especially for the treatment of cancer; indeed, several analogs of CTX have reached clinical trials. Here, we focus on its ability to internalize into cells-a trait associated with a privileged subclass of peptides called cell-penetrating peptides-and whether it can be improved through conservative substitutions. Mutants of CTX were made using solid-phase peptide synthesis and internalization into human cervical carcinoma (HeLa) cells was monitored by fluorescence and confocal microscopy. CTX_M1 (ie, [K15R/K23R]CTX) and CTX_M2 (ie, [K15R/K23R/Y29W]CTX) mutants showed at least a twofold improvement in uptake compared to CTX. We further showed that these mutants internalize into HeLa cells largely via an energy-dependent mechanism. Importantly, the mutants have high stability, remaining intact in serum for over 24 h; thus, retaining the characteristic stability of their parent peptide. Overall, we have shown that simple conservative substitutions can enhance the cellular uptake of CTX, suggesting that such type of mutations might be useful for improving uptake of other peptide toxins

    Agentic learning: the pedagogical implications of young trans people’s online learning strategies

    Get PDF
    This paper proposes anew conceptualisation of learning in the age of the internet, increasing systemic rigidity of formal education and intensified media manipulation and partiality. Using empirical data and drawing on Social Activity Method it elaborates the different strategies young trans people recruit in their self-learning and contends that these constitute a type of learning where the control of pedagogy, the learning environment and the subject matter lies to a significant extent, with the learner, taking place in spaces free from the influence of hegemonic transphobia. This type of learning appears to constitute an effective but complex one. As, in this instance, the learning is taking place in a wider cultural environment where the subject matter is often suppressed and subject to ideological misrepresentation by hegemonic control of the public sphere, this study suggests that learning by providing learners with greater control over pedagogy and learning environment is effective
    • …
    corecore