211 research outputs found
Preliminary design of a hybrid electric powertrain for a earthmoving machine
The goal of this work is to evaluate the benefit of the hybridization of a Compact Wheel Loader (CWL) and to put into evidence the effect of the component size on its performance. To do this, a mathematical model has been developed using a backward approach, i.e. starting from the power request on a typical duty cycle made available by an industrial partner. The goals for the choice of the hybridization architecture were: minimizing fuel consumption, ensuring the simplicity of driveline and power management and ensuring compatibility with the vehicle structure.. A reduction up to 14% of fuel consumption was estimated in this investigation by combining engine downsizing with the usage of a Continuous Variable Transmission together with an optimization of the battery capacity and voltage
NLP-Based Techniques for Cyber Threat Intelligence
In the digital era, threat actors employ sophisticated techniques for which,
often, digital traces in the form of textual data are available. Cyber Threat
Intelligence~(CTI) is related to all the solutions inherent to data collection,
processing, and analysis useful to understand a threat actor's targets and
attack behavior. Currently, CTI is assuming an always more crucial role in
identifying and mitigating threats and enabling proactive defense strategies.
In this context, NLP, an artificial intelligence branch, has emerged as a
powerful tool for enhancing threat intelligence capabilities. This survey paper
provides a comprehensive overview of NLP-based techniques applied in the
context of threat intelligence. It begins by describing the foundational
definitions and principles of CTI as a major tool for safeguarding digital
assets. It then undertakes a thorough examination of NLP-based techniques for
CTI data crawling from Web sources, CTI data analysis, Relation Extraction from
cybersecurity data, CTI sharing and collaboration, and security threats of CTI.
Finally, the challenges and limitations of NLP in threat intelligence are
exhaustively examined, including data quality issues and ethical
considerations. This survey draws a complete framework and serves as a valuable
resource for security professionals and researchers seeking to understand the
state-of-the-art NLP-based threat intelligence techniques and their potential
impact on cybersecurity
Circulating methylated DNA to monitor the dynamics of RAS mutation clearance in plasma from metastatic colorectal cancer patients
Development and application of a novel cervical lymph collection method to assess lymphatic transport in rats
Background: Fluids, solutes and immune cells have been demonstrated to drain from the brain and surrounding structures to the cervical lymph vessels and nodes in the neck via meningeal lymphatics, nasal lymphatics and/or lymphatic vessels associated with cranial nerves. A method to cannulate the efferent cervical lymph duct for continuous cervical lymph fluid collection in rodents has not been described previously and would assist in evaluating the transport of molecules and immune cells from the head and brain via the lymphatics, as well as changes in lymphatic transport and lymph composition with different physiological challenges or diseases.Aim: To develop a novel method to cannulate and continuously collect lymph fluid from the cervical lymph duct in rats and to analyze the protein, lipid and immune cell composition of the collected cervical lymph fluid.Methods: Male Sprague-Dawley rats were cannulated at the carotid artery with or without cannulation or ligation at the cervical lymph duct. Samples of blood, whole lymph and isolated lipoprotein fractions of lymph were collected and analyzed for lipid and protein composition using commercial kits. Whole lymph samples were centrifuged and isolated pellets were stained and processed for flow cytometry analysis of CD3+, CD4+, CD8a+, CD45R+ (B220) and viable cell populations.Results: Flow rate, phospholipid, triglyceride, cholesterol ester, free cholesterol and protein concentrations in cervical lymph were 0.094 ± 0.014 mL/h, 0.34 ± 0.10, 0.30 ± 0.04, 0.07 ± 0.02, 0.02 ± 0.01 and 16.78 ± 2.06 mg/mL, respectively. Protein was mostly contained within the non-lipoprotein fraction but all lipoprotein types were also present. Flow cytometry analysis of cervical lymph showed that 67.1 ± 7.4% of cells were CD3+/CD4+ T lymphocytes, 5.8 ± 1.6% of cells were CD3+/CD8+ T lymphocytes, and 10.8 ± 4.6% of cells were CD3-/CD45R+ B lymphocytes. The remaining 16.3 ± 4.6% cells were CD3-/CD45- and identified as non-lymphocytes.Conclusion: Our novel cervical lymph cannulation method enables quantitative analysis of the lymphatic transport of immune cells and molecules in the cervical lymph of rats for the first time. This valuable tool will enable more detailed quantitative analysis of changes to cervical lymph composition and transport in health and disease, and could be a valuable resource for discovery of biomarkers or therapeutic targets in future studies
RAS Mutation Conversion in Bevacizumab-Treated Metastatic Colorectal Cancer Patients: A Liquid Biopsy Based Study
Prognostic value of circulating tumor cells in nonmuscle invasive bladder cancer: a CellSearch analysis
Background: Circulating tumor cells (CTCs) provide prognostic information in patients with metastatic tumors.
Recent studies have shown that CTCs are released in circulation in an early phase of cancer disease so that their
presence is under investigation in the adjuvant setting. Few studies investigated the prognostic significance of CTCs
enumeration in patients with metastatic and advanced bladder cancer. The current study has analyzed the presence
of CTC in patients with nonmuscle-invasive bladder cancer (NMIBC).
Patients and methods: Forty-four NMIBC patients were enrolled and included in a 24-month follow-up program.
Blood drawings were carried out in all patients at the first diagnosis. CellSearch system (Veridex; LLC, Raritan, NJ) was
used for CTCs enumeration.
Results: CTC were detectable in 8/44 patients (18%). Presence of CTC was found significantly associated to shorter
time to first recurrence (6.5 versus 21.7 months, P < 0.001). Median time to progression was not reached, due to the
short follow-up period. CTC presence was found associated to concomitant carcinoma in situ and higher T category.
Conclusion: The detection of CTC in this setting of disease may allow to distinguish patients with high risk of
recurrence from those with high risk of progression, as well as to early identify patients candidate for adjuvant
treatment
Lysine to arginine mutagenesis of chlorotoxin enhances its cellular uptake
Chlorotoxin (CTX), a disulfide-rich peptide from the scorpion Leiurus qu'mquestriatus, has several promising biopharmaceutical properties, including preferential affinity for certain cancer cells, high serum stability, and cell penetration. These properties underpin its potential for use as a drug design scaffold, especially for the treatment of cancer; indeed, several analogs of CTX have reached clinical trials. Here, we focus on its ability to internalize into cells-a trait associated with a privileged subclass of peptides called cell-penetrating peptides-and whether it can be improved through conservative substitutions. Mutants of CTX were made using solid-phase peptide synthesis and internalization into human cervical carcinoma (HeLa) cells was monitored by fluorescence and confocal microscopy. CTX_M1 (ie, [K15R/K23R]CTX) and CTX_M2 (ie, [K15R/K23R/Y29W]CTX) mutants showed at least a twofold improvement in uptake compared to CTX. We further showed that these mutants internalize into HeLa cells largely via an energy-dependent mechanism. Importantly, the mutants have high stability, remaining intact in serum for over 24 h; thus, retaining the characteristic stability of their parent peptide. Overall, we have shown that simple conservative substitutions can enhance the cellular uptake of CTX, suggesting that such type of mutations might be useful for improving uptake of other peptide toxins
Agentic learning: the pedagogical implications of young trans people’s online learning strategies
This paper proposes anew conceptualisation of learning in the age of the internet, increasing systemic rigidity of formal education and intensified media manipulation and partiality. Using empirical data and drawing on Social Activity Method it elaborates the different strategies young trans people recruit in their self-learning and contends that these constitute a type of learning where the control of pedagogy, the learning environment and the subject matter lies to a significant extent, with the learner, taking place in spaces free from the influence of hegemonic transphobia. This type of learning appears to constitute an effective but complex one. As, in this instance, the learning is taking place in a wider cultural environment where the subject matter is often suppressed and subject to ideological misrepresentation by hegemonic control of the public sphere, this study suggests that learning by providing learners with greater control over pedagogy and learning environment is effective
- …