115 research outputs found

    Expression of AXL receptor tyrosine kinase relates to monocyte dysfunction and severity of cirrhosis

    Get PDF
    Infectious complications in patients with cirrhosis frequently initiate episodes of decompensation and substantially contribute to the high mortality. Mechanisms of the underlying immuneparesis remain underexplored. TAM receptors (TYRO3/AXL/MERTK) are important inhibitors of innate immune responses. To understand the pathophysiology of immuneparesis in cirrhosis, we detailed TAM receptor expression in relation to monocyte function and disease severity prior to the onset of acute decompensation. TNF-α/IL-6 responses to lipopolysaccharide were attenuated in monocytes from patients with cirrhosis (n = 96) compared with controls (n = 27) and decreased in parallel with disease severity. Concurrently, an AXL-expressing (AXL+) monocyte population expanded. AXL+ cells (CD14+CD16highHLA-DRhigh) were characterised by attenuated TNF-α/IL-6 responses and T cell activation but enhanced efferocytosis and preserved phagocytosis of Escherichia coli. Their expansion correlated with disease severity, complications, infection, and 1-yr mortality. AXL+ monocytes were generated in response to microbial products and efferocytosis in vitro. AXL kinase inhibition and down-regulation reversed attenuated monocyte inflammatory responses in cirrhosis ex vivo. AXL may thus serve as prognostic marker and deserves evaluation as immunotherapeutic target in cirrhosis

    The Non-linear Dynamics of Meaning-Processing in Social Systems

    Full text link
    Social order cannot be considered as a stable phenomenon because it contains an order of reproduced expectations. When the expectations operate upon one another, they generate a non-linear dynamics that processes meaning. Specific meaning can be stabilized, for example, in social institutions, but all meaning arises from a horizon of possible meanings. Using Luhmann's (1984) social systems theory and Rosen's (1985) theory of anticipatory systems, I submit equations for modeling the processing of meaning in inter-human communication. First, a self-referential system can use a model of itself for the anticipation. Under the condition of functional differentiation, the social system can be expected to entertain a set of models; each model can also contain a model of the other models. Two anticipatory mechanisms are then possible: one transversal between the models, and a longitudinal one providing the modeled systems with meaning from the perspective of hindsight. A system containing two anticipatory mechanisms can become hyper-incursive. Without making decisions, however, a hyper-incursive system would be overloaded with uncertainty. Under this pressure, informed decisions tend to replace the "natural preferences" of agents and an order of cultural expectations can increasingly be shaped

    Sociological and Communication-Theoretical Perspectives on the Commercialization of the Sciences

    Get PDF
    Both self-organization and organization are important for the further development of the sciences: the two dynamics condition and enable each other. Commercial and public considerations can interact and "interpenetrate" in historical organization; different codes of communication are then "recombined." However, self-organization in the symbolically generalized codes of communication can be expected to operate at the global level. The Triple Helix model allows for both a neo-institutional appreciation in terms of historical networks of university-industry-government relations and a neo-evolutionary interpretation in terms of three functions: (i) novelty production, (i) wealth generation, and (iii) political control. Using this model, one can appreciate both subdynamics. The mutual information in three dimensions enables us to measure the trade-off between organization and self-organization as a possible synergy. The question of optimization between commercial and public interests in the different sciences can thus be made empirical.Comment: Science & Education (forthcoming

    Exploring the Limits of Common Coins Using Frontier Analysis of Protocols

    Get PDF
    In 2-party secure computation, access to common, trusted randomness is a fundamental primitive. It is widely employed in the setting of computationally bounded players (under various complexity assumptions) to great advantage. In this work we seek to understand the power of trusted randomness, primarily in the computationally unbounded (or information theoretic) setting. We show that a source of common randomness does not add any additional power for secure evaluation of deterministic functions, even when one of the parties has arbitrary influence over the distribution of the common randomness. Further, common randomness helps only in a trivial sense for realizing randomized functions too (namely, it only allows for sampling from publicly fixed distributions), if UC security is required. To obtain these impossibility results, we employ a recently developed protocol analysis technique, which we call the {\em frontier analysis}. This involves analyzing carefully defined ``frontiers\u27\u27 in a weighted tree induced by the protocol\u27s execution (or executions, with various inputs), and establishing various properties regarding one or more such frontiers. We demonstrate the versatility of this technique by employing carefully chosen frontiers to derive the different results. To analyze randomized functionalities we introduce a frontier argument that involves a geometric analysis of the space of probability distributions. Finally, we relate our results to computational intractability questions. We give an equivalent formulation of the ``cryptomania assumption\u27\u27 (that there is a semi-honest or standalone secure oblivious transfer protocol) in terms of UC-secure reduction among randomized functionalities. Also, we provide an {\em unconditional result} on the uselessness of common randomness, even in the computationally bounded setting. Our results make significant progress towards understanding the exact power of shared randomness in cryptography. To the best of our knowledge, our results are the first to comprehensively characterize the power of large classes of randomized functionalities

    Plasticity of the β-Trefoil Protein Fold in the Recognition and Control of Invertebrate Predators and Parasites by a Fungal Defence System

    Get PDF
    Discrimination between self and non-self is a prerequisite for any defence mechanism; in innate defence, this discrimination is often mediated by lectins recognizing non-self carbohydrate structures and so relies on an arsenal of host lectins with different specificities towards target organism carbohydrate structures. Recently, cytoplasmic lectins isolated from fungal fruiting bodies have been shown to play a role in the defence of multicellular fungi against predators and parasites. Here, we present a novel fruiting body lectin, CCL2, from the ink cap mushroom Coprinopsis cinerea. We demonstrate the toxicity of the lectin towards Caenorhabditis elegans and Drosophila melanogaster and present its NMR solution structure in complex with the trisaccharide, GlcNAcβ1,4[Fucα1,3]GlcNAc, to which it binds with high specificity and affinity in vitro. The structure reveals that the monomeric CCL2 adopts a β-trefoil fold and recognizes the trisaccharide by a single, topologically novel carbohydrate-binding site. Site-directed mutagenesis of CCL2 and identification of C. elegans mutants resistant to this lectin show that its nematotoxicity is mediated by binding to α1,3-fucosylated N-glycan core structures of nematode glycoproteins; feeding with fluorescently labeled CCL2 demonstrates that these target glycoproteins localize to the C. elegans intestine. Since the identified glycoepitope is characteristic for invertebrates but absent from fungi, our data show that the defence function of fruiting body lectins is based on the specific recognition of non-self carbohydrate structures. The trisaccharide specifically recognized by CCL2 is a key carbohydrate determinant of pollen and insect venom allergens implying this particular glycoepitope is targeted by both fungal defence and mammalian immune systems. In summary, our results demonstrate how the plasticity of a common protein fold can contribute to the recognition and control of antagonists by an innate defence mechanism, whereby the monovalency of the lectin for its ligand implies a novel mechanism of lectin-mediated toxicity

    Fosmid library end sequencing reveals a rarely known genome structure of marine shrimp Penaeus monodon

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The black tiger shrimp (<it>Penaeus monodon</it>) is one of the most important aquaculture species in the world, representing the crustacean lineage which possesses the greatest species diversity among marine invertebrates. Yet, we barely know anything about their genomic structure. To understand the organization and evolution of the <it>P. monodon </it>genome, a fosmid library consisting of 288,000 colonies and was constructed, equivalent to 5.3-fold coverage of the 2.17 Gb genome. Approximately 11.1 Mb of fosmid end sequences (FESs) from 20,926 non-redundant reads representing 0.45% of the <it>P. monodon </it>genome were obtained for repetitive and protein-coding sequence analyses.</p> <p>Results</p> <p>We found that microsatellite sequences were highly abundant in the <it>P. monodon </it>genome, comprising 8.3% of the total length. The density and the average length of microsatellites were evidently higher in comparison to those of other taxa. AT-rich microsatellite motifs, especially poly (AT) and poly (AAT), were the most abundant. High abundance of microsatellite sequences were also found in the transcribed regions. Furthermore, <it>via </it>self-BlastN analysis we identified 103 novel repetitive element families which were categorized into four groups, <it>i.e</it>., 33 WSSV-like repeats, 14 retrotransposons, 5 gene-like repeats, and 51 unannotated repeats. Overall, various types of repeats comprise 51.18% of the <it>P. monodon </it>genome in length. Approximately 7.4% of the FESs contained protein-coding sequences, and the Inhibitor of Apoptosis Protein (IAP) gene and the Innexin 3 gene homologues appear to be present in high abundance in the <it>P. monodon </it>genome.</p> <p>Conclusions</p> <p>The redundancy of various repeat types in the <it>P. monodon </it>genome illustrates its highly repetitive nature. In particular, long and dense microsatellite sequences as well as abundant WSSV-like sequences highlight the uniqueness of genome organization of penaeid shrimp from those of other taxa. These results provide substantial improvement to our current knowledge not only for shrimp but also for marine crustaceans of large genome size.</p

    Athlete brand construction: A perspective based on fans’ perceptions

    Get PDF
    Abstract The purpose of this study was to develop a framework for understanding the antecedents and components of athlete brand. Based on a set of 21 interviews conducted in three different countries, a detailed framework is proposed including five antecedents and two components of athlete brand. The antecedents are media (social media, mass media, video games and major sport events), oral communications (word of mouth, and rumors and narratives), impression management, social agents (parents, family members, friends and community), and teams and sport (sport interest, team interest and team geographical location). In turn, the components of athlete brand are related with on-field attributes (behavior, team, achievements, style of play and skills) and off-field attributes (physical attraction, lifestyle, personal appeal, ethnicity and entertainment). Complementarily, these components of athlete brand are proposed to have an impact on fans' loyalty towards the athlete. Implications of these findings for building and managing athlete brand are discussed, and directions for future studies are provided

    Silencing of Vlaro2 for chorismate synthase revealed that the phytopathogen Verticillium longisporum induces the cross-pathway control in the xylem

    Get PDF
    The first leaky auxotrophic mutant for aromatic amino acids of the near-diploid fungal plant pathogen Verticillium longisporum (VL) has been generated. VL enters its host Brassica napus through the roots and colonizes the xylem vessels. The xylem contains little nutrients including low concentrations of amino acids. We isolated the gene Vlaro2 encoding chorismate synthase by complementation of the corresponding yeast mutant strain. Chorismate synthase produces the first branch point intermediate of aromatic amino acid biosynthesis. A novel RNA-mediated gene silencing method reduced gene expression of both isogenes by 80% and resulted in a bradytrophic mutant, which is a leaky auxotroph due to impaired expression of chorismate synthase. In contrast to the wild type, silencing resulted in increased expression of the cross-pathway regulatory gene VlcpcA (similar to cpcA/GCN4) during saprotrophic life. The mutant fungus is still able to infect the host plant B. napus and the model Arabidopsis thaliana with reduced efficiency. VlcpcA expression is increased in planta in the mutant and the wild-type fungus. We assume that xylem colonization requires induction of the cross-pathway control, presumably because the fungus has to overcome imbalanced amino acid supply in the xylem

    Secure Computation from Elastic Noisy Channels

    Get PDF
    Noisy channels enable unconditionally secure multi-party computation even against parties with unbounded computational power. But inaccurate noise estimation and adversarially determined channel characteristics render known protocols insecure. Such channels are known as unreliable noisy channels. A large body of work in the last three decades has attempted to construct secure multi-party computation from unreliable noisy channels, but this previous work has not been able to deal with most parameter settings. In this work, we study a form of unreliable noisy channels where the unreliability is one-sided, that we name elastic noisy channels: thus, in one form of elastic noisy channel, an adversarial receiver can increase the reception reliability unbeknown to the sender, but the sender cannot change the channel characteristic. Our work shows feasibility results for a large set of parameters for the elastic binary symmetric channel, significantly improving upon the best results obtainable using prior techniques. In a key departure from existing approaches, we use a more elemental correlated private randomness as an intermediate cryptographic primitive that exhibits only a rudimentary essence of oblivious transfer. Toward this direction, we introduce new information-theoretic techniques that are potentially applicable to other cryptographic settings involving unreliable noisy channels
    corecore