18 research outputs found

    The Meningococcal Vaccine Candidate Neisserial Surface Protein A (NspA) Binds to Factor H and Enhances Meningococcal Resistance to Complement

    Get PDF
    Complement forms an important arm of innate immunity against invasive meningococcal infections. Binding of the alternative complement pathway inhibitor factor H (fH) to fH-binding protein (fHbp) is one mechanism meningococci employ to limit complement activation on the bacterial surface. fHbp is a leading vaccine candidate against group B Neisseria meningitidis. Novel mechanisms that meningococci employ to bind fH could undermine the efficacy of fHbp-based vaccines. We observed that fHbp deletion mutants of some meningococcal strains showed residual fH binding suggesting the presence of a second receptor for fH. Ligand overlay immunoblotting using membrane fractions from one such strain showed that fH bound to a ∼17 kD protein, identified by MALDI-TOF analysis as Neisserial surface protein A (NspA), a meningococcal vaccine candidate whose function has not been defined. Deleting nspA, in the background of fHbp deletion mutants, abrogated fH binding and mAbs against NspA blocked fH binding, confirming NspA as a fH binding molecule on intact bacteria. NspA expression levels vary among strains and expression correlated with the level of fH binding; over-expressing NspA enhanced fH binding to bacteria. Progressive truncation of the heptose (Hep) I chain of lipooligosaccharide (LOS), or sialylation of lacto-N-neotetraose LOS both increased fH binding to NspA-expressing meningococci, while expression of capsule reduced fH binding to the strains tested. Similar to fHbp, binding of NspA to fH was human-specific and occurred through fH domains 6–7. Consistent with its ability to bind fH, deleting NspA increased C3 deposition and resulted in increased complement-dependent killing. Collectively, these data identify a key complement evasion mechanism with important implications for ongoing efforts to develop meningococcal vaccines that employ fHbp as one of its components

    The Fuzzy Rough Set Approaches of Fuzzy Reasoning

    No full text
    In this paper, we present some new ideas for fuzzy reasoning from the viewpoint of fuzzy rough set. After introducing the existing research of fuzzy rough sets, we show that the well-known CRI method in fuzzy reasoning is just a special upper approximation operator in fuzzy rough set theory. We also develop some practical methods for fuzzy system by using lower approximation operators in fuzzy rough sets and compare them with the existing methods for fuzzy systemDepartment of ComputingRefereed conference pape

    Nesting one-against-one algorithm based on SVMs for pattern classification.

    Full text link
    Support vector machines (SVMs), which were originally designed for binary classifications, are an excellent tool for machine learning. For the multiclass classifications, they are usually converted into binary ones before they can be used to classify the examples. In the one-against-one algorithm with SVMs, there exists an unclassifiable region where the data samples cannot be classified by its decision function. This paper extends the one-against-one algorithm to handle this problem. We also give the convergence and computational complexity analysis of the proposed method. Finally, one-against-one, fuzzy decision function (FDF), and decision-directed acyclic graph (DDAG) algorithms and our proposed method are compared using five University of California at Irvine (UCI) data sets. The results report that the proposed method can handle the unclassifiable region better than others

    Nonlinear Canonical Correlation Analysis of fMRI Signals Using HDR Models

    No full text
    A nonlinear canonical correlation analysis (CCA) for detecting neural activation in fMRI data is proposed in this paper. We use the BOLD response based on the HDR models with various parameters as reference signals. Instead of characterizing the relationship between the paradigm and time series using the oversimplified linear model, we employ the kernel trick that maps the intensities of the voxels within a small cubic at each time point into a high-dimensional kernel space, where the linear combinations correspond to nonlinear ones in the original space. The experimental results show that the proposed nonlinear CCA can improve the detection performance of traditional linear CCADepartment of ComputingRefereed conference pape

    Fuzzy Matrix Computation for Fuzzy Information System to Reduce Attributes

    No full text
    Recently, many methods based on fuzzy rough sets are proposed to reduce fuzzy attributes. The common characteristic of these methods is that all of them are based on fuzzy equivalence relation. In other words, the underlying concept of rough sets, indispensability relation, is generalized to fuzzy equivalence relation. Here fuzzy equivalence relation is the binary relation, which is reflexive, symmetric and transitive. This paper tries to generalize the fuzzy equivalence relation to fuzzy similarity relation, which is more helpful to keeping the fuzzy information of initial data than fuzzy equivalence relation. Based on the fuzzy similarity relation, fuzzy matrix computation for information system is proposed which can be used to reduce fuzzy attributes. Firstly, fuzzy similarity relation who is isomorphic with the fuzzy similarity matrix is given as fuzzy indispensability relation. Then all the information of initial data, such as the similarity among objects and fuzzy inconsistence degree between two objects, can be represented by fuzzy similarity matrix. Secondly, by considering that the small perturbation of the fuzzy similarity matrix can be ignorable, we propose some basic concepts of knowledge reduction such as fuzzy attributes reduct, core and fuzzy significance of attributes etc in this paper. Thirdly, a heuristic algorithm based on the fuzzy significance of attributes is proposed to find close-to-minimal fuzzy attributes reduct. Finally, experimental comparisons with other methods of attributes reduction are given. The experimental results show that our method is feasible and effectiveDepartment of ComputingRefereed conference pape
    corecore