481 research outputs found

    Computational systems biology approach for permanent tumor elimination and normal tissue protection using negative biasing: Experimental validation in malignant melanoma as case study

    Get PDF
    Complete spontaneous tumor regression (without treatment) is well documented to occur in animals and humans as epidemiological analysis show, whereby the malignancy is permanently eliminated. We have developed a novel computational systems biology model for this unique phenomenon to furnish insight into the possibility of therapeutically replicating such regression processes on tumors clinically, without toxic side effects. We have formulated oncological informatics approach using cell-kinetics coupled differential equations while protecting normal tissue. We investigated three main tumor-lysis components: (ⅰ) DNA blockade factors, (ⅱ) Interleukin-2 (IL-2), and (ⅲ) Cytotoxic T-cells (CD8+ T). We studied the temporal variations of these factors, utilizing preclinical experimental investigations on malignant tumors, using mammalian melanoma microarray and histiocytoma immunochemical assessment. We found that permanent tumor regression can occur by: 1) Negative-Bias shift in population trajectory of tumor cells, eradicating them under first-order asymptotic kinetics, and 2) Temporal alteration in the three antitumor components (DNA replication-blockade, Antitumor T-lymphocyte, IL-2), which are respectively characterized by the following patterns: (a) Unimodal Inverted-U function, (b) Bimodal M-function, (c) Stationary-step function. These provide a time-wise orchestrated tri-phasic cytotoxic profile. We have also elucidated gene-expression levels corresponding to the above three components: (ⅰ) DNA-damage G2/M checkpoint regulation [genes: CDC2-CHEK], (ⅱ) Chemokine signaling: IL-2/15 [genes: IL2RG-IKT3], (ⅲ) T-lymphocyte signaling (genes: TRGV5-CD28). All three components quantitatively followed the same activation profiles predicted by our computational model (Smirnov-Kolmogorov statistical test satisfied, α = 5%). We have shown that the genes CASP7-GZMB are signatures of Negative-bias dynamics, enabling eradication of the residual tumor. Using the negative-biasing principle, we have furnished the dose-time profile of equivalent therapeutic agents (DNA-alkylator, IL-2, T-cell input) so that melanoma tumor may therapeutically undergo permanent extinction by replicating the spontaneous tumor regression dynamics

    Defects in Friction Stir Welding of Steel

    Get PDF
    Defects associated with friction stir welding of two steel grades including DH36 and EH46 were investigated. Different welding parameters including tool rotational and tool traverse (linear) speeds were applied to understand their effect on weld seam defects including microcracks and voids formation. SEM images and infinite focus microscopy were employed to identify the defects types. Two new defects associated with the friction stir welding process are introduced in this work. The first defect identified in this work is a microcrack found between the plunge and the steady state region and attributed to the traverse moving of the tool with unsuitable speed from the plunge-dwell to the steady state stage. The tool traverse speed has recommended to travel 20 mm more with accelerated velocity range of 0.1 from the maximum traverse speed until reaching the steady state. The maximum recommended traverse speed in the steady state was also suggested to be less than 400 mm/min in order to avoid the lack in material flow. The second type of defect observed in this work was microcracks inside the stirred zone caused by elemental precipitations of TiN. The precipitates of TiN were attributed to the high tool rotational speed which caused the peak temperature to exceed 1200 °C at the top of the stirred zone and based on previous work. The limit of tool rotational speed was recommended to be maintained in the range of 200-500 RPM based on the mechanical experiments on the FSW samples

    Does training with amplitude modulated tones affect tone-vocoded speech perception?

    Get PDF
    Temporal-envelope cues are essential for successful speech perception. We asked here whether training on stimuli containing temporal-envelope cues without speech content can improve the perception of spectrally-degraded (vocoded) speech in which the temporal-envelope (but not the temporal fine structure) is mainly preserved. Two groups of listeners were trained on different amplitude-modulation (AM) based tasks, either AM detection or AM-rate discrimination (21 blocks of 60 trials during two days, 1260 trials; frequency range: 4Hz, 8Hz, and 16Hz), while an additional control group did not undertake any training. Consonant identification in vocoded vowel-consonant-vowel stimuli was tested before and after training on the AM tasks (or at an equivalent time interval for the control group). Following training, only the trained groups showed a significant improvement in the perception of vocoded speech, but the improvement did not significantly differ from that observed for controls. Thus, we do not find convincing evidence that this amount of training with temporal-envelope cues without speech content provide significant benefit for vocoded speech intelligibility. Alternative training regimens using vocoded speech along the linguistic hierarchy should be explored

    A cross-layer architecture to improve mobile host rate performance and to solve unfairness problem in WLANs

    Get PDF
    The evolution of the Internet has been mainly promoted in recent years by the emergence and pro- liferation of wireless access networks towards a global ambient and pervasive network accessed from mobile devices. These new access networks have introduced new MAC layers independently of the legacy "wire- oriented" protocols that are still at the heart of the pro- tocol stacks of the end systems. This principle of isola- tion and independence between layers advocated by the OSI model has its drawbacks of maladjustment between new access methods and higher-level protocols built on the assumption of a wired Internet. In this paper, we introduce and deliver solutions for several pathologi- cal communication behaviors resulting from the malad- justment between WLAN MAC and higher layer stan- dard protocols such as TCP/IP and UDP/IP. Specially, based on an efficient analytical model for WLANs band- width estimation, we address in this paper the two fol- lowing issues: 1) Performance degradation due to the lack of flow control between the MAC and upper layer resulting in potential MAC buffer overflow; 2) Unfair bandwidth share issues between various type of flows. We show how these syndromes can be efficiently solved from neutral "cross layer" interactions which entail no changes in the considered protocols and standards

    Structural Analysis of a Repetitive Protein Sequence Motif in Strepsirrhine Primate Amelogenin

    Get PDF
    Strepsirrhines are members of a primate suborder that has a distinctive set of features associated with the development of the dentition. Amelogenin (AMEL), the better known of the enamel matrix proteins, forms 90% of the secreted organic matrix during amelogenesis. Although AMEL has been sequenced in numerous mammalian lineages, the only reported strepsirrhine AMEL sequences are those of the ring-tailed lemur and galago, which contain a set of additional proline-rich tandem repeats absent in all other primates species analyzed to date, but present in some non-primate mammals. Here, we first determined that these repeats are present in AMEL from three additional lemur species and thus are likely to be widespread throughout this group. To evaluate the functional relevance of these repeats in strepsirrhines, we engineered a mutated murine amelogenin sequence containing a similar proline-rich sequence to that of Lemur catta. In the monomeric form, the MQP insertions had no influence on the secondary structure or refolding properties, whereas in the assembled form, the insertions increased the hydrodynamic radii. We speculate that increased AMEL nanosphere size may influence enamel formation in strepsirrhine primates

    Secure referee selection for fair and responsive peer-to-peer gaming

    Get PDF
    Peer-to-Peer (P2P) architectures for Massively Multiplayer Online Games (MMOG) provide better scalability than Client/Server (C/S); however, they increase the possibility of cheating. Recently proposed P2P protocols use trusted referees that simulate/validate the game to provide security equivalent to C/S. When selecting referees from untrusted peers, selecting non-colluding referees becomes critical. Further, referees should be selected such that the range and length of delays to players is minimised (maximising game fairness and responsiveness). In this paper we formally define the referee selection problem and propose two secure referee selection algorithms, SRS-1 and SRS-2, to solve it. Both algorithms ensure the probability of corrupt referees controlling a zone/region is below a predefined limit, while attempting to maximise responsiveness and fairness. The trade-off between responsiveness and fairness is adjustable for both algorithms. Simulations of three different scenarios show the effectiveness of our algorithms

    Cryptococcus neoformans induces IL-8 secretion and CXCL1 expression by human bronchial epithelial cells

    Get PDF
    <p>Abstract</p> <p>Background</p> <p><it>Cryptococcus neoformans </it>(<it>C. neoformans</it>) is a globally distributed fungal pathogen with the potential to cause serious disease, particularly among immune compromised hosts. Exposure to this organism is believed to occur by inhalation and may result in pneumonia and/or disseminated infection of the brain as well as other organs. Little is known about the role of airway epithelial cells in cryptococcal recognition or their ability to induce an inflammatory response.</p> <p>Methods</p> <p>Immortalized BEAS-2B bronchial epithelial cells and primary normal human bronchial epithelium (NHBE) were stimulated <it>in vitro </it>with encapsulated or acapsular <it>C. neoformans </it>cultivated at room temperature or 37°C. Activation of bronchial epithelial cells was characterized by analysis of inflammatory cytokine and chemokine expression, transcription factor activation, fungal-host cell association, and host cell damage.</p> <p>Results</p> <p>Viable <it>C. neoformans </it>is a strong activator of BEAS-2B cells, resulting in the production of the neutrophil chemokine Interleukin (IL)-8 in a time- and dose-dependent manner. IL-8 production was observed only in response to acapsular <it>C. neoformans </it>that was grown at 37°C. <it>C. neoformans </it>was also able to induce the expression of the chemokine CXCL1 and the transcription factor CAAT/enhancer-binding protein beta (CEBP/β) in BEAS-2B cells. NHBE was highly responsive to stimulation with <it>C. neoformans</it>; in addition to transcriptional up regulation of CXCL1, these primary cells exhibited the greatest IL-8 secretion and cell damage in response to stimulation with an acapsular strain of <it>C. neoformans</it>.</p> <p>Conclusion</p> <p>This study demonstrates that human bronchial epithelial cells mediate an acute inflammatory response to <it>C. neoformans </it>and are susceptible to damage by this fungal pathogen. The presence of capsular polysaccharide and <it>in vitro </it>fungal culture conditions modulate the host inflammatory response to <it>C. neoformans</it>. Human bronchial epithelial cells are likely to contribute to the initial stages of pulmonary host defense <it>in vivo</it>.</p

    Generalization of auditory sensory and cognitive learning in typically developing children

    Get PDF
    Despite the well-established involvement of both sensory (“bottom-up”) and cognitive (“top-down”) processes in literacy, the extent to which auditory or cognitive (memory or attention) learning transfers to phonological and reading skills remains unclear. Most research has demonstrated learning of the trained task or even learning transfer to a closely related task. However, few studies have reported “far-transfer” to a different domain, such as the improvement of phonological and reading skills following auditory or cognitive training. This study assessed the effectiveness of auditory, memory or attention training on far-transfer measures involving phonological and reading skills in typically developing children. Mid-transfer was also assessed through untrained auditory, attention and memory tasks. Sixty 5- to 8-year-old children with normal hearing were quasi-randomly assigned to one of five training groups: attention group (AG), memory group (MG), auditory sensory group (SG), placebo group (PG; drawing, painting), and a control, untrained group (CG). Compliance, mid-transfer and far-transfer measures were evaluated before and after training. All trained groups received 12 x 45-min training sessions over 12 weeks. The CG did not receive any intervention. All trained groups, especially older children, exhibited significant learning of the trained task. On pre- to post-training measures (test-retest), most groups exhibited improvements on most tasks. There was significant mid-transfer for a visual digit span task, with highest span in the MG, relative to other groups. These results show that both sensory and cognitive (memory or attention) training can lead to learning in the trained task and to mid-transfer learning on a task (visual digit span) within the same domain as the trained tasks. However, learning did not transfer to measures of language (reading and phonological awareness), as the PG and CG improved as much as the other trained groups. Further research is required to investigate the effects of various stimuli and lengths of training on the generalization of sensory and cognitive learning to literacy skills
    corecore