4,465 research outputs found

    Human natural killer cell committed thymocytes and their relation to the T cell lineage.

    Get PDF
    Recent studies have demonstrated that mature natural killer (NK) cells can be grown from human triple negative (TN; CD3-, CD4-, CD8-) thymocytes, suggesting that a common NK/T cell precursor exists within the thymus that can give rise to both NK cells and T cells under appropriate conditions. In the present study, we have investigated human fetal and postnatal thymus to determine whether NK cells and their precursors exist within this tissue and whether NK cells can be distinguished from T cell progenitors. Based on the surface expression of CD56 (an NK cell-associated antigen) and CD5 (a T cell-associated antigen), three phenotypically distinctive populations of TN thymocytes were identified. CD56+, CD5-; CD56-, CD5-, and CD56-, CD5+. The CD56+, CD5- population of TN thymocytes, although displaying a low cytolytic function against NK sensitive tumor cell targets, were similar in antigenic phenotype to fetal liver NK cells, gave rise to NK cell clones, and were unable to generate T cells in mouse fetal thymic organ cultures (mFTOC). This population of thymocytes represents a relatively mature population of lineage-committed NK cells. The CD56-, CD5- population of TN thymocytes were similar to thymic NK cells in antigenic phenotype and NK cell clonogenic potential. Clones derived from this population of TN thymocytes acquired CD56 surface expression and NK cell cytolytic function. CD56-, CD5- TN thymocytes thus contain a novel population of NK cell-committed precursors. The CD56-, CD5- population of TN thymocytes also contains a small percentage of CD34+ cells, which demonstrate no in vitro clonogenic potential, but possess T cell reconstituting capabilities in mFTOC. The majority of TN thymocytes do not express CD56, but coexpress CD34 and CD5. These CD56-, CD5+, CD34+ cells demonstrate no NK or T cell clonogenic potential, but are extremely efficient in repopulating mFTOC and differentiating into CD3+, CD4+, CD8+ T cells. The results of this investigation have identified NK cells and NK cell precursors in the human thymus and have shown that these cell types are unable to differentiate along the T cell lineage pathway. Thus, while a common NK/T cell progenitor likely exists, once committed to the NK cell lineage these cells no longer have the capacity to develop along the T cell developmental pathway

    Characterising epithelial tissues using persistent entropy

    Full text link
    In this paper, we apply persistent entropy, a novel topological statistic, for characterization of images of epithelial tissues. We have found out that persistent entropy is able to summarize topological and geometric information encoded by \alpha-complexes and persistent homology. After using some statistical tests, we can guarantee the existence of significant differences in the studied tissues.Comment: 12 pages, 7 figures, 4 table

    T-cell allorecognition of donor glutathione S-transferase T1 in plasma cell-rich rejection

    Get PDF
    AIM: To investigate the role of glutathione S-transferase T1 donor-specific T lymphocytes in plasma cell-rich rejection of liver allografts. METHODS: The study group included 22 liver transplant patients. Among them, 18 patients were mismatched for the glutathione S-transferase T1 (GSTT1) alleles (don+/rec-), and 4 were matched (don+/rec+). Seven of the mismatched patients produced anti-GSTT1 antibodies and developed plasma cell-rich rejection (former de novo immune hepatitis). For the detection of specific T lymphocytes, peripheral blood mononuclear cells were collected and stored in liquid nitrogen. The memory T cell response was studied by adding to the cell cultures to a mix of 39 custom-made, 15-mer overlapping peptides, which covered the entire GSTT1 amino acid sequence. The specific cellular response to peptides was analyzed by flow cytometry using the markers CD8, CD4, IL-4 and IFNγ. RESULTS: Activation of CD8+ T cells with different peptides was observed exclusively in the group of patients with plasma-cell rich rejection (3 out of 7), with production of IL-4 and/or IFNγ at a rate of 1%-4.92% depending on the peptides. The CD4+ response was most common and not exclusive for patients with the disease, where 5 out of 7 showed percentages of activated cells from 1.24% to 31.34%. Additionally, two patients without the disease but with the mismatch had cells that became stimulated with some peptides (1.45%-5.18%). Highly unexpected was the finding of a double positive CD4+CD8low T cell population that showed the highest degree of activation with some of the peptides in 7 patients with the mismatch, in 4 patients with plasma cell-rich rejection and in 3 patients without the disease. Unfortunately, CD4+CD8low cells represent 1% of the total number of lymphocytes, and stimulation could not be analyzed in 9 patients due to the low number of gated cells. Cells from the 4 patients included as controls did not show activation with any of the peptides. CONCLUSION: Patients with GSTT1 mismatch can develop a specific T-cell response, but the potential role of this response in the pathogenesis of plasma cell-rich rejection is unknown

    QR-Factorization Algorithm for Computed Tomography (CT): Comparison With FDK and Conjugate Gradient (CG) Algorithms

    Full text link
    [EN] Even though QR-factorization of the system matrix for tomographic devices has been already used for medical imaging, to date, no satisfactory solution has been found for solving large linear systems, such as those used in computed tomography (CT) (in the order of 106 equations). In CT, the Feldkamp, Davis, and Kress back projection algorithm (FDK) and iterative methods like conjugate gradient (CG) are the standard methods used for image reconstruction. As the image reconstruction problem can be modeled by a large linear system of equations, QR-factorization of the system matrix could be used to solve this system. Current advances in computer science enable the use of direct methods for solving such a large linear system. The QR-factorization is a numerically stable direct method for solving linear systems of equations, which is beginning to emerge as an alternative to traditional methods, bringing together the best from traditional methods. QR-factorization was chosen because the core of the algorithm, from the computational cost point of view, is precalculated and stored only once for a given CT system, and from then on, each image reconstruction only involves a backward substitution process and the product of a vector by a matrix. Image quality assessment was performed comparing contrast to noise ratio and noise power spectrum; performances regarding sharpness were evaluated by the reconstruction of small structures using data measured from a small animal 3-D CT. Comparisons of QR-factorization with FDK and CG methods show that QR-factorization is able to reconstruct more detailed images for a fixed voxel size.This work was supported by the Spanish Government under Grant TEC2016-79884-C2 and Grant RTC-2016-5186-1.Rodríguez-Álvarez, M.; Sánchez, F.; Soriano Asensi, A.; Moliner Martínez, L.; Sánchez Góez, S.; Benlloch Baviera, JM. (2018). QR-Factorization Algorithm for Computed Tomography (CT): Comparison With FDK and Conjugate Gradient (CG) Algorithms. IEEE Transactions on Radiation and Plasma Medical Sciences. 2(5):459-469. https://doi.org/10.1109/TRPMS.2018.2843803S4594692

    Validació i control de la plausibilitat dels resultats

    Get PDF

    Black Hole Emission in String Theory and the String Phase of Black Holes

    Get PDF
    String theory properly describes black-hole evaporation. The quantum string emission by Black Holes is computed. The black-hole temperature is the Hawking temperature in the semiclassical quantum field theory (QFT) regime and becomes the intrinsic string temperature, T_s, in the quantum (last stage) string regime. The QFT-Hawking temperature T_H is upper bounded by the string temperature T_S. The black hole emission spectrum is an incomplete gamma function of (T_H - T_S). For T_H << T_S, it yields the QFT-Hawking emission. For T_H \to T_S, it shows highly massive string states dominate the emission and undergo a typical string phase transition to a microscopic `minimal' black hole of mass M_{\min} or radius r_{\min} (inversely proportional to T_S) and string temperature T_S. The string back reaction effect (selfconsistent black hole solution of the semiclassical Einstein equations) is computed. Both, the QFT and string black hole regimes are well defined and bounded.The string `minimal' black hole has a life time tau_{min} simeq (k_B c)/(G hbar [T_S]^3). The semiclassical QFT black hole (of mass M and temperature T_H) and the string black hole (of mass M_{min} and temperature T_S) are mapped one into another by a `Dual' transform which links classical/QFT and quantum string regimes.Comment: LaTex, 22 pages, Lectures delivered at the Chalonge School, Nato ASI: Phase Transitions in the Early Universe: Theory and Observations. To appear in the Proceedings, Editors H. J. de Vega, I. Khalatnikov, N. Sanchez. (Kluwer Pub

    Flexible and Robust Privacy-Preserving Implicit Authentication

    Full text link
    Implicit authentication consists of a server authenticating a user based on the user's usage profile, instead of/in addition to relying on something the user explicitly knows (passwords, private keys, etc.). While implicit authentication makes identity theft by third parties more difficult, it requires the server to learn and store the user's usage profile. Recently, the first privacy-preserving implicit authentication system was presented, in which the server does not learn the user's profile. It uses an ad hoc two-party computation protocol to compare the user's fresh sampled features against an encrypted stored user's profile. The protocol requires storing the usage profile and comparing against it using two different cryptosystems, one of them order-preserving; furthermore, features must be numerical. We present here a simpler protocol based on set intersection that has the advantages of: i) requiring only one cryptosystem; ii) not leaking the relative order of fresh feature samples; iii) being able to deal with any type of features (numerical or non-numerical). Keywords: Privacy-preserving implicit authentication, privacy-preserving set intersection, implicit authentication, active authentication, transparent authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May 26-28, 2015, IFIP AICT, Springer, to appea

    More productive in vitro culture of Cryptosporidium parvum for better study of the intra- and extracellular phases

    Get PDF
    The great difficulties in treating people and animals suffering from cryptosporidiosis have prompted the development of in vitro experimental models. Due to the models of in vitro culture, new extracellular stages of Cryptosporidium have been demonstrated. The development of these extracellular phases depends on the technique of in vitro culture and on the species and genotype of Cryptosporidium used. Here, we undertake the molecular characterization by polymerase chain reaction-restriction fragment lenght polymorphism of different Cryptosporidium isolates from calves, concluding that all are C. parvum of cattle genotype, although differing in the nucleotide at positions 472 and 498. Using these parasites, modified the in vitro culture technique for HCT-8 cells achieving greater multiplication of parasites. The HCT-8 cell cultures, for which the culture had not been renewed in seven days, were infected with C. parvum sporozoites in RPMI-1640 medium with 10% IFBS, CaCl2 and MgCl2 1 mM at pH 7.2. Percentages of cell parasitism were increased with respect to control cultures (71% at 48 h vs 14.5%), even after two weeks (47% vs 1.9%). Also, the percentage of extracellular stages augmented (25.3% vs 1.1% at 96 h). This new model of in vitro culture of C. parvum will enable easier study of the developmental phases of C. parvum in performing new chemotherapeutic assays

    Through the looking glass: leader personhood and the intersubjective construction of institutions

    Get PDF
    Institutions have been mainly understood in a dualistic way: as abstract, macro cultural logics, or as inhabited socio-cultural sites. This form of dualism divided people into cognitive cultural dopes or persons with a heart. Scholars are now trying to overcome dualistic modes of thinking about people in institutions, through the consideration of the persons as whole human beings. In this new theoretical approach, it is crucial to understand how institutions frame individual action and how individuals shape institutions. We study this duality by considering the lived experience of Colombia’s presidential transition period from Uribe to Santos in the decade of the 2010s
    corecore