77 research outputs found

    A theoretical framework of immune cell phenotypic classification and discovery

    Get PDF
    Immune cells are highly heterogeneous and show diverse phenotypes, but the underlying mechanism remains to be elucidated. In this study, we proposed a theoretical framework for immune cell phenotypic classification based on gene plasticity, which herein refers to expressional change or variability in response to conditions. The system contains two core points. One is that the functional subsets of immune cells can be further divided into subdivisions based on their highly plastic genes, and the other is that loss of phenotype accompanies gain of phenotype during phenotypic conversion. The first point suggests phenotypic stratification or layerability according to gene plasticity, while the second point reveals expressional compatibility and mutual exclusion during the change in gene plasticity states. Abundant transcriptome data analysis in this study from both microarray and RNA sequencing in human CD4 and CD8 single-positive T cells, B cells, natural killer cells and monocytes supports the logical rationality and generality, as well as expansibility, across immune cells. A collection of thousands of known immunophenotypes reported in the literature further supports that highly plastic genes play an important role in maintaining immune cell phenotypes and reveals that the current classification model is compatible with the traditionally defined functional subsets. The system provides a new perspective to understand the characteristics of dynamic, diversified immune cell phenotypes and intrinsic regulation in the immune system. Moreover, the current substantial results based on plasticitomics analysis of bulk and single-cell sequencing data provide a useful resource for big-data–driven experimental studies and knowledge discoveries

    EXTRACT OF PERILLA FRUTESCENS INHIBITS TUMOR PROLIFERATION OF HCC VIA PI3K/AKT SIGNAL PATHWAY

    Get PDF
    In this study, isoegomaketone(IK) was isolated from Perilla frutescens(L.), a Chinese herbal. The effects of IK were examined by cell viability assay, colony formation assay, xenograft tumor assay and western blotting in HCC cells. We found that IK inhibited cell viability, and its administration decreased tumor volume and weight profoundly. The presence of IK(10nmol/l) produced a dramatic decrease of pAkt, while total Akt level was not affected. The data suggested that IK from perilla suppressed HCC tumor growth via blocking PI3K/Akt signaling pathway

    Genistein Inhibition of Topoisomerase IIα Expression Participated by Sp1 and Sp3 in HeLa Cell

    Get PDF
    Genistein (4′, 5, 7-trihydroxyisoflavone) is an isoflavone compound obtained from plants that has potential applications in cancer therapy. However, the molecular mechanism of the action of genistein on cancer cell apoptosis is not well known. In this study, we investigated the effect of genistein on topoisomerase II-α (Topo IIα), an important protein involved in the processes of DNA replication and cell proliferation. The results revealed that inhibition of Topo IIα expression through the regulation of Specificity protein 1 and Specificity protein 3 may be one of the reasons for genistein’s induction of HeLa cell apoptosis

    Genomic Signatures of Strain Selection and Enhancement in Bacillus atrophaeus var. globigii, a Historical Biowarfare Simulant

    Get PDF
    (BG) as a simulant for biological warfare (BW) agents, knowledge of its genome composition is limited. Furthermore, the ability to differentiate signatures of deliberate adaptation and selection from natural variation is lacking for most bacterial agents. We characterized a lineage of BGwith a long history of use as a simulant for BW operations, focusing on classical bacteriological markers, metabolic profiling and whole-genome shotgun sequencing (WGS). on the nucleotide level. WGS of variants revealed that several strains were mixed but highly related populations and uncovered a progressive accumulation of mutations among the “military” isolates. Metabolic profiling and microscopic examination of bacterial cultures revealed enhanced growth of “military” isolates on lactate-containing media, and showed that the “military” strains exhibited a hypersporulating phenotype.Our analysis revealed the genomic and phenotypic signatures of strain adaptation and deliberate selection for traits that were desirable in a simulant organism. Together, these results demonstrate the power of whole-genome and modern systems-level approaches to characterize microbial lineages to develop and validate forensic markers for strain discrimination and reveal signatures of deliberate adaptation

    3kf9: enhancing 3gpp-mac beyond the birthday bound

    No full text
    Among various cryptographic schemes, CBC-based MACs belong to the few ones most widely used in practice. Such MACs iterate a blockcipher EK in the so called Cipher-Block-Chaining way, i.e. Ci = E K(Mi ⊕Ci-1), offering high efficiency in practical applications. In the paper, we propose a new deterministic variant of CBC-based MACs that is provably secure beyond the birthday bound. The new MAC 3kf9 is obtained by combining f9 (3GPP-MAC) and EMAC sharing the same internal structure, and so it is almost as efficient as the original CBC MAC. 3kf9 offers O(l3q3/22n + lq/2n) PRF-security when its underlying n-bit blockcipher is pseudorandom with three independent keys. This makes it more secure than traditional CBC-based MACs, especially when they are applied with lightweight blockciphers. Therefore, 3kf9 is expected to be a possible candidate MAC in resource-restricted environments. © International Association for Cryptologic Research 2012.International Association for Cryptologic Research (IACR); National Natural Science Foundation of China; Huawei Technologies Co. Ltd.; Intel CorporationAmong various cryptographic schemes, CBC-based MACs belong to the few ones most widely used in practice. Such MACs iterate a blockcipher EK in the so called Cipher-Block-Chaining way, i.e. Ci = E K(Mi ⊕Ci-1), offering high efficiency in practical applications. In the paper, we propose a new deterministic variant of CBC-based MACs that is provably secure beyond the birthday bound. The new MAC 3kf9 is obtained by combining f9 (3GPP-MAC) and EMAC sharing the same internal structure, and so it is almost as efficient as the original CBC MAC. 3kf9 offers O(l3q3/22n + lq/2n) PRF-security when its underlying n-bit blockcipher is pseudorandom with three independent keys. This makes it more secure than traditional CBC-based MACs, especially when they are applied with lightweight blockciphers. Therefore, 3kf9 is expected to be a possible candidate MAC in resource-restricted environments. © International Association for Cryptologic Research 2012

    Electronic Sorting of Immune Cell Subpopulations Based on Highly Plastic Genes

    No full text

    Quantitative Analysis of Leakage Consequences of LNG Ship-to-Ship Bunkering Based on CFD

    No full text
    Leakage incidents on LNG bunker vessels will result in a serious degree of hazard. This paper investigates typical high-risk scenarios such as hose ruptures and valve joint leakages. The consequences of an LNG leakage accident during the simultaneous operation of a bunker vessel and a container carrier are simulated using the FLACS software, and the dispersion range of the combustible vapor cloud is quantitatively analyzed under both ballast and laden conditions. Under the ballast condition, the diffusion range of the combustible vapor cloud on the side of the bunker vessel is 58 × 15.5 m from the front wall of the cargo equipment room to the bow of the vessel, and 35 × 9.5 m between the cargo equipment room and the transom of the vessel. Under the laden condition, the diffusion range on the side of the bunker vessel is 58 × 15.5 m from the front wall of the cargo equipment room to the bow of the vessel, and 15 × 4 m between the rear end wall of the cargo equipment room and the front wall of the stern of the vessel. These results provide important technical guidance and reference values for the safe operation of LNG bunker vessels
    corecore