294 research outputs found

    Study on evaluation of International Science and Technology Cooperation Project (ISTCP) in China

    Get PDF
    This paper presents an overview of evaluation of ISTCP in China. We discuss briefly the history of evaluation and the strengths and weaknesses of different assessment systems. On this basis, with Analytical Hierarchy Process (AHP), we establish evaluation indicator system for ISTCP that includes research project establishment evaluation, mid-period evaluation system, effect evaluation system, and confirm the value of each indicator. At the same time, we established expert database, project database, research organization database, researcher database etc. We therefore establish an evaluation platform for international science and technology cooperation project. We use it to realize full process supervision from evaluation expert selection to project management

    Selective killing of HIV-1-positive macrophages and T cells by the Rev-dependent lentivirus carrying anthrolysin O from Bacillus anthracis

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The ability of Human Immunodeficiency Virus (HIV) to persist in the body has proven to be a long-standing challenge to virus eradication. Current antiretroviral therapy cannot selectively destroy infected cells; it only halts active viral replication. With therapeutic cessation or interruption, viral rebound occurs, and invariably, viral loads return to pre-treatment levels. The natural reservoirs harboring replication-competent HIV-1 include CD4 T cells and macrophages. In particular, cells from the macrophage lineage resist HIV-1-mediated killing and support sustained viral production. To develop a complementary strategy to target persistently infected cells, this proof-of-concept study explores an HIV-1 Rev-dependent lentiviral vector carrying a bacterial hemolysin, <it>anthrolysin O </it>(<it>anlO</it>) from <it>Bacillus anthracis</it>, to achieve selective killing of HIV-1- infected cells.</p> <p>Results</p> <p>We demonstrate that in the Rev-dependent lentiviral vector, <it>anlO </it>expression is exclusively dependent on Rev, a unique HIV-1 protein present only in infected cells. Intracellular expression and oligomerization of AnlO result in membrane pore formation and cytolysis. We have further overcome a technical hurdle in producing a Revdependent AnlO lentivirus, through the use of β-cyclodextrin derivatives to inhibit direct killing of producer cells by AnlO. Using HIV-1-infected macrophages and T cells as a model, we demonstrate that this Rev-dependent AnlO lentivirus diminishes HIV-1- positive cells.</p> <p>Conclusion</p> <p>The Rev-dependent lentiviral vector has demonstrated its specificity in targeting persistently infected cells. The choice of <it>anlO </it>as the first suicidal gene tested in this vector is based on its cytolytic activity in macrophages and T cells. We conclude that Rev-regulated expression of suicidal genes in HIV-1-positive cells is possible, although future <it>in vivo </it>delivery of this system needs to address numerous safety issues.</p

    Cofilin Activation in Peripheral CD4 T Cells of HIV-1 Infected Patients: A Pilot Study

    Get PDF
    Cofilin is an actin-depolymerizing factor that regulates actin dynamics critical for T cell migration and T cell activation. In unstimulated resting CD4 T cells, cofilin exists largely as a phosphorylated inactive form. Previously, we demonstrated that during HIV-1 infection of resting CD4 T cells, the viral envelope-CXCR4 signaling activates cofilin to overcome the static cortical actin restriction. In this pilot study, we have extended this in vitro observation and examined cofilin phosphorylation in resting CD4 T cells purified from the peripheral blood of HIV-1-infected patients. Here, we report that the resting T cells from infected patients carry significantly higher levels of active cofilin, suggesting that these resting cells have been primed in vivo in cofilin activity to facilitate HIV-1 infection. HIV-1-mediated aberrant activation of cofilin may also lead to abnormalities in T cell migration and activation that could contribute to viral pathogenesis.Department of Defense (National Defense Science and Engineering Fellowship); National Institute of Allergy and Infectious Diseases (AI069981

    A Lattice-based Ring Signature Scheme Secure against Key Exposure

    Get PDF
    A ring signature scheme allows a group member to generate a signature on behalf of the whole group, while the verifier can not tell who computed this signature. However, most predecessors do not guarantee security from the secret key leakage of signers. In 2002, Anderson proposed the forward security mechanism to reduce the effect of such leakage. In this paper, we construct the first lattice-based ring signature scheme with forward security. Our scheme combines the binary tree and lattice basis delegation technique to realize a key evolution mechanism, where secret keys are ephemeral and updated with generating nodes in the binary tree. Thus, the adversary cannot forge the past signature even if the users\u27 present secret keys are revealed. Moreover, our scheme can offer unforgeability under standard models. Furthermore, our proposed scheme is expected to realize post-quantum security due to the underlying Short Integer Solution (SIS) problem in lattice-based cryptography

    Study on evaluation of International Science and Technology Cooperation Project (ISTCP) in China

    Get PDF
    This paper presents an overview of evaluation of ISTCP in China. We discuss briefly the history of evaluation and the strengths and weaknesses of different assessment systems. On this basis, with Analytical Hierarchy Process (AHP), we establish evaluation indicator system for ISTCP that includes research project establishment evaluation, mid-period evaluation system, effect evaluation system, and confirm the value of each indicator. At the same time, we established expert database, project database, research organization database, researcher database etc. We therefore establish an evaluation platform for international science and technology cooperation project. We use it to realize full process supervision from evaluation expert selection to project management

    Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks

    Full text link
    Advanced persistent threat (APT) is a kind of stealthy, sophisticated, and long-term cyberattack that has brought severe financial losses and critical infrastructure damages. Existing works mainly focus on APT defense under stable network topologies, while the problem under time-varying dynamic networks (e.g., vehicular networks) remains unexplored, which motivates our work. Besides, the spatiotemporal dynamics in defense resources, complex attackers' lateral movement behaviors, and lack of timely defense make APT defense a challenging issue under time-varying networks. In this paper, we propose a novel game-theoretical APT defense approach to promote real-time and optimal defense strategy-making under both periodic time-varying and general time-varying environments. Specifically, we first model the interactions between attackers and defenders in an APT process as a dynamic APT repair game, and then formulate the APT damage minimization problem as the precise prevention and control (PPAC) problem. To derive the optimal defense strategy under both latency and defense resource constraints, we further devise an online optimal control-based mechanism integrated with two backtracking-forward algorithms to fastly derive the near-optimal solution of the PPAC problem in real time. Extensive experiments are carried out, and the results demonstrate that our proposed scheme can efficiently obtain optimal defense strategy in 54481 ms under seven attack-defense interactions with 9.64%\% resource occupancy in stimulated periodic time-varying and general time-varying networks. Besides, even under static networks, our proposed scheme still outperforms existing representative APT defense approaches in terms of service stability and defense resource utilization

    Systematic Hydrogen‐Bond Manipulations To Establish Polysaccharide Structure–Property Correlations

    Get PDF
    A dense hydrogen‐bond network is responsible for the mechanical and structural properties of polysaccharides. Random derivatization alters the properties of the bulk material by disrupting the hydrogen bonds, but obstructs detailed structure–function correlations. We have prepared well‐defined unnatural oligosaccharides including methylated, deoxygenated, deoxyfluorinated, as well as carboxymethylated cellulose and chitin analogues with full control over the degree and pattern of substitution. Molecular dynamics simulations and crystallographic analysis show how distinct hydrogen‐bond modifications drastically affect the solubility, aggregation behavior, and crystallinity of carbohydrate materials. This systematic approach to establishing detailed structure–property correlations will guide the synthesis of novel, tailor‐made carbohydrate materials

    Systematic Hydrogen‐Bond Manipulations To Establish Polysaccharide Structure–Property Correlations

    Get PDF
    A dense hydrogen‐bond network is responsible for the mechanical and structural properties of polysaccharides. Random derivatization alters the properties of the bulk material by disrupting the hydrogen bonds, but obstructs detailed structure–function correlations. We have prepared well‐defined unnatural oligosaccharides including methylated, deoxygenated, deoxyfluorinated, as well as carboxymethylated cellulose and chitin analogues with full control over the degree and pattern of substitution. Molecular dynamics simulations and crystallographic analysis show how distinct hydrogen‐bond modifications drastically affect the solubility, aggregation behavior, and crystallinity of carbohydrate materials. This systematic approach to establishing detailed structure–property correlations will guide the synthesis of novel, tailor‐made carbohydrate materials
    • …
    corecore