• Title/Summary/Keyword: Network Activity

Search Result 1,308, Processing Time 0.031 seconds

Agonistic Anti-CD137 Monoclonal Antibody Treatment Induces CD11b+Gr-1+ Myeloid-derived Suppressor Cells

  • Lee, Jung-Mi;Seo, Jeong-Hwan;Kim, Yeon-Jeong;Kim, Yun-Sun;Ko, Hyun-Jeong;Kang, Chang-Yuil
    • IMMUNE NETWORK
    • /
    • v.10 no.3
    • /
    • pp.104-108
    • /
    • 2010
  • CD137 (4-1BB/tnfrsf9) has been shown to co-stimulate T cells. However, agonistic anti-CD137 monoclonal antibody (mAb) treatment can suppress $CD4^+$ T cells, ameliorating autoimmune diseases, whereas it induces activation of $CD8^+$ T cells, resulting in diverse therapeutic activity in cancer, viral infection. To investigate the CD137-mediated T cell suppression mechanism, we examined whether anti-CD137 mAb treatment could affect $CD11b^+Gr-1^+$ myeloid-derived suppressor cells (MDSCs). Intriguingly, anti-CD137 mAb injection significantly increased $CD11b^+Gr-1^+$ cells, peaking at days 5 to 10 and continuing for at least 25 days. Furthermore, this cell population could suppress both $CD8^+$ T cells and $CD4^+$ T cells. Thus, this study demonstrated that, for the first time, anti-CD137 mAb treatment could induce $CD11b^+Gr-1^+$ MDSCs under normal conditions, suggesting a possible relationship between myeloid cell induction and CD137-mediated immune suppression.

Cyclooxygenase Inhibitors, Aspirin and Ibuprofen, Inhibit MHC-restricted Antigen Presentation in Dendritic Cells

  • Kim, Hyun-Jin;Lee, Young-Hee;Im, Sun-A;Kim, Kyungjae;Lee, Chong-Kil
    • IMMUNE NETWORK
    • /
    • v.10 no.3
    • /
    • pp.92-98
    • /
    • 2010
  • Background: Nonsteroidal anti-inflammatory drugs (NSAIDs) are widely used to relieve pain, reduce fever and inhibit inflammation. NSAIDs function mainly through inhibition of cyclooxygenase (COX). Growing evidence suggests that NSAIDs also have immunomodulatory effects on T and B cells. Here we examined the effects of NSAIDs on the antigen presenting function of dendritic cells (DCs). Methods: DCs were cultured in the presence of aspirin or ibuprofen, and then allowed to phagocytose biodegradable microspheres containing ovalbumin (OVA). After washing and fixing, the efficacy of OVA peptide presentation by DCs was evaluated using OVA-specific CD8 and CD4 T cells. Results: Aspirin and ibuprofen at high concentrations inhibited both MHC class I and class II-restricted presentation of OVA in DCs. In addition, the DCs generated in the presence of low concentrations of the drugs exhibit a profoundly suppressed capability to present MHC-restricted antigens. Aspirin and ibuprofen did not inhibit the phagocytic activity of DCs, the expression level of total MHC molecules and co-stimulatory molecules on DCs. Ibuprofen rather increased the expression level of total MHC molecules and co-stimulatory molecules on DCs. Conclusion: These results demonstrate that aspirin and ibuprofen inhibit the intracellular processing event of the phagocytosed antigen, and further suggest that prolonged administration of NSAIDs in high doses may impair the capability of DCs to present antigens in asiociation with MHC molecules.

Effects of Endurance Training on the Serum Levels of Tumour Necrosis Factor-${\alpha}$ and Interferon-${\gamma}$ in Sedentary Men

  • Jahromi, Abdolreza Sotoodeh;Zar, Abdossaleh;Ahmadi, Fatemeh;Krustrup, Peter;Ebrahim, Khosrow;Hovanloo, Friborz;Amani, Davar
    • IMMUNE NETWORK
    • /
    • v.14 no.5
    • /
    • pp.255-259
    • /
    • 2014
  • Physical activity could be considered one of the factors that affect the immune system status and function. To find the relation between exercise and cytokines, we examined the possible effects of an 8-week endurance training program on the serum levels of cytokines, including tumour necrosis factor-alpha (TNF-${\alpha}$) and interferon-gamma (IFN-${\gamma}$) in sedentary men. A total of 30 healthy young male volunteers were randomly divided into an endurance training group and a control group. The training group followed a specific exercise protocol (running on a treadmill for 15~30 min at 50~70% maximal heart rate) for 8 weeks and the control group did not participate in any exercise program. Venous blood samples were collected from both the groups 24 h before and 24 h and 48 h after the exercise. Repeated ANOVA was used for statistical purposes. The serum levels of TNF-${\alpha}$ and IFN-${\gamma}$ were determined by ELISA. Significant (p<0.05) and non-significant (p>0.05) decreases were observed in the serum levels of IFN-${\gamma}$ and TNF-${\alpha}$, respectively, after the 8-week endurance training program. Our findings indicated that an 8-week endurance exercise may affect the serum levels of some inflammatory cytokines, suggesting the beneficial role of this training protocol in elderly population and people with certain conditions (inflammation of the vertebrae or other inflammatory diseases).

A Research on the Cloud Computing Security Framework (클라우드 컴퓨팅 정보보호 프레임워크에 관한 연구)

  • kim, Jung-Duk;Lee, Seong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1277-1286
    • /
    • 2013
  • Cloud computing's unique attributes such as elasticity, rapid provisioning and releasing, resource pooling, multi-tenancy, broad-network accessibility, and ubiquity bring many benefits to cloud adopters(company and organization), but also entails specific security risks associated with the type of adopted cloud and deployment mode. To minimize those types of risk, this paper proposed cloud computing security framework refered to strategic alliance model. The cloud computing security framework has main triangles that are cloud threat, security controls, cloud stakeholders and compose of three sides that are purposefulness, accountability, transparent responsibility. Main triangles define purpose of risk minimization, appointment of stakeholders, security activity for them and three sides of framework are principles of security control in the cloud computing, provide direction of deduction for seven service packages.

Content Analyses of Housing Area in :Middle School Technology.Home Economics Textbooks by 2007 Revised Curriculum (2007년 개정 교육과정 중학교 기술.가정 교과서 주생활영역의 교육내용 분석)

  • Lee, Young-Shim;Jang, Sang-Ock
    • Journal of Korean Home Economics Education Association
    • /
    • v.23 no.2
    • /
    • pp.131-148
    • /
    • 2011
  • The purpose of this study was to analyze the contents of housing area in Technology Home Economics textbooks of the 2007 revised curriculum which was published in 2011. The structure and the contents of housing area which are consisted of housing/living environment and use of housing space were analyzed. This study aims to examine the changes in the newly revised textbooks as well as suggesting advice for the more improved revised one in the future. For this purpose, this study employed 11 different textbooks and the results were the followings: each textbook had different quantity of pages dedicated to housing area but commonly had the wide range of terminology, plentiful amount of tables/diagrams, reading and activity materials sufficient to have students to carry out in practice. Also, the newly added contents of local area and eco-friendly life are analyzed to be well reflecting the 2007 revised curriculum. In future textbook development, it will be important that the issue of low birth rate, population ageing and green-life to be included as well as emphasizing the content of the network within the local area in order to actively prepare for the environmental issues.

  • PDF

Measures for Adware and Spyware (애드웨어 및 스파이웨어 대응기법)

  • Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.41-47
    • /
    • 2006
  • Spyware is any technology that aids in gathering information about a person or organization with-out their knowledge. Software designed to serve advertising, known as adware, can usually be thought of as spyware as well because it almost invariably includes components for tracking and reporting user information. A piece of spyware and adware affect computers which can rapidly become infected with large numbers of spyware and adware components. Users frequently notice from un-wanted behavior and degradation of system performance, such as significant unwanted CPU activity, disk usage, and network traffic which thereby slows down legitimate uses of these resources. The presence of situation will continue because of rapid expansion of Internet usages. Therefore, security solutions, such as anti-adware and anti-spyware, for recovering these malfunction due to the malicious programs must be developed. However, studies on the malicious programs are still not sufficient. Accordingly, this paper has studied the malicious program techniques, based on the results of analysis of present adware and spyware techniques by employing collected samples, and presents efficient measures for blocking and remedying the malicious programs.

  • PDF

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

The Value Chain of Cultural Industry in Gyeongbuk (경북 문화산업의 가치사슬 특성)

  • Choi, Jeong-Su
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.9 no.1
    • /
    • pp.39-60
    • /
    • 2006
  • The value chain is analytically useful for the cultural industry that has the characteristics of both manufacture and service industry, as the focus of value chain analysis moves from manufacturing only to the other stages of activity involved in supplying goods and services to consumers. The aim of paper is to analyse the value chain of the cultural industry in Gyeongbuk, find out the strengths and weaknesses of it, and suggest the ways to enhance the innovation capabilities of cultural industry in Gyeongbuk. First, the firms in advertisement & marketing, and circulation & distribution have low percent in cultural industry and need the low level of human resource, but produce high value-added in value chain; so, we should facilitate the make-up of the firms in advertisement & marketing, and circulation & distribution. Second, we should strengthen inter-firm networks to facilitate the ex-change of the equipment, human resource, information and technology between them. Third, we should construct the system to development human resource with two levels and spread the open atmosphere of firms.

  • PDF

Comparative Analysis of the Conserved Functions of Arabidopsis DRL1 and Yeast KTI12

  • Jun, Sang Eun;Cho, Kiu-Hyung;Hwang, Ji-Young;Abdel-Fattah, Wael;Hammermeister, Alexander;Schaffrath, Raffael;Bowman, John L.;Kim, Gyung-Tae
    • Molecules and Cells
    • /
    • v.38 no.3
    • /
    • pp.243-250
    • /
    • 2015
  • Patterning of the polar axis during the early leaf developmental stage is established by cell-to-cell communication between the shoot apical meristem (SAM) and the leaf primordia. In a previous study, we showed that the DRL1 gene, which encodes a homolog of the Elongator-associated protein KTI12 of yeast, acts as a positive regulator of adaxial leaf patterning and shoot meristem activity. To determine the evolutionally conserved functions of DRL1, we performed a comparison of the deduced amino acid sequence of DRL1 and its yeast homolog, KTI12, and found that while overall homology was low, well-conserved domains were presented. DRL1 contained two conserved plant-specific domains. Expression of the DRL1 gene in a yeast KTI12-deficient yeast mutant suppressed the growth retardation phenotype, but did not rescue the caffeine sensitivity, indicating that the role of Arabidopsis Elongator-associated protein is partially conserved with yeast KTI12, but may have changed between yeast and plants in response to caffeine during the course of evolution. In addition, elevated expression of DRL1 gene triggered zymocin sensitivity, while overexpression of KTI12 maintained zymocin resistance, indicating that the function of Arabidopsis DRL1 may not overlap with yeast KTI12 with regards to toxin sensitivity. In this study, expression analysis showed that class-I KNOX genes were downregulated in the shoot apex, and that YAB and KAN were upregulated in leaves of the Arabidopsis drl1- 101 mutant. Our results provide insight into the communication network between the SAM and leaf primordia required for the establishment of leaf polarity by mediating histone acetylation or through other mechanisms.

CLB-Based CPLD Low Power Technology Mapping A1gorithm for Trade-off (상관관계에 의한 CLB구조의 CPLD 저전력 기술 매핑 알고리즘)

  • Kim Jae-Jin;Lee Kwan-Houng
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.49-57
    • /
    • 2005
  • In this paper. a CLB-based CPLD low power technology mapping algorithm for trade-off is proposed. To perform low power technology mapping for CPLD, a given Boolean network has to be represented to DAG. The proposed algorithm consists of three step. In the first step, TD(Transition Density) calculation have to be Performed. Total power consumption is obtained by calculating switching activity of each nodes in a DAG. In the second step, the feasible clusters are generated by considering the following conditions : the number of output. the number of input and the number of OR-terms for CLB within a CPLD. The common node cluster merging method, the node separation method, and the node duplication method are used to produce the feasible clusters. The proposed algorithm is examined by using benchmarks in SIS. In the case that the number of OR-terms is 5, the experiments results show reduction in the power consumption by 30.73$\%$ comparing with that of TEMPLA, and 17.11$\%$ comparing with that of PLAmap respectively

  • PDF