• Title/Summary/Keyword: Checkpoint

Search Result 266, Processing Time 0.029 seconds

Clinical Characteristics and Treatment of Immune-Related Adverse Events of Immune Checkpoint Inhibitors

  • Juwhan Choi;Sung Yong Lee
    • IMMUNE NETWORK
    • /
    • v.20 no.1
    • /
    • pp.9.1-9.21
    • /
    • 2020
  • Immune checkpoint inhibitors (ICIs) have been changing the paradigm of cancer treatment. However, immune-related adverse effects (irAEs) have also increased with the exponential increase in the use of ICIs. ICIs can break up the immunologic homeostasis and reduce T-cell tolerance. Therefore, inhibition of immune checkpoint can lead to the activation of autoreactive T-cells, resulting in various irAEs similar to autoimmune diseases. Gastrointestinal toxicity, endocrine toxicity, and dermatologic toxicity are common side effects. Neurotoxicity, cardiotoxicity, and pulmonary toxicity are relatively rare but can be fatal. ICI-related gastrointestinal toxicity, dermatologic toxicity, and hypophysitis are more common with anti- CTLA-4 agents. ICI-related pulmonary toxicity, thyroid dysfunction, and myasthenia gravis are more common with PD-1/PD-L1 inhibitors. Treatment with systemic steroids is the principal strategy against irAEs. The use of immune-modulatory agents should be considered in case of no response to the steroid therapy. Treatment under the supervision of multidisciplinary specialists is also essential, because the symptoms and treatments of irAEs could involve many organs. Thus, this review focuses on the mechanism, clinical presentation, incidence, and treatment of various irAEs.

Depletion of the Pre-RC Proteins Induces Chk1/Chk2 Independent Checkpoint Responses and Apoptotic Cell Death in HeLa Cells

  • Im, Jun-Sub;Lee, Joon-Kyu
    • Animal cells and systems
    • /
    • v.11 no.2
    • /
    • pp.129-134
    • /
    • 2007
  • The initiation of eukaryotic DNA replication requires assembly of the pre-replicative complex (Pre-RC) through the concerted action of Orc, Cdc6, Cdt1 and Mcm2-7 complex during G1 phase. The pre-RC assembly licenses individual replication origins for the initiation of DNA replication and sufficient number of the pre-RC is essential for proper progression of S phase. However, it is not well known how cells recognize the completion of the pre-RC assembly before G1-S transition. In order to understand the cellular responses to the defects in pre-RC assembly, we depleted the known components of pre-RC proteins using the small interference RNAs in HeLa cells. Although the defects of pre-RC assembly by the depletion of the pre-RC proteins such as Orc2, Cdt1, Mcm2 & Mcm10 did not elicit the activation of Chk1- or Chk2-dependent checkpoint pathways, these cells still showed significant decrease in the cellular level of Cdc25A proteins. These results suggests that a novel checkpoint pathway exist in HeLa cells, which is not dependent upon Chk1 or Chk2 proteins and play essential roles in the cellular responses to the defects in the pre-RC assembly. Also, among those four proteins tested in this study, the depletion of Mcm10 and Cdt1 proteins significantly increased the apoptotic cell death in HeLa cells, suggesting that these proteins not only play roles in the pre-RC assembly, but also are involved in the checkpoint responses to the defects in the pre-RC assembly.

Characterization of a Putative F-box Motif in Ibd1p/Bfalp, a Spindle Checkpoint Regulator of Budding Yeast Saccharomyces cerevisiae

  • Lee, Kyum-Jung;Hyung-Seo;Kiwon Song
    • Journal of Microbiology
    • /
    • v.39 no.4
    • /
    • pp.286-292
    • /
    • 2001
  • During mitosis. the proper segregation of duplicated chromosomes is corrdinated by a spindle check-point. The bifurcated spindle checkpoint blocks cell cycle progression at metaphase by monitoring unattached kinetochores and inhibits mitotic exit in response to the misorientation of the mitotic spin- dle Ibd1p/Bfa1p is a spindle checkpoint regulator of budding yeast in the Bub2p checkpoint pathway for mitotic exit and its disruption abolishes mitotic arrest when proper organization of the mitotic spin-dls inhibited. Ibd1p/Bfa1p localizes to the spindle pole body, a microtublue-organizing center in yeast, and its overexpression arrests the cell cycle in 80% of cells with an enlarged budy at mitosis and in 20 % of cells with multiple buds. In this study, we found that the C-terminus of Ibd1p/Bfa1p phys-ically interacts with Skp1p, a key component of SCF (Skp1/cullin/F-box) complex for ubiquition-medi-ated proteolysis of cel cycle regulatores as well as an evolutionally conserved kinetochore protein for cell cycle progression. A putative F-box motif was found in the C-terminus of Ibd1p/Bfa1p and its function was investigated by making mutants of conserved residues in the motif. These Ibd1p/Bfa1p mutants of a putative F-box interacted with SKp1p in vitro by two-hybrid assays as wild type Ibd1p/Bfa1p. Also these Ibd1p/Bfa1p utants displayed the overexpression phenotypes of wild type Ibd1p, when over-expressed under inducible promoters . These results suggest that a putative F-box motif of Ibd1p/Bfa1p is not essential for the interaction with SKp1p and its function in mitotic exit and cytokinesis.

  • PDF

Determining Checkpoint Intervals of Non-Preemptive Rate Monotonic Scheduling Using Probabilistic Optimization (확률 최적화를 이용한 비선점형 Rate Monotonic 스케줄링의 체크포인트 구간 결정)

  • Kwak, Seong-Woo;Yang, Jung-Min
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.1
    • /
    • pp.120-127
    • /
    • 2011
  • Checkpointing is one of common methods of realizing fault-tolerance for real-time systems. This paper presents a scheme to determine checkpoint intervals using probabilistic optimization. The considered real-time systems comprises multiple tasks in which transient faults can happen with a Poisson distribution. Also, multi-tasks are scheduled by the non-preemptive Rate Monotonic (RM) algorithm. In this paper, we present an optimization problem where the probability of task completion is described by checkpoint numbers. The solution to this problem is the optimal set of checkpoint numbers and intervals that maximize the probability. The probability computation includes schedulability test for the non-preemptive RM algorithm with respect to given numbers of checkpoint re-execution. A case study is given to show the applicability of the proposed scheme.

Determination of the Optimal Checkpoint and Distributed Fault Detection Interval for Real-Time Tasks on Triple Modular Redundancy Systems (삼중구조 시스템의 실시간 태스크 최적 체크포인터 및 분산 고장 탐지 구간 선정)

  • Seong Woo Kwak;Jung-Min Yang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.527-534
    • /
    • 2023
  • Triple modular redundancy (TMR) systems can continue their mission by virtue of their structural redundancy even if one processor is attacked by faults. In this paper, we propose a new fault tolerance strategy by introducing checkpoints into the TMR system in which data saving and fault detection processes are separated while they corporate together in the conventional checkpoints. Faults in one processor are tolerated by synchronizing the state of three processors upon detecting faults. Simultaneous faults occurring to more than one processor are tolerated by re-executing the task from the latest checkpoint. We propose the checkpoint placement and fault detection strategy to maximize the probability of successful execution of a task within the given deadline. We develop the Markov chain model for the TMR system having the proposed checkpoint strategy, and derive the optimal fault detection and checkpoint interval.

X-Ray Security Checkpoint System Using Storage Media Detection Method Based on Deep Learning for Information Security

  • Lee, Han-Sung;Kim Kang-San;Kim, Won-Chan;Woo, Tea-Kun;Jung, Se-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1433-1447
    • /
    • 2022
  • Recently, as the demand for physical security technology to prevent leakage of technical and business information of companies and public institutions increases, the high tech companies are operating X-ray security checkpoints at building entrances to protect their intellectual property and technology. X-ray security checkpoints are operated to detect cameras and storage media that may store or leak important technologies in the bags of people entering and leaving the building. In this study, we propose an X-ray security checkpoint system that automatically detects a storage medium in an X-ray image using a deep learning based object detection method. The proposed system consists of an edge computing unit and a cloud-computing unit. We employ the RetinaNet for automatic storage media detection in the X-ray security checkpoint images. The proposed approach achieved mAP of 95.92% on private dataset.

Optimising IL-2 for Cancer Immunotherapy

  • Jonathan Sprent;Onur Boyman
    • IMMUNE NETWORK
    • /
    • v.24 no.1
    • /
    • pp.5.1-5.19
    • /
    • 2024
  • The key role of T cells in cancer immunotherapy is well established and is highlighted by the remarkable capacity of Ab-mediated checkpoint blockade to overcome T-cell exhaustion and amplify anti-tumor responses. However, total or partial tumor remission following checkpoint blockade is still limited to only a few types of tumors. Hence, concerted attempts are being made to devise new methods for improving tumor immunity. Currently, much attention is being focused on therapy with IL-2. This cytokine is a powerful growth factor for T cells and optimises their effector functions. When used at therapeutic doses for cancer treatment, however, IL-2 is highly toxic. Nevertheless, recent work has shown that modifying the structure or presentation of IL-2 can reduce toxicity and lead to effective anti-tumor responses in synergy with checkpoint blockade. Here, we review the complex interaction of IL-2 with T cells: first during normal homeostasis, then during responses to pathogens, and finally in anti-tumor responses.

Advanced reactivation algorithm after recover ins on Home-based Distributed Shared Memory (홈기반 분산공유메모리 상에서 결함복구후 향상된 재실행 알고리즘)

  • 김용국;하금숙;유은경;이성우;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.844-846
    • /
    • 2001
  • 홈기반의 분산 공유메모리 모델은 지금 현재 가장 적은 외부 통신비용을 가진 프로토콜 모델이다. 본 논문에서는 기존의 Recoverpoint와 Recoverpoint Server를 이용한 결함허용모델 (Checkpoint Model)을 보다 향상시키기 위하여 향상된 결함복구후 재실행 알고리즘을 제안한다. 이 알고리즘은 피기백(Piggyback)방식과 복수개의 Checkpoint를 사용하며 기존의 Vector Time Stamp 기법시스템보다 더 낳은 확장성과 실행속도를 제공한다.

  • PDF

RELIABILITY ANALYSIS OF CHECKPOINTING MODEL WITH MULTIPLE VERIFICATION MECHANISM

  • Lee, Yutae
    • Bulletin of the Korean Mathematical Society
    • /
    • v.56 no.6
    • /
    • pp.1435-1445
    • /
    • 2019
  • We consider a checkpointing model for silent errors, where a checkpoint is taken every fixed number of verifications. Assuming generally distributed i.i.d. inter-occurrence times of errors, we derive the reliability of the model as a function of the number of verifications between two checkpoints and the duration of work interval between two verifications.

An Efficient Checkpoint Protocol in Wireless Sensor Network for Reliability (무선 센서 네트워크에서 신뢰성 향상을 위한 효율적인 체크포인트 프로토콜)

  • Jung, Dong-Won;Choi, Chang-Yeol;Kim, Sung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.583-594
    • /
    • 2006
  • The reliability concept of wireless sensor network is essential to get exactly actual data from the ubiquitous environment. A rollback technique for the self-healing helps to increase it. However, a fault can occur in wireless sensor network when to use a previous rollback technique because it is designed just for the local system. So, checkpoint protocols are suggested in order to use a rollback technique in the network without the fault. However, there is trade-off among performance overhead, power consumption, and memory overhead for each of protocols. Hence, we suggest a novel global checkpoint protocol, so called address log based protocol(ALBP), based on an asynchronous protocol. It is a platform based protocol to reduce power consumption, performance overhead, and memory overhead which are the most of consideration in wireless sensor network.