• 제목/요약/키워드: model viruses

검색결과 79건 처리시간 0.028초

인체이식용 무세포 진피 제조를 위한 바이러스 불활화 공정 (Virus Inactivation Processes for the Manufacture of Human Acellular Dermal Matrix)

  • 배정은;김진영;안재형;최다미;정효선;이동혁;김인섭
    • 한국미생물·생명공학회지
    • /
    • 제38권2호
    • /
    • pp.168-176
    • /
    • 2010
  • 사체 피부에서 면역반응을 일으킬 수 있는 세포들을 제거한 무세포 진피는 다양한 의료용 소재로 사용되고 있다. Trin-butyl phospahate(TnBP)와 deoxycholic acids를 세포제거 용액으로 사용하여 피부조직 내 진피층의 3차원적 구조를 손상시키지 않고 다양한 구조 단백질 및 성분들을 유지한 상태에서 면역반응의 대상인 세포성 항원만을 선별적으로 제거한 이식용 동종 무세포 진피인 $SureDerm^{TM}$을 개발하였다. $SureDerm^{TM}$ 제조공정은 감염성 위해인자 불활화 공정으로 70% 에탄올 처리와 산화에틸렌 가스 처리 공정을 포함하고 있다. 본 연구에서는 SureDermTM 제조공정 중 70% 에탄올 소독 공정, 세포제거용액(0.1% TnBP와 2% deoxycholic acids) 처리 공정, 산화에틸렌 가스 멸균의 바이러스 불활화 효과를 검증하기 위해 국제적 가이드에 따라 5종의 바이러스 [human immunodeficiency virus type 1(HIV-1), bovine herpes virus(BHV), Bovine viral diarrhoea virus(BVDV), hepatitis A virus(HAV), porcine parvovirus(PPV)]를 생물학적 지표로 사용하였다. 피부조직에 각 생물학적 지표를 첨가한 후 불활화 공정을 실시한 다음 각 바이러스를 회수하여 정량한 후 불활화 정도를 비교하였다. 70% 에탄올 20분처리 공정에서 HIV-1, BHV, BVDV 같은 외피 바이러스는 처리 시간 2.5분 안에 불활화되었지만, HAV와 PPV 같은 비-외피 바이러스는 에탄올에 저항성을 나타내어 20분 처리 후 log 바이러스 감소인수가 각각 1.85와 1.15였다. 세포제거용액 처리 공정에서 HIV-1, BHV, BVDV는 각각 5분, 30분, 5분 안에 검출한계 이하로 불활화되었다. 산화에틸렌 가스처리에 의해 본 연구에 사용한 모든 바이러스가 검출한계 이하로 불활화되었다. 3가지 공정에서 HIV-1, BHV, BVDV, HAV, PPV에 대한 log 바이러스 감소인수 합은 각각 $\geq12.71$, $\geq18.08$, $\geq14.92$, $\geq6.57$, $\geq7.18$이었다. 이와 같은 결과에서 $SureDerm^{TM}$ 제조공정은 바이러스 안전성을 보증할 수 있는 충분한 바이러스 불활화 능력을 갖고 있는 것으로 판단된다.

이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구 (A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems)

  • 이동영;김동수;정태명
    • 정보처리학회논문지C
    • /
    • 제8C권5호
    • /
    • pp.607-614
    • /
    • 2001
  • 정보통신과 컴퓨터기술의 발전으로 인하여 불법침입으로 인한 정보 파괴, 서비스거부공격 그리고 컴퓨터 바이러스 등에 의한 역기능이 날로 증가하고 있는 추세이다. 또한, 이러한 공격들로부터 네트워크를 보호하기 위해서 침입차단시스템(일명:방화벽), 침입탐지시스템, 접근제어시스템 등 많은 보안제품들이 개발 및 적용되고 있다. 그러나 이러한 보안 제품들에 대한 관리를 위해서는 많은 작업과 비용이 소요된다. 따라서, 이들 보안제품들에 대한 효율적인 관리와 일관된 보안 정책을 적용할 수 있는 정책 기반의 통합보안관리시스템의 정책모델이 필요하게 되었다. 본 논문에서는 정책계층의 개념을 기반으로 상위계층의 추상적이고 개념적인 정책을 보다 구체적인 형태의 정책으로 정제(refinement)하는 정책기반의 통합보안관리시스템의 계층적 정책모델을 제시하였다. 정책의 정형화된 표현을 위해서 Z-Notation을 적용하였으며, 이는 수학적 논리와 집합이론을 기반으로 스키마형태로 표현된다.

  • PDF

노르웨이 해역 수산생명자원 관리모델 (The Norwegian Model of Fisheries Bio-Resources Management)

  • 오현택;이원찬;송치문;김형철;김정배;정래홍
    • 한국수산과학회지
    • /
    • 제46권2호
    • /
    • pp.111-118
    • /
    • 2013
  • The Norwegian coastal area is the most efficient region for fishery production in the world's oceans, the Norway is the world's top 10 fisheries countries through efficient fishing and fishing aquaculture technology and its scientific management of fisheries bio-resources, with Norwegian salmon having attained the world's highest level. In the late 1980s, fisheries resources were depleted due to overfishing and fish diseases, resulting in a crisis in the fishing industry that lasted until the early 1990s. Since the national fishery emergency, people involved in the fishing industry, including fishermen, research scientists, and government officers, have tried to overcome the challenges facing the industry and identify an appropriate management model for fisheries bio-resources in the Norwegian coastal area. First, research vessels were used to monitor water and sediment conditions and fishery species, with the long-term aim of predicting fishery resources in real time and collecting information on species diversity, abundance, and distribution. Second, a "Healthy Fish Project" was promoted to counter natural disasters and fish disease problems with the development of vaccines against viruses and bacteria, eventually allowing for a decrease in the use of antibiotics and the production of notably healthier fish in the 2000s. Third, a systematic management model was developed to help with preparations for decreases in the total number of fishermen and increases in the proportion of elderly fishermen in the fishery industry using the development of automatic fishing aquaculture systems and short-chain systems. We could learn from the Norwegian model of fisheries bio-resources, management and could adopt it for the preparation of fishery bio-resources management policy for South Korean coastal areas in the near future.

Directory Service와 HR 솔루션 개발을 통한 IT 통합 관리 모델 제안 (Proposes the Total Management Model by using Directory Service and through the development HR Solution)

  • 이성준;김민수
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.684-689
    • /
    • 2013
  • 오늘날 대다수 기업들은 비즈니스 환경의 급격한 변화에 따른 IT 자산의 팽창에 따라 보안 및 관리상 많은 어려움을 겪고 있는 것이 현실이다. 조직 내 정보 인가자 및 비 인가자를 통한 내부 유출사고 발생의 위험과 점차 지능화되는 외부 해커 및 바이러스를 통한 위험, 직원들의 보안의식 부재와 빈번한 프로젝트로 인한 아웃소싱업체와의 공동 작업에 따른 내부 정보 유출 위험 등이 점차 증대되고 있다. 본 논문에서는 이렇게 늘어나는 보안 위험과 관리 부재의 문제에 대비하여, 기업들이 보다 적용하기 쉽고, 저비용, 고효율을 취할 수 있는 Microsoft사의 Directory Service와 HR 연동 솔루션을 통해 통합 관리 모델을 제시하고자 한다.

  • PDF

Cynomolgus Macaque Model for COVID-19 Delta Variant

  • Seung Ho Baek;Hanseul Oh;Bon-Sang Koo;Green Kim;Eun-Ha Hwang;Hoyin Jung;You Jung An;Jae-Hak Park;Jung Joo Hong
    • IMMUNE NETWORK
    • /
    • 제22권6호
    • /
    • pp.48.1-48.13
    • /
    • 2022
  • With the spread of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) variants, which are randomly mutated, the dominant strains in regions are changing globally. The development of preclinical animal models is imperative to validate vaccines and therapeutics against SARS-CoV-2 variants. The objective of this study was to develop a non-human primate (NHP) model for SARS-CoV-2 Delta variant infection. Cynomolgus macaques infected with Delta variants showed infectious viruses and viral RNA in the upper (nasal and throat) and lower respiratory (lung) tracts during the acute phase of infection. After 3 days of infection, lesions consistent with diffuse alveolar damage were observed in the lungs. For cellular immune responses, all macaques displayed transient lymphopenia and neutrophilia in the early stages of infection. SARS-CoV-2 Delta variant spike protein-specific IgM, IgG, and IgA levels were significantly increased in the plasma of these animals 14 days after infection. This new NHP Delta variant infection model can be used for comparative analysis of the difference in severity between SARS-CoV-2 variants of concern and may be useful in the efficacy evaluation of vaccines and universal therapeutic drugs for mutations.

생체 면역시스템 기반의 새로운 보안 항체 계층모델 (An Immunity-based Security Antibody Layer Model)

  • 이동욱
    • 한국지능시스템학회논문지
    • /
    • 제10권2호
    • /
    • pp.122-128
    • /
    • 2000
  • 호스트는 인터넷을 통한 혁신적인 공격(innovative antigen)을 신속하게 감지하고 제거할 수 있는 새로운 자율적 지능적 보안 시스템의 구현을 필요로 한다, 그러나 단독의 호스트가 이러한 공격에 대처 할수 있는 능력은 시스템 및 네트워크 자원의 제한으로 그 한계를 들어내고 있다. 본 논문에서는 생체면역체계를 기반으로 급속히 다양해지는 인터넷 공겨에 대해 효율적으로 신속히 대처를 할 수 있는 Antibody Layer(다변화된 자율 면역시스템)을 제안한다. Antibody Layer는 다양한 등급의 보안 서비스(Security Qos Class)를 제공해 주며 혁신적인 공격에 대해 호스트 단독으로 대처할 뿐만아니라 광대한 호스트 연합을 구성하여 공동으로 대처하므로 보다 질 높은 보안 서비스를 실시간으로 제공할 수 있다.

  • PDF

How Z-DNA/RNA binding proteins shape homeostasis, inflammation, and immunity

  • Kim, Chun
    • BMB Reports
    • /
    • 제53권9호
    • /
    • pp.453-457
    • /
    • 2020
  • The right-handed double-helical structure of DNA (B-DNA), which follows the Watson-Crick model, is the canonical form of DNA existing in normal physiological settings. Even though an alternative left-handed structure of DNA (Z-DNA) was discovered in the late 1970s, Z-form nucleic acid has not received much attention from biologists, because it is extremely unstable under physiological conditions, has an ill-defined mechanism of its formation, and has obscure biological functions. The debate about the physiological relevance of Z-DNA was settled only after a class of proteins was found to potentially recognize the Z-form architecture of DNA. Interestingly, these Z-DNA binding proteins can bind not only the left-handed form of DNA but also the equivalent structure of RNA (Z-RNA). The Z-DNA/RNA binding proteins present from viruses to humans function as important regulators of biological processes. In particular, the proteins ADAR1 and ZBP1 are currently being extensively re-evaluated in the field to understand potential roles of the noncanonical Z-conformation of nucleic acids in host immune responses and human disease. Despite a growing body of evidence supporting the biological importance of Z-DNA/RNA, there remain many unanswered principal questions, such as when Z-form nucleic acids arise and how they signal to downstream pathways. Understanding Z-DNA/RNA and the sensors in different pathophysiological conditions will widen our view on the regulation of immune responses and open a new door of opportunity to develop novel types of immunomodulatory therapeutic possibilities.

Requirement of CD4 Help for Induction of CD8 T Cell Response Specific for Virally Derived H60

  • Ryu, Su-Jeong;Kang, Bo-Ra;Kim, Seok-Ho;Kim, Tae-Woo;Chang, Jun;Choi, Eun-Young
    • IMMUNE NETWORK
    • /
    • 제12권3호
    • /
    • pp.118-125
    • /
    • 2012
  • CD40-CD40L-mediated help from CD4 T cells is essential to induce primary CD8 T cell responses specific to the non-inflammatory cell-based antigen H60. In this study, using H60 as a model antigen, we generated recombinant vaccinia viruses (rVVs) expressing the H60 CD8 epitope and investigated whether CD4 help was required to activate the CD8 T cell response specific to the virally expressed H60. The immune response after infection with rVVs expressing H60 was similar to that after immunization with H60 congenic splenocytes, with a peak frequency of H60-specific CD8 T cells detected in the blood on day 10 post-infection. A CD8 T cell response specific for virally derived H60 was not induced in CD4-depleted mice, but was in CD40-deficient mice. These results provide insights into the characterization of the CD8 T cell response specifically for antigens originating from cellular sources compared to viral sources.

Modulation of a Fungal Signaling by Hypovirus

  • Kim, Dae-Hyuk
    • The Plant Pathology Journal
    • /
    • 제19권1호
    • /
    • pp.30-33
    • /
    • 2003
  • The chestnut blight fungus, Cryphonectria parasitica, and its hypovirus aye a useful model system in the study of the mechanisms of hypoviral infection and its consequences, such as a biological control of fungal pathogens. Strains containing the double-stranded (ds) RNA viruses Cryphonectria hypovirus 1 show characteristic symptoms of hypovirulence and display hypovirulence-associated changes, such as reduced pigmentation, sporulation, laccase production, and oxalate accumulation. Interestingly, symptoms caused by hypoviral infection appear to be the result of aberrant expression of a number of specific genes in the hypovirulent strain. Several viral regulated fungal genes are identified as cutinase gene, Lac1, which encodes an extracellular laccase, Crp, which encodes an abundant tissue-specific cell-surface hydrophobin that mediates physical strength, and Mf2/1 and Mf2/2, which encode pheromone genes involved in poor sporulation in the presence of hypo-virus. Since the phenotypic changes in the fungal host are pleiotropic, although coordinated and specific, it has been suggested that the hypovirus disturbs one or several regulatory pathways (Nuss,1996). Accordingly, several studies have shown the implementation of a signal transduction pathway during viral symptom development. Although further studies are required, hypovirulence and its associated symptom development due to the hypoviral regulation of a fungal hetero-trimeric G-protein have been suggested. In addition, recent studies have shown the presence of a novel protein kinase gene cppk1 and its transcriptional upregulation by hypovirus. In this review, the presence of important components in signal transduction pathway, their putative biological function, and viral-specific regulation will be addressed.

Semi-supervised based Unknown Attack Detection in EDR Environment

  • Hwang, Chanwoong;Kim, Doyeon;Lee, Taejin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권12호
    • /
    • pp.4909-4926
    • /
    • 2020
  • Cyberattacks penetrate the server and perform various malicious acts such as stealing confidential information, destroying systems, and exposing personal information. To achieve this, attackers perform various malicious actions by infecting endpoints and accessing the internal network. However, the current countermeasures are only anti-viruses that operate in a signature or pattern manner, allowing initial unknown attacks. Endpoint Detection and Response (EDR) technology is focused on providing visibility, and strong countermeasures are lacking. If you fail to respond to the initial attack, it is difficult to respond additionally because malicious behavior like Advanced Persistent Threat (APT) attack does not occur immediately, but occurs over a long period of time. In this paper, we propose a technique that detects an unknown attack using an event log without prior knowledge, although the initial response failed with anti-virus. The proposed technology uses a combination of AutoEncoder and 1D CNN (1-Dimention Convolutional Neural Network) based on semi-supervised learning. The experiment trained a dataset collected over a month in a real-world commercial endpoint environment, and tested the data collected over the next month. As a result of the experiment, 37 unknown attacks were detected in the event log collected for one month in the actual commercial endpoint environment, and 26 of them were verified as malicious through VirusTotal (VT). In the future, it is expected that the proposed model will be applied to EDR technology to form a secure endpoint environment and reduce time and labor costs to effectively detect unknown attacks.