• Title/Summary/Keyword: model viruses

Search Result 77, Processing Time 0.026 seconds

Virus Inactivation Processes for the Manufacture of Human Acellular Dermal Matrix (인체이식용 무세포 진피 제조를 위한 바이러스 불활화 공정)

  • Bae, Jung-Eun;Kim, Jin-Young;Ahn, Jae-Hyoung;Choi, Da-Mi;Jeong, Hyo-Sun;Lee, Dong-Hyuck;Kim, In-Seop
    • Microbiology and Biotechnology Letters
    • /
    • v.38 no.2
    • /
    • pp.168-176
    • /
    • 2010
  • Acellular dermal matrix (ADM), produced by decellularization from human cadaveric skin, has been used for various biomedical applications. A manufacturing process for ADM ($SureDerm^{TM}$) using tri-n-butyl phospahate (TnBP) and deoxycholic acids as the decellularization solution has been developed. The manufacturing process for $SureDerm^{TM}$ has 70% ethanol treatment and ethylene oxide gas sterilization for inactivating infectious microorganisms. The purpose of this study was to examine the efficacy of the 70% ethanol treatment, decellularization process using 0.1% TnBP and 2% deoxycholic acids, and EO gas sterilization process in the inactivation of viruses. A variety of experimental model viruses for human pathogens, including the human immunodeficiency virus type 1 (HIV-1), bovine herpes virus (BHV), bovine viral diarrhoea virus (BVDV), hepatitis A virus (HAV), and porcine parvovirus (PPV) were all selected for this study. Enveloped viruses such as HIV-1, BHV, and BVDV were effectively inactivated to undetectable levels by 70% ethanol treatment. However HAV and PPV showed high resistance to 70% ethanol treatment with the log reduction factors of 1.85 and 1.15, respectively. HIV-1, BHV, and BVDV were effectively inactivated to undetectable levels by decellularization process. All the viruses tested were completely inactivated to undetectable levels by EO gas treatment. The cumulative log reduction factors of HIV-1, BHV, BVDV, HAV, and PPV were $\geq12.71$, $\geq18.08$, $\geq14.92$, $\geq6.57$, and $\geq7.18$, respectively. These results indicate that the production process for $SureDerm^{TM}$ has a sufficient virus-reducing capacity to achieve a high margin of the virus safety.

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

The Norwegian Model of Fisheries Bio-Resources Management (노르웨이 해역 수산생명자원 관리모델)

  • Oh, Hyun Taik;Lee, Won Chan;Song, Chi Mun;Kim, Hyung-Chul;Kim, Jeong-Bae;Jung, Rae-Hong
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.46 no.2
    • /
    • pp.111-118
    • /
    • 2013
  • The Norwegian coastal area is the most efficient region for fishery production in the world's oceans, the Norway is the world's top 10 fisheries countries through efficient fishing and fishing aquaculture technology and its scientific management of fisheries bio-resources, with Norwegian salmon having attained the world's highest level. In the late 1980s, fisheries resources were depleted due to overfishing and fish diseases, resulting in a crisis in the fishing industry that lasted until the early 1990s. Since the national fishery emergency, people involved in the fishing industry, including fishermen, research scientists, and government officers, have tried to overcome the challenges facing the industry and identify an appropriate management model for fisheries bio-resources in the Norwegian coastal area. First, research vessels were used to monitor water and sediment conditions and fishery species, with the long-term aim of predicting fishery resources in real time and collecting information on species diversity, abundance, and distribution. Second, a "Healthy Fish Project" was promoted to counter natural disasters and fish disease problems with the development of vaccines against viruses and bacteria, eventually allowing for a decrease in the use of antibiotics and the production of notably healthier fish in the 2000s. Third, a systematic management model was developed to help with preparations for decreases in the total number of fishermen and increases in the proportion of elderly fishermen in the fishery industry using the development of automatic fishing aquaculture systems and short-chain systems. We could learn from the Norwegian model of fisheries bio-resources, management and could adopt it for the preparation of fishery bio-resources management policy for South Korean coastal areas in the near future.

Proposes the Total Management Model by using Directory Service and through the development HR Solution (Directory Service와 HR 솔루션 개발을 통한 IT 통합 관리 모델 제안)

  • Lee, Sung-jun;Kim, Min-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.684-689
    • /
    • 2013
  • The reality is that many security and administrative issues with the expansion of the IT assets in accordance with the abrupt change in the business environment, most companies today are struggling. Information within an organization is a party through external hackers and viruses that are increasingly intelligent risk, and the risk of internal data spills occur through an unauthorized party and internal information in accordance with the co-operation of the outsourcing company and the employee wants to see a sense of security and due to the frequent project asset outflows the risk is increasing gradually. In this paper, in preparation for such a growing security risk management and the increasing of problems, proposes the Total Management Model by using Microsoft's Directory Service & HR Solution that is an integrated management model that can take low-cost, high-efficiency.

  • PDF

Cynomolgus Macaque Model for COVID-19 Delta Variant

  • Seung Ho Baek;Hanseul Oh;Bon-Sang Koo;Green Kim;Eun-Ha Hwang;Hoyin Jung;You Jung An;Jae-Hak Park;Jung Joo Hong
    • IMMUNE NETWORK
    • /
    • v.22 no.6
    • /
    • pp.48.1-48.13
    • /
    • 2022
  • With the spread of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) variants, which are randomly mutated, the dominant strains in regions are changing globally. The development of preclinical animal models is imperative to validate vaccines and therapeutics against SARS-CoV-2 variants. The objective of this study was to develop a non-human primate (NHP) model for SARS-CoV-2 Delta variant infection. Cynomolgus macaques infected with Delta variants showed infectious viruses and viral RNA in the upper (nasal and throat) and lower respiratory (lung) tracts during the acute phase of infection. After 3 days of infection, lesions consistent with diffuse alveolar damage were observed in the lungs. For cellular immune responses, all macaques displayed transient lymphopenia and neutrophilia in the early stages of infection. SARS-CoV-2 Delta variant spike protein-specific IgM, IgG, and IgA levels were significantly increased in the plasma of these animals 14 days after infection. This new NHP Delta variant infection model can be used for comparative analysis of the difference in severity between SARS-CoV-2 variants of concern and may be useful in the efficacy evaluation of vaccines and universal therapeutic drugs for mutations.

An Immunity-based Security Antibody Layer Model (생체 면역시스템 기반의 새로운 보안 항체 계층모델)

  • 이동욱
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.2
    • /
    • pp.122-128
    • /
    • 2000
  • With the rising innovative antigens(such as intruders and viruses) through Internet, new secure schemes are expected to perceptively detect and put them down. However, the current hosts over Internet could not properly analyze Internet antigens due to limitations of their system and network resources. In this paper, we introduce an Antibody Layer that mediates proper security services based on the biological mechanism to mpidly disclose and remove innovative antigens. The proposed Antibody Layer also provides three classes to make agreed-on security parameters set up easily with respect to real-time security QoS for one host as well as host alliances.

  • PDF

How Z-DNA/RNA binding proteins shape homeostasis, inflammation, and immunity

  • Kim, Chun
    • BMB Reports
    • /
    • v.53 no.9
    • /
    • pp.453-457
    • /
    • 2020
  • The right-handed double-helical structure of DNA (B-DNA), which follows the Watson-Crick model, is the canonical form of DNA existing in normal physiological settings. Even though an alternative left-handed structure of DNA (Z-DNA) was discovered in the late 1970s, Z-form nucleic acid has not received much attention from biologists, because it is extremely unstable under physiological conditions, has an ill-defined mechanism of its formation, and has obscure biological functions. The debate about the physiological relevance of Z-DNA was settled only after a class of proteins was found to potentially recognize the Z-form architecture of DNA. Interestingly, these Z-DNA binding proteins can bind not only the left-handed form of DNA but also the equivalent structure of RNA (Z-RNA). The Z-DNA/RNA binding proteins present from viruses to humans function as important regulators of biological processes. In particular, the proteins ADAR1 and ZBP1 are currently being extensively re-evaluated in the field to understand potential roles of the noncanonical Z-conformation of nucleic acids in host immune responses and human disease. Despite a growing body of evidence supporting the biological importance of Z-DNA/RNA, there remain many unanswered principal questions, such as when Z-form nucleic acids arise and how they signal to downstream pathways. Understanding Z-DNA/RNA and the sensors in different pathophysiological conditions will widen our view on the regulation of immune responses and open a new door of opportunity to develop novel types of immunomodulatory therapeutic possibilities.

Requirement of CD4 Help for Induction of CD8 T Cell Response Specific for Virally Derived H60

  • Ryu, Su-Jeong;Kang, Bo-Ra;Kim, Seok-Ho;Kim, Tae-Woo;Chang, Jun;Choi, Eun-Young
    • IMMUNE NETWORK
    • /
    • v.12 no.3
    • /
    • pp.118-125
    • /
    • 2012
  • CD40-CD40L-mediated help from CD4 T cells is essential to induce primary CD8 T cell responses specific to the non-inflammatory cell-based antigen H60. In this study, using H60 as a model antigen, we generated recombinant vaccinia viruses (rVVs) expressing the H60 CD8 epitope and investigated whether CD4 help was required to activate the CD8 T cell response specific to the virally expressed H60. The immune response after infection with rVVs expressing H60 was similar to that after immunization with H60 congenic splenocytes, with a peak frequency of H60-specific CD8 T cells detected in the blood on day 10 post-infection. A CD8 T cell response specific for virally derived H60 was not induced in CD4-depleted mice, but was in CD40-deficient mice. These results provide insights into the characterization of the CD8 T cell response specifically for antigens originating from cellular sources compared to viral sources.

Modulation of a Fungal Signaling by Hypovirus

  • Kim, Dae-Hyuk
    • The Plant Pathology Journal
    • /
    • v.19 no.1
    • /
    • pp.30-33
    • /
    • 2003
  • The chestnut blight fungus, Cryphonectria parasitica, and its hypovirus aye a useful model system in the study of the mechanisms of hypoviral infection and its consequences, such as a biological control of fungal pathogens. Strains containing the double-stranded (ds) RNA viruses Cryphonectria hypovirus 1 show characteristic symptoms of hypovirulence and display hypovirulence-associated changes, such as reduced pigmentation, sporulation, laccase production, and oxalate accumulation. Interestingly, symptoms caused by hypoviral infection appear to be the result of aberrant expression of a number of specific genes in the hypovirulent strain. Several viral regulated fungal genes are identified as cutinase gene, Lac1, which encodes an extracellular laccase, Crp, which encodes an abundant tissue-specific cell-surface hydrophobin that mediates physical strength, and Mf2/1 and Mf2/2, which encode pheromone genes involved in poor sporulation in the presence of hypo-virus. Since the phenotypic changes in the fungal host are pleiotropic, although coordinated and specific, it has been suggested that the hypovirus disturbs one or several regulatory pathways (Nuss,1996). Accordingly, several studies have shown the implementation of a signal transduction pathway during viral symptom development. Although further studies are required, hypovirulence and its associated symptom development due to the hypoviral regulation of a fungal hetero-trimeric G-protein have been suggested. In addition, recent studies have shown the presence of a novel protein kinase gene cppk1 and its transcriptional upregulation by hypovirus. In this review, the presence of important components in signal transduction pathway, their putative biological function, and viral-specific regulation will be addressed.

Semi-supervised based Unknown Attack Detection in EDR Environment

  • Hwang, Chanwoong;Kim, Doyeon;Lee, Taejin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4909-4926
    • /
    • 2020
  • Cyberattacks penetrate the server and perform various malicious acts such as stealing confidential information, destroying systems, and exposing personal information. To achieve this, attackers perform various malicious actions by infecting endpoints and accessing the internal network. However, the current countermeasures are only anti-viruses that operate in a signature or pattern manner, allowing initial unknown attacks. Endpoint Detection and Response (EDR) technology is focused on providing visibility, and strong countermeasures are lacking. If you fail to respond to the initial attack, it is difficult to respond additionally because malicious behavior like Advanced Persistent Threat (APT) attack does not occur immediately, but occurs over a long period of time. In this paper, we propose a technique that detects an unknown attack using an event log without prior knowledge, although the initial response failed with anti-virus. The proposed technology uses a combination of AutoEncoder and 1D CNN (1-Dimention Convolutional Neural Network) based on semi-supervised learning. The experiment trained a dataset collected over a month in a real-world commercial endpoint environment, and tested the data collected over the next month. As a result of the experiment, 37 unknown attacks were detected in the event log collected for one month in the actual commercial endpoint environment, and 26 of them were verified as malicious through VirusTotal (VT). In the future, it is expected that the proposed model will be applied to EDR technology to form a secure endpoint environment and reduce time and labor costs to effectively detect unknown attacks.