Search results for "CTL"
showing 10 items of 521 documents
Rational solutions to the mKdV equation associated to particular polynomials
2021
International audience; Rational solutions to the modified Korteweg-de Vries (mKdV) equation are given in terms of a quotient of determinants involving certain particular polynomials. This gives a very efficient method to construct solutions. We construct very easily explicit expressions of these rational solutions for the first orders n = 1 until 10.
Vers le développement d'un capteur photoplétysmographique sans contact
2019
Heart-rate estimation performed with remote photoplethysmography is a very active research field. Since pioneer works in 2010, which demonstrated the feasibility of the measure with low-grade consumers’ camera (webcam), the number of scientific publications have increased significantly in the domain. Hence, we observe a multiplication of the methods in order to retrieve the photoplethysmographic signal which has led to an increased precision and quality of the heart-rate estimation. Region of interest segmentation is a key step of the processing pipeline in order to maximize the quality of the measured signal. We propose a new method to perform remote photoplethysmographic measurement using…
The mKdV equation and multi-parameters rational solutions
2021
Abstract N -order solutions to the modified Korteweg–de Vries (mKdV) equation are given in terms of a quotient of two wronskians of order N depending on 2 N real parameters. When one of these parameters goes to 0, we succeed to get for each positive integer N , rational solutions as a quotient of polynomials in x and t depending on 2 N real parameters. We construct explicit expressions of these rational solutions for orders N = 1 until N = 6 .
ScaleSem : model checking and semantic web
2012
The increasing development of networks and especially the Internet has greatly expanded the gap between heterogeneous information systems. In a review of studies of interoperability of heterogeneous information systems, we find that all the work in this area tends to be in solving the problems of semantic heterogeneity. The W3C (World Wide Web Consortium) standards proposed to represent the semantic ontology. Ontology is becoming an indispensable support for interoperability of information systems, and in particular the semantics. The structure of the ontology is a combination of concepts, properties and relations. This combination is also called a semantic graph. Several languages have bee…
Molecular mechanisms of primary and secondary mucosal immunity using avian infectious bronchitis virus as a model system
2007
Although mucosal immune responses are critical for protection of hosts from clinical illness and even mortality caused by mucosal pathogens, the molecular mechanism of mucosal immunity, which is independent of systemic immunity, remains elusive. To explore the mechanistic basis of mucosal protective immunity, gene transcriptional profiling in mucosal tissues was evaluated after the primary and secondary immunization of animals with an attenuated avian infectious bronchitis virus (IBV), a prototype of Coronavirus and a well-characterized mucosal pathogen. Results showed that a number of innate immune factors including toll-like receptors (TLRs), retinoic-acid-inducible gene-1 (RIG-1), type I…
Wireless Charging Systems for Electric Vehicle Batteries
EFFECT OF M-LOCUS DEPENDENT T-CELL PROLIFERATION UPON THE INDUCTION OF ANTI H-2 CYTOTOXIC T EFFECTOR CELLS
1975
SUMMARY The influence of M-locus dependent T cell proliferation on the induction of anti H-2 cytotoxic T lymphocytes (CTL) was tested in an in vitro murine cytotoxic allograft model. BALB/c (or CBA/H) derived responder cells (H-2d or H-2k) were cultured together with either C57BL derived fibroblasts or C57BL derived (H-2b), U.V. light irradiated, splenic lymphocytes. These stimulator cells lack functionally active lymphocyte activating determinants (LADs), but display serologically defined (SD) H-2 antigenic specificities. The cytotoxic anti SD-activity obtained was weak. Under certain experimental conditions, the addition of stimulator cells which are H-2 identical to the responder cells b…
Transcutaneous Immunization with a Solid Nanoscopic Imiquimod Suspension Enhances Tumor Rejection
2015
Abstract Introduction: Transcutaneous immunization (TCI) is a novel vaccination strategy to induce strong therapeutic cytotoxic T-lymphocyte (CTL) responses by directly targeting skin-resident professional antigen-presenting cells (APC). This vaccination approach is very promising to overcome current limitations of standard vaccination approaches that are mostly effective in prophylaxis, but not in the treatment of diseases. In this context, we have developed a TCI method based on a synthetic TLR7 agonist imiquimod that partial tumor protection in experimental rodent models. In our present work, we describe a novel optimized formulation of imiquimod in a solid suspension of crystalline imiq…
Life Cycle Assessment of repurposed electric vehicle batteries: an adapted method based on modelling energy flows
2018
Abstract After their first use in electric vehicles (EVs), the residual capacity of traction batteries can make them valuable in other applications. Although reusing EV batteries remains an undeveloped market, second-use applications of EV batteries are in line with circular economy principles and the waste management hierarchy. Although substantial environmental benefits are expected from reusing traction batteries, further efforts are needed in data collection, modelling the life-cycle stages and calculating impact indicators to propose a harmonized and adapted life-cycle assessment (LCA) method. To properly assess the environmental benefits and drawbacks of using repurposed EV batteries …
Operazioni di pagamento tramite wallet e responsabilità da omessa applicazione della strong customer authentication
2022
Lo scritto commenta una recente decisione del Collegio di Coordinamento ABF a proposito del riparto di responsabilità tra intermediario emittente una carta di pagamento e cliente, in caso di operazioni abusivamente realizzate da terzi tramite «wallet». Il Collegio, analizzando la disciplina in tema di servizi di pagamento elettronici e di « Strong Customer Authentication », precisa come l’indagine del caso vada in primo luogo condotta verificando che l’intermediario abbia fornito la prova della corretta applicazione dell’autenticazione forte in ogni fase delle transazioni abusivamente compiute. Ove tale prova non sia fornita, egli dovrà restituire quanto dal cliente abusivamente versato. Th…