Search results for "Defence"
showing 10 items of 472 documents
Robust Antigen-Specific T Cell Activation within Injectable 3D Synthetic Nanovaccine Depots
2021
Contains fulltext : 244693.pdf (Publisher’s version ) (Open Access) Synthetic cancer vaccines may boost anticancer immune responses by co-delivering tumor antigens and adjuvants to dendritic cells (DCs). The accessibility of cancer vaccines to DCs and thereby the delivery efficiency of antigenic material greatly depends on the vaccine platform that is used. Three-dimensional scaffolds have been developed to deliver antigens and adjuvants locally in an immunostimulatory environment to DCs to enable sustained availability. However, current systems have little control over the release profiles of the cargo that is incorporated and are often characterized by an initial high-burst release. Here,…
The transformation of the Russian defence industry
1995
TRADITIONALLY, THE DEFENCE INDUSTRY constituted the most powerful industrial lobby in the USSR, with an administrative structure at all the organisational levels where its interests could be affected. With a hierarchical and pyramidal structure, the different entities of the sector remained isolated from strictly civilian bodies. The strategic part it played within the organisation of the Soviet Union enabled the defence industry to manage a growing and important volume of resources; on the one hand, it had a special supply system which guaranteed regular high-quality provision of the most advanced technology in the country, as well as highly qualified human resources. On the other hand, th…
Toxicity of binary mixtures of Cu, Cr and As to the earthworm Eisenia andrei
2020
AbstractChromated copper arsenate (CCA) mixtures were used in the past for wood preservation, leading to large scale soil contamination. This study aimed at contributing to the risk assessment of CCA-contaminated soils by assessing the toxicity of binary mixtures of copper, chromium and arsenic to the earthworm Eisenia andrei in OECD artificial soil. Mixture effects were related to reference models of Concentration Addition (CA) and Independent Action (IA) using the MIXTOX model, with effects being related to total and available (H2O and 0.01 M CaCl2 extractable) concentrations in the soil. Since only in mixtures with arsenic dose-related mortality occurred (LC50 92.5 mg/kg dry soil), it wa…
Old Weapons for New Wars: Bioactive Molecules From Cnidarian Internal Defense Systems
2016
The renewed interest in the study of genes of immunity in Cnidaria has led to additional information to the scenario of the first stages of immunity evolution revealing the cellular processes involved in symbiosis, in the regulation of homeostasis and in the fight against infections. The recent study with new molecular and functional approach on these organisms have therefore contributed with unexpected information on the knowledge of the stages of capturing activities and defense mechanisms strongly associated with toxin production. Cnidarians are diblastic aquatic animals with radial symmetry; they represent the ancestral state of Metazoa, they are the simplest multicellular organisms tha…
Old versus new world: adaptive significance of nest defence in two brood parasitism systems
2011
Insect Immunity: An Evolutionary Ecology Perspective
2005
Abstract We review recent advances in our understanding of the mechanisms of insect immune defence, but do so in a framework defined by the ecological and evolutionary forces that shape insect immune defence. Recent advances in genetics and molecular biology have greatly expanded our understanding of the details of the immune mechanisms that enable insects to defend themselves against parasites and pathogens. However, these studies are primarily concerned with discovering and describing how resistance mechanisms work. They rarely address the question of why they are shaped the way they are. Partly because we know so much about the mechanisms that it is now becoming possible to ask such ulti…
Postattack deimatic display in the mountain katydid, Acripeza reticulata
2015
Prey use many strategies to avoid being detected by their predators. However, once detected and identified as potentially palatable, prey must employ a second line of defence such as performing a deimatic (startle) display. During the predation sequence, composed of the stages encounter, detection, identification, approach, subjugation and consumption, such defences should be deployed as the predator approaches, but before prey are brought under the predator's control (i.e. before subjugation). We tested this assumption in the mountain katydid (or bush cricket), which is cryptic at rest, but when disturbed flashes spectacular abdominal colours by lifting its wings, and is chemically defende…
Defence strategies in an online community of caregivers
2021
Purpose The purpose of this paper is to understand caregivers’ discursive constructions and responses to their unwanted (family and social) role as resulting in exchanges on social media. Online group platforms are understood as particularly suitable for the expression of intimate feelings among adults, for meeting and exhibiting stigma issues, and for the circulation of information and support (Suler, 2004; McCormack, 2010; Pounds et al., 2018). Design/methodology/approach This paper draws from digital Conversation Analysis (Giles et al., 2015), and considers data after combining quantitative (corpus analysis) and qualitative methods, from a critical discourse analysis perspective. The St…
Linking Disaster Risk Reduction and Healthcare in Locations with Limited Accessibility: Challenges and Opportunities of Participatory Research
2020
Disaster risk reduction and healthcare support each other, including the mitigation of further harm after illness or injury. These connections are particularly relevant in locations which have permanent or temporary limited accessibility. In these circumstances, people are required to be self-sufficient in providing emergency and long-term healthcare with limited resources. Planning and preparing to mitigate further harm after illness or injury from disasters (disaster risk reduction) must include people living and working in locations with limited accessibility, meaning that participatory research can be used. The challenges and opportunities of enacting participatory research in such cont…
Hypervisor-based Protection of Code
2019
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…