similar profile
Recently Published Documents


TOTAL DOCUMENTS

45
(FIVE YEARS 12)

H-INDEX

9
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Lea Flippe ◽  
Anne Gaignerie ◽  
Celine Serazin ◽  
Olivier Baron ◽  
Xavier Saulquin ◽  
...  

Immunotherapy using primary T cells has revolutionized medical care in some pathologies in recent years but limitations associated to challenging cell genome edition, insufficient cell number production, the use of only autologous cells and lack of product standardization have limited its uses in the clinic. The alternative use of T cells generated in vitro from human pluripotent stem cells (hPSCs) offers great advantages by providing a self-renewing source of T cells that can be readily genetically modified and facilitate the use of standardized universal off-the-shelf allogeneic cell products and rapid clinic access. However, despite their potential, the feasibility and functionality of T-cells differentiated from hPSCs needs better comprehension before moving to the clinic. In this study, we generated human induced pluripotent stem cells from T-cells (T-iPSCs) allowing preservation of already recombined TCR, with the same properties as human embryonic stem cells (hESCs). Based on these cells, we differentiated with high efficiency hematopoietic progenitor stem cells (HPSCs), capable of self-renewal and differentiation into any cell blood type, and then DN3a thymic progenitors from several T-iPSC lines. To better comprehend differentiation, we analyzed the transcriptomic profiles of the different cell types and demonstrated that HPSCs differentiated from hiPSCs had a very similar profile to cord blood hematopoietic stem cells (HSCs). Furthermore, differentiated T-cell progenitors had a similar profile to thymocytes at the DN3a stage of thymic lymphopoiesis. Therefore, with this approach, we were able to regenerate precursors of therapeutic human T cells to potentially treat a wide number of diseases.


Foods ◽  
2021 ◽  
Vol 10 (8) ◽  
pp. 1745
Author(s):  
Barbora Šimerdová ◽  
Michaela Bobríková ◽  
Ivona Lhotská ◽  
Jiří Kaplan ◽  
Alena Křenová ◽  
...  

Anthocyanins are the most important polyphenolic substances contained in blackcurrant fruits. They are responsible for the various health benefits caused, in particular, by their high antioxidant activity. Anthocyanins derived from anthocyanidins cyanidin and delphinidin are typical for blackcurrant fruits, especially their rutinoside and glucoside forms. These four anthocyanins usually represent about 97–98% of total anthocyanins in blackcurrant fruits. In this study, we developed and validated a new HPLC-DAD method for rapid anthocyanin separation and determination in fifteen perspective blackcurrant cultivars (‘Ruben’, ‘Ben Lomond’, ‘Ben Conan’, ‘Ceres’, ‘Moravia’, ‘Ometa’, ‘Lota’, ‘Fokus’, ‘Tenah’, ‘Sejanec’, ‘Consort’, ‘Triton’, ‘Ben Hope’, ‘Ben Gairn’, and one gooseberry hybrid ‘Josta’). Eight of them were monitored throughout the three-year experiment. The most represented anthocyanins in all monitored blackcurrant cultivars were delphinidin-3-rutinoside (36.7–63.6%), cyanidin-3-rutinoside (26.4–40.6%), delphinidin-3-glucoside (6.1–17.9%), and cyanidin-3-glucoside (1.3–9.9%). The individual anthocyanin proportion (%) in each cultivar was specific, and a similar profile was verified in a three-year period for eight available cultivars. Total anthocyanin content expressed as a sum of four major anthocyanins present in blackcurrants was compared with values expressed as the equivalent of cyanidin-3-glucoside, as many authors do. We revealed an underestimation of about 20% with the latter method. Cultivars with the highest average total anthocyanin content were ‘Ben Gairn’ (294.38 mg/100 g), ‘Ceres’ (281.31 mg/100 g), and ‘Ometa’ (269.09 mg/100 g).


2021 ◽  
Vol 5 ◽  
pp. 23-30
Author(s):  
Anna О. Кationova ◽  
Roman E. Volkov

The article actualizes the resource memory and the practice of perpetuating the events and people of the great patriotic war as a source of experience of a civil act. The aim of the study was to characterize the combat path of the 194th infantry red banner rechitsa division during the great patriotic war, supplemented by new sources of information. The chronological method makes it possible to show the combat path of the division during the war years, as well as to determine the time of its reorganization, to identify the main combat operations in which the division participated, to establish the routes of its movement. The descriptive method provides an opportunity to supplement the existing information with new materials that were not previously available to the researcher. The statistical method allows you to establish the number of servicemen related to the division, the number of awarded and determine the number of those killed in the division. All these data appeared relatively recently on the site memory of the people, it is only required to conduct a detailed count of the dead on the basis of viewing the documents. The comparative method allows one to assess the role and skill of the division command in planning combat operations, in preparing reinforcements, in the ability to manage divisions of a division in comparison with divisions of a similar profile. In the context of the policy of perpetuating the memory of exploits and sacrifices on the example of 194 sd. Presents the results of search archival work on local events of the great patriotic war and the significance of combat losses during the liberation of belarus.


2021 ◽  
Vol 271 (1328) ◽  
Author(s):  
Sebastian Throm

This article is concerned with the question of uniqueness of self-similar profiles for Smoluchowski’s coagulation equation which exhibit algebraic decay (fat tails) at infinity. More precisely, we consider a rate kernel K K which can be written as K = 2 + ε W K=2+\varepsilon W . The perturbation is assumed to have homogeneity zero and might also be singular both at zero and at infinity. Under further regularity assumptions on W W , we will show that for sufficiently small ε \varepsilon there exists, up to normalisation of the tail behaviour at infinity, at most one self-similar profile. Establishing uniqueness of self-similar profiles for Smoluchowski’s coagulation equation is generally considered to be a difficult problem which is still essentially open. Concerning fat-tailed self-similar profiles this article actually gives the first uniqueness statement for a non-solvable kernel.


2021 ◽  
Author(s):  
Joanna Korman ◽  
Boyoung Kim

Microaggressions are subtle, offensive comments directed at minority group members that are characteristically ambiguous in meaning. In two studies, we explored how observers interpret such ambiguous statements by comparing microaggressions to faux pas, offenses caused by the speaker having an incidental false belief. In Study 1, we compared third-party observers’ blame and intentionality judgments of microaggressions with those for social faux pas. Despite judging both offenses not to be caused intentionally, participants judged microaggressions as more blameworthy. In Study 2 microaggressions without explicit mental state information exhibited a similar profile of judgments as those accompanied by explicit prejudiced or ignorant beliefs. Although they are, like faux pas, judged not to cause harm intentionally, microaggressive comments appear to be judged as more blameworthy on account of enduring prejudice thought to be lurking behind a speaker’s false or incorrect beliefs. Our studies demonstrate a distinctive profile of moral judgment for microaggressions.


2021 ◽  
Vol 184 (1) ◽  
pp. 11-15
Author(s):  
Tomasz Stoeck

The paper presents the methodology of testing common rail fuel injectors, which consisted in extending the standard diagnostic proce-dures with the analysis of the resulting fuel delivery fields. The calculations were carried out in a popular spreadsheet, using Gauss's formulas (the so-called shoelace formula). In this way, the necessity to modify the test bench software was eliminated, as the analytical process took place after the end of the active experiment phase. It has been shown that the proposed solution should be particularly useful in problematic situations where clear-cut verification and assessment of the technical condition of the fuel injectors is sometimes difficult, as shown in the example. In addition, implementation in a digital environment allows the presented algorithms to be reused in research with a similar profile.


Author(s):  
Mohammed A Gharawi ◽  
Ahmed Badawy ◽  
Doaa Elsayed Ramadan ◽  
Shaymaa Elsayed

Social media is becoming a critical part of everyone’s life. Social media has numerous platforms including Facebook, Twitter, Instagram, and LinkedIn. Impersonation is a common phenomenon found nearly on all social media platforms; it is the act of attempting to deceive someone by pretending that he is another person. Impersonators always try to hide a real account by making another similar profile to spread the fake contents on social media platforms making it very difficult to know the real accounts from the fake ones. Aims: This paper aims to write a comprehensive review on the social media impersonation, impersonation types, how to identify the social media impersonation, cases of social media impersonation, how to prevent impersonation, and how to protect the security of a social media user. Besides, the article explains the position of Islam toward impersonations including social media impersonation. Method: This is a narrative review of the existed literature review on the social media impersonation in the virtual world. Conclusion: Social media impersonation is the act of pretending that a person is another person which usually occurs on all social media platforms.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 14992-15003
Author(s):  
Khursheed Aurangzeb ◽  
Musaed Alhussein ◽  
Kumail Javaid ◽  
Syed Irtaza Haider

Mathematics ◽  
2020 ◽  
Vol 8 (8) ◽  
pp. 1216
Author(s):  
Venelina Nikolova ◽  
Juan E. Trinidad Segovia ◽  
Manuel Fernández-Martínez ◽  
Miguel Angel Sánchez-Granero

One of the main characteristics of cryptocurrencies is the high volatility of their exchange rates. In a previous work, the authors found that a process with volatility clusters displays a volatility series with a high Hurst exponent. In this paper, we provide a novel methodology to calculate the probability of volatility clusters with a special emphasis on cryptocurrencies. With this aim, we calculate the Hurst exponent of a volatility series by means of the FD4 approach. An explicit criterion to computationally determine whether there exist volatility clusters of a fixed size is described. We found that the probabilities of volatility clusters of an index (S&P500) and a stock (Apple) showed a similar profile, whereas the probability of volatility clusters of a forex pair (Euro/USD) became quite lower. On the other hand, a similar profile appeared for Bitcoin/USD, Ethereum/USD, and Ripple/USD cryptocurrencies, with the probabilities of volatility clusters of all such cryptocurrencies being much greater than the ones of the three traditional assets. Our results suggest that the volatility in cryptocurrencies changes faster than in traditional assets, and much faster than in forex pairs.


Sign in / Sign up

Export Citation Format

Share Document