Auto-Immunity Dendritic Cell Algorithm
ثبت نشده
چکیده
Security of information is of utmost importance to any organization or individual, which depend on computer system or internet for business transaction or source of information or research. Many viruses are able to recognize certain anti-virus software, and respond differently to such software than to programs designed for other purposes. Some viruses go after the databases stored by anti-virus products. Some viruses simply go after anti-virus products, trying to erase them. Immune systems also face this daunting control challenge. On the one hand, they need to minimize damage from pathogens, without wasting energy and resources, but on the other must avoid initiating or perpetuating autoimmune responses.
منابع مشابه
The Efficacy of Toll-Like Receptors in Awakening Dendritic Cell/Natural Killer Cell System for Eradication of Tumors
Natural killer (NK) cells are effector cells of the innate immune system that exert direct cytotoxic functions. Ubiquitously-expressed toll-like receptors (TLRs) have been recognized as one of the major components promoting dendritic cell (DC) maturation, which may induce polarized immune responses beneficial to cancer immunotherapy. TLR-activated NK cells and DCs are prerequisite for robust ac...
متن کاملDendritic Cell Immunotherapy, the Next Step in Cancer Treatment
Cancer immunotherapy has gained a lot of interest over the past few years due to the success of immune checkpoint inhibitors in treating cancer (1, 2). Immune checkpoint inhibitors, such as monoclonal antibodies against cytotoxic T-lymphocyte–associated antigen 4 (CTLA-4) and programmed death 1 (PD-1), have been shown to increase survival of patients with advanced cancers (1, 2). These in...
متن کاملDendritic Cell Immunotherapy, the Next Step in Cancer Treatment
Cancer immunotherapy has gained a lot of interest over the past few years due to the success of immune checkpoint inhibitors in treating cancer (1, 2). Immune checkpoint inhibitors, such as monoclonal antibodies against cytotoxic T-lymphocyte–associated antigen 4 (CTLA-4) and programmed death 1 (PD-1), have been shown to increase survival of patients with advanced cancers (1, 2). These in...
متن کاملEffective Dendritic Cell-based Immunotherapeutic Vaccines for Acute Myeloid Leukemia (AML)
Acute myeloid leukemia (AML) is a type of poor prognosis hematological malignancies characterized by heterogeneous clonal expansion of myeloid progenitors. Leukemic stem cells are thought to form the majority of a cell population in minimal residual diseases (MRDs) which are resistant to current chemotherapeutic regimens and mediate disease relapse. Current therapeutic vaccine strategies have d...
متن کاملAuto-Immunity Dendritic Cell Algorithm
Security of information is of utmost importance to any organization or individual, which depend on computer system or internet for business transaction or source of information or research. Many viruses are able to recognize certain anti-virus software, and respond differently to such software than to programs designed for other purposes. Some viruses go after the databases stored by anti-virus...
متن کاملAuto-Immunity Dendritic Cell Algorithm
Security of information is of utmost importance to any organization or individual, which depend on computer system or internet for business transaction or source of information or research. Many viruses are able to recognize certain anti-virus software, and respond differently to such software than to programs designed for other purposes. Some viruses go after the databases stored by anti-virus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017