Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
82 result(s) for "Rudolph, Carsten"
Sort by:
Cyber Attacks in Transactive Energy Market-Based Microgrid Systems
Due to the increasing integration of distributed energy generation in the electric grid, transactive energy markets (TEMs) have recently emerged to balance the demand and supply dynamically across the grid. TEM enables peer to peer (P2P) energy trading and brings flexibility by reducing users’ demand in the grid. It also enhances the system’s efficiency and reduces the pressure on electricity networks. However, it is vulnerable to major cyber attacks as users equipped with smart devices are participating autonomously in the energy market, and an extensive amount of information is exchanged through the communication channel. The potential attacks and impacts of those attacks need to be investigated to develop an attack resilient TEM-based power system. Hence, in this paper, our goal is to systematically identify possible cyber attacks associated with a TEM-based power system. In order to achieve this goal, we classify the attacks during the P2P and flexibility schemes of TEM into three main categories. Then, we explore the attacks under each category in detail. We further distinguish the adversary roles of each particular attack and see what benefits will be received by an adversary through each specific attack. Finally, we present the impact of the attacks on the market operation, consumers, and prosumers of the TEM in this paper.
Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks
Wireless Body Area Networks (WBANs) are an emerging industrial technology for monitoring physiological data. These networks employ medical wearable and implanted biomedical sensors aimed at improving quality of life by providing body-oriented services through a variety of industrial sensing gadgets. The sensors collect vital data from the body and forward this information to other nodes for further services using short-range wireless communication technology. In this paper, we provide a multi-aspect review of recent advancements made in this field pertaining to cross-domain security, privacy, and trust issues. The aim is to present an overall review of WBAN research and projects based on applications, devices, and communication architecture. We examine current issues and challenges with WBAN communications and technologies, with the aim of providing insights for a future vision of remote healthcare systems. We specifically address the potential and shortcomings of various Wireless Body Area Network (WBAN) architectures and communication schemes that are proposed to maintain security, privacy, and trust within digital healthcare systems. Although current solutions and schemes aim to provide some level of security, several serious challenges remain that need to be understood and addressed. Our aim is to suggest future research directions for establishing best practices in protecting healthcare data. This includes monitoring, access control, key management, and trust management. The distinguishing feature of this survey is the combination of our review with a critical perspective on the future of WBANs.
Expression of therapeutic proteins after delivery of chemically modified mRNA in mice
Messenger RNA has received little attention as a potential therapeutic agent. Kormann et al . show that intramuscular injection of chemically modified erythropoietin mRNA substantially increases the hematocrit in mice and demonstrate the curative potential of pulmonary mRNA delivery in a mouse model of congenital surfactant protein B deficiency. Current viral vectors for gene therapy 1 , 2 , 3 are associated with serious safety concerns, including leukemogenesis 4 , and nonviral vectors are limited by low gene transfer efficiency 5 . Here we investigate the therapeutic utility of chemically modified mRNA as an alternative to DNA-based gene therapy. A combination of nucleotide modifications abrogates mRNA interaction with Toll-like receptor (TLR)3, TLR7, TLR8 and retinoid-inducible gene I (RIG-I), resulting in low immunogenicity and higher stability in mice. A single intramuscular injection of modified murine erythropoietin mRNA raises the average hematocrit in mice from 51.5% to 64.2% after 28 days. In a mouse model of a lethal congenital lung disease caused by a lack of surfactant protein B (SP-B), twice weekly local application of an aerosol of modified SP-B mRNA to the lung restored 71% of the wild-type SP-B expression, and treated mice survived until the predetermined end of the study after 28 days.
Blockchain-Based Malicious Behaviour Management Scheme for Smart Grids
The smart grid optimises energy transmission efficiency and provides practical solutions for energy saving and life convenience. Along with a decentralised, transparent and fair trading model, the smart grid attracts many users to participate. In recent years, many researchers have contributed to the development of smart grids in terms of network and information security so that the security, reliability and stability of smart grid systems can be guaranteed. However, our investigation reveals various malicious behaviours during smart grid transactions and operations, such as electricity theft, erroneous data injection, and distributed denial of service (DDoS). These malicious behaviours threaten the interests of honest suppliers and consumers. While the existing literature has employed machine learning and other methods to detect and defend against malicious behaviour, these defence mechanisms do not impose any penalties on the attackers. This paper proposes a management scheme that can handle different types of malicious behaviour in the smart grid. The scheme uses a consortium blockchain combined with the best–worst multi-criteria decision method (BWM) to accurately quantify and manage malicious behaviour. Smart contracts are used to implement a penalty mechanism that applies appropriate penalties to different malicious users. Through a detailed description of the proposed algorithm, logic model and data structure, we show the principles and workflow of this scheme for dealing with malicious behaviour. We analysed the system’s security attributes and tested the system’s performance. The results indicate that the system meets the security attributes of confidentiality and integrity. The performance results are similar to the benchmark results, demonstrating the feasibility and stability of the system.
TechnoSapiens: merging humans with technology in augmented reality
We present a marker-less AR/DR system that can replace the arm of the user with a virtual bionic prosthesis in real time including finger tracking. For this, we use a mixed reality HMD that provides the user with a stereo image based on video-see-through (VST). We apply chroma-keying to remove the user’s arm from each captured image and input reconstructed background information into the removed pixels. Before rendering the prosthesis model into the image, we re-target motion capture data of the user’s hand to the kinematic skeleton of the prosthesis to match the current hand pose. This system opens new research possibilities on self- and other-perception of bionic bodies. In a first evaluation study of the system, we propose that users perceive the virtual prosthesis model as a part of their body (i.e., that they experience a sense of ownership). We tested this assumption in a laboratory study with 27 individuals who used the system to perform a series of simple tasks in AR with their prosthesis. We measured body ownership and other measures with self-reports. In support of the hypothesis, users experienced a sense of body ownership. Also, a feeling of self-presence is induced during the task, and participants rated the overall experience as positive.
Cleavage of CXCR1 on neutrophils disables bacterial killing in cystic fibrosis lung disease
Interleukin-8 (IL-8) activates neutrophils via the chemokine receptors CXCR1 and CXCR2. However, the airways of individuals with cystic fibrosis are frequently colonized by bacterial pathogens, despite the presence of large numbers of neutrophils and IL-8. Here we show that IL-8 promotes bacterial killing by neutrophils through CXCR1 but not CXCR2. Unopposed proteolytic activity in the airways of individuals with cystic fibrosis cleaved CXCR1 on neutrophils and disabled their bacterial-killing capacity. These effects were protease concentration–dependent and also occurred to a lesser extent in individuals with chronic obstructive pulmonary disease. Receptor cleavage induced the release of glycosylated CXCR1 fragments that were capable of stimulating IL-8 production in bronchial epithelial cells via Toll-like receptor 2. In vivo inhibition of proteases by inhalation of α1-antitrypsin restored CXCR1 expression and improved bacterial killing in individuals with cystic fibrosis. The cleavage of CXCR1, the functional consequences of its cleavage, and the identification of soluble CXCR1 fragments that behave as bioactive components represent a new pathophysiologic mechanism in cystic fibrosis and other chronic lung diseases.
Empowering End-Users with Cybersecurity Situational Awareness: Findings from IoT-Health Table-Top Exercises
End-users in a decision-oriented Internet of Things (IoT) healthcare system are often left in the dark regarding critical security information necessary for making informed decisions about potential risks. This is partly due to the lack of transparency and system security awareness end-users have in such systems. To empower end-users and enhance their cybersecurity situational awareness, it is imperative to thoroughly document and report the runtime security controls in place, as well as the security-relevant aspects of the devices they rely on, while the need for better transparency is obvious, it remains uncertain whether current systems offer adequate security metadata for end-users and how future designs can be improved to ensure better visibility into the security measures implemented. To address this gap, we conducted table-top exercises with ten security and ICT experts to evaluate a typical IoT-Health scenario. These exercises revealed the critical role of security metadata, identified the available ones to be presented to users, and suggested potential enhancements that could be integrated into system design. We present our observations from the exercises, highlighting experts’ valuable suggestions, concerns, and views, backed by our in-depth analysis. Moreover, as a proof-of-concept of our study, we simulated three relevant use cases to detect cyber risks. This comprehensive analysis underscores critical considerations that can significantly improve future system protocols, ensuring end-users are better equipped to navigate and mitigate security risks effectively.
Translation of Angiotensin-Converting Enzyme 2 upon Liver- and Lung-Targeted Delivery of Optimized Chemically Modified mRNA
Changes in lifestyle and environmental conditions give rise to an increasing prevalence of liver and lung fibrosis, and both have a poor prognosis. Promising results have been reported for recombinant angiotensin-converting enzyme 2 (ACE2) protein administration in experimental liver and lung fibrosis. However, the full potential of ACE2 may be achieved by localized translation of a membrane-anchored form. For this purpose, we advanced the latest RNA technology for liver- and lung-targeted ACE2 translation. We demonstrated in vitro that transfection with ACE2 chemically modified messenger RNA (cmRNA) leads to robust translation of fully matured, membrane-anchored ACE2 protein. In a second step, we designed eight modified ACE2 cmRNA sequences and identified a lead sequence for in vivo application. Finally, formulation of this ACE2 cmRNA in tailor-made lipidoid nanoparticles and in lipid nanoparticles led to liver- and lung-targeted translation of significant amounts of ACE2 protein, respectively. In summary, we provide evidence that RNA transcript therapy (RTT) is a promising approach for ACE2-based treatment of liver and lung fibrosis to be tested in fibrotic disease models.
Transcriptional Dynamics of NRF2 Overexpression and KEAP1-NRF2 Inhibitors in Human Cell Line and Primary Lung Cells
Oxidative stress in the human lung is caused by both internal (e.g., inflammation) and external stressors (smoking, pollution, and infection) to drive pathology in a number of lung diseases. Cellular damage caused by oxidative damage is reversed by several pathways, one of which is the antioxidant response. This response is regulated by the transcriptional factor NRF2, which has the ability to regulate the transcription of more than 250 genes. In disease, this balance is overwhelmed, and the cells are unable to return to homeostasis. Several pharmacological approaches aim to improve the antioxidant capacity by inhibiting the interaction of NRF2 with its key cytosolic inhibitor, KEAP1. Here, we evaluate an alternative approach by overexpressing NRF2 from chemically modified RNAs (cmRNAs). Our results demonstrate successful expression of functional NRF2 protein in human cell lines and primary cells. We establish a kinetic transcriptomic profile to compare antioxidant response gene expression after treatment of primary human bronchial epithelial cells with either KEAP1 inhibitors or cmRNAs. The key gene signature is then applied to primary human lung fibroblasts and alveolar macrophages to uncover transcriptional preferences in each cell system. This study provides a foundation for the understanding of NRF2 dynamics in the human lung and provides initial evidence of alternative ways for pharmacological interference.
PEGylation Improves Nanoparticle Formation and Transfection Efficiency of Messenger RNA
ABSTRACT Purpose Cationic polymers have been intensively investigated for plasmid-DNA (pDNA), but few studies addressed their use for messenger-RNA (mRNA) delivery. We analyzed two types of polymers, linear polyethylenimine (l-PEI) and poly-N, N -dimethylaminoethylmethacrylate P(DMAEMA), to highlight specific requirements for the design of mRNA delivery reagents. The effect of PEGylation was investigated using P(DMAEMA- co -OEGMA) copolymer. Methods The influence of polymer structure on mRNA binding and particle formation was assessed in a side-by-side comparison with pDNA by methods such as agarose-retardation assay and scanning probe microscopy. Transfection studies were performed on bronchial epithelial cells. Results Binding of cationic polymers inversely correlated with type of nucleic acid. Whereas P(DMAEMA) bound strongly to pDNA, only weak mRNA binding was observed, which was vice versa for l-PEI. Both polymers resulted in self-assembled nanoparticles forming pDNA complexes of irregular round shape; mRNA particles were significantly smaller and more distinct. Surprisingly, PEGylation improved mRNA binding and transfection efficiency contrary to observations made with pDNA. Co-transfections with free polymer improved mRNA transfection. Conclusions Gene delivery requires tailor-made design for each type of nucleic acid. PEGylation influenced mRNA-polymer binding efficiency and transfection and may provide a method of further improving mRNA delivery.