Filarial parasites modulate effective immune response of their host by releasing a variety of immunomodulatory molecules, which help in the long persistence of the parasite within the host. The present study was aimed to characterize an immunomodulatory protein of Brugia malayi and its interaction with the host immune component at the structural and functional level. Our findings showed that Brugia malayi Calreticulin (BmCRT) is responsible for the prevention of classical complement pathway activation via its interaction with the first component C1q of the human host. This was confirmed by inhibition of C1q dependent lysis of immunoglobulin-sensitized Red Blood Cells (S-RBCs). This is possibly the first report which predicts CRT-C1q interaction on the structural content of proteins to explain how BmCRT inhibits this pathway. The molecular docking of BmCRT-C1q complex indicated that C1qB chain (IgG/M and CRP binding sites on C1q) played a major role in the interaction with conserved and non-conserved regions of N and P domain of BmCRT. Out of 37 amino acids of BmCRT involved in the interaction, nine amino acids (Pro126, Glu132, His147, Arg151, His153, Met154, Lys156, Ala196 and Lys212) are absent in human CRT. Both ELISA and in silico analysis showed the significant role of Ca+2 in BmCRT-HuC1q complex formation and deactivation of C1r2–C1s2. Molecular dynamics studies of BmCRT-HuC1q complex showed a deviation from ∼0.4 nm to ∼1.0 nm. CD analyses indicated that BmCRT is composed of 49.6% α helix, 9.6% β sheet and 43.6% random coil. These findings provided valuable information on the architecture and chemistry of BmCRT-C1q interaction and supported the hypothesis that BmCRT binds with huC1q at their targets (IgG/M, CRP) binding sites. This interaction enables the parasite to interfere with the initial stage of host complement activation, which might be helpful in parasites establishment. These results might be utilized for help in blocking the C1q/CRT interaction and preventing parasite infection.
The lack of centralised infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack called Wormmhole attack enables an attacker to record packets at one location in the network, tunnels them to another location, and retransmits them into the network. In this paper, we present a protocol for detecting wormhole attacks without use of any special harware such as directional antenna and precise synchronised clock and the protocol is also independent of physical medium of wireless network. After the route discovery, source node initiates wormhole detection process in the established path which counts hop difference between the neighbours of the one hop away nodes in the route. The destination node detects the wormhole if the hop difference between neighbours of the nodes exceeds the acceptable level. Our simulation results shows that the WHOP is quite excellent in detecting wormhole of large tunnel lengths
I. INTRODUCTIONAn ad-hoc network is inherently a self-organized network system without any infrastructure. Typically, the nodes act as both host and router at the same time i.e each node participates in routing by forwarding data for other nodes and deciding which nodes forward data next based on the network connectivity Most previous ad hoc networks research has focused on problems such as routing and communication, assuming a trusted environment. However, many applications run in untrusted environments and require secure communication and routing such as military or police networks, emergency response operations like a flood, tornado, hurricane or earthquake. However, the open nature of the wireless communication channels, the lack of infrastructure, the fast deployment, and the environment where they may be deployed, make them vulnerable to a wide range of security attacks.A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad hoc networks. During this attack, a malicious node captures packets from one location in the network and "tunnels" them to another malicious node at a distant point which replays them locally. The tunnel can be established in many ways e.g. in-band and out-of-band channel. This makes the tunneled packet arrive either sooner or with a lesser number of hops compared to the packets transmitted over normal multi hop routes. This creates the illusion that the two end points of the tunnel are very close to each other. However, it is used by malicious nodes to
(2021): Molecular docking and simulation studies of natural compounds of Vitexnegundo L. against papain-like protease (PL pro) of SARS CoV-2 (coronavirus) to conquer the pandemic situation in the world,
The men's lifestyle program resulted in significant improvement in body composition, resulting in a reduction in obesity-related disease risk in some participants.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.