4.5 Article

Irreversible aggregation of the Fc fragment derived from polymeric but not monomeric serum IgA1 - Implications in IgA-mediated disease

期刊

MOLECULAR IMMUNOLOGY
卷 45, 期 1, 页码 87-94

出版社

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.molimm.2007.05.002

关键词

IgA structure; IgA nephropathy; IgA protease; Fc region

向作者/读者索取更多资源

IgA is by far the most abundant immunoglobulin in humans. It is found in serum and in secretions (SIgA). Unlike any other class of immunoglobulin, each form of IgA occurs naturally in different polymerisation states. In serum, the predominant form of IgA is IgA1 of which around 90% is monomeric and 10% is dimeric or polymeric. The proportion of dimeric/polymeric IgA increases in a number of important diseases, such as IgA nephropathy and in chronic liver disease. In both, there is evidence that further aggregation of dimeric/polymeric IgA is the cause of the characteristic tissue deposition. To investigate the effect of role of IgA polymerisation on the structure and function of IgA, we purified different molecular forms of IgA1 from myeloma serum (monomer, dimer and trimer) and SIgA1 from colostrum. Structural features of these different IgA1 forms were examined following proteolysis using Neisseria gonorrhoeae IgA1 type 2 protease and Streptococcus pneumoniae IgA1 protease. These IgA1 proteases cleave IgA1 at the hinge region and produce Fc alpha and Fab fragments. Western blot analysis demonstrated that the Fc alpha fragments of serum dimeric and trimeric but not monomeric IgA1 aggregated to form multimers resistant to disruption in SDS-PAGE under non-reducing conditions. Size exclusion chromatography under native conditions of cleaved serum dimeric IgA1 demonstrated that aggregation occurs because of structural changes in the IgA per se and was not an effect of the SDS-PAGE system. In the same assay, SIgA1 (dimeric) did not aggregate after digestion. The results suggest an important, previously unrecognised, property of dimeric/polymeric serum IgA1, which might explain its propensity to aggregate and deposit in tissues. (C) 2007 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Software Engineering

Fast Data Access through Nearest Location-Based Replica Placement

Umar Shoaib, Muhammad Junaid Arshad, Hasan Ali Khattak, Maryam Ezat Ullah, Ahmad Almogren, Sikandar Ali

Summary: Nowadays, telecommunication devices, IoT sensors, and web services are generating massive amounts of big data every second. Cloud computing provides a solution to access and process these data quickly, especially for real-time applications. The proposed genetic algorithm-based technique improves the efficiency of cloud servers by reducing data access time and providing quality of service to end users.

SCIENTIFIC PROGRAMMING (2022)

Article Computer Science, Information Systems

Secure Delegation Using Enhanced Capability Model

Kamran Habib Khan, Ikram Ud Din, Ahmad Almogren, Hasan Ali Khattak, Muhammad Ibrahim, Shah Nazir

Summary: Secure delegation plays a key role in collaborative and dynamic systems, and requires a flexible model to address the challenges of access control and usage control services. This study proposes a security service model that restricts the delegation of sensitive permission and unauthorized access to resources, achieving delegation of rights and protecting information privacy.

SECURITY AND COMMUNICATION NETWORKS (2022)

Article Chemistry, Analytical

A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks

Wajahat Ali, Ikram Ud Din, Ahmad Almogren, Byung-Seo Kim

Summary: This research proposes a privacy-preserving method for smart grid-based home area networks (HAN), using encryption and hash functions to aggregate diverse household appliance data, aiming to address privacy concerns in smart homes.

SENSORS (2022)

Article Computer Science, Information Systems

LightTrust: Lightweight Trust Management for Edge Devices in Industrial Internet of Things

Ikram Ud Din, Aniqa Bano, Kamran Ahmad Awan, Ahmad Almogren, Ayman Altameem, Mohsen Guizani

Summary: The increasing usage of the Internet has improved the quality of trust in the Internet of Things (IoT). Trust plays a crucial role in providing a secure environment for users to share private information and enable easy and trustworthy data exchange among IoT devices. Trust management is essential for secure data transmission in a large-scale IoT network, and a lightweight approach called LightTrust is proposed to address security issues in Industrial IoT nodes. LightTrust utilizes a centralized trust agent to generate and manage trust certificates, and direct observations and recommendations are used to develop trust between nodes. Comparative simulations demonstrate the effectiveness and resilience of the proposed approach.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

EdgeTrust: A Lightweight Data-Centric Trust Management Approach for IoT-Based Healthcare 4.0

Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Hasan Ali Khattak, Joel J. P. C. Rodrigues

Summary: The Internet of Things (IoT) is revolutionizing the world by making surrounding devices smart and capable of performing daily-life activities with precision. IoT and healthcare collaborate to provide notable facilities in patient monitoring. However, the identification of malicious and compromised nodes remains a critical challenge. This article proposes a machine learning-based trust management approach for edge nodes to detect nodes with malicious behavior. The approach utilizes knowledge and experience components of trust and collects recommendations from edge clouds to evaluate indirect and aggregated trust.

ELECTRONICS (2023)

Article Green & Sustainable Science & Technology

Securing Access to Internet of Medical Things Using a Graphical-Password-Based User Authentication Scheme

Mudassar Ali Khan, Ikram Ud Din, Ahmad Almogren

Summary: Digital healthcare services have grown significantly in the past ten years, with new technologies being examined to provide efficient and secure services. The Internet of Medical Things (IoMT) creates an interconnected and efficient network for healthcare. User authentication for sustainable IoT solutions is still an area that requires further research, and this paper proposes a novel graphical authentication scheme that uses multiple factors for user registration and authentication. Evaluation of the proposed scheme showed improved system quality, information quality, interface quality, and overall quality compared to PIN-based and pattern-based authentication techniques.

SUSTAINABILITY (2023)

Article Green & Sustainable Science & Technology

Visualization of Remote Patient Monitoring System Based on Internet of Medical Things

Mudassar Ali Khan, Ikram Ud Din, Byung-Seo Kim, Ahmad Almogren

Summary: Remote patient monitoring (RPM) is a crucial tool for healthcare professionals, especially for patients with chronic illnesses. The visualization method suggested in this article enables real-time examination of data gathered by Internet of Medical Things (IoMT) devices. The outcome of assessments reveals the usability and effectiveness of the suggested visualization system.

SUSTAINABILITY (2023)

Article Engineering, Multidisciplinary

FogTrust: Fog-Integrated Multi-Leveled Trust Management Mechanism for Internet of Things

Abdul Rehman, Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Mohammed Alabdulkareem

Summary: The Internet of Things (IoT) is a network of smart devices with internet connectivity that sends and receives data to reduce human dependence. However, the rapid growth of IoT devices raises security and privacy concerns. To address this, a lightweight trust management mechanism called FogTrust is proposed. It has a multi-layer architecture and uses encryption to ensure a trustworthy environment. The simulation results demonstrate its effectiveness in assigning low trust degrees to malicious nodes in various scenarios.

TECHNOLOGIES (2023)

Article Computer Science, Information Systems

Enhancing Performance and Security in the Metaverse: Latency Reduction Using Trust and Reputation Management

Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Byung-Seo Kim

Summary: In the rapidly evolving landscape of distributed systems, this paper proposes an innovative trust-based resource allocation framework to address the challenges posed by network node attacks. It introduces a reputation system, decentralized trust management system, and proof-of-trust consensus mechanism to enhance security and collaboration in the metaverse. Simulation results demonstrate the effectiveness of this approach in reducing latency, improving scalability, and detecting malicious nodes.

ELECTRONICS (2023)

Article Computer Science, Information Systems

Secure and Privacy-Preserving Trust Management System for Trustworthy Communications in Intelligent Transportation Systems

Ikram Ud Din, Kamran Ahmad Awan, Ahmad Almogren

Summary: This paper introduces an innovative Context-Aware Cognitive Memory Trust Management System (CACMTM) tailored for Intelligent Cyber-Physical Transportation Systems (ICPTS). The system utilizes game theory to model trust interactions and integrates various trust constituents into a dependable solution, specifically addressing the unique demands of ICPTS. It incorporates a cognitive memory-based trust management method for IoT in the metaverse and employs a multi-dimensional trust evaluation model to minimize the risk of false trust evaluation outcomes. The proposed system also integrates a blockchain-secured logging mechanism for enhanced security, transparency, and accountability.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

Securing IoT With Deep Federated Learning: A Trust-Based Malicious Node Identification Approach

Kamran Ahmad Awan, Ikram Ud Din, Mahdi Zareei, Ahmad Almogren, Byung Seo-Kim, Jesus Arturo Perez-Diaz

Summary: The Internet of Things (IoT) has transformed the world through its various applications and smart connected devices. However, the independence of these devices raises concerns about security and privacy. To address this, the proposed FedTrust approach uses federated learning to identify malicious and compromised nodes in IoT networks. FedTrust trains edge nodes with a provided dataset and forms a global model to predict abnormal behavior. The approach utilizes a novel trust dataset with 19 trust parameters and employs the concept of communities for more efficient training. Evaluation shows that FedTrust outperforms existing approaches in terms of accuracy and precision, achieving a higher rate of detecting and predicting malicious and compromised nodes.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

Privacy-Preserving Big Data Security for IoT With Federated Learning and Cryptography

Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Joel J. P. C. Rodrigues

Summary: This study proposes an innovative methodology for enhancing the privacy and efficiency of big data analytics in the IoT through federated learning. The approach combines a hierarchical structure, scalable learning rate, and rudimentary cryptographic mechanism. It also introduces a novel communication protocol, adaptive data compression algorithm, resilience mechanisms, fault detection and recovery, and trust management. Evaluation results show significant improvement in privacy and efficiency of big data analytics in the IoT.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

An Adaptive Biomimetic Ant Colony Optimization With 6G Integration for IoT Network Communication

Sonia Khan, Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Byung Seo-Kim

Summary: This article introduces an innovative framework that enhances network communication in the rapidly evolving landscapes of IoT and 6G networks. By leveraging biomimetic algorithms and intelligent adaptation, the method presented in this article offers a powerful solution to the routing problem in 6G networks, accommodating a diverse array of IoT devices.

IEEE ACCESS (2023)

Article Engineering, Multidisciplinary

A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System

Saima Kanwal, Feng Tao, Ahmad Almogren, Ateeq Ur Rehman, Rizwan Taj, Ayman Radwan

Summary: This study proposes an improved reversible watermarking method that aims to maximize data embedding capacity and perceptual transparency while maintaining data security. Experimental results show that the proposed method outperforms existing techniques in terms of perceptual transparency and data embedding capacity.

CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES (2023)

Article Computer Science, Information Systems

Blockchain Based Privacy Preserving Authentication and Malicious Node Detection in Internet of Underwater Things (IoUT) Networks

Shahid Abbas, Hina Nasir, Ahmad Almogren, Ayman Altameem, Nadeem Javaid

Summary: The usage of Internet of Underwater Things (IoUT) networks allows for the detection of aquatic factors and weather forecasting. However, security measures such as authentication and malicious node detection mechanisms are necessary due to potential threats. Additionally, blockchain technology is employed for enhanced security and traceability.

IEEE ACCESS (2022)

暂无数据