Cells Tissues Organs
Institute of Anatomy, University of Rostock, Rostock, Germany.
Published: December 2008
The clinical outcome of cell replacement therapies depends upon the successful survival and differentiation of transplanted cells. Here, we transplanted human neural progenitor cells derived from the ventral mesencephalon of an 8-week-old embryo into the ipsilateral (right) striatum of unilateral 6-hydroxydopamine-lesioned adult rats. To assess the therapeutic potency of grafted cells, 2 independent behavioral tests were conducted 12 weeks after transplantation: in the rotation test, a mild behavioral improvement was detected, and in the cylinder test, transplanted animals overcame the lesion-induced right forepaw preference. To address this behavioral improvement to a dopaminergic differentiation capacity of transplanted cells in vivo, immunohistochemistry for tyrosine hydroxylase was performed, showing a total lack of immunoreactivity. However, we found a considerable number of transplanted human nuclei-positive cells preferentially differentiated into neurons. In addition, glial fibrillary acidic protein-expressing cells were also detected. Our results show that behavioral improvement does not necessarily correlate with a differentiation of transplanted precursors into dopaminergic neurons, indicating other factors to be involved in a partial functional recovery. Nevertheless, for the development of a clinically useful cell therapy, it is important to overcome obstacles, namely the poor dopaminergic differentiation of human neural progenitor cells after grafting.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1159/000140680 | DOI Listing |
PLoS Comput Biol
January 2025
Department of Experimental Psychology, Justus Liebig University Giessen, Giessen, Germany.
The human visual system possesses a remarkable ability to detect and process faces across diverse contexts, including the phenomenon of face pareidolia--seeing faces in inanimate objects. Despite extensive research, it remains unclear why the visual system employs such broadly tuned face detection capabilities. We hypothesized that face pareidolia results from the visual system's optimization for recognizing both faces and objects.
View Article and Find Full Text PDFPLoS One
January 2025
School of Emergency Management, Institute of Disaster Prevention, Sanhe, Hebei, China.
With the increasing number of patients with Alzheimer's Disease (AD), the demand for early diagnosis and intervention is becoming increasingly urgent. The traditional detection methods for Alzheimer's disease mainly rely on clinical symptoms, biomarkers, and imaging examinations. However, these methods have limitations in the early detection of Alzheimer's disease, such as strong subjectivity in diagnostic criteria, high detection costs, and high misdiagnosis rates.
View Article and Find Full Text PDFPLoS One
January 2025
School of Information and Communication Engineering, Beijing University of Information Science and Technology, Bei Jing City, China.
To enhance the intelligent classification of computer vulnerabilities and improve the efficiency and accuracy of network security management, this study delves into the application of a comprehensive classification system that integrates the Memristor Neural Network (MNN) and an improved Temporal Convolutional Neural Network (TCNN) in network security management. This system not only focuses on the precise classification of vulnerability data but also emphasizes its core role in strengthening the network security management framework. Firstly, the study designs and implements a neural network model based on memristors.
View Article and Find Full Text PDFPLoS One
January 2025
Department of Electrical Engineering, College of Engineering, Taif University, Taif, Saudi Arabia.
Modernizing power systems into smart grids has introduced numerous benefits, including enhanced efficiency, reliability, and integration of renewable energy sources. However, this advancement has also increased vulnerability to cyber threats, particularly False Data Injection Attacks (FDIAs). Traditional Intrusion Detection Systems (IDS) often fall short in identifying sophisticated FDIAs due to their reliance on predefined rules and signatures.
View Article and Find Full Text PDFPLoS One
January 2025
Faculty of Informatics and Computing, University Sultan Zainal Abidin, Besut, Terengganu, Malaysia.
Software-Defined Networks (SDN) provides more control and network operation over a network infrastructure as an emerging and revolutionary paradigm in networking. Operating the many network applications and preserving the network services and functions, the SDN controller is regarded as the operating system of the SDN-based network architecture. The SDN has several security problems because of its intricate design, even with all its amazing features.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!
© LitMetric 2025. All rights reserved.