摘要:
Contemplated immunotherapies include co-administration of an activated NK cell that is further genetically modified and a cancer therapeutic agent. In preferred embodiments, activated NK cells are further modified to taNK cells, which include a chimeric antigen receptor (CAR) with affinity for a cancer specific antigen, a cancer associated antigen, or a tumor specific antigen. Activated NK cells can also be further genetically modified to include high affinity Fc receptor CD16a (V158). Appropriate cancer therapeutic agents include chemotherapeutic drugs (e.g., nant-paclitaxel) or cancer targeted antibodies (e.g., trastuzumab).
摘要:
Various devices, systems, structures and methods are disclosed related to securely authorizing a transaction by synchronizing digital genomic data with associated synthetic genomic variants. An embodiment of the present invention utilizes digital genomic data associated with an entity, such as a person, who may utilize a genome-based security device to complete a transaction. In one embodiment, a person may use a genome-based security device to communicate with an external device over a wireless or other communication interface, synchronize digital genomic data and an associated synthetic variant received from the external device with digital genomic data and associated synthetic variant stored on the genome-based security device.
摘要:
The inventive subject matter provides apparatus, systems, and methods that improve on the pace of discovering new practical information based on large amounts of datasets collected. In most cases, anomalies from the datasets are automatically identified, flagged, and validated by a cross-validation engine. Only validated anomalies are then associated with a subject matter expert who is qualified to take action on the anomaly. In other words, the inventive subject matter bridges the gap between the overwhelming amount of scientific data which can now be harvested and the comparatively limited amount analytical resources available to extract practical information from the data. Practical information can be in the form of trends, patterns, maps, hypotheses, or predictions, for example, and such practical information has implications in medicine, in environmental sciences, entertainment, travel, shopping, social interactions, or other areas.
摘要:
Antiviral compositions and methods are contemplated that are especially effective in the treatment and prevention of influenza A viruses. Also presented are cellular assays to identify small molecule compounds having antiviral properties, particularly as it relates to detection of influenza A RNA-dependent RNA polymerase activity in a mammalian cell independent of other influenza A components. Preferred assays allow for identification of viral replication inhibitors that do not disrupt normal cellular activity.
摘要:
Systems and methods of constructing and managing virtual planograms are presented. Contemplated systems allow for construction of a virtual planogram, which can be used to present consumers virtual inventory items as being available for purchase via a display device. The display device can include an electronic billboard within an establishment, a mall for example, or include a user's smart device, a cell phone or tablet for example.
摘要:
Systems and methods of constructing and managing virtual planograms are presented. Contemplated systems allow for construction of a virtual planogram, which can be used to present consumers virtual inventory items as being available for purchase via a display device. The display device can include an electronic billboard within an establishment, a mall for example, or include a user's smart device, a cell phone or tablet for example.
摘要:
Systems, methods, and use-cases of multi-modal authentications and content distribution are presented. A content consumer can capture a multi-modal digital representation of multiple objects where a juxtaposition of features derived from the digital representation can be used to recognize that at least some of the objects are a valid authentication object. Upon authentication, an authentication agent determines a content access level for content associated with the corresponding to the juxtaposition. The content can then be presented on an electronic device, possibly within a secure virtual machine, according to the content access level.