Processing math: 100%
Research article Special Issues

Interlocked feedback loops balance the adaptive immune response


  • Received: 12 November 2021 Revised: 10 January 2022 Accepted: 08 February 2022 Published: 15 February 2022
  • Adaptive immune responses can be activated by harmful stimuli. Upon activation, a cascade of biochemical events ensues the proliferation and the differentiation of T cells, which can remove the stimuli and undergo cell death to maintain immune cell homeostasis. However, normal immune processes can be disrupted by certain dysregulations, leading to pathological responses, such as cytokine storms and immune escape. In this paper, a qualitative mathematical model, composed of key feedback loops within the immune system, was developed to study the dynamics of various response behaviors. First, simulation results of the model well reproduce the results of several immune response processes, particularly pathological immune responses. Next, we demonstrated how the interaction of positive and negative feedback loops leads to irreversible bistable, reversible bistable and monostable, which characterize different immune response processes: cytokine storm, normal immune response, immune escape. The stability analyses suggest that the switch-like behavior is the basis of rapid activation of the immune system, and a balance between positive and negative regulation loops is necessary to prevent pathological responses. Furthermore, we have shown how the treatment moves the system back to a healthy state from the pathological immune response. The bistable mechanism that revealed in this work is helpful to understand the dynamics of different immune response processes.

    Citation: Lingli Zhou, Fengqing Fu, Yao Wang, Ling Yang. Interlocked feedback loops balance the adaptive immune response[J]. Mathematical Biosciences and Engineering, 2022, 19(4): 4084-4100. doi: 10.3934/mbe.2022188

    Related Papers:

    [1] Makoto Nakakita, Teruo Nakatsuma . Analysis of the trading interval duration for the Bitcoin market using high-frequency transaction data. Quantitative Finance and Economics, 2025, 9(1): 202-241. doi: 10.3934/QFE.2025007
    [2] Per B. Solibakke . Forecasting hourly WTI oil front monthly price volatility densities. Quantitative Finance and Economics, 2024, 8(3): 466-501. doi: 10.3934/QFE.2024018
    [3] Sylvia Gottschalk . Digital currency price formation: A production cost perspective. Quantitative Finance and Economics, 2022, 6(4): 669-695. doi: 10.3934/QFE.2022030
    [4] David Alaminos, M. Belén Salas, Ángela M. Callejón-Gil . Managing extreme cryptocurrency volatility in algorithmic trading: EGARCH via genetic algorithms and neural networks. Quantitative Finance and Economics, 2024, 8(1): 153-209. doi: 10.3934/QFE.2024007
    [5] Nilcan Mert, Mustafa Caner Timur . Bitcoin and money supply relationship: An analysis of selected country economies. Quantitative Finance and Economics, 2023, 7(2): 229-248. doi: 10.3934/QFE.2023012
    [6] Haoyu Wang, Dejun Xie . Optimal profit-making strategies in stock market with algorithmic trading. Quantitative Finance and Economics, 2024, 8(3): 546-572. doi: 10.3934/QFE.2024021
    [7] Samuel Asante Gyamerah . Modelling the volatility of Bitcoin returns using GARCH models. Quantitative Finance and Economics, 2019, 3(4): 739-753. doi: 10.3934/QFE.2019.4.739
    [8] Timotheos Paraskevopoulos, Peter N Posch . A hybrid forecasting algorithm based on SVR and wavelet decomposition. Quantitative Finance and Economics, 2018, 2(3): 525-553. doi: 10.3934/QFE.2018.3.525
    [9] Lukáš Pichl, Taisei Kaizoji . Volatility Analysis of Bitcoin Price Time Series. Quantitative Finance and Economics, 2017, 1(4): 474-485. doi: 10.3934/QFE.2017.4.474
    [10] Zheng Nan, Taisei Kaizoji . Bitcoin-based triangular arbitrage with the Euro/U.S. dollar as a foreign futures hedge: modeling with a bivariate GARCH model. Quantitative Finance and Economics, 2019, 3(2): 347-365. doi: 10.3934/QFE.2019.2.347
  • Adaptive immune responses can be activated by harmful stimuli. Upon activation, a cascade of biochemical events ensues the proliferation and the differentiation of T cells, which can remove the stimuli and undergo cell death to maintain immune cell homeostasis. However, normal immune processes can be disrupted by certain dysregulations, leading to pathological responses, such as cytokine storms and immune escape. In this paper, a qualitative mathematical model, composed of key feedback loops within the immune system, was developed to study the dynamics of various response behaviors. First, simulation results of the model well reproduce the results of several immune response processes, particularly pathological immune responses. Next, we demonstrated how the interaction of positive and negative feedback loops leads to irreversible bistable, reversible bistable and monostable, which characterize different immune response processes: cytokine storm, normal immune response, immune escape. The stability analyses suggest that the switch-like behavior is the basis of rapid activation of the immune system, and a balance between positive and negative regulation loops is necessary to prevent pathological responses. Furthermore, we have shown how the treatment moves the system back to a healthy state from the pathological immune response. The bistable mechanism that revealed in this work is helpful to understand the dynamics of different immune response processes.



    Noise is the most difficult task in the field of image processing and computer vision. In this work, we focus on removing additive Gaussian noise. The problem is formulated mathematically as: let u(x,y) be a digital image and u0(x,y) be its observation with random noise η(x,y). For (x,y)Ω s.t.

    u0(x,y)=u(x,y)+η(x,y). (1.1)

    The noise level is approximately known

    uu02L2(Ω)=Ω(uu0)2dxσ2. (1.2)

    The goal of denoising is to filter out high frequency signals, while preserving the important features of the image such as edges. Therefore, we search for an image processing model which removes noise and offers better handling of edges.

    During the last two decades, the method of partial differential equations (PDEs) for image processing has become a major research topic. A classical PDEs model named ROF (Rudin, Osher, Fatemi) model which was based on the total variation (TV), was first introduced by Rudin et al. [18]. The idea in the ROF model is to minimize the the total variation of the image u,

    TV=minuBV(Ω)L2(Ω)Ω|u|dx+λ2Ω(uu0)2dx. (1.3)

    In fact, one of the main advantages of using ROF model for image restoration is that the discontinuities are allowed. However, the main drawback of denoising models based on the TV is that they tend to yield piecewise constant images, a phenomenon known as staircase effects. Strong [19], introduced an adaptive TV functional (TVα)

    TVα=minuBV(Ω)L2(Ω)Ωα(x)|u(x)|dx+λ2Ω(uu0)2dx, (1.4)

    for spatially adaptive image restoration. The function α(x) is an edge detector to control the diffusion. The main idea of edge detector is that edges of an image are associated with location of high gradient in a slightly smooth version of the noisy image.

    In the recent decades, to overcome the staircase effects that caused by second-order variational model, fourth-order PDEs have been introduced in image restoration, [1,2,3,4,9,10,12,14,16,20,22,24,25,26,27,28]. You-Kaveh [26] proposed the following functional

    Ωf(|u|)dxdy, (1.5)

    where denote the Laplacian operator. Based on the gradient descent method, this second order functional yields a fourth-order PDE

    ut=(g((u)2)u), (1.6)

    where g(s)=k2/(k2+s2) and k is an image dependent parameter. This equation does avoid blocky piecewise constant solution. However, it produces speckles in the processed image [16]. Many other authors have considered image denoising models based on the minimizer of high-order functionals. Laysaker et al. [16] proposed the LLT model

    Ω(|uxx|+|uyy|)dxdy, (1.7)

    and

    Ω|uxx|2+|uxy|2+|uyx|2+|uyy|2dxdy, (1.8)

    they try to minimize the TV of u. Minimizing these two functionals is equivalent to solve the following PDEs respectively

    ut=(uxxuxx)xx(uyyuyy)yy (1.9)

    and

    ut=(uxxD2u)xx(uxyD2u)yx(uyxD2u)xy(uyyD2u)yy, (1.10)

    where D2u∣=|uxx|2+|uxy|2+|uyx|2+|uyy|2. These equations have proved to be the improved version of (1.6).

    The theoretical analysis showed that fourth-order equations have advantages over second-order equations in some aspects. Fourth-order PDEs usually produce the smooth image of the observed image. This is believed to be a better approximation in smooth region. Therefore, the staircase effect is suggested to be reduced and the recovery image will look better. It is reasonable to conclude that fourth-order diffusion performs better than the second-order models in the aspect of the recovery of smooth regions.

    In this paper, to address the problem of denoising images contaminated with additive noise, a fourth-order model is suggested. Using the gradient module of the image to design a speed controlling function. This function indicated where is the edge in the image, thus the new model can preserve edge in this region. The motivation for proposing this model is to overcome certain inconsistencies in second order models founded during the process of recovering smooth regions and better preservation of the fine details. The model is based on solving a nonlinear fourth order degenerate equation with the noisy image as its initial data. By use of Roth's method, we proved the existence and uniqueness of the entropy solution. Additionally, the numerical results demonstrate that the proposed model is superior to PM (Perona, Malik) [17] and ROF models.

    The rest of this article is organized as follows. In Section 2, we give some preliminaries that we will use. Section 3 is devoted to the proposed model and the proofs of existence and uniqueness of its solution. The difference schemes are presented in Section 4. Numerical experiments are presented in Section 5 and the conclusion of this paper is given in Section 6.

    In this section, we recall some necessary definitions and notations, [11,13,14]. We begin with some definitions of the space BV2, which consists of functions uW1,1(Ω) s.t uBV(Ω), this space is also denoted by BH(Ω). To know more about space of bounded Hessian, we refer the reader to [4,5,8].

    Definition 2.1. Let ΩRn be a bounded open domain with Lipschitz boundary. Let uL1(Ω). Then the BV2 semi-norm of u is characterized by

    ||D2u||=supϕC20(Ω,Rn×n){Ωni,j=1ujiϕijdx:|ϕ(x)|1,xΩ}<, (2.1)

    where C20(Ω,X) is the space of functions from Ω to X, 2-times continuously differentiable with compact support and ϕ(x)is a vector valued function, with |ϕ(x)|=ni,j=1(ϕij)2. Here we remark that the space BV2 equipped with uBV2(Ω)=||D2u||+uL1(Ω) is a Banach space.

    Definition 2.2. Suppose that ΩRn be a bounded open domain with Lipschitz boundary, uL1(Ω), and α(x)0 is continuous and real function. Then we define the weighted BV2 semi-norm of u as

    ||D2u||α=supϕC20(Ω,Rn×n){Ωni,j=1ujiϕijdx:|ϕ(x)|α,xΩ}< (2.2)

    In this section, we propose a fourth-order image denoising model, with some guidance from previous work [6,14,15,16,26,27]. There are some benefits of fourth-order models. On the one hand, it can remove high frequency oscillation more effectively than second-order models because the evaluation of the second-order becomes weak in the high frequency area. One the other hand, for the fourth-order model, there is flexibility in employing different functional behaviors in the formulation.

    Consider the following boundary value problem

    ut+ D2ij(α(x) D2iju|D2iju|)=0(x,t)ΩT=(0,T)×Ω, (3.1)
    u(x,t)=0,(x,t)(0,T)×Ω, (3.2)
    un=0,(x,t)(0,T)×Ω, (3.3)
    u(x,0)=u0(x),xΩ, (3.4)

    where α(x)=11+|Gσu0|2, Gσ(x) is the Gaussian filter with parameter σ, u0(x) is the original image, Ω is bounded domain of R2 with appropriate smooth boundary, T>0 is fixed, n denote the unit outward normal of the boundary Ω.

    The term α(x) is used to enhance edges. In fact, it controls the speed of the diffusion: in the smooth region where u0 is small, the diffusion is strong. Near possible edges, however, where u0 is large, the diffusion spread is low. The convolution with Gσ should smooth away any large oscillations of noise. Therefore, we can get the smooth image and further preserve the edges in a best way.

    Definition 3.1. A measurable function u:ΩTR is an entropy solution of (3.1)–(3.4) in ΩT if uC([0,T];L2(Ω))L(0,T;BV2(Ω)),utL2(ΩT) and there exist z, such that αzL(ΩT) with αzL(ΩT)1,ut+Dijαzij=0 in D(ΩT) such that

    Ω(u(t)v)utdxΩαz(t)D2vdx||D2u||α, (3.5)

    for every vL(0,T;W2,10(Ω)).

    Before investigating the existence and uniqueness of problem (3.1)–(3.4), let us consider the following approximate evaluation problem: for 1<p2 and u0pW2,p(Ω), we construct the following problem

    upt+ D2ij(α(x)|D2ijup|p2D2ijup)=0,(x,t)ΩT (3.6)
    up(x,t)=0,(x,t)(0,T)×Ω, (3.7)
    upn=0,(x,t)(0,T)×Ω, (3.8)
    up(x,0)=u0p(x),xΩ. (3.9)

    Lemma 3.1. For any fixed p, 1<p2, the above problem (3.6)–(3.9) admits a weak solution upL(0,T;W2,p0(Ω))C([0,T];L2(Ω)) and uptL2(ΩT) such that

    limt0+up(x,t)u0p(x)L2(Ω)=0, (3.10)

    and for any φC0(ΩT) the following integral equality holds

    T0Ωuptφ(x,t)dxdt+T0Ωα(x)| D2ijup|p2 D2ijupD2ijφ(x,t)dxdt=0, (3.11)

    with

    upL(0,T;W2,p0(Ω))+upL(0,T;L2(Ω))+uptL2(ΩT)C, (3.12)

    where C is a constant independent of p.

    Proof. We apply Rothe's method [23], to construct an approximate solution sequence. Divide the interval [0,T] into n equal segments and define h=Tn. For any j: 1jn, for any positive integer n and a function u(x,t), denote

    un,jp(x)=up(x,jh),j=1,2,...,n.

    For fixed j, define the following functional on W2,p0(Ω)

    E(w)=1pΩα(x)|D2ijw|pdx+12hΩ(wun,j1p)2dx. (3.13)

    The idea here is to prove that if un,j1p is known and un,0p=u0p, then there is a minimizer for (3.13).

    Let umW2,p0(Ω)L2(Ω) be a minimizing sequence for E. Since α is bounded below, then the sequence um is bounded in W2,p0(Ω) and L2(Ω). Therefore, there exists a subsequence umiof um and a function un,jpW2,p0(Ω)L2(Ω) such that as i,

    umiun,jpweakly in W2,p0(Ω)andL2(Ω). (3.14)

    From this and the weak lower semicontinuity of the norms, we get

    E(un,jp)lim infiE(umi)=infwW2,p0(Ω)L2(Ω)E(w).

    Then un,jp is the solution of the Euler equation corresponding to E(w)

    D2ij(α(x)|D2ijun.jp|p2D2ijun.jp)+1h(un.jpun,j1p)=0, (3.15)

    which implies

    1hΩ(un,jpun,j1p)η(x)dx+Ωα(x)|D2ijun,jp|p2 D2ijun,jpD2ijη(x)dx=0, (3.16)

    for any η(x)C0(Ω).

    Let χn,j(t) be the indicator function of [h(j1),hj) and

    λn,j(t)={th(j1),if t[h(j1),hj),0,otherwise.

    We construct an approximation function as

    unp(x,t)=nj=1χn,j(t)un,jp, withunp(x,0)=u0p(x)

    and

    wnp(x,t)=nj=1χn,j(t)[un,j1p(x)+λn,j(t)(un,jp(x)un,j1p(x))].

    By (3.16), we have

    Ω(wnptη(x)+α(x)|D2ijunpp2D2ijunpD2ijη(x))dx=0,

    for every η(x)C0(Ω) a.e. t[0,T], which implies that

    T0Ω(wnptφ(x,t)+α(x)|D2ijunp|p2D2ijunpD2ijφ(x,t))dxdt=0, (3.17)

    for every φC0(ΩT).

    Next, we obtain some estimates for unp(x,t) and wnp(x,t). Notice that, we choose η(x)W2,p0(Ω) as the test function in (3.16). Let η(x)=un,jpun,j1p, we have

    1hΩ(un,jpun,j1p)2dx+Ωα(x)|D2ijun,jp|p2 D2ijun,jpD2ij(un,jpun,j1p)dx=0,
    1hΩ(un,jpun,j1p)2dx+Ωα(x)|D2ijun,jp|pdx=Ωα(x)|D2ijun,jp|p2 D2ijun,jpD2ijun,j1pdx.

    Using Young's inequality, we have

    1hΩ(un,jpun,j1p)2dx+Ωα(x)|D2ijun,jp|pdxp1pΩα(x)|D2ijun,jp|pdx+1pΩα(x)|D2ijun,j1p|pdx.

    That is

    1hΩ(un,jpun,j1p)2dx+1pΩα(x)|D2ijun,jp|pdx1pΩα(x)|D2ijun,j1p|pdx. (3.18)

    For any m with 1mn, summing (3.18) for j from 1 to m

    Ωα(x)|D2ijun,mp|pdxΩα(x)|D2iju0p|pdx,

    which implies

    sup0<t<TD2ijunppW2,p0(Ω)C, (3.19)

    where C is a constant independent of p,n.

    Summing (3.18) for j from 1 to n yield

    1hnj=1Ω(un,jpun,j1p)2dx1pΩα(x)|D2iju0p|pdx=C. (3.20)

    By the definition of wnp(x,t), we have

    wnpt=1hnj=1χn,j(t)(un,jpun,j1p).

    Thus

    wnpt2L2(ΩT)=1h2nj=1h(un,jpun,j1p)2L2(Ω)C. (3.21)

    By (3.19), we can obtain

    sup0<t<TΩ| D2ijwnp|pdx=sup0<t<Tnj=1χn,j(t)Ω|(1λn,j(t)) D2ijun,j1p+λn,j(t) D2ijun,jp|pdxsup0<t<T D2ijunppW2,p0(Ω)C. (3.22)

    Choosing η(x)=un,jp in (3.16), we get

    1hΩ(un,jpun,j1p)un,jpdx+Ωα(x)|D2ijun,jp|p2 D2ijun,jpD2ijun,jpdx=0,

    which implies

    1hΩ(un,jpun,j1p)un,jpdx+Ωα(x)|D2ijun,jp|pdx=0.

    By Young's inequality, we have

     hΩα(x)|D2ijun,jp|pdx+12Ω|un,jp|2dx12Ω|un,j1p|2dx. (3.23)

    Thus

    Ω|un,jp|2dxΩ|un,j1p|2dx. (3.24)

    This implies

    sup0<t<TΩ|unp|2dxΩ|u0p|2dx. (3.25)

    Similar to the proof of (3.22), we also see

    sup0<t<TΩ|wnp|2dxΩ|u0p|2dx. (3.26)

    Choosing η(x)=un,j1p in (3.16)

    Ω(un,jpun,j1p)un,j1pdx+hΩα(x)|D2ijun,jp|p2 D2ijun,jpD2ijun,j1pdx=0.

    Applying Hölder's inequality and the estimate (3.19), we have

    Ω(un,j1pun,jp)un,j1pdxCh.

    By Young's inequality again yields

    Ω|un,j1p|2dxCh+12Ω|un,j1p|2dx+12Ω|un,jp|2dx.

    Thus

    ChΩ|un,jp|2dxΩ|un,j1p|2dx. (3.27)

    Define B(unp)=α(x)| D2ijunp|p2 D2ijunp. Combining (3.19), (3.21), (3.22), (3.25) and (3.26), we conclude that there exist subsequences of unp,wnp,wnpt and B(unp), denoted by themselves such that, as n

    unpup,inL(0,T;W2,p0(Ω)),wnpwp,inL(0,T;W2,p0(Ω)),wnptwpt,inL2(ΩT),B(unp)ζ,inL(0,T;Lp(Ω)), (3.28)

    holds for some up,wp,ζ. And we also have

    wppL(0,T;W2,p0(Ω))+wpt2L2(ΩT)+uppL(0,T;W2,p0(Ω))C. (3.29)

    Then let n in (3.17),

    wpt+ D2ijζ=0. (3.30)

    Next, we show that up=wp. By the definition of up and wp, we have

    wnpunp=nj=1χn,j(t)(1λn,j(t))(un,j1pun,jp),

    which combined with (3.20), leads to

    wnpunp2L2(ΩT)nj=1hun,jpun,j1p2L2(ΩT)Ch20,as h0. (3.31)

    Now, it remains to show that ζ=B(up). From (3.17) and the convergence sets (3.28), as n, we can get

    T0Ωuptφ(x,t)dxdt+T0Ωζ.D2ijφ(x,t)dxdt=0. (3.32)

    For any gLp(0,T,W2,p(Ω)) and for j from 1 to n, we can obtain, by the monotonicity condition, the inequality

    Ω(B(un.jp)B(g))(D2ijun.jpD2ijg)dx0. (3.33)

    Letting η=un.jp in (3.16), we obtain

    1hΩ(un,jpun,j1p)un,jpdx+ΩB(un,jp)D2ijun,jpdx=0. (3.34)

    Applying Young's inequality on the first term of (3.34) together with the inequality (3.33) and integrating over ((j1)h,jh), we get

    12Ω[|un,jp|2|un,j1p|2]dx+jh(j1)hΩB(un,jp)D2ijgdxdt+jh(j1)hΩB(g)(D2ijun.jpD2ijg)dxdt0. (3.35)

    Summing up (3.35) for j from 1 to n, we obtain

    12Ω[|unp(T)|2|u0p|2]dx+T0ΩB(unp)D2ijgdxdt+T0ΩB(g)(D2ijunpD2ijg)dxdt0. (3.36)

    Recalling the convergence sets (3.28) and letting n, (3.36) yields

    12Ω[|up(T)|2|u0p|2]dx+T0ΩζD2ijgdxdt+T0ΩB(g)(D2ijupD2ijg)dxdt0. (3.37)

    We can rewrite (3.37) in the form

    T0Ωuptupdxdt+T0ΩζD2ijgdxdt+T0ΩB(g)(D2ijupD2ijg)dxdt0. (3.38)

    Letting φ=up in (3.30), we obtain

    T0Ωuptupdxdt+T0ΩζD2ijupdxdt=0. (3.39)

    Then, substituting (3.39) into (3.38) leads to

    T0Ω(ζB(g))(D2ijupD2ijg)dxdt0. (3.40)

    Choose g=upks where k>0 and D2ijsL(0,T;W2,p(Ω)). We then have

    T0Ω(ζB(upks))D2ijsdxdt0. (3.41)

    Sending k0, we obtain

    T0Ω(ζB(up))D2ijsdxdt0,sL(0,T;W2,p(Ω)). (3.42)

    Since s is arbitrary, we see that ζ=B(up).

    Now, we prove (3.10), we let φ=up(x,t) and φ=up(x,t1) in (3.30), for 0t1tt2T, we obtain

    Ω(u2p(x,t2)u2p(x,t1))dx=2t2t1Ωα(x)| D2ijup|pdxdt,

    and

    Ωup(x,t2)up(x,t1)dxΩu2p(x,t1)dx=t2t1Ωα(x)| D2ijup|p2 D2ijup.D2ijup(x,t1)dxdt.

    Then

    Ω|up(x,t2)up(x,t1)|2dx=Ω(u2p(x,t2)u2p(x,t1))dx+2Ω(u2p(x,t1)up(x,t2)up(x,t1))dx,=2t2t1Ωα(x)| D2ijup|pdxdt+2t2t1Ωα(x)| D2ijup|p2 D2ijup.D2ijup(x,t1)dxdt.

    From the above equation, we deduce that

    limt0+up(x,t)u0p(x)L2(Ω)=0,

    and the proof is completed.

    Theorem 3.1. If u0BV2(Ω) and u0=0,un=0,xΩ in the sense of trace then the problem (3.1)–(3.4) admits one and only one entropy solution.

    Proof. By Lemma 3.1, there exists up, which is a weak solution of the problem (3.6)–(3.9) and a constant C such that

    upL(0,T;W2,p0(Ω))+upL(0,T;L2(Ω))+uptL2(ΩT)C. (3.43)

    So, from (3.43), there exists a subsequence of up, denoted by itself and a function uL(0,T;BV2(Ω))C([0,T];L2(Ω)) with utL2(ΩT) such that, as p1+,

    upu,in  W1,1(Ω),with ||D2u||αlim infp1+D2ijupLp(Ω),a.e. t(0,T)

    and

    uptut, weakly in L2(ΩT).

    We also have upu strongly in L2(ΩT)a.e. t(0,T) and

    limt0+u(x,t)u0(x)L2(Ω)=0.

    Applying the method in [7], we next prove that α(x)|D2ijup|p2 D2ijup is weakly relatively compact in L1(ΩT). Employing (3.43) and Hölder's inequality,

    |T0Ωα(x)|D2ijup|p2D2ijupdxdt|T0Ωα(x)∣∣D2ijupp1dxdtCp1pmeas(ΩT)1p,

    where C is independent of p. Thus, {α(x)|D2ijup|p2D2ijup} is bounded and equi-integrable in L1(ΩT) and is therefore weakly relatively compact in L1(ΩT). Thus we deduce that as p1+,

    {α(x)|D2ijup|p2 D2ijup}αz, weakly in L1(ΩT).

    So we get by Lemma 3.1 and the fact that uptut in L2(ΩT),

    T0Ωutφ(x,t)dxdt+T0ΩαzD2ijφ(x,t)dxdt=0, (3.44)

    for every φ(x,t)C0(ΩT) and ut+Dijαzij=0 in D(ΩT).

    Now, it remains to prove that αzL(ΩT)1.

    For any k>0, setting

    Ap,k={(x,t)ΩT:∣D2ijup∣>k}, we have that

    meas(Ap,k)Ckp, for every p>1,k>0.

    As above, there exists a function gkL1(ΩT) such that

    α(x)|D2ijup|p2 D2ijupχAp,kgk, as p1+ weakly in L1(ΩT),

    where χAp,k is the indicator function of Ap,k. Now for any ϕL(ΩT) with

    ϕL(ΩT)1, by the definition of χAp,k, we see that

    |T0Ωα(x)|D2ijup|p2 D2ijupϕχAp,kdxdt|Ck.

    Letting p1+, we have

    T0ΩgkdxdtCk,for every k>0. (3.45)

    Since we have that

    |T0Ωα(x)|D2ijup|p2 D2ijupχΩT/Ap,k|kp1, for any p>1,

    letting p1+, we obtain that α(x)D2ijupp2 D2ijupχΩT/Ap,k weakly converges in L1(ΩT) to some function fkL1(ΩT) with fkL(ΩT)1. Since, for any k>0, we may write αz=fk+gk with fkL(ΩT)1 and gk satisfies (3.45), it is easily follows that αzL(ΩT)1.

    Next, we verify the solution definition inequality (3.5). For any vnC0(ΩT) and taking φ=(upvn)ξ(t) in (3.11), we have

    T0Ωupt(upvn)ξ(t)dxdt=T0Ωα(x)|D2ijup|p2 D2ijupD2ij((upvn)ξ(t))dxdt.

    Letting p1+,

    T0Ωut(u(t)vn)ξ(t)dxdtT0Ωαz(t)D2ijvnξ(t)dxdtT0||D2u||αξ(t)dt.

    Then for any vL(0,T;W2,10(Ω)), letting n,

    T0Ωut(u(t)v)ξ(t)dxdtT0Ωαz(t)D2ijvξ(t)dxdtT0||D2u||αξ(t)dt.

    Since ξ(t) is arbitrary, we have

    Ωut(u(t)v)dxΩαz(t)D2ijvdx||D2u||α,

    for every vL(0,T;W2,10(Ω)) and a.e. on [0,T].

    Finally, we prove the uniqueness of the entropy solution. Let u1,u2 both be entropy solution with data u10,u20. Then there exists αz1,αz2L(ΩT) such that

    Ωu1t(u1v)dxΩαz1D2ijvdx||D2u1||α, (3.46)

    and

    Ωu2t(u2v)dxΩαz2D2ijvdx||D2u2||α, (3.47)

    for every vL(0,T;W2,10(Ω)) and a.e. on [0,T]. Let u1n,u2nL(0,T;W2,p0(Ω)) be approximates functions, respectively, for u1 and u2, such that

    limn(D2iju1nL1(Ω)||D2u1||α)=0,limnu1nu1L2(Ω)=0,

    and

    limn(D2iju2nL1(Ω)||D2u2||α)=0,limnu2nu2L2(Ω)=0,

    a.e. on[0,T]. Taking v=u2n in (3.46) and v=u1n in (3.47), adding the two equations and rearranging the result, we obtain

    Ω(u1u2)(u1tu2t)dx+Ω(u1u1n)u2tdx+Ω(u2u2n)u1tΩαz1D2iju2ndx||D2u1||α+Ωαz2D2iju1ndx||D2u2||α.

    So integrating from 0 to t and letting n, we get

    Ω(u1u2)2dxΩ(u10u20)2dx.

    The proof is completed.

    In this section, assuming τ to be the time step size and h the space grid size, we discretize time and space as follows:

    t=nτ,n=0,1,2,,x=ih,i=0,1,2,,I,y=jh,j=0,1,2,,J,

    where Ih×Jh is the size of the original image. Let uni,j denote approximations of u(nτ,ih,jh). We define the discrete approximation:

    xuni,j=uni+1,j2uni,j+uni1,jh2,yuni,j=uni,j+12uni,j+uni,j1h2,xyuni,j=uni+1,j+1+uni,juni,j+1uni+1,jh2.

    The discrete explicit scheme of the problem can be written as

    un+1i,j=uni,jτ[x(αijxuni,j|xuni,j|ϵ)+y(αijyuni,j|yuni,j|ϵ)+xy(αijxyuni,j|xyuni,j|ϵ)],αi,j=11+|Gσu0(x)|2i,j,||ϵ=||+ϵ,ϵ>0,u0i,j=u0(ih,jh),0iI,0jJ,uni,0=uni,1,un0,j=un1,j,unI,j=unI1,j,uni,J=uni,J1,uni,0=0,un0,j=0,unI,j=0,uni,J=0.

    Here the MATLAB function "conv2" is used to represent the two-dimensional discrete Convolution Transform of the matrix ui,j.

    In this section, we demonstrate the performance of our model in denoising images involving Gaussian white noise. We applied difference equations discussed in section 4 and compared the results with the results of ROF model [18] and PM model [17]. We used step size τ=0.02, gride size h=1 and λ=0.

    At the end of the denoising process, the peak signal to noise ratio (PSNR), mean absolute-deviation error (MAE) and structure similarity index measure (SSIM) values were recorded to measure the denoising performance. The values are given by the following formulas:

    PSNR(u,u0)=10 log10IJ|maxu0minu0|2uu02L2dB

    and

    MAE(u,u0)=uu0L1IJ,

    where |maxu0minu0| gives the gray-scale range of the original image, u0 and u denote, respectively, the original image and the denoised image, I×J is the dimension of image.

    SSIM, designed by Wang et al.[21], is a quality used to measure the similarity between any two images. Given any two images u and u0, SSIM is given by the formula

    SSIM(u,u0)=L(u,u0)C(u,u0)R(u,u0).

    L(u,u0)=2μuμu0+k1μ2u+μ2u0+k1, compares the two images' mean luminance μu and μu0. The maximal value of L(u,u0)=1, if μu=μu0, C(u,u0)=2σuσu0+k2σ2u+σ2u0+k2, measures the closeness of contrast of the two images u and u0. Contrast is determined in terms of standard deviation, σ. Contrast comparison measure C(u,u0)=1 maximally if and only if σu=σu0; that is, when the images have equal contrast.

    R(u,u0)=σuu0+k3σuσu0+k3, is a structure comparison measure which determines the correlation between the images u and u0, where σuu0 is covariance between u and u0. It attains maximal value of 1 if, structurally, the two images coincide, but its value is equal to zero when there is absolutely no structural coincidence. The quantities k1,k2 and k3 are small positive perturbations that avert the possibility of having zero denominators.

    Two test images of "Cameraman" and "Peppers" are corrupted by white Gaussian noise with standard deviation (SD) of 30, (Figures 1 and 2). Tables 1 and 2, present the numerical results of restoration of Cameraman image, (Figure 1), and those of the Peppers image, (Figure 2). The comparisons are based on PSNR, MAE and SSIM. The proposed method shows the best performance with respect to PSNR, MAE and SSIM.

    Figure 1.  Cameraman image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=30. (c) Our method. (d) ROF model. (e) PM model.
    Figure 2.  Peppers image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=30. (c) Our method. (d) ROF model. (e) PM model.
    Table 1.  Numerical results for Peppers image (251×251) experiment, Figure 2.
    Algorithm σ PSNR MAE SSIM
    PM model 30 27.98 7.06 0.8345
    ROF model 30 28.26 6.80 0.8359
    Our Method 30 28.66 6.44 0.8537

     | Show Table
    DownLoad: CSV
    Table 2.  Numerical results for Cameraman image (251×251) experiment, Figure 3.
    Algorithm σ PSNR MAE SSIM
    PM model 20 28.89 5.83 0.8386
    ROF model 20 28.76 5.85 0.8397
    Our Method 20 29.04 5.62 0.8450

     | Show Table
    DownLoad: CSV

    Our first example is Cameraman image, which is displayed in Figure 1a and 1b is its degraded version. Furthermore, Figure 1c, 1d and 1e, are portions of the recovered images with the proposed model, ROF model and PM model, respectively. It is clear that our method can overcome the staircase effect that caused by the second order method.

    The second example is Peppers image, which is displayed in Figure 2a, its degraded version is showed in Figure 2b. Basically, Figure 2c, 2d and 2e, are portions of the recovered images by the proposed model, ROF model and PM model, respectively. It is evident that, our method yields good results in restoring image since it avoids the staircase effect that caused by the second order method while, at the same time, handle edges in a best way.

    Similarly, the two test images are corrupted by white Gaussian noise with SD of 20, (Figures 3 and 4). Tables 3 and 4, present the numerical results of restoration of Cameraman image, (Figure 3), and those of the Peppers image, (Figure 4). The comparisons are based on PSNR, MAE and SSIM. Here again, the proposed method shows the best performance with respect to PSNR, MAE and SSIM. In Figure 3a and 3b we display Cameraman image and the noisy version. Figure 3c, 3d and 3e, are portions of the recovered images with the proposed model, ROF model and PM model, respectively. We display Peppers image and the degraded version in Figure 4a and 4b. Figure 4c, 4d and 4e, are portions of the recovered images with the proposed model, ROF model and PM model, respectively. Here also, the proposed model yields better results in denoising image while handling edges in a best way.

    Figure 3.  Cameraman image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=20. (c) Our method. (d) ROF model. (e) PM model.
    Figure 4.  Peppers image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=20. (c) Our method. (d) ROF model. (e) PM model.
    Table 3.  Numerical results for Peppers image (251×251) experiment, Figure 4.
    Algorithm σ PSNR MAE SSIM
    PM model 20 29.86 5.70 0.8727
    ROF model 20 29.90 5.64 0.8741
    Our Method 20 30.48 5.18 0.8795

     | Show Table
    DownLoad: CSV
    Table 4.  Numerical results of Barbara and Lena images.
    Image Algorithm σ PSNR MAE SSIM
    YK 30 26.08 8.62 0.7275
    LLT 30 27.10 8.11 0.7554
    Lena Ours 30 27.46 7.11 0.8078
    YK 20 27.73 6.97 0.8082
    LLT 20 29.18 6.39 0.8211
    Ours 20 29.20 5.89 0.8421
    YK 30 25.80 9.31 0.7053
    LLT 30 26.83 8.69 0.7258
    Barbara Ours 30 27.07 8.00 0.7520
    YK 20 27.13 7.98 0.7584
    LLT 20 28.28 7.29 0.7794
    Ours 20 28.46 6.79 0.7945

     | Show Table
    DownLoad: CSV

    Not surprisingly, although the edges are preserved, the staircase effect is visible for the second order models, and there are some speckles in the processed images, with an example given in Figure 2. Comparing the images processed by our model and the original images, we can observed that, the differences are insignificant. The edges are preserved and no speckles appear in the processed images.

    Finally, to illustrate the superiority of the proposed model over other related fourth-order models, we compared our results with YK model [26] and LLT model [16]. Barbara and Lena images have been corrupted by white Gaussian noise with SD of 30 (Figures 5 and 6) and SD of 20 (Figures 7 and 8). Numerical results for the images are tabulated in Table 4. Besides getting better outcomes, as evident from the results (see Figures 5 and 6), the model tackles the speckles caused by YK model at the same time.

    Figure 5.  Barbara image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=30. (c) YK model. (d) LLT model. (e) Our method.
    Figure 6.  Lena image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=30. (c) YK model. (d) LLT model. (e) Our method.
    Figure 7.  Barbara image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=20. (c) YK model. (d) LLT model. (e) Our method.
    Figure 8.  Lena image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=20. (c) YK model. (d) LLT model. (e) Our method.

    In Figures 6 and 8, the results of Lena Image have been displayed. In Figure 6, the test image Lena and its noisy version degraded by Gaussian noise with SD of 30 are shown in the sections (a) and (b), sections (c) to (e) are the results of the YK model, LLT model and the proposed one. Similarly, in Figure 8, the test image Lena and its noisy version degraded by Gaussian noise with SD of 20 are shown with the same order described above. The last image in section (e) of Figures 6 and 8 are the results of our suggested filter in which the extent of the denoising performance is noticeably better than competitor filter.

    In this article, we proposed a fourth-order image denoising model. The model was based on solving a fourth order partial differential equation by defining its corresponding functional. We proved, by use of Rothe's method, the existence and uniqueness of the entropy solution of the equation. Compared with the well known ROF and PM models, numerical results showed that our model perform better image recovery and can overcome staircase effects.

    The authors declare that they have no conflict of interests whatsoever and do approve the publication of this paper.



    [1] C. A. Janeway, How the immune system works to protect the host from infection: A personal view, Proc. Natl. Acad. Sci., 98 (2001), 7461–7468. https://doi.org/10.1073/pnas.131202998 doi: 10.1073/pnas.131202998
    [2] R. D. Michalek, J. C. Rathmell, The metabolic life and times of a T‐cell, Immunol. Rev., 236 (2010), 190–202. https://doi.org/10.1111/j.1600-065X.2010.00911.x doi: 10.1111/j.1600-065X.2010.00911.x
    [3] K. C. Mccullough, A. Summerfield, Basic concepts of immune response and defense development, ILAR J., 46 (2005), 230–240. https://doi.org/10.1093/ilar.46.3.230 doi: 10.1093/ilar.46.3.230
    [4] A. Rahman, A. Tiwari, J. Narula, T. Hickling, Importance of feedback and feedforward loops to adaptive immune response modeling, CPT: Pharmacometrics Syst. Pharmacol., 7 (2018), 621–628. https://doi.org/10.1002/psp4.12352 doi: 10.1002/psp4.12352
    [5] C. C. Mok, C. S. Lau, Pathogenesis of systemic lupus erythematosus, J. Clin. Pathol., 56 (2003), 481–490. https://doi.org/10.1136/jcp.56.7.481 doi: 10.1136/jcp.56.7.481
    [6] A. Bhatia, Y. Kumar, Cellular and molecular mechanisms in cancer immune escape: a comprehensive review, Expert Rev. Clin. Immunol., 10 (2013), 41–62. https://doi.org/10.1586/1744666X.2014.865519 doi: 10.1586/1744666X.2014.865519
    [7] D. S. Vinay, E. P. Ryan, G. Pawelec, W. H. Tallib, J. Stagg, E. Elkord, et al., Immune evasion in cancer: Mechanistic basis and therapeutic strategies, Semin. Cancer Biol., 35 (2015), 185–198. https://doi.org/10.1016/j.semcancer.2015.03.004 doi: 10.1016/j.semcancer.2015.03.004
    [8] K. A. Abdel-Sater, Physiological positive feedback mechanisms, Am. J. Biomed. Sci., 3 (2011), 145–155. https://doi.org/10.5099/aj110200145 doi: 10.5099/aj110200145
    [9] N. Rapin, E. Mosekilde, O. Lund, Bistability in autoimmune diseases, Autoimmunity, 44 (2011), 256–260. https://doi.org/10.3109/08916934.2010.523233 doi: 10.3109/08916934.2010.523233
    [10] S. Wang, F. Xu F, L. Rong, Bistability analysis of an HIV model with immune response, J. Biol. Syst., 25 (2017), 677–695. https://doi.org/10.1142/S021833901740006X doi: 10.1142/S021833901740006X
    [11] C. Long, H. Qi, S. Huang, Mathematical modeling of cytotoxic lymphocyte-mediated immune response to hepatitis B virus infection, J. Biomed. Biotechnol., 2008 (2008), 743690. https://doi.org/10.1155/2008/743690 doi: 10.1155/2008/743690
    [12] K. León, A. Lage, J. Carneiro, Tolerance and immunity in a mathematical model of T-cell mediated suppression, J. Theor. Biol., 225 (2003), 107–126. https://doi.org/10.1016/S0022-5193(03)00226-1 doi: 10.1016/S0022-5193(03)00226-1
    [13] M. Robertson-Tessi, A. El-Kareh, A. Goriely, A mathematical model of tumor-immune interactions, J. Theor. Biol., 294 (2011), 56–73. https://doi.org/10.1016/j.jtbi.2011.10.027 doi: 10.1016/j.jtbi.2011.10.027
    [14] M. A. Vogelbaum, B. Otvos, B. Raychaudhuri, D. Hambardzumyan, J. Finke, J. Lathia, The role of Myeloid derived suppressor cells (MDSCs) in tumor-induced immunosuppression in human and murine gliomas, Neuro-Oncology, 16 (2014), 44–44. https://doi.org/10.1093/neuonc/nou209.10 doi: 10.1093/neuonc/nou209.10
    [15] X. Lai, A. Stiff, M. Duggan, R. Wesolowski, W. E. Carson Ⅲ, A. Friedman, Modeling combination therapy for breast cancer with BET and immune checkpoint inhibitors, Proc. Natl. Acad. Sci., 115 (2018), 5534–5539. https://doi.org/10.1073/pnas.1721559115 doi: 10.1073/pnas.1721559115
    [16] X. Lai, A. Friedman, How to schedule VEGF and PD-1 inhibitors in combination cancer therapy, BMC Syst. Biol., 13 (2019), 30. https://doi.org/10.1186/s12918-019-0706-y doi: 10.1186/s12918-019-0706-y
    [17] X. L. Lai, A. Friedman, Combination therapy for melanoma with BRAF/MEK inhibitor and immune checkpoint inhibitor: a mathematical model, BMC Syst. Biol., 11 (2017), 70. https://doi.org/10.1186/s12918-017-0446-9 doi: 10.1186/s12918-017-0446-9
    [18] A. Friedman, X. Lai, Combination therapy for cancer with oncolytic virus and checkpoint inhibitor: A mathematical model, PLoS ONE, 13 (2018), e0192449. https://doi.org/10.1371/journal.pone.0192449 doi: 10.1371/journal.pone.0192449
    [19] T. Kamada, Y. Togasjhi, C. Tay, D. Ha, A. Sasaki, Y. Nakamura, et al., PD-1+ regulatory T cells amplified by PD-1 blockade promote hyperprogression of cancer, Proc. Natl. Acad. Sci., 116 (2019), 9999–10008. https://doi.org/10.1073/pnas.1822001116 doi: 10.1073/pnas.1822001116
    [20] S. J. Rotz, D. Leino, S. Szabo, J. L. Mangino, B. K. Turpin, J. G. Pressey, Severe cytokine release syndrome in a patient receiving PD-1-directed therapy, Pediatr. Blood Cancer, 64 (2017), e26642. https://doi.org/10.1002/pbc.26642 doi: 10.1002/pbc.26642
    [21] N. L. Komarova, E. Barnes, P. Klenerman, D. Wodarz, Boosting immunity by antiviral drug therapy: A simple relationship among timing, efficacy, and success, Proc. Natl. Acad. Sci., , 100 (2003), 1855–1860. https://doi.org/10.1073/pnas.0337483100 doi: 10.1073/pnas.0337483100
    [22] N. L. Komarova, D. Wodarz, ODE models for oncolytic virus dynamics, J. Theor. Biol., 263 (2010), 530–543. https://doi.org/10.1016/j.jtbi.2010.01.009 doi: 10.1016/j.jtbi.2010.01.009
    [23] G. Mahlbacher, L. T. Curtis, J. Lowengrub, H. B. Frieboes, Mathematical modeling of tumor-associated macrophage interactions with the cancer microenvironment, J. Immunother. Cancer, 6 (2018), 10. https://doi.org/10.1186/s40425-017-0313-7 doi: 10.1186/s40425-017-0313-7
    [24] L. J. Carreno, P. A. González, A. M. Kalergis, Modulation of T cell function by TCR/pMHC binding kinetics, Immunobiology, 211 (2006), 47–64. https://doi.org/10.1016/j.imbio.2005.09.003 doi: 10.1016/j.imbio.2005.09.003
    [25] K. Li, R. William, Z. Yuan, C. Zhu, Single-molecule investigations of T-cell activation, Curr. Opin. Biomed. Eng., 12 (2019), 102–110. https://doi.org/10.1016/j.cobme.2019.10.005 doi: 10.1016/j.cobme.2019.10.005
    [26] P. Rozman, U. Svajger, The tolerogenic role of IFN-γ, Cytokine Growth Factor Rev., 41 (2018), 40–53. https://doi.org/10.1016/j.cytogfr.2018.04.001 doi: 10.1016/j.cytogfr.2018.04.001
    [27] J. D. Burke, H. A. Young, IFN-γ: A cytokine at the right time, is in the right place, Semin. Immunol., 43 (2019), 101280. https://doi.org/10.1016/j.smim.2019.05.002 doi: 10.1016/j.smim.2019.05.002
    [28] J. H. Esensten, Y. A. Helou, G. Chopra, A. Weiss, J. A. Bluestone, CD28 costimulation: from mechanism to therapy, Immunity, 44 (2016), 973–988. https://doi.org/10.1016/j.immuni.2016.04.020. doi: 10.1016/j.immuni.2016.04.020
    [29] M. Mandai, J. Hamamishi, K. Abiko, N. Matsumura, T. Baba, I. Konnishi, Dual faces of IFNγ in cancer progression: a role of PD-L1 induction in the determination of pro-and antitumor immunity, Clin. Cancer Res., 22 (2016), 2329–2334. https://doi.org/10.1158/1078-0432.CCR-16-0224 doi: 10.1158/1078-0432.CCR-16-0224
    [30] L. M. Francisco, V. H. Salinas, K. E. Brown, V. K. Vangugri, G. J. Freeman, V. K. Kuchroo, et al., PD-L1 regulates the development, maintenance, and function of induced regulatory T cells, J. Exp. Med., 206 (2009), 3015–3029. https://doi.org/10.1084/jem.20090847 doi: 10.1084/jem.20090847
    [31] E. Batlle, J. Massagué, Transforming growth factor-β signaling in immunity and cancer, Immunity, 50 (2019), 924–940. https://doi.org/10.1016/j.immuni.2019.03.024 doi: 10.1016/j.immuni.2019.03.024
    [32] P. Pandiyan, L. Zheng, S. Ishiharam, J. Reed, M. J. Lenardo, CD4+CD25+Foxp3+ regulatory T cells induce cytokine deprivation-mediated apoptosis of effector CD4+ T cells, Nat. Immunol., 8 (2007), 1353–1362. https://doi.org/10.1038/ni1536 doi: 10.1038/ni1536
    [33] P. Trzonkowski, E. Szmit, J. Myliwska, A. Mysliwski, CD4+CD25+ T regulatory cells inhibit cytotoxic activity of CTL and NK cells in humans-impact of immunosenescence, Clin. Immunol., 119 (2006), 307–316. https://doi.org/10.1016/j.clim.2006.02.002 doi: 10.1016/j.clim.2006.02.002
    [34] L. Sewalt, K. Harley, P. V. Heijster, S. Balasuriya, Influences of Allee effects in the spreading of malignant tumours, J. Theor. Biol., 394 (2016), 77–92. https://doi.org/10.1016/j.jtbi.2015.12.024 doi: 10.1016/j.jtbi.2015.12.024
    [35] Y. V. Tyutyunov, S. Sen, L. I. Titova, M. Banerjee, Predator overcomes the Allee effect due to indirect prey-taxis, Ecol. Complexity, 39 (2019), 100772. https://doi.org/10.1016/j.ecocom.2019.100772 doi: 10.1016/j.ecocom.2019.100772
    [36] Y. Yu, J. J. Nieto, A. Torres, K. Wang, A viral infection model with a nonlinear infection rate, Boundary Value Probl., 2009 (2009), 958016. https://doi.org/10.1155/2009/958016 doi: 10.1155/2009/958016
    [37] S. Halle, O. Halle, R. Förster, Mechanisms and dynamics of T cell-mediated cytotoxicity in vivo, Trends Immunol., 38 (2017), 432–443. https://doi.org/10.1016/j.it.2017.04.002 doi: 10.1016/j.it.2017.04.002
    [38] B. Weigelin, M. Krause, P. Friedl, Cytotoxic T lymphocyte migration and effector function in the tumor microenvironment, Immunol. Lett., 138 (2011), 19–21. https://doi.org/10.1016/j.imlet.2011.02.016 doi: 10.1016/j.imlet.2011.02.016
    [39] J. R. Schoenborn, C. B. Wilson, Regulation of interferon-gamma during innate and adaptive immune responses, Adv. Immunol., 96 (2007), 41. https://doi.org/10.1016/S0065-2776(07)96002-2 doi: 10.1016/S0065-2776(07)96002-2
    [40] K. Abiko, N. Matsumura, J. Hamanishi, N. Horikawa, R. Murakami, K. Yamaguchi, et al., IFN-γ from lymphocytes induces PD-L1 expression and promotes progression of ovarian cancer, Br. J. Cancer, 112 (2015), 1501–1509. https://doi.org/10.1038/bjc.2015.101 doi: 10.1038/bjc.2015.101
    [41] H. Miao, J. A. Hollenbaugh, M. S. Zand, J. Holden-Wiltse, T. R. Mosmann, A. S. Perelson, et al., Quantifying the early immune response and adaptive immune response kinetics in mice infected with influenza A virus, J. Virol., 13 (2010), 6687–6698. https://doi.org/10.1128/JVI.00266-10 doi: 10.1128/JVI.00266-10
    [42] T. L. Hackett, R. Holloway, S. T. Holgate, J. A. Warner, Dynamics of pro-inflammatory and anti-inflammatory cytokine release during acute inflammation in chronic obstructive pulmonary disease: an ex vivo study, Respir Res., 9 (2008), 47. https://doi.org/10.1186/1465-9921-9-47 doi: 10.1186/1465-9921-9-47
    [43] K. A. Hay, L. A. Hanafi, D. Li, J. Gust, W. C. Liles, M. M. Wurfel, et al., Kinetics and biomarkers of severe cytokine release syndrome after CD19 chimeric antigen receptor-modified T-cell therapy, Blood, 130 (2017), 2295–2306. https://doi.org/10.1182/blood-2017-06-793141 doi: 10.1182/blood-2017-06-793141
    [44] X. Jiang, J, Wang, X. Deng, F. Xiong, J. Ge, B. Xiang, et al., Role of the tumor microenvironment in PD-L1/PD-1-mediated tumor immune escape, Mol. Cancer, 18 (2019), 10. https://doi.org/10.1186/s12943-018-0928-4. doi: 10.1186/s12943-018-0928-4
    [45] H. Dong, S. E. Strome, D. R. Salomao, H. Tamura, F. Hirano, D. B. Flies, et al., Tumor-associated B7-H1 promotes T-cell apoptosis: A potential mechanism of immune evasion, Nat. Med., 8 (2002), 793–800. https://doi.org/10.1038/nm730 doi: 10.1038/nm730
    [46] N. Patsoukis, J. Brown, V. Petkova, F. Liu, L. Li, V. A Boussiotis, Selective effects of PD-1 on Akt and Ras pathways regulate molecular components of the cell cycle and inhibit T cell proliferation, Sci. Signaling, 5 (2012). https://doi.org/10.1126/scisignal.2002796 doi: 10.1126/scisignal.2002796
    [47] T. Noguchi, J. P. Ward, M. M. Gubin, C. D. Arthur, S. H. Lee, J. Hundal, et al., Temporally distinct PD-L1 expression by tumor and host cells contributes to immune escape, Cancer Immunol. Res., 5 (2017), 106–117. https://doi.org/10.1158/2326-6066.CIR-16-0391 doi: 10.1158/2326-6066.CIR-16-0391
  • This article has been cited by:

    1. Ahmed Nokrane, Nour Eddine Alaa, Fatima Aqel, Fourth-order nonlinear degenerate problem for image decomposition, 2023, 4, 2662-2963, 10.1007/s42985-023-00251-1
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(3771) PDF downloads(180) Cited by(1)

Figures and Tables

Figures(8)  /  Tables(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog