SlideShare une entreprise Scribd logo
1  sur  42
Tumour immunology Prof M.I.N. Matee
Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
Definitions of Cancer and Carcinogenesis ,[object Object],[object Object]
[object Object],[object Object],[object Object]
Classification of cancer ,[object Object],[object Object],[object Object],[object Object]
Carcinogens ,[object Object],[object Object],[object Object],[object Object]
Tumor   Immunology ,[object Object],[object Object],[object Object],[object Object]
Tumors stimulate an immune response ,[object Object],[object Object],[object Object]
Oncogenesis proto-oncogenes tumor suppressor genes oncogenes carcinogen results in mutation dysfunctional  tumor suppressor genes inherited defect increased GF increased GF receptors exaggerated response to GF loss of ability to repair damaged  cells or induce apoptosis
Tumor Associated Antigens ,[object Object],[object Object],[object Object],[object Object],[object Object]
Four mechanisms of oncogene activity to deregulate cell division
A closer look at p53
Cancer cells are different ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTAL EVIDENCE FOR TUMOR ANTIGENS AND IMMUNE RESPONSE
TUMOR OVEREXPRESSION OF NORMAL AG
Immunity against tumor All components, specific and nonspecific, humoral and cellular affect tumor progression and growth
Tumor Surveillance ,[object Object],[object Object],[object Object],[object Object]
Tumors can both activate and suppress immunity Tumors can activate the immune response (ex. expression of foreign antigen with MHCI) or suppress the immune response (activation of T regulatory cells that release IL-10 and TGF  ) – the balance determines whether the cancer becomes clinically relevant or not Khong, H. T.  et al.   Nature Immunology  3, 999 - 1005 (2002)
Basic Tumor Immunosurveillance ,[object Object],[object Object],[object Object]
MAC  MHC II MAC T helper cell IL-2 T helper Memory cell T helper effectorcell IL-1 Interferon Macrophages and dendritic cells can directly attack tumor cells, or more commonly can express exogenous antigens (TSA’s or bits of killed tumor cells) to CD4 cells Tumor cell or tumor derived antigen Dendritic and Macrophage Presentation of Tumor Antigen to CD4 Cells
MAC or B cell (APC) MHC 1 T cytotoxic cell Perforins, apoptotic signals Exogenous antigen T cytotoxic memory cells T cytotoxic effector cells T Cytotoxic Cell Activity in Tumor Surveillance Cancer Cell T cytotoxic cell Endogenous antigen
MAC  MHC II MHC I APC T helper cell T helper 2 cell IL-2 B Cell  Eosinophil  IL-4 IL-5 T helper Memory cell T helper Effectorcell IL-1 T cytotoxic cell T cytotoxic memory cells T cytotoxic effector cells Perforins, apoptotic signals Interferon 1 Cancer Cell T cytotoxic cell Endogenous antigen Perforins, apoptotic signals Generally ineffective tumor surveillance, but some ADCC Tumor antigen or tumor cell SUMMARY
TARGET CELL Y Y MAC OR NK Antibody-dependent cell-mediated cytotoxicity (ADCC)  Y
NATURAL KILLER CELL Do not recognize tumor cell via antigen specific cell surface receptor, but rather through receptors that recognize loss of expression of MHC I molecules, therefore detect “missing self” common in cancer. NK  Target cell (infected or cancerous) Perforin and enzymes killer activating receptor
Tumor surveillance by NK Cells Tumor cells produce reactive oxygen species and stress induced ligands that can be recognized by NK cells
Tumor Escape Mechanisms ,[object Object],[object Object],[object Object],[object Object]
Lack of MHCI as a tumor escape mechanism Defects in mechanisms of MHCI production can render cancer cells “invisible” to CD8 cells
Tumors can escape immunity (and immunotherapy) by selecting for resistant clones that have occurred due to genetic instability
Immunoediting of cancer cells Elimination  refers to effective immune surveillance for clones that express TSA Equilibrium  refers to the selection for resistant clones (red) Escape  refers to the rapid proliferation of resistant clones in the immunocompetent host
1) Tumor cell production of immune suppressants such as   TGF-  ,  2) T regulatory cell stimulation with production of    immune suppressants such as TGF-   1 2 Avoidance of tumor surveillance through release of immune suppressants Mapara  Journal of Clinical Oncology. 22(6):1136-51, 2004
Tumor cells induce apoptosis in T lymphocytes via FAS activation ,[object Object],[object Object]
Issues in Immunocompetence and Cancer ,[object Object],[object Object]
Approaches to Cancer Immunotherapy ,[object Object],[object Object],[object Object],[object Object]
Cytokines ,[object Object],[object Object],[object Object],[object Object]
Tumor Vaccines ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Turning on the immune response to tumor cells through administration of immune stimulants
DNA vaccination with antigen expressed on MHC
DNA vaccine (viral vector) to induce costimulatory factors and cytokines
Dendritic cell vaccine  –  dendritic cells undergo viral transduction of more effectively present antigen
SEROTHERAPY: Monoclonal Antibodies To Tumor Antigens
Additional mechanisms of antitumor activity with monoclonal antibodies ,[object Object],[object Object],[object Object]
TUMOR ESCAPE MECHANISMS T regulatory cells Or kill them Or T regulatory cells

Contenu connexe

Tendances (20)

Transplantation immunology
Transplantation immunologyTransplantation immunology
Transplantation immunology
 
Cytokines
CytokinesCytokines
Cytokines
 
Antibody class switch ppt
Antibody class switch pptAntibody class switch ppt
Antibody class switch ppt
 
Tumor immunity
Tumor immunityTumor immunity
Tumor immunity
 
Cancer and the Immune System
Cancer and the Immune SystemCancer and the Immune System
Cancer and the Immune System
 
T cell development, maturation, activation and differentiation
T cell development, maturation, activation and differentiationT cell development, maturation, activation and differentiation
T cell development, maturation, activation and differentiation
 
Tumor immunity
Tumor immunityTumor immunity
Tumor immunity
 
Immunological tolerance
Immunological toleranceImmunological tolerance
Immunological tolerance
 
Cancer immunology
Cancer immunologyCancer immunology
Cancer immunology
 
Cancer immunology
Cancer immunologyCancer immunology
Cancer immunology
 
Immune response against tumors
Immune response against tumors Immune response against tumors
Immune response against tumors
 
Tumor immunology
Tumor immunologyTumor immunology
Tumor immunology
 
Cancer immunology
Cancer immunologyCancer immunology
Cancer immunology
 
T CELL ACTIVATION AND IT'S TERMINATION
T CELL ACTIVATION AND IT'S TERMINATIONT CELL ACTIVATION AND IT'S TERMINATION
T CELL ACTIVATION AND IT'S TERMINATION
 
B- lymphocytes
B- lymphocytesB- lymphocytes
B- lymphocytes
 
Theory of immune surveillance
Theory of immune surveillanceTheory of immune surveillance
Theory of immune surveillance
 
Immunosurveillance
ImmunosurveillanceImmunosurveillance
Immunosurveillance
 
Immunity to Microbes
Immunity to MicrobesImmunity to Microbes
Immunity to Microbes
 
Superantigen
SuperantigenSuperantigen
Superantigen
 
Immunofluorescence technique
Immunofluorescence techniqueImmunofluorescence technique
Immunofluorescence technique
 

Similaire à Tumour immunology leture notes

tumor immunology.pptx
tumor immunology.pptxtumor immunology.pptx
tumor immunology.pptxAnnie Annie
 
Cancer immunology.pptx
Cancer immunology.pptxCancer immunology.pptx
Cancer immunology.pptxAnnie Annie
 
Pharm immuno14&15 cancer & transplantpor
Pharm immuno14&15 cancer & transplantporPharm immuno14&15 cancer & transplantpor
Pharm immuno14&15 cancer & transplantpormmoney1
 
MSI 825Tumor Immunology (1).pptx
MSI 825Tumor Immunology (1).pptxMSI 825Tumor Immunology (1).pptx
MSI 825Tumor Immunology (1).pptxLilianNkinda
 
Tumor immunology dr. ihsan alsaimary
Tumor immunology  dr. ihsan alsaimaryTumor immunology  dr. ihsan alsaimary
Tumor immunology dr. ihsan alsaimarydr.Ihsan alsaimary
 
Tumor immunology by nidhi
Tumor immunology by nidhiTumor immunology by nidhi
Tumor immunology by nidhiNidhiLilhare
 
TUMOUR IMMUNOLOGY, CLINICAL ASPECTS OF NEOPLASIA & Clinical Features of Tumors
TUMOUR IMMUNOLOGY, CLINICAL ASPECTS OF NEOPLASIA & Clinical Features of TumorsTUMOUR IMMUNOLOGY, CLINICAL ASPECTS OF NEOPLASIA & Clinical Features of Tumors
TUMOUR IMMUNOLOGY, CLINICAL ASPECTS OF NEOPLASIA & Clinical Features of TumorsDr. Roopam Jain
 
Anti cancer treatments
Anti cancer treatmentsAnti cancer treatments
Anti cancer treatmentsMustafa Diaa
 
Tumor Immunology presentation by Sharmista
Tumor Immunology presentation by SharmistaTumor Immunology presentation by Sharmista
Tumor Immunology presentation by SharmistaSharmistaChaitali
 
Immunological aspects of cancer
Immunological aspects of cancerImmunological aspects of cancer
Immunological aspects of cancerPuppala Santosh
 
Immunotherapy and gene therapy
Immunotherapy and gene therapyImmunotherapy and gene therapy
Immunotherapy and gene therapyashish gupta
 
Chapter 17 immunotherapy
Chapter 17 immunotherapyChapter 17 immunotherapy
Chapter 17 immunotherapyNilesh Kucha
 
Cancer Immunology and Immunotherapy in Treatment of High Grade Glial Tumors
Cancer Immunology and Immunotherapy in Treatment of High Grade Glial TumorsCancer Immunology and Immunotherapy in Treatment of High Grade Glial Tumors
Cancer Immunology and Immunotherapy in Treatment of High Grade Glial TumorsNeuroAcademy
 
Immune surveillance of tumors.
Immune surveillance of tumors.Immune surveillance of tumors.
Immune surveillance of tumors.Balaji jogdand
 
Tumor antigens & cancer immunotherapy.pptx
Tumor antigens & cancer immunotherapy.pptxTumor antigens & cancer immunotherapy.pptx
Tumor antigens & cancer immunotherapy.pptxRagavi32
 

Similaire à Tumour immunology leture notes (20)

Tumourclasss
TumourclasssTumourclasss
Tumourclasss
 
tumor immunology.pptx
tumor immunology.pptxtumor immunology.pptx
tumor immunology.pptx
 
Cancer immunology.pptx
Cancer immunology.pptxCancer immunology.pptx
Cancer immunology.pptx
 
Pharm immuno14&15 cancer & transplantpor
Pharm immuno14&15 cancer & transplantporPharm immuno14&15 cancer & transplantpor
Pharm immuno14&15 cancer & transplantpor
 
MSI 825Tumor Immunology (1).pptx
MSI 825Tumor Immunology (1).pptxMSI 825Tumor Immunology (1).pptx
MSI 825Tumor Immunology (1).pptx
 
Tumor immunology dr. ihsan alsaimary
Tumor immunology  dr. ihsan alsaimaryTumor immunology  dr. ihsan alsaimary
Tumor immunology dr. ihsan alsaimary
 
Tumor Immunology
Tumor ImmunologyTumor Immunology
Tumor Immunology
 
Tumor immunology by nidhi
Tumor immunology by nidhiTumor immunology by nidhi
Tumor immunology by nidhi
 
TUMOUR IMMUNOLOGY, CLINICAL ASPECTS OF NEOPLASIA & Clinical Features of Tumors
TUMOUR IMMUNOLOGY, CLINICAL ASPECTS OF NEOPLASIA & Clinical Features of TumorsTUMOUR IMMUNOLOGY, CLINICAL ASPECTS OF NEOPLASIA & Clinical Features of Tumors
TUMOUR IMMUNOLOGY, CLINICAL ASPECTS OF NEOPLASIA & Clinical Features of Tumors
 
Anti cancer treatments
Anti cancer treatmentsAnti cancer treatments
Anti cancer treatments
 
tumor immunology.pptx
tumor immunology.pptxtumor immunology.pptx
tumor immunology.pptx
 
Tumor Immunology presentation by Sharmista
Tumor Immunology presentation by SharmistaTumor Immunology presentation by Sharmista
Tumor Immunology presentation by Sharmista
 
Immunological aspects of cancer
Immunological aspects of cancerImmunological aspects of cancer
Immunological aspects of cancer
 
Immunotherapy and gene therapy
Immunotherapy and gene therapyImmunotherapy and gene therapy
Immunotherapy and gene therapy
 
Chapter 17 immunotherapy
Chapter 17 immunotherapyChapter 17 immunotherapy
Chapter 17 immunotherapy
 
Cancer Immunology and Immunotherapy in Treatment of High Grade Glial Tumors
Cancer Immunology and Immunotherapy in Treatment of High Grade Glial TumorsCancer Immunology and Immunotherapy in Treatment of High Grade Glial Tumors
Cancer Immunology and Immunotherapy in Treatment of High Grade Glial Tumors
 
Immune surveillance of tumors.
Immune surveillance of tumors.Immune surveillance of tumors.
Immune surveillance of tumors.
 
Tumor antigens & cancer immunotherapy.pptx
Tumor antigens & cancer immunotherapy.pptxTumor antigens & cancer immunotherapy.pptx
Tumor antigens & cancer immunotherapy.pptx
 
Tumour Immunology
Tumour ImmunologyTumour Immunology
Tumour Immunology
 
Tumour immunology
Tumour immunologyTumour immunology
Tumour immunology
 

Plus de Bruno Mmassy

Family rhabdoviridae
Family rhabdoviridaeFamily rhabdoviridae
Family rhabdoviridaeBruno Mmassy
 
Processing the crime scene
Processing the crime sceneProcessing the crime scene
Processing the crime sceneBruno Mmassy
 
Molecular forensics 2
Molecular forensics 2Molecular forensics 2
Molecular forensics 2Bruno Mmassy
 
Medical aspects of human identification
Medical aspects of human identificationMedical aspects of human identification
Medical aspects of human identificationBruno Mmassy
 
Forensic chemistry introduction
Forensic chemistry introductionForensic chemistry introduction
Forensic chemistry introductionBruno Mmassy
 
Sero and phage typing bls 206
Sero and phage typing bls 206Sero and phage typing bls 206
Sero and phage typing bls 206Bruno Mmassy
 
Selected gram positives bls 206
Selected gram positives bls 206Selected gram positives bls 206
Selected gram positives bls 206Bruno Mmassy
 
Rickettsia & chlamydia bls 206
Rickettsia & chlamydia bls 206Rickettsia & chlamydia bls 206
Rickettsia & chlamydia bls 206Bruno Mmassy
 
Pathogenic anaerobe gram positive bls 206
Pathogenic anaerobe gram positive bls 206Pathogenic anaerobe gram positive bls 206
Pathogenic anaerobe gram positive bls 206Bruno Mmassy
 
Lecture 2 diagnostic molecular microbiology bls
Lecture 2 diagnostic molecular microbiology blsLecture 2 diagnostic molecular microbiology bls
Lecture 2 diagnostic molecular microbiology blsBruno Mmassy
 
Antimicrobial susceptibility test and assay bls 206
Antimicrobial susceptibility test and assay bls 206Antimicrobial susceptibility test and assay bls 206
Antimicrobial susceptibility test and assay bls 206Bruno Mmassy
 
Antimicrobial agents and mechanisms of action 2
Antimicrobial agents and mechanisms of action 2Antimicrobial agents and mechanisms of action 2
Antimicrobial agents and mechanisms of action 2Bruno Mmassy
 
Antibiotics lecture may 2010
Antibiotics lecture may 2010Antibiotics lecture may 2010
Antibiotics lecture may 2010Bruno Mmassy
 
Streptococci and enterococci bls 206
Streptococci and enterococci bls 206Streptococci and enterococci bls 206
Streptococci and enterococci bls 206Bruno Mmassy
 
Bls 107 general microbiology
Bls 107 general microbiologyBls 107 general microbiology
Bls 107 general microbiologyBruno Mmassy
 

Plus de Bruno Mmassy (20)

Family rhabdoviridae
Family rhabdoviridaeFamily rhabdoviridae
Family rhabdoviridae
 
Antiviral 1
Antiviral 1Antiviral 1
Antiviral 1
 
Processing the crime scene
Processing the crime sceneProcessing the crime scene
Processing the crime scene
 
Molecular forensics 2
Molecular forensics 2Molecular forensics 2
Molecular forensics 2
 
Medical aspects of human identification
Medical aspects of human identificationMedical aspects of human identification
Medical aspects of human identification
 
Forensic
ForensicForensic
Forensic
 
Forensic chemistry introduction
Forensic chemistry introductionForensic chemistry introduction
Forensic chemistry introduction
 
Dna forensic
Dna forensicDna forensic
Dna forensic
 
Sero and phage typing bls 206
Sero and phage typing bls 206Sero and phage typing bls 206
Sero and phage typing bls 206
 
Selected gram positives bls 206
Selected gram positives bls 206Selected gram positives bls 206
Selected gram positives bls 206
 
Rickettsia & chlamydia bls 206
Rickettsia & chlamydia bls 206Rickettsia & chlamydia bls 206
Rickettsia & chlamydia bls 206
 
Pathogenic anaerobe gram positive bls 206
Pathogenic anaerobe gram positive bls 206Pathogenic anaerobe gram positive bls 206
Pathogenic anaerobe gram positive bls 206
 
Lecture 2 diagnostic molecular microbiology bls
Lecture 2 diagnostic molecular microbiology blsLecture 2 diagnostic molecular microbiology bls
Lecture 2 diagnostic molecular microbiology bls
 
Antimicrobial susceptibility test and assay bls 206
Antimicrobial susceptibility test and assay bls 206Antimicrobial susceptibility test and assay bls 206
Antimicrobial susceptibility test and assay bls 206
 
Antimicrobial agents and mechanisms of action 2
Antimicrobial agents and mechanisms of action 2Antimicrobial agents and mechanisms of action 2
Antimicrobial agents and mechanisms of action 2
 
Antibiotics lecture may 2010
Antibiotics lecture may 2010Antibiotics lecture may 2010
Antibiotics lecture may 2010
 
Streptococci and enterococci bls 206
Streptococci and enterococci bls 206Streptococci and enterococci bls 206
Streptococci and enterococci bls 206
 
Bls 107 general microbiology
Bls 107 general microbiologyBls 107 general microbiology
Bls 107 general microbiology
 
Bacteriophage 1
Bacteriophage 1Bacteriophage 1
Bacteriophage 1
 
Bacterial toxins
Bacterial toxinsBacterial toxins
Bacterial toxins
 

Dernier

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Tumour immunology leture notes

  • 1. Tumour immunology Prof M.I.N. Matee
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Oncogenesis proto-oncogenes tumor suppressor genes oncogenes carcinogen results in mutation dysfunctional tumor suppressor genes inherited defect increased GF increased GF receptors exaggerated response to GF loss of ability to repair damaged cells or induce apoptosis
  • 10.
  • 11. Four mechanisms of oncogene activity to deregulate cell division
  • 12. A closer look at p53
  • 13.
  • 14. EXPERIMENTAL EVIDENCE FOR TUMOR ANTIGENS AND IMMUNE RESPONSE
  • 16. Immunity against tumor All components, specific and nonspecific, humoral and cellular affect tumor progression and growth
  • 17.
  • 18. Tumors can both activate and suppress immunity Tumors can activate the immune response (ex. expression of foreign antigen with MHCI) or suppress the immune response (activation of T regulatory cells that release IL-10 and TGF  ) – the balance determines whether the cancer becomes clinically relevant or not Khong, H. T. et al. Nature Immunology 3, 999 - 1005 (2002)
  • 19.
  • 20. MAC MHC II MAC T helper cell IL-2 T helper Memory cell T helper effectorcell IL-1 Interferon Macrophages and dendritic cells can directly attack tumor cells, or more commonly can express exogenous antigens (TSA’s or bits of killed tumor cells) to CD4 cells Tumor cell or tumor derived antigen Dendritic and Macrophage Presentation of Tumor Antigen to CD4 Cells
  • 21. MAC or B cell (APC) MHC 1 T cytotoxic cell Perforins, apoptotic signals Exogenous antigen T cytotoxic memory cells T cytotoxic effector cells T Cytotoxic Cell Activity in Tumor Surveillance Cancer Cell T cytotoxic cell Endogenous antigen
  • 22. MAC MHC II MHC I APC T helper cell T helper 2 cell IL-2 B Cell Eosinophil IL-4 IL-5 T helper Memory cell T helper Effectorcell IL-1 T cytotoxic cell T cytotoxic memory cells T cytotoxic effector cells Perforins, apoptotic signals Interferon 1 Cancer Cell T cytotoxic cell Endogenous antigen Perforins, apoptotic signals Generally ineffective tumor surveillance, but some ADCC Tumor antigen or tumor cell SUMMARY
  • 23. TARGET CELL Y Y MAC OR NK Antibody-dependent cell-mediated cytotoxicity (ADCC) Y
  • 24. NATURAL KILLER CELL Do not recognize tumor cell via antigen specific cell surface receptor, but rather through receptors that recognize loss of expression of MHC I molecules, therefore detect “missing self” common in cancer. NK Target cell (infected or cancerous) Perforin and enzymes killer activating receptor
  • 25. Tumor surveillance by NK Cells Tumor cells produce reactive oxygen species and stress induced ligands that can be recognized by NK cells
  • 26.
  • 27. Lack of MHCI as a tumor escape mechanism Defects in mechanisms of MHCI production can render cancer cells “invisible” to CD8 cells
  • 28. Tumors can escape immunity (and immunotherapy) by selecting for resistant clones that have occurred due to genetic instability
  • 29. Immunoediting of cancer cells Elimination refers to effective immune surveillance for clones that express TSA Equilibrium refers to the selection for resistant clones (red) Escape refers to the rapid proliferation of resistant clones in the immunocompetent host
  • 30. 1) Tumor cell production of immune suppressants such as TGF-  , 2) T regulatory cell stimulation with production of immune suppressants such as TGF-  1 2 Avoidance of tumor surveillance through release of immune suppressants Mapara Journal of Clinical Oncology. 22(6):1136-51, 2004
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. DNA vaccination with antigen expressed on MHC
  • 38. DNA vaccine (viral vector) to induce costimulatory factors and cytokines
  • 39. Dendritic cell vaccine – dendritic cells undergo viral transduction of more effectively present antigen
  • 41.
  • 42. TUMOR ESCAPE MECHANISMS T regulatory cells Or kill them Or T regulatory cells