257 resultados para SEPARATE


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Pseudomonas aeruginosa antimetabolite L-2-amino-4-methoxy-trans-3-butenoic acid (AMB) shares biological activities with 4-formylaminooxyvinylglycine, a related molecule produced by Pseudomonas fluorescens WH6. We found that culture filtrates of a P.aeruginosa strain overproducing AMB weakly interfered with seed germination of the grassy weed Poa annua and strongly inhibited growth of Erwinia amylovora, the causal agent of the devastating orchard crop disease known as fire blight. AMB was active against a 4-formylaminooxyvinylglycine-resistant isolate of E.amylovora, suggesting that the molecular targets of the two oxyvinylglycines in Erwinia do not, or not entirely, overlap. The AMB biosynthesis and transport genes were shown to be organized in two separate transcriptional units, ambA and ambBCDE, which were successfully expressed from IPTG-inducible tac promoters in the heterologous host P.fluorescens CHA0. Engineered AMB production enabled this model biocontrol strain to become inhibitory against E.amylovora and to weakly interfere with the germination of several graminaceous seeds. We conclude that AMB production requires no additional genes besides ambABCDE and we speculate that their expression in marketed fire blight biocontrol strains could potentially contribute to disease control.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Survival statistics from the incident cases of the Vaud Cancer Registry over the period 1974-1980 were computed on the basis of an active follow-up based on verification of vital status as to December 31, 1984. Product-moment crude and relative 5 to 10 year rates are presented in separate strata of sex, age and area of residence (urban or rural). Most of the rates are comparable with those in other published series from North America or Europe, but survival from gastric cancer (24% 5-year relative rates) tended to be higher, and that from bladder cancer (about 30%) lower than in most other datasets. No significant difference in survival emerged according to residence in urban Lausanne vs surrounding (rural) areas. Interesting indications according to subsite (higher survival for the pyloric region vs the gastric fundus, but absence of substantial differences for various colon subsites), histology (higher rates for squamous carcinomas of the lung, seminomas of the testis or chronic lymphatic leukemias as compared with other histotypes), or site of origin (higher survival for lower limb melanomas), require further quantitative assessment from other population-based series. A Cox proportional hazard model applied to melanomatous skin cancers showed an independent favorable effect on long-term prognosis of female gender and adverse implications for advanced age, stage at diagnosis and tumor site other than lower limb.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Various pulmonary artery preparations in vitro demonstrate sustained endothelium-dependent contractions upon hypoxia. To determine whether endothelin-1 could mediate this phenomenon, we examined the effect of bosentan, a new antagonist of both the ETA and ETB subtypes of the endothelin receptor. Small (300 pm) pulmonary arteries from rats were mounted on a myograph, precontracted with prostaglandin F2 alpha and exposed to hypoxia (PO2, 10 to 15 mm Hg, measured on-line) for 45 min. Endothelium-intact control rings exhibited a biphasic response, with a transient initial vasoconstriction (phase 1) followed by a second slowly developing sustained contraction (phase 2). Expressed in percent of the maximal response to 80 mmol/L KCl, the amplitudes of phase 1 (peak tension) and 2 (tension after 45 min of hypoxia) averaged 37 +/- 12% and 17 +/- 14%, respectively (n = 11). In endothelium-denuded rings, phase 1 persisted while the amplitude of phase 2 was reduced to 2 +/- 12% (p < 0.05, n = 8), showing the endothelium dependence of this contraction. Neither phase was significantly decreased in rings treated with 10(-5) mmol/L bosentan (38 +/- 15% and 17 +/- 12%, respectively, n = 6). The PO2 threshold for onset of hypoxic contraction was not significantly different among these three groups and averaged 32 +/- 24 mm Hg. In a separate experiment, we assessed the inhibitory effect of 10(-5) mol/L bosentan on the response to 10(-8) mol/L endothelin-I. Rings treated for 45 min with 10(-8) mol/L endothelin-1 alone exhibited a maximal contraction of 75 +/- 27% (n = 6). This was reduced to 4 +/- 17% (p < 0.01, n = 6) in rings treated with both 10(-8) mol/L endothelin-1 and 10(-5) mol/L bosentan. We conclude that complete blockade of all endothelin receptor subtypes has no effect on either endothelium-dependent or -independent hypoxic contractions in this preparation. This suggests that endothelial factors other than endothelin-I mediate the acute hypoxic contractions of small pulmonary arteries in the rat.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This letter presents advanced classification methods for very high resolution images. Efficient multisource information, both spectral and spatial, is exploited through the use of composite kernels in support vector machines. Weighted summations of kernels accounting for separate sources of spectral and spatial information are analyzed and compared to classical approaches such as pure spectral classification or stacked approaches using all the features in a single vector. Model selection problems are addressed, as well as the importance of the different kernels in the weighted summation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Spontaneous ventilation, mechanical controlled ventilation, apneic intermittent ventilation, and jet ventilation are commonly used during interventional suspension microlaryngoscopy. The aim of this study was to investigate specific complications of each technique, with special emphasis on transtracheal and transglottal jet ventilation. METHODS: The authors performed a retrospective single-institution analysis of a case series of 1,093 microlaryngoscopies performed in 661 patients between January 1994 and January 2004. Data were collected from two separate prospective databases. Feasibility and complications encountered with each technique of ventilation were analyzed as main outcome measures. RESULTS: During 1,093 suspension microlaryngoscopies, ventilation was supplied by mechanical controlled ventilation via small endotracheal tubes (n = 200), intermittent apneic ventilation (n = 159), transtracheal jet ventilation (n = 265), or transglottal jet ventilation (n = 469). Twenty-nine minor and 4 major complications occurred. Seventy-five percent of the patients with major events had an American Society of Anesthesiologists physical status classification of III. Five laryngospasms were observed with apneic intermittent ventilation. All other 24 complications (including 7 barotrauma) occurred during jet ventilation. Transtracheal jet ventilation was associated with a significantly higher complication rate than transglottal jet ventilation (P < 0.0001; odds ratio, 4.3 [95% confidence interval, 1.9-10.0]). All severe complications were related to barotraumas resulting from airway outflow obstruction during jet ventilation, most often laryngospasms. CONCLUSIONS: The use of a transtracheal cannula was the major independent risk factor for complications during jet ventilation for interventional microlaryngoscopy. The anesthetist's vigilance in clinically detecting and preventing outflow airway obstruction remains the best prevention of barotrauma during subglottic jet ventilation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using one male-inherited, one female-inherited and eight biparentally inherited markers, we investigate the population genetic structure of the Valais shrew (Sorex antinorii) in the Swiss Alps. Bayesian analysis on autosomal microsatellites suggests a clear genetic differentiation between two groups of populations. This geographically based structure is consistent with two separate postglacial recolonization routes of the species into Switzerland from Italian refugia after the last Pleistocene glaciations. Sex-specific markers also confirm genetic structuring among western and eastern areas, since very few haplotypes for either Y chromosome or mtDNA genome are shared between the two regions. Overall, these results suggest that two already well-differentiated genetic lineages colonized the Swiss Alps and came into secondary contact in the Rhône Valley. Low level of admixture between the two lineages is likely explained by the mountainous landscape structure of lateral valleys orthogonal to the main Rhône valley.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the corpus callosum of the cat, the heavy subunit of neurofilaments (NFH) can be demonstrated with the monoclonal antibody NE14, as early as P11, not at P3, and only in a few axons. At P18-19 and more markedly at P29, many more callosal axons have become positive to NE14 and this is similar to what is found in the adult. In contrast, callosal axons become positive to the neurofilament antibody SMI-32 only between P29 and P39 and remain positive in the adult. Treatment with alkaline phosphatase prevents axonal staining with NE14, but results in SMI-32 staining of a few callosal axons as early as P11, but not at P3. Between P11 and P19 the number of axons stained with SMI-32 after alkaline phosphatase treatment increases, in parallel with that of axons stained with NE14. Thus NE14 appears to recognize a phosphorylated form of NFH, while SMI-32 appears to recognize an epitope of NFH which is either masked by phosphate or inaccessible until between P29 and P39, unless the tissue is treated with alkaline phosphatase. These two forms of NFH appear towards the end of the period of massive developmental elimination of callosal axons. They are also synchronous with changes in the spacing of neurofilaments quantified in a separate ultrastructural study. These cytoskeletal changes may terminate the juvenile-labile state of callosal axons and allow further axial growth of the axon.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Generally, so-called control processes are thought to be necessary when we must perform one out of several competing actions. Some examples include performance of a less well-practiced action instead of a well-practiced one (prepotency); learning a new action (novelty); and rapidly switching from one action to another (task-switching). While it certainly is difficult to perform the desired action in these circumstances, it is less clear that a separate set of processes (e.g., control processes) are necessary to explain the observed behavior. Another way to approach the study of control processes is to investigate physiological dependent measures (e.g., electrophysiological or neuroimaging measures). Although these offer another avenue of inquiry into control processes, they have yet to furnish unambiguous evidence that control processes exist. While this might suggest that there are no control processes, it is also possible that our methods are insufficiently sensitive to measure control processes. We have investigated this latter possibility using tasks that are neuroanatomically distinct, though within the same modality (vision). This approach did not yield evidence for a separable set of control processes. However, recent works using a task-switching paradigm in which subjects switch between a visual and an auditory task suggest that switching both task and modality may be importantly different than switching task within a given modality. This may represent a way forward in the study of control processes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent studies indicate that Neanderthal and Denisova hominins may have been separate species, while debate continues on the status of Homo floresiensis. The decade-long debate between "splitters," who recognize over 20 hominin species, and "lumpers," who maintain that all these fossils belong to just a few lineages, illustrates that we do not know how many extinct hominin species to expect. Here, we present probability distributions for the number of speciation events and the number of contemporary species along a branch of a phylogeny. With estimates of hominin speciation and extincton rates, we then show that the expected total number of extinct hominin species is 8, but may be as high as 27. We also show that it is highly unlikely that three very recent species disappeared due to natural, background extinction. This may indicate that human-like remains are too easily considered distinct species. Otherwise, the evidence suggesting that Neanderthal and the Denisova hominin represent distinct species implies a recent wave of extinctions, ostensibly driven by the only survivor, H. sapiens.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

SUMMARY : The evolution of animal societies, where some individuals forego their own reproductive opportunities to help others to reproduce, poses an evolutionary paradox that can be traced back to Darwin. Altruism may evolve through kin selection when the donor and recipient of altruistic acts are related to each other. In social insects, workers are generally highly related to the brood they rear when colonies are headed by a single queen. Yet some ants have an extraordinary social organization, called unicoloniality, whereby individuals from separate nests mix freely to form large supercolonies, which in some cases extend over hundreds of km. These supercolonies are characterised by a high number of queens (polygyny) and an absence of clear colony boundaries. This type of social organization represents an evolutionary paradox because relatedness between nestmates is effectively zero. In such conditions, kin selection cannot account for the evolution of reproductive altruism. Moreover, unicoloniality is thought to be unstable over time, because workers that can no longer aid close relatives may evolve more selfish strategies. The Argentine ant (Linepithema humile) is a highly invasive species listed among the hundred world's worst invaders by the UICN. Native from South America, L. humile has been accidentally introduced throughout the world. Native populations have been described as noninvasive with a family-based organization. In contrast, within its introduction range, they form unicolonial supercolonies that contain numerous nests without intraspecific aggression. The development of such unicolonial populations has been explained as a direct consequence of the ant's introduction into a new habitat, favouring a transition from family-based to open colonies. To determine if the social structure of the Argentine ant is fundamentally different between the native and the introduced range, we studied genetically and behaviourally native and introduced populations of L. humile over different geographic scales. Our results clearly indicated that there are no fundamental differences in the social organisation of the Argentine ant between the two ranges. Our investigations revealed that, contrary to previous claims, native populations have a unicolonial social organisation very similar to that observed in the introduced range. Consequently, the unicolonial social structure of the Argentine ant does not stem from a shift in social organization associated with introduction into new habitats but evolved in the native range and is likely a stable, evolutionarily ancient adaptation to the local environment. Our study on native populations of L. humile also gave important insight in the comprehension of the evolution of unicoloniality in the Argentine ant. Native supercolonies are relatively small compared to introduced ones and may co-habit in a same population. These supercolonies are genetically highly differentiated leading to a significant relatedness among nestmate workers when the different supercolonies of a population are taken as a reference population. This provides the necessary conditions for loin selection to operate. Furthermore, we examined a native population over time, which revealed a high supercolony extinction rate. If more competitive supercolonies are more likely to survive or replace other supercolonies, a subtle dynamical process between the spread of selfish traits within supercolony and the selective elimination of supercolonies with such traits may allow a stable equilibrium and the persistence of unicoloniality over time. Finally, a worldwide study of the Argentine ant showed that the introduced supercolonies originate from numerous independent introduction events. In conclusion, the success of the Argentine ant does not stem from a shift in social organization associated with its introduction into new habitats, but is most probably explained by the intrinsic characteristics developed in its native range. RESUME : L'altruisme de reproduction où certains individus renoncent à leur propre reproduction pour aider d'autres individus à se reproduire constitue l'un des plus grand paradoxe de l'évolution. En effet, comment expliquer l'évolution de comportements qui tendent à augmenter les chances de survie et le succès reproductif d'autres individus, alors que ces actes diminuent l'aptitude de leurs auteurs ? La théorie de la sélection de parentèle permet de résoudre ce problème. Cette théorie stipule qu'en aidant de proches parents à se reproduire, les individus peuvent promouvoir indirectement la transmission de copies de leurs propres gènes à la génération suivante. Chez les insectes sociaux, l'altruisme des ouvrières s'explique par la théorie de sélection de parentèle lorsque les colonies sont monogynes (constituées d'une seule reine) puisque les ouvrières sont fortement apparentées aux couvains dont elles s'occupent. Par contre, les espèces dites unicoloniales, dont les colonies forment des réseaux de nids appelés supercolonies, représentent toujours un paradoxe pour les théories de l'évolution puisque l'apparentement entre les différents individus d'un nid est nulle. De plus, l'unicolonialité ne devrait pas être stable sur le long terme parce que les ouvrières qui ne s'occupent plus de leur apparentés devraient développer des stratégies plus égoïstes au cours du temps. La fourmi d'Argentine (Linepithema humile) est une espèce invasive ayant un impact considérable sur son environnement. Originaire d'Amérique du Sud, elle a été introduite dans pratiquement toutes les régions du monde dont le climat est de type méditerranéen. Son incroyable succès invasif s'explique par sa structure sociale unicoloniale observée dans chacun des pays où elle a été introduite. Par contre, les rares études effectuées en Argentine ont suggéré que la fourmi d'Argentine n'était pas unicoloniale dans son aire native. L'unicolonialité chez la fourmi d'Argentine était donc considéré comme une conséquence de son introduction dans de nouveaux environnements. Durant cette thèse, nous avons vérifié si la structure sociale de cette espèce différait fondamentalement entre l'aire native et introduite. Pour cela, nous avons étudié, à différentes échelles géographiques, des populations introduites et argentines avec une approche génétique et comportementale. L'ensemble de nos résultats montrent que les différences entre les deux structure sociales ne sont pas aussi importantes que ce que l'on imaginait. Les populations natives sont aussi constituées de réseaux de nids coopérants. La taille de ses supercolonies est toutefois bien moins importante en Argentine et il n'est pas rare de trouver plusieurs supercolonies cohabitantes dans une même population. Nous avons démontré que ces réseaux de nids étaient constitués d'individus qui sont plus apparentés entre eux qu'ils ne le sont avec les individus d'autres supercolonies, ainsi l'unicolonialité dans son aire d'origine ne représente pas un réel paradoxe pour les théories de l'évolution. Finalement nous avons étudié la même population en Argentine à six ans d'intervalle et avons constaté que les supercolonies avaient un taux de survie très faible ce qui pourrait expliquer la stabilité de l'unicolonialité au cours du temps. Si les supercolonies les plus compétitives survivent mieux que les supercolonies dans lesquelles apparaissent des traits égoïstes, on devrait alors observer une dynamique entre l'apparition de traits égoïstes et l'élimination des supercolonies dans lesquelles ces traits égoïstes évolueraient. Finalement, une étude mondiale nous a montré que les supercolonies étaient originaires de nombreux événements d'introductions indépendants. En conclusion, le succès invasif de la fourmi d'Argentine n'est donc pas dû à un changement de comportement associé à son introduction mais est lié aux caractéristiques qu'elle a développées en Argentine.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We characterized lipid and lipoprotein changes associated with a lopinavir/ritonavir-containing regimen. We enrolled previously antiretroviral-naive patients participating in the Swiss HIV Cohort Study. Fasting blood samples (baseline) were retrieved retrospectively from stored frozen plasma and posttreatment (follow-up) samples were collected prospectively at two separate visits. Lipids and lipoproteins were analyzed at a single reference laboratory. Sixty-five patients had two posttreatment lipid profile measurements and nine had only one. Most of the measured lipids and lipoprotein plasma concentrations increased on lopinavir/ritonavir-based treatment. The percentage of patients with hypertriglyceridemia (TG >150 mg/dl) increased from 28/74 (38%) at baseline to 37/65 (57%) at the second follow-up. We did not find any correlation between lopinavir plasma levels and the concentration of triglycerides. There was weak evidence of an increase in small dense LDL-apoB during the first year of treatment but not beyond 1 year (odds ratio 4.5, 90% CI 0.7 to 29 and 0.9, 90% CI 0.5 to 1.5, respectively). However, 69% of our patients still had undetectable small dense LDL-apoB levels while on treatment. LDL-cholesterol increased by a mean of 17 mg/dl (90% CI -3 to 37) during the first year of treatment, but mean values remained below the cut-off for therapeutic intervention. Despite an increase in the majority of measured lipids and lipoproteins particularly in the first year after initiation, we could not detect an obvious increase of cardiovascular risk resulting from the observed lipid changes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The T3 complex is known to be expressed on the cell surface of mature T cells together with either the alpha-beta heterodimeric T cell receptor (TCR) or the TCR gamma protein. In a number of immature T cell malignancies, however, T3 has been described exclusively in the cytoplasm. We have investigated five such T cell lines with cytoplasmic T3 and could demonstrate by biosynthetic labeling the presence of the alpha and beta chains of the TCR in the cytoplasm of two of them, CEM and Ichikawa. No surface TCR alpha-beta protein could be detected by staining with the WT31 antibody. These observations, therefore, argue against the concept that expression of the TCR alpha chain controls the surface expression of the T3/TCR complex. Interestingly, phorbol 12-myristate 13-acetate (PMA) induced cell surface expression of T3 protein in these two cell lines only. Moreover, on surface-iodinated CEM cells no association of T3 and TCR molecules could be demonstrated after treatment with PMA, and expression of TCR alpha and beta chains was limited to the cytoplasm. In Ichikawa cells, however, PMA induced surface expression of a mature T3/TCR complex. Our findings indicate that separate regulatory mechanisms may exist for the surface expression of the T3 proteins and for the assembly of the T3/TCR complex.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe the odorant binding proteins (OBPs) of the red imported fire ant, Solenopsis invicta, obtained from analyses of an EST library and separate 454 sequencing runs of two normalized cDNA libraries. We identified a total of 18 putative functional OBPs in this ant. A third of the fire ant OBPs are orthologs to honey bee OBPs. Another third of the OBPs belong to a lineage-specific expansion, which is a common feature of insect OBP evolution. Like other OBPs, the different fire ant OBPs share little sequence similarity (∼ 20%), rendering evolutionary analyses difficult. We discuss the resulting problems with sequence alignment, phylogenetic analysis, and tests of selection. As previously suggested, our results underscore the importance for careful exploration of the sensitivity to the effects of alignment methods for data comprising widely divergent sequences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Migraine is frequently comorbid with depression. There appear to be common aetiological factors for both disorders, but the aetiology of migraine within depressed patients, in particular the significance of aura, has been little studied. A large sample of concordantly depressed sibling pairs [the Depression-Network (DeNT) sample] was assessed as having migraine with aura (MA), migraine without aura (MoA), probable migraine or no migraine according to International Headache Society guidelines. Correlations between siblings' migraine status were used to assess the nature of familial liability to migraine. A multiple threshold isocorrelational model fit best, in which different syndromes are conceptualized as different severities of one underlying dimension rather than as having separate aetiologies. Thus, MA and MoA were found to be different forms of the same disorder, with MA occupying the more extreme end of the spectrum of liability. Implications for our understanding of the relationship between migraine and depression are discussed.