301 resultados para patient-specific biomechanical model


Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: Sodium channel NaV1.5 underlies cardiac excitability and conduction. The last 3 residues of NaV1.5 (Ser-Ile-Val) constitute a PDZ domain-binding motif that interacts with PDZ proteins such as syntrophins and SAP97 at different locations within the cardiomyocyte, thus defining distinct pools of NaV1.5 multiprotein complexes. Here, we explored the in vivo and clinical impact of this motif through characterization of mutant mice and genetic screening of patients. METHODS AND RESULTS: To investigate in vivo the regulatory role of this motif, we generated knock-in mice lacking the SIV domain (ΔSIV). ΔSIV mice displayed reduced NaV1.5 expression and sodium current (INa), specifically at the lateral myocyte membrane, whereas NaV1.5 expression and INa at the intercalated disks were unaffected. Optical mapping of ΔSIV hearts revealed that ventricular conduction velocity was preferentially decreased in the transversal direction to myocardial fiber orientation, leading to increased anisotropy of ventricular conduction. Internalization of wild-type and ΔSIV channels was unchanged in HEK293 cells. However, the proteasome inhibitor MG132 rescued ΔSIV INa, suggesting that the SIV motif is important for regulation of NaV1.5 degradation. A missense mutation within the SIV motif (p.V2016M) was identified in a patient with Brugada syndrome. The mutation decreased NaV1.5 cell surface expression and INa when expressed in HEK293 cells. CONCLUSIONS: Our results demonstrate the in vivo significance of the PDZ domain-binding motif in the correct expression of NaV1.5 at the lateral cardiomyocyte membrane and underline the functional role of lateral NaV1.5 in ventricular conduction. Furthermore, we reveal a clinical relevance of the SIV motif in cardiac disease.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

RESUME : Valganciclovir (Valcyte®) is an orally administered ester prodrug of the standard anticytomegalovirus (CMV) drug ganciclovir. This drug enabled an important reduction of the burden of CMV morbidity and mortality in solid organ transplant recipients. Prevention of CMV infection and treatment of CMV disease requires drug administration during many weeks. Oral drug administration is therefore convenient. Valganciclovir has been developed to overcome the poor oral availability of ganciclovir, which limits its concentration exposure after oral administration and thus its efficacy. This prodrug crosses efficiently the intestinal barrier, is then hydrolyzed into ganciclovir, providing exposure similar to intravenous ganciclovir. Valganciclovir is now preferred for the prophylaxis and treatment of CMV infection in solid organ transplant recipients. Nevertheless, adequate dosage adjustment is necessary to optimize its use, avoiding either insufficient or exaggerate exposure related to differences in its pharmacokinetic profile between patients. The main goal of this thesis was to better describe the pharmacokinetic and pharmacodynamic profile of valganciclovir in solid organ transplant recipients, to assess their reproducibility and their predictability, and thus to evaluate the current recommendations for valganciclovir dosage adjustment and the potential contribution of routine therapeutic drug monitoring (TDM) to patients' management. A total of 437 ganciclovir plasma concentration data from 65 transplant patients (41 kidney, 12 lung, 10 heart and 2 liver recipients, 58 under oral valganciclovir prophylaxis, 8 under oral valganciclovir treatment and 2 under intravenous ganciclovir) were measured using a validated chromatographic method (HPLC) developed for this study. The results were analyzed by non-linear mixed effect modeling (NONMEM). A two-compartment model with first-order absorption appropriately described the data. Systemic clearance was markedly influenced by GFR, with further differences between graft types and sex (CL/GFR = 1.7 in kidney, 0.9 in heart and 1.2 in lung and liver recipients) with interpatient variability (CV%) of 26% and interoccasion variability of 12%. Body weight and sex influenced central volume of distribution (V1 = 0.34 l/kg in males and 0.27 l/kg in females) with an interpatient variability of 20%. Residual intrapatient variability was 21 %. No significant drug interaction influenced GCV disposition. VGC prophylactic efficacy and tolerability were good, without detectable dependence on GCV profile. In conclusion, this analysis highlights the importance of thorough adjustment of VGC dosage to renal function and body weight. Considering the good predictability and reproducibility of GCV profile after oral VGC in solid organ transplant recipients, routine TDM does not appear to be clinically indicated. However, GCV plasma measurement may still be helpful in specific clinical situations such as documentation of appropriate exposure in patients with potentially compromised absorption, or lack of response to CMV disease treatment, or under renal replacement therapy. RESUME : Le valganciclovir (Valcyte®) est un promédicament oral du ganciclovir qui est un anti-infectieux de référence contre les infections à cytomegalovirus (CMV). Cet antiviral a permis de réduire les effets délétères de cette infection jusqu'ici responsable d'une importante morbidité et mortalité chez les transplantés d'organe. La prévention et le traitement de l'infection à CMV sont donc nécessaires mais requièrent l'administration d'un agent antiviral sur une longue période. Un médicament administré par voie orale représente donc un avantage évident. Le valganciclovir a été développé dans le but d'améliorer la faible absorption orale du ganciclovir, et donc son efficacité. Cet ester valylique du ganciclovir traverse plus facilement la barrière gastro-intestinale, puis est hydrolysé en ganciclovir dans la circulation sanguine, produisant une exposition comparable à celle d'une perfusion intraveineuse de ganciclovir. De ce fait, le valganciclovir est devenu largement utilisé pour la prophylaxie mais aussi le traitement de l'infection à CMV. Néanmoins une utilisation optimale de ce nouveau médicament nécessite de bonnes connaissances sur son profil pharmacocinétique afin d'établir un schéma de dose adapté pour éviter tant une surexposition qu'une sous-exposition résultant des différences d'élimination entre les patients. Le but de cette thèse a été d'étudier le profil pharmacocinétique et pharmacodynamique du valganciclovir chez les transplantés d'organe ainsi que sa reproductibilité et sa prédictibilité. Il s'agissait d'apprécier de manière critique le schéma actuellement recommandé pour l'adaptation des doses de valganciclovir, mais aussi la contribution éventuelle d'un suivi des concentrations sanguines en routine. Un total de 437 taux sanguins de ganciclovir ont été mesurés, provenant de 65 patients transplantés d'organe (41 rénaux, 12 pulmonaires, 10 cardiaques et 2 hépatiques, 58 sous une prophylaxie orale de valganciclovir, 8 sous un traitement de valganciclovir et 2 sous un traitement intraveineux). Une méthode de chromatographie liquide à haute performance a été développée et validée pour cette étude. Les résultats ont été ensuite analysés par modélisation non linéaire à effets mixtes (NONMEM). Un modèle à deux compartiments avec absorption de premier ordre a permis de décrire les données. La clairance systémique était principalement influencée par le débit de filtration glomérulaire (GFR), avec une différence entre les types de greffe et les sexes (CL/GFR = 1.7 chez les greffés rénaux, 0.9 pour les greffés cardiaques et 1.2 pour le groupe des greffés pulmonaires et hépatiques) avec un variabilité inter-individuelle de 26% (CV%) et une variabilité inter-occasion de 12%. Le poids corporel ainsi que le sexe avaient une influence sur le volume central de distribution (V1 = 0.34 l/kg chez les hommes et 0.27 l/kg chez les femmes) avec une variabilité inter-individuelle de 20%. La variabilité intra-individuelle résiduelle était de 21 %. Aucune interaction médicamenteuse n'a montré d'influence sur le profil du ganciclovir. La prophylaxie avec le valganciclovir s'est révélée efficace et bien tolérée. En conclusion, cette analyse souligne l'importance d'une adaptation de la dose du valganciclovir à la fonction rénale et au poids du patient. Au vu de la bonne reproductibilité et prédictibilité du profil pharmacocinétique du ganciclovir chez les patients transplantés recevant du valganciclovir, un suivi des concentrations sanguines en routine ne semble pas cliniquement indiqué. Néanmoins, la mesure des taux plasmatiques de ganciclovir peut être utile dans certaines situations particulières, comme la vérification d'une exposition appropriée chez des patients susceptibles d'absorption insuffisante, ou ne répondant pas au traitement d'une infection à CMV ou encore sous épuration extra-rénale. RESUME LARGE PUBLIC : Le valganciclovir est un précurseur capable de libérer du ganciclovir, récemment développé pour améliorer la faible absorption orale de ce dernier. Une fois le valganciclovir absorbé, le ganciclovir libéré dans la circulation sanguine devient efficace contre les infections à cytomégalovirus. Ce virus largement répandu est responsable de maladies insidieuses et parfois graves chez les personnes présentant une baisse des défenses immunitaires, comme les greffés d'organe recevant un traitement anti-rejet. Le ganciclovir est administré pendant plusieurs mois consécutifs soit pour prévenir une infection après la transplantation, soit pour traiter une infection déclarée. La facilité d'administration du valganciclovir par voie orale représente un avantage sur une administration du ganciclovir par perfusion, qui nécessite une hospitalisation. Toutefois, la voie orale peut être une source supplémentaire de variabilité chez les patients, avec un impact potentiel sur l'efficacité ou la toxicité du médicament. Le but de cette étude a été - de décrire le devenir de ce médicament dans le corps humain (dont l'étude relève de la discipline de la pharmacocinétique) - de définir les facteurs cliniques pouvant expliquer les différences de concentration sanguine observées entre les patients sous une posologie donnée - d'explorer les relations entre les concentrations du médicament dans le sang et son efficacité ou la survenue d'effets indésirables (dont l'étude relève de la discipline de la pharmacodynamie). Cette étude a nécessité le développement et la validation, d'une méthode d'analyse pour mesurer la concentration sanguine du ganciclovir, puis son application à 437 échantillons provenant de 65 patients transplantés d'organe solide (41 rénaux, 12 pulmonaires, 10 cardiaques et 2 hépatiques) recevant du valganciclovir. Les résultats des mesures effectuées ont été analysés à l'aide d'un outil mathématique afin d'élaborer un modèle du devenir du médicament dans le sang chez chaque patient et à chaque occasion. Cette étude a permis d'évaluer chez des patients recevant le valganciclovir, la vitesse à laquelle l'organisme absorbe, distribue, puis élimine le médicament. La vitesse d'élimination dépendait étroitement de la fonction rénale, du type de greffe et du sexe alors que la distribution dépendait du poids et du sexe du patient. La variabilité non expliquée par ces facteurs cliniques était modérée et vraisemblablement sans conséquence clinique évidente soit sur l'efficacité ou la tolérance, qui se révèlent très satisfaisantes chez les patients de l'étude. Les observations n'ont pas révélé de relation entre les concentrations de médicament et l'efficacité thérapeutique ou la survenue d'effets indésirables, confirmant que les doses relativement faibles utilisées dans notre collectif de patients suffisaient à produire une exposition reproductible à des concentrations adéquates. En conclusion, le profil (et par conséquent l'absorption) du valganciclovir chez les patients transplantés semble bien prédictible après une adaptation de la dose à la fonction rénale et au poids du patient. Un contrôle systématique des concentrations sanguines n'est probablement pas indiqué en routine, mais cette mesure peut présenter un intérêt dans certaines conditions particulières.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mutations in RPE65 protein is characterized by the loss of photoreceptors, although the molecular pathways triggering retinal cell death remain largely unresolved. The role of the Bcl-2 family of proteins in retinal degeneration is still controversial. However, alteration in Bcl-2-related proteins has been observed in several models of retinal injury. In particular, Bax has been suggested to play a crucial role in apoptotic pathways in murine glaucoma model as well as in retinal detachment-associated cell death. We demonstrated that Bcl-2-related signaling pathway is involved in Rpe65-dependent apoptosis of photoreceptors during development of the disease. Pro-apoptotic Bax alpha and beta isoforms were upregulated in diseased retina. This was associated with a progressive reduction of anti-apoptotic Bcl-2, reflecting imbalanced Bcl-2/Bax ratio as the disease progresses. Moreover, specific translocation of Bax beta from cytosol to mitochondria was observed in Rpe65-deficient retina. This correlated with the initiation of photoreceptor cell loss at 4 months of age, and further increased during disease development. Altogether, these data suggest that Bcl-2-apoptotic pathway plays a crucial role in Leber's congenital amaurosis disease. They further highlight a new regulatory mechanism of Bax-dependent apoptosis based on regulated expression and activation of specific isoforms of this protein.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: Over the years, somatic care has become increasingly specialized. Furthermore, a rising number of patients requiring somatic care also present with a psychiatric comorbidity. As a consequence, the time and resources needed to care for these patients can interfere with the course of somatic treatment and influence the patient-caregiver relationship. In the light of these observations, the Liaison Psychiatry Unit at the University Hospital in Lausanne (CHUV) has educated its nursing staff in order to strengthen its action within the general care hospital. What has been developed is a reflexive approach through supervision of somatic staff, in order to improve the efficiency of liaison psychiatry interventions with the caregivers in charge of patients. The kind of supervision we have developed is the result of a real partnership with somatic staff. Besides, in order to better understand the complexity of interactions between the two systems involved, the patient's and the caregivers', we use several theoretical references in an integrative manner. PSYCHOANALYTICAL REFERENCE: The psychoanalytical model allows us to better understand the dynamics between the supervisor and the supervised group in order to contain and give meaning to the affects arising in the supervision space. "Containing function" and "transitional phenomena" refer to the experience in which emotions can find a space where they can be taken in and processed in a secure and supportive manner. These concepts, along with that of the "psychic envelope", were initially developed to explain the psychological development of the baby in its early interactions with its mother or its surrogate. In the field of supervision, they allow us to be aware of these complex phenomena and the diverse qualities to which a supervisor needs to resort, such as attention, support and incentive, in order to offer a secure environment. SYSTEMIC REFERENCE: A new perspective of the patient's complexity is revealed by the group's dynamics. The supervisor's attention is mainly focused on the work of affects. However, these are often buried under a defensive shell, serving as a temporary protection, which prevents the caregiver from recognizing his or her own emotions, thereby enhancing the difficulties in the relationship with the patient. Whenever the work of putting emotions into words fail, we use "sculpting", a technique derived from the systemic model. Through the use of this type of analogical language, affects can emerge without constraint or feelings of danger. Through "playing" in that "transitional space", new exchanges appear between group members and allow new behaviors to be conceived. In practice, we ask the supervisee who is presenting a complex situation, to design a spatial representation of his or her understanding of the situation, through the display of characters significant to the situation: the patient, somatic staff members, relatives of the patient, etc. In silence, the supervisee shapes the characters into postures and arranges them in the room. Each sculpted character is identified, named, and positioned, with his or her gaze being set in a specific direction. Finally the sculptor shapes him or herself in his or her own role. When the sculpture is complete and after a few moments of fixation, we ask participants to express themselves about their experience. By means of this physical representation, participants to the sculpture discover perceptions and feelings that were unknown up to then. Hence from this analogical representation a reflection and hypotheses of understanding can arise and be developed within the group. CONCLUSION: Through the use of the concepts of "containing function" and "transitional space" we position ourselves in the scope of the encounter and the dialog. Through the use of the systemic technique of "sculpting" we promote the process of understanding, rather than that of explaining, which would place us in the position of experts. The experience of these encounters has shown us that what we need to focus on is indeed what happens in this transitional space in terms of dynamics and process. The encounter and the sharing of competencies both allow a new understanding of the situation at hand, which has, of course, to be verified in the reality of the patient-caregiver relationship. It is often a source of adjustment for interpersonal skills to recover its containing function in order to enable caregiver to better respond to the patient's needs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: The purpose of the present study was to challenge the hypothetical advantage of single port laparoscopy (SPL) over conventional laparoscopy by measuring prospectively the morbidity specifically related to conventional trocar sites (TS). METHODS: From November 2010 to December 2011, 300 patients undergoing various laparoscopic procedures were enrolled. Patient, surgery, and trocar characteristics were recorded. We evaluated at three time points (in-hospital and at 1 and 6 months postoperatively) specifically for each TS, pain (Visual Analog Scale), morbidity (infection, hematoma, hernia), and cosmesis (Patient Scar Assessment Score; PSAS). Patients designated their "worst TS," and a composite endpoint "bad TS" was defined to include any adverse outcome at a TS. RESULTS: We analyzed 1,074 TS. Follow-up was >90 %. Pain scores of >3/10 at 1 and 6 months postoperatively, were reported by 3 and 1 % of patients at the 5 mm TS and by 9 and 1 % at the larger TS, respectively (5 mm TS vs larger TS; p = 0.001). Pain was significantly lower for TS located in the lower abdomen than for the upper abdomen or the umbilicus (p = 0.001). The overall complication rate was <1 % and significantly lower for the 5 mm TS (hematoma p = 0.046; infection p = 0.0001). No hernia was found. The overall PSAS score was low and significantly lower for the 5 mm TS (p = 0.0001). Significant predictors of "bad TS" were larger TS (p = 0.001), umbilical position (p = 0.0001), emergency surgery (p = 0.0001), accidental trocar exit (p = 0.022), fascia closure (p = 0.006), and specimen extraction site (p = 0.0001). CONCLUSIONS: Specific trocar morbidity is low and almost negligible for 5 mm trocars. The umbilicus appears to be an unfavorable TS.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: To asses the clinical profile, treatment outcome and prognostic factors in primary breast lymphoma (PBL). METHODS: Between 1970 and 2000, 84 consecutive patients with PBL were treated in 20 institutions of the Rare Cancer Network. Forty-six patients had Ann Arbor stage IE, 33 stage IIE, 1 stage IIIE, 2 stage IVE and 2 an unknown stage. Twenty-one underwent a mastectomy, 39 conservative surgery and 23 biopsy; 51 received radiotherapy (RT) with (n = 37) or without (n = 14) chemotherapy. Median RT dose was 40 Gy (range 12-55 Gy). RESULTS: Ten (12%) patients progressed locally and 43 (55%) had a systemic relapse. Central nervous system (CNS) was the site of relapse in 12 (14%) cases. The 5-yr overall survival, lymphoma-specific survival, disease-free survival and local control rates were 53%, 59%, 41% and 87% respectively. In the univariate analyses, favorable prognostic factors were early stage, conservative surgery, RT administration and combined modality treatment. Multivariate analysis showed that early stage and the use of RT were favorable prognostic factors. CONCLUSION: The outcome of PBL is fair. Local control is excellent with RT or combined modality treatment but systemic relapses, including that in the CNS, occurs frequently.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Modern cancer therapies should strive not only to eliminate malignant tissues but also to preserve healthy tissues and the patient's quality of life. Antigen-specific immunotherapy approaches are promising for either aspect since they are designed to only act against tissues expressing 1 or more specified tumour antigens. In order to develop successful vaccine and adoptive transfer protocols, longitudinal monitoring of cancer patients taking part in clinical trials is mandatory. Here, in vivo expansion of antigen-specific cells, as well as their ex vivo functional status represent important parameters to be analysed. To obtain results that most closely reflect the cells' in vivo status, functional assays must be carried out with as little in vitro culturing as possible. The present minireview discusses recent advances in these domains.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

One target of protective immunity against the Plasmodium liver stage in BALB/c mice is represented by the circumsporozoite protein (CSP), and mainly involves its recognition by IFN-γ producing specific CD8+T-cells. In a previous in vitro study we showed that primary hepatocytes from BALB/c mice process Plasmodium berghei (Pb) CSP (PbCSP) and present CSP-derived peptides to specific H-2k(d) restricted CD8+T-cells with subsequent killing of the presenting cells. We now extend these observations to an in vivo infection model in which infected hepatocytes and antigen specific T-cell clones are transferred into recipient mice inducing protection from sporozoite (SPZ) challenge. In addition, using a similar protocol, we suggest the capacity of hepatocytes in priming of naïve T-cells to provide protection, as further confirmed by induction of protection after depletion of cross-presenting dendritic cells (DCs) by cytochrome c (cyt c) treatment or using traversal deficient parasites. Our results clearly show that hepatocytes present Plasmodium CSP to specific-primed CD8+T-cells, and could also prime naïve T-cells, leading to protection from infection. These results could contribute to a better understanding of liver stage immune response and design of malaria vaccines.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Motivation: Hormone pathway interactions are crucial in shaping plant development, such as synergism between the auxin and brassinosteroid pathways in cell elongation. Both hormone pathways have been characterized in detail, revealing several feedback loops. The complexity of this network, combined with a shortage of kinetic data, renders its quantitative analysis virtually impossible at present.Results: As a first step towards overcoming these obstacles, we analyzed the network using a Boolean logic approach to build models of auxin and brassinosteroid signaling, and their interaction. To compare these discrete dynamic models across conditions, we transformed them into qualitative continuous systems, which predict network component states more accurately and can accommodate kinetic data as they become available. To this end, we developed an extension for the SQUAD software, allowing semi-quantitative analysis of network states. Contrasting the developmental output depending on cell type-specific modulators enabled us to identify a most parsimonious model, which explains initially paradoxical mutant phenotypes and revealed a novel physiological feature.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: Regulatory T cells (Tregs) are key players in controlling the development of airway inflammation. However, their role in the mechanisms leading to tolerance in established allergic asthma is unclear. OBJECTIVE: To examine the role of Tregs in tolerance induction in a murine model of asthma. METHODS: Ovalbumin (OVA) sensitized asthmatic mice were depleted or not of CD25(+) T cells by anti-CD25 PC61 monoclonal antibody (mAb) before intranasal treatment (INT) with OVA, then challenged with OVA aerosol. To further evaluate the respective regulatory activity of CD4(+)CD25(+) and CD4(+)CD25(-) T cells, both T cell subsets were transferred from tolerized or non-tolerized animals to asthmatic recipients. Bronchoalveolar lavage fluid (BALF), T cell proliferation and cytokine secretion were examined. RESULTS: Intranasal treatment with OVA led to increased levels of IL-10, TGF-beta and IL-17 in lung homogenates, inhibition of eosinophil recruitment into the BALF and antigen specific T cell hyporesponsiveness. CD4(+)CD25(+)Foxp3(+) T cells were markedly upregulated in lungs and suppressed in vitro and in vivo OVA-specific T cell responses. Depletion of CD25(+) cells before OVA INT severely hampered tolerance induction as indicated by a strong recruitment of eosinophils into BALF and a vigorous T cell response to OVA upon challenge. However, the transfer of CD4(+)CD25(-) T cells not only suppressed antigen specific T cell responsiveness but also significantly reduced eosinophil recruitment as opposed to CD4(+)CD25(+) T cells. As compared with control mice, a significantly higher proportion of CD4(+)CD25(-) T cells from OVA treated mice expressed mTGF-beta. CONCLUSION: Both CD4(+)CD25(+) and CD4(+)CD25(-) T cells appear to be essential to tolerance induction. The relationship between both subsets and the mechanisms of their regulatory activity will have to be further analyzed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recombinant adeno-associated virus (rAAV) are effective gene delivery vehicles that can mediate long-lasting transgene expression. However, tight regulation and tissue-specific transgene expression is required for certain therapeutic applications. For regulatable expression from the liver we designed a hepatospecific bidirectional and autoregulatory tetracycline (Tet)-On system (Tet(bidir)Alb) flanked by AAV inverted terminal repeats (ITRs). We characterized the inducible hepatospecific system in comparison with an inducible ubiquitous expression system (Tet(bidir)CMV) using luciferase (luc). Although the ubiquitous system led to luc expression throughout the mouse, luc expression derived from the hepatospecific system was restricted to the liver. Interestingly, the induction rate of the Tet(bidir)Alb was significantly higher than that of Tet(bidir)CMV, whereas leakage of Tet(bidir)Alb was significantly lower. To evaluate the therapeutic potential of this vector, an AAV-Tet(bidir)-Alb-expressing interleukin-12 (IL-12) was tested in a murine model for hepatic colorectal metastasis. The vector induced dose-dependent levels of IL-12 and interferon-γ (IFN-γ), showing no significant toxicity. AAV-Tet(bidir)-Alb-IL-12 was highly efficient in preventing establishment of metastasis in the liver and induced an efficient T-cell memory response to tumor cells. Thus, we have demonstrated persistent, and inducible in vivo expression of a gene from a liver-specific Tet-On inducible construct delivered via an AAV vector and proved to be an efficient tool for treating liver cancer.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

OBJECTIVE: Assertive community treatment (ACT) failed to develop in Europe, and its efficacy is debated. In Lausanne, Switzerland, ACT focuses on difficult-to-engage patients and aims to facilitate linkage with outpatient care through time-limited interventions. This study aimed to evaluate the applicability and efficiency of time-limited ACT. METHODS: We retrospectively assessed social, clinical, and functional outcomes and motivation for treatment in 75 consecutively seen subjects treated between 2000 and 2002. RESULTS: With 70% of the interventions lasting less than 6 months, we observed significant improvement in most clinical and social problems, in collaboration, in motivation for treatment, and in social network support, despite high baseline levels of clinical and social problems. The number of hospitalizations decreased significantly. CONCLUSIONS: Time-limited ACT is a useful treatment for difficult-to-engage patients with severe clinical and social problems, and it facilitates linkage to care. This narrower target for ACT may facilitate its implementation in Europe.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mucosal immunity to the enteric pathogen Shigella flexneri is mediated by secretory IgA (S-IgA) antibodies directed against the O-antigen (O-Ag) side chain of lipopolysaccharide. While secretory antibodies against the O-Ag are known to prevent bacterial invasion of the intestinal epithelium, the mechanisms by which this occurs are not fully understood. In this study, we report that the binding of a murine monoclonal IgA (IgAC5) to the O-Ag of S. flexneri serotype 5a suppresses activity of the type 3 secretion (T3S) system, which is necessary for S. flexneri to gain entry into intestinal epithelial cells. IgAC5's effects on the T3S were rapid (5 to 15 min) and were coincident with a partial reduction in the bacterial membrane potential and a decrease in intracellular ATP levels. Activity of the T3S system returned to normal levels 45 to 90 min following antibody treatment, demonstrating that IgAC5's effects were transient. Nonetheless, these data suggest a model in which the association of IgA with the O-Ag of S. flexneri partially de-energizes the T3S system and temporarily renders the bacterium incapable of invading intestinal epithelial cells. IMPORTANCE: Secretory IgA (S-IgA) serves as the first line of defense against enteric infections. However, despite its well-recognized role in mucosal immunity, relatively little is known at the molecular level about how this class of antibody functions to prevent pathogenic bacteria from penetrating the epithelial barrier. It is generally assumed that S-IgA functions primarily by "immune exclusion," a phenomenon in which the antibody binds to microbial surface antigens and thereby promotes bacterial agglutination, entrapment in mucus, and physical clearance from the gastrointestinal tract via peristalsis. The results of the present study suggest that in addition to serving as a physical barrier, S-IgA may have a direct impact on the ability of microbial pathogens to secrete virulence factors required for invasion of intestinal epithelial cells.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The development of a protective immune response to microorganisms involves complex interactions between the host and the pathogen. The murine model of infection with Leishmania major (L. major) allows the study of the factors leading to the development of a protective immune response. Following infection with the protozoan parasite L. major, most strains of mice heal their lesions, while a few fail to control infection, both processes linked to the development of specific T helper subsets. The early events occurring during the first days following parasite inoculation are thought to be critical in the development of the Leishmania-specific immune response. Neutrophils are the first cells arriving massively to the site of infection, and recent evidence points to their role as organizers of the immune response, yet their specific role in this process remains elusive. Through interactions with cells present at the parasite inoculation site, and possibly within the draining lymph nodes, neutrophils could have an impact not only on the recruitment of inflammatory cells but also on the activation of local as well as newly migrated cells that will be crucial in shaping the Leishmania-specific immune response.