23 resultados para Contract lenght
Resumo:
SummaryCancer stem cells (CSC) are poorly differentiated, slowly proliferating cells, with high tumorigenic potential. Some of these cells, as it has been shown in leukemia, evade chemo- and radiotherapy and recapitulate the tumor composed of CSC and their highly proliferative progeny. Therefore, understanding the molecular biology of those cells is crucial for improvement of currently used anti-cancer therapies.This work is composed of two CSC-related projects. The first deals with CD44, a frequently used marker of CSC; the second involves Imp2 and its role in CSC bioenergetics. PART 1. CD44 is a multifunctional transmembrane protein involved in migration, homing, adhesion, proliferation and survival. It is overexpressed in many cancers and its levels are correlated with poor prognosis. CD44 is also highly expressed by CSC and in many malignancies it is used for CSC isolation.In the present work full-lenght CD44 nuclear localization was studied, including the mechanism of nuclear translocation and its functional role in the nucleus. Full-length CD44 can be found in nuclei of various cell types, regardless of their tumorigenic potential. For nuclear localization, CD44 needs to be first inserted into the cell membrane, from which it is transported via the endocytic pathway. Upon binding to transportinl it is translocated to the nucleus. The nuclear localization signal recognized by transportinl has been determined as the first 20 amino acids of the membrane proximal intracellular domain. Nuclear export of CD44 is facilitated by exportin Crml. Investigation of the function of nuclear CD44 revealed its implication in de novo RNA synthesis.PART 2. Glioblastoma multiforme is the most aggressive and most frequent brain malignancy. It was one of the first solid tumors from which CSC have been isolated. Based on the similarity between GBM CSC and normal stem cells expression of an oncofetal mRNA binding protein Imp2 has been investigated.Imp2 is absent in normal brain as well as in low grade gliomas, but is expressed in over 75% GBM cases and its expression is higher in CSC compared to their more differentiated counterparts. Analysis of mRNA transcripts bound by Imp2 and its protein interactors revealed that in GBM CSC Imp2 may be implicated in mitochondrial metabolism. Indeed, shRNA mediated silencing of protein expression led to decreased mitochondrial activity, decreased oxygen consumption and decreased activity of respiratory chain protein complex I. Moreover, lack of Imp2 severely affected self-renewal and tumorigenicity of GBM CSC. Experimental evidence suggest that GBM CSC depend on mitochondrial oxidative phosphorylation as an energy producing pathway and that Imp2 is a novel regulator of this pathway.RésuméLes cellules cancéreuses souches sont des cellules peu différentiées, à proliferation lente et hautement tumorigénique. Ces cellules sont radio-chimio résistantes et sont capable reformer la tumeur dans sont intégralité, reproduisant l'hétérogénéité cellulaire présent dans la tumeur d'origine. Pour améliorer les therapies antitumorales actuelles il est crucial de comprendre les mécanismes moléculaires qui caractérisent cette sous-population de cellules hautement malignes.Ce travail de thèse se compose de deux projets s'articulant autour du même axe :Le CD44 est une protéine multifonctionnelle et transmembranaire très souvent utilisée comme marqueur de cellules souches tumorales dans différents cancers. Elle est impliquée dans la migration, l'adhésion, la prolifération et la survie des cellules. Lors de ce travail de recherche, nous nous sommes intéressés à la localisation cellulaire du CD44, ainsi qu'aux mécanismes permettant sa translocation nucléaire. En effet, bien que principalement décrit comme un récepteur de surface transmembranaire, le CD44 sous sa forme entière, non clivée en peptides, peut également être observé à l'intérieur du noyau de diverses cellules, quel que soit leur potentiel tumorigénique. Pour passer ainsi d'un compartiment cellulaire à un autre, le CD44 doit d'abord être inséré dans la membrane plasmique, d'où il est transporté par endocytose jusqu'à l'intérieur du cytoplasme. La transportai permet ensuite la translocation nucléaire du CD44 via une « séquence signal » contenue dans les 20 acides aminés du domaine cytoplasmique qui bordent la membrane. A l'inverse, le CD44 est exporté du noyau grâce à l'exportin Crml. En plus des mécanismes décrits ci-dessus, cette étude a également mis en évidence l'implication du CD44 dans la synthèse des ARN, d'où sa présence dans le noyau.Le glioblastome est la plus maligne et la plus fréquente des tumeurs cérébrales. Dans ce second projet de recherche, le rôle de IMP2 dans les cellules souches tumorales de glioblastomes a été étudié. La présence de cette protéine oncofoetale a d'abord été mise en évidence dans 75% des cas les plus agressifs des gliomes (grade IV, appelés glioblastomes), tandis qu'elle n'est pas exprimée dans les grades I à III de ces tumeurs, ni dans le cerveau sain. De plus, IMP2 est apparue comme étant davantage exprimée dans les cellules souches tumorales que dans les cellules déjà différenciées. La baisse de l'expression de IMP2 au moyen de shRNA a résulté en une diminution de l'activité mitochondriale, en une réduction de la consommation d'oxygène ainsi qu'en une baisse de l'activité du complexe respiratoire I.L'inhibition de IMP2 a également affecté la capacité de renouvellement de la population des cellules souches tumorales ainsi que leur aptitude à former des tumeurs.Lors de ce travail de thèse, une nouvelle fonction d'un marqueur de cellules souches tumorales a été mise en évidence, ainsi qu'un lien important entre la bioénergétique de ces cellules et l'expression d'une protéine oncofoetale.
Resumo:
OBJECTIVE: To study a new technic of laser treatment of macular holes. METHODS: 21 eyes with stage II-IV macular hole were treated with Argon-green laser. Pigment epithelium in the area of the hole was whitened with spots of 100-200 microns, 100-300 mW. We expected this treatment to create a cellular proliferation that could close and contract the hole. Follow-up after treatment ranged from 3 to 24 months (mean: 9.3 months). RESULTS: Within one month after treatment, the macular hole was closed in 7 eyes (33%) and partially closed in 5 eyes (24%). The visual acuity increased from 1 to 5 lignes (ETDRS chart) in 9 eyes (43%), it remained the same in 9 eyes (43%) and decreased from 1 to 2 lignes in 3 eyes (14%). CONCLUSION: Laser treatment of macular holes seems to be effective and could be proposed as an alternative to the patients who cannot be operated on by vitrectomy and gas tamponade.
Resumo:
When deciding to resort to a PPP contract for the provision of a local public service, local governments have to consider the demand risk allocation between the contracting parties. In this article, I investigate the effects of demand risk allocation on the accountability of procuring authorities regarding consumers changing demand, as well as on the cost-reducing effort incentives of the private public-service provider. I show that contracts in which the private provider bears demand risk motivate more the public authority from responding to customer needs. This is due to the fact that consumers are empowered when the private provider bears demand risk, that is, they have the possibility to oust the private provider in case of non-satisfaction with the service provision, which provides procuring authorities with more credibility in side-trading and then more incentives to be responsive. As a consequence, I show that there is a lower matching with consumers' preferences over time when demand risk is on the public authority rather than on the private provider, and this is corroborated in the light of two famous case studies. However, contracts in which the private provider does not bear demand risk motivate more the private provider from investing in cost-reducing efforts. I highlight then a tradeoff in the allocation of demand risk between productive and allocative efficiency. The striking policy implication of this article for local governments would be that the current trend towards a greater resort to contracts where private providers bear little or no demand risk may not be optimal. Local governments should impose demand risk on private providers within PPP contracts when they expect that consumers' preferences over the service provision will change over time.
Resumo:
The motivation for this research initiated from the abrupt rise and fall of minicomputers which were initially used both for industrial automation and business applications due to their significantly lower cost than their predecessors, the mainframes. Later industrial automation developed its own vertically integrated hardware and software to address the application needs of uninterrupted operations, real-time control and resilience to harsh environmental conditions. This has led to the creation of an independent industry, namely industrial automation used in PLC, DCS, SCADA and robot control systems. This industry employs today over 200'000 people in a profitable slow clockspeed context in contrast to the two mainstream computing industries of information technology (IT) focused on business applications and telecommunications focused on communications networks and hand-held devices. Already in 1990s it was foreseen that IT and communication would merge into one Information and communication industry (ICT). The fundamental question of the thesis is: Could industrial automation leverage a common technology platform with the newly formed ICT industry? Computer systems dominated by complex instruction set computers (CISC) were challenged during 1990s with higher performance reduced instruction set computers (RISC). RISC started to evolve parallel to the constant advancement of Moore's law. These developments created the high performance and low energy consumption System-on-Chip architecture (SoC). Unlike to the CISC processors RISC processor architecture is a separate industry from the RISC chip manufacturing industry. It also has several hardware independent software platforms consisting of integrated operating system, development environment, user interface and application market which enables customers to have more choices due to hardware independent real time capable software applications. An architecture disruption merged and the smartphone and tablet market were formed with new rules and new key players in the ICT industry. Today there are more RISC computer systems running Linux (or other Unix variants) than any other computer system. The astonishing rise of SoC based technologies and related software platforms in smartphones created in unit terms the largest installed base ever seen in the history of computers and is now being further extended by tablets. An underlying additional element of this transition is the increasing role of open source technologies both in software and hardware. This has driven the microprocessor based personal computer industry with few dominating closed operating system platforms into a steep decline. A significant factor in this process has been the separation of processor architecture and processor chip production and operating systems and application development platforms merger into integrated software platforms with proprietary application markets. Furthermore the pay-by-click marketing has changed the way applications development is compensated: Three essays on major trends in a slow clockspeed industry: The case of industrial automation 2014 freeware, ad based or licensed - all at a lower price and used by a wider customer base than ever before. Moreover, the concept of software maintenance contract is very remote in the app world. However, as a slow clockspeed industry, industrial automation has remained intact during the disruptions based on SoC and related software platforms in the ICT industries. Industrial automation incumbents continue to supply systems based on vertically integrated systems consisting of proprietary software and proprietary mainly microprocessor based hardware. They enjoy admirable profitability levels on a very narrow customer base due to strong technology-enabled customer lock-in and customers' high risk leverage as their production is dependent on fault-free operation of the industrial automation systems. When will this balance of power be disrupted? The thesis suggests how industrial automation could join the mainstream ICT industry and create an information, communication and automation (ICAT) industry. Lately the Internet of Things (loT) and weightless networks, a new standard leveraging frequency channels earlier occupied by TV broadcasting, have gradually started to change the rigid world of Machine to Machine (M2M) interaction. It is foreseeable that enough momentum will be created that the industrial automation market will in due course face an architecture disruption empowered by these new trends. This thesis examines the current state of industrial automation subject to the competition between the incumbents firstly through a research on cost competitiveness efforts in captive outsourcing of engineering, research and development and secondly researching process re- engineering in the case of complex system global software support. Thirdly we investigate the industry actors', namely customers, incumbents and newcomers, views on the future direction of industrial automation and conclude with our assessments of the possible routes industrial automation could advance taking into account the looming rise of the Internet of Things (loT) and weightless networks. Industrial automation is an industry dominated by a handful of global players each of them focusing on maintaining their own proprietary solutions. The rise of de facto standards like IBM PC, Unix and Linux and SoC leveraged by IBM, Compaq, Dell, HP, ARM, Apple, Google, Samsung and others have created new markets of personal computers, smartphone and tablets and will eventually also impact industrial automation through game changing commoditization and related control point and business model changes. This trend will inevitably continue, but the transition to a commoditized industrial automation will not happen in the near future.
Resumo:
In this thesis, I develop analytical models to price the value of supply chain investments under demand uncer¬tainty. This thesis includes three self-contained papers. In the first paper, we investigate the value of lead-time reduction under the risk of sudden and abnormal changes in demand forecasts. We first consider the risk of a complete and permanent loss of demand. We then provide a more general jump-diffusion model, where we add a compound Poisson process to a constant-volatility demand process to explore the impact of sudden changes in demand forecasts on the value of lead-time reduction. We use an Edgeworth series expansion to divide the lead-time cost into that arising from constant instantaneous volatility, and that arising from the risk of jumps. We show that the value of lead-time reduction increases substantially in the intensity and/or the magnitude of jumps. In the second paper, we analyze the value of quantity flexibility in the presence of supply-chain dis- intermediation problems. We use the multiplicative martingale model and the "contracts as reference points" theory to capture both positive and negative effects of quantity flexibility for the downstream level in a supply chain. We show that lead-time reduction reduces both supply-chain disintermediation problems and supply- demand mismatches. We furthermore analyze the impact of the supplier's cost structure on the profitability of quantity-flexibility contracts. When the supplier's initial investment cost is relatively low, supply-chain disin¬termediation risk becomes less important, and hence the contract becomes more profitable for the retailer. We also find that the supply-chain efficiency increases substantially with the supplier's ability to disintermediate the chain when the initial investment cost is relatively high. In the third paper, we investigate the value of dual sourcing for the products with heavy-tailed demand distributions. We apply extreme-value theory and analyze the effects of tail heaviness of demand distribution on the optimal dual-sourcing strategy. We find that the effects of tail heaviness depend on the characteristics of demand and profit parameters. When both the profit margin of the product and the cost differential between the suppliers are relatively high, it is optimal to buffer the mismatch risk by increasing both the inventory level and the responsive capacity as demand uncertainty increases. In that case, however, both the optimal inventory level and the optimal responsive capacity decrease as the tail of demand becomes heavier. When the profit margin of the product is relatively high, and the cost differential between the suppliers is relatively low, it is optimal to buffer the mismatch risk by increasing the responsive capacity and reducing the inventory level as the demand uncertainty increases. In that case, how¬ever, it is optimal to buffer with more inventory and less capacity as the tail of demand becomes heavier. We also show that the optimal responsive capacity is higher for the products with heavier tails when the fill rate is extremely high.
Resumo:
General Introduction These three chapters, while fairly independent from each other, study economic situations in incomplete contract settings. They are the product of both the academic freedom my advisors granted me, and in this sense reflect my personal interests, and of their interested feedback. The content of each chapter can be summarized as follows: Chapter 1: Inefficient durable-goods monopolies In this chapter we study the efficiency of an infinite-horizon durable-goods monopoly model with a fmite number of buyers. We find that, while all pure-strategy Markov Perfect Equilibria (MPE) are efficient, there also exist previously unstudied inefficient MPE where high valuation buyers randomize their purchase decision while trying to benefit from low prices which are offered once a critical mass has purchased. Real time delay, an unusual monopoly distortion, is the result of this attrition behavior. We conclude that neither technological constraints nor concern for reputation are necessary to explain inefficiency in monopolized durable-goods markets. Chapter 2: Downstream mergers and producer's capacity choice: why bake a larger pie when getting a smaller slice? In this chapter we study the effect of downstream horizontal mergers on the upstream producer's capacity choice. Contrary to conventional wisdom, we find anon-monotonic relationship: horizontal mergers induce a higher upstream capacity if the cost of capacity is low, and a lower upstream capacity if this cost is high. We explain this result by decomposing the total effect into two competing effects: a change in hold-up and a change in bargaining erosion. Chapter 3: Contract bargaining with multiple agents In this chapter we study a bargaining game between a principal and N agents when the utility of each agent depends on all agents' trades with the principal. We show, using the Potential, that equilibria payoffs coincide with the Shapley value of the underlying coalitional game with an appropriately defined characteristic function, which under common assumptions coincides with the principal's equilibrium profit in the offer game. Since the problem accounts for differences in information and agents' conjectures, the outcome can be either efficient (e.g. public contracting) or inefficient (e.g. passive beliefs).
Resumo:
What determines the share of public employment, at a given size of the State, in countries of similar levels of economic development? While the theoretical and empirical literature on this issue has mostly considered technical dimensions (efficiency and political considerations), this paper emphasizes the role of culture and quantifies it. We build a representative database for contracting choices of municipalities in Switzerland and exploit the discontinuity at the Swiss language border at identical actual set of policies and institutions to analyze the causal e↵ect of culture on the choice of how public services are provided. We find that French-speaking border municipalities are 50% less likely to contract with the private sector than their German-speaking adjacent municipalities. Technical dimensions are much smaller by comparison. This result points out that culture is a source of a potential bias that distorts the optimal choice for public service delivery. Systematic differences in the level of confidence in public administration and private companies potentially explain this discrepancy in private sector participation in public services provision.
Resumo:
Aujourd'hui encore, en Suisse, nous pouvons recenser chaque année pas moins de 600 nouveaux diagnostics de VIH (virus de l'immunodéficience humaine) [1]. Selon les définitions de l'ONUSIDA, l'épidémie du VIH en Suisse est dite concentrée [2] ; c'est-à-dire que la prévalence de l'infection au sein de la population générale est faible (0.4%), alors qu'elle touche plus fortement les groupes cibles, que sont les hommes ayant des rapports sexuels avec d'autres hommes (HSH), les consommateurs de drogues par voie intraveineuse (IDU) et les migrants en provenance de pays à haute prévalence (PHP). Il est donc primordial que l'épidémie du VIH soit surveillée et évaluée. La recherche sur le VIH ainsi que l'évaluation de son épidémie sont menées par plusieurs organismes, dont l'Etude suisse de cohorte VIH (SHCS), qui collecte avant tout des données cliniques sur le sujet. Une des tâches de cette surveillance est de pouvoir définir les groupes à risque accru d'exposition au VIH, afin qu'ils puissent bénéficier des mesures de prévention et de dépistage adéquates permettant de ralentir la propagation dudit virus [1]. En 2007, le « Clinics and Laboratories Committee » de la SHCS décide d'intégrer de nouvelles questions ciblant les circonstances de l'infection par le VIH aux formulaires adressés aux patients nouvellement inclus dans l'étude (cf annexe 1). Quatre questions sont alors sélectionnées pour explorer ce sujet : - Selon le médecin, quelle est la source probablement responsable de l'infection ? - Est-ce que le patient connaît une ou plusieurs sources potentielles de son infection ? - Est-ce que le patient connaît la période durant laquelle il a contracté le virus ? - Selon lui, où l'infection a-t-elle vraisemblablement eu lieu ?