129 resultados para TWO-PHASE PARTITION
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
OBJECTIVE: This pilot experimental study tested the feasibility and intended effect of an educational intervention for parents to help them assist their adolescent child with chronic illness (CI) in becoming autonomous. METHODS: A two-phase pre-post pilot intervention study targeting parents of adolescents with CI was conducted. Parents were allocated to group 1 and 2 and received the four-module intervention consecutively. Intended effect was measured through online questionnaires for parents and adolescents before, at 2 months after, and at 4-6 months after the intervention. Feasibility was assessed through an evaluation questionnaire for parents. RESULTS: The most useful considered modules concerned the future of the adolescent and parents and social life. The most valued aspect was to exchange with other parents going through similar problems and receiving a new outlook on their relationship with their child. For parents, improvement trends appeared for shared management, parent protection, and self-efficacy, and worsening trends appeared for coping skills, parental perception of child vulnerability, and parental stress. For adolescents, improvement trends appeared for self-efficacy and parental bonding and worsening trends appeared for shared management and coping skills. CONCLUSION: Parents could benefit from peer-to-peer support and education as they support the needed autonomy development of their child. Future studies should test an online platform for parents to find peer support at all times and places.
Resumo:
BACKGROUND: Autologous blood transfusion (ABT) efficiently increases sport performance and is the most challenging doping method to detect. Current methods for detecting this practice center on the plasticizer di(2-ethlyhexyl) phthalate (DEHP), which enters the stored blood from blood bags. Quantification of this plasticizer and its metabolites in urine can detect the transfusion of autologous blood stored in these bags. However, DEHP-free blood bags are available on the market, including n-butyryl-tri-(n-hexyl)-citrate (BTHC) blood bags. Athletes may shift to using such bags to avoid the detection of urinary DEHP metabolites. STUDY DESIGN AND METHODS: A clinical randomized double-blinded two-phase study was conducted of healthy male volunteers who underwent ABT using DEHP-containing or BTHC blood bags. All subjects received a saline injection for the control phase and a blood donation followed by ABT 36 days later. Kinetic excretion of five urinary DEHP metabolites was quantified with liquid chromatography coupled with tandem mass spectrometry. RESULTS: Surprisingly, considerable levels of urinary DEHP metabolites were observed up to 1 day after blood transfusion with BTHC blood bags. The long-term metabolites mono-(2-ethyl-5-carboxypentyl) phthalate and mono-(2-carboxymethylhexyl) phthalate were the most sensitive biomarkers to detect ABT with BTHC blood bags. Levels of DEHP were high in BTHC bags (6.6%), the tubing in the transfusion kit (25.2%), and the white blood cell filter (22.3%). CONCLUSIONS: The BTHC bag contained DEHP, despite being labeled DEHP-free. Urinary DEHP metabolite measurement is a cost-effective way to detect ABT in the antidoping field even when BTHC bags are used for blood storage.
Resumo:
BACKGROUND: Gemcitabine, oxaliplatin and 5-fluorouracil (5-FU) are active in biliary tract cancer and have a potentially synergistic mode of action and non-overlapping toxicity. The objective of these trials was to determine response, survival and toxicity separately in patients with bile duct cancer (BDC) and gallbladder cancer (GBC) treated with gemcitabine/oxaliplatin/5-FU chemotherapy. METHODS: Eligible patients with histologically proven, advanced or metastatic BDC (n=37) or GBC (n=35) were treated with gemcitabine (900 mg m(-2) over 30 min), oxaliplatin (65 mg m(-2)) and 5-FU (1500 mg m(-2) over 24 h) on days 1 and 8 of a 21-day cycle. Tumour response was the primary outcome measure. RESULTS: Response rates were 19% (95% CI: 6-32%) and 23% (95% CI: 9-37%) for BDC and GBC, respectively. Median survivals were 10.0 months (95% CI: 8.6-12.4) and 9.9 months (95% CI: 7.5-12.2) for BDC and GBC, respectively, and 1- and 2-year survival rates were 40 and 23% in BDC and 34 and 6% in GBC (intention-to-treat analysis). Major grade III and IV adverse events were neutropenia, thrombocytopenia, elevated bilirubin and anorexia. CONCLUSION: Triple-drug chemotherapy achieves comparable results for response and survival to previously reported regimens, but with more toxicity.
Resumo:
Escherichia coli adapts its lifestyle to the variations of environmental growth conditions, swapping between swimming motility or biofilm formation. The stationary-phase sigma factor RpoS is an important regulator of this switch, since it stimulates adhesion and represses flagellar biosynthesis. By measuring the dynamics of gene expression, we show that RpoS inhibits the transcription of the flagellar sigma factor, FliA, in exponential growth phase. RpoS also partially controls the expression of CsgD and CpxR, two transcription factors important for bacterial adhesion. We demonstrate that these two regulators repress the transcription of fliA, flgM, and tar and that this regulation is dependent on the growth medium. CsgD binds to the flgM and fliA promoters around their -10 promoter element, strongly suggesting direct repression. We show that CsgD and CpxR also affect the expression of other known modulators of cell motility. We propose an updated structure of the regulatory network controlling the choice between adhesion and motility.
Resumo:
BACKGROUND: Pathological complete response (pCR) following chemotherapy is strongly associated with both breast cancer subtype and long-term survival. Within a phase III neoadjuvant chemotherapy trial, we sought to determine whether the prognostic implications of pCR, TP53 status and treatment arm (taxane versus non-taxane) differed between intrinsic subtypes. PATIENTS AND METHODS: Patients were randomized to receive either six cycles of anthracycline-based chemotherapy or three cycles of docetaxel then three cycles of eprirubicin/docetaxel (T-ET). pCR was defined as no evidence of residual invasive cancer (or very few scattered tumour cells) in primary tumour and lymph nodes. We used a simplified intrinsic subtypes classification, as suggested by the 2011 St Gallen consensus. Interactions between pCR, TP53 status, treatment arm and intrinsic subtype on event-free survival (EFS), distant metastasis-free survival (DMFS) and overall survival (OS) were studied using a landmark and a two-step approach multivariate analyses. RESULTS: Sufficient data for pCR analyses were available in 1212 (65%) of 1856 patients randomized. pCR occurred in 222 of 1212 (18%) patients: 37 of 496 (7.5%) luminal A, 22 of 147 (15%) luminal B/HER2 negative, 51 of 230 (22%) luminal B/HER2 positive, 43 of 118 (36%) HER2 positive/non-luminal, 69 of 221(31%) triple negative (TN). The prognostic effect of pCR on EFS did not differ between subtypes and was an independent predictor for better EFS [hazard ratio (HR) = 0.40, P < 0.001 in favour of pCR], DMFS (HR = 0.32, P < 0.001) and OS (HR = 0.32, P < 0.001). Chemotherapy arm was an independent predictor only for EFS (HR = 0.73, P = 0.004 in favour of T-ET). The interaction between TP53, intrinsic subtypes and survival outcomes only approached statistical significance for EFS (P = 0.1). CONCLUSIONS: pCR is an independent predictor of favourable clinical outcomes in all molecular subtypes in a two-step multivariate analysis. CLINICALTRIALSGOV: EORTC 10994/BIG 1-00 Trial registration number NCT00017095.
Resumo:
BACKGROUND: Survival outcomes for patients with glioblastoma remain poor, particularly for patients with unmethylated O(6)-methylguanine-DNA methyltransferase (MGMT) gene promoter. This phase II, randomized, open-label, multicenter trial investigated the efficacy and safety of 2 dose regimens of the selective integrin inhibitor cilengitide combined with standard chemoradiotherapy in patients with newly diagnosed glioblastoma and an unmethylated MGMT promoter. METHODS: Overall, 265 patients were randomized (1:1:1) to standard cilengitide (2000 mg 2×/wk; n = 88), intensive cilengitide (2000 mg 5×/wk during wk 1-6, thereafter 2×/wk; n = 88), or a control arm (chemoradiotherapy alone; n = 89). Cilengitide was administered intravenously in combination with daily temozolomide (TMZ) and concomitant radiotherapy (RT; wk 1-6), followed by TMZ maintenance therapy (TMZ/RT→TMZ). The primary endpoint was overall survival; secondary endpoints included progression-free survival, pharmacokinetics, and safety and tolerability. RESULTS: Median overall survival was 16.3 months in the standard cilengitide arm (hazard ratio [HR], 0.686; 95% CI: 0.484, 0.972; P = .032) and 14.5 months in the intensive cilengitide arm (HR, 0.858; 95% CI: 0.612, 1.204; P = .3771) versus 13.4 months in the control arm. Median progression-free survival assessed per independent review committee was 5.6 months (HR, 0.822; 95% CI: 0.595, 1.134) and 5.9 months (HR, 0.794; 95% CI: 0.575, 1.096) in the standard and intensive cilengitide arms, respectively, versus 4.1 months in the control arm. Cilengitide was well tolerated. CONCLUSIONS: Standard and intensive cilengitide dose regimens were well tolerated in combination with TMZ/RT→TMZ. Inconsistent overall survival and progression-free survival outcomes and a limited sample size did not allow firm conclusions regarding clinical efficacy in this exploratory phase II study.
Resumo:
Synchronization of data coming from different sources is of high importance in biomechanics to ensure reliable analyses. This synchronization can either be performed through hardware to obtain perfect matching of data, or post-processed digitally. Hardware synchronization can be achieved using trigger cables connecting different devices in many situations; however, this is often impractical, and sometimes impossible in outdoors situations. The aim of this paper is to describe a wireless system for outdoor use, allowing synchronization of different types of - potentially embedded and moving - devices. In this system, each synchronization device is composed of: (i) a GPS receiver (used as time reference), (ii) a radio transmitter, and (iii) a microcontroller. These components are used to provide synchronized trigger signals at the desired frequency to the measurement device connected. The synchronization devices communicate wirelessly, are very lightweight, battery-operated and thus very easy to set up. They are adaptable to every measurement device equipped with either trigger input or recording channel. The accuracy of the system was validated using an oscilloscope. The mean synchronization error was found to be 0.39 μs and pulses are generated with an accuracy of <2 μs. The system provides synchronization accuracy about two orders of magnitude better than commonly used post-processing methods, and does not suffer from any drift in trigger generation.
Resumo:
OBJECTIVE: Tuberculosis (TB) is highly prevalent among HIV-infected people, including those receiving combination antiretroviral therapy (cART), necessitating a well tolerated and efficacious TB vaccine for these populations. We evaluated the safety and immunogenicity of the candidate TB vaccine M72/AS01 in adults with well controlled HIV infection on cART. DESIGN: A randomized, observer-blind, controlled trial (NCT00707967). METHODS: HIV-infected adults on cART in Switzerland were randomized 3 : 1 : 1 to receive two doses, 1 month apart, of M72/AS01, AS01 or 0.9% physiological saline (N = 22, N = 8 and N = 7, respectively) and were followed up to 6 months postdose 2 (D210). Individuals with CD4⁺ cell counts below 200 cells/μl were excluded. Adverse events (AEs) including HIV-specific and laboratory safety parameters were recorded. Cell-mediated (ICS) and humoral (ELISA) responses were evaluated before vaccination, 1 month after each dose (D30, D60) and D210. RESULTS: Thirty-seven individuals [interquartile range (IQR) CD4⁺ cell counts at screening: 438-872 cells/μl; undetectable HIV-1 viremia] were enrolled; 73% of individuals reported previous BCG vaccination, 97.3% tested negative for the QuantiFERON-TB assay. For M72/AS01 recipients, no vaccine-related serious AEs or cART-regimen adjustments were recorded, and there were no clinically relevant effects on laboratory safety parameters, HIV-1 viral loads or CD4⁺ cell counts. M72/AS01 was immunogenic, inducing persistent and polyfunctional M72-specific CD4⁺ T-cell responses [medians 0.70% (IQR 0.37-1.07) at D60] and 0.42% (0.24-0.61) at D210, predominantly CD40L⁺IL-2⁺TNF-α⁺, CD40L⁺IL-2⁺ and CD40L⁺IL-2⁺TNF-α⁺IFN-γ⁺]. All M72/AS01 vaccines were seropositive for anti-M72 IgG after second vaccination until study end. CONCLUSION: M72/AS01 was clinically well tolerated and immunogenic in this population, supporting further clinical evaluation in HIV-infected individuals in TB-endemic settings.
Resumo:
Introduction: We previously reported the results of a phase II study for patients with newly diagnosed primary CNS lymphoma (PCNSL) treated with autologous peripheral blood stem-cell transplantation (aPBSCT) and responseadapted whole brain radiotherapy (WBRT). The purpose of this report is to update the initial results and provide long-term data regarding overall survival, prognostic factors, and the risk of treatment-related neurotoxicity.Methods: A long-term follow-up was conducted on surviving primary central nervous system lymphoma patients having been treated according to the ,,OSHO-53 study", which was initiated by the Ostdeutsche Studiengruppe Hamatologie-Onkologie. Between August 1999 and October 2004 twentythree patients with an average age of 55 and median Karnofsky performance score of 70% were enrolled and received high-dose mthotrexate (HD-MTX) on days 1 and 10. In case of at least a partial remission (PR), high-dose busulfan/ thiotepa (HD-BuTT) followed by aPBSCT was performed. Patients without response to induction or without complete remission (CR) after HD-BuTT received WBRT. All patients (n=8), who are alive in 2011, were contacted and Mini Mental State examination (MMSE) and the EORTC QLQ-C30 were performed.Results: Eight patients are still alive with a median follow-up of 116,9 months (79 - 141, range). One of them suffered from a late relapse eight and a half years after initial diagnosis of PCNSL, another one suffers from a gall bladder carcinoma. Both patients are alive, the one with the relapse of PCNSL has finished rescue therapy and is further observed, the one with gall baldder carcinoma is still under therapy. MMSE and QlQ-C30 showed impressive results in the patients, who were not irradiated. Only one of the irradiated patients is still alive with a clear neurologic deficit but acceptable quality of life.Conclusions: Long-term follow-up of our patients, who were included in the OSHO-53 study show an overall survival of 30 percent. If WBRT can be avoided no long-term neurotoxicity has been observed and the patients benefit from excellent Quality of Life. Induction chemotherapy with two cycles of HD-MTX should be intensified to improve the unsatisfactory OAS of 30 percent.
Resumo:
BACKGROUND: The aim of this study was to evaluate the efficacy and tolerability of fulvestrant, an estrogen receptor antagonist, in postmenopausal women with hormone-responsive tumors progressing after aromatase inhibitor (AI) treatment. PATIENTS AND METHODS: This is a phase II, open, multicenter, noncomparative study. Two patient groups were prospectively considered: group A (n=70) with AI-responsive disease and group B (n=20) with AI-resistant disease. Fulvestrant 250 mg was administered as intramuscular injection every 28 (+/-3) days. RESULTS: All patients were pretreated with AI and 84% also with tamoxifen or toremifene; 67% had bone metastases and 45% liver metastases. Fulvestrant administration was well tolerated and yielded a clinical benefit (CB; defined as objective response or stable disease [SD] for >or=24 weeks) in 28% (90% confidence interval [CI] 19% to 39%) of patients in group A and 37% (90% CI 19% to 58%) of patients in group B. Median time to progression (TTP) was 3.6 (95% CI 3.0 to 4.8) months in group A and 3.4 (95% CI 2.5 to 6.7) months in group B. CONCLUSIONS: Overall, 30% of patients who had progressed following prior AI treatment gained CB with fulvestrant, thereby delaying indication to start chemotherapy. Prior response to an AI did not appear to be predictive for benefit with fulvestrant.
Resumo:
BACKGROUND: Immunotherapy offers a promising novel approach for the treatment of cancer and both adoptive T-cell transfer and immune modulation lead to regression of advanced melanoma. However, the potential synergy between these two strategies remains unclear. METHODS: We investigated in 12 patients with advanced stage IV melanoma the effect of multiple MART-1 analog peptide vaccinations with (n = 6) or without (n = 6) IMP321 (LAG-3Ig fusion protein) as an adjuvant in combination with lymphodepleting chemotherapy and adoptive transfer of autologous PBMCs at day (D) 0 (Trial registration No: NCT00324623). All patients were selected on the basis of ex vivo detectable MART-1-specific CD8 T-cell responses and immunized at D0, 8, 15, 22, 28, 52, and 74 post-reinfusion. RESULTS: After immunization, a significant expansion of MART-1-specific CD8 T cells was measured in 83% (n = 5/6) and 17% (n = 1/6) of patients from the IMP321 and control groups, respectively (P < 0.02). Compared to the control group, the mean fold increase of MART-1-specific CD8 T cells in the IMP321 group was respectively >2-, >4- and >6-fold higher at D15, D30 and D60 (P < 0.02). Long-lasting MART-1-specific CD8 T-cell responses were significantly associated with IMP321 (P < 0.02). At the peak of the response, MART-1-specific CD8 T cells contained higher proportions of effector (CCR7⁻ CD45RA⁺/⁻) cells in the IMP321 group (P < 0.02) and showed no sign of exhaustion (i.e. were mostly PD1⁻CD160⁻TIM3⁻LAG3⁻2B4⁺/⁻). Moreover, IMP321 was associated with a significantly reduced expansion of regulatory T cells (P < 0.04); consistently, we observed a negative correlation between the relative expansion of MART-1-specific CD8 T cells and of regulatory T cells. Finally, although there were no confirmed responses as per RECIST criteria, a transient, 30-day partial response was observed in a patient from the IMP321 group. CONCLUSIONS: Vaccination with IMP321 as an adjuvant in combination with lymphodepleting chemotherapy and adoptive transfer of autologous PBMCs induced more robust and durable cellular antitumor immune responses, supporting further development of IMP321 as an adjuvant for future immunotherapeutic strategies.
Resumo:
This study introduces a novel approach for automatic temporal phase detection and inter-arm coordination estimation in front-crawl swimming using inertial measurement units (IMUs). We examined the validity of our method by comparison against a video-based system. Three waterproofed IMUs (composed of 3D accelerometer, 3D gyroscope) were placed on both forearms and the sacrum of the swimmer. We used two underwater video cameras in side and frontal views as our reference system. Two independent operators performed the video analysis. To test our methodology, seven well-trained swimmers performed three 300 m trials in a 50 m indoor pool. Each trial was in a different coordination mode quantified by the index of coordination. We detected different phases of the arm stroke by employing orientation estimation techniques and a new adaptive change detection algorithm on inertial signals. The difference of 0.2 +/- 3.9% between our estimation and video-based system in assessment of the index of coordination was comparable to experienced operators' difference (1.1 +/- 3.6%). The 95% limits of agreement of the difference between the two systems in estimation of the temporal phases were always less than 7.9% of the cycle duration. The inertial system offers an automatic easy-to-use system with timely feedback for the study of swimming.
Resumo:
Background: Previous studies reported an increase of mean platelet volume (MPV) in patients with acute ischemic stroke. However, its correlation with stroke severity has not been investigated. Moreover, studies on the association of MPV with functional outcome yielded inconsistent results. Methods: We included all consecutive ischemic stroke patients admitted to CHUV (Centre Hospitalier Universitaire Vaudois) Neurology Service within 24 h after stroke onset who had MPV measured on admission. The association of MPV with stroke severity (NIHSS score at admission and at 24 h) and outcome (Rankin Scale score at 3 and 12 months) was analyzed in univariate analysis. The chi(2) test was performed to compare the frequency of minor strokes (NIHSS score </=4) and good functional outcome (Rankin Scale score </=2) across MPV quartiles. The ANOVA test was used to compare MPV between stroke subtypes according to the TOAST classification. Student's two-tailed unpaired t test was performed to compare MPV between lacunar and nonlacunar strokes. MPV was generated at admission by the Sysmex XE-2100 automated cell counter (Sysmex Corporation, Kobe, Japan) from EDTA blood samples. Results: There was no significant difference in the frequency of minor strokes (p = 0.46) and good functional outcome (p = 0.06) across MPV quartiles. MPV was not associated with stroke severity or outcome in univariate analysis. There was no significant difference in MPV between stroke subtypes according to the TOAST classification (p = 0.173) or between lacunar and nonlacunar strokes (10.50 +/- 0.91 vs. 10.40 +/- 0.81 fl, p = 0.322). Conclusions: MPV, assessed within 24 h after ischemic stroke onset, is not associated with stroke severity or functional outcome.
Resumo:
Summary: Lipophilicity plays an important role in the determination and the comprehension of the pharmacokinetic behavior of drugs. It is usually expressed by the partition coefficient (log P) in the n-octanol/water system. The use of an additional solvent system (1,2-dichlorethane/water) is necessary to obtain complementary information, as the log Poct values alone are not sufficient to explain ail biological properties. The aim of this thesis is to develop tools allowing to predict lipophilicity of new drugs and to analyze the information yielded by those log P values. Part I presents the development of theoretical models used to predict lipophilicity. Chapter 2 shows the necessity to extend the existing solvatochromic analyses in order to predict correctly the lipophilicity of new and complex neutral compounds. In Chapter 3, solvatochromic analyses are used to develop a model for the prediction of the lipophilicity of ions. A global model was obtained allowing to estimate the lipophilicity of neutral, anionic and cationic solutes. Part II presents the detailed study of two physicochemical filters. Chapter 4 shows that the Discovery RP Amide C16 stationary phase allows to estimate lipophilicity of the neutral form of basic and acidic solutes, except of lipophilic acidic solutes. Those solutes present additional interactions with this particular stationary phase. In Chapter 5, 4 different IANI stationary phases are investigated. For neutral solutes, linear data are obtained whatever the IANI column used. For the ionized solutes, their retention is due to a balance of electrostatic and hydrophobie interactions. Thus no discrimination is observed between different series of solutes bearing the same charge, from one column to an other. Part III presents two examples illustrating the information obtained thanks to Structure-Properties Relationships (SPR). Comparing graphically lipophilicity values obtained in two different solvent systems allows to reveal the presence of intramolecular effects .such as internai H-bond (Chapter 6). SPR is used to study the partitioning of ionizable groups encountered in Medicinal Chemistry (Chapter7). Résumé La lipophilie joue un .rôle important dans la détermination et la compréhension du comportement pharmacocinétique des médicaments. Elle est généralement exprimée par le coefficient de partage (log P) d'un composé dans le système de solvants n-octanol/eau. L'utilisation d'un deuxième système de solvants (1,2-dichloroéthane/eau) s'est avérée nécessaire afin d'obtenir des informations complémentaires, les valeurs de log Poct seules n'étant pas suffisantes pour expliquer toutes les propriétés biologiques. Le but de cette thèse est de développer des outils permettant de prédire la lipophilie de nouveaux candidats médicaments et d'analyser l'information fournie par les valeurs de log P. La Partie I présente le développement de modèles théoriques utilisés pour prédire la lipophilie. Le chapitre 2 montre la nécessité de mettre à jour les analyses solvatochromiques existantes mais inadaptées à la prédiction de la lipophilie de nouveaux composés neutres. Dans le chapitre 3, la même méthodologie des analyses solvatochromiques est utilisée pour développer un modèle permettant de prédire la lipophilie des ions. Le modèle global obtenu permet la prédiction de la lipophilie de composés neutres, anioniques et cationiques. La Partie II présente l'étude approfondie de deux filtres physicochimiques. Le Chapitre 4 montre que la phase stationnaire Discovery RP Amide C16 permet la détermination de la lipophilie de la forme neutre de composés basiques et acides, à l'exception des acides très lipophiles. Ces derniers présentent des interactions supplémentaires avec cette phase stationnaire. Dans le Chapitre 5, 4 phases stationnaires IAM sont étudiées. Pour les composés neutres étudiés, des valeurs de rétention linéaires sont obtenues, quelque que soit la colonne IAM utilisée. Pour les composés ionisables, leur rétention est due à une balance entre des interactions électrostatiques et hydrophobes. Donc aucune discrimination n'est observée entre les différentes séries de composés portant la même charge d'une colonne à l'autre. La Partie III présente deux exemples illustrant les informations obtenues par l'utilisation des relations structures-propriétés. Comparer graphiquement la lipophilie mesurée dans deux différents systèmes de solvants permet de mettre en évidence la présence d'effets intramoléculaires tels que les liaisons hydrogène intramoléculaires (Chapitre 6). Cette approche des relations structures-propriétés est aussi appliquée à l'étude du partage de fonctions ionisables rencontrées en Chimie Thérapeutique (Chapitre 7) Résumé large public Pour exercer son effet thérapeutique, un médicament doit atteindre son site d'action en quantité suffisante. La quantité effective de médicament atteignant le site d'action dépend du nombre d'interactions entre le médicament et de nombreux constituants de l'organisme comme, par exemple, les enzymes du métabolisme ou les membranes biologiques. Le passage du médicament à travers ces membranes, appelé perméation, est un paramètre important à optimiser pour développer des médicaments plus puissants. La lipophilie joue un rôle clé dans la compréhension de la perméation passive des médicaments. La lipophilie est généralement exprimée par le coefficient de partage (log P) dans le système de solvants (non miscibles) n-octanol/eau. Les valeurs de log Poct seules se sont avérées insuffisantes pour expliquer la perméation à travers toutes les différentes membranes biologiques du corps humain. L'utilisation d'un système de solvants additionnel (le système 1,2-dichloroéthane/eau) a permis d'obtenir les informations complémentaires indispensables à une bonne compréhension du processus de perméation. Un grand nombre d'outils expérimentaux et théoriques sont à disposition pour étudier la lipophilie. Ce travail de thèse se focalise principalement sur le développement ou l'amélioration de certains de ces outils pour permettre leur application à un champ plus large de composés. Voici une brève description de deux de ces outils: 1)La factorisation de la lipophilie en fonction de certaines propriétés structurelles (telle que le volume) propres aux composés permet de développer des modèles théoriques utilisables pour la prédiction de la lipophilie de nouveaux composés ou médicaments. Cette approche est appliquée à l'analyse de la lipophilie de composés neutres ainsi qu'à la lipophilie de composés chargés. 2)La chromatographie liquide à haute pression sur phase inverse (RP-HPLC) est une méthode couramment utilisée pour la détermination expérimentale des valeurs de log Poct.