52 resultados para Escalonamento multidimensional


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Schizotypy is a multidimensional personality construct representing the extension of psychosis-like traits into the general population. Schizotypy has been associated with attenuated expressions of many of the same neuropsychological abnormalities as schizophrenia, including atypical pattern of functional hemispheric asymmetry. Unfortunately, the previous literature on links between schizotypy and hemispheric asymmetry is inconsistent with some research indicating that elevated schizotypy is associated with relative right over left hemisphere shifts, left over right hemisphere shifts, bilateral impairments, or with no hemispheric differences at all. This inconsistency may result from different methodologies, scales, and / or sex proportions between studies. In a within-participant design, we tested for the four possible links between laterality and schizotypy by comparing the relationship between two common self-report measures of multidimensional schizotypy (the O-LIFE questionnaire, and two Chapman scales, magical ideation and physical anhedonia) and performance in two computerized lateralised hemifield paradigms (lexical decision, chimeric face processing) in 80 men and 79 women. Results for the two scales and two tasks did not unequivocally support any of the four possible links. We discuss the possibilities that a link between schizotypy and laterality 1) exists, but is subtle, probably fluctuating, unable to be assessed by traditional methodologies used here; 2) does not exist, or 3) is indirect, mediated by other factors (e.g. stress-responsiveness, handedness, drug use) whose influences need further exploration.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: A multidimensional lifestyle intervention performed in 652 preschoolers (72% of migrant, 38% of low educational level (EL) parents) reduced body fat, but not BMI and improved fitness. The objective of this study is to examine whether the intervention was equally effective in children of migrant and/or low EL parents.¦METHODS: Cluster-randomized controlled single blinded trial, conducted in 2008/09 in 40 randomly selected preschools in Switzerland. The culturally tailored intervention consisted of a physical activity program and lessons on nutrition, media use and sleep. Primary outcomes included BMI and aerobic fitness. Secondary outcomes included %body fat, waist circumference and motor agility.¦RESULTS: Children of migrant parents benefitted similarly from the intervention compared to their counterparts (p for interaction≥ 0.09). However, children of low EL parents benefitted less, although these differences did not reach statistical significance (p for interaction≥ 0.06). Average intervention effect sizes for BMI were -0.10, -0.05, -0.11 and 0.04 kg/m(2) and for aerobic fitness were 0.55, 0.20, 0.37 and -0.05 stages for children of non-migrant, migrant, middle/high EL and low EL parents, respectively.¦CONCLUSIONS: This intervention was similarly effective among preschoolers of migrant parents compared to their counterparts, while children of low EL parents benefitted less.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Atopic dermatitis is the most frequent dermatosis in childhood. Numerous studies underscored the central role of skin barrier alterations in the pathogenesis of the inflammatory skin lesions. The management of atopic dermatitis has to be multidimensional. It combines among others some daily local care and a sporadic topical anti-inflammatory treatment during the acute flare-ups. The objective of this article is to summarize, in light of the recent European guidelines, the general principles of management of atopic dermatitis, for the general practitioner.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

PURPOSE: At 7 Tesla (T), conventional static field (B0 ) projection mapping techniques, e.g., FASTMAP, FASTESTMAP, lead to elevated specific absorption rates (SAR), requiring longer total acquisition times (TA). In this work, the series of adiabatic pulses needed for slab selection in FASTMAP is replaced by a single two-dimensional radiofrequency (2D-RF) pulse to minimize TA while ensuring equal shimming performance. METHODS: Spiral gradients and 2D-RF pulses were designed to excite thin slabs in the small tip angle regime. The corresponding selection profile was characterized in phantoms and in vivo. After optimization of the shimming protocol, the spectral linewidths obtained after 2D localized shimming were compared with conventional techniques and published values from (Emir et al NMR Biomed 2012;25:152-160) in six different brain regions. RESULTS: Results on healthy volunteers show no significant difference (P > 0.5) between the spectroscopic linewidths obtained with the adiabatic (TA = 4 min) and the new low-SAR and time-efficient FASTMAP sequence (TA = 42 s). The SAR can be reduced by three orders of magnitude and TA accelerated six times without impact on the shimming performances or quality of the resulting spectra. CONCLUSION: Multidimensional pulses can be used to minimize the RF energy and time spent for automated shimming using projection mapping at high field. Magn Reson Med, 2014. © 2014 Wiley Periodicals, Inc.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: The Beck Cognitive Insight Scale (BCIS) evaluates patients' self-report of their ability to detect and correct misinterpretation. Our study aims to confirm the factor structure and the convergent validity of the original scale in a French-speaking environment. METHOD: Outpatients (n = 158) suffering from schizophrenia or schizoaffective disorders fulfilled the BCIS. The 51 patients in Montpellier were equally assessed with the Positive and Negative Syndrome Scale (PANSS) by a psychiatrist who was blind of the BCIS scores. RESULTS: The fit indices of the confirmatory factor analysis validated the 2-factor solution reported by the developers of the scale with inpatients, and in another study with middle-aged and older outpatients. The BCIS composite index was significantly negatively correlated with the clinical insight item of the PANSS. CONCLUSIONS: The French translation of the BCIS appears to have acceptable psychometric properties and gives additional support to the scale, as well as cross-cultural validity for its use with outpatients suffering from schizophrenia or schizoaffective disorders. The correlation between clinical and composite index of cognitive insight underlines the multidimensional nature of clinical insight. Cognitive insight does not recover clinical insight but is a potential target for developing psychological treatments that will improve clinical insight.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis examines the interplay between state regulation and the way organisations define performance. Performance is generally understood to be a multidimensional concept, but the extent to which its different facets are shaped by regulation remains an understudied question. This thesis aims to address this question and provide at least a partial answer to it. To do so, it examines whether the level of regulation amplifies or abates the multidimensionality of regulated entities' performance definition, i.e. the way they define the concept of performance. The leading question is whether an organisation's performance definition can be associated with the regulatory intensity its environment confronts it with. Moreover, the study explores whether the type of ownership-public or private-plays a role in regard to how a regulated entity defines performance. In order to undertake this investigation, the thesis focuses on the performance definitions of organisations in six different sport betting and lottery regulations. Qualitative data is gathered from primary and secondary documents as well as through semi-structured interviews with chief executive officers (CEO), members of executive management and gambling experts in each of these countries. The thesis concludes that the performance definitions of the organisations under study are indeed multidimensional, as well as clearly influenced by their respective regulatory environments. However, not all performance dimensions identified in the literature are present, nor can they all be estimated to be part of the performance definition. In addition, the public-private difference in defining performance-as conceptualised in the literature- seems to be abated in a regulated environment. The central role played by regulation in regard to the multidimensionality of the performance definition partially outweighs the effect of the nature of ownership.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Axée dans un premier temps sur le formalisme et les méthodes, cette thèse est construite sur trois concepts formalisés: une table de contingence, une matrice de dissimilarités euclidiennes et une matrice d'échange. À partir de ces derniers, plusieurs méthodes d'Analyse des données ou d'apprentissage automatique sont exprimées et développées: l'analyse factorielle des correspondances (AFC), vue comme un cas particulier du multidimensional scaling; la classification supervisée, ou non, combinée aux transformations de Schoenberg; et les indices d'autocorrélation et d'autocorrélation croisée, adaptés à des analyses multivariées et permettant de considérer diverses familles de voisinages. Ces méthodes débouchent dans un second temps sur une pratique de l'analyse exploratoire de différentes données textuelles et musicales. Pour les données textuelles, on s'intéresse à la classification automatique en types de discours de propositions énoncées, en se basant sur les catégories morphosyntaxiques (CMS) qu'elles contiennent. Bien que le lien statistique entre les CMS et les types de discours soit confirmé, les résultats de la classification obtenus avec la méthode K- means, combinée à une transformation de Schoenberg, ainsi qu'avec une variante floue de l'algorithme K-means, sont plus difficiles à interpréter. On traite aussi de la classification supervisée multi-étiquette en actes de dialogue de tours de parole, en se basant à nouveau sur les CMS qu'ils contiennent, mais aussi sur les lemmes et le sens des verbes. Les résultats obtenus par l'intermédiaire de l'analyse discriminante combinée à une transformation de Schoenberg sont prometteurs. Finalement, on examine l'autocorrélation textuelle, sous l'angle des similarités entre diverses positions d'un texte, pensé comme une séquence d'unités. En particulier, le phénomène d'alternance de la longueur des mots dans un texte est observé pour des voisinages d'empan variable. On étudie aussi les similarités en fonction de l'apparition, ou non, de certaines parties du discours, ainsi que les similarités sémantiques des diverses positions d'un texte. Concernant les données musicales, on propose une représentation d'une partition musicale sous forme d'une table de contingence. On commence par utiliser l'AFC et l'indice d'autocorrélation pour découvrir les structures existant dans chaque partition. Ensuite, on opère le même type d'approche sur les différentes voix d'une partition, grâce à l'analyse des correspondances multiples, dans une variante floue, et à l'indice d'autocorrélation croisée. Qu'il s'agisse de la partition complète ou des différentes voix qu'elle contient, des structures répétées sont effectivement détectées, à condition qu'elles ne soient pas transposées. Finalement, on propose de classer automatiquement vingt partitions de quatre compositeurs différents, chacune représentée par une table de contingence, par l'intermédiaire d'un indice mesurant la similarité de deux configurations. Les résultats ainsi obtenus permettent de regrouper avec succès la plupart des oeuvres selon leur compositeur.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is estimated that around 230 people die each year due to radon (222Rn) exposure in Switzerland. 222Rn occurs mainly in closed environments like buildings and originates primarily from the subjacent ground. Therefore it depends strongly on geology and shows substantial regional variations. Correct identification of these regional variations would lead to substantial reduction of 222Rn exposure of the population based on appropriate construction of new and mitigation of already existing buildings. Prediction of indoor 222Rn concentrations (IRC) and identification of 222Rn prone areas is however difficult since IRC depend on a variety of different variables like building characteristics, meteorology, geology and anthropogenic factors. The present work aims at the development of predictive models and the understanding of IRC in Switzerland, taking into account a maximum of information in order to minimize the prediction uncertainty. The predictive maps will be used as a decision-support tool for 222Rn risk management. The construction of these models is based on different data-driven statistical methods, in combination with geographical information systems (GIS). In a first phase we performed univariate analysis of IRC for different variables, namely the detector type, building category, foundation, year of construction, the average outdoor temperature during measurement, altitude and lithology. All variables showed significant associations to IRC. Buildings constructed after 1900 showed significantly lower IRC compared to earlier constructions. We observed a further drop of IRC after 1970. In addition to that, we found an association of IRC with altitude. With regard to lithology, we observed the lowest IRC in sedimentary rocks (excluding carbonates) and sediments and the highest IRC in the Jura carbonates and igneous rock. The IRC data was systematically analyzed for potential bias due to spatially unbalanced sampling of measurements. In order to facilitate the modeling and the interpretation of the influence of geology on IRC, we developed an algorithm based on k-medoids clustering which permits to define coherent geological classes in terms of IRC. We performed a soil gas 222Rn concentration (SRC) measurement campaign in order to determine the predictive power of SRC with respect to IRC. We found that the use of SRC is limited for IRC prediction. The second part of the project was dedicated to predictive mapping of IRC using models which take into account the multidimensionality of the process of 222Rn entry into buildings. We used kernel regression and ensemble regression tree for this purpose. We could explain up to 33% of the variance of the log transformed IRC all over Switzerland. This is a good performance compared to former attempts of IRC modeling in Switzerland. As predictor variables we considered geographical coordinates, altitude, outdoor temperature, building type, foundation, year of construction and detector type. Ensemble regression trees like random forests allow to determine the role of each IRC predictor in a multidimensional setting. We found spatial information like geology, altitude and coordinates to have stronger influences on IRC than building related variables like foundation type, building type and year of construction. Based on kernel estimation we developed an approach to determine the local probability of IRC to exceed 300 Bq/m3. In addition to that we developed a confidence index in order to provide an estimate of uncertainty of the map. All methods allow an easy creation of tailor-made maps for different building characteristics. Our work is an essential step towards a 222Rn risk assessment which accounts at the same time for different architectural situations as well as geological and geographical conditions. For the communication of 222Rn hazard to the population we recommend to make use of the probability map based on kernel estimation. The communication of 222Rn hazard could for example be implemented via a web interface where the users specify the characteristics and coordinates of their home in order to obtain the probability to be above a given IRC with a corresponding index of confidence. Taking into account the health effects of 222Rn, our results have the potential to substantially improve the estimation of the effective dose from 222Rn delivered to the Swiss population.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Due to the advances in sensor networks and remote sensing technologies, the acquisition and storage rates of meteorological and climatological data increases every day and ask for novel and efficient processing algorithms. A fundamental problem of data analysis and modeling is the spatial prediction of meteorological variables in complex orography, which serves among others to extended climatological analyses, for the assimilation of data into numerical weather prediction models, for preparing inputs to hydrological models and for real time monitoring and short-term forecasting of weather.In this thesis, a new framework for spatial estimation is proposed by taking advantage of a class of algorithms emerging from the statistical learning theory. Nonparametric kernel-based methods for nonlinear data classification, regression and target detection, known as support vector machines (SVM), are adapted for mapping of meteorological variables in complex orography.With the advent of high resolution digital elevation models, the field of spatial prediction met new horizons. In fact, by exploiting image processing tools along with physical heuristics, an incredible number of terrain features which account for the topographic conditions at multiple spatial scales can be extracted. Such features are highly relevant for the mapping of meteorological variables because they control a considerable part of the spatial variability of meteorological fields in the complex Alpine orography. For instance, patterns of orographic rainfall, wind speed and cold air pools are known to be correlated with particular terrain forms, e.g. convex/concave surfaces and upwind sides of mountain slopes.Kernel-based methods are employed to learn the nonlinear statistical dependence which links the multidimensional space of geographical and topographic explanatory variables to the variable of interest, that is the wind speed as measured at the weather stations or the occurrence of orographic rainfall patterns as extracted from sequences of radar images. Compared to low dimensional models integrating only the geographical coordinates, the proposed framework opens a way to regionalize meteorological variables which are multidimensional in nature and rarely show spatial auto-correlation in the original space making the use of classical geostatistics tangled.The challenges which are explored during the thesis are manifolds. First, the complexity of models is optimized to impose appropriate smoothness properties and reduce the impact of noisy measurements. Secondly, a multiple kernel extension of SVM is considered to select the multiscale features which explain most of the spatial variability of wind speed. Then, SVM target detection methods are implemented to describe the orographic conditions which cause persistent and stationary rainfall patterns. Finally, the optimal splitting of the data is studied to estimate realistic performances and confidence intervals characterizing the uncertainty of predictions.The resulting maps of average wind speeds find applications within renewable resources assessment and opens a route to decrease the temporal scale of analysis to meet hydrological requirements. Furthermore, the maps depicting the susceptibility to orographic rainfall enhancement can be used to improve current radar-based quantitative precipitation estimation and forecasting systems and to generate stochastic ensembles of precipitation fields conditioned upon the orography.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1. The ecological niche is a fundamental biological concept. Modelling species' niches is central to numerous ecological applications, including predicting species invasions, identifying reservoirs for disease, nature reserve design and forecasting the effects of anthropogenic and natural climate change on species' ranges. 2. A computational analogue of Hutchinson's ecological niche concept (the multidimensional hyperspace of species' environmental requirements) is the support of the distribution of environments in which the species persist. Recently developed machine-learning algorithms can estimate the support of such high-dimensional distributions. We show how support vector machines can be used to map ecological niches using only observations of species presence to train distribution models for 106 species of woody plants and trees in a montane environment using up to nine environmental covariates. 3. We compared the accuracy of three methods that differ in their approaches to reducing model complexity. We tested models with independent observations of both species presence and species absence. We found that the simplest procedure, which uses all available variables and no pre-processing to reduce correlation, was best overall. Ecological niche models based on support vector machines are theoretically superior to models that rely on simulating pseudo-absence data and are comparable in empirical tests. 4. Synthesis and applications. Accurate species distribution models are crucial for effective environmental planning, management and conservation, and for unravelling the role of the environment in human health and welfare. Models based on distribution estimation rather than classification overcome theoretical and practical obstacles that pervade species distribution modelling. In particular, ecological niche models based on machine-learning algorithms for estimating the support of a statistical distribution provide a promising new approach to identifying species' potential distributions and to project changes in these distributions as a result of climate change, land use and landscape alteration.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction. Adherence to medication for asymptomatic disease is often low. We assessed factors associated with good adherence to medication for high blood pressure (HBP) in a country of the African region. Methods. A population-based survey of adults aged 25-64 years (N=1240 and participation rate=73%). Information was available in knowledge attitude and practice, SES and other variables. One question assessed adherence. Good adherence to treatment was defined as answering "I forget very rarely" vs "I forget on 1-2 days in a week" or "I forget on 3 or more days in a week". Results. In a univariate model adherence was strongly associated with belief that hypertension is a long-term disease (OR 2.6, p<0.001) and was negatively associated with concomitant use of traditional medicine (OR 0.36, p<0.005). The following variables tended to be associated with good adherence for HBP treatment: age, SES, BMI, belief that HBP is not symptomatic, going to government's clinics, medium stress level, controlled hypertension, taking statins. The following variables were not associated with good adherence for HBP treatment: education, higher BP, knowing people who had a stroke/MI, suffering from another chronic condition. In a multivariate model, pseudo R2 was 0.14. Conclusion. We built a multidimensional model including a wide range of variable. This model only predicted 14% of adherence variability. Variables associated with good adherence were demographics or related to knowledge attitude and practice. The latter one is modifiable by different type of interventions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose a multivariate approach to the study of geographic species distribution which does not require absence data. Building on Hutchinson's concept of the ecological niche, this factor analysis compares, in the multidimensional space of ecological variables, the distribution of the localities where the focal species was observed to a reference set describing the whole study area. The first factor extracted maximizes the marginality of the focal species, defined as the ecological distance between the species optimum and the mean habitat within the reference area. The other factors maximize the specialization of this focal species, defined as the ratio of the ecological variance in mean habitat to that observed for the focal species. Eigenvectors and eigenvalues are readily interpreted and can be used to build habitat-suitability maps. This approach is recommended in Situations where absence data are not available (many data banks), unreliable (most cryptic or rare species), or meaningless (invaders). We provide an illustration and validation of the method for the alpine ibex, a species reintroduced in Switzerland which presumably has not yet recolonized its entire range.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Issue ownership means that some parties are considered by the public at large as being more able to deal with, or more attentive to, certain issues. The theory has been used to explain both party behaviour - parties are expected to focus on owned issues - and voter behaviour - when a voter considers a party to own an issue, this affects the odds of voting for that party. The purpose of this article is, first, to provide a look backward at the existing research through a literature review of the studies that were conducted in the past decade-and-a-half. Secondly, it takes stock of the current conceptualisation and argues that issue ownership is a multidimensional concept. Thereafter the article discusses how this multidimensionality affects both the role of issue ownership in voter and in party behaviour. Finally, the article outlines a number of shortcomings of the extant literature and discusses potential avenues for future research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Glioblastoma (GBM) is the most common and most aggressive malignant primary brain tumour. Despite the aggressiveness of the applied therapy, the prognosis remains poor with a median survival to of about 15 months. It is important to identify new candidate genes that could have clinical application in this disease. Previous gene expression studies from human GBM samples in our laboratory, revealed Ubiquitin Specific Peptidase 15 (USP15) as a gene with low expression, significantly associated with genomic deletions of the chromosomal region encompassing the USP15 locus. USP15 belongs to the ubiquitin-specific protease (USPs) family of which the main role is the reversion of ubiquitination and thereby stabilization of substrates. Previously, USP15 has been suggested to have a tumour suppressor function via its substrates APC and Caspase 3. We established GBM cell lines that stably express USP15 wt or its catalytic mutant. USP15 expression impairs cell growth by inhibiting cell cycle progression. On the other hand USP15 depletion in GBM cell lines induces cell cycle progression and proliferation. In order to identify the molecular pathways in which USP15 is implicated we aimed to identify protein-binding partners in the GBM cell line LN-229 by Mass spectrometry. As a result we identified eight new proteins that interact with USP15. These proteins are involved in important cellular processes like cytokinesis, cell cycle, cellular migration, and apoptosis. Three of these protein interactions were confirmed by co-immunoprecipitation in four GBM cell lines LN-229, LN428, LN18, LN-Z308. One of the binding proteins is HECTD1 E3 ligase of which the murine homologue promotes the APC-Axin interaction to negatively regulate the Wnt pathway. USP15 can de-ubiquitinate HECTD1 in the LN229 cell line while its depletion led to decrease of HECTD1 in GBM cell lines suggesting stabilizing role for USP15. Moreover, HECTD1 stable expression in LN229 inhibits cell cycle, while its depletion induces cell cycle progression. These results suggest that the USP15-HECTD1 interaction might enhance the antiproliferative effect of HECTD1 in GBM cell lines. Using the TOPflash/FOPflash luciferase system we showed that HECTD1 and USP15 overexpression can attenuate WNT pathway activity, and decrease the Axin2 expression. These data indicate that this new protein interaction of USP15 with HECTD1 results in negative regulation of the WNT pathway in GBM cell lines. Further investigation of the regulation of this interaction or of the protein binding network of HECTD1 in GBM may allow the discovery of new therapeutic targets. Finally PTPIP51 and KIF15 are the other two identified protein partners of USP15. These two proteins are involved in cell proliferation and their depletion in LN-229 cell line led to induction of cell cycle progression. USP15 displays a stabilizing role for them. Hence, these results show that the tumour suppressive role of USP15 in GBM cell line via different molecular mechanisms indicating the multidimensional function of USP15. Résumé Le glioblastome (GBM) est la tumeur primaire la plus fréquente et la plus agressive du cervau caractérisée par une survie médiane d'environ à 15 mois. De précédant travaux effectués au sein de notre laboratoire portant sur l'étude de l'expression de gènes pour des échantillons humains de GBM ont montré que le gène Ubiquitin Specific Peptidase 15 (USP1S) était significativement associée à une délétion locales à 25% des cas. Initialement, les substrats protéiques APC et CaspaseS de USP15 ont conduit à considérer cette protéine comme un suppresseur de tumeur. USP15 appartient à la famille protèsse spécifique de l'ubiquitine (USPs) dont le rôle principal est la réversion de l'ubiquitination et la stabilisation de substrats. Par conséquent, nous avons établi des lignées de cellules de glioblastome qui expriment de manière stable USP15 ou bien son mutant catalytique. Ainsi, nous avons ainsi démontré que l'expression de l'USP15 empêche la croissance cellulaire en inhibant la progression du cycle cellulaire. Inversement, la suppression de l'expression du gène USP15 dans les lignées cellulaires de glioblastome induit la progression du cycle cellulaire et la prolifération. Afin d'identifier les voies moléculaires dans lesquelles sont impliquées USP15, nous avons cherché à identifier les partenaires de liaisons protéiques par spectrométrie de masse dans la lignée cellulaire LN-229. Ainsi, huit nouvelles protéines interagissant avec USP15 ont été identifiées dont la ligase E3 HECTD1. L'homologue murin de Hectdl favorise l'interaction APC-Axin en régulant négativement la voie de signalisation de Wnt. USP15 interagit en désubiquitinant HECTD1 dans la lignée cellulaire LN-229 et provoque ainsi l'atténuation de l'activité de cette voie de signalisation. En conclusion, HECTD1, en interagissant avec USP15, joue un rôle de suppresseur de tumeur dans les lignées cellulaire de GBM.