46 resultados para yield to maturity


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Serum-free aggregating brain cell cultures are free-floating three-dimensional primary cell cultures able to reconstitute spontaneously a histotypic brain architecture to reproduce critical steps of brain development and to reach a high level of structural and functional maturity. This culture system offers, therefore, a unique model for neurotoxicity testing both during the development and at advanced cellular differentiation, and the high number of aggregates available combined with the excellent reproducibility of the cultures facilitates routine test procedures. This chapter presents a detailed description of the preparation, maintenance, and use of these cultures for neurotoxicity studies and a comparison of the developmental characteristics between cultures derived from the telencephalon and cultures derived from the whole brain. For culture preparation, mechanically dissociated embryonic brain tissue is used. The initial cell suspension, composed of neural stem cells, neural progenitor cells, immature postmitotic neurons, glioblasts, and microglial cells, is kept in a serum-free, chemically defined medium under continuous gyratory agitation. Spherical aggregates form spontaneously and are maintained in suspension culture for several weeks. Within the aggregates, the cells rearrange and mature, reproducing critical morphogenic events, such as migration, proliferation, differentiation, synaptogenesis, and myelination. For experimentation, replicate cultures are prepared by the randomization of aggregates from several original flasks. The high yield and reproducibility of the cultures enable multiparametric endpoint analyses, including "omics" approaches.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Where and when cells divide are fundamental questions. In rod-shaped fission yeast cells, the DYRK-family kinase Pom1 is organized in concentration gradients from cell poles and controls cell division timing and positioning. Pom1 gradients restrict to mid-cell the SAD-like kinase Cdr2, which recruits Mid1/Anillin for medial division. Pom1 also delays mitotic commitment through Cdr2, which inhibits Wee1. Here, we describe quantitatively the distributions of cortical Pom1 and Cdr2. These reveal low profile overlap contrasting with previous whole-cell measurements and Cdr2 levels increase with cell elongation, raising the possibility that Pom1 regulates mitotic commitment by controlling Cdr2 medial levels. However, we show that distinct thresholds of Pom1 activity define the timing and positioning of division. Three conditions-a separation-of-function Pom1 allele, partial downregulation of Pom1 activity, and haploinsufficiency in diploid cells-yield cells that divide early, similar to pom1 deletion, but medially, like wild-type cells. In these cells, Cdr2 is localized correctly at mid-cell. Further, Cdr2 overexpression promotes precocious mitosis only in absence of Pom1. Thus, Pom1 inhibits Cdr2 for mitotic commitment independently of regulating its localization or cortical levels. Indeed, we show Pom1 restricts Cdr2 activity through phosphorylation of a C-terminal self-inhibitory tail. In summary, our results demonstrate that distinct levels in Pom1 gradients delineate a medial Cdr2 domain, for cell division placement, and control its activity, for mitotic commitment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Antisense oligonucleotides (ODNs) specific for VEGFR-2-(17 MER) and inhibiting HUVEC proliferation in-vitro were screened. One efficient sequence was selected and incorporated in different types of nanoemulsions the potential toxicity of which was evaluated on HUVEC and ARPE19 cells. Our results showed that below 10 microl/ml, a 2.5% mid-chain triglycerides cationic DOTAP nanoemulsion was non-toxic on HUVEC and retinal cells. This formulation was therefore chosen for further experiments. In-vitro transfection of FITC ODNs in ARPE cells using DOTAP nanoemulsions showed that nanodroplets do penetrate into the cells. Furthermore, ODNs are released from the nanoemulsion after 48 h and accumulate into the cell nuclei. In both ex-vivo and in-vivo ODN stability experiments in rabbit vitreous, it was noted that the nanoemulsion protected at least partially the ODN from degradation over 72 h. The kinetic results of fluorescent ODN (Hex) distribution in DOTAP nanoemulsion following intravitreal injection in the rat showed that the nanoemulsion penetrates all retinal cells. Pharmacokinetic and ocular tissue distribution of radioactive ODN following intravitreal injection in rabbits showed that the DOTAP nanoemulsion apparently enhanced the intraretinal penetration of the ODNs up to the inner nuclear layer (INL) and might yield potential therapeutic levels of ODN in the retina over 72 h post injection.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Many research projects in life sciences require purified biologically active recombinant protein. In addition, different formats of a given protein may be needed at different steps of experimental studies. Thus, the number of protein variants to be expressed and purified in short periods of time can expand very quickly. We have therefore developed a rapid and flexible expression system based on described episomal vector replication to generate semi-stable cell pools that secrete recombinant proteins. We cultured these pools in serum-containing medium to avoid time-consuming adaptation of cells to serum-free conditions, maintain cell viability and reuse the cultures for multiple rounds of protein production. As such, an efficient single step affinity process to purify recombinant proteins from serum-containing medium was optimized. Furthermore, a series of multi-cistronic vectors were designed to enable simultaneous expression of proteins and their biotinylation in vivo as well as fast selection of protein-expressing cell pools. Combining these improved procedures and innovative steps, exemplified with seven cytokines and cytokine receptors, we were able to produce biologically active recombinant endotoxin free protein at the milligram scale in 4-6weeks from molecular cloning to protein purification.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: Stem cells and their niches are studied in many systems, but mammalian germ stem cells (GSC) and their niches are still poorly understood. In rat testis, spermatogonia and undifferentiated Sertoli cells proliferate before puberty, but at puberty most spermatogonia enter spermatogenesis, and Sertoli cells differentiate to support this program. Thus, pre-pubertal spermatogonia might possess GSC potential and pre-pubertal Sertoli cells niche functions. We hypothesized that the different stem cell pools at pre-puberty and maturity provide a model for the identification of stem cell and niche-specific genes. We compared the transcript profiles of spermatogonia and Sertoli cells from pre-pubertal and pubertal rats and examined how these related to genes expressed in testicular cancers, which might originate from inappropriate communication between GSCs and Sertoli cells. Results: The pre-pubertal spermatogonia-specific gene set comprised known stem cell and spermatogonial stem cell (SSC) markers. Similarly, the pre-pubertal Sertoli cell-specific gene set comprised known niche gene transcripts. A large fraction of these specifically enriched transcripts encoded trans-membrane, extra-cellular, and secreted proteins highlighting stem cell to niche communication. Comparing selective gene sets established in this study with published gene expression data of testicular cancers and their stroma, we identified sets expressed genes shared between testicular tumors and pre-pubertal spermatogonia, and tumor stroma and pre-pubertal Sertoli cells with statistic significance. Conclusions: Our data suggest that SSC and their niche specifically express complementary factors for cell communication and that the same factors might be implicated in the communication between tumor cells and their micro-enviroment in testicular cancer.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Critical reading and careful interpretation of results of the medical literature is a difficult task for primary care physicians. Being aware of common potential pitfalls that may bias results of a study is helpful. Among common pitfalls, odds ratios are often interpreted as relative risks, which overestimate the impact of a risk factor. Randomized controlled trials assessing the effectiveness of a new drug or a new target disease often use surrogate markers instead of clinical events as outcomes. Results of these trials should be considered with caution before using their results for clinical practice. For screening, observational studies often yield potentially biased or conflicting results. As clinical guidelines and expert opinions are often conflicting, primary care physicians should wait for results of large clinical trials in clinical events before changing their practice for screening or new drugs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the context of recent attempts to redefine the 'skin notation' concept, a position paper summarizing an international workshop on the topic stated that the skin notation should be a hazard indicator related to the degree of toxicity and the potential for transdermal exposure of a chemical. Within the framework of developing a web-based tool integrating this concept, we constructed a database of 7101 agents for which a percutaneous permeation constant can be estimated (using molecular weight and octanol-water partition constant), and for which at least one of the following toxicity indices could be retrieved: Inhalation occupational exposure limit (n=644), Oral lethal dose 50 (LD50, n=6708), cutaneous LD50 (n=1801), Oral no observed adverse effect level (NOAEL, n=1600), and cutaneous NOAEL (n=187). Data sources included the Registry of toxic effects of chemical substances (RTECS, MDL information systems, Inc.), PHYSPROP (Syracuse Research Corp.) and safety cards from the International Programme on Chemical Safety (IPCS). A hazard index, which corresponds to the product of exposure duration and skin surface exposed that would yield an internal dose equal to a toxic reference dose was calculated. This presentation provides a descriptive summary of the database, correlations between toxicity indices, and an example of how the web tool will help industrial hygienist decide on the possibility of a dermal risk using the hazard index.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objectives: To determine the prevalence of dementia and the proportion of undiagnosed dementia in elderly patients admitted to postacute care, and to identify patients' characteristics associated with undiagnosed dementia. Design: Cross-sectional study. Setting: Academic postacute rehabilitation facility in Lausanne, Switzerland. Participants: Patients (N = 1764) aged 70 years and older. Measurements: Data on socio-demographic, medical, functional, and affective status were collected upon admission. Data on cognitive performance (Mini-Mental State Exam [MMSE]), and cognition-related discharge diagnoses were abstracted through a structured review of discharge summaries. Results: Overall, 24.1% (425/1764) patients had a diagnosis of dementia, most frequently secondary to Alzheimer's disease (260/425, 61.2%). Among dementia cases, 70.8% (301/425) were newly diagnosed during postacute stay. This proportion was lower among patients referred from internal medicine than from orthopedic/surgery services (65.8% versus 74.8%, P = .042). Compared to patients with already diagnosed dementia, those newly diagnosed were older, lived alone more frequently, and had better functional status and MMSE score at admission (all P < .05). In multivariate analysis, previously undetected dementia remained associated with older age (OR = 2.4 for age 85 years and older, 95% CI 1.5-4.0, P = .001) and normal MMSE at admission (OR = 5.9, 95% CI 2.7-12.7, P < .001). Conclusion: Dementia was present in almost a fourth of elderly patients referred to postacute care, but was diagnosed in less than a third before admission. Oldest old patients appear especially at risk for underrecognition. These results emphasize the high diagnostic yield of systematic cognitive assessment in the postacute care setting to improve these patients' management and quality of life.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A role for gut hormone in bone physiology has been suspected. We evidenced alterations of microstructural morphology (trabecular and cortical) and bone strength (both at the whole-bone - and tissue-level) in double incretin receptor knock-out (DIRKO) mice as compared to wild-type littermates. These results support a role for gut hormones in bone physiology. INTRODUCTION: The two incretins, glucose-dependent insulinotropic polypeptide (GIP) and glucagon-like peptide-1 (GLP-1), have been shown to control bone remodeling and strength. However, lessons from single incretin receptor knock-out mice highlighted a compensatory mechanism induced by elevated sensitivity to the other gut hormone. As such, it is unclear whether the bone alterations observed in GIP or GLP-1 receptor deficient animals resulted from the lack of a functional gut hormone receptor, or by higher sensitivity for the other gut hormone. The aims of the present study were to investigate the bone microstructural morphology, as well as bone tissue properties, in double incretin receptor knock-out (DIRKO) mice. METHODS: Twenty-six-week-old DIRKO mice were age- and sex-matched with wild-type (WT) littermates. Bone microstructural morphology was assessed at the femur by microCT and quantitative X-ray imaging, while tissue properties were investigated by quantitative backscattered electron imaging and Fourier-transformed infrared microscopy. Bone mechanical response was assessed at the whole-bone- and tissue-level by 3-point bending and nanoindentation, respectively. RESULTS: As compared to WT animals, DIRKO mice presented significant augmentations in trabecular bone mass and trabecular number whereas bone outer diameter, cortical thickness, and cortical area were reduced. At the whole-bone-level, yield stress, ultimate stress, and post-yield work to fracture were significantly reduced in DIRKO animals. At the tissue-level, only collagen maturity was reduced by 9 % in DIRKO mice leading to reductions in maximum load, hardness, and dissipated energy. CONCLUSIONS: This study demonstrated the critical role of gut hormones in controlling bone microstructural morphology and tissue properties.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Obesity is heritable and predisposes to many diseases. To understand the genetic basis of obesity better, here we conduct a genome-wide association study and Metabochip meta-analysis of body mass index (BMI), a measure commonly used to define obesity and assess adiposity, in up to 339,224 individuals. This analysis identifies 97 BMI-associated loci (P < 5 × 10(-8)), 56 of which are novel. Five loci demonstrate clear evidence of several independent association signals, and many loci have significant effects on other metabolic phenotypes. The 97 loci account for ∼2.7% of BMI variation, and genome-wide estimates suggest that common variation accounts for >20% of BMI variation. Pathway analyses provide strong support for a role of the central nervous system in obesity susceptibility and implicate new genes and pathways, including those related to synaptic function, glutamate signalling, insulin secretion/action, energy metabolism, lipid biology and adipogenesis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Question Can we predict where forest regrowth caused by abandonment of agricultural activities is likely to occur? Can we assess how it may conflict with grassland diversity hotspots? Location Western Swiss Alps (4003210m a.s.l.). Methods We used statistical models to predict the location of land abandonment by farmers that is followed by forest regrowth in semi-natural grasslands of the Western Swiss Alps. Six modelling methods (GAM, GBM, GLM, RF, MDA, MARS) allowing binomial distribution were tested on two successive transitions occurring between three time periods. Models were calibrated using data on land-use change occurring between 1979 and 1992 as response, and environmental, accessibility and socio-economic variables as predictors, and these were validated for their capacity to predict the changes observed from 1992 to 2004. Projected probabilities of land-use change from an ensemble forecast of the six models were combined with a model of plant species richness based on a field inventory, allowing identification of critical grassland areas for the preservation of biodiversity. Results Models calibrated over the first land-use transition period predicted the second transition with reasonable accuracy. Forest regrowth occurs where cultivation costs are high and yield potential is low, i.e. on steeper slopes and at higher elevations. Overlaying species richness with land-use change predictions, we identified priority areas for the management and conservation of biodiversity at intermediate elevations. Conclusions Combining land-use change and biodiversity projections, we propose applied management measures for targeted/identified locations to limit the loss of biodiversity that could otherwise occur through loss of open habitats. The same approach could be applied to other types of land-use changes occurring in other ecosystems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Plants have the ability to use the composition of incident light as a cue to adapt development and growth to their environment. Arabidopsis thaliana as well as many crops are best adapted to sunny habitats. When subjected to shade, these plants exhibit a variety of physiological responses collectively called shade avoidance syndrome (SAS). It includes increased growth of hypocotyl and petioles, decreased growth rate of cotyledons and reduced branching and crop yield. These responses are mainly mediated by phytochrome photoreceptors, which exist either in an active, far-red light (FR) absorbing or an inactive, red light (R) absorbing isoform. In direct sunlight, the R to FR light (R/FR) ratio is high and converts the phytochromes into their physiologically active state. The phytochromes interact with downstream transcription factors such as PHYTOCHROME INTERACTING FACTOR (PIF), which are subsequently degraded. Light filtered through a canopy is strongly depleted in R, which result in a low R/FR ratio and renders the phytochromes inactive. Protein levels of downstream transcription factors are stabilized, which initiates the expression of shade-induced genes such as HFR1, PIL1 or ATHB-2. In my thesis, I investigated transcriptional responses mediated by the SAS in whole Arabidopsis seedlings. Using microarray and chromatin immunoprecipitation data, we identified genome-wide PIF4 and PIF5 dependent shade regulated gene as well as putative direct target genes of PIF5. This revealed evidence for a direct regulatory link between phytochrome signaling and the growth promoting phytohormone auxin (IAA) at the level of biosynthesis, transport and signaling. Subsequently, it was shown, that free-IAA levels are upregulated in response to shade. It is assumed that shade-induced auxin production takes predominantly place in cotyledons of seedlings. This implies, that IAA is subsequently transported basipetally to the hypocotyl and enhances elongation growth. The importance of auxin transport for growth responses has been established by chemical and genetic approaches. To gain a better understanding of spatio-temporal transcriptional regulation of shade-induce auxin, I generated in a second project, an organ specific high throughput data focusing on cotyledon and hypocotyl of young Arabidopsis seedlings. Interestingly, both organs show an opposite growth regulation by shade. I first investigated the spatio-transcriptional regulation of auxin re- sponsive gene, in order to determine how broad gene expression pattern can be explained by the hypothesized movement of auxin from cotyledons to hypocotyls in shade. The analysis suggests, that several genes are indeed regulated according to our prediction and others are regulated in a more complex manner. In addition, analysis of gene families of auxin biosynthetic and transport components, lead to the identification of essential family members for shade-induced growth re- sponses, which were subsequently experimentally confirmed. Finally, the analysis of expression pattern identified several candidate genes, which possibly explain aspects of the opposite growth response of the different organs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, evidence has emerged for a bidirectional relationship between sleep and neurological and psychiatric disorders. First, sleep-wake disorders (SWDs) are very common and may be the first/main manifestation of underlying neurological and psychiatric disorders. Secondly, SWDs may represent an independent risk factor for neuropsychiatric morbidities. Thirdly, sleep-wake function (SWF) may influence the course and outcome of neurological and psychiatric disorders. This review summarizes the most important research and clinical findings in the fields of neuropsychiatric sleep and circadian research and medicine, and discusses the promise they bear for the next decade. The findings herein summarize discussions conducted in a workshop with 26 European experts in these fields, and formulate specific future priorities for clinical practice and translational research. More generally, the conclusion emerging from this workshop is the recognition of a tremendous opportunity offered by our knowledge of SWF and SWDs that has unfortunately not yet entered as an important key factor in clinical practice, particularly in Europe. Strengthening pre-graduate and postgraduate teaching, creating academic multidisciplinary sleep-wake centres and simplifying diagnostic approaches of SWDs coupled with targeted treatment strategies yield enormous clinical benefits for these diseases.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thyroid fine-needle aspiration (FNA) cytology is a fast growing field. One of the most developing areas is represented by molecular tests applied to cytological material. Patients that could benefit the most from these tests are those that have been diagnosed as 'indeterminate' on FNA. They could be better stratified in terms of malignancy risk and thus oriented with more confidence to the appropriate management. Taking in to consideration the need to improve and keep high the yield of thyroid FNA, professionals from various fields (i.e. molecular biologists, endocrinologists, nuclear medicine physicians and radiologists) are refining and fine-tuning their diagnostic instruments. In particular, all these developments aim at increasing the negative predictive value of FNA to improve the selection of patients for diagnostic surgery. These advances involve terminology, the application of next-generation sequencing to thyroid FNA, the use of immunocyto- and histo-chemistry, the development of new sampling techniques and the increasing use of nuclear medicine as well as molecular imaging in the management of patients with a thyroid nodule. Herein, we review the recent advances in thyroid FNA cytology that could be of interest to the 'thyroid-care' community, with particular focus on the indeterminate diagnostic category.