81 resultados para mborayu (the spirit that unites us)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study aimed to assess application of ultrasound (US) combined with microbubbles (MB) to transfect the ciliary muscle of rat eyes. Reporter DNA plasmids encoding for Gaussia luciferase, β-galactosidase or the green fluorescent protein (GFP), alone or mixed with 50% Artison MB, were injected into the ciliary muscle, with or without US exposure (US set at 1 MHz, 2 W/cm(2), 50% duty cycle for 2 min). Luciferase activity was measured in ocular fluids at 7 and 30 days after sonoporation. At 1 week, the US+MB treatment showed a significant increase in luminescence compared with control eyes, injected with plasmid only, with or without MB (×2.6), and, reporter proteins were localized in the ciliary muscle by histochemical analysis. At 1 month, a significant decrease in luciferase activity was observed in all groups. A rise in lens and ciliary muscle temperature was measured during the procedure but did not result in any observable or microscopic damages at 1 and 8 days. The feasibility to transfer gene into the ciliary muscle by US and MB suggests that sonoporation may allow intraocular production of proteins for the treatment of inflammatory, angiogenic and/or degenerative retinal diseases.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a statistical model for the quantification of the weight of fingerprint evidence. Contrarily to previous models (generative and score-based models), our model proposes to estimate the probability distributions of spatial relationships, directions and types of minutiae observed on fingerprints for any given fingermark. Our model is relying on an AFIS algorithm provided by 3M Cogent and on a dataset of more than 4,000,000 fingerprints to represent a sample from a relevant population of potential sources. The performance of our model was tested using several hundreds of minutiae configurations observed on a set of 565 fingermarks. In particular, the effects of various sub-populations of fingers (i.e., finger number, finger general pattern) on the expected evidential value of our test configurations were investigated. The performance of our model indicates that the spatial relationship between minutiae carries more evidential weight than their type or direction. Our results also indicate that the AFIS component of our model directly enables us to assign weight to fingerprint evidence without the need for the additional layer of complex statistical modeling involved by the estimation of the probability distributions of fingerprint features. In fact, it seems that the AFIS component is more sensitive to the sub-population effects than the other components of the model. Overall, the data generated during this research project contributes to support the idea that fingerprint evidence is a valuable forensic tool for the identification of individuals.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Antitumor immunity is strongly influenced by the balance of tumor antigen-specific effector and regulatory T cells. However, the impact that vaccine adjuvants have in regulating the balance of antigen-specific T cell populations is not well understood. We found that antigen-specific T regulatory cells (Treg) were induced following subcutaneous vaccination with either OVA or melanoma-derived peptides, with a restricted expansion of effector T cells. Addition of the adjuvants CpG-ODN or Poly(I:C) preferentially amplified effector T cells over Tregs, dramatically increasing the antigen-specific T effector:Treg ratios and inducing polyfunctional effector cells. In contrast, two other adjuvants, imiquimod and Quil A saponin, favored an expansion of antigen-specific Tregs and failed to increase effector T cell:Treg ratios. Following therapeutic vaccination of tumor-bearing mice, high ratios of tumor-specific effector T cells:Tregs in draining lymph nodes were associated with enhanced CD8+ T cell infiltration at the tumor site and a durable rejection of tumors. Vaccine formulations of peptide+CpG-ODN or Poly(I:C) induced selective production of pro-inflammatory Type I cytokines early after vaccination. This environment promoted CD8+ and CD4+ effector T cell expansion over that of antigen-specific Tregs, tipping the effector T cell to Treg balance to favor effector cells. Our findings advance understanding of the influence of different adjuvants on T cell populations, facilitating the rational design of more effective cancer vaccines.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

OBJECTIVES: To compare the accuracy of prenatal ultrasonography (US) to magnetic resonance imaging (MRI) in the characterisation of congenital lung anomalies, and to assess their agreement with final diagnosis. To evaluate the influence of additional MRI information on therapeutic management. METHODS: 26 prenatal congenital lung anomalies detected consecutively between 2006 and 2012 were retrospectively evaluated. Lesions were initially observed at prenatal US and further investigated with MRI. Prenatal US and MRI imaging findings, and suggested diagnosis were compared with the final diagnosis, obtained from autopsies (4), pathological evaluation following surgical resection (15) and postnatal imaging studies (7). RESULTS: Postnatal diagnoses included 7 congenital pulmonary airway malformations, 8 complex lesions, 7 overinflations, 1 sequestration, 1 bronchogenic cyst, 1 blastoma and 1 bilateral lymphangioma. Suggested prenatal US and MRI diagnosis was correct in 34.6% and 46.2% of patients, respectively, mainly isolated lung lesions with typical imaging findings. Nonspecific imaging findings at US and MRI studies were observed in 38.4% of cases. In 42% of the operated anomalies, pathological dissection revealed the presence of complex anomalies. MRI changed the US diagnosis, but not the further management in 9.7% of the lesions. CONCLUSIONS: Prenatal US and MRI showed a high accuracy in the diagnosis of isolated congenital lung lesions with typical imaging findings. However, overall characterisation rates were low, because of both a high percentage of complex lesions and of lesions with nonspecific imaging findings. MRI was better than US in characterising complex lesions, but its additional information did not influence therapy decisions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There has been a long standing desire to produce thick (up to 500 nm) cryo-sections of fully hydrated cells and tissue for high-resolution analysis in their natural state by cryo-transmission electron microscopy. Here, we present a method that can successfully produce sections (lamellas in FIB-SEM terminology) of fully hydrated, unstained cells from high-pressure frozen samples by focused ion beam (FIB) milling. The samples are therefore placed in thin copper tubes and vitrified by high-pressure freezing. For transfer, handling and subsequent milling, the tubes are placed in a novel connective device (ferrule) that protects the sample from devitrification and contamination and passes through all operation steps. A piezo driven sample positioning stage (cryo-nano-bench, CNB) with three degrees of freedom was additionally developed to enable accurate milling of frozen-hydrated lamellas. With the CNB, high-pressure frozen samples can be milled to produce either thin lamellas (<100 nm), for direct imaging by high-resolution cryo-TEM or thicker lamellas (300-500 nm) for cryo-electron tomography. The sample remains vitreous throughout the process by using the presented tools and methods. The results are an important step towards investigating larger cells and even tissue in there natural state which in the end will enable us to gain better insights into cellular processes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Five years after the 2005 Pakistan earthquake that triggered multiple mass movements, landslides continue to pose a threat to the population of Azad Kashmir, especially during heavy monsoon rains. The thousands of landslides that were triggered by the 7.6 magnitude earthquake in 2005 were not just due to a natural phenomenon but largely induced by human activities, namely, road building, grazing, and deforestation. The damage caused by the landslides in the study area (381 km2) is estimated at 3.6 times the annual public works budget of Azad Kashmir for 2005 of US$ 1 million. In addition to human suffering, this cost constitutes a significant economic setback to the region that could have been reduced through improved land use and risk management. This article describes interdisciplinary research conducted 18 months after the earthquake to provide a more systemic approach to understanding risks posed by landslides, including the physical, environmental, and human contexts. The goal of this research is twofold: to present empirical data on the social, geological, and environmental contexts in which widespread landslides occurred following the 2005 earthquake; and, second, to describe straightforward methods that can be used for integrated landslide risk assessments in data-poor environments. The article analyzes limitations of the methodologies and challenges for conducting interdisciplinary research that integrates both social and physical data. This research concludes that reducing landslide risk is ultimately a management issue, based in land use decisions and governance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Résumé : Le cancer, qui est responsable d'un quart des décès en Suisse, exhibe un état cellulaire désordonné, qui lui-même, est la conséquence d'un dérèglement des gènes. Le gène le plus fréquemment altéré, dans les cas de cancers humains, est p53. Ce gène encode un facteur de transcription, impliqué dans la régulation de nombreux gènes impliqués dans le cycle cellulaire, l'apoptose ou la différenciation. Notre laboratoire a récemment identifié seize nouveaux gènes, dont l'expression est régulée par p53, parmi lesquels sept4, su jet de cette thèse. La protéine 5EPT4 appartient à la famille des septines, qui est impliquée dans la cytokinèse. Dans ce travail, nous avons confirmé la régulation de l'expression de sept4 par p53 dans des tissus de souris, et étonnamment, seul un des deux promoteurs du gène sept4 est contrôlé par p53. En outre, l'approche immunohistologique nous a permis de supposer une implication de la protéine SEPT4 dans le mécanisme de l'exocytose. Cette hypothèse a été confirmée par l'interaction de SEPT4 avec la protéine syntaxine 1A, et par son activité inhibitrice sur la sécrétion stimulée. En élargissant l'étude de la protéine SEPT4, nous avons découvert que celle-ci avait comme partenaire fonctionnel, la protéine Pinl, une enzyme qui catalyse l'isomérisation cis-trans du lien peptidique précédant une proline. bans ce contexte, nous avons démontré que l'interaction entre ces deux protéines reposait sur le domaine WW de Pinl, un type de domaine reconnaissant les motifs phosphoséryl-prolyl et phosphothréonyl-prolyl. Ce dernier résultat nous a conduit à examiner la phosphorylation de 5EPT4. Nous avons démontré que la partie N-terminale de SEPT4 était phosphorylée par la kinase Cdk5. La co¬expression de Cdk5 et de SEPT4 stimule la dégradation de SEPT4, indépendamment de la voie du protéasome. Ainsi, l'ensemble de nos observations fournissent l'évidence de l'engagement de la protéine SEPT4 dans la régulation de l'exocytose, et soutiennent le rôle de p53 dans le contrôle de l'exocytose, via SEPT4, ce qui constituerait un nouveau rôle fonctionnel pour ce gardien du génome. Summary: Cancer, which is responsible for a quarter of the deaths in Switzerland, exhibits a disordered cellular state, which itself, is the consequence of an altered state of genes. The most frequently altered gene in human cancer is p53. This gene encodes a transcription factor, implicated in the regulation of numerous genes involved in cell cycle, apoptosis or differentiation. Our laboratory has recently identified sixteen new genes whose expression is regulated by p53, amongst them septin 4, which is the subject of this thesis. The SEPT4 protein belongs to the septin family which is implicated in cytokinesis. In the present work, we have confirmed the regulation of sept4 expression by p53 in mouse tissues, and surprisingly, only one of the two sept4 promoters is regulated by p53. In addition, the immunohistologic approach enabled us to suppose a role of SEPT4 in exocytosis. This assumption was confirmed by the interaction of SEPT4 with syntaxin 1A, and by its inhibiting activity on stimulated secretion. By widening the analysis of SEPT4, we identified Pin1 as an interacting protein. Pin1 is an enzyme which catalyzes the cis-trans isomerization of the peptide bond preceding a proline residue. In this context, we showed that the interaction between these two proteins depends on the WW domain of Pin 1. This domain has been shown to function as a phosphoserine- or phosphothreonine¬binding module. This last result prompted us to examine phosphorylation of SEPT4. We demonstrated that the N-terminal portion of SEPT4 was phosphorylated by the Cdk5 kinase. The co-expression of Cdk5 with 5EPT4 stimulates SEPT4 degradation, independently of the proteasome pathway. Thus, these observations provide evidence for the engagement of SEPT4 in the regulation of exocytosis, and supports the role of p53 in the control of exocytosis, via SEPT4, which constitutes a new functional role for this guardian of the genome.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction Societies of ants, bees, wasps and termites dominate many terrestrial ecosystems (Wilson 1971). Their evolutionary and ecological success is based upon the regulation of internal conflicts (e.g. Ratnieks et al. 2006), control of diseases (e.g. Schmid-Hempel 1998) and individual skills and collective intelligence in resource acquisition, nest building and defence (e.g. Camazine 2001). Individuals in social species can pass on their genes not only directly trough their own offspring, but also indirectly by favouring the reproduction of relatives. The inclusive fitness theory of Hamilton (1963; 1964) provides a powerful explanation for the evolution of reproductive altruism and cooperation in groups with related individuals. The same theory also led to the realization that insect societies are subject to internal conflicts over reproduction. Relatedness of less-than-one is not sufficient to eliminate all incentive for individual selfishness. This would indeed require a relatedness of one, as found among cells of an organism (Hardin 1968; Keller 1999). The challenge for evolutionary biology is to understand how groups can prevent or reduce the selfish exploitation of resources by group members, and how societies with low relatedness are maintained. In social insects the evolutionary shift from single- to multiple queens colonies modified the relatedness structure, the dispersal, and the mode of colony founding (e.g. (Crozier & Pamilo 1996). In ants, the most common, and presumably ancestral mode of reproduction is the emission of winged males and females, which found a new colony independently after mating and dispersal flights (Hölldobler & Wilson 1990). The alternative reproductive tactic for ant queens in multiple-queen colonies (polygyne) is to seek to be re-accepted in their natal colonies, where they may remain as additional reproductives or subsequently disperse on foot with part of the colony (budding) (Bourke & Franks 1995; Crozier & Pamilo 1996; Hölldobler & Wilson 1990). Such ant colonies can contain up to several hundred reproductive queens with an even more numerous workforce (Cherix 1980; Cherix 1983). As a consequence in polygynous ants the relatedness among nestmates is very low, and workers raise brood of queens to which they are only distantly related (Crozier & Pamilo 1996; Queller & Strassmann 1998). Therefore workers could increase their inclusive fitness by preferentially caring for their closest relatives and discriminate against less related or foreign individuals (Keller 1997; Queller & Strassmann 2002; Tarpy et al. 2004). However, the bulk of the evidence suggests that social insects do not behave nepotistically, probably because of the costs entailed by decreased colony efficiency or discrimination errors (Keller 1997). Recently, the consensus that nepotistic behaviour does not occur in insect colonies was challenged by a study in the ant Formica fusca (Hannonen & Sundström 2003b) showing that the reproductive share of queens more closely related to workers increases during brood development. However, this pattern can be explained either by nepotism with workers preferentially rearing the brood of more closely related queens or intrinsic differences in the viability of eggs laid by queens. In the first chapter, we designed an experiment to disentangle nepotism and differences in brood viability. We tested if workers prefer to rear their kin when given the choice between highly related and unrelated brood in the ant F. exsecta. We also looked for differences in egg viability among queens and simulated if such differences in egg viability may mistakenly lead to the conclusion that workers behave nepotistically. The acceptance of queens in polygnous ants raises the question whether the varying degree of relatedness affects their share in reproduction. In such colonies workers should favour nestmate queens over foreign queens. Numerous studies have investigated reproductive skew and partitioning of reproduction among queens (Bourke et al. 1997; Fournier et al. 2004; Fournier & Keller 2001; Hammond et al. 2006; Hannonen & Sundström 2003a; Heinze et al. 2001; Kümmerli & Keller 2007; Langer et al. 2004; Pamilo & Seppä 1994; Ross 1988; Ross 1993; Rüppell et al. 2002), yet almost no information is available on whether differences among queens in their relatedness to other colony members affects their share in reproduction. Such data are necessary to compare the relative reproductive success of dispersing and non-dispersing individuals. Moreover, information on whether there is a difference in reproductive success between resident and dispersing queens is also important for our understanding of the genetic structure of ant colonies and the dynamics of within group conflicts. In chapter two, we created single-queen colonies and then introduced a foreign queens originating from another colony kept under similar conditions in order to estimate the rate of queen acceptance into foreign established colonies, and to quantify the reproductive share of resident and introduced queens. An increasing number of studies have investigated the discrimination ability between ant workers (e.g. Holzer et al. 2006; Pedersen et al. 2006), but few have addressed the recognition and discrimination behaviour of workers towards reproductive individuals entering colonies (Bennett 1988; Brown et al. 2003; Evans 1996; Fortelius et al. 1993; Kikuchi et al. 2007; Rosengren & Pamilo 1986; Stuart et al. 1993; Sundström 1997; Vásquez & Silverman in press). These studies are important, because accepting new queens will generally have a large impact on colony kin structure and inclusive fitness of workers (Heinze & Keller 2000). In chapter three, we examined whether resident workers reject young foreign queens that enter into their nest. We introduced mated queens into their natal nest, a foreign-female producing nest, or a foreign male-producing nest and measured their survival. In addition, we also introduced young virgin and mated queens into their natal nest to examine whether the mating status of the queens influences their survival and acceptance by workers. On top of polgyny, some ant species have evolved an extraordinary social organization called 'unicoloniality' (Hölldobler & Wilson 1977; Pedersen et al. 2006). In unicolonial ants, intercolony borders are absent and workers and queens mix among the physically separated nests, such that nests form one large supercolony. Super-colonies can become very large, so that direct cooperative interactions are impossible between individuals of distant nests. Unicoloniality is an evolutionary paradox and a potential problem for kin selection theory because the mixing of queens and workers between nests leads to extremely low relatedness among nestmates (Bourke & Franks 1995; Crozier & Pamilo 1996; Keller 1995). A better understanding of the evolution and maintenance of unicoloniality requests detailed information on the discrimination behavior, dispersal, population structure, and the scale of competition. Cryptic genetic population structure may provide important information on the relevant scale to be considered when measuring relatedness and the role of kin selection. Theoretical studies have shown that relatedness should be measured at the level of the `economic neighborhood', which is the scale at which intraspecific competition generally takes place (Griffin & West 2002; Kelly 1994; Queller 1994; Taylor 1992). In chapter four, we conducted alarge-scale study to determine whether the unicolonial ant Formica paralugubris forms populations that are organised in discrete supercolonies or whether there is a continuous gradation in the level of aggression that may correlate with genetic isolation by distance and/or spatial distance between nests. In chapter five, we investigated the fine-scale population structure in three populations of F. paralugubris. We have developed mitochondria) markers, which together with the nuclear markers allowed us to detect cryptic genetic clusters of nests, to obtain more precise information on the genetic differentiation within populations, and to separate male and female gene flow. These new data provide important information on the scale to be considered when measuring relatedness in native unicolonial populations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Johanson-Blizzard syndrome (JBS) is a rare, autosomal recessive disorder characterized by exocrine pancreatic insufficiency, typical facial features, dental anomalies, hypothyroidism, sensorineural hearing loss, scalp defects, urogenital and anorectal anomalies, short stature, and cognitive impairment of variable degree. This syndrome is caused by a defect of the E3 ubiquitin ligase UBR1, which is part of the proteolytic N-end rule pathway. Herein, we review previously reported (n = 29) and a total of 31 novel UBR1 mutations in relation to the associated phenotype in patients from 50 unrelated families. Mutation types include nonsense, frameshift, splice site, missense, and small in-frame deletions consistent with the hypothesis that loss of UBR1 protein function is the molecular basis of JBS. There is an association of missense mutations and small in-frame deletions with milder physical abnormalities and a normal intellectual capacity, thus suggesting that at least some of these may represent hypomorphic UBR1 alleles. The review of clinical data of a large number of molecularly confirmed JBS cases allows us to define minimal clinical criteria for the diagnosis of JBS. For all previously reported and novel UBR1 mutations together with their clinical data, a mutation database has been established at LOVD.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The good news with regard to this (or any) chapter on the future of leadership is that there is one. There was a time when researchers called for a moratorium on new leadership theory and research (e.g., Miner, 1975) citing the uncertain future of the field. Then for a time there was a popular academic perspective that leadership did not really matter when it came to shaping organizational outcomes (Meindl & Ehrlich, 1987; Meindl, Ehrlich, & Dukerich, 1985; Pfeffer, 1977). That perspective was laid to rest by "realists" in the field (Day & Antonakis, 2012a) by means of empirical re-interpretation of the results used to support the position that leadership does not matter (Lieberson & O'Connor, 1972; Salancik & Pfeffer, 1977). Specifically, Day and Lord (1988) showed that when proper methodological concerns were addressed (e.g., controlling for industry and company size effects; incorporating appropriate time lags) that the impact of top-level leadership was considerable - explaining as much as 45% of the variance in measures of organizational performance. Despite some recent pessimistic sentiments about the "curiously unformed" state of leadership research and theory (Hackman & Wageman, 2007), others have argued that the field has continued to evolve and is potentially on the threshold of some significant breakthroughs (Day & Antonakis, 2012a). Leadership scholars have been re-energized by new directions in the field and research efforts have revitalized areas previously abandoned for apparent lack of consistency in findings (e.g., leadership trait theory). Our accumulated knowledge now allows us to explain the nature of leadership including its biological bases and other antecedents, and consequences with some degree of confidence. There are other comprehensive sources that review the extensive theoretical and empirical foundation of leadership (Bass, 2008; Day & Antonakis, 2012b) so that will not be the focus of the present chapter. Instead, we will take a future-oriented perspective in identifying particular areas within the leadership field that we believe offer promising perspectives on the future of leadership. Nonetheless, it is worthwhile as background to first provide an overview of how we see the leadership field changing over the past decade or so. This short chronicle will set the stage for a keener understanding of where the future contributions are likely to emerge. Overall, across nine major schools of leadership - trait, behavioural, contingency, contextual, relational, sceptics, information processing, New Leadership, biological and evolutionary - researchers have seen a resurgence in interest in one area, a high level of activity in at least four other areas, inactivity in three areas, and one that was modestly active in the previous decade but we think holds strong promise for the future (Gardner, Lowe, Moss, Mahoney, & Cogliser, 2010). We will next provide brief overviews of these nine schools and their respective levels of research activity (see Figure 1).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

OBJECTIVES: To evaluate the combination of ultrasound (US) + fine-needle aspiration (FNA) in the assessment of salivary gland tumours in the hands of the otolaryngologist. DESIGN: A retrospective review of case notes was performed. SETTING: Two university teaching hospitals in Switzerland. PARTICIPANTS: One hundred and three patients with a total of 106 focal masses of the salivary glands were included. Clinician-operated US + FNA were the first line of investigation for these lesions. All patients underwent surgical excision of the lesion, which allowed for confirmation of diagnosis by histopathology in 104 lesions and by laboratory testing in two lesions. MAIN OUTCOME MEASURES: Primary--diagnostic accuracy in identifying true salivary gland neoplasms and detecting malignancy. Secondary--predicting an approximate and specific diagnosis in these tumours. RESULTS: The combination of US + FNA achieved a diagnostic accuracy of 99% in identifying and differentiating true salivary gland neoplasms from tumour-like lesions. In detecting malignancy, this combination permitted an accuracy of 98%. An approximate diagnosis was possible in 89%, and a specific diagnosis in 69% of our patients. CONCLUSIONS: Due to economic factors and a high diagnostic accuracy, the combination of US + FNA represents the investigation method of choice for most salivary gland tumours. We suggest that the otolaryngologist be employed in carrying out these procedures, as is already the rule in other medical specialties, while computed tomography and magnetic resonance imaging should be reserved to those few lesions, which cannot be delineated completely by sonography.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Turkish part of the Tethyan realm is represented by a series of terranes juxtaposed through Alpine convergent movements and separated by complex suture zones. Different terranes can be defined and characterized by their dominant geological background. The Pontides domain represents a segment of the former active margin of Eurasia, where back-arc basins opened in the Triassic and separated the Sakarya terrane from neighbouring regions. Sakarya was re-accreted to Laurasia through the Balkanic mid-Cretaceous orogenic event that also affected the Rhodope and Strandja zones. The whole region from the Balkans to the Caucasus was then affected by a reversal of subduction and creation of a Late Cretaceous arc before collision with the Anatolian domain in the Eocene. If the Anatolian terrane underwent an evolution similar to Sakarya during the Late Paleozoic and Early Triassic times, both terranes had a diverging history during and after the Eo-Cimmerian collision. North of Sakarya, the Küre back-arc was closed during the Jurassic, whereas north of the Anatolian domain, the back-arc type oceans did not close before the Late Cretaceous. During the Cretaceous, both domains were affected by ophiolite obduction, but in very different ways: north directed diachronous Middle to Late Cretaceous mélange obduction on the Jurassic Sakarya passive margin; Senonian synchronous southward obduction on the Triassic passive margin of Anatolia. From this, it appears that the Izmir-Ankara suture, currently separating both terranes, is composite, and that the passive margin of Sakarya is not the conjugate margin of Anatolia. To the south, the Cimmerian Taurus domain together with the Beydağları domain (part of the larger Greater Apulian terrane), were detached from north Gondwana in the Permian during the opening of the Neotethys (East-Mediterranean basin). The drifting Cimmerian blocks entered into a soft collision with the Anatolian and related terranes in the Eo-Cimmerian orogenic phase (Late Triassic), thus suturing the Paleotethys. At that time, the Taurus plate developed foreland-type basins, filled with flysch-molasse deposits that locally overstepped the lower plate Taurus terrane and were deposited in the opening Neotethys to the south. These olistostromal deposits are characterized by pelagic Carboniferous and Permian material from the Paleotethys suture zone found in the Mersin mélange. The latter, as well as the Antalya and Mamonia domains are represented by a series of exotic units now found south of the main Taurus range. Part of the Mersin exotic material was clearly derived from the former north Anatolian passive margin (Huğlu-type series) and re-displaced during the Paleogene. This led us to propose a plate tectonic model where the Anatolian ophiolitic front is linked up with the Samail/Baër-Bassit obduction front found along the Arabian margin. The obduction front was indented by the Anatolian promontory whose eastern end was partially subducted. Continued slab roll-back of the Neotethys allowed Anatolian exotics to continue their course southwestward until their emplacement along the Taurus southern margin (Mersin) and up to the Beydağları promontory (Antaya-Mamonia) in the latest Cretaceous-Paleocene. The supra-subduction ocean opening at the back of the obduction front (Troodos-type Ocean) was finally closed by Eocene north-south shortening between Africa and Eurasia. This brought close to each other Cretaceous ophiolites derived from the north of Anatolia and those obducted on the Arabian promontory. The latter were sealed by a Maastrichtian platform, and locally never affected by Alpine tectonism, whereas those located on the eastern Anatolian plate are strongly deformed and metamorphosed, and affected by Eocene arc magmatism. These observations help to reconstruct the larger frame of the central Tethyan realm geodynamic evolution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a very fine grid hydrological model based on the spatiotemporal repartition of precipitation and on the topography. The goal is to estimate the flood on a catchment area, using a Probable Maximum Precipitation (PMP) leading to a Probable Maximum Flood (PMF). The spatiotemporal distribution of the precipitation was realized using six clouds modeled by the advection-diffusion equation. The equation shows the movement of the clouds over the terrain and also gives the evolution of the rain intensity in time. This hydrological modeling is followed by a hydraulic modeling of the surface and subterranean flows, done considering the factors that contribute to the hydrological cycle, such as the infiltration, the exfiltration and the snowmelt. This model was applied to several Swiss basins using measured rain, with results showing a good correlation between the simulated and observed flows. This good correlation proves that the model is valid and gives us the confidence that the results can be extrapolated to phenomena of extreme rainfall of PMP type. In this article we present some results obtained using a PMP rainfall and the developed model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: Over the years, somatic care has become increasingly specialized. Furthermore, a rising number of patients requiring somatic care also present with a psychiatric comorbidity. As a consequence, the time and resources needed to care for these patients can interfere with the course of somatic treatment and influence the patient-caregiver relationship. In the light of these observations, the Liaison Psychiatry Unit at the University Hospital in Lausanne (CHUV) has educated its nursing staff in order to strengthen its action within the general care hospital. What has been developed is a reflexive approach through supervision of somatic staff, in order to improve the efficiency of liaison psychiatry interventions with the caregivers in charge of patients. The kind of supervision we have developed is the result of a real partnership with somatic staff. Besides, in order to better understand the complexity of interactions between the two systems involved, the patient's and the caregivers', we use several theoretical references in an integrative manner. PSYCHOANALYTICAL REFERENCE: The psychoanalytical model allows us to better understand the dynamics between the supervisor and the supervised group in order to contain and give meaning to the affects arising in the supervision space. "Containing function" and "transitional phenomena" refer to the experience in which emotions can find a space where they can be taken in and processed in a secure and supportive manner. These concepts, along with that of the "psychic envelope", were initially developed to explain the psychological development of the baby in its early interactions with its mother or its surrogate. In the field of supervision, they allow us to be aware of these complex phenomena and the diverse qualities to which a supervisor needs to resort, such as attention, support and incentive, in order to offer a secure environment. SYSTEMIC REFERENCE: A new perspective of the patient's complexity is revealed by the group's dynamics. The supervisor's attention is mainly focused on the work of affects. However, these are often buried under a defensive shell, serving as a temporary protection, which prevents the caregiver from recognizing his or her own emotions, thereby enhancing the difficulties in the relationship with the patient. Whenever the work of putting emotions into words fail, we use "sculpting", a technique derived from the systemic model. Through the use of this type of analogical language, affects can emerge without constraint or feelings of danger. Through "playing" in that "transitional space", new exchanges appear between group members and allow new behaviors to be conceived. In practice, we ask the supervisee who is presenting a complex situation, to design a spatial representation of his or her understanding of the situation, through the display of characters significant to the situation: the patient, somatic staff members, relatives of the patient, etc. In silence, the supervisee shapes the characters into postures and arranges them in the room. Each sculpted character is identified, named, and positioned, with his or her gaze being set in a specific direction. Finally the sculptor shapes him or herself in his or her own role. When the sculpture is complete and after a few moments of fixation, we ask participants to express themselves about their experience. By means of this physical representation, participants to the sculpture discover perceptions and feelings that were unknown up to then. Hence from this analogical representation a reflection and hypotheses of understanding can arise and be developed within the group. CONCLUSION: Through the use of the concepts of "containing function" and "transitional space" we position ourselves in the scope of the encounter and the dialog. Through the use of the systemic technique of "sculpting" we promote the process of understanding, rather than that of explaining, which would place us in the position of experts. The experience of these encounters has shown us that what we need to focus on is indeed what happens in this transitional space in terms of dynamics and process. The encounter and the sharing of competencies both allow a new understanding of the situation at hand, which has, of course, to be verified in the reality of the patient-caregiver relationship. It is often a source of adjustment for interpersonal skills to recover its containing function in order to enable caregiver to better respond to the patient's needs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.