15 resultados para käännetty arvonlisäverotus, reverse charge in value added taxation
em Université de Lausanne, Switzerland
Resumo:
During the first steps of reverse transcription of the retroviral genome, sequences present at the extremities of the RNA are used to reconstitute a host cell PolII promoter. The assembly of the promoter occurs by template switching, which takes advantage of a direct repeat at the ends of the RNA molecule. These steps are catalysed by the viral reverse transcriptase, which carries an intrinsic RNaseH activity that is probably also involved therein. To study the role of the RNaseH activity in this first template-switching event, an in vitro system has been developed based on primer extensions of synthetic RNAs. When an RNA was reverse transcribed with wild-type reverse transcriptase in the presence of a second RNA the 3' part of which was repeated at the 5' end of the first one, extension products could be observed corresponding to a chimeric cDNA comprising both RNA species. This template switching could not be detected when a mutant reverse transcriptase lacking the RNaseH activity was used. The results show that the RNaseH activity is needed to remove the 5' RNA sequences from the cDNA:RNA hybrid thereby enabling its translocation to another RNA containing an appropriate complementary target sequence.
Resumo:
Genotype-based algorithms are valuable tools for the identification of patients eligible for CCR5 inhibitors administration in clinical practice. Among the available methods, geno2pheno[coreceptor] (G2P) is the most used online tool for tropism prediction. This study was conceived to assess if the combination of G2P prediction with V3 peptide net charge (NC) value could improve the accuracy of tropism prediction. A total of 172 V3 bulk sequences from 143 patients were analyzed by G2P and NC values. A phenotypic assay was performed by cloning the complete env gene and tropism determination was assessed on U87_CCR5(+)/CXCR4(+) cells. Sequences were stratified according to the agreement between NC values and G2P results. Of sequences predicted as X4 by G2P, 61% showed NC values higher than 5; similarly, 76% of sequences predicted as R5 by G2P had NC values below 4. Sequences with NC values between 4 and 5 were associated with different G2P predictions: 65% of samples were predicted as R5-tropic and 35% of sequences as X4-tropic. Sequences identified as X4 by NC value had at least one positive residue at positions known to be involved in tropism prediction and positive residues in position 32. These data supported the hypothesis that NC values between 4 and 5 could be associated with the presence of dual/mixed-tropic (DM) variants. The phenotypic assay performed on a subset of sequences confirmed the tropism prediction for concordant sequences and showed that NC values between 4 and 5 are associated with DM tropism. These results suggest that the combination of G2P and NC could increase the accuracy of tropism prediction. A more reliable identification of X4 variants would be useful for better selecting candidates for Maraviroc (MVC) administration, but also as a predictive marker in coreceptor switching, strongly associated with the phase of infection.
Resumo:
Since the mid 90's, international actors as well as governmental actors have raised their interest into the development of irrigation's potential that is still largely unexploited in Niger. It seems all the more interesting as it could answer the needs of a fast growing population (3.3% per year). However, if everyone agrees on the need to development this system, the current implementation triggers questions on the process itself and its side effects. National and international policies on this matter were build upon an historical process through colonial, post-colonial and then the late 1980's neoliberal structures, leading to a business model that reveals a discrepancy between the state logic and the farming one. This business model asks for a high capacity of mobilization of resources unachievable for many, especially when they want to address small-scale irrigation (area
Resumo:
Reversed shoulder prostheses are increasingly being used for the treatment of glenohumeral arthropathy associated with a deficient rotator cuff. These non-anatomical implants attempt to balance the joint forces by means of a semi-constrained articular surface and a medialised centre of rotation. A finite element model was used to compare a reversed prosthesis with an anatomical implant. Active abduction was simulated from 0 degrees to 150 degrees of elevation. With the anatomical prosthesis, the joint force almost reached the equivalence of body weight. The joint force was half this for the reversed prosthesis. The direction of force was much more vertically aligned for the reverse prosthesis, in the first 90 degrees of abduction. With the reversed prosthesis, abduction was possible without rotator cuff muscles and required 20% less deltoid force to achieve it. This force analysis confirms the potential mechanical advantage of reversed prostheses when rotator cuff muscles are deficient.
Resumo:
Myeloid cells express the TNF family ligands BAFF/BLyS and APRIL, which exert their effects on B cells at different stages of differentiation via the receptors BAFFR, TACI (Transmembrane Activator and CAML-Interactor) and/or BCMA (B Cell Maturation Antigen). BAFF and APRIL are proteins expressed at the cell membrane, with both extracellular and intracellular domains. Therefore, receptor/ligand engagement may also result in signals in ligand-expressing cells via so-called "reverse signalling". In order to understand how TACI-Fc (atacicept) technically may mediate immune stimulation instead of suppression, we investigated its potential to activate reverse signalling through BAFF and APRIL. BAFFR-Fc and TACI-Fc, but not Fn14-Fc, reproducibly stimulated the ERK and other signalling pathways in bone marrow-derived mouse macrophages. However, these effects were independent of BAFF or APRIL since the same activation profile was observed with BAFF- or APRIL-deficient cells. Instead, cell activation correlated with the presence of high molecular mass forms of BAFFR-Fc and TACI-Fc and was strongly impaired in macrophages deficient for Fc receptor gamma chain. Moreover, a TACI-Fc defective for Fc receptor binding elicited no detectable signal. Although these results do not formally rule out the existence of BAFF or APRIL reverse signalling (via pathways not tested in this study), they provide no evidence in support of reverse signalling and point to the importance of using appropriate specificity controls when working with Fc receptor-expressing myeloid cells.
Resumo:
L'article décrypte certains rouages de l'expatriation des joueurs africains vers l'Europe. La précocité de leur migration et la fragmentation de leur trajectoire sont expliquées par les spéculations dont ils font l'objet. Les réseaux socio-économiques qui portent les filières spéculatives sont mis en lumière, ce qui permet de comprendre en particulier le rôle primordial qu'y jouent les clubs intermédiaires européens, et maintenant asiatiques, intermédiaires dans la chaîne à haute valeur ajoutée, au « taux d'éviction » le plus élevé du monde. This paper decodes various workings at play in the expatriation of African players to Europe. The early nature of their migration and the fragmentation of their trajectories are explained by the speculation that surrounds them. The socio-economic networks that carry speculative channels are brought to light, which helps us to understand in particular the major role played by the European, and now Asian, clubs, which serve as intermediaries in the high value-added chain, with the highest "eviction rate" in the world.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
Pseudomonas aeruginosa has a pair of distinct ornithine carbamoyltransferases. The anabolic ornithine carbamoyltransferase encoded by the argF gene catalyzes the formation of citrulline from ornithine and carbamoylphosphate. The catabolic ornithine carbamoyltransferase encoded by the arcB gene promotes the reverse reaction in vivo; although this enzyme can be assayed in vitro for citrulline synthesis, its unidirectionality in vivo is determined by its high concentration at half maximum velocity for carbamoylphosphate ([S]0.5) and high cooperativity toward this substrate. We have isolated mutant forms of catabolic ornithine carbamoyltransferase catalyzing the anabolic reaction in vivo. The corresponding arcB mutant alleles on a multicopy plasmid specifically suppressed an argF mutation of P. aeruginosa. Two new mutant enzymes were obtained. When methionine 321 was replaced by isoleucine, the mutant enzyme showed loss of homotropic cooperativity at physiological carbamoylphosphate concentrations. Substitution of glutamate 105 by lysine resulted in a partial loss of the sigmoidal response to increasing carbamoylphosphate concentrations. However, both mutant enzymes were still sensitive to the allosteric activator AMP and to the inhibitor spermidine. These results indicate that at least two residues of catabolic ornithine carbamoyltransferase are critically involved in positive carbamoylphosphate cooperativity: glutamate 105 (previously known to be important) and methionine 321. Mutational changes in either amino acid will affect the geometry of helix H2, which contains several residues required for carbamoylphosphate binding.
Resumo:
The spatial resolution visualized with hydrological models and the conceptualized images of subsurface hydrological processes often exceed resolution of the data collected with classical instrumentation at the field scale. In recent years it was possible to increasingly diminish the inherent gap to information from point like field data through the application of hydrogeophysical methods at field-scale. With regards to all common geophysical exploration techniques, electric and electromagnetic methods have arguably to greatest sensitivity to hydrologically relevant parameters. Of particular interest in this context are induced polarisation (IP) measurements, which essentially constrain the capacity of a probed subsurface region to store an electrical charge. In the absence of metallic conductors the IP- response is largely driven by current conduction along the grain surfaces. This offers the perspective to link such measurements to the characteristics of the solid-fluid-interface and thus, at least in unconsolidated sediments, should allow for first-order estimates of the permeability structure.¦While the IP-effect is well explored through laboratory experiments and in part verified through field data for clay-rich environments, the applicability of IP-based characterizations to clay-poor aquifers is not clear. For example, polarization mechanisms like membrane polarization are not applicable in the rather wide pore-systems of clay free sands, and the direct transposition of Schwarz' theory relating polarization of spheres to the relaxation mechanism of polarized cells to complex natural sediments yields ambiguous results.¦In order to improve our understanding of the structural origins of IP-signals in such environments as well as their correlation with pertinent hydrological parameters, various laboratory measurements have been conducted. We consider saturated quartz samples with a grain size spectrum varying from fine sand to fine gravel, that is grain diameters between 0,09 and 5,6 mm, as well as corresponding pertinent mixtures which can be regarded as proxies for widespread alluvial deposits. The pore space characteristics are altered by changing (i) the grain size spectra, (ii) the degree of compaction, and (iii) the level of sorting. We then examined how these changes affect the SIP response, the hydraulic conductivity, and the specific surface area of the considered samples, while keeping any electrochemical variability during the measurements as small as possible. The results do not follow simple assumptions on relationships to single parameters such as grain size. It was found that the complexity of natural occurring media is not yet sufficiently represented when modelling IP. At the same time simple correlation to permeability was found to be strong and consistent. Hence, adaptations with the aim of better representing the geo-structure of natural porous media were applied to the simplified model space used in Schwarz' IP-effect-theory. The resulting semi- empiric relationship was found to more accurately predict the IP-effect and its relation to the parameters grain size and permeability. If combined with recent findings about the effect of pore fluid electrochemistry together with advanced complex resistivity tomography, these results will allow us to picture diverse aspects of the subsurface with relative certainty. Within the framework of single measurement campaigns, hydrologiste can than collect data with information about the geo-structure and geo-chemistry of the subsurface. However, additional research efforts will be necessary to further improve the understanding of the physical origins of IP-effect and minimize the potential for false interpretations.¦-¦Dans l'étude des processus et caractéristiques hydrologiques des subsurfaces, la résolution spatiale donnée par les modèles hydrologiques dépasse souvent la résolution des données du terrain récoltées avec des méthodes classiques d'hydrologie. Récemment il est possible de réduire de plus en plus cet divergence spatiale entre modèles numériques et données du terrain par l'utilisation de méthodes géophysiques, notamment celles géoélectriques. Parmi les méthodes électriques, la polarisation provoquée (PP) permet de représenter la capacité des roches poreuses et des sols à stocker une charge électrique. En l'absence des métaux dans le sous-sol, cet effet est largement influencé par des caractéristiques de surface des matériaux. En conséquence les mesures PP offrent une information des interfaces entre solides et fluides dans les matériaux poreux que nous pouvons lier à la perméabilité également dirigée par ces mêmes paramètres. L'effet de la polarisation provoquée à été étudié dans différentes études de laboratoire, ainsi que sur le terrain. A cause d'une faible capacité de polarisation des matériaux sableux, comparé aux argiles, leur caractérisation par l'effet-PP reste difficile a interpréter d'une manière cohérente pour les environnements hétérogènes.¦Pour améliorer les connaissances sur l'importance de la structure du sous-sol sableux envers l'effet PP et des paramètres hydrologiques, nous avons fait des mesures de laboratoire variées. En détail, nous avons considéré des échantillons sableux de quartz avec des distributions de taille de grain entre sables fins et graviers fins, en diamètre cela fait entre 0,09 et 5,6 mm. Les caractéristiques de l'espace poreux sont changées en modifiant (i) la distribution de taille des grains, (ii) le degré de compaction, et (iii) le niveau d'hétérogénéité dans la distribution de taille de grains. En suite nous étudions comment ces changements influencent l'effet-PP, la perméabilité et la surface spécifique des échantillons. Les paramètres électrochimiques sont gardés à un minimum pendant les mesures. Les résultats ne montrent pas de relation simple entre les paramètres pétro-physiques comme par exemples la taille des grains. La complexité des media naturels n'est pas encore suffisamment représenté par les modèles des processus PP. Néanmoins, la simple corrélation entre effet PP et perméabilité est fort et consistant. En conséquence la théorie de Schwarz sur l'effet-PP a été adapté de manière semi-empirique pour mieux pouvoir estimer la relation entre les résultats de l'effet-PP et les paramètres taille de graines et perméabilité. Nos résultats concernant l'influence de la texture des matériaux et celles de l'effet de l'électrochimie des fluides dans les pores, permettront de visualiser des divers aspects du sous-sol. Avec des telles mesures géo-électriques, les hydrologues peuvent collectionner des données contenant des informations sur la structure et la chimie des fluides des sous-sols. Néanmoins, plus de recherches sur les origines physiques de l'effet-PP sont nécessaires afin de minimiser le risque potentiel d'une mauvaise interprétation des données.
Resumo:
Water movement in unsaturated soils gives rise to measurable electrical potential differences that are related to the flow direction and volumetric fluxes, as well as to the soil properties themselves. Laboratory and field data suggest that these so-called streaming potentials may be several orders of magnitudes larger than theoretical predictions that only consider the influence of the relative permeability and electrical conductivity on the self potential (SP) data. Recent work has improved predictions somewhat by considering how the volumetric excess charge in the pore space scales with the inverse of water saturation. We present a new theoretical approach that uses the flux-averaged excess charge, not the volumetric excess charge, to predict streaming potentials. We present relationships for how this effective excess charge varies with water saturation for typical soil properties using either the water retention or the relative permeability function. We find large differences between soil types and the predictions based on the relative permeability function display the best agreement with field data. The new relationships better explain laboratory data than previous work and allow us to predict the recorded magnitudes of the streaming potentials following a rainfall event in sandy loam, whereas previous models predict values that are three orders of magnitude too small. We suggest that the strong signals in unsaturated media can be used to gain information about fluxes (including very small ones related to film flow), but also to constrain the relative permeability function, the water retention curve, and the relative electrical conductivity function.
Resumo:
Effector T lymphocytes are the progeny of a limited number of antigen- specific precursor cells and it has been estimated that clonotypic human T cells may expand million fold on their way reaching high cell numbers that are sufficient for immune protection. Moreover, memory T cell responses are characterized by repetitive expansion of antigen-specific T cell clonotypes, and limitations in the proliferative capacity could lead to immune senescence. Because telomeres progressively shorten as a function of cell division, telomere length is a powerful indicator of the replicative in vivo history of human T lymphocytes. In this review, we summarize observations made over the last decade on telomere length dynamics of well-defined T cell populations derived from healthy donors and patients with infectious disease or cancer. We focus on T cell differentiation, T cell ageing, and natural and vaccine induced immune responses. We also discuss the scientific evidence for in vivo replicative senescence of antigen-specific T cells, and evaluate the available methods for measuring telomere lengths and telomerase activity, and their potential and limitations to increase our understanding of T cell physiology. (C) 2007 Elsevier Ireland Ltd. All rights reserved.
Resumo:
Nestling birds produced later in the season are hypothesized to be of poor quality with a low probability of survival and recruitment. In a Spanish population of house martins (Delichon urbica), we first compared reproductive success, immune responses and morphological traits between the first and the second broods. Second, we investigated the effects of an ectoparasite treatment and breeding date on the recapture rate the following year. Due probably to a reverse situation in weather conditions during the experiment, with more rain during rearing of the first brood, nestlings reared during the second brood were in better condition and had stronger immune responses compared with nestlings from the first brood. Contrary to other findings on house martins, we found a similar recapture rate for chicks reared during the first and the second brood. Furthermore, ectoparasitic house martin bugs had no significant effect on the recapture rate. Recaptured birds had similar morphology but higher immunoglobulin levels when nestlings compared with non-recaptured birds. This result implies that a measure of immune function is a better predictor of survival than body condition per se.
Resumo:
La mousse haplobiontique Physcomitrella patens est utilisée comme système génétique modèle pour l'étude du développement des plantes. Cependant, l'absence d'un protocole efficace de transformation a constitué jusqu'à présent un gros désavantage méthodologique pour le développement futur de ce système expérimental. Les résultats présentés dans le premier chapitre relatent la mise au point d'un protocole de transformation basé sur la technique de transfert direct de gènes dans des protoplastes par précipitation au PEG. Un essai d'expression transitoire de gènes a été mis au point. Ce protocole a été adapté afin de permettre l'introduction in vivo d'anticorps dans des protoplastes. Le protocole modifié permet d'introduire simultanément du DNA et des IgG dans les cellules, et nous avons démontré que ces anticorps peuvent inactiver spécifiquement le produit d'un gène co-introduit (GUS), ainsi que certaines protéines impliquées dans des processus cellulaires (tubuline). Cet essai, baptisé "essai transitoire d'immuno-inactivation in vivo", devrait être directement applicable à d'autres protoplastes végétaux, et permettre l'élaboration de nouvelles stratégies dans l'étude de processus cellulaires. Le second chapitre est consacré aux expériences de transformation de la mousse avec des gènes conférant une résistance à des antibiotiques. Nos résultats démontrent que l'intégration de gènes de résistance dans le génome de P. patens est possible, mais que cet événement est rare. Il s'agit là néanmoins de la première démonstration d'une transformation génétique réussie de cet organisme. L'introduction de gènes de résistance aux antibiotiques dans les protoplastes de P. patens génère à haute fréquence des clones résistants instables. Deux classes de clones instables ont été identifiés. La caractérisation phénotypique, génétique et moléculaire de ces clones suggère fortement que les séquences transformantes sont concaténées pour former des structures de haut poids moléculaire, et que ces structures sont efficacement répliquées et maintenues dans les cellules résistantes en tant qu'éléments génétiques extrachromosomaux. Ce type de transformation nous permet d'envisager des expériences permettant l'identification des séquences génomiques impliquées dans la replication de l'ADN de mousse. Plusieurs lignées transgéniques ont été retransformées avec des plasmides portant des séquences homologues aux séquences intégrées dans le génome, mais conférant une résistance à un autre antibiotique. Les résultats présentés dans le troisième chapitre montrent que les fréquences de transformation intégrative dans les lignées transgéniques sont 10 fois plus élevées que dans la lignée sauvage, et que cette augmentation est associée à une coségrégation des gènes de résistance dans la plupart des clones testés. Ces résultats génétiques indiquent que l'intégration de séquences d'ADN étranger dans le génome de P. patens a lieu en moyenne 10 fois plus fréquemment par recombinaison homologue que par intégration aléatoire. Ce rapport homologue/aléatoire est 10000 fois supérieur aux rapports obtenus avec d'autres plantes, et fournit l'outil indispensable à la réalisation d'expériences de génétique inverse dans cet organisme à haplophase dominante. THESIS SUMMARY The moss Physcomitrella patens is used as a model genetic system to study plant development, taking advantage of the fact that the haploid gametophyte dominates in its life cycle. But further development of this model system was hampered by the lack of a protocol allowing the genetic transformation of this plant. We have developed a transformation protocol based on PEG-mediated direct gene transfer to protoplasts. Our data demonstrate that this procedure leads to the establishment of an efficient transient gene expression assay. A slightly modified protocol has been developed allowing the in vivo introduction of antibodies in moss protoplasts. Both DNA and IgGs can be loaded simultaneously, and specific antibodies can immunodeplete the product of an expression cassette (GUS) as well as proteins involved in cellular processes (tubulins). This assay, named transient in vivo immunodepletion assay, should be applicable to other plant protoplasts, and offers new approaches to study cellular processes. Transformations have been performed with bacterial plasmids carrying antibiotic resistance expression cassette. Our data demonstrate that integrative transformation occurs, but at low frequencies. This is the first demonstration of a successful genetic transformation of mosses. Resistant unstable colonies are recovered at high frequencies following transformation, and two different classes of unstable clones have been identified. Phenotypical, genetic and molecular characterisation of these clones strongly suggests that bacterial plasmids are concatenated to form high molecular arrays which are efficiently replicated and maintained as extrachromosomal elements in the resistant cells. Replicative transformation in P. patens should allow the design of experiments aimed at the identification of genomic sequences involved in moss DNA replication. Transgenic strains have been retransformed with bacterial plasmids carrying sequences homologous to the integrated transloci, but conferring resistance to another antibiotic. Our results demonstrate an order of magnitude increase of integrative transformation frequencies in transgenic strains as compared to wild-type, associated with cosegregation of the resistance genes in most of these double resistant transgenic strains. These observations provide strong genetic evidence that gene targeting occurs about ten times more often than random integration in the genome of P. patens. Such ratio of targeted to random integration is about 10 000 times higher than previous reports of gene targeting in plants, and provides the essential requirement for the development of efficient reverse genetics in the haplodiplobiontic P. patens.
Resumo:
Introduction: In 2012, a study by K. Chatziioannidou and S-C. Renteria showed that teenagers chose to undergo a surgical termination of pregnancy (TOP) more often than a medical TOP (mifepristone followed by misoprostol) when they decided to terminate a pregnancy. It also showed that the teenagers' choice for a medical versus surgical method is inversely proportional to the adults' choice although the efficiency of the medical method showed even better results for teenagers than for adults. According to the hypothesis made, the reasons for this choice might be influenced by the following facts: (i) the belated call to make an appointment, the medical procedure not being available after 9 weeks of gestation; (ii) the imperative request for confidentiality; (iii) the beliefs and subjective appreciation of the medical staff. Objectives: The aim of this retrospective and qualitative study is to analyse the reasons why, in case of a TOP, teenagers chose the surgical method more often than their adult counterparts. Material: (i) All teenagers who were admitted for an abortive procedure during 2011 in the in- or outpatient ward. (ii) The professional team (midwives and sexual and reproductive counsellors) in charge in the case of a TOP request. Methods: The information about the patient's history and the biopsycho- social data was retrieved from the patient files filled out by midwives and sexual and reproductive health counsellors during the first appointment for a TOP request or during its process. The professionals' appreciation was evaluated by means of a semi-structured questionnaire. Results: Concerning the choice of the method for a pregnancy termination, the results of our research show that: (i) Out of 47 teenagers, 27 chose the surgical method and 17 the medical method. (ii) Three had a second trimester abortion (which includes use of the medical method). (iii) Fifteen teenagers out of the 27 who chose a surgical method consulted between the 9th and 14th weeks of amenorrhoea and therefore did not have any other choice. The reasons for their 'late arrival' will be explained in detail. The 12 teenagers who arrived before the 8th week of amenorrhoea and chose to undertake abortion by suction & curettage under general anaesthesia did it for the following reasons: (i) Four were afraid of bleeding and pain. (ii) Five thought that the organisation of the surgical procedure was easier. (iii) Two did not trust the abortion pill. (iv) One was taken to her mother's gynaecologist where she had a D&C. Confidentiality was requested nine times out of 27 when choosing the surgical method, and six times out of 17 when choosing the medical method. Therefore, although confidentiality concerns a third of the teenagers' pregnancy termination requests, it does not seem to be a significant element for the choice of the method. As for the subjective appreciation of the professionals, the first results of the discussions seem to show that teenagers were reluctant or resistant towards the medical method. Conclusion: This study shows that the reasons why teenagers still prefer the use of the surgical over the medical method compared to adults, seem to include the late request for an appointment, fear of pain and bleeding and organisational issues. Confidentiality does not seem to greatly influence the teenagers' choice. Nonetheless, medical professionals seem to favour the suction curettage procedure performed under anesthesia because they associate young age with vulnerability and psychological frailty and consequently diminished ability to cope with pain and emotional distress during the medical procedures.