6 resultados para setting of operating target
em Universitätsbibliothek Kassel, Universität Kassel, Germany
Resumo:
Empowerment is one possible approach to increase political, social and economic participation of a target group and thus decrease food insecurity among vulnerable people. The objective of this research was to evaluate a socio-economic empowerment project implemented for 8 years in rural northern Bangladesh by using secondary data from 2000 and primary data from 2009. Three hundred women were primarily selected out of all existing and active 121 women groups formed during 8 years project implementation. Standardized interviews were conducted to collect quantitative data. In addition an overall qualitative analysis included focus group discussions, the review of project summaries and discussions with implementing staff. Data was collected on socio-economic status, rice storages and food consumption. In addition knowledge was gained on current activities of the women groups. The empowerment concept implemented in this setting was successful to increase the participants’ political, social and economic engagement and visibility. Apart from that the utilization of skills for income generation led to an improvement of the socio-economic status and food insecurity became less common. Recommendations for future projects include the increase of female members among the NGO staff as well as the further follow-up and strengthening of political acceptance and visibility of the empowered participants to sustain the outcome of the project.
Resumo:
Cell-cell interactions during embryonic development are crucial in the co-ordination of growth, differentiation and maintenance of many different cell types. To achieve this co-ordination each cell must properly translate signals received from neighbouring cells, into spatially and temporally appropriate developmental responses. A surprisingly limited number of signal pathways are responsible for the differentiation of enormous variety of cell types. As a result, pathways are frequently 'reused' during development. Thus, in mammals the JAK/STAT pathway is required during early embryogenesis, mammary gland formation, hematopoiesis and, finally, plays a pivotal role in immune response. In the canonical way, the JAK/STAT pathway is represented by a transmembrane receptor associated with a Janus kinase (JAK), which upon stimulation by an extra-cellular ligand, phosphorylates itself, the receptor and, finally, the signal transducer and activator of transcription (STAT) molecules. Phosphorylated STATs dimerise and translocate to the nucleus where they activate transcription of target genes. The JAK/STAT pathway has been conserved throughout evolution, and all known components are present in the genome of Drosophila melanogaster. Besides hematopoietic and immunity functions, the pathway is also required during development for processes including embryonic segmentation, tracheal morphogenesis, posterior spiracle formation etc. This study describes Drosophila Ken&Barbie (Ken) as a selective regulator of JAK/STAT signalling. ken mutations identified in a screen for modulators of an eye overgrowth phenotype, caused by over-expression of the pathway ligand unpaired, also interact genetically with the pathway receptor domeless (dome) and the transcription factor stat92E. Over-expression of Ken can phenocopy developmental defects known to be caused by the loss of JAK/STAT signalling. These genetic interactions suggest that Ken may function as a negative regulator of the pathway. Ken has C-terminal Zn-finger domain, presumably for DNA binding, and N-terminal BTB/POZ domain, often found in transcriptional repressors. Using EGFP-fused construct expressed in vivo revealed nuclear accumulation of Ken. Therefore, it is proposed that Ken may act as a suppresser of STAT92E target genes. An in vitro assay, termed SELEX, determined that Ken specifically binds to a DNA sequence, with the essential for DNA recognition core overlapping that of STAT92E. This interesting observation suggests that not all STAT92E sites may also allow Ken binding. Strikingly, when effects of ectopic Ken on the expression of putative JAK/STAT pathway target genes were examined, only a subset of the genes tested, namely vvl, trh and kni, were down-regulated by Ken, whereas some others, such as eve and fj, appeared to be unresponsive. Further analysis of vvl, one of the genes susceptible to ectopic Ken, was undertaken. In the developing hindgut, expression of vvl is JAK/STAT pathway dependent, but remains repressed in the posterior spiracles, despite the stimulation of STAT92E by Upd in their primordia. Importantly, ken is also expressed in the developing posterior spiracles. Strikingly, up-regulation of vvl is observed in these tissues in ken mutant embryos. These imply that while ectopic Ken is sufficient to repress the expression of vvl in the hindgut, endogenous Ken is also necessary to prevent its activation in the posterior spiracles. It is therefore conceivable that ectopic vvl expression in the posterior spiracles of the ken mutants may be the result of de-repression of endogenous STAT92E activity. Another consequence of these observations is a fine balance that must exist between STAT92E and Ken activities. Apparently, endogenous level of Ken is sufficient to repress vvl, but not other, as yet unidentified, JAK/STAT pathway targets, whose presumable activation by STAT92E is required for posterior spiracle development as the embryos mutant for dome, the receptor of the pathway, show severe spiracle defects. These defects are also observed in the embryos mis-expressing Ken. Though it is possible that the posterior spiracle phenotype caused by higher levels of Ken results from a JAK/STAT pathway independent activity, it seems to be more likely that Ken acts in a dosage dependent manner, and extra Ken is able to further antagonise JAK/STAT pathway target genes. While STAT92E binding sites required for target gene expression have been poorly characterised, the existence of genome data allows the prediction of candidate STAT92E sites present in target genes promoters to be attempted. When a 6kb region containing the putative regulatory domains flanking the vvl locus are examined, only a single potential STAT92E binding site located 825bp upstream of the translational start can be detected. Strikingly, this site also includes a perfect Ken binding sequence. Such an in silico observation, though consistent with both Ken DNA binding assay in vitro and regulation of STAT92E target genes in vivo, however, requires further analysis. The JAK/STAT pathway is implicated in a variety of processes during embryonic and larval development as well as in imago. In each case, stimulation of the same transcription factor results in different developmental outcomes. While many potential mechanisms have been proposed and demonstrated to explain such pleiotropy, the present study indicates that Ken may represent another mechanism, with which signal transduction pathways are controlled. Ken selectively down-regulates a subset of potential target genes and so modifies the transcriptional profile generated by activated STAT92E - a mechanism, which may be partially responsible for differences in the morphogenetic processes elicited by JAK/STAT signalling during development.
Resumo:
Using a crossed-beam apparatus with a double hemispherical electron spectrometer, we have studied the spectrum of electrons released in thermal energy ionizing collisions of metastable He^*(2^3S) atoms with ground state Yb(4f^14 6s^2 ^1S_0) atoms, thereby providing the first Penning electron spectrum of an atomic target with-4f-electrons. In contrast to the HeI (58.4nm) and NeI (73.6/74.4nm) photoelectron spectra of Yb, which show mainly 4f- and 6s-electron emission in about a 5:1 ratio, the He^*(2^3S) Penning electron spectrum is dominated by 6s-ionization, acoompnnied by some correlation- induced 6p-emission (8% Yb+( 4f^14 6p^2P) formation) and very little 4f-ionization (<_~ 2.5%). This astounding result is attributed to the electron exchange mechanism for He^*(2^3S) ionization and reflects the poor overlap of the target 4f-electron wavefunction with the 1s-hole of He^*(2^3S), as discussed on thc basis of Dirac-Fock wave functions for the Yb orbitals and through calculations of the partial ionization cross sections involving semiempirical complex potentiale. The presented case may be regarded as the elearest atomic example for the surface sensitivity of He^*(2^3S) Penning ionization observed so far.
Resumo:
Eukaryotic DNA m5C methyltransferases (MTases) play a major role in many epigenetic regulatory processes like genomic imprinting, X-chromosome inactivation, silencing of transposons and gene expression. Members of the two DNA m5C MTase families, Dnmt1 and Dnmt3, are relatively well studied and many details of their biological functions, biochemical properties as well as interaction partners are known. In contrast, the biological functions of the highly conserved Dnmt2 family, which appear to have non-canonical dual substrate specificity, remain enigmatic despite the efforts of many researchers. The genome of the social amoeba Dictyostelium encodes Dnmt2-homolog, the DnmA, as the only DNA m5C MTase which allowed us to study Dnmt2 function in this organism without interference by the other enzymes. The dnmA gene can be easily disrupted but the knock-out clones did not show obvious phenotypes under normal lab conditions, suggesting that the function of DnmA is not vital for the organism. It appears that the dnmA gene has a low expression profile during vegetative growth and is only 5-fold upregulated during development. Fluorescence microscopy indicated that DnmA-GFP fusions were distributed between both the nucleus and cytoplasm with some enrichment in nuclei. Interestingly, the experiments showed specific dynamics of DnmA-GFP distribution during the cell cycle. The proteins colocalized with DNA in the interphase and were mainly removed from nuclei during mitosis. DnmA functions as an active DNA m5C MTase in vivo and is responsible for weak but detectable DNA methylation of several regions in the Dictyostelium genome. Nevertheless, gel retardation assays showed only slightly higher affinity of the enzyme to dsDNA compared to ssDNA and no specificity towards various sequence contexts, although weak but detectable specificity towards AT-rich sequences was observed. This could be due to intrinsic curvature of such sequences. Furthermore, DnmA did not show denaturant-resistant covalent complexes with dsDNA in vitro, although it could form covalent adducts with ssDNA. Low binding and methyltransfer activity in vitro suggest the necessity of additional factor in DnmA function. Nevertheless, no candidates could be identified in affinity purification experiments with different tagged DnmA fusions. In this respect, it should be noted that tagged DnmA fusion preparations from Dictyostelium showed somewhat higher activity in both covalent adduct formation and methylation assays than DnmA expressed in E.coli. Thus, the presence of co-purified factors cannot be excluded. The low efficiency of complex formation by the recombinant enzyme and the failure to define interacting proteins that could be required for DNA methylation in vivo, brought up the assumption that post-translational modifications could influence target recognition and enzymatic activity. Indeed, sites of phosphorylation, methylation and acetylation were identified within the target recognition domain (TRD) of DnmA by mass spectrometry. For phosphorylation, the combination of MS data and bioinformatic analysis revealed that some of the sites could well be targets for specific kinases in vivo. Preliminary 3D modeling of DnmA protein based on homology with hDNMT2 allowed us to show that several identified phosphorylation sites located on the surface of the molecule, where they would be available for kinases. The presence of modifications almost solely within the TRD domain of DnmA could potentially modulate the mode of its interaction with the target nucleic acids. DnmA was able to form denaturant-resistant covalent intermediates with several Dictyostelium tRNAs, using as a target C38 in the anticodon loop. The formation of complexes not always correlated with the data from methylation assays, and seemed to be dependent on both sequence and structure of the tRNA substrate. The pattern, previously suggested by the Helm group for optimal methyltransferase activity of hDNMT2, appeared to contribute significantly in the formation of covalent adducts but was not the only feature of the substrate required for DnmA and hDNMT2 functions. Both enzymes required Mg2+ to form covalent complexes, which indicated that the specific structure of the target tRNA was indispensable. The dynamics of covalent adduct accumulation was different for DnmA and different tRNAs. Interestingly, the profiles of covalent adduct accumulation for different tRNAs were somewhat similar for DnmA and hDNMT2 enzymes. According to the proposed catalytic mechanism for DNA m5C MTases, the observed denaturant-resistant complexes corresponded to covalent enamine intermediates. The apparent discrepancies in the data from covalent complex formation and methylation assays may be interpreted by the possibility of alternative pathways of the catalytic mechanism, leading not to methylation but to exchange or demethylation reactions. The reversibility of enamine intermediate formation should also be considered. Curiously, native gel retardation assays showed no or little difference in binding affinities of DnmA to different RNA substrates and thus the absence of specificity in the initial enzyme binding. The meaning of the tRNA methylation as well as identification of novel RNA substrates in vivo should be the aim of further experiments.
Resumo:
The ongoing depletion of the coastal aquifer in the Gaza strip due to groundwater overexploitation has led to the process of seawater intrusion, which is continually becoming a serious problem in Gaza, as the seawater has further invaded into many sections along the coastal shoreline. As a first step to get a hold on the problem, the artificial neural network (ANN)-model has been applied as a new approach and an attractive tool to study and predict groundwater levels without applying physically based hydrologic parameters, and also for the purpose to improve the understanding of complex groundwater systems and which is able to show the effects of hydrologic, meteorological and anthropogenic impacts on the groundwater conditions. Prediction of the future behaviour of the seawater intrusion process in the Gaza aquifer is thus of crucial importance to safeguard the already scarce groundwater resources in the region. In this study the coupled three-dimensional groundwater flow and density-dependent solute transport model SEAWAT, as implemented in Visual MODFLOW, is applied to the Gaza coastal aquifer system to simulate the location and the dynamics of the saltwater–freshwater interface in the aquifer in the time period 2000-2010. A very good agreement between simulated and observed TDS salinities with a correlation coefficient of 0.902 and 0.883 for both steady-state and transient calibration is obtained. After successful calibration of the solute transport model, simulation of future management scenarios for the Gaza aquifer have been carried out, in order to get a more comprehensive view of the effects of the artificial recharge planned in the Gaza strip for some time on forestall, or even to remedy, the presently existing adverse aquifer conditions, namely, low groundwater heads and high salinity by the end of the target simulation period, year 2040. To that avail, numerous management scenarios schemes are examined to maintain the ground water system and to control the salinity distributions within the target period 2011-2040. In the first, pessimistic scenario, it is assumed that pumping from the aquifer continues to increase in the near future to meet the rising water demand, and that there is not further recharge to the aquifer than what is provided by natural precipitation. The second, optimistic scenario assumes that treated surficial wastewater can be used as a source of additional artificial recharge to the aquifer which, in principle, should not only lead to an increased sustainable yield of the latter, but could, in the best of all cases, revert even some of the adverse present-day conditions in the aquifer, i.e., seawater intrusion. This scenario has been done with three different cases which differ by the locations and the extensions of the injection-fields for the treated wastewater. The results obtained with the first (do-nothing) scenario indicate that there will be ongoing negative impacts on the aquifer, such as a higher propensity for strong seawater intrusion into the Gaza aquifer. This scenario illustrates that, compared with 2010 situation of the baseline model, at the end of simulation period, year 2040, the amount of saltwater intrusion into the coastal aquifer will be increased by about 35 %, whereas the salinity will be increased by 34 %. In contrast, all three cases of the second (artificial recharge) scenario group can partly revert the present seawater intrusion. From the water budget point of view, compared with the first (do nothing) scenario, for year 2040, the water added to the aquifer by artificial recharge will reduces the amount of water entering the aquifer by seawater intrusion by 81, 77and 72 %, for the three recharge cases, respectively. Meanwhile, the salinity in the Gaza aquifer will be decreased by 15, 32 and 26% for the three cases, respectively.
Resumo:
Since no physical system can ever be completely isolated from its environment, the study of open quantum systems is pivotal to reliably and accurately control complex quantum systems. In practice, reliability of the control field needs to be confirmed via certification of the target evolution while accuracy requires the derivation of high-fidelity control schemes in the presence of decoherence. In the first part of this thesis an algebraic framework is presented that allows to determine the minimal requirements on the unique characterisation of arbitrary unitary gates in open quantum systems, independent on the particular physical implementation of the employed quantum device. To this end, a set of theorems is devised that can be used to assess whether a given set of input states on a quantum channel is sufficient to judge whether a desired unitary gate is realised. This allows to determine the minimal input for such a task, which proves to be, quite remarkably, independent of system size. These results allow to elucidate the fundamental limits regarding certification and tomography of open quantum systems. The combination of these insights with state-of-the-art Monte Carlo process certification techniques permits a significant improvement of the scaling when certifying arbitrary unitary gates. This improvement is not only restricted to quantum information devices where the basic information carrier is the qubit but it also extends to systems where the fundamental informational entities can be of arbitary dimensionality, the so-called qudits. The second part of this thesis concerns the impact of these findings from the point of view of Optimal Control Theory (OCT). OCT for quantum systems utilises concepts from engineering such as feedback and optimisation to engineer constructive and destructive interferences in order to steer a physical process in a desired direction. It turns out that the aforementioned mathematical findings allow to deduce novel optimisation functionals that significantly reduce not only the required memory for numerical control algorithms but also the total CPU time required to obtain a certain fidelity for the optimised process. The thesis concludes by discussing two problems of fundamental interest in quantum information processing from the point of view of optimal control - the preparation of pure states and the implementation of unitary gates in open quantum systems. For both cases specific physical examples are considered: for the former the vibrational cooling of molecules via optical pumping and for the latter a superconducting phase qudit implementation. In particular, it is illustrated how features of the environment can be exploited to reach the desired targets.