907 resultados para Conceptual-systemic model
Resumo:
Teniendo en cuenta que la imagen turística ha sido reconocida como uno de los elementos más influyentes para la competitividad de los destinos turísticos, el principal objetivo de este artículo es construir un marco conceptual que muestre la influencia de la red relacional del destino en su imagen emitida. En este contexto, se asume que la imagen tu rística es una construcción social resultante de lainteracción de los distintos agentes que intervienen en el destino turístico (administraciones públicas, instituciones locales, empresas turísticas, etc.); y se propone un modelo teórico para mostrar los efectos de la red relacional del destino turístico en la calidad de la imagen turística creada en términos de conocimiento generado y, por tanto, en su competitividad
Resumo:
Although metabolic syndrome (MS) and systemic lupus erythematosus (SLE) are often associated, a common link has not been identified. Using the BWF1 mouse, which develops MS and SLE, we sought a molecular connection to explain the prevalence of these two diseases in the same individuals. We determined SLE- markers (plasma anti-ds-DNA antibodies, splenic regulatory T cells (Tregs) and cytokines, proteinuria and renal histology) and MS-markers (plasma glucose, non-esterified fatty acids, triglycerides, insulin and leptin, liver triglycerides, visceral adipose tissue, liver and adipose tissue expression of 86 insulin signaling-related genes) in 8-, 16-, 24-, and 36-week old BWF1 and control New-Zealand-White female mice. Up to week 16, BWF1 mice showed MS-markers (hyperleptinemia, hyperinsulinemia, fatty liver and visceral adipose tissue) that disappeared at week 36, when plasma anti-dsDNA antibodies, lupus nephritis and a pro-autoimmune cytokine profile were detected. BWF1 mice had hyperleptinemia and high splenic Tregs till week 16, thereby pointing to leptin resistance, as confirmed by the lack of increased liver P-Tyr-STAT-3. Hyperinsulinemia was associated with a down-regulation of insulin related-genes only in adipose tissue, whereas expression of liver mammalian target of rapamicyn (mTOR) was increased. Although leptin resistance presented early in BWF1 mice can slow-down the progression of autoimmunity, our results suggest that sustained insulin stimulation of organs, such as liver and probably kidneys, facilitates the over-expression and activity of mTOR and the development of SLE.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
Cancer pain significantly affects the quality of cancer patients, and current treatments for this pain are limited. C-Jun N-terminal kinase (JNK) has been implicated in tumor growth and neuropathic pain sensitization. We investigated the role of JNK in cancer pain and tumor growth in a skin cancer pain model. Injection of luciferase-transfected B16-Fluc melanoma cells into a hindpaw of mouse induced robust tumor growth, as indicated by increase in paw volume and fluorescence intensity. Pain hypersensitivity in this model developed rapidly (<5 days) and reached a peak in 2 weeks, and was characterized by mechanical allodynia and heat hyperalgesia. Tumor growth was associated with JNK activation in tumor mass, dorsal root ganglion (DRG), and spinal cord and a peripheral neuropathy, such as loss of nerve fibers in the hindpaw skin and induction of ATF-3 expression in DRG neurons. Repeated systemic injections of D-JNKI-1 (6 mg/kg, i.p.), a selective and cell-permeable peptide inhibitor of JNK, produced an accumulative inhibition of mechanical allodynia and heat hyperalgesia. A bolus spinal injection of D-JNKI-1 also inhibited mechanical allodynia. Further, JNK inhibition suppressed tumor growth in vivo and melanoma cell proliferation in vitro. In contrast, repeated injections of morphine (5 mg/kg), a commonly used analgesic for terminal cancer, produced analgesic tolerance after 1 day and did not inhibit tumor growth. Our data reveal a marked peripheral neuropathy in this skin cancer model and important roles of the JNK pathway in cancer pain development and tumor growth. JNK inhibitors such as D-JNKI-1 may be used to treat cancer pain.
Resumo:
The purposes of this report (Phase II of the project) are to specify in mathematical form the individual modules of the conceptual model developed in Phase I, to identify and evaluate sources of data for the model set, and to develop the transport networks necessary to support the models.
Resumo:
OBJECTIVE: We developed interferon-α-kinoid (IFN-K), a drug composed of inactivated IFNα coupled to a carrier protein, keyhole limpet hemocyanin. In human IFNα-transgenic mice, IFN-K induces polyclonal antibodies that neutralize all 13 subtypes of human IFNα. We also previously demonstrated that IFN-K slows disease progression in a mouse model of systemic lupus erythematosus (SLE). This study was undertaken to examine the safety, immunogenicity, and biologic effects of active immunization with IFN-K in patients with SLE. METHODS: We performed a randomized, double-blind, placebo-controlled, phase I/II dose-escalation study comparing 3 or 4 doses of 30 μg, 60 μg, 120 μg, or 240 μg of IFN-K or placebo in 28 women with mild to moderate SLE. RESULTS: IFN-K was well tolerated. Two SLE flares were reported as serious adverse events, one in the placebo group and the other in a patient who concomitantly stopped corticosteroids 2 days after the first IFN-K dose, due to mild fever not related to infection. Transcriptome analysis was used to separate patients at baseline into IFN signature-positive and -negative groups, based on the spontaneous expression of IFN-induced genes. IFN-K induced anti-IFNα antibodies in all immunized patients. Notably, significantly higher anti-IFNα titers were found in signature-positive patients than in signature-negative patients. In IFN signature-positive patients, IFN-K significantly reduced the expression of IFN-induced genes. The decrease in IFN score correlated with the anti-IFNα antibody titer. Serum complement C3 levels were significantly increased in patients with high anti-IFNα antibody titers. CONCLUSION: These results show that IFN-K is well tolerated, immunogenic, and significantly improves disease biomarkers in SLE patients, indicating that further studies of its clinical efficacy are warranted.
Resumo:
Beta-hemolytic Streptococcus agalactiae is the leading cause of bacteremia and invasive infections. These diseases are treated with β-lactams or macrolides, but the emergence of less susceptible and even fully resistant strains is a cause for concern. New bacteriophage lysins could be promising alternatives against such organisms. They hydrolyze the bacterial peptidoglycan at the end of the phage cycle, in order to release the phage progeny. By using a bioinformatic approach to screen several beta-hemolytic streptococci, a gene coding for a lysin was identified on a prophage carried by Streptococcus dysgalactiae subsp. equisimilis SK1249. The gene product, named PlySK1249, harbored an original three-domain structure with a central cell wall-binding domain surrounded by an N-terminal amidase and a C-terminal CHAP domain. Purified PlySK1249 was highly lytic and bactericidal for S. dysgalactiae (2-log10 CFU/ml decrease within 15 min). Moreover, it also efficiently killed S. agalactiae (1.5-log10 CFU/ml decrease within 15 min) but not several streptococcal commensal species. We further investigated the activity of PlySK1249 in a mouse model of S. agalactiae bacteremia. Eighty percent of the animals (n = 10) challenged intraperitoneally with 10(6) CFU of S. agalactiae died within 72 h, whereas repeated injections of PlySK1249 (45 mg/kg 3 times within 24 h) significantly protected the mice (P < 0.01). Thus, PlySK1249, which was isolated from S. dysgalactiae, demonstrated high cross-lytic activity against S. agalactiae both in vitro and in vivo. These encouraging results indicated that PlySK1249 might represent a good candidate to be developed as a new enzybiotic for the treatment of systemic S. agalactiae infections.
Integration in strategic alliances : a conceptual framework of IT use in marketing as NPD key factor
Resumo:
En una economia basada en el coneixement, la innovació del producte es considera un factor clau a l'hora de determinar la competitivitat, la productivitat i el creixement d'una companyia. No obstant això, l'experiència de les companyies demostra la necessitat d'un nou model de gestió de la innovació del producte: una gestió basada en el màrqueting, en què la cooperació i l'ús intensiu de les tecnologies de la informació i de la comunicació (TIC) són especialment importants. En els darrers anys, la bibliografia sobre màrqueting ha analitzat el paper de la cooperació en l'èxit del procés d'innovació. No obstant això, fins ara pocs treballs han estudiat el paper que té l'ús de les TIC en el màrqueting en l'èxit del desenvolupament de nous productes (NPD, New Product Development en anglès). És una omissió curiosa, tenint en compte que el nou entorn competitiu és definit per una economia i una societat basades principalment en l'ús intensiu de les TIC i del coneixement. L'objectiu d'aquest treball és investigar el paper que l'ús de les TIC en el màrqueting té en el procés de desenvolupament de nous productes, com a element que reforça la integració d'agents al projecte, afavorint l'establiment de relacions dirigides a la cooperació i l'adquisició d'intel·ligència de mercat útil en el procés de desenvolupament de nous productes. L'estudi d'una mostra de 2.038 companyies de tots els sectors de l'activitat econòmica a Catalunya ens permet contrastar hipòtesis inicials i establir un perfil de companyia innovadora basat en les importants relacions que hi ha entre la innovació, l'ús de TIC en el màrqueting i la integració. Sobresurten dues idees en la nostra anàlisi. En primer lloc, l'ús intensiu de les TIC en el màrqueting fa que la companyia sigui més innovadora, ja que percep que el seu ús ajuda a superar barreres a la innovació i accelera els processos, que es tornen més eficients. En segon lloc, incrementant l'ús de les TIC en el màrqueting es fa augmentar la predisposició de la companyia a integrar agents particulars en l'entorn de negoci en el desenvolupament del procés d'innovació i a col·laborar-hi, de manera que es millora el grau d'adaptació del nou producte a les demandes del mercat.
Resumo:
The changing business environment demands that chemical industrial processes be designed such that they enable the attainment of multi-objective requirements and the enhancement of innovativedesign activities. The requirements and key issues for conceptual process synthesis have changed and are no longer those of conventional process design; there is an increased emphasis on innovative research to develop new concepts, novel techniques and processes. A central issue, how to enhance the creativity of the design process, requires further research into methodologies. The thesis presentsa conflict-based methodology for conceptual process synthesis. The motivation of the work is to support decision-making in design and synthesis and to enhance the creativity of design activities. It deals with the multi-objective requirements and combinatorially complex nature of process synthesis. The work is carriedout based on a new concept and design paradigm adapted from Theory of InventiveProblem Solving methodology (TRIZ). TRIZ is claimed to be a `systematic creativity' framework thanks to its knowledge based and evolutionary-directed nature. The conflict concept, when applied to process synthesis, throws new lights on design problems and activities. The conflict model is proposed as a way of describing design problems and handling design information. The design tasks are represented as groups of conflicts and conflict table is built as the design tool. The general design paradigm is formulated to handle conflicts in both the early and detailed design stages. The methodology developed reflects the conflict nature of process design and synthesis. The method is implemented and verified through case studies of distillation system design, reactor/separator network design and waste minimization. Handling the various levels of conflicts evolve possible design alternatives in a systematic procedure which consists of establishing an efficient and compact solution space for the detailed design stage. The approach also provides the information to bridge the gap between the application of qualitative knowledge in the early stage and quantitative techniques in the detailed design stage. Enhancement of creativity is realized through the better understanding of the design problems gained from the conflict concept and in the improvement in engineering design practice via the systematic nature of the approach.
Resumo:
It has been convincingly argued that computer simulation modeling differs from traditional science. If we understand simulation modeling as a new way of doing science, the manner in which scientists learn about the world through models must also be considered differently. This article examines how researchers learn about environmental processes through computer simulation modeling. Suggesting a conceptual framework anchored in a performative philosophical approach, we examine two modeling projects undertaken by research teams in England, both aiming to inform flood risk management. One of the modeling teams operated in the research wing of a consultancy firm, the other were university scientists taking part in an interdisciplinary project experimenting with public engagement. We found that in the first context the use of standardized software was critical to the process of improvisation, the obstacles emerging in the process concerned data and were resolved through exploiting affordances for generating, organizing, and combining scientific information in new ways. In the second context, an environmental competency group, obstacles were related to the computer program and affordances emerged in the combination of experience-based knowledge with the scientists' skill enabling a reconfiguration of the mathematical structure of the model, allowing the group to learn about local flooding.
Resumo:
The advent of new advances in mobile computing has changed the manner we do our daily work, even enabling us to perform collaborative activities. However, current groupware approaches do not offer an integrating and efficient solution that jointly tackles the flexibility and heterogeneity inherent to mobility as well as the awareness aspects intrinsic to collaborative environments. Issues related to the diversity of contexts of use are collected under the term plasticity. A great amount of tools have emerged offering a solution to some of these issues, although always focused on individual scenarios. We are working on reusing and specializing some already existing plasticity tools to the groupware design. The aim is to offer the benefits from plasticity and awareness jointly, trying to reach a real collaboration and a deeper understanding of multi-environment groupware scenarios. In particular, this paper presents a conceptual framework aimed at being a reference for the generation of plastic User Interfaces for collaborative environments in a systematic and comprehensive way. Starting from a previous conceptual framework for individual environments, inspired on the model-based approach, we introduce specific components and considerations related to groupware.
Resumo:
Geophysical data may provide crucial information about hydrological properties, states, and processes that are difficult to obtain by other means. Large data sets can be acquired over widely different scales in a minimally invasive manner and at comparatively low costs, but their effective use in hydrology makes it necessary to understand the fidelity of geophysical models, the assumptions made in their construction, and the links between geophysical and hydrological properties. Geophysics has been applied for groundwater prospecting for almost a century, but it is only in the last 20 years that it is regularly used together with classical hydrological data to build predictive hydrological models. A largely unexplored venue for future work is to use geophysical data to falsify or rank competing conceptual hydrological models. A promising cornerstone for such a model selection strategy is the Bayes factor, but it can only be calculated reliably when considering the main sources of uncertainty throughout the hydrogeophysical parameter estimation process. Most classical geophysical imaging tools tend to favor models with smoothly varying property fields that are at odds with most conceptual hydrological models of interest. It is thus necessary to account for this bias or use alternative approaches in which proposed conceptual models are honored at all steps in the model building process.
Resumo:
BACKGROUND: Low-dose, Visudyne®-mediated photodynamic therapy (photo-induction) was shown to selectively enhance tumor vessel transport causing increased uptake of systemically administered chemotherapy in various tumor types grown on rodent lungs. The present experiments explore the efficacy of photo-induced vessel modulation combined to intravenous (IV) liposomal cisplatin (Lipoplatin®) on rodent lung tumors and the feasibility/toxicity of this approach in porcine chest cavities. MATERIAL AND METHODS: Three groups of Fischer rats underwent orthotopic sarcoma (n = 14), mesothelioma (n = 14), or adenocarcinoma (n = 12) implantation on the left lung. Half of the animals of each group had photo-induction (0.0625 mg/kg Visudyne®, 10 J/cm(2) ) followed by IV administration of Lipoplatin® (5 mg/kg) and the other half received Lipoplatin® without photo-induction. Then, two groups of minipigs underwent intrapleural thoracoscopic (VATS) photo-induction (0.0625 mg/kg Visudyne®; 30 J/cm(2) hilum; 10 J/cm(2) apex/diaphragm) with in situ light dosimetry in combination with IV Lipoplatin® administration (5 mg/kg). Protocol I (n = 6) received Lipoplatin® immediately after light delivery and Protocol II (n = 9) 90 minutes before light delivery. Three additional animals received Lipoplatin® and VATS pleural biopsies but no photo-induction (controls). Lipoplatin® concentrations were analyzed in blood and tissues before and at regular intervals after photo-induction using inductively coupled plasma mass spectrometry. RESULTS: Photo-induction selectively increased Lipoplatin® uptake in all orthotopic tumors. It significantly increased the ratio of tumor to lung Lipoplatin® concentration in sarcoma (P = 0.0008) and adenocarcinoma (P = 0.01) but not in mesothelioma, compared to IV drug application alone. In minipigs, intrapleural photo-induction combined to systemic Lipoplatin® was well tolerated with no toxicity at 7 days for both treatment protocols. The pleural Lipoplatin® concentrations were not significantly different at 10 and 30 J/cm(2) locations but they were significantly higher in protocol I compared to II (2.37 ± 0.7 vs. 1.37 ± 0.7 ng/mg, P < 0.001). CONCLUSION: Visudyne®-mediated photo-induction selectively enhances the uptake of IV administered Lipoplatin® in rodent lung tumors. Intrapleural VATS photo-induction with identical treatment conditions combined to IV Lipoplatin chemotherapy is feasible and well tolerated in a porcine model. Lasers Surg. Med. 47:807-816, 2015. © 2015 Wiley Periodicals, Inc.
Resumo:
We have previously demonstrated that exercise training prevents the development of Angiotensin (Ang) II-induced atherosclerosis and vulnerable plaques in Apolipoprotein E-deficient (ApoE-/-) mice. In this report, we investigated whether exercise attenuates progression and promotes stability in pre-established vulnerable lesions. To this end, ApoE-/- mice with already established Ang II-mediated advanced and vulnerable lesions (2-kidney, 1-clip [2K1C] renovascular hypertension model), were subjected to sedentary (SED) or voluntary wheel running training (EXE) regimens for 4 weeks. Mean blood pressure and plasma renin activity did not significantly differ between the two groups, while total plasma cholesterol significantly decreased in 2K1C EXE mice. Aortic plaque size was significantly reduced by 63% in 2K1C EXE compared to SED mice. Plaque stability score was significantly higher in 2K1C EXE mice than in SED ones. Aortic ICAM-1 mRNA expression was significantly down-regulated following EXE. Moreover, EXE significantly down-regulated splenic pro-inflammatory cytokines IL-18, and IL-1β mRNA expression while increasing that of anti-inflammatory cytokine IL-4. Reduction in plasma IL-18 levels was also observed in response to EXE. There was no significant difference in aortic and splenic Th1/Th2 and M1/M2 polarization markers mRNA expression between the two groups. Our results indicate that voluntary EXE is effective in slowing progression and promoting stabilization of pre-existing Ang II-dependent vulnerable lesions by ameliorating systemic inflammatory state. Our findings support a therapeutic role for voluntary EXE in patients with established atherosclerosis.
Resumo:
PURPOSE: Pretreatment measurements of systemic inflammatory response, including the Glasgow prognostic score (GPS), the neutrophil-to-lymphocyte ratio (NLR), the monocyte-to-lymphocyte ratio (MLR), the platelet-to-lymphocyte ratio (PLR) and the prognostic nutritional index (PNI) have been recognized as prognostic factors in clear cell renal cell carcinoma (CCRCC), but there is at present no study that compared these markers. METHODS: We evaluated the pretreatment GPS, NLR, MLR, PLR and PNI in 430 patients, who underwent surgery for clinically localized CCRCC (pT1-3N0M0). Associations with disease-free survival were assessed with Cox models. Discrimination was measured with the C-index, and a decision curve analysis was used to evaluate the clinical net benefit. RESULTS: On multivariable analyses, all measures of systemic inflammatory response were significant prognostic factors. The increase in discrimination compared with the stage, size, grade and necrosis (SSIGN) score alone was 5.8 % for the GPS, 1.1-1.4 % for the NLR, 2.9-3.4 % for the MLR, 2.0-3.3 % for the PLR and 1.4-3.0 % for the PNI. On the simultaneous multivariable analysis of all candidate measures, the final multivariable model contained the SSIGN score (HR 1.40, P < 0.001), the GPS (HR 2.32, P < 0.001) and the MLR (HR 5.78, P = 0.003) as significant variables. Adding both the GPS and the MLR increased the discrimination of the SSIGN score by 6.2 % and improved the clinical net benefit. CONCLUSIONS: In patients with clinically localized CCRCC, the GPS and the MLR appear to be the most relevant prognostic measures of systemic inflammatory response. They may be used as an adjunct for patient counseling, tailoring management and clinical trial design.