782 resultados para key innovations
Resumo:
OBJECTIVE: Best long-term practice in primary HIV-1 infection (PHI) remains unknown for the individual. A risk-based scoring system associated with surrogate markers of HIV-1 disease progression could be helpful to stratify patients with PHI at highest risk for HIV-1 disease progression. METHODS: We prospectively enrolled 290 individuals with well-documented PHI in the Zurich Primary HIV-1 Infection Study, an open-label, non-randomized, observational, single-center study. Patients could choose to undergo early antiretroviral treatment (eART) and stop it after one year of undetectable viremia, to go on with treatment indefinitely, or to defer treatment. For each patient we calculated an a priori defined "Acute Retroviral Syndrome Severity Score" (ARSSS), consisting of clinical and basic laboratory variables, ranging from zero to ten points. We used linear regression models to assess the association between ARSSS and log baseline viral load (VL), baseline CD4+ cell count, and log viral setpoint (sVL) (i.e. VL measured ≥90 days after infection or treatment interruption). RESULTS: Mean ARSSS was 2.89. CD4+ cell count at baseline was negatively correlated with ARSSS (p = 0.03, n = 289), whereas HIV-RNA levels at baseline showed a strong positive correlation with ARSSS (p<0.001, n = 290). In the regression models, a 1-point increase in the score corresponded to a 0.10 log increase in baseline VL and a CD4+cell count decline of 12/µl, respectively. In patients with PHI and not undergoing eART, higher ARSSS were significantly associated with higher sVL (p = 0.029, n = 64). In contrast, in patients undergoing eART with subsequent structured treatment interruption, no correlation was found between sVL and ARSSS (p = 0.28, n = 40). CONCLUSION: The ARSSS is a simple clinical score that correlates with the best-validated surrogate markers of HIV-1 disease progression. In regions where ART is not universally available and eART is not standard this score may help identifying patients who will profit the most from early antiretroviral therapy.
Resumo:
Isolated primary human cells from different donors vary in their permissiveness-the ability of cells to be infected and sustain the replication of human immunodeficiency virus type 1 (HIV-1). We used replicating HIV-1 and single-cycle lentivirus vectors in a population approach to identify polymorphic steps during viral replication. We found that phytohemagglutinin-stimulated CD4(+) CD45RO(+) CD57(-) T cells from healthy blood donors (n = 128) exhibited a 5.2-log-unit range in virus production. For 20 selected donors representing the spectrum of CD4 T-cell permissiveness, we could attribute up to 42% of the total variance in virus production to entry factors and 48% to postentry steps. Efficacy at key intracellular steps of the replicative cycle (reverse transcription, integration, transcription and splicing, translation, and budding and release) varied from 0.71 to 1.45 log units among donors. However, interindividual differences in transcription efficiency alone accounted for 64 to 83% of the total variance in virus production that was attributable to postentry factors. While vesicular stomatitis virus G protein-mediated fusion was more efficacious than CCR5/CD4 entry, the latter resulted in greater transcriptional activity per proviral copy. The phenotype of provirus transcription was stable over time, indicating that it represents a genetic trait.
Resumo:
Background: Glycogen-depleting exercise can lead to supercompensation of muscle glycogen stores, but the biochemical mechanisms of this phenomenon are still not completely understood. Methods: Using chronic low-frequency stimulation (CLFS) as an exercise model, the tibialis anterior muscle of rabbits was stimulated for either 1 or 24 hours, inducing a reduction in glycogen of 90% and 50% respectively. Glycogen recovery was subsequently monitored during 24 hours of rest. Results: In muscles stimulated for 1 hour, glycogen recovered basal levels during the rest period. However, in those stimulated for 24 hours, glycogen was supercompensated and its levels remained 50% higher than basal levels after 6 hours of rest, although the newly synthesized glycogen had fewer branches. This increase in glycogen correlated with an increase in hexokinase-2 expression and activity, a reduction in the glycogen phosphorylase activity ratio and an increase in the glycogen synthase activity ratio, due to dephosphorylation of site 3a, even in the presence of elevated glycogen stores. During supercompensation there was also an increase in 59-AMP-activated protein kinase phosphorylation, correlating with a stable reduction in ATP and total purine nucleotide levels. Conclusions: Glycogen supercompensation requires a coordinated chain of events at two levels in the context of decreased cell energy balance: First, an increase in the glucose phosphorylation capacity of the muscle and secondly, control of the enzymes directly involved in the synthesis and degradation of the glycogen molecule. However, supercompensated glycogen has fewer branches.
Resumo:
Normal pigmentation depends on the uniform distribution of melanin-containing vesicles, the melanosomes, in the epidermis. Griscelli syndrome (GS) is a rare autosomal recessive disease, characterized by an immune deficiency and a partial albinism that has been ascribed to an abnormal melanosome distribution. GS maps to 15q21 and was first associated with mutations in the myosin-V gene. However, it was demonstrated recently that GS can also be caused by a mutation in the Rab27a gene. These observations prompted us to investigate the role of Rab27a in melanosome transport. Using immunofluorescence and immunoelectron microscopy studies, we show that in normal melanocytes Rab27a colocalizes with melanosomes. In melanocytes isolated from a patient with GS, we show an abnormal melanosome distribution and a lack of Rab27a expression. Finally, reexpression of Rab27a in GS melanocytes restored melanosome transport to dendrite tips, leading to a phenotypic reversion of the diseased cells. These results identify Rab27a as a key component of vesicle transport machinery in melanocytes.
Resumo:
During 2008, we selected 8 studies of interest. It seems important to continue to treat high tension for old patients. To give a good medication against pain, to maintain activity and to reassure patient is the treatment for acute back pain; surgery for spinal stenosis has better results than other treatments at two years of evolution. Pregabalin seems to provide clinically benefit to patients with fibromyalgia. Helicobacter pylori test and treat has the same results than proton pomp inhibitor in initial management of dyspepsia; extending triple therapy beyond 7 days is unlikely to be a clinical useful strategy. Syphilis testing algorithms using treponemal tests for initial screening could be inversed. Finally, selective reporting of clinical trials results for antidepressant are relatively frequent.
Resumo:
Selostus: Perinnöllinen edistyminen suomalaisessa lypsykarjan jalostusohjelmassa
Resumo:
Recent studies assessing the role of biological diversity for ecosystem functioning indicate that the diversity of functional traits and the evolutionary history of species in a community, not the number of taxonomic units, ultimately drives the biodiversity-ecosystem-function relationship. Here, we simultaneously assessed the importance of plant functional trait and phylogenetic diversity as predictors of major trophic groups of soil biota (abundance and diversity), six years from the onset of a grassland biodiversity experiment. Plant functional and phylogenetic diversity were generally better predictors of soil biota than the traditionally used species or functional group richness. Functional diversity was a reliable predictor for most biota, with the exception of soil microorganisms, which were better predicted by phylogenetic diversity. These results provide empirical support for the idea that the diversity of plant functional traits and the diversity of evolutionary lineages in a community are important for maintaining higher abundances and diversity of soil communities.
Resumo:
Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.
Resumo:
Although sleep is defined as a behavioral state, at the cortical level sleep has local and use-dependent features suggesting that it is a property of neuronal assemblies requiring sleep in function of the activation experienced during prior wakefulness. Here we show that mature cortical cultured neurons display a default state characterized by synchronized burst-pause firing activity reminiscent of sleep. This default sleep-like state can be changed to transient tonic firing reminiscent of wakefulness when cultures are stimulated with a mixture of waking neurotransmitters and spontaneously returns to sleep-like state. In addition to electrophysiological similarities, the transcriptome of stimulated cultures strikingly resembles the cortical transcriptome of sleep-deprived mice, and plastic changes as reflected by AMPA receptors phosphorylation are also similar. We used our in vitro model and sleep-deprived animals to map the metabolic pathways activated by waking. Only a few metabolic pathways were identified, including glycolysis, aminoacid, and lipids. Unexpectedly large increases in lysolipids were found both in vivo after sleep deprivation and in vitro after stimulation, strongly suggesting that sleep might play a major role in reestablishing the neuronal membrane homeostasis. With our in vitro model, the cellular and molecular consequences of sleep and wakefulness can now be investigated in a dish.
Resumo:
A simple model of diffusion of innovations in a social network with upgrading costs is introduced. Agents are characterized by a single real variable, their technological level. According to local information, agents decide whether to upgrade their level or not, balancing their possible benefit with the upgrading cost. A critical point where technological avalanches display a power-law behavior is also found. This critical point is characterized by a macroscopic observable that turns out to optimize technological growth in the stationary state. Analytical results supporting our findings are found for the globally coupled case.
Resumo:
Through an act of the Iowa Legislature, the Violator Program came into existence some 20 years ago, the purpose of which was to provide an alternative to long-term imprisonment for those offenders whose probation/parole had been suspended. This 4-6 month program is currently administered at three locations: Luster Heights, Newton Correctional Release Center,and the Iowa Correctional Institution for Women.