930 resultados para Vector Signatures
Resumo:
The decision-making process regarding drug dose, regularly used in everyday medical practice, is critical to patients' health and recovery. It is a challenging process, especially for a drug with narrow therapeutic ranges, in which a medical doctor decides the quantity (dose amount) and frequency (dose interval) on the basis of a set of available patient features and doctor's clinical experience (a priori adaptation). Computer support in drug dose administration makes the prescription procedure faster, more accurate, objective, and less expensive, with a tendency to reduce the number of invasive procedures. This paper presents an advanced integrated Drug Administration Decision Support System (DADSS) to help clinicians/patients with the dose computing. Based on a support vector machine (SVM) algorithm, enhanced with the random sample consensus technique, this system is able to predict the drug concentration values and computes the ideal dose amount and dose interval for a new patient. With an extension to combine the SVM method and the explicit analytical model, the advanced integrated DADSS system is able to compute drug concentration-to-time curves for a patient under different conditions. A feedback loop is enabled to update the curve with a new measured concentration value to make it more personalized (a posteriori adaptation).
Resumo:
Yeasts are responsible for several traits in fermented beverages, including wine and beer, and their genetic manipulation is often necessary to improve the quality of the fermentation product. Improvement of wild-type strains of Saccharomyces cerevisiae and Saccharomyces pastorianus is difficult due to their homothallic character and variable ploidy level. Homothallism is determined by the HO gene in S. cerevisiae and the Sc-HO gene in S. pastorianus. In this work, we describe the construction of an HO disruption vector (pDHO) containing an HO disruption cassette and discuss its use in generating heterothallic yeast strains from homothallic Saccharomyces species.
Resumo:
Parasite population structure is often thought to be largely shaped by that of its host. In the case of a parasite with a complex life cycle, two host species, each with their own patterns of demography and migration, spread the parasite. However, the population structure of the parasite is predicted to resemble only that of the most vagile host species. In this study, we tested this prediction in the context of a vector-transmitted parasite. We sampled the haemosporidian parasite Polychromophilus melanipherus across its European range, together with its bat fly vector Nycteribia schmidlii and its host, the bent-winged bat Miniopterus schreibersii. Based on microsatellite analyses, the wingless vector, and not the bat host, was identified as the least structured population and should therefore be considered the most vagile host. Genetic distance matrices were compared for all three species based on a mitochondrial DNA fragment. Both host and vector populations followed an isolation-by-distance pattern across the Mediterranean, but not the parasite. Mantel tests found no correlation between the parasite and either the host or vector populations. We therefore found no support for our hypothesis; the parasite population structure matched neither vector nor host. Instead, we propose a model where the parasite's gene flow is represented by the added effects of host and vector dispersal patterns.
Resumo:
This work proposes the detection of red peaches in orchard images based on the definition of different linear color models in the RGB vector color space. The classification and segmentation of the pixels of the image is then performed by comparing the color distance from each pixel to the different previously defined linear color models. The methodology proposed has been tested with images obtained in a real orchard under natural light. The peach variety in the orchard was the paraguayo (Prunus persica var. platycarpa) peach with red skin. The segmentation results showed that the area of the red peaches in the images was detected with an average error of 11.6%; 19.7% in the case of bright illumination; 8.2% in the case of low illumination; 8.6% for occlusion up to 33%; 12.2% in the case of occlusion between 34 and 66%; and 23% for occlusion above 66%. Finally, a methodology was proposed to estimate the diameter of the fruits based on an ellipsoidal fitting. A first diameter was obtained by using all the contour pixels and a second diameter was obtained by rejecting some pixels of the contour. This approach enables a rough estimate of the fruit occlusion percentage range by comparing the two diameter estimates.
Resumo:
This thesis is composed of three main parts. The first consists of a state of the art of the different notions that are significant to understand the elements surrounding art authentication in general, and of signatures in particular, and that the author deemed them necessary to fully grasp the microcosm that makes up this particular market. Individuals with a solid knowledge of the art and expertise area, and that are particularly interested in the present study are advised to advance directly to the fourth Chapter. The expertise of the signature, it's reliability, and the factors impacting the expert's conclusions are brought forward. The final aim of the state of the art is to offer a general list of recommendations based on an exhaustive review of the current literature and given in light of all of the exposed issues. These guidelines are specifically formulated for the expertise of signatures on paintings, but can also be applied to wider themes in the area of signature examination. The second part of this thesis covers the experimental stages of the research. It consists of the method developed to authenticate painted signatures on works of art. This method is articulated around several main objectives: defining measurable features on painted signatures and defining their relevance in order to establish the separation capacities between groups of authentic and simulated signatures. For the first time, numerical analyses of painted signatures have been obtained and are used to attribute their authorship to given artists. An in-depth discussion of the developed method constitutes the third and final part of this study. It evaluates the opportunities and constraints when applied by signature and handwriting experts in forensic science. A brief summary covering each chapter allows a rapid overview of the study and summarizes the aims and main themes of each chapter. These outlines presented below summarize the aims and main themes addressed in each chapter. Part I - Theory Chapter 1 exposes legal aspects surrounding the authentication of works of art by art experts. The definition of what is legally authentic, the quality and types of the experts that can express an opinion concerning the authorship of a specific painting, and standard deontological rules are addressed. The practices applied in Switzerland will be specifically dealt with. Chapter 2 presents an overview of the different scientific analyses that can be carried out on paintings (from the canvas to the top coat). Scientific examinations of works of art have become more common, as more and more museums equip themselves with laboratories, thus an understanding of their role in the art authentication process is vital. The added value that a signature expertise can have in comparison to other scientific techniques is also addressed. Chapter 3 provides a historical overview of the signature on paintings throughout the ages, in order to offer the reader an understanding of the origin of the signature on works of art and its evolution through time. An explanation is given on the transitions that the signature went through from the 15th century on and how it progressively took on its widely known modern form. Both this chapter and chapter 2 are presented to show the reader the rich sources of information that can be provided to describe a painting, and how the signature is one of these sources. Chapter 4 focuses on the different hypotheses the FHE must keep in mind when examining a painted signature, since a number of scenarios can be encountered when dealing with signatures on works of art. The different forms of signatures, as well as the variables that may have an influence on the painted signatures, are also presented. Finally, the current state of knowledge of the examination procedure of signatures in forensic science in general, and in particular for painted signatures, is exposed. The state of the art of the assessment of the authorship of signatures on paintings is established and discussed in light of the theoretical facets mentioned previously. Chapter 5 considers key elements that can have an impact on the FHE during his or her2 examinations. This includes a discussion on elements such as the skill, confidence and competence of an expert, as well as the potential bias effects he might encounter. A better understanding of elements surrounding handwriting examinations, to, in turn, better communicate results and conclusions to an audience, is also undertaken. Chapter 6 reviews the judicial acceptance of signature analysis in Courts and closes the state of the art section of this thesis. This chapter brings forward the current issues pertaining to the appreciation of this expertise by the non- forensic community, and will discuss the increasing number of claims of the unscientific nature of signature authentication. The necessity to aim for more scientific, comprehensive and transparent authentication methods will be discussed. The theoretical part of this thesis is concluded by a series of general recommendations for forensic handwriting examiners in forensic science, specifically for the expertise of signatures on paintings. These recommendations stem from the exhaustive review of the literature and the issues exposed from this review and can also be applied to the traditional examination of signatures (on paper). Part II - Experimental part Chapter 7 describes and defines the sampling, extraction and analysis phases of the research. The sampling stage of artists' signatures and their respective simulations are presented, followed by the steps that were undertaken to extract and determine sets of characteristics, specific to each artist, that describe their signatures. The method is based on a study of five artists and a group of individuals acting as forgers for the sake of this study. Finally, the analysis procedure of these characteristics to assess of the strength of evidence, and based on a Bayesian reasoning process, is presented. Chapter 8 outlines the results concerning both the artist and simulation corpuses after their optical observation, followed by the results of the analysis phase of the research. The feature selection process and the likelihood ratio evaluation are the main themes that are addressed. The discrimination power between both corpuses is illustrated through multivariate analysis. Part III - Discussion Chapter 9 discusses the materials, the methods, and the obtained results of the research. The opportunities, but also constraints and limits, of the developed method are exposed. Future works that can be carried out subsequent to the results of the study are also presented. Chapter 10, the last chapter of this thesis, proposes a strategy to incorporate the model developed in the last chapters into the traditional signature expertise procedures. Thus, the strength of this expertise is discussed in conjunction with the traditional conclusions reached by forensic handwriting examiners in forensic science. Finally, this chapter summarizes and advocates a list of formal recommendations for good practices for handwriting examiners. In conclusion, the research highlights the interdisciplinary aspect of signature examination of signatures on paintings. The current state of knowledge of the judicial quality of art experts, along with the scientific and historical analysis of paintings and signatures, are overviewed to give the reader a feel of the different factors that have an impact on this particular subject. The temperamental acceptance of forensic signature analysis in court, also presented in the state of the art, explicitly demonstrates the necessity of a better recognition of signature expertise by courts of law. This general acceptance, however, can only be achieved by producing high quality results through a well-defined examination process. This research offers an original approach to attribute a painted signature to a certain artist: for the first time, a probabilistic model used to measure the discriminative potential between authentic and simulated painted signatures is studied. The opportunities and limits that lie within this method of scientifically establishing the authorship of signatures on works of art are thus presented. In addition, the second key contribution of this work proposes a procedure to combine the developed method into that used traditionally signature experts in forensic science. Such an implementation into the holistic traditional signature examination casework is a large step providing the forensic, judicial and art communities with a solid-based reasoning framework for the examination of signatures on paintings. The framework and preliminary results associated with this research have been published (Montani, 2009a) and presented at international forensic science conferences (Montani, 2009b; Montani, 2012).
Resumo:
BACKGROUND: Known antiretroviral restriction factors are encoded by genes that are under positive selection pressure, induced during HIV-1 infection, up-regulated by interferons, and/or interact with viral proteins. To identify potential novel restriction factors, we performed genome-wide scans for human genes sharing molecular and evolutionary signatures of known restriction factors and tested the anti-HIV-1 activity of the most promising candidates. RESULTS: Our analyses identified 30 human genes that share characteristics of known restriction factors. Functional analyses of 27 of these candidates showed that over-expression of a strikingly high proportion of them significantly inhibited HIV-1 without causing cytotoxic effects. Five factors (APOL1, APOL6, CD164, TNFRSF10A, TNFRSF10D) suppressed infectious HIV-1 production in transfected 293T cells by >90% and six additional candidates (FCGR3A, CD3E, OAS1, GBP5, SPN, IFI16) achieved this when the virus was lacking intact accessory vpr, vpu and nef genes. Unexpectedly, over-expression of two factors (IL1A, SP110) significantly increased infectious HIV-1 production. Mechanistic studies suggest that the newly identified potential restriction factors act at different steps of the viral replication cycle, including proviral transcription and production of viral proteins. Finally, we confirmed that mRNA expression of most of these candidate restriction factors in primary CD4+ T cells is significantly increased by type I interferons. CONCLUSIONS: A limited number of human genes share multiple characteristics of genes encoding for known restriction factors. Most of them display anti-retroviral activity in transient transfection assays and are expressed in primary CD4+ T cells.
Resumo:
In this present work, we are proposing a characteristics reduction system for a facial biometric identification system, using transformed domains such as discrete cosine transformed (DCT) and discrete wavelets transformed (DWT) as parameterization; and Support Vector Machines (SVM) and Neural Network (NN) as classifiers. The size reduction has been done with Principal Component Analysis (PCA) and with Independent Component Analysis (ICA). This system presents a similar success results for both DWT-SVM system and DWT-PCA-SVM system, about 98%. The computational load is improved on training mode due to the decreasing of input’s size and less complexity of the classifier.
Resumo:
UNLABELLED: NYVAC, a highly attenuated, replication-restricted poxvirus, is a safe and immunogenic vaccine vector. Deletion of immune evasion genes from the poxvirus genome is an attractive strategy for improving the immunogenic properties of poxviruses. Using systems biology approaches, we describe herein the enhanced immunological profile of NYVAC vectors expressing the HIV-1 clade C env, gag, pol, and nef genes (NYVAC-C) with single or double deletions of genes encoding type I (ΔB19R) or type II (ΔB8R) interferon (IFN)-binding proteins. Transcriptomic analyses of human monocytes infected with NYVAC-C, NYVAC-C with the B19R deletion (NYVAC-C-ΔB19R), or NYVAC-C with B8R and B19R deletions (NYVAC-C-ΔB8RB19R) revealed a concerted upregulation of innate immune pathways (IFN-stimulated genes [ISGs]) of increasing magnitude with NYVAC-C-ΔB19R and NYVAC-C-ΔB8RB19R than with NYVAC-C. Deletion of B8R and B19R resulted in an enhanced activation of IRF3, IRF7, and STAT1 and the robust production of type I IFNs and of ISGs, whose expression was inhibited by anti-type I IFN antibodies. Interestingly, NYVAC-C-ΔB8RB19R induced the production of much higher levels of proinflammatory cytokines (tumor necrosis factor [TNF], interleukin-6 [IL-6], and IL-8) than NYVAC-C or NYVAC-C-ΔB19R as well as a strong inflammasome response (caspase-1 and IL-1β) in infected monocytes. Top network analyses showed that this broad response mediated by the deletion of B8R and B19R was organized around two upregulated gene expression nodes (TNF and IRF7). Consistent with these findings, monocytes infected with NYVAC-C-ΔB8RB19R induced a stronger type I IFN-dependent and IL-1-dependent allogeneic CD4(+) T cell response than monocytes infected with NYVAC-C or NYVAC-C-ΔB19R. Dual deletion of type I and type II IFN immune evasion genes in NYVAC markedly enhanced its immunogenic properties via its induction of the increased expression of type I IFNs and IL-1β and make it an attractive candidate HIV vaccine vector. IMPORTANCE: NYVAC is a replication-deficient poxvirus developed as a vaccine vector against HIV. NYVAC expresses several genes known to impair the host immune defenses by interfering with innate immune receptors, cytokines, or interferons. Given the crucial role played by interferons against viruses, we postulated that targeting the type I and type II decoy receptors used by poxvirus to subvert the host innate immune response would be an attractive approach to improve the immunogenicity of NYVAC vectors. Using systems biology approaches, we report that deletion of type I and type II IFN immune evasion genes in NYVAC poxvirus resulted in the robust expression of type I IFNs and interferon-stimulated genes (ISGs), a strong activation of the inflammasome, and upregulated expression of IL-1β and proinflammatory cytokines. Dual deletion of type I and type II IFN immune evasion genes in NYVAC poxvirus improves its immunogenic profile and makes it an attractive candidate HIV vaccine vector.
Resumo:
We study the interaction of vector mesons with the octet of stable baryons in the framework of the local hidden gauge formalism using a coupled channels unitary approach. We examine the scattering amplitudes and their poles, which can be associated to known J P = 1/2- , 3/2- baryon resonances, in some cases, or give predictions in other ones. The formalism employed produces doublets of degenerate J P = 1/2- , 3/2- states, a pattern which is observed experimentally in several cases. The findings of this work should also be useful to guide present experimental programs searching for new resonances, in particular in the strange sector where the current information is very poor.
Resumo:
Laboratory and field experiments have demonstrated in many cases that malaria vectors do not feed randomly, but show important preferences either for infected or non-infected hosts. These preferences are likely in part shaped by the costs imposed by the parasites on both their vertebrate and dipteran hosts. However, the effect of changes in vector behaviour on actual parasite transmission remains a debated issue. We used the natural associations between a malaria-like parasite Polychromophilus murinus, the bat fly Nycteribia kolenatii and a vertebrate host the Daubenton's bat Myotis daubentonii to test the vector's feeding preference based on the host's infection status using two different approaches: 1) controlled behavioural assays in the laboratory where bat flies could choose between a pair of hosts; 2) natural bat fly abundance data from wild-caught bats, serving as an approximation of realised feeding preference of the bat flies. Hosts with the fewest infectious stages of the parasite were most attractive to the bat flies that did switch in the behavioural assay. In line with the hypothesis of costs imposed by parasites on their vectors, bat flies carrying parasites had higher mortality. However, in wild populations, bat flies were found feeding more based on the bat's body condition, rather than its infection level. Though the absolute frequency of host switches performed by the bat flies during the assays was low, in the context of potential parasite transmission they were extremely high. The decreased survival of infected bat flies suggests that the preference for less infected hosts is an adaptive trait. Nonetheless, other ecological processes ultimately determine the vector's biting rate and thus transmission. Inherent vector preferences therefore play only a marginal role in parasite transmission in the field. The ecological processes rather than preferences per se need to be identified for successful epidemiological predictions.
Resumo:
Neurodevelopmental disruptions caused by obstetric complications play a role in the etiology of several phenotypes associated with neuropsychiatric diseases and cognitive dysfunctions. Importantly, it has been noticed that epigenetic processes occurring early in life may mediate these associations. Here, DNA methylation signatures at IGF2 (insulin-like growth factor 2) and IGF2BP1-3 (IGF2-binding proteins 1-3) were examined in a sample consisting of 34 adult monozygotic (MZ) twins informative for obstetric complications and cognitive performance. Multivariate linear regression analysis of twin data was implemented to test for associations between methylation levels and both birth weight (BW) and adult working memory (WM) performance. Familial and unique environmental factors underlying these potential relationships were evaluated. A link was detected between DNA methylation levels of two CpG sites in the IGF2BP1 gene and both BW and adult WM performance. The BW-IGF2BP1 methylation association seemed due to non-shared environmental factors influencing BW, whereas the WM-IGF2BP1 methylation relationship seemed mediated by both genes and environment. Our data is in agreement with previous evidence indicating that DNA methylation status may be related to prenatal stress and later neurocognitive phenotypes. While former reports independently detected associations between DNA methylation and either BW or WM, current results suggest that these relationships are not confounded by each other.
Resumo:
Ticks transmit more pathogens to humans and animals than any other arthropod. We describe the 2.1 Gbp nuclear genome of the tick, Ixodes scapularis (Say), which vectors pathogens that cause Lyme disease, human granulocytic anaplasmosis, babesiosis and other diseases. The large genome reflects accumulation of repetitive DNA, new lineages of retro-transposons, and gene architecture patterns resembling ancient metazoans rather than pancrustaceans. Annotation of scaffolds representing ∼57% of the genome, reveals 20,486 protein-coding genes and expansions of gene families associated with tick-host interactions. We report insights from genome analyses into parasitic processes unique to ticks, including host 'questing', prolonged feeding, cuticle synthesis, blood meal concentration, novel methods of haemoglobin digestion, haem detoxification, vitellogenesis and prolonged off-host survival. We identify proteins associated with the agent of human granulocytic anaplasmosis, an emerging disease, and the encephalitis-causing Langat virus, and a population structure correlated to life-history traits and transmission of the Lyme disease agent.
Resumo:
Feeding ecology and geographic location are 2 major factors influencing animal stable isotope signatures, but their relative contributions are poorly understood, which limits the usefulness of stable isotope analysis in the study of animal ecology. To improve our knowledge of the main sources of isotopic variability at sea, we determined δ15N and δ13C signatures in the first primary feather of adult birds from 11 Procellariiform species (n = 609) across 16 northeast Atlantic localities, from Cape Verde (20°N) to Iceland (60°N). Post-breeding areas (where the studied feather is thought to be grown) were determined using light-level geolocation for 6 of the 11 species. Isotopic variability was geographically unstructured within the mid-northeast Atlantic (Macaronesian archipelagos), but trophically structured according to species and regardless of the breeding location, presumably as a result of trophic segregation among species. Indeed, the interspecific isotopic overlap resulting from combining δ15N and δ13C signatures of seabirds was low, which suggests that most species exploited exclusive trophic resources consistently across their geographic range. Species breeding in north temperate regions (Iceland, Scotland and Northern Ireland) showed enriched δ15N compared to the same or similar species breeding in tropical and subtropical regions, suggesting some differences in baseline levels between these regions. The present study illustrates a noticeable trophic segregation of northeast Atlantic Procellariiformes. Our results show that the isotopic approach has limited applicability for the study of animal movements in the northeast Atlantic at a regional scale, but is potentially useful for the study of long-distance migrations between large marine systems
Resumo:
Phase encoded nano structures such as Quick Response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase encoded QR codes. The system is illuminated using polarized light and the QR code is encoded using a phase-only random mask. Using classification algorithms it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase encoded QR codes using polarimetric signatures.