90 resultados para delete
Resumo:
Résumé La dérégulation de c-Myc est un événement fréquent de la transformation cellulaire. Une régulation positive de cette oncoprotéine a été démontrée dans divers mélanomes cutanés primaires et métastatiques et est associée à un pronostic défavorable (Grover et al., 1996; Zhuang et al., 2008). c-Myc est considéré comme une molécule centrale impliquée dans plusieurs processus de l'homéostasie cellulaire. En raison de sa contribution importante dans la progression tumorale, la fonction de c-Myc a été étudiée intensément. Cependant nous connaissons peu le rôle de ce facteur de transcription dans l'embryogenèse et dans la spécification tissulaire. Un déficit total de c-Myc pendant l'embryogenèse conduit à la mort embryonnaire avant 10.5 jours de gestation. Cette mort est causée par de multiples imperfections du développement touchant la taille de l'embryon, le coeur, le péricarde, le tube neural et les cellules sanguines (Davis et al., 1993; Trumpp et al., 2001). Récemment, il a été montré que la plupart de ces anomalies sont secondaires et résultent d'une insuffisance du placenta dans les embryons c-myc-/- (Dubois et al., 2008). Sachant que c-Myc est important dans la maintenance des lignées de la crête neurale (Wei et al., 2007), nous nous sommes intéressés au rôle de c-Myc dans le développement des cellules pigmentaires et à leur homéostasie après la naissance. Un allèle floxé de c-myc (Trumpp et al., 2001) a été utilisé pour supprimer ce gène spécifiquement dans la lignée mélanocytaire à l'aide d'une souris transgénique Tyr::Cre (Delmas et al., 2003). L'ablation des deux allèles de c-myc dans les mélanocytes des souris c-myccKO conduit au phénotype de grisonnement des poils, observé directement après la naissance et associé à une diminution du nombre de mélanocytes dans le bulbe des follicules pileux. Les cellules pigmentaires restantes expriment les marqueurs mélanogéniques (Tyr, TRP-1, Dct and MITF) et semblent être fonctionnelles puisqu'elles peuvent produire et transférer la mélanine. De plus, la capacité de prolifération des mélanocytes déficients en c-Myc dans le bulbe des follicules pileux ne semble pas être affectée chez les nouveaux-nés. Les cellules souches mélanocytaires sont présentes, mais en nombre réduit, dans le bulge des follicules pileux à la fin de la morphogenèse chez les souris c-myccKO âgées de huit jours. Ces cellules sont maintenues sans changement durant le premier cycle pileux (vérifié à l'âge de trente jours), ce qui sous-entend que la fonction de c-Myc n'est pas nécessaire pour ce processus. Ceci explique pourquoi, en supposant que des cellules souches mélanocytaires fonctionnelles sont présentes dans la peau, nous n'observons pas de dilution de couleur de la robe liée à l'âge. Cependant, la présence de ces cellules souches mélanocytaires dans la peau c-myccKO ne suffit pas à assurer une quantité normale de mélanocytes différenciés dans le bulbe des follicules pileux. Cette population de cellules pigmentaires matures est sévèrement affectée par la suppression de c-Myc, ce qui contribue amplement au phénotype de grisonnement des poils. De plus, c-Myc paraît être important pour le développement des mélanocytes. Ainsi, le nombre de mélanoblastes diminue dans les embryons c-myccKO à partir du douzième jour de gestation. A treize jours de gestation, au stade où les mélanoblastes pénètrent dans l'épiderme et prolifèrent, les mélanoblastes déficients en c-Myc ne s'adaptent pas aux signaux de prolifération et se retrouvent en nombre réduit dans l'épiderme. Finalement, nous nous sommes intéressés, au rôle de N-Myc, un homologue proche de c-Myc, dans la lignée mélanocytaire. Nos expériences ont montré que. N-Myc était superflu pour le développement et l'homéostasie des mélanocytes, une seule copie du gène c-myc étant suffisante pour maintenir une pigmentation normale de la robe des souris c-mycc-myccKO/+~N_ myccKO/KO. Cependant, le rôle essentiel de N-Myc dans la maintenance des cellules mélanocytaires précurseurs apparaît lorsque c-Myc est absent, puisque la suppression simultanée des deux Myc résulte en une perte complète de la coloration de la robe. Ceci implique la présence d'un mécanisme compensatoire entre c- et N-Myc dans la lignée mélanocytaire, avec un rôle prédominant de c-Myc. Summary Deregulation of c-Myc is known to be a common event in cellular transformation. Upregulation of this oncoprotein was shown in a variety of primary and metastatic cutaneous melanomas and has been associated with a poor prognosis (Grover et al., 1996; Zhuang et al., 2008). c-myc is seen as a central molecule involved in many aspects of cellular homeostasis. c-Myc function has been intensively studied mostly because of its significant contribution to tumour progression. However little is known on the role of this transcription factor in embryogenesis and tissue specification. Complete loss of c-Myc during embryogenesis results in embryonic death before E10.5 due to multiple developmental defects including embryonic size, heart, pericardium, neural tube and blood cells (Davis et al., 1993; Trumpp et al., 2001). Recently it was discovered that most of these abnormalities are secondary and results of placental insufficiency in c-Myc-/- embryos (Dubois et al., 2008). Here, we focused on the role of c-Myc in pigment cell development and homeostasis after birth, knowing that c-Myc is important in the maintenance of neural crest lineages (Wei et al., 2007). A floxed allele of c-Myc (Trumpp et al., 2001) was used to specifically delete this gene in the melanocyte lineage using Tyr::Cre transgenic mice (Delmas et al., 2003). Removal of both c-Myc alleles in melanocytes of c-MyccKO mouse led to the grey hair phenotype which is seen directly after birth and was associated with a decrease in the melanocyte number in the bulb of the hair follicle. The remaining population of pigment cells express melanogenic markers (Tyr, TRP-1, Dct and MITF) and seem functionally normal since they can produce and transfer melanin. Furthermore proliferation capacity of c-Myc deficient melanocytes in the bulb of hair follicle seems not to be affected in newborn animals. Melanocyte stem cells (MSCs) are present but reduced in numbers in the bulge of the hair follicle at the end of morphogenesis in 8 days old c-MyccKO mice. These cells are maintained through the first hair cycle (as verified at P30) without any further changes, suggesting that c-Myc function is not required for this process. This explains why we did not detect any agerelated coat color dilution, assuming a presence of functional MSCs in the skin. Importantly, presence of MSCs in c-MyccKO skin was not sufficient for assuring a normal number of differentiated melanocytes in the bulb of the hair follicle. This population of mature pigmented cells is severely affected upon c-myc deletion thus largely contributing to the grey hair phenotype. Moreover, c-Myc appears to be important for melanocyte development. Thus, melanoblast number is affected in c-MyccKO embryos day 12 of gestation onwards. At E13.5, when melanoblasts enter the epidermis and proliferate, c-myc deficient melanoblasts failed to adapt to proliferation signals and are therefore reduced in number in the epidermis. Finally, we addressed the role of N-Myc, a closest homologue of c-Myc, in the melanocyte lineage. In these experiments, N-Myc was dispensable for melanocyte development and homeostasis, and even one copy of the c-myc gene was sufficient to maintain normal coat color pigmentation in c-mycc-mycCKO/+ ,N-myccKO/KO mice. However the crucial role of N-Myc in maintenance of melanocyte precursor cells became apparent when c-myc is eliminated since simultaneous deletion of both Myc results in complete loss of coat color pigmentation. This suggests compensatory mechanisms between c- and N-Myc with a predominant role of c-Myc in melanocyte lineage.
Resumo:
Diplomityössä on tutkittu ja tarkasteltu Öljy- ja Kaasualan Keskusliiton käytössä olevaa myyntitietokantaa,joka sisältää Suomessa toimivien öljy- ja kaasualan toimijoiden volyymit. Tarkastelun alla ovat olleet tietokannan nykyiset käytön aikana ilmenneet puutteet, sekä mandolliset tulevaisuuden tarpeet. Kehitystyö on suoritettu tiiviissä yhteistyössä Öljy- ja Kaasualan Keskusliiton sekä asiaa koskevien öljyalanyhtiöiden kanssa. Näin on saatu poistettua useita tietokannan toimintaa rajoittavia tekijöitä ja nykyisin tarpeettomia toimintoja sekä lisättyä monia uusia ominaisuuksia olemassa olevaan tietokantaan.
ASTRAL-R score predicts non-recanalisation after intravenous thrombolysis in acute ischaemic stroke.
Resumo:
Intravenous thrombolysis (IVT) as treatment in acute ischaemic strokes may be insufficient to achieve recanalisation in certain patients. Predicting probability of non-recanalisation after IVT may have the potential to influence patient selection to more aggressive management strategies. We aimed at deriving and internally validating a predictive score for post-thrombolytic non-recanalisation, using clinical and radiological variables. In thrombolysis registries from four Swiss academic stroke centres (Lausanne, Bern, Basel and Geneva), patients were selected with large arterial occlusion on acute imaging and with repeated arterial assessment at 24 hours. Based on a logistic regression analysis, an integer-based score for each covariate of the fitted multivariate model was generated. Performance of integer-based predictive model was assessed by bootstrapping available data and cross validation (delete-d method). In 599 thrombolysed strokes, five variables were identified as independent predictors of absence of recanalisation: Acute glucose > 7 mmol/l (A), significant extracranial vessel STenosis (ST), decreased Range of visual fields (R), large Arterial occlusion (A) and decreased Level of consciousness (L). All variables were weighted 1, except for (L) which obtained 2 points based on β-coefficients on the logistic scale. ASTRAL-R scores 0, 3 and 6 corresponded to non-recanalisation probabilities of 18, 44 and 74 % respectively. Predictive ability showed AUC of 0.66 (95 %CI, 0.61-0.70) when using bootstrap and 0.66 (0.63-0.68) when using delete-d cross validation. In conclusion, the 5-item ASTRAL-R score moderately predicts non-recanalisation at 24 hours in thrombolysed ischaemic strokes. If its performance can be confirmed by external validation and its clinical usefulness can be proven, the score may influence patient selection for more aggressive revascularisation strategies in routine clinical practice.
Resumo:
A síndrome do intestino curto é definida pela incapacidade da superfície do intestino delgado em manter as condições adequadas de absorção de nutrientes, ocasionando deficiências nutricionais. Em adultos, as principais causas de síndrome do intestino curto são as ressecções cirúrgicas amplas ou múltiplas, secundárias a infarto mesentérico, doença de Crohn e enterite actínica. Além de avaliar o tempo de trânsito até o intestino grosso, o exame contrastado de trânsito intestinal pode ser utilizado na medição da extensão do intestino remanescente e no acompanhamento dos fenômenos de adaptação estrutural das alças delgadas e colônicas. Em pacientes com síndrome do intestino curto, a adaptação estrutural do intestino delgado consiste na hiperplasia das vilosidades e das pregas mucosas, que se tornam mais numerosas, profundas e de maior diâmetro, assim como a dilatação do segmento remanescente. Esses achados morfológicos são mais pronunciados e bem estabelecidos nas alças ileais, evidenciando sua maior capacidade adaptativa. O conhecimento dos achados por imagem das características morfológicas e adaptativas do intestino delgado é de grande importância na abordagem multidisciplinar da síndrome do intestino curto.
Resumo:
Anàlisi sobre la protecció de dades en l’àmbit empresarial i del destí d’aquelles dades que es troben a la xarxa. Concretament s’analitza la possibilitat de l’existència d’un dret a l’oblit que permeti, tant a persones físiques com jurídiques, eliminar part de la seva història digital a Internet. La finalitat d’aquest treball és investigar i proposar una possible solució per a totes aquelles persones jurídiques que vulguin oblidar aquelles informacions que perjudiquin el desenvolupament de la seva activitat econòmica.
Resumo:
L’aplicació GSAI et permet gestionar els diferents espais que existeixen a la teva empresa. Et dona la capacitat de crear els teus espais personalitzats. Aquests espais s’agrupen per entitats així pots diferenciar cada zona de la teva empresa. Cada usuari pot crear reserves dins d’un espai i esborrar-la si es necessari.
Resumo:
Amb la situació econòmica actual pot ser interessant poder vendre objectes que ja no s’utilitzen i també poder-ne comprar de segona mà. Amb aquesta idea sorgeix el projecte de crear una pàgina de subhastes online on la gent pugui comerciar amb les coses que ja no necessita. Tenint en compte el concepte inicial, el propietari de la pàgina no rebrà cap retribució ni percentatge de cada subhasta, tot l’import serà pel venedor. L’objectiu principal és el de poder oferir un lloc on després de registrar-se, els usuaris puguin veure i pujar per els articles que altres persones estan subhastant i també la possibilitat de crear les seves pròpies subhastes. Cada usuari disposarà d’un espai personal on veure les subhastes amb les que ha interactuat i així no perdre-les de vista i també on poder veure en cada moment l’estat de les subhastes que ha creat. La vista d’una subhasta s’actualitzarà automàticament sense haver de recarregar la pàgina i si algú puja durant l’últim minut la subhasta s’allargarà un minut més per evitar puges a l’últim moment i així maximitzar el preu final. Hi haurà un administrador que serà l’encarregat de gestionar el bon funcionament de la pàgina amb permís per afegir, editar, consultar i eliminar tota la informació disponible. Per portar a terme el projecte s’ha utilitzat PHP per la part de programació i MySQL com a sistema gestor de bases de dades.
Resumo:
A web service is a software system that provides a machine-processable interface to the other machines over the network using different Internet protocols. They are being increasingly used in the industry in order to automate different tasks and offer services to a wider audience. The REST architectural style aims at producing scalable and extensible web services using technologies that play well with the existing tools and infrastructure of the web. It provides a uniform set of operation that can be used to invoke a CRUD interface (create, retrieve, update and delete) of a web service. The stateless behavior of the service interface requires that every request to a resource is independent of the previous ones facilitating scalability. Automated systems, e.g., hotel reservation systems, provide advanced scenarios for stateful services that require a certain sequence of requests that must be followed in order to fulfill the service goals. Designing and developing such services for advanced scenarios with REST constraints require rigorous approaches that are capable of creating web services that can be trusted for their behavior. Systems that can be trusted for their behavior can be termed as dependable systems. This thesis presents an integrated design, analysis and validation approach that facilitates the service developer to create dependable and stateful REST web services. The main contribution of this thesis is that we provide a novel model-driven methodology to design behavioral REST web service interfaces and their compositions. The behavioral interfaces provide information on what methods can be invoked on a service and the pre- and post-conditions of these methods. The methodology uses Unified Modeling Language (UML), as the modeling language, which has a wide user base and has mature tools that are continuously evolving. We have used UML class diagram and UML state machine diagram with additional design constraints to provide resource and behavioral models, respectively, for designing REST web service interfaces. These service design models serve as a specification document and the information presented in them have manifold applications. The service design models also contain information about the time and domain requirements of the service that can help in requirement traceability which is an important part of our approach. Requirement traceability helps in capturing faults in the design models and other elements of software development environment by tracing back and forth the unfulfilled requirements of the service. The information about service actors is also included in the design models which is required for authenticating the service requests by authorized actors since not all types of users have access to all the resources. In addition, following our design approach, the service developer can ensure that the designed web service interfaces will be REST compliant. The second contribution of this thesis is consistency analysis of the behavioral REST interfaces. To overcome the inconsistency problem and design errors in our service models, we have used semantic technologies. The REST interfaces are represented in web ontology language, OWL2, that can be part of the semantic web. These interfaces are used with OWL 2 reasoners to check unsatisfiable concepts which result in implementations that fail. This work is fully automated thanks to the implemented translation tool and the existing OWL 2 reasoners. The third contribution of this thesis is the verification and validation of REST web services. We have used model checking techniques with UPPAAL model checker for this purpose. The timed automata of UML based service design models are generated with our transformation tool that are verified for their basic characteristics like deadlock freedom, liveness, reachability and safety. The implementation of a web service is tested using a black-box testing approach. Test cases are generated from the UPPAAL timed automata and using the online testing tool, UPPAAL TRON, the service implementation is validated at runtime against its specifications. Requirement traceability is also addressed in our validation approach with which we can see what service goals are met and trace back the unfulfilled service goals to detect the faults in the design models. A final contribution of the thesis is an implementation of behavioral REST interfaces and service monitors from the service design models. The partial code generation tool creates code skeletons of REST web services with method pre and post-conditions. The preconditions of methods constrain the user to invoke the stateful REST service under the right conditions and the post condition constraint the service developer to implement the right functionality. The details of the methods can be manually inserted by the developer as required. We do not target complete automation because we focus only on the interface aspects of the web service. The applicability of the approach is demonstrated with a pedagogical example of a hotel room booking service and a relatively complex worked example of holiday booking service taken from the industrial context. The former example presents a simple explanation of the approach and the later worked example shows how stateful and timed web services offering complex scenarios and involving other web services can be constructed using our approach.
Resumo:
The relative ease to concentrate and purify adenoviruses, their well characterized mid-sized genome, and the ability to delete non-essential regions from their genome to accommodate foreign gene, made adenoviruses a suitable candidate for the construction of vectors. The use of adenoviral vectors in gene therapy, vaccination, and as a general vector system for expressing foreign genes have been documented for some time. In this study, the objective was to rescue a BAV3 E1 or E3 recombinant vector carrying the kanamycin resistant gene, a dominant selectable marker with useful applications in studying vectored gene expression in mammalian cells. To accomplish the objective of this study, more information about BAV3 DNA sequences was required in order to make the manipulation of the virus genome accessible. Therefore, sequencing of the BAV3 genome from 1 1 .7% to 30.8% was carried out. Analysis of the determined sequences revealed the primary structure of important viral gene products coded by E2 including BAV3 DNA pol and precursor to terminal protein. Comparative analysis of these proteins with their counterparts from human and non human adenoviruses revealed important insights as to the evolutionary lineage of BAV3. In order to insert the kanamycin resistance gene in either E1 or E3, it was necessary to delete BAV3 sequences to accommodate the foreign gene so as not to exceed the limit of the packaging capacity of the virus. To construct a recombinant BAV3 in which a foreign gene was inserted in the deleted E1 region, an E1 shuttle vector was constructed. This involved the deletion from the viral sequences a region between 1.3% to 9% and inserting the kanamycin resistance gene to replace the deletion. The E1 shuttle vector contained the left (0%- 53.9%) segment of the genome and was expected to generate BAV3 recombinants that can be grown and propagated in cells that can complement the missing E1 functions. To construct a similar shuttle vector for E3 deletion, DNA sequences extending from 78.9% to 82.5% (1281 bp) were deleted from within the E3 region that had been cloned into a plasmid vector. The deleted region corresponds to those that have been shown to be non-essential for viral replication in cell culture. The resulting plasmid was used to construct another recombinant plasmid with BAV3 DNA sequences extending from 37.1% to 100% and with a deletion of E3 sequences that were replaced by kanamycin resistance gene. This shuttle plasmid was used in cotransfections with digested viral DNA in an attempt to rescue a recombinant BAV3 carrying the kanamycin resistance gene to replace the deleted E3. In spite of repeated attempts of transfection, El or E3 recombinant BAV3 were not isolated. It seems that other approaches should be applied to make a final conclusion on BAV3 infectivity.
Resumo:
L'attaque de retransmission sélective est une menace sérieuse dans les réseaux de capteurs sans fil (WSN), en particulier dans les systèmes de surveillance. Les noeuds peuvent supprimer de manière malicieuse certains paquets de données sensibles, ce qui risque de détruire la valeur des données assemblées dans le réseau et de diminuer la disponibilité des services des capteurs. Nous présentons un système de sécurité léger basé sur l'envoi de faux rapports pour identifier les attaques de retransmission sélective après avoir montré les inconvénients des systèmes existants. Le grand avantage de notre approche est que la station de base attend une séquence de faux paquets à un moment précis sans avoir communiqué avec les noeuds du réseau. Par conséquent, elle sera capable de détecter une perte de paquets. L'analyse théorique montre que le système proposé peut identifier ce type d'attaque et peut alors améliorer la robustesse du réseau dans des conditions d'un bon compromis entre la fiabilité de la sécurité et le coût de transmission. Notre système peut atteindre un taux de réussite élevé d‟identification face à un grand nombre de noeuds malicieux, tandis que le coût de transmission peut être contrôlé dans des limites raisonnables.
Resumo:
L'Italie a été l'avant-dernier pays européen, suivi seulement de la Grèce, à se doter d'une loi sur la protection de la vie privée (loi du 31 décembre 1996). Paradoxalement, c'est en Italie qu'ont été écrites quelques-uns des meilleurs ouvrages sur ce sujet, notamment ceux du professeur Rodotà. En dépit du retard du législateur italien, il doit être précisé que la loi de 1996, faisant suite à la Directive communautaire relative à la protection des données personnelles, introduit un concept moderne de la vie privée, qui ne se limite pas simplement à un « right to be let alone », selon la célèbre conception de la fin du dix-neuvième siècle, mais qui se réfère plutôt à la protection de la personne humaine. Le concept de vie privée, entendu comme l’interdiction d’accéder à des informations personnelles, se transforme en un contrôle des renseignements relatifs à la personne. De cette manière, se développe une idée de la vie privée qui pose comme fondements : le droit de contrôle, de correction et d'annulation d'informations sur la personne. À cet égard, il est important de souligner le double système d’autorisation pour le traitement licite des informations. Le consentement de l'intéressé est requis pour les données personnelles. Pour les données dites « sensibles », en revanche, l'autorisation du Garant sera nécessaire en plus de l'expression du consentement de l’intéressé. En revanche, aucune autorisation n'est requise pour le traitement de données n'ayant qu'un but exclusivement personnel, ainsi que pour les données dites « anonymes », à condition qu'elles ne permettent pas d'identifier le sujet concerné. Le type de responsabilité civile prévu par la loi de 1996 se révèle particulièrement intéressant : l'article 18 prévoit l'application de l'article 2050 du Code civil italien (exercice d'activités dangereuses), alors que l'article 29 prévoit, lui, l'octroi de dommages et intérêts pour les préjudices non patrimoniaux (cette disposition est impérative, conformément à l'article 2059 du Code civil italien). Le présent article se propose d'examiner l'application des normes évoquées ci-dessus à Internet.
Resumo:
Analysis by reduction is a method used in linguistics for checking the correctness of sentences of natural languages. This method is modelled by restarting automata. All types of restarting automata considered in the literature up to now accept at least the deterministic context-free languages. Here we introduce and study a new type of restarting automaton, the so-called t-RL-automaton, which is an RL-automaton that is rather restricted in that it has a window of size one only, and that it works under a minimal acceptance condition. On the other hand, it is allowed to perform up to t rewrite (that is, delete) steps per cycle. Here we study the gap-complexity of these automata. The membership problem for a language that is accepted by a t-RL-automaton with a bounded number of gaps can be solved in polynomial time. On the other hand, t-RL-automata with an unbounded number of gaps accept NP-complete languages.
Resumo:
Analysis by reduction is a method used in linguistics for checking the correctness of sentences of natural languages. This method is modelled by restarting automata. Here we study a new type of restarting automaton, the so-called t-sRL-automaton, which is an RL-automaton that is rather restricted in that it has a window of size 1 only, and that it works under a minimal acceptance condition. On the other hand, it is allowed to perform up to t rewrite (that is, delete) steps per cycle. We focus on the descriptional complexity of these automata, establishing two complexity measures that are both based on the description of t-sRL-automata in terms of so-called meta-instructions. We present some hierarchy results as well as a non-recursive trade-off between deterministic 2-sRL-automata and finite-state acceptors.
Resumo:
We study cooperating distributed systems (CD-systems) of restarting automata that are very restricted: they are deterministic, they cannot rewrite, but only delete symbols, they restart immediately after performing a delete operation, they are stateless, and they have a read/write window of size 1 only, that is, these are stateless deterministic R(1)-automata. We study the expressive power of these systems by relating the class of languages that they accept by mode =1 computations to other well-studied language classes, showing in particular that this class only contains semi-linear languages, and that it includes all rational trace languages. In addition, we investigate the closure and non-closure properties of this class of languages and some of its algorithmic properties.
Resumo:
Para Colombia, la reforma política de 2003 marcó una transformación en el sistema político y electoral debido a que proponía reinstitucionalizar los movimientos y los partidos políticos del país, a la vez que planteaba transformaciones importantes al sistema electoral. La hipótesis plantea el hecho de que el voto preferente es la herramienta ideal para mantener los personalismos políticos por parte de aquellos candidatos beneficiados con la reforma. Como justificación se plantea que en Colombia y en los países con sistemas de partidos institucionalizados, un proceso de reforma política se circunscribe a modificaciones o ajustes de alguna norma o ley que se encuentre vigente en el marco jurídico o la Constitución Política actual de un Estado determinado. Cuando estos procesos se llevan a cabo, la intención es, por un lado, suprimir normas que afectan de manera adversa el desarrollo de ciertos sectores específicos, o por el otro, modificar procedimientos de orden institucional que terminan perjudicando, en el caso de nuestro país, el ejercicio democrático en términos de una idónea representación dentro de los cargos legislativos de la nación. Puede decirse entonces que esta monografía logra analizar las distintas situaciones políticas y sociales que enmarcan la reforma política de 2003 y de manera particular se logra comprender todas las implicaciones políticas que tiene el voto preferente como medio para estructurar las estrategias electorales de los sistemas de partidos en Colombia.