1000 resultados para 7136-301
Resumo:
OBJECTIVE: This study reports the frequency of alcohol use and associated tobacco and drug use among emergency department (ED) patients, in order to increase physician awareness and treatment of women and men seeking care in ED settings. METHOD: All adults seen in the ED at the University Hospital in Lausanne, Switzerland, between 11 AM and 11 PM were screened by direct interview for at-risk drinking, tobacco use, drug use, and depression during an 18-month period. RESULTS: A total of 8,599 patients (4,006 women and 4,593 men) participated in the screening procedure and provided full data on the variables in our analysis. The mean age was 51.9 years for women and 45.0 years for men; 57.5% (n = 2,304) of women and 58.5% (n = 2,688) of men were being treated for trauma. Based on guidelines of the National Institute on Alcohol Abuse and Alcoholism, 13.1% (n = 523) of the women were at-risk drinkers, 57.3% (n = 2,301) were low-risk drinkers, and 29.6% (n = 1,182) were abstinent. Among men, 32.8% (n = 1,507) met criteria for at-risk drinking, 51.8% (n = 2,380) met criteria for low-risk drinking, and 15.4% (n = 706) were abstinent. Younger individuals (ages 18-30) had significantly higher rates of episodic heavy drinking episodes, whereas at-risk older patients were more likely to drink on a daily basis. A binary model found that women and men who drank at at-risk levels are more likely to use tobacco (odds ratio [OR] = 2.48, 95% confidence interval [CI]: 2.0-3.08) and illicit drugs (OR = 5.91, CI: 3.32- 10.54) compared with abstinent and low-risk drinkers. CONCLUSIONS: This study supports systematic alcohol screening of women and men seen in EDs and suggests that patterns of alcohol and drug use vary by age and gender.
Resumo:
This study evaluated the use of electromagnetic gauges to determine the adjusted densities of HMA pavements. Field measurements were taken with two electromagnetic gauges, the Pavement Quality Indicator (PQI) 301 and the Pavetracker Plus 2701B. Seven projects were included in the study with 3 to 5 consecutive paving days. For each day/lot 20 randomly selected locations were tested along with seven core locations. The analysis of PaveTracker and PQI density consisted of determining which factors are statistically significant, and core density residuals and a regression analysis of core as a function of PaveTracker and PQI readings. The following key conclusions can be stated: 1. Core density, traffic and binder content were all found to be significant for both electromagnetic gauges studied, 2. Core density residuals are normally distributed and centered at zero for both electromagnetic gauges, 3. For PaveTracker readings, statistically one third of the lots do not have an intercept that is zero and two thirds of the lots do not rule out a scaler correction factor of zero, 4. For PQI readings, statistically the 95% confidence interval rules out the intercept being zero for all seven projects and six of the seven projects do not rule out the scaler correction factor being zero, 5. The PQI 301 gauge should not be used for quality control or quality assurance, and 6. The Pavetracker 2701B gauge can be used for quality control but not quality assurance. This study has found that with the limited sample size, the adjusted density equations for both electromagnetic gauges were determined to be inadequate. The PaveTracker Plus 2701B was determined to be better than the PQI 301. The PaveTracker 2701B could still be applicable for quality assurance if the number of core locations per day is reduced and supplemented with additional PaveTracker 2701B readings. Further research should be done to determine the minimum number of core locations to calibrate the gauges each day/lot and the number of additional PaveTracker 2701B readings required.
Resumo:
Anti-idiotype antibody therapy of B-cell lymphomas, despite numerous promising experimental and clinical studies, has so far met with limited success. Tailor-made monoclonal anti-idiotype antibodies have been injected into a large series of lymphoma patients, with a few impressive complete tumour remissions but a large majority of negative responses. The results presented here suggest that, by coupling to antilymphoma idiotype antibodies a few molecules of the tetanus toxin universal epitope peptide P2 (830-843), one could markedly increase the efficiency of this therapy. We show that after 2-hr incubation with conjugates consisting of the tetanus toxin peptide P2 coupled by an S-S bridge to monoclonal antibodies directed to the lambda light chain of human immunoglobulin, human B-lymphoma cells can be specifically lysed by a CD4 T-lymphocyte clone specific for the P2 peptide. Antibody without peptide did not induce B-cell killing by the CD4 T-lymphocyte clone. The free cysteine-peptide was also able to induce lysis of the B-lymphoma target by the T-lymphocyte clone, but at a molar concentration 500 to 1000 times higher than that of the coupled peptide. Proliferation assays confirmed that the antibody-peptide conjugate was antigenically active at a much lower concentration than the free peptide. They also showed that antibody-peptide conjugates required an intact processing function of the B cell for peptide presentation, which could be selectively inhibited by leupeptin and chloroquine.(ABSTRACT TRUNCATED AT 250 WORDS)
Resumo:
Objectives: To determine the prevalence of dementia and the proportion of undiagnosed dementia in elderly patients admitted to postacute care, and to identify patients' characteristics associated with undiagnosed dementia. Design: Cross-sectional study. Setting: Academic postacute rehabilitation facility in Lausanne, Switzerland. Participants: Patients (N = 1764) aged 70 years and older. Measurements: Data on socio-demographic, medical, functional, and affective status were collected upon admission. Data on cognitive performance (Mini-Mental State Exam [MMSE]), and cognition-related discharge diagnoses were abstracted through a structured review of discharge summaries. Results: Overall, 24.1% (425/1764) patients had a diagnosis of dementia, most frequently secondary to Alzheimer's disease (260/425, 61.2%). Among dementia cases, 70.8% (301/425) were newly diagnosed during postacute stay. This proportion was lower among patients referred from internal medicine than from orthopedic/surgery services (65.8% versus 74.8%, P = .042). Compared to patients with already diagnosed dementia, those newly diagnosed were older, lived alone more frequently, and had better functional status and MMSE score at admission (all P < .05). In multivariate analysis, previously undetected dementia remained associated with older age (OR = 2.4 for age 85 years and older, 95% CI 1.5-4.0, P = .001) and normal MMSE at admission (OR = 5.9, 95% CI 2.7-12.7, P < .001). Conclusion: Dementia was present in almost a fourth of elderly patients referred to postacute care, but was diagnosed in less than a third before admission. Oldest old patients appear especially at risk for underrecognition. These results emphasize the high diagnostic yield of systematic cognitive assessment in the postacute care setting to improve these patients' management and quality of life.
Resumo:
Advanced soft-tissue sarcomas are usually resistant to cytotoxic agents such as doxorubicin and ifosfamide. Antitumor activity has been observed for gemcitabine and docetaxel combination. We conducted a retrospective study on 133 patients (58 males/75 females) with unresectable or metastatic soft-tissue sarcoma. The median age at diagnosis was 51.7 (18-82), with 76 patients with leiomoyosarcoma and 57 patients with other histological subtypes. The initial localizations were limb (44), uterine (32), retroperitoneal (23) and organs or bone (34). Patients received 900 mg/m2 of gemcitabine (days 1 and 8) over 90 min plus 100 mg/m2 of docetaxel (day 8), intravenously every 21 days. Gemcitabine/docetaxel combination was well tolerated with an overall response of 18.4% and with no clear statistical difference between leiomyosarcomas and other histological subtypes (24.2% versus 10.4% (p=0.06)). No difference was found between uterine soft-tissue sarcomas versus others. The median overall survival was 12.1 months (1-28). Better overall survival was correlated with leiomyosarcoma (p=0.01) and with the quality of the response, even for patients with stable disease (p<10(-4)). No statistical difference was found for the initial localization. Response to treatment and overall survival were better for patients in World Health Organization (WHO) performance status classification (PS) 0 at baseline versus patients in WHO PS-1, 2 or 3 (p=0.023 and p<10(-4), respectively). Gemcitabine/docetaxel combination was tolerable and demonstrated better response and survival for leiomyosarcoma, especially for patients in WHO PS-0 at baseline. For the other histological subtypes, the response was not encouraging, but the survival for patients in response or stable suggests further investigation.
Resumo:
BACKGROUND: Home hospital is advocated in many western countries in spite of limited evidence of its economic advantage over usual hospital care. Heart failure and community-acquired pneumonia are two medical conditions which are frequently targeted by home hospital programs. While recent trials were devoted to comparisons of safety and costs, the acceptance of home hospital for patients with these conditions remains poorly described. OBJECTIVE: To document the medical eligibility and final transfer decision to home hospital for patients hospitalized with a primary diagnosis of heart failure or community-acquired pneumonia. DESIGN: Longitudinal study of patients admitted to the medical ward of acute care hospitals, up to the final decision concerning their transfer. SETTING: Medical departments of one university hospital and two regional teaching Swiss hospitals. PATIENTS: All patients admitted over a 9 month period to the three settings with a primary diagnosis of heart failure (n= 301) or pneumonia (n=441). MEASUREMENTS: Presence of permanent exclusion criteria on admission; final decision of (in)eligibility based on medical criteria; final decision regarding the transfer, taking into account the opinions of the family physician, the patient and informal caregivers. RESULTS: While 27.9% of heart failure and 37.6% of pneumonia patients were considered to be eligible from a medical point of view, the program acceptance by family physicians, patients and informal caregivers was low and a transfer to home hospital was ultimately chosen for just 3.8% of heart failure and 9.6% of pneumonia patients. There were no major differences between the three settings. CONCLUSIONS: In the case of these two conditions, the potential economic advantage of home hospital over usual inpatient care is compromised by the low proportion of patients ultimately transferred.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
Référence bibliographique : Weigert, 301
Resumo:
Modern cancer therapies should strive not only to eliminate malignant tissues but also to preserve healthy tissues and the patient's quality of life. Antigen-specific immunotherapy approaches are promising for either aspect since they are designed to only act against tissues expressing 1 or more specified tumour antigens. In order to develop successful vaccine and adoptive transfer protocols, longitudinal monitoring of cancer patients taking part in clinical trials is mandatory. Here, in vivo expansion of antigen-specific cells, as well as their ex vivo functional status represent important parameters to be analysed. To obtain results that most closely reflect the cells' in vivo status, functional assays must be carried out with as little in vitro culturing as possible. The present minireview discusses recent advances in these domains.
Resumo:
In an attempt to improve tumor targeting and tumor retention time of monoclonal antibodies (MAbs), we prepared biparatopic antibodies (BpAbs) having the capability of binding 2 different non-overlapping epitopes on the same target antigen molecule, namely, the carcinoembryonic antigen (CEA). Six BpAbs were constructed by coupling 2 different Fab' fragments from 4 different specific anti-CEA MAbs recognizing 4 CEA epitopes (Gold 1-4). Demonstration of the double paratopic binding of these antibodies for CEA was confirmed in vitro by inhibition radioimmunoassay and cross-inhibition analysis by surface plasmon resonance (SPR; BIACORE) technology. Using the latter technique, the affinity constants for CEA immobilized onto the sensor chip were found to range from 0.37 to 1.54 x 10(9) M(-1) for the 4 parental F(ab')2 fragments and from 1.88 to 10.14 x 10(9) M(-1) for the BpAbs, demonstrating the advantage of biparatopic binding over conventional F(ab')2 binding. The Ka improvement was particularly high for BpAb F6/35A7 and BpAb F6/B17 with a 9.5- and 8.1-fold increase, respectively, as compared with the parental F(ab')2. In vivo, the 6 BpAbs were compared with their 2 respective parental F(ab')2 by injection of 131I-BpAb/125I-F(ab')2 parental fragments into nude mice xenografted with the human colon carcinoma T380. Dissection 72 hr post-injection demonstrated that BpAb B17/CE25 and BpAb F6/B17 gave higher tumor uptake than that of their parental F(ab')2. This finding is particularly interesting for BpAb F6/B17, which compared favorably with the F6 F(ab')2, one of the best parental F(ab')2 fragments used in our study.
Resumo:
Colorectal cancer frequently disseminates through the portal vein into the liver. In this study, outbred Swiss nude mice were adapted to facilitate the induction of liver metastases by a pre-grafting treatment with 6 Gy total body irradiation and i.v. injection of anti-asialo GM1 antibody. One day later, cultured LS 174T human colon cancer cells were injected into the surgically exposed spleen, which was resected 3 min later. In 48 of 65 mice, a few to several hundred liver metastases were macroscopically observed at dissection 3 to 4 weeks after transplantation. Ten of 10 mice, followed-up for survival, died with multiple large confluent liver metastases. By reducing the radiation dose to 4 or 0 Gy, or omitting the anti-asialo GM1 antibody injection, only 60%, 37% or 50% of mice, respectively, had visible metastases 3 weeks after transplantation. Carcinoembryonic antigen (CEA) measured in tumour extracts was in the mean 25.6 micrograms/g in liver metastases compared with 9.2 micrograms/g in s.c. tumours. Uptake of radiolabelled anti-CEA monoclonal antibody (MAb) in the metastases 12, 24 and 48 hr after injection gave a mean value of 39% of the injected dose per gram of tissue (ID/g). In comparison, MAb uptake in s.c. and intrasplenic tumours or lung metastases gave a mean percentage ID/g of 20, 18 and 15, respectively. Laser-induced fluorescence after injection of indocyanin-MAb conjugate allowed direct visual detection of small liver metastases, including some that were not visible under normal light. Preliminary results showed that mice, pre-treated with 4 Gy irradiation and the anti-asialo GM1 injection, were tolerant to radioimmunotherapy with a total dose of 500 muCi 131I labeled anti-CEA intact MAbs given in 3 injections.
Resumo:
Sur le plan économique, le système de genre est une pierre angulaire du discours publicitaire. Il intervient dans la segmentation des marchés, dans la sélection des médias et des supports, dans l'apparence extérieure des produits, dans le ton des campagnes, dans le choix des arguments de vente et, bien sûr, dans les scripts des annonces qui mettent en scène, en grand nombre, des êtres humains. En contrepartie, sur le plan symbolique, le discours publicitaire est un dépositaire privilégié des imaginaires de genre qui circulent dans son contexte de production et de diffusion. En cette qualité, confronté aux lois d'un marché toujours plus concurrentiel, à une segmentation plus fine des cibles, à la multiplication des supports, à l'instabilité croissante des consommateurs ainsi qu'à une critique médiatique, académique et publique toujours prompte à relever sa tendance au stéréotypage, le discours publicitaire est amené à proposer des représentations des hommes et des femmes de plus en plus variées et complexes. La présente étude, qui relève de l'analyse linguistique des discours, a pour objectif d'entrer dans la complexité de ces variations publicitaires contemporaines sur le féminin et le masculin et de déchiffrer les imaginaires de genre qu'elles contribuent à construire. Après un état des lieux des travaux consacrés à la représentation publicitaire des sexes ainsi qu'une présentation détaillée des jalons théoriques et méthodologiques de l'approche adoptée, une analyse de contenu, réalisée sur la base d'un corpus de plus 1200 annonces, met en évidence les configurations récurrentes du masculin et du féminin dans la production publicitaire contemporaine de presse magazine. Une analyse textuelle et critique interroge ensuite le rôle de la langue dans le processus de schématisation des imaginaires publicitaires de genre. Dans un premier temps, grâce à une prise en compte des déterminations prédiscursive et discursive des représentations publicitaires du féminin et du masculin, cette analyse montre comment le discours publicitaire, en plus de différencier radicalement le féminin et le masculin, tend à essentialiser cette différenciation au travers de deux procédés discursifs d'idéologisation, la catégorisation et la généralisation. Dans un second temps, un inventaire thématique des variations publicitaires contemporaines sur le genre permet d'évaluer la perméabilité du discours publicitaire à la reconfiguration du système de genre qui est en marche dans notre société depuis la seconde moitié du vingtième siècle. La présente recherche, qui entend globalement déconstruire ce qui prend trop souvent l'apparence d'évidences et soumettre à débat des interprétations, thématise par ailleurs la question de la dimension politique des recherches académiques.