896 resultados para LOUD CALLS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dynamic behavior of bothisothermal and non-isothermal single-column chromatographic reactors with an ion-exchange resin as the stationary phase was investigated. The reactor performance was interpreted by using results obtained when studying the effect of the resin properties on the equilibrium and kinetic phenomena occurring simultaneously in the reactor. Mathematical models were derived for each phenomenon and combined to simulate the chromatographic reactor. The phenomena studied includes phase equilibria in multicomponent liquid mixture¿ion-exchange resin systems, chemicalequilibrium in the presence of a resin catalyst, diffusion of liquids in gel-type and macroporous resins, and chemical reaction kinetics. Above all, attention was paid to the swelling behavior of the resins and how it affects the kinetic phenomena. Several poly(styrene-co-divinylbenzene) resins with different cross-link densities and internal porosities were used. Esterification of acetic acid with ethanol to produce ethyl acetate and water was used as a model reaction system. Choosing an ion-exchange resin with a low cross-link density is beneficial inthe case of the present reaction system: the amount of ethyl acetate as well the ethyl acetate to water mole ratio in the effluent stream increase with decreasing cross-link density. The enhanced performance of the reactor is mainly attributed to increasing reaction rate, which in turn originates from the phase equilibrium behavior of the system. Also mass transfer considerations favor the use ofresins with low cross-link density. The diffusion coefficients of liquids in the gel-type ion-exchange resins were found to fall rapidly when the extent of swelling became low. Glass transition of the polymer was not found to significantlyretard the diffusion in sulfonated PS¿DVB ion-exchange resins. It was also shown that non-isothermal operation of a chromatographic reactor could be used to significantly enhance the reactor performance. In the case of the exothermic modelreaction system and a near-adiabatic column, a positive thermal wave (higher temperature than in the initial state) was found to travel together with the reactive front. This further increased the conversion of the reactants. Diffusion-induced volume changes of the ion-exchange resins were studied in a flow-through cell. It was shown that describing the swelling and shrinking kinetics of the particles calls for a mass transfer model that explicitly includes the limited expansibility of the polymer network. A good description of the process was obtained by combining the generalized Maxwell-Stefan approach and an activity model that was derived from the thermodynamics of polymer solutions and gels. The swelling pressure in the resin phase was evaluated by using a non-Gaussian expression forthe polymer chain length distribution. Dimensional changes of the resin particles necessitate the use of non-standard mathematical tools for dynamic simulations. A transformed coordinate system, where the mass of the polymer was used as a spatial variable, was applied when simulating the chromatographic reactor columns as well as the swelling and shrinking kinetics of the resin particles. Shrinking of the particles in a column leads to formation of dead volume on top of the resin bed. In ordinary Eulerian coordinates, this results in a moving discontinuity that in turn causes numerical difficulties in the solution of the PDE system. The motion of the discontinuity was eliminated by spanning two calculation grids in the column that overlapped at the top of the resin bed. The reactive and non-reactive phase equilibrium data were correlated with a model derived from thethermodynamics of polymer solution and gels. The thermodynamic approach used inthis work is best suited at high degrees of swelling because the polymer matrixmay be in the glassy state when the extent of swelling is low.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Building and sustaining competitive advantage through the creation of market imperfections is challenging in a constantly changing business environment - particularly since the sources of such advantages are increasingly knowledge-based. Facilitated by improved networks and communication, knowledge spills over to competitors more easily than before,thus creating an appropriability problem: the inability of an innovating firm to utilize its innovations commercially. Consequently, as the importance of intellectual assets increases, their protection also calls for new approaches. Companies have various means of protection at their disposal, and by taking advantage of them they can make intangibles more non-transferable and prevent, or at leastdelay, imitation of their most crucial intellectual assets. However, creating barriers against imitation has another side to it, and the transfer of knowledge in situations requiring knowledge sharing may be unintentionally obstructed. Theaim of this thesis is to increase understanding of how firms can balance knowledge protection and sharing so as to benefit most from their knowledge assets. Thus, knowledge protection is approached through an examination of the appropriability regime of a firm, i.e., the combination of available and effective means ofprotecting innovations, their profitability, and the increased rents due to R&D. A further aim is to provide a broader understanding of the formation and structure of the appropriability regime. The study consists of two parts. The first part introduces the research topic and the overall results of the study, and the second part consists of six complementary research publications covering various appropriability issues. The thesis contributes to the existing literature in several ways. Although there is a wide range of prior research on appropriability issues, a lot of it is restricted either to the study of individual appropriability mechanisms, or to comparing certain features of them. These approaches are combined, and the relevant theoretical concepts are clarified and developed. In addition, the thesis provides empirical evidence of the formation of the appropriability regime, which is consequently presented as an adaptive process. Thus, a framework is provided that better corresponds to the complex reality of the current business environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Desde 2011, el Área de Programación y Calidad de la Universitat Oberta de Catalunya (UOC) trabaja de manera transversal con el Grupo de Servicios de Biblioteca de Apoyo a la Investigación para ofrecer un servicio de apoyo a las convocatorias de evaluación de la investigación (AQU, ANECA). Se ha hecho una apuesta institucional para que el profesorado de la UOC supere satisfactoriamente las calificaciones y reconocimientos externos exigidos para las titulaciones del centro y tenga suficiente y valorada experiencia docente e investigadora.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reference collections of multiple Drosophila lines with accumulating collections of "omics" data have proven especially valuable for the study of population genetics and complex trait genetics. Here we present a description of a resource collection of 84 strains of Drosophila melanogaster whose genome sequences were obtained after 12 generations of full-sib inbreeding. The initial rationale for this resource was to foster development of a systems biology platform for modeling metabolic regulation by the use of natural polymorphisms as perturbations. As reference lines, they are amenable to repeated phenotypic measurements, and already a large collection of metabolic traits have been assayed. Another key feature of these strains is their widespread geographic origin, coming from Beijing, Ithaca, Netherlands, Tasmania, and Zimbabwe. After obtaining 12.5× coverage of paired-end Illumina sequence reads, SNP and indel calls were made with the GATK platform. Thorough quality control was enabled by deep sequencing one line to >100×, and single-nucleotide polymorphisms and indels were validated using ddRAD-sequencing as an orthogonal platform. In addition, a series of preliminary population genetic tests were performed with these single-nucleotide polymorphism data for assessment of data quality. We found 83 segregating inversions among the lines, and as expected these were especially abundant in the African sample. We anticipate that this will make a useful addition to the set of reference D. melanogaster strains, thanks to its geographic structuring and unusually high level of genetic diversity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tämä diplomityö kuvaa viestintä sovelluksen ytimen kehitystyön Symbian-alustalle. Koko sovelluksen vaatimuksena oli vastaamattomiin puheluihin vastaaminen ennalta määritellyillä tekstiviesteillä käyttäjän määrittelemien sääntöjen mukaisesti. Ei-toiminnallisia vaatimuksia olivat resurssien käytön vähentäminen ja uudelleenkäytön mahdollistaminen. Täten tämän työn tavoitteena oli kehittää ydin, joka kapseloi sovelluksen sellaisen toiminnallisuuden, joka on käyttöliittymästä riippumatonta ja uudelleenkäytettävää. Kehitystyössä ohjasi Unified Process, joka on iteroiva, käyttötapauksien ohjaama ja arkkitehtuurikeskeinen ohjelmistoprosessi. Se kannusti käyttämään myös muita teollisuudenalan vakiintuneita menetelmiä, kuten suunnittelumalleja ja visuaalista mallintamista käyttäen Unified Modelling Languagea. Suunnittelumalleja käytettiin kehitystyön aikana ja ohjelmisto mallinnettiin visuaalisesti suunnittelun edistämiseksi ja selkiyttämiseksi. Alustan palveluita käytettiin hyväksi kehitysajan ja resurssien käytön minimoimiseksi. Ytimen päätehtäviksi määrättiin viestien lähettäminen sekä sääntöjen talletus ja tarkistaminen. Sovelluksen eri alueet, eli sovelluspalvelin ja käyttöliittymää, pystyivät käyttämään ydintä ja sillä ei ollut riippuvuuksia käyttöliittymätasolle. Täten resurssien käyttö väheni ja uudelleenkäytettävyys lisääntyi. Viestien lähettäminen toteutettiin Symbian-alustan menetelmin. Sääntöjen tallettamiseen tehtiin tallennuskehys, joka eristää sääntöjen sisäisen ja ulkoisen muodon. Tässä tapauksessa ulkoiseksi tallennustavaksi valittiin relaatiotietokanta. Sääntöjen tarkastaminen toteutettiin tavanomaisella olioiden yhteistoiminnalla. Päätavoite saavutettiin. tämä ja muut hyviksi arvioidut lopputulokset, kuten uudelleenkäytettävyys ja vähentynyt resurssien käyttö, arveltiin juontuvan suunnittelumallien ja Unified Processin käytöstä. Kyseiset menetelmät osoittivat mukautuvansa pieniinkin projekteihin. Menetelmien todettiin myös tukevan ja kannustavan kehitystyön aikaista oppimista, mikä oli välttämätöntä tässä tapauksessa.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nykyisin matkaviestinverkot ovat osa jokapäiväistä elämää. Merkittävimpiä eroja kiinteiden ja matkaviestinverkkojen välillä on käyttäjän liikkuvuus, joka voidaan määritellä mahdollisuudeksi soittaa ja vastaanottaa puheluita missä ja milloin tahansa. Työ selittää termin liikkuvuus ja määrittää ongelmat, jotka täytyy ratkaista liikkuvuuden aikaansaamiseksi sekä tavat, joilla nämä ongelmat on ratkaistu matkaviestinverkoissa. Työ luo yleiskatsauksen liikkuvuuden aikaansaamisessa käytettäviin menetelmiin, joita ovat haku, sijainnin päivitys, sijainnin seuranta ja kanavan vaihto. Työ keskittyy liikkuvuuteen kolmannen sukupolven matkaviestinverkkojen paketti-kytkentäisessä osassa, esimerkkinä liikkuvuuden hallinta UMTS:ssa (Universal Mobile Telecommunications System). Erot paketti- ja piirikytkentäisen osan välillä tuodaan esille ja selitetään. Jotta käyttäjät ja heidän päätteensä voisivat liikkua, tiedon täytyy kulkea verkon eri osien välillä. Merkinanto verkkoelementtien välillä ja liikkuvuuden mahdollistavien toimenpiteiden suoritus tehdään yhteyskäytännön avulla. Työ kuvaa yhteyskäytännöt, jotka ovat osallisena liikkuvuuden tarjontaan. Painopiste on GPRS:n liikkuvuuden-hallintayhteyskäytännössä, GMM:ssä. GMM protokollan prototyypin toteutus on esitetty työn käytännön osassa.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using a database of 2,263 responses to R&D public calls in Catalonia, during the period 2007–2010, this paper proceeds to analyse the potential interaction of the territorial and policy dimensions with the propensity to apply for, and be awarded, a public R&D subsidy. Controlling for characteristics at the firm and project level, we estimate models using a twostep procedure. In the first step, our results suggest that large firms which export and which belong to high-tech manufactures are more likely to participate in a public R&D call. Furthermore, both urban location and past experience of such calls have a positive effect. Our territorial proxy of information spillovers shows a positive sign, but this is only significant at intra-industry level. Membership of one of the sectors prioritized by the Catalan government, perhaps surprisingly, does not have a significant impact. In the second step, our results show that cooperative projects, SMEs or old firms shows a positive effect on the probability of obtaining a public subsidy. Finally, the cluster policy does not show a clear relationship with the public R&D call, suggesting that cluster policies and R&D subsidies follow different goals. Our results are in line with previous results in the literature, but they highlight the unequal territorial distribution of the firms which apply and the fact that policymakers should interlink the decision criteria for their public call with other policies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Next-generation sequencing (NGS) technologies have become the standard for data generation in studies of population genomics, as the 1000 Genomes Project (1000G). However, these techniques are known to be problematic when applied to highly polymorphic genomic regions, such as the human leukocyte antigen (HLA) genes. Because accurate genotype calls and allele frequency estimations are crucial to population genomics analyses, it is important to assess the reliability of NGS data. Here, we evaluate the reliability of genotype calls and allele frequency estimates of the single-nucleotide polymorphisms (SNPs) reported by 1000G (phase I) at five HLA genes (HLA-A, -B, -C, -DRB1, and -DQB1). We take advantage of the availability of HLA Sanger sequencing of 930 of the 1092 1000G samples and use this as a gold standard to benchmark the 1000G data. We document that 18.6% of SNP genotype calls in HLA genes are incorrect and that allele frequencies are estimated with an error greater than ±0.1 at approximately 25% of the SNPs in HLA genes. We found a bias toward overestimation of reference allele frequency for the 1000G data, indicating mapping bias is an important cause of error in frequency estimation in this dataset. We provide a list of sites that have poor allele frequency estimates and discuss the outcomes of including those sites in different kinds of analyses. Because the HLA region is the most polymorphic in the human genome, our results provide insights into the challenges of using of NGS data at other genomic regions of high diversity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Plasmodium and soil transmitted helminth infections (STH) are a major public health problem, particularly among children. There are conflicting findings on potential association between these two parasites. This study investigated the Plasmodium and helminth co-infections among children aged 2 months to 9 years living in Bagamoyo district, coastal region of Tanzania. METHODS: A community-based cross-sectional survey was conducted among 1033 children. Stool, urine and blood samples were examined using a broad set of quality controlled diagnostic methods for common STH (Ascaris lumbricoides, hookworm, Strongyloides stercoralis, Enterobius vermicularis, Trichuris trichura), schistosoma species and Wuchereria bancrofti. Blood slides and malaria rapid diagnostic tests (mRDTs) were utilized for Plasmodium diagnosis. RESULTS: Out of 992 children analyzed, the prevalence of Plasmodium infection was 13% (130/992), helminth 28.5% (283/992); 5% (50/992) had co-infection with Plasmodium and helminth. The prevalence rate of Plasmodium, specific STH and co-infections increased significantly with age (p < 0.001), with older children mostly affected except for S. stercoralis monoinfection and co-infections. Spatial variations of co-infection prevalence were observed between and within villages. There was a trend for STH infections to be associated with Plasmodium infection [OR adjusted for age group 1.4, 95% CI (1.0-2.1)], which was more marked for S. stercoralis (OR = 2.2, 95% CI (1.1-4.3). Age and not schooling were risk factors for Plasmodium and STH co-infection. CONCLUSION: The findings suggest that STH and Plasmodium infections tend to occur in the same children, with increasing prevalence of co-infection with age. This calls for an integrated approach such as using mass chemotherapy with dual effect (e.g., ivermectin) coupled with improved housing, sanitation and hygiene for the control of both parasitic infections.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

From recent calls for positioning forensic scientists within the criminal justice system, but also policing and intelligence missions, this paper emphasizes the need for the development of educational and training programs in the area of forensic intelligence, It is argued that an imbalance exists between perceived and actual understanding of forensic intelligence by police and forensic science managers, and that this imbalance can only be overcome through education. The challenge for forensic intelligence education and training is therefore to devise programs that increase forensic intelligence awareness, firstly for managers to help prevent poor decisions on how to develop information processing. Two recent European courses are presented as examples of education offerings, along with lessons learned and suggested paths forward. It is concluded that the new focus on forensic intelligence could restore a pro-active approach to forensic science, better quantify its efficiency and let it get more involved in investigative and managerial decisions. A new educational challenge is opened to forensic science university programs around the world: to refocus criminal trace analysis on a more holistic security problem solving approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Seychelles, comprehensive tobacco control legislation enacted in 2009, and subsequent regulations, ban smoking in all enclosed places (defined as any area under a fixed or transient roof). A survey in October-November 2014 assessed i) the compliance to the Act and these regulations in 63 restaurants, bars or discotheques and ii) knowledge of the Tobacco control Act and these regulations of supervisors and managers of these hospitality premises; (47 agreed to answer). No person was found smoking in 92% of all premises. However, "no smoking" signs did not conform to regulations in >70% of premises, and ashtrays were seen in 17% of enclosed premises. All supervisors and managers (100%) knew that smoking is banned in enclosed premises but <15% knew the fines liable to persons, respective owners of enclosed places, when a person smokes in an enclosed premise. Furthermore, 60% of supervisors were not aware that no smoking signs must comply with a specific regulation and 40% were not aware that ashtrays are not permitted in enclosed premises. In conclusion, the positive finding is that few persons smoke in restaurants, bars and discotheques, but the survey also showed that several aspects of regulations for tobacco control in enclosed premises are not well implemented. This calls for further information campaigns targeting both the public and the managers of hospitality premises, but also for strengthening enforcement measures, including fines for offenses. Scaling up comprehensive tobacco control measures, including full enforcement of clean air policy, is of paramount importance to meet the national target of 30% reduction of the smoking prevalence between 2010 and 2025.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The design of therapeutic cancer vaccines is aimed at inducing high numbers and potent T cells that are able to target and eradicate malignant cells. This calls for close collaboration between cells of the innate immune system, in particular dendritic cells (DCs), and cells of the adaptive immune system, notably CD4+ helper T cells and CD8+ cytotoxic T cells. Therapeutic vaccines are aided by adjuvants, which can be, for example, Toll¬like Receptor agonists or agents promoting the cytosolic delivery of antigens, among others. Vaccination with long synthetic peptides (LSPs) is a promising strategy, as the requirement for their intracellular processing will mainly target LSPs to professional antigen presenting cells (APCs), hence avoiding the immune tolerance elicited by the presentation of antigens by non-professional APCs. The unique property of antigen cross-processing and cross-presentation activity by DCs plays an important role in eliciting antitumour immunity given that antigens from engulfed dead tumour cells require this distinct biological process to be processed and presented to CD8+T cells in the context of MHC class I molecules. DCs expressing the XCR1 chemokine receptor are characterised by their superior capability of antigen cross- presentation and priming of highly cytotoxic T lymphocyte (CTL) responses. Recently, XCR1 was found to be also expressed in tissue-residents DCs in humans, with a simitar transcriptional profile to that of cross- presenting murine DCs. This shed light into the value of harnessing this subtype of XCR1+ cross-presenting DCs for therapeutic vaccination of cancer. In this study, we explored ways of adjuvanting and optimising LSP therapeutic vaccinations by the use, in Part I, of the XCLl chemokine that selectively binds to the XCR1 receptor, as a mean to target antigen to the cross-presenting XCR1+ DCs; and in Part II, by the inclusion of Q.S21 in the LSP vaccine formulation, a saponin with adjuvant activity, as well as the ability to promote cytosolic delivery of LSP antigens due to its intrinsic cell membrane insertion activity. In Part I, we designed and produced XCLl-(OVA LSP)-Fc fusion proteins, and showed that their binding to XCR1+ DCs mediate their chemoattraction. In addition, therapeutic vaccinations adjuvanted with XCLl-(OVA LSP)-Fc fusion proteins significantly enhanced the OVA-specific CD8+ T cell response, and led to complete tumour regression in the EL4-OVA model, and significant control of tumour growth in the B16.0VA tumour model. With the aim to optimise the co-delivery of LSP antigen and XCLl to skin-draining lymph nodes we also tested immunisations using nanoparticle (NP)-conjugated OVA LSP in the presence or absence of XCLl chemokine. The NP-mediated delivery of LSP potentiated the CTL response seen in the blood of vaccinated mice, and NP-OVA LSP vaccine in the presence of XCLl led to higher blood frequencies of OVA-specific memory-precursor effector cells. Nevertheless, in these settings, the addition XCLl to NP-OVA LSP vaccine formulation did not increase its antitumour therapeutic effect. In the Part II, we assessed in HLA-A2/DR1 mice the immunogenicity of the Melan-AA27L LSP or the Melan-A26. 35 AA27l short synthetic peptide (SSP) used in conjunction with the saponin adjuvant QS21, aiming to identify a potent adjuvant formulation that elicits a quantitatively and qualitatively strong immune response to tumour antigens. We showed a high CTL immune response elicited by the use of Melan-A LSP or SSP with QS21, which both exerted similar killing capacity upon in vivo transfer of target cells expressing the Melan-A peptide in the context of HLA-A2 molecules. However, the response generated by the LSP immunisation comprised higher percentages of CD8+T cells of the central memory phenotype (CD44hl CD62L+ and CCR7+ CD62L+) than those of SSP immunisation, and most importantly, the strong LSP+QS21 response was strictly CD4+T cell-dependent, as shown upon CD4 T cell depletion. Altogether, these results suggest that both XCLl and QS21 may enhance the ability of LSP to prime CD8 specific T cell responses, and promote a long-term memory response. Therefore, these observations may have important implications for the design of protein or LSP-based cancer vaccines for specific immunotherapy of cancer -- Les vacans thérapeutiques contre le cancer visent à induire une forte et durable réponse immunitaire contre des cellules cancéreuses résiduelles. Cette réponse requiert la collaboration entre le système immunitaire inné, en particulier les cellules dendrites (DCs), et le système immunitaire adaptatif, en l'occurrence les lymphocytes TCD4 hdper et CD8 cytotoxiques. La mise au point d'adjuvants et de molécules mimant un agent pathogène tels les ligands TLRs ou d'autres agents facilitant l'internalisation d'antigènes, est essentielle pour casser la tolérance du système immunitaire contre les cellules cancéreuses afin de générer une réponse effectrice et mémoire contre la tumeur. L'utilisation de longs peptides synthétiques (LSPs) est une approche prometteuse du fait que leur présentation en tant qu'antigénes requiert leur internalisation et leur transformation par les cellules dendrites (DCs, qui sont les mieux à même d'éviter la tolérance immunitaire. Récemment une sous-population de DCs exprimant le récepteur XCR1 a été décrite comme ayant une capacité supérieure dans la cross-présentation d'antigènes, d'où un intérêt à développer des vaccins ciblant les DCs exprimant le XCR1. Durant ma thèse de doctorat, j'ai exploré différentes approches pour optimiser les vaccins avec LSPs. La première partie visait à cibler les XCR1-DCs à l'aide de la chemokine XCL1 spécifique du récepteur XCR1, soit sou s la forme de protéine de fusion XCL1-OVA LSP-Fc, soit associée à des nanoparticules. La deuxième partie a consisté à tester l'association des LSPs avec I adjuvant QS21 dérivant d'une saponine dans le but d'optimiser l'internalisation cytosolique des longs peptides. Les protéines de fusion XCLl-OVA-Fc développées dans la première partie de mon travail, ont démontré leur capacité de liaison spécifique sur les XCRl-DCs associée à leur capacité de chemo-attractio. Lorsque inclues dans une mmunisation de souris porteuse de tumeurs établies, ces protéines de fusion XCL1-0VA LSP-Fc et XCLl-Fc plus OVA LSP ont induites une forte réponse CDS OVA spécifique permettant la complète régression des tumeurs de modèle EL4- 0VA et un retard de croissance significatif de tumeurs de type B16-0VA. Dans le but d'optimiser le drainage des LSPs vers es noyaux lymphatiques, nous avons également testé les LSPs fixés de manière covalente à des nanoparticules co- injectees ou non avec la chemokine XCL1. Cette formulation a également permis une forte réponse CD8 accompagnée d'un effet thérapeutique significatif, mais l'addition de la chemokine XCL1 n'a pas ajouté d'effet anti-tumeur supplémentaire. Dans la deuxième partie de ma thèse, j'ai comparé l'immunogénicité de l'antigène humain Melan A soit sous la forme d un LSP incluant un épitope CD4 et CD8 ou sous la forme d'un peptide ne contenant que l'épitope CD8 (SSP) Les peptides ont été formulés avec l'adjuvant QS21 et testés dans un modèle de souris transgéniques pour les MHC let II humains, respectivement le HLA-A2 et DR1. Les deux peptides LSP et SSP ont généré une forte réponse CD8 similaire assoc.ee a une capacité cytotoxique équivalente lors du transfert in vivo de cellules cibles présentant le peptide SSP' Cependant les souris immunisées avec le Melan A LSP présentaient un pourcentage plus élevé de CD8 ayant un Phénotype «centra, memory» (CD44h' CD62L+ and CCR7+ CD62L+) que les souris immunisées avec le SSP, même dix mois après I'immunisation. Par ailleurs, la réponse CD8 au Melan A LSP était strictement dépendante des lymphocytes CD4, contrairement à l'immunisation par le Melan A SSP qui n'était pas affectée. Dans l'ensemble ces résultats suggèrent que la chemokine XCL1 et l'adjuvant QS21 améliorent la réponse CD8 à un long peptide synthétique, favorisant ainsi le développement d'une réponse anti-tumeur mémoire durable. Ces observations pourraient être utiles au développement de nouveau vaccins thérapeutiques contre les tumeurs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

TeliaSoneran SME-viestintäjärjestelmän tarkoituksena on toimia demo- ja kehitysalustana uusille viestintäpalveluille. Näitä palveluita ovat esimerkiksi tilatiedon seuraaminen ja muuttaminen sekä pikaviestien lähettäminen ja vastaanottaminen eri alustoilla, kuten matkapuhelimilla, PDA-laitteilla, PC:eillä. Järjestelmän tulee myös toimia helppona yhteysrajapintana mahdollisille tuleville tiedonsiirtoteille. Pikaviestien lähetys- ja puhelujensignalointiprotokollana järjestelmässä toimii SIP. Järjestelmän sisäisenä kommunikaatioprotokollana toimii CORBA. Työn osuus ja tämän dokumentin fokus ovat järjestelmäytimessä eli Core:ssa. Core:n avulla järjestelmän eri komponentit, kuten SIP-, WAP- ja WWW-viestinvälityspalvelimet sidotaan toisiinsa sekä tietokantaan. Ytimen tehtäviin kuuluu myös käyttäjien tilatietojen ylläpito, viestien reititys eri päätelaitteisiin, ryhmäviestintä sekä pikaviestikomentojen toiminnallisuus, eli sanalla sanoen älykkyys. Lisäksi työssä tarkastellaan ytimen käyttämiä rajapintoja ja niiden toteutustekniikoita, projektin toteutukseen käytettyjä työkaluja sekä järjestelmän tarjoamia palveluita yksityiskohtaisemmin ytimen kannalta. Lopuksi luodaan silmäys tulevaisuuden näkymiin ja järjestelmän nykytilaan sekä kokonaisuutena hyvin menneen projektin tavoitteisiin.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tässä työssä käsitellään muutoksia, joita EGPRS-standardi aiheuttaa matkapuhelimen fyysiselle signalointiprotokollatasolle. EGPRS on laajennus normaaliin GPRS-verkkoon ja se mahdollistaa yhteistoiminnan Yhdysvalloissa käytetyn TDMA-matkapuhelinstandardin kanssa. EGPRS-puhelimessa puhelut hoidetaan TDMA-verkon kautta ja datan siirto GPRS-verkon kautta. EGPRS operoi GSM850 ja GSM1900 taajuusalueilla. EGPRS:n merkittävimpiä uusia ominaisuuksia ovat modulointimenetelmä EDGE ja kompaktit kontrollikanavat. Uudella modulointimenetelmällä saavutetaan kolminkertainen tiedonsiirtonopeus vanhaan modulointimenetelmään verrattuna. Kompaktien kontrollikanavien avulla voidaan tukiaseman taajuuskaistan tarvetta pienentää huomattavasti. Tukiasema voi käyttää vanhaa ja uutta modulointimenetelmää yhtä aikaa. EGPRS-verkko voi sisältää sekä kompakteja että normaaleja tukiasemia.