904 resultados para Special Functions and Pathways
Resumo:
Streptococcus suis est un important pathogène porcin et agent zoonotique responsable de méningites et de septicémies. À ce jour, les mécanismes impliqués dans la réponse immunitaire de l’hôte lors de l’infection par S. suis sont peu connus; et il en est de même pour les stratégies utilisées par S. suis afin de déjouer cette réponse. L’augmentation de l’incidence et de la sévérité des cas humains souligne le besoin d’une meilleure compréhension des interactions entre S. suis et le système immunitaire afin de générer une réponse immunitaire efficace contre ce pathogène. Les cellules dendritiques (DCs) sont de puissantes cellules présentatrices d’antigènes qui stimulent les lymphocytes T et B, assurant la liaison entre l’immunité innée et l’immunité adaptative. L’objectif principal de ce projet était d’évaluer le rôle joué par différents facteurs de virulence de S. suis sur la modulation de la fonction des DCs et de la réponse T-dépendante. Nous avons examiné l’effet des facteurs clés pour la virulence de S. suis, dont la capsule polysaccharidique (CPS), les modifications de la paroi cellulaire (D-alanylation de l’acide lipotéichoïque et N-déacétylation du peptidoglycane) et la toxine suilysine, sur l’activation et la maturation de DCs murines dérivées de la moelle osseuse (bmDCs). Suite à l’infection par S. suis, les bmDCs sont activées et subissent un processus de maturation caractérisé par l’augmentation de l’expression de molécules de co-stimulation et la production de cytokines pro-inflammatoires. La CPS est le principal facteur interférant avec la production de cytokines, même si les modifications de la paroi cellulaire et la suilysine peuvent également moduler la production de certaines cytokines. Enfin, la CPS, les modifications de la paroi cellulaire et la suilysine interfèrent avec la déposition du complément à la surface des bactéries et, en conséquence, avec le « killing » dépendant du complément. Les résultats ont été confirmés à l’aide de bmDCs porcines. Nous avons aussi voulu identifier les récepteurs cellulaires impliqués dans la reconnaissance de S. suis par les DCs. Nous avons démontré que la production de cytokines et l’expression des molécules de co-stimulation par les DCs sont fortement dépendantes de la signalisation par MyD88, suggérant que les DCs reconnaissent S. suis et deviennent activées majoritairement via la signalisation par les récepteurs de type Toll (TLRs). En effet, on remarque une diminution de la production de plusieurs cytokines ainsi que de l’expression de certaines molécules de co-stimulation chez les DCs TLR2-/- ou TLR2-/- et TLR9-/- double négatives. Finalement, le récepteur NOD2 semblait jouer un rôle partiel dans l’activation des DCs suite à une infection par S. suis.Enfin, nous avons évalué les conséquences de la modulation des fonctions des DCs sur le développement de la réponse T-dépendante. Les splénocytes totaux produisent plusieurs cytokines en réponse à S. suis. Des analyses in vivo et ex vivo ont permis d’observer l’implication des cellules T CD4+ et le développement d’une réponse de type « T helper » 1 (TH1) bien que la quantité de cytokines TH1 produites lors de l’infection in vivo par S. suis demeure assez basse. La CPS de S. suis interfère avec la production de plusieurs cytokines par les cellules T in vitro. Expérimentalement, l’infection induite par S. suis résulte en de faibles niveaux de production d’anticorps anti-S. suis, mais aussi d’anticorps dirigés contre l’ovalbumine utilisée comme antigène rapporteur. Cette interférence est corrélée avec la sévérité des signes cliniques, suggérant que S. suis interfère avec le développement d’une réponse immunitaire adaptative appropriée qui serait requise pour contrôler la progression de l’infection. Les résultats de cette étude mèneront à une meilleure compréhension de la réponse immunitaire de l’hôte lors de l’infection par S. suis.
Resumo:
The goal of this study was to investigate the specific patterns of memory breakdown in patients suffering from early-onset Alzheimer’s disease (EOAD) and late-onset Alzheimer’s disease (LOAD). Twenty EOAD patients, twenty LOAD patients, twenty matched younger controls, and twenty matched older controls participated in this study. All participants underwent a detailed neuropsychological assessment, an MRI scan, an FDG-PET scan, and AD patients had biomarkers as supporting evidence of both amyloïdopathy and neuronal injury. Results of the neuropsychological assessment showed that both EOAD and LOAD groups were impaired in the domains of memory, executive functions, language, praxis, and visuoconstructional abilities, when compared to their respective control groups. EOAD and LOAD groups, however, showed distinct patterns of memory impairment. Even though both groups were similarly affected on measures of episodic, short term and working memory, in contrast semantic memory was significantly more impaired in LOAD than in EOAD patients. The EOAD group was not more affected than the LOAD group in any memory domain. EOAD patients, however, showed significantly poorer performance in other cognitive domains including executive functions and visuoconstructional abilities. A more detailed analysis of the pattern of semantic memory performance among patient groups revealed that the LOAD was more profoundly impaired, in tasks of both spontaneous recall and semantic recognition. Voxel-Based Morphometry (VBM) analyses showed that impaired semantic performance in patients was associated with reduced gray matter volume in the anterior temporal lobe region, while PET-FDG analyses revealed that poorer semantic performance was associated with greater hypometabolism in the left temporoparietal region, both areas reflecting key regions of the semantic network. Results of this study indicate that EOAD and LOAD patients present with distinct patterns of memory impairment, and that a genuine semantic impairment may represent one of the clinical hallmarks of LOAD.
Resumo:
The scientific literature often mentions that there is a statistical connection between alcohol and drug consumption and criminal behaviour. However, there is little information available which would make it possible to quantify this connection, and specify the impact that drugs and alcohol have on criminal behaviour. Consumption of psychoactive substances has two major effects: intoxication and addiction. These effects are related, respectively, to the psycho-pharmacological and economic-compulsive models of the connection between drugs and crime. The first model associates drug use and intoxication with a decrease in cognitive functions and a lack of self-control, leading to aggressive impulses, violence and lack of inhibitions. The second model refers to the huge costs that are associated with being addicted to certain drugs. A person addicted to these drugs would need to engage in lucrative criminal activities in order to pay for them. This article explores and attempts to further define the links between alcohol, illicit drugs and criminal behaviour, taking into account the types of drugs consumed and the types of criminal behaviour displayed.
Resumo:
Les histones sont des protéines nucléaires hautement conservées chez les cellules des eucaryotes. Elles permettent d’organiser et de compacter l’ADN sous la forme de nucléosomes, ceux-ci representant les sous unités de base de la chromatine. Les histones peuvent être modifiées par de nombreuses modifications post-traductionnelles (PTMs) telles que l’acétylation, la méthylation et la phosphorylation. Ces modifications jouent un rôle essentiel dans la réplication de l’ADN, la transcription et l’assemblage de la chromatine. L’abondance de ces modifications peut varier de facon significative lors du developpement des maladies incluant plusieurs types de cancer. Par exemple, la perte totale de la triméthylation sur H4K20 ainsi que l’acétylation sur H4K16 sont des marqueurs tumoraux spécifiques a certains types de cancer chez l’humain. Par conséquent, l’étude de ces modifications et des événements determinant la dynamique des leurs changements d’abondance sont des atouts importants pour mieux comprendre les fonctions cellulaires et moléculaires lors du développement de la maladie. De manière générale, les modifications des histones sont étudiées par des approches biochimiques telles que les immuno-buvardage de type Western ou les méthodes d’immunoprécipitation de la chromatine (ChIP). Cependant, ces approches présentent plusieurs inconvénients telles que le manque de spécificité ou la disponibilité des anticorps, leur coût ou encore la difficulté de les produire et de les valider. Au cours des dernières décennies, la spectrométrie de masse (MS) s’est avérée être une méthode performante pour la caractérisation et la quantification des modifications d’histones. La MS offre de nombreux avantages par rapport aux techniques traditionnelles. Entre autre, elle permet d’effectuer des analyses reproductibles, spécifiques et facilite l’etude d’un large spectre de PTMs en une seule analyse. Dans cette thèse, nous présenterons le développement et l’application de nouveaux outils analytiques pour l’identification et à la quantification des PTMs modifiant les histones. Dans un premier temps, une méthode a été développée pour mesurer les changements d’acétylation spécifiques à certains sites des histones. Cette méthode combine l’analyse des histones intactes et les méthodes de séquençage peptidique afin de déterminer les changements d’acétylation suite à la réaction in vitro par l’histone acétyltransférase (HAT) de levure Rtt109 en présence de ses chaperonnes (Asf1 ou Vps75). Dans un second temps, nous avons développé une méthode d’analyse des peptides isomériques des histones. Cette méthode combine la LC-MS/MS à haute résolution et un nouvel outil informatique appelé Iso-PeptidAce qui permet de déconvoluer les spectres mixtes de peptides isomériques. Nous avons évalué Iso-PeptidAce avec un mélange de peptides synthétiques isomériques. Nous avons également validé les performances de cette approche avec des histones isolées de cellules humaines érythroleucémiques (K562) traitées avec des inhibiteurs d’histones désacétylases (HDACi) utilisés en clinique, et des histones de Saccharomyces cerevisiae liées au facteur d’assemblage de la chromatine (CAF-1) purifiées par chromatographie d’affinité. Enfin, en utilisant la méthode présentée précédemment, nous avons fait une analyse approfondie de la spécificité de plusieurs HATs et HDACs chez Schizosaccharomyces pombe. Nous avons donc déterminé les niveaux d’acétylation d’histones purifiées à partir de cellules contrôles ou de souches mutantes auxquelles il manque une HAT ou HDAC. Notre analyse nous a permis de valider plusieurs cibles connues des HATs et HDACs et d’en identifier de nouvelles. Nos données ont également permis de définir le rôle des différentes HATs et HDACs dans le maintien de l’équilibre d’acétylation des histones. Dans l’ensemble, nous anticipons que les méthodes décrites dans cette thèse permettront de résoudre certains défis rencontrés dans l’étude de la chromatine. De plus, ces données apportent de nouvelles connaissances pour l’élaboration d’études génétiques et biochimiques utilisant S. pombe.
Resumo:
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.
Resumo:
This thesis entitled “Development planning at the state level in india a case study with reference to kerala1957-84.Planning in India is a concurrent subject with the Centre and the States having well-defined domains of jurisdiction with regard to planning functions and sources of resource mobilisation.The genesis of the lack of academic interest in state level planning is in the widely held belief that in the extent scheme of Centre-State economic relations, the states have little scope for initiative in planning.Both at the theoretical and empirical levels, Kerala has attached very great importance to planning.It has been the localeof wide and deep discussions on the various dimensions of planning.In Kerala's development process, the leading sector consists of social services such as education and public healthOne point that needs special emphasis in this regard is that the high demand for education in Kerala cannot be attributed to the Keralites' ‘unique urge‘ for education. Rather, it is related to the very high level of unemployment in the state (Kerala has the highest level of unemployment in the country.In resource allocation under the Five Year Plans, Kerala attached the highest weightage to power generation, hydro-electric projects being the major source of power in the state. Nearly one-fourth of the plan resources has been claimed by hydro-electric projects.In the agricultural sector, Kera1a's level of productive use of electric power is one of the lowest.As is evident.from above, planning in Kerala has not enabled us to solve the basic problems of the state. More 'scientific' planning in the sense of applying mre sophisticated planning techniques is obviously not the answer. It, on the contrary, consists of more fundamental changes some of which can be brought about through an effective use of measures well within the power of the State Government.
Resumo:
The objective of this thesis is to study the time dependent behaviour of some complex queueing and inventory models. It contains a detailed analysis of the basic stochastic processes underlying these models. In the theory of queues, analysis of time dependent behaviour is an area.very little developed compared to steady state theory. Tine dependence seems certainly worth studying from an application point of view but unfortunately, the analytic difficulties are considerable. Glosod form solutions are complicated even for such simple models as M/M /1. Outside M/>M/1, time dependent solutions have been found only in special cases and involve most often double transforms which provide very little insight into the behaviour of the queueing systems themselves. In inventory theory also There is not much results available giving the time dependent solution of the system size probabilities. Our emphasis is on explicit results free from all types of transforms and the method used may be of special interest to a wide variety of problems having regenerative structure.
Resumo:
An attempt is made by the researcher to establish a theory of discrete functions in the complex plane. Classical analysis q-basic theory, monodiffric theory, preholomorphic theory and q-analytic theory have been utilised to develop concepts like differentiation, integration and special functions.
Resumo:
Antennas play an important role in determining the characteristics of any electronic system which depends on free space as the propagation medium. Basically, an antenna can be considered as the connecting link between free space and the transmitter or receiver. For radar and navigational purposes the directional properties of an antenna is its most basic requirement as it determines the distribution of radiated energy. Hence the study of directional properties of antennas has got special significance and several useful applications.
Resumo:
This paper describes JERIM-320, a new 320-bit hash function used for ensuring message integrity and details a comparison with popular hash functions of similar design. JERIM-320 and FORK -256 operate on four parallel lines of message processing while RIPEMD-320 operates on two parallel lines. Popular hash functions like MD5 and SHA-1 use serial successive iteration for designing compression functions and hence are less secure. The parallel branches help JERIM-320 to achieve higher level of security using multiple iterations and processing on the message blocks. The focus of this work is to prove the ability of JERIM 320 in ensuring the integrity of messages to a higher degree to suit the fast growing internet applications
Resumo:
The median (antimedian) set of a profile π = (u1, . . . , uk) of vertices of a graphG is the set of vertices x that minimize (maximize) the remoteness i d(x,ui ). Two algorithms for median graphs G of complexity O(nidim(G)) are designed, where n is the order and idim(G) the isometric dimension of G. The first algorithm computes median sets of profiles and will be in practice often faster than the other algorithm which in addition computes antimedian sets and remoteness functions and works in all partial cubes
Resumo:
In now-a-days semiconductor and MEMS technologies the photolithography is the working horse for fabrication of functional devices. The conventional way (so called Top-Down approach) of microstructuring starts with photolithography, followed by patterning the structures using etching, especially dry etching. The requirements for smaller and hence faster devices lead to decrease of the feature size to the range of several nanometers. However, the production of devices in this scale range needs photolithography equipment, which must overcome the diffraction limit. Therefore, new photolithography techniques have been recently developed, but they are rather expensive and restricted to plane surfaces. Recently a new route has been presented - so-called Bottom-Up approach - where from a single atom or a molecule it is possible to obtain functional devices. This creates new field - Nanotechnology - where one speaks about structures with dimensions 1 - 100 nm, and which has the possibility to replace the conventional photolithography concerning its integral part - the self-assembly. However, this technique requires additional and special equipment and therefore is not yet widely applicable. This work presents a general scheme for the fabrication of silicon and silicon dioxide structures with lateral dimensions of less than 100 nm that avoids high-resolution photolithography processes. For the self-aligned formation of extremely small openings in silicon dioxide layers at in depth sharpened surface structures, the angle dependent etching rate distribution of silicon dioxide against plasma etching with a fluorocarbon gas (CHF3) was exploited. Subsequent anisotropic plasma etching of the silicon substrate material through the perforated silicon dioxide masking layer results in high aspect ratio trenches of approximately the same lateral dimensions. The latter can be reduced and precisely adjusted between 0 and 200 nm by thermal oxidation of the silicon structures owing to the volume expansion of silicon during the oxidation. On the basis of this a technology for the fabrication of SNOM calibration standards is presented. Additionally so-formed trenches were used as a template for CVD deposition of diamond resulting in high aspect ratio diamond knife. A lithography-free method for production of periodic and nonperiodic surface structures using the angular dependence of the etching rate is also presented. It combines the self-assembly of masking particles with the conventional plasma etching techniques known from microelectromechanical system technology. The method is generally applicable to bulk as well as layered materials. In this work, layers of glass spheres of different diameters were assembled on the sample surface forming a mask against plasma etching. Silicon surface structures with periodicity of 500 nm and feature dimensions of 20 nm were produced in this way. Thermal oxidation of the so structured silicon substrate offers the capability to vary the fill factor of the periodic structure owing to the volume expansion during oxidation but also to define silicon dioxide surface structures by selective plasma etching. Similar structures can be simply obtained by structuring silicon dioxide layers on silicon. The method offers a simple route for bridging the Nano- and Microtechnology and moreover, an uncomplicated way for photonic crystal fabrication.
Resumo:
The progress in microsystem technology or nano technology places extended requirements to the fabrication processes. The trend is moving towards structuring within the nanometer scale on the one hand, and towards fabrication of structures with high aspect ratio (ratio of vertical vs. lateral dimensions) and large depths in the 100 µm scale on the other hand. Current procedures for the microstructuring of silicon are wet chemical etching and dry or plasma etching. A modern plasma etching technique for the structuring of silicon is the so-called "gas chopping" etching technique (also called "time-multiplexed etching"). In this etching technique, passivation cycles, which prevent lateral underetching of sidewalls, and etching cycles, which etch preferably in the vertical direction because of the sidewall passivation, are constantly alternated during the complete etching process. To do this, a CHF3/CH4 plasma, which generates CF monomeres is employed during the passivation cycle, and a SF6/Ar, which generates fluorine radicals and ions plasma is employed during the etching cycle. Depending on the requirements on the etched profile, the durations of the individual passivation and etching cycles are in the range of a few seconds up to several minutes. The profiles achieved with this etching process crucially depend on the flow of reactants, i.e. CF monomeres during the passivation cycle, and ions and fluorine radicals during the etching cycle, to the bottom of the profile, especially for profiles with high aspect ratio. With regard to the predictability of the etching processes, knowledge of the fundamental effects taking place during a gas chopping etching process, and their impact onto the resulting profile is required. For this purpose in the context of this work, a model for the description of the profile evolution of such etching processes is proposed, which considers the reactions (etching or deposition) at the sample surface on a phenomenological basis. Furthermore, the reactant transport inside the etching trench is modelled, based on angular distribution functions and on absorption probabilities at the sidewalls and bottom of the trench. A comparison of the simulated profiles with corresponding experimental profiles reveals that the proposed model reproduces the experimental profiles, if the angular distribution functions and absorption probabilities employed in the model is in agreement with data found in the literature. Therefor the model developed in the context of this work is an adequate description of the effects taking place during a gas chopping plasma etching process.
Resumo:
In this 1984 proof of the Bieberbach and Milin conjectures de Branges used a positivity result of special functions which follows from an identity about Jacobi polynomial sums thas was published by Askey and Gasper in 1976. The de Branges functions Tn/k(t) are defined as the solutions of a system of differential recurrence equations with suitably given initial values. The essential fact used in the proof of the Bieberbach and Milin conjectures is the statement Tn/k(t)<=0. In 1991 Weinstein presented another proof of the Bieberbach and Milin conjectures, also using a special function system Λn/k(t) which (by Todorov and Wilf) was realized to be directly connected with de Branges', Tn/k(t)=-kΛn/k(t), and the positivity results in both proofs Tn/k(t)<=0 are essentially the same. In this paper we study differential recurrence equations equivalent to de Branges' original ones and show that many solutions of these differential recurrence equations don't change sign so that the above inequality is not as surprising as expected. Furthermore, we present a multiparameterized hypergeometric family of solutions of the de Branges differential recurrence equations showing that solutions are not rare at all.
Resumo:
This work presents Bayes invariant quadratic unbiased estimator, for short BAIQUE. Bayesian approach is used here to estimate the covariance functions of the regionalized variables which appear in the spatial covariance structure in mixed linear model. Firstly a brief review of spatial process, variance covariance components structure and Bayesian inference is given, since this project deals with these concepts. Then the linear equations model corresponding to BAIQUE in the general case is formulated. That Bayes estimator of variance components with too many unknown parameters is complicated to be solved analytically. Hence, in order to facilitate the handling with this system, BAIQUE of spatial covariance model with two parameters is considered. Bayesian estimation arises as a solution of a linear equations system which requires the linearity of the covariance functions in the parameters. Here the availability of prior information on the parameters is assumed. This information includes apriori distribution functions which enable to find the first and the second moments matrix. The Bayesian estimation suggested here depends only on the second moment of the prior distribution. The estimation appears as a quadratic form y'Ay , where y is the vector of filtered data observations. This quadratic estimator is used to estimate the linear function of unknown variance components. The matrix A of BAIQUE plays an important role. If such a symmetrical matrix exists, then Bayes risk becomes minimal and the unbiasedness conditions are fulfilled. Therefore, the symmetry of this matrix is elaborated in this work. Through dealing with the infinite series of matrices, a representation of the matrix A is obtained which shows the symmetry of A. In this context, the largest singular value of the decomposed matrix of the infinite series is considered to deal with the convergence condition and also it is connected with Gerschgorin Discs and Poincare theorem. Then the BAIQUE model for some experimental designs is computed and compared. The comparison deals with different aspects, such as the influence of the position of the design points in a fixed interval. The designs that are considered are those with their points distributed in the interval [0, 1]. These experimental structures are compared with respect to the Bayes risk and norms of the matrices corresponding to distances, covariance structures and matrices which have to satisfy the convergence condition. Also different types of the regression functions and distance measurements are handled. The influence of scaling on the design points is studied, moreover, the influence of the covariance structure on the best design is investigated and different covariance structures are considered. Finally, BAIQUE is applied for real data. The corresponding outcomes are compared with the results of other methods for the same data. Thereby, the special BAIQUE, which estimates the general variance of the data, achieves a very close result to the classical empirical variance.