848 resultados para Self-determined learning strategies
Resumo:
Neuropsychological and neuroimaging data suggest that the self-memory system can be fractionated into three functionally independent systems processing personal information at several levels of abstraction, including episodic memories of one's life (episodic autobiographical memory, EAM), semantic knowledge of facts about one's life (semantic autobiographical memory, SAM), and semantic knowledge of one's personality [conceptual self, (CS)]. Through the study of two developmental amnesic patients suffering of neonatal brain injuries, we explored how the different facets of the self-memory system develop when growing up with bilateral hippocampal atrophy. Neuropsychological evaluations showed that both of them suffered from dramatic episodic learning disability with no sense of recollection (Remember/Know procedure), whereas their semantic abilities differed, being completely preserved (Valentine) or not (Jocelyn). Magnetic resonance imaging, including quantitative volumetric measurements of the hippocampus and adjacent (entorhinal, perirhinal, and temporopolar) cortex, showed severe bilateral atrophy of the hippocampus in both patients, with additional atrophy of adjacent cortex in Jocelyn. Exploration of EAM and SAM according to lifetime periods covering the entire lifespan (TEMPAu task, Piolino et al., 2009) showed that both patients had marked impairments in EAM, as they lacked specificity, details and sense of recollection, whereas SAM was completely normal in Valentine, but impaired in Jocelyn. Finally, measures of patients' CS (Tennessee Self-Concept Scale, Fitts and Warren, 1996), checked by their mothers, were generally within normal range, but both patients showed a more positive self-concept than healthy controls. These two new cases support a modular account of the medial-temporal lobe with episodic memory and recollection depending on the hippocampus, and semantic memory and familiarity on adjacent cortices. Furthermore, they highlight developmental episodic and semantic functional independence within the self-memory system suggesting that SAM and CS may be acquired without episodic memories.
Resumo:
Tutkimus tarkastelee vaihtoehtoisia termiinisuojaustrategioita metsäteollisuuden alan tulosyksikössä. Jälkitestauksen tarkoituksena on arvioida vaihtoehtoisten strategioiden tuloksellisuutta suojata case-yrityksen kassavirtoja seuraavan kolmen arviointikriteerin avulla: yksittäisten vieraan valuutan määräisten kassavirtojen vaihtelu; koko vieraan valuutan määräisen kassavirran vaihtelu; suojausvoitot ja -tappiot. Tutkimuksen teoreettinen viitekehys tarkastelee yrityksen päätöksentekoa, valuuttariskien suojausprosessia sekä esittelee yrityksen vaihtoehtoisia suojausstrategioita. Tutkimuksen empiirinen aineisto pohjautuu case- yrityksen historiallisiin myyntilukuihin ja on kerätty yrityksen tietojärjestelmästä. Muu tutkimuksessa käytetty dataon kerätty eri tietokannoista. Tutkimuksen tulokset osoittavat, että suojaaminen vähentää kassavirtojen vaihtelua. Suojaamisen taloudelliset tulokset ovat kuitenkin erittäin riippuvaisia valitusta suojausstrategiasta, joka voi johtaa merkittäviin suojausvoittoihin, mutta yhtä hyvin myos merkittäviin tappioihin. Johdon näkemykset ja riskitoleranssi määrittelevät mitä strategiaa yrityksessä tullaan viime kädessä noudattamaan.
Resumo:
1. 1. Summaries 1.1. Preamble and extended abstract The present thesis dissertation addresses the question of antiviral immunity from the particular standpoint of the adaptive T cell-mediated immune response. The experimental work is presented in the form of three published articles (two experimental articles and one review article, see sections 4.1, 4.2 and 4.3 on pages 73, 81 and 91, respectively), describing advances both in our understanding of viral control by CD8 T lymphocytes, and in vaccine development against the Human Immunodeficiency Virus Type 1 (HIV-1). Because the articles focus on rather specialized areas of antiviral immunity, the article sections are preceded by a general introduction (section 3) on the immune system in general, and on four viruses that were addressed in the experimental work, namely HIV-1, Cytomegalovirus (CMV), Epstein Barr Virus (EBV) and Influenzavirus (Flu). This introduction section is aimed at providing a glimpse on viral molecular biology and immunity, to help the hypothetical non-expert reader proceeding into the experimental part. For this reason, each section is presented as individual entity and can be consulted separately. The four viruses described are of peculiar relevance to immunity because they induce an array of opposite host responses. Flu causes a self limiting disease after which the virus is eradicated. CMV and EBV cause pauci-symptomatic or asymptomatic diseases after which the viruses establish lifelong latency in the host cells, but are kept in check by immunity. Eventually, HIV-1 establishes both latency - by inserting its genome into the host cell chromosome - and proceeds in destroying the immune system in a poorly controlled fashion. Hence, understanding the fundamental differences between these kinds of viral host interactions might help develop new strategies to curb progressive diseases caused by viruses such as HIV-1. Publication #1: The first article (section 4.1, page 73) represents the main frame of my laboratory work. It analyses the ability of CD8 T lymphocytes recovered from viral-infected patients to secrete interferon γ (IFN-γ) alone or in conjunction with interleukin 2 (IL-2) when exposed in vitro to their cognate viral antigens. CD8 T cells are instrumental in controlling viral infection. They can identify infected cells by detecting viral antigens presented at the surface of the infected cells, and eliminate both the cell and its infecting virus by triggering apoptosis and/or lysis of the infected cell. Recognition of these antigens triggers the cognate CD8 cells to produce cytokines, including IFN-γ and IL-2, which in turn attract and activate other pro-inflammatory cells. IFN-γ triggers both intrinsic antiviral activity of the infected cells and distant activation of pro-inflammatory cells, which are important for the eradication of infection. IL-2 is essential for clonal expansion of the antigen (Ag)-specific CD8 T cell. Hence the existence of Ag-specific CD8 cells secreting both IFN-γand IL-2 should be beneficial for controlling infection. In this first work we determined the percentage of IFN-y/IL-2 double positive and single IFN-γsecreting CD8 T cells against antigens HIV-1, CMV, EBV and Flu in three groups of subjects: (i) HIV-1 infected patients progressing to disease (progressors), (ii) HIV-1-infected subjects not progressing to disease (long-term non progressors or LTNP), and (iii) HIV negative blood donors. The results disclosed a specific IFN-y/IL-2 double positive CD8 response in all subjects able to control infection. In other words, IFN-y/IL-2 double positive CD8 cells were present in virus-specific CD8 T cells against Flu, CMV and EBV as well against HIV-1 in LTNP. In contrast, progressors only had single IFN-γsecreting CD8 T cells. Hence, the ability to develop an IFN-y/IL-2 double positive response might be critical to control infection, independently of the nature of the virus. Additional experiments helped identify the developmental stage of the missing cells (using different markers such as CD45RA and CCR7) and showed a correlation between the absence of IL-2 secreting CD8 T cells and a failure in the proliferation capacity of virus-specific CD8 T cells. Addition of exogenous IL-2 could restore clonal expansion of HIV-1 specific CD8 T cells, at least in vitro. It could further been shown, that IL-2 secreting CD8 T cells are sufficient to support proliferation even in absence of CD4 help. However, the reason for the missing IFN-y/IL-2 double positive CD8 T cell response in HIV-1 progessors has yet to be determined. Publication #2: The second article (section 4.2, page 81) explores new strategies to trigger CD8 T cell immunity against specific HIV-1 proteins believed to be processed and exposed as "infection signal" at the surface of infected cells. Such signals consist of peptide fragments (8- 13 amino acids) originating from viral proteins and presented to CD8 T cells in the frame of particular cell surface molecules of the major histocompatibility complex class I* (MHC I). To mimic "natural" viral infection, the HIV-1 polyprotein Gagpolnef was inserted and expressed in either of two attenuated viruses i.e. vaccinia virus (MVA) or poxvirus (NYVAC). Mice were infected with these recombinant viruses and specific CD8 T cell response to Gagpolnef peptides was sought. Mice could indeed mount a CD8 T cell response against the HIV-1 antigens, indicating that the system worked, at least in this animal model. To further test whether peptides from Gagpolnef could also be presented in the frame of the human MHC class I proteins, a second round of experiments was performed in "humanized" transgenic mice expressing human MHC molecules. The transgenic mice were also able to load Gagpolnef peptides on their human MHC molecule, and these cells could be detected and destroyed by Ag-specific CD8 T cells isolated from HIV-1-infected patients. Therefore, expressing Gagpolnef on attenuated recombinant viruses might represent a valid strategy for anti-HIV-1 immunization in human. Publication #3: This is a review paper (section 4.3, page 91) describing the immune response to CMV and newly developed methods to detect this cellular immune response. Some of it focuses on the detection of T cells by using in vitro manufactured tetramers. These consist of four MHC class I molecules linked together and loaded with the appropriate antigenic peptide. The tetramer can be labeled with a fluorochrome and analyzed with a fluorescence-activated cell sorter. Taken together, the work presented indicates that (i) an appropriate CD8 T cell response consisting of IFN-y/IL-2 double positive effectors, can potentially control viral infection, including HIV-1 infection, (ii) such a response might be triggered by recombinant viral vaccines, and (iii) CD8 T cell response can be monitored by a variety of techniques, including recently-developed MHC class I tetramers. 1. 2. Préambule et résumé élargi Le présent travail de thèse s'intéresse à l'immunité antivirale du point de vue particulier de la réponse adaptative des cellules T. Le travail expérimental est présenté sous la forme de trois articles publiés (2 articles expérimentaux et 1 article de revue, voir sections 4.1, 4.2 et 4.3, pages 58, 66 et 77, respectivement), décrivant des progrès dans la compréhension du contrôle de l'infection virale par les lymphocytes T CD8, ainsi que dans le développement de nouveaux vaccins contre le Virus d'Immunodéficience de Humaine de type 1 (VIH-1). En raison du caractère spécialisé de l'immunité antivirale de type cellulaire, les articles sont précédés par une introduction générale (section 3), dont le but est de pourvoir le lecteur non avisé avec des bases nécessaire à une meilleure appréhension du travail expérimental. Cette introduction présente les grandes lignes du système immunitaire, et décrit de façon générale les 4 virus utilisés dans le travail expérimental: à savoir le virus VIH-1, le Cytomégalovirus (CMV), le virus Epstein Barr (EBV) et le virus Influenza A (Flu). Toutes les sections sont présentées de façon individuelle et peuvent être consultées séparément. La description des 4 virus a une pertinence particulière quant à leur interaction avec le système immun. En effet, ils induisent une panoplie de réponses immunitaires s'étendant aux extrêmes de la réaction de l'hôte. Influenza A est à l'origine d'une maladie cytopathique aiguë, au décours de laquelle le virus est éradiqué par l'hôte. CMV et EBV sont classiquement à l'origine d'infections pauci-symptomatiques, voire asymptomatiques, après lesquelles les virus persistent de façon latente dans la cellule hôte. Cependant, ils restent sous le contrôle du système immun, qui peut prévenir une éventuelle réactivation. Enfin, VIH-1 s'établit à la fois en infection latente - par l'insertion de son génome dans le chromosome des cellules hôtes - et en infection productive et cytopathique, échappant au contrôle immunitaire et détruisant ses cellules cibles. La compréhension des différences fondamentales entre ces différents types d'interactions virus-hôte devraient faciliter le développement de nouvelles stratégies antivirales. Article 1: Le premier article (section 4.1 Page 58) représente l'objet principal de mon travail de laboratoire. Il analyse la capacité des lymphocytes T CD8 spécifiques de différent virus à sécréter de l'interféron gamma (IFN-y) et/ou de l'interleukine 2 (IL-2) après stimulation par leur antigène spécifique. Les cellules T CD8 jouent un rôle crucial dans le contrôle des infections virales. Elles identifient les cellules infectées en détectant des antigènes viraux présentés à la surface de ces mêmes cellules, et éliminent à la fois les cellules infectées et les virus qu'elles contiennent en induisant l'apoptose et/ou la lyse des cellules cibles. Parallèlement, l'identification de l'antigène par la cellule T CD8 la stimule à sécréter des cytokines. L'IFN-γen est un exemple. L'IFN-γ stimule les cellules infectées à développer une activé antivirale intrinsèque. De plus, il attire sur place d'autres cellules de l'inflammation, et active leur fonction d'éradication des pathogènes. L'IL-2 est un autre exemple. L'IL-2 est essentielle à l'expansion clonale des cellules T CD8 spécifiques à un virus donné. Elle est donc essentielle à augmenter le pool de lymphocytes antiviraux. En conséquence, la double capacité de sécréter de l'IFN-γ et de IL-2 pourrait être un avantage pour le contrôle antiviral par les cellules T CD8. Dans ce travail nous avons comparé les proportions de lymphocytes T CD8 doubles positifs (IFN-γ/IL-2) et simples positifs (IFN-γ) chez trois groupes de sujets: (i) des patients infectés par VIH-1 qui ne contrôlent pas l'infection (progresseurs), (ii) des patients infectés par VIH-1, mais contrôlant l'infection malgré l'absence de traitement ("long term non progressors" [LTNP]) et (iii) des donneurs de sang négatifs pour l'infection à VIH-1. Les résultats ont montré que les individus capables de contrôler une infection possédaient des cellules T CD8 doubles positifs (IFN-γ/IL-2), alors que les patients ne contrôlant pas l'infection procédaient prioritairement des CD8 simples positifs (IFN-γ). Spécifiquement, les lymphocytes T spécifiques pour Flu, CMV, EBV, et VII-1-1 chez les LTNP étaient tous IFN-γ/IL-2 doubles positifs. Au contraire, les lymphocytes T CD8 spécifique à VIH-1 étaient IFN-γ simples positifs chez les progresseurs. La capacité de développer une réponse IFN-γ/IL-2 pourraient être primordiale pour le contrôle de l'infection, indépendamment de la nature du virus. En effet, il a été montré que l'absence de sécrétion d'IL2 par les lymphocytes T CD8 corrélait avec leur incapacité de proliférer. Dans nos mains, cette prolifération a pu être restaurée in vitro par l'adjonction exogène d'IL-2. Toutefois, la faisabilité de ce type de complémentation in vivo n'est pas claire. Des expériences additionnelles ont permis de préciser de stade de développement des lymphocytes doubles positifs et simples positifs par le biais des marqueurs CD45RA et CCR7. Il reste maintenant à comprendre pourquoi certains lymphocytes T CD8 spécifiques sont incapables à sécréter de l'IL-2. Article 2: Le deuxième article explore des nouvelles stratégies pour induire une immunité T CD8 spécifique aux protéines du VIH-1, qui sont édités et exposés à la surface des cellules infectées. Ces signaux consistent en fragments de peptide de 8-13 acide aminés provenant de protéines virales, et exposées à la surface des cellules infectées dans le cadre des molécules spécialisées d'histocompatibilité de classe I (en anglais "major histocompatibility class I" ou MHC I). Pour mimer une infection virale, la polyprotéine Gagpolnef du VIH-1 a été insérée et exprimée dans deux vecteurs viraux atténués, soit MVA (provenant de vaccinia virus) ou NYVAC (provenant d'un poxvirus). Ensuite des souris ont été infectées avec ces virus recombinants et la réponse T CD8 aux peptides issus de Gagpolnef a été étudiée. Les souris ont été capables de développer une réponse de type CD8 T contre ces antigènes du VIH-1. Pour tester si ces antigènes pouvaient aussi être présentés par dans le cadre de molécules MHC humaines, des expériences supplémentaires ont été faites avec des souris exprimant un MHC humain. Les résultats de ces manipulations ont montré que des cellules T CD8 spécifique aux protéines du VIH pouvaient être détectées. Ce travail ouvre de nouvelles options quant à l'utilisation des virus recombinants exprimant Gagpolnef comme stratégie vaccinale contre le virus VIH-I chez l'homme. Article 3: Ces revues décrivent la réponse immunitaire à CMV ainsi que des nouvelles méthodes pouvant servir à sa détection. Une partie du manuscrit décrit la détection de cellule T à l'aide de tétramères. Il s'agit de protéines chimériques composées de 4 quatre molécules MHC liées entre elles. Elles sont ensuite "chargées" avec le peptide antigénique approprié, et utilisée pour détecter les cellules T CD8 spécifiques à ce montage. Elles sont aussi marquées par un fluorochrome, qui permet une analyse avec un cytomètre de flux, et l'isolement ultime des CD8 d'intérêt. En résumé, le travail présenté dans cette thèse indique que (i) une réponse T CD8 appropriée - définie par la présence des cellules effectrices doublement positives pour l'IFN-γ et l'IL-2 - semble indispensable pour le contrôle des infections virales, y compris par le VIH-1, (ii) une telle réponse peut être induite par des vaccin viral recombinant, et (iii) la réponse T CD8 peut être analysée et suivie grâce à plusieurs techniques, incluant celle des tétramères de MHC class I. 1.3. Résumé pour un large public Le système immunitaire humain est composé de différents éléments (cellules, tissus et organes) qui participent aux défenses de l'organisme contre les pathogènes (bactéries, virus). Parmi ces cellules, les lymphocytes T CD8, également appelés cellules tueuses, jouent un rôle important dans la réponse immunitaire et le contrôle des infections virales. Les cellules T CD8 reconnaissent de manière spécifique des fragments de protéines virales qui sont exposés à la surface des cellules infectées par le virus. Suite à cette reconnaissance, les cellules T CD8 sont capables de détruire et d'éliminer ces cellules infectées, ainsi que les virus qu'elles contiennent. Dans le contexte d'une infection par le virus de l'immunodéficience humaine (VIH), le virus responsable du SIDA, il a pu être montré que la présence des cellules T CD8 est primordiale. En effet, en l'absence de ces cellules, les individus infectés par le VIH progressent plus rapidement vers le SIDA. Au cours de la vie, l'Homme est exposé à plusieurs virus. Mais à l'opposé du VIH, certains d'entre eux ne causent pas des maladies graves : par exemple le virus de la grippe (Influenza), le cytomégalovirus ou encore le virus d'Epstein-Barr. Certains de ces virus peuvent être contrôlés et éliminés de l'organisme (p. ex. le virus de la grippe), alors que d'autres ne sont que contrôlés par notre système immunitaire et restent présents en petite quantité dans le corps sans avoir d'effet sur notre santé. Le sujet de mon travail de thèse porte sur la compréhension du mécanisme de contrôle des infections virales par le système immunitaire : pourquoi certains virus peuvent être contrôlés ou même éliminés de l'organisme alors que d'autres, et notamment le VIH, ne le sont pas. Ce travail a permis de démontrer que les cellules T CD8 spécifiques du VIH ne sécrètent pas les mêmes substances, nécessaires au développement d'une réponse antivirale efficace, que les cellules T CD8 spécifiques des virus contrôlés (le virus de la grippe, le cytomégalovirus et le virus d'Epstein-Barr). Parallèlement nous avons également observé que les lymphocytes T CD8 spécifiques du VIH ne possèdent pas la capacité de se diviser. Ils sont ainsi incapables d'être présents en quantité suffisante pour assurer un combat efficace contre le virus du SIDA. La (les) différence(s) entre les cellules T CD8 spécifiques aux virus contrôlés (grippe, cytomégalovirus et Epstein-Barr) et au VIH pourront peut-être nous amener à comprendre comment restaurer une immunité efficace contre ce dernier.
Resumo:
El principal propósito de la educación consiste en favorecer el desarrollo integral de la persona, lo cual implica atender el aspecto cognitivo y afectivo. Tradicionalmente, se han priorizado sólo los contenidos cognitivos por este motivo queremos incidir sobre los afectos. El objetivo general de este trabajo de investigación que presentamos consiste en aplicar y evaluar un Programa de Educación Emocional (PEEP), integrado dentro del currículum de Primaria de ciclo medio que ayude a prevenir los efectos nocivos de las emociones negativas y facilite la relación consigo mismo y con los demás. Objetivo general que se constatara a partir de cuatro criterios: conseguir un mejor conocimiento de las propias emociones y de las emociones de los demás, desarrollar estrategias de regulación emocional, mejorar la autoestima, aprender habilidades de vida y socioemocionales. Pues, la finalidad es intervenir en la mejora de la educación emocional de los alumnos entre los 8 y los 10 años, en total 510 alumnos de los cuales 104 formaron la muestra de investigación. Fueron divididos en dos grupos el grupo experimental y el grupo control, ambos constituían una muestra homogénea y estadísticamente comparable por lo que podíamos plantearnos una intervención y valorar su incidencia. Los resultados indican que mejora el nivel de Educación Emocional (EE) de estos alumnos con un nivel de significación de p= 0,001. A partir de este momento, podemos concretar que los resultados conseguidos por los alumnos que han seguido la aplicación del programa mejoran significativamente. Este resultado, nos permite afirmar que el uso intencional del programa de educación emocional para mejorar el ámbito afectivo ha incidido positivamente en el proceso de aprendizaje de los alumnos. Sin embargo consideramos esencial llevar a cabo una formación y posterior evaluación del profesorado en EE, como paso previo necesario para una aplicación óptima del programa.
Resumo:
After incidentally learning about a hidden regularity, participants can either continue to solve the task as instructed or, alternatively, apply a shortcut. Past research suggests that the amount of conflict implied by adopting a shortcut seems to bias the decision for vs. against continuing instruction-coherent task processing. We explored whether this decision might transfer from one incidental learning task to the next. Theories that conceptualize strategy change in incidental learning as a learning-plus-decision phenomenon suggest that high demands to adhere to instruction-coherent task processing in Task 1 will impede shortcut usage in Task 2, whereas low control demands will foster it. We sequentially applied two established incidental learning tasks differing in stimuli, responses and hidden regularity (the alphabet verification task followed by the serial reaction task, SRT). While some participants experienced a complete redundancy in the task material of the alphabet verification task (low demands to adhere to instructions), for others the redundancy was only partial. Thus, shortcut application would have led to errors (high demands to follow instructions). The low control demand condition showed the strongest usage of the fixed and repeating sequence of responses in the SRT. The transfer results are in line with the learning-plus-decision view of strategy change in incidental learning, rather than with resource theories of self-control.
Resumo:
Strategies for expanding hematopoietic stem cells (HSCs) include coculture with cells that recapitulate their natural microenvironment, such as bone marrow stromal stem/progenitor cells (BMSCs). Plastic-adherent BMSCs may be insufficient to preserve primitive HSCs. Here, we describe a method of isolating and culturing human BMSCs as nonadherent mesenchymal spheres. Human mesenspheres were derived from CD45- CD31- CD71- CD146+ CD105+ nestin+ cells but could also be simply grown from fetal and adult BM CD45--enriched cells. Human mesenspheres robustly differentiated into mesenchymal lineages. In culture conditions where they displayed a relatively undifferentiated phenotype, with decreased adherence to plastic and increased self-renewal, they promoted enhanced expansion of cord blood CD34+ cells through secreted soluble factors. Expanded HSCs were serially transplantable in immunodeficient mice and significantly increased long-term human hematopoietic engraftment. These results pave the way for culture techniques that preserve the self-renewal of human BMSCs and their ability to support functional HSCs.
Resumo:
Many species are able to learn to associate behaviours with rewards as this gives fitness advantages in changing environments. Social interactions between population members may, however, require more cognitive abilities than simple trial-and-error learning, in particular the capacity to make accurate hypotheses about the material payoff consequences of alternative action combinations. It is unclear in this context whether natural selection necessarily favours individuals to use information about payoffs associated with nontried actions (hypothetical payoffs), as opposed to simple reinforcement of realized payoff. Here, we develop an evolutionary model in which individuals are genetically determined to use either trial-and-error learning or learning based on hypothetical reinforcements, and ask what is the evolutionarily stable learning rule under pairwise symmetric two-action stochastic repeated games played over the individual's lifetime. We analyse through stochastic approximation theory and simulations the learning dynamics on the behavioural timescale, and derive conditions where trial-and-error learning outcompetes hypothetical reinforcement learning on the evolutionary timescale. This occurs in particular under repeated cooperative interactions with the same partner. By contrast, we find that hypothetical reinforcement learners tend to be favoured under random interactions, but stable polymorphisms can also obtain where trial-and-error learners are maintained at a low frequency. We conclude that specific game structures can select for trial-and-error learning even in the absence of costs of cognition, which illustrates that cost-free increased cognition can be counterselected under social interactions.
Resumo:
BACKGROUND: Cellular processes underlying memory formation are evolutionary conserved, but natural variation in memory dynamics between animal species or populations is common. The genetic basis of this fascinating phenomenon is poorly understood. Closely related species of Nasonia parasitic wasps differ in long-term memory (LTM) formation: N. vitripennis will form transcription-dependent LTM after a single conditioning trial, whereas the closely-related species N. giraulti will not. Genes that were differentially expressed (DE) after conditioning in N. vitripennis, but not in N. giraulti, were identified as candidate genes that may regulate LTM formation. RESULTS: RNA was collected from heads of both species before and immediately, 4 or 24 hours after conditioning, with 3 replicates per time point. It was sequenced strand-specifically, which allows distinguishing sense from antisense transcripts and improves the quality of expression analyses. We determined conditioning-induced DE compared to naïve controls for both species. These expression patterns were then analysed with GO enrichment analyses for each species and time point, which demonstrated an enrichment of signalling-related genes immediately after conditioning in N. vitripennis only. Analyses of known LTM genes and genes with an opposing expression pattern between the two species revealed additional candidate genes for the difference in LTM formation. These include genes from various signalling cascades, including several members of the Ras and PI3 kinase signalling pathways, and glutamate receptors. Interestingly, several other known LTM genes were exclusively differentially expressed in N. giraulti, which may indicate an LTM-inhibitory mechanism. Among the DE transcripts were also antisense transcripts. Furthermore, antisense transcripts aligning to a number of known memory genes were detected, which may have a role in regulating these genes. CONCLUSION: This study is the first to describe and compare expression patterns of both protein-coding and antisense transcripts, at different time points after conditioning, of two closely related animal species that differ in LTM formation. Several candidate genes that may regulate differences in LTM have been identified. This transcriptome analysis is a valuable resource for future in-depth studies to elucidate the role of candidate genes and antisense transcription in natural variation in LTM formation.
Resumo:
Durante los últimos años, diversas instituciones y universidades han comenzado a experimentar con el m-learning y Facebook a través de diferentes proyectos como parte de sus metodologías de aprendizaje y como una oportunidad para trabajar con los jóvenes. Sin embargo, poco se sabe de las percepciones y experiencias que pueden obtener estudiantes de diseño sobre este tema. En este estudio 24 estudian - tes han completado sus actividades de aprendizaje durante dos meses, utilizando un smarthphone y la popular red social Facebook. Al final del plazo, los estudiantes participaron además en un grupo de discusión para expresar sus experiencias. Los resultados indicaron que los estudiantes utilizaron Facebook como parte de su rutina diaria y que fueron creadores de contenido proporcionando estos a otros. Además los resultados indican que durante el primer mes perdieron mucho tiempo observando contenidos propuestos en Facebook, que después comentaron. El grupo en Facebook fue utilizado para la interacción social principalmente con otros estudiantes y el profesor, como un complemento a las sesiones presenciales. Los resultados obtenidos y el empleo de estrategias, puede ayudar a la concep - tualización del m-learning y mostrar como Facebook puede funcionar como un entorno de aprendizaje para apoyar la enseñanza y aprendizaje en el área del diseño.
Resumo:
Adrenaline (epinephrine) auto-injectors provide life-saving pre-hospital treatment for individuals experiencing anaphylaxis in a community setting. Errors in handling adrenaline auto-injectors, particularly by children and healthcare professionals, have been reported. Reports of adrenaline overdoses are limited in the medical literature. In most of these cases, accidental adrenaline administration results from medical error. Exogenous administration of catecholamine is responsible for cardiovascular and metabolic responses, which may cause supraventricular tachycardia, ventricular dysrhythmias and myocardial ischemia. The authors present a unique autopsy case involving a 34 year-old woman who intentionally self-injected adrenaline using an adrenaline auto-injector as part of a suicide plan. Catecholamines and metanephrines were measured in peripheral and cardiac blood as well as urine and vitreous humor. Based on the results of all postmortem investigations, the cause of death was determined to be cardiac dysrhythmia and cardiac arrest following adrenaline self-injection.
Resumo:
In this work we present and analyze the application of an experience of Project Based Learning (PBL) in the matter of Physics II of the Industrial Design university degree (Girona University) during 2005-2006 courses. This methodology was applied to the Electrostatic and Direct Current subjects. Furthermore, evaluation and self evaluation results were shown and the academic results were compared with results obtained in the same subjects applying conventional teaching methods
Resumo:
This paper reviews the policy learning literature in political science. In recent years, the number of publications on learning in the political realm increased dramatically. Researchers have focused on how policymakers and administrators adapt policies based on learning processes or experiences. Thereby, learning has been discussed in very different ways. Authors have referred to learning in the context of ideas, understood as deeply held beliefs, and, as change and adaptation of policy instruments. Two other strands of literature have taken into consideration learning, namely the diffusion literature and research on transfer, which put forward learning to understand who learns from whom and what. Opposed to these views, political learning emphasizes the adaptation of new strategies by policymakers over the transfer of knowledge or broad ideas. In this approach, learning occurs due to the failure of existing policies, increasing problem pressure, scientific innovations, or a combination of these elements.
Resumo:
BACKGROUND: The structure and organisation of ecological interactions within an ecosystem is modified by the evolution and coevolution of the individual species it contains. Understanding how historical conditions have shaped this architecture is vital for understanding system responses to change at scales from the microbial upwards. However, in the absence of a group selection process, the collective behaviours and ecosystem functions exhibited by the whole community cannot be organised or adapted in a Darwinian sense. A long-standing open question thus persists: Are there alternative organising principles that enable us to understand and predict how the coevolution of the component species creates and maintains complex collective behaviours exhibited by the ecosystem as a whole? RESULTS: Here we answer this question by incorporating principles from connectionist learning, a previously unrelated discipline already using well-developed theories on how emergent behaviours arise in simple networks. Specifically, we show conditions where natural selection on ecological interactions is functionally equivalent to a simple type of connectionist learning, 'unsupervised learning', well-known in neural-network models of cognitive systems to produce many non-trivial collective behaviours. Accordingly, we find that a community can self-organise in a well-defined and non-trivial sense without selection at the community level; its organisation can be conditioned by past experience in the same sense as connectionist learning models habituate to stimuli. This conditioning drives the community to form a distributed ecological memory of multiple past states, causing the community to: a) converge to these states from any random initial composition; b) accurately restore historical compositions from small fragments; c) recover a state composition following disturbance; and d) to correctly classify ambiguous initial compositions according to their similarity to learned compositions. We examine how the formation of alternative stable states alters the community's response to changing environmental forcing, and we identify conditions under which the ecosystem exhibits hysteresis with potential for catastrophic regime shifts. CONCLUSIONS: This work highlights the potential of connectionist theory to expand our understanding of evo-eco dynamics and collective ecological behaviours. Within this framework we find that, despite not being a Darwinian unit, ecological communities can behave like connectionist learning systems, creating internal conditions that habituate to past environmental conditions and actively recalling those conditions. REVIEWERS: This article was reviewed by Prof. Ricard V Solé, Universitat Pompeu Fabra, Barcelona and Prof. Rob Knight, University of Colorado, Boulder.
Resumo:
Social information processing (SIP; Crick & Dodge, 1994) and social-cognitive learning theories have been often used to understand children’s problem behaviors, such as aggression. According to these theories, children’s thinking guides their subsequent behaviors. Although most of us agree that social behavior and underlying thought processes are context-dependent, personality and social development researchers have usually engaged in searching for stable patterns of dispositions and behaviors, ignoring (or treating as error) the variance across different situations and relationship types. This, however, can result in erroneous conclusions and question the interpretation of previous findings. Four studies were conducted to explore the influence of relationship context on children’s social-cognitive evaluations and behavior. Samples were fourth to sixth graders from Estonia and Finland. Social cognitions were assessed by presenting children with hypothetical vignettes where the previously identified relationship partner’s behavior had a negative consequence for the child (Studies I, II, and IV), followed by questions measuring different social-cognitive processes (e.g., hostile attributions, behavioral strategies, outcome expectations and self-efficacy beliefs for aggression). In addition, in Studies II and IV, children provided information about their behavior within a specific relationship context. In Study III, an affective priming paradigm was employed where participants were presented with a short display of photographs of children’s liked and disliked classmates, and unknown peers. The results of this thesis suggest that children’s thinking and behavior are largely influenced by the affective valence of the relationship. Moreover, cognitions guide behavior within the relationship. The current findings offer a fruitful avenue for studying the heterogeneity of peer interactions.
Resumo:
BACKGROUND: Coronary artery disease (CAD) continues to be one of the top public health burden. Perfusion cardiovascular magnetic resonance (CMR) is generally accepted to detect CAD, while data on its cost effectiveness are scarce. Therefore, the goal of the study was to compare the costs of a CMR-guided strategy vs two invasive strategies in a large CMR registry. METHODS: In 3'647 patients with suspected CAD of the EuroCMR-registry (59 centers/18 countries) costs were calculated for diagnostic examinations (CMR, X-ray coronary angiography (CXA) with/without FFR), revascularizations, and complications during a 1-year follow-up. Patients with ischemia-positive CMR underwent an invasive CXA and revascularization at the discretion of the treating physician (=CMR + CXA-strategy). In the hypothetical invasive arm, costs were calculated for an initial CXA and a FFR in vessels with ≥50 % stenoses (=CXA + FFR-strategy) and the same proportion of revascularizations and complications were applied as in the CMR + CXA-strategy. In the CXA-only strategy, costs included those for CXA and for revascularizations of all ≥50 % stenoses. To calculate the proportion of patients with ≥50 % stenoses, the stenosis-FFR relationship from the literature was used. Costs of the three strategies were determined based on a third payer perspective in 4 healthcare systems. RESULTS: Revascularizations were performed in 6.2 %, 4.5 %, and 12.9 % of all patients, patients with atypical chest pain (n = 1'786), and typical angina (n = 582), respectively; whereas complications (=all-cause death and non-fatal infarction) occurred in 1.3 %, 1.1 %, and 1.5 %, respectively. The CMR + CXA-strategy reduced costs by 14 %, 34 %, 27 %, and 24 % in the German, UK, Swiss, and US context, respectively, when compared to the CXA + FFR-strategy; and by 59 %, 52 %, 61 % and 71 %, respectively, versus the CXA-only strategy. In patients with typical angina, cost savings by CMR + CXA vs CXA + FFR were minimal in the German (2.3 %), intermediate in the US and Swiss (11.6 % and 12.8 %, respectively), and remained substantial in the UK (18.9 %) systems. Sensitivity analyses proved the robustness of results. CONCLUSIONS: A CMR + CXA-strategy for patients with suspected CAD provides substantial cost reduction compared to a hypothetical CXA + FFR-strategy in patients with low to intermediate disease prevalence. However, in the subgroup of patients with typical angina, cost savings were only minimal to moderate.