965 resultados para alpha and vector model
Resumo:
In the urinary bladder of the toad Bufo marinus aldosterone (between 0.8 and 100 nM) stimulates Na+ transport [half-maximal induction concentration (K1/2) = 6.5 nM]. At low hormone concentrations (0.8-8 nM), the increase of Na+ transport between 0.75 and 2.5 h is accompanied by a fall in transepithelial resistance (R). Higher hormone concentrations (30-800 nM) induce an additional resistance-independent fraction of Na+ transport within 2.5-8 h. From 6 h on, aldosterone (between 0.2 and 20 nM) stimulates in the same tissue the biosynthesis rate of the alpha- and beta-subunits of Na+-K+-ATPase (K1/2 = 3 and 1.5 nM, respectively). New pump synthesis is thus not a prerequisite for the early mineralocorticoid response but might be linked to the late transport event. The mineralocorticoid response is usually ascribed to interaction with the higher affinity type 1 receptor. In the present study we show, however, that at least 55% of the overall Na+ transport response is linked to nuclear occupation of the lower affinity type 2 receptors [dissociation constant (Kd) = 50 nM, maximum number of binding sites (Nmax) = 315 fmol/mg protein]. Distinct aldosterone effects, such as the fall in R and the increase in Na+-K+-ATPase synthesis, are more closely related to occupation of type 1 receptors (Kd = 0.3 nM, Nmax = 23 fmol/mg protein). At maximal induction of these latter parameters, only about 20% of type 2 receptors are occupied. These results suggest that both types of aldosterone receptors are involved in the mediation of the full mineralocorticoid response: type 1 in the early and late and type 2 particularly in the late tissue response.
Resumo:
A recent phase 1 trial has demonstrated that the generation of tumor-reactive T lymphocytes by transfer of specific T-cell receptor (TCR) genes into autologous lymphocytes is feasible. However, compared with results obtained by infusion of tumor-infiltrating lymphocytes, the response rate observed in this first TCR gene therapy trial is low. One strategy that is likely to enhance the success rate of TCR gene therapy is the use of tumor-reactive TCRs with a higher capacity for tumor cell recognition. We therefore sought to develop standardized procedures for the selection of well-expressed, high-affinity, and safe human TCRs. Here we show that TCR surface expression can be improved by modification of TCR alpha and beta sequences and that such improvement has a marked effect on the in vivo function of TCR gene-modified T cells. From a panel of human, melanoma-reactive TCRs we subsequently selected the TCR with the highest affinity. Furthermore, a generally applicable assay was used to assess the lack of alloreactivity of this TCR against a large series of common human leukocyte antigen alleles. The procedures described in this study should be of general value for the selection of well- and stably expressed, high-affinity, and safe human TCRs for subsequent clinical testing.
Resumo:
The value of earmarks as an efficient means of personal identification is still subject to debate. It has been argued that the field is lacking a firm systematic and structured data basis to help practitioners to form their conclusions. Typically, there is a paucity of research guiding as to the selectivity of the features used in the comparison process between an earmark and reference earprints taken from an individual. This study proposes a system for the automatic comparison of earprints and earmarks, operating without any manual extraction of key-points or manual annotations. For each donor, a model is created using multiple reference prints, hence capturing the donor within source variability. For each comparison between a mark and a model, images are automatically aligned and a proximity score, based on a normalized 2D correlation coefficient, is calculated. Appropriate use of this score allows deriving a likelihood ratio that can be explored under known state of affairs (both in cases where it is known that the mark has been left by the donor that gave the model and conversely in cases when it is established that the mark originates from a different source). To assess the system performance, a first dataset containing 1229 donors elaborated during the FearID research project was used. Based on these data, for mark-to-print comparisons, the system performed with an equal error rate (EER) of 2.3% and about 88% of marks are found in the first 3 positions of a hitlist. When performing print-to-print transactions, results show an equal error rate of 0.5%. The system was then tested using real-case data obtained from police forces.
Resumo:
The objective of this study was to evaluate the performance of stacked species distribution models in predicting the alpha and gamma species diversity patterns of two important plant clades along elevation in the Andes. We modelled the distribution of the species in the Anthurium genus (53 species) and the Bromeliaceae family (89 species) using six modelling techniques. We combined all of the predictions for the same species in ensemble models based on two different criteria: the average of the rescaled predictions by all techniques and the average of the best techniques. The rescaled predictions were then reclassified into binary predictions (presence/absence). By stacking either the original predictions or binary predictions for both ensemble procedures, we obtained four different species richness models per taxa. The gamma and alpha diversity per elevation band (500 m) was also computed. To evaluate the prediction abilities for the four predictions of species richness and gamma diversity, the models were compared with the real data along an elevation gradient that was independently compiled by specialists. Finally, we also tested whether our richness models performed better than a null model of altitudinal changes of diversity based on the literature. Stacking of the ensemble prediction of the individual species models generated richness models that proved to be well correlated with the observed alpha diversity richness patterns along elevation and with the gamma diversity derived from the literature. Overall, these models tend to overpredict species richness. The use of the ensemble predictions from the species models built with different techniques seems very promising for modelling of species assemblages. Stacking of the binary models reduced the over-prediction, although more research is needed. The randomisation test proved to be a promising method for testing the performance of the stacked models, but other implementations may still be developed.
Resumo:
The action of the thyroid hormones on responsive cells in the peripheral nervous system requires the presence of nuclear triiodothyronine receptors (NT3R). These nuclear receptors, including both the alpha and beta subtypes of NT3R, were visualized by immunocytochemistry with the specific 2B3 monoclonal antibody. In the dorsal root ganglia (DRG) of rat embryos, NT3R immunoreactivity was first discretely revealed in a few neurons at embryonic day 14 (E14), then strongly expressed by all neurons at E17 and during the first postnatal week; all DRG neurons continued to possess clear NT3R immunostaining, which faded slightly with age. The peripheral glial cells in the DRG displayed a short-lived NT3R immunoreaction, starting at E17 and disappearing from the satellite and Schwann cells by postnatal days 3 and 7 respectively. In the developing sciatic nerve, Schwann cells also exhibited transient NT3R immunoreactivity restricted to a short period ranging from E17 to postnatal day 10; the NT3R immunostaining of the Schwann cells vanished proximodistally along the sciatic nerve, so that the Schwann cells rapidly became free of detectable NT3R immunostaining. However, after the transection or crushing of an adult sciatic nerve, the NT3R immunoreactivity reappeared in the Schwann cells adjacent to the lesion by 2 days, then along the distal segment in which the axons were degenerating, and finally disappeared by 45 days, when the regenerating axons were allowed to re-occupy the distal segment.(ABSTRACT TRUNCATED AT 250 WORDS)
Resumo:
Climate-driven range fluctuations during the Pleistocene have continuously reshaped species distribution leading to populations of contrasting genetic diversity. Contemporary climate change is similarly influencing species distribution and population structure, with important consequences for patterns of genetic diversity and species' evolutionary potential1. Yet few studies assess the impacts of global climatic changes on intraspecific genetic variation2, 3, 4, 5. Here, combining analyses of molecular data with time series of predicted species distributions and a model of diffusion through time over the past 21 kyr, we unravel caribou response to past and future climate changes across its entire Holarctic distribution. We found that genetic diversity is geographically structured with two main caribou lineages, one originating from and confined to Northeastern America, the other originating from Euro-Beringia but also currently distributed in western North America. Regions that remained climatically stable over the past 21 kyr maintained a high genetic diversity and are also predicted to experience higher climatic stability under future climate change scenarios. Our interdisciplinary approach, combining genetic data and spatial analyses of climatic stability (applicable to virtually any taxon), represents a significant advance in inferring how climate shapes genetic diversity and impacts genetic structure.
Resumo:
This letter presents advanced classification methods for very high resolution images. Efficient multisource information, both spectral and spatial, is exploited through the use of composite kernels in support vector machines. Weighted summations of kernels accounting for separate sources of spectral and spatial information are analyzed and compared to classical approaches such as pure spectral classification or stacked approaches using all the features in a single vector. Model selection problems are addressed, as well as the importance of the different kernels in the weighted summation.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
Aim: The obesity epidemic has increased the number of obese patients admitted to the ICU. In vitro studies suggest that adipose tissue response to inflammation is enhanced: in vivo data are not conclusive yet. The aim of this study was to test the physiologic response of healthy obese subjects to a standardized intravenous LPS challenge.Methods: Prospective single-blind, randomized, cross-over study in eight subjects (four men, four women), aged 34 +/- 7 years, BMI 34.7 +/- 4.2, without glucose intolerance and lipid abnormalities, testing the impact of intravenous LPS (2 ng kg(-1) of actual body weight) versus placebo.Results: Temperature, hemodynamic variables, indirect calorimetry and blood samples (TNF-alpha, IL-6, stress hormones, hs-CRP) were collected. After LPS temperature, heart rate. TNF-alpha and IL-6 concentrations and stress hormones (cortisol and glucagon) increased significantly, with maximal responses between 120 and 240 min after the injection. The pattern, the timing and the magnitude of change were similar to those observed in lean subjects.Conclusion: This study shows that healthy obese subjects have a similar response pattern to intravenous LPS as described in lean subjects.
Resumo:
Background : Epidermolytic hyperkeratosis (bullous congenital ichthyosiform erythroderma), characterized by ichthyotic, rippled hyperkeratosis, erythroderma and skin blistering, is a rare autosomal dominant disease caused by mutations in keratin 1 or keratin 10 (K10) genes. A severe phenotype is caused by a missense mutation in a highly conserved arginine residue at position 156 (R156) in K10. Objectives: To analyse molecular pathomechanisms of hyperproliferation and hyperkeratosis, we investigated the defects in mechanosensation and mechanotransduction in keratinocytes carrying the K10R156H mutation. Methods: Differentiated primary human keratinocytes infected with lentiviral vectors carrying wild-type K10 (K10wt) or mutated K10R156H were subjected to 20% isoaxial stretch. Cellular fragility and mechanosensation were studied by analysis of mitogen-activated protein kinase activation and cytokine release. Results: Cultured keratinocytes expressing K10R156H showed keratin aggregate formation at the cell periphery, whereas the filament network in K10wt cells was normal. Under stretching conditions K10R156H keratinocytes exhibited about a twofold higher level of filament collapse compared with steady state. In stretched K10R156H cells, higher p38 activation, higher release of tumour necrosis factor-alpha and RANTES but reduced interleukin-1 beta secretion compared with K10wt cells was observed. Conclusions: These results demonstrate that the R156H mutation in K10 destabilizes the keratin intermediate filament network and affects stress signalling and inflammatory responses to mechanical stretch in differentiated cultured keratinocytes.
Resumo:
The objective of this work was to parameterize, calibrate, and validate a new version of the soybean growth and yield model developed by Sinclair, under natural field conditions in northeastern Amazon. The meteorological data and the values of soybean growth and leaf area were obtained from an agrometeorological experiment carried out in Paragominas, PA, Brazil, from 2006 to 2009. The climatic conditions during the experiment were very distinct, with a slight reduction in rainfall in 2007, due to the El Niño phenomenon. There was a reduction in the leaf area index (LAI) and in biomass production during this year, which was reproduced by the model. The simulation of the LAI had root mean square error (RMSE) of 0.55 to 0.82 m² m-2, from 2006 to 2009. The simulation of soybean yield for independent data showed a RMSE of 198 kg ha-1, i.e., an overestimation of 3%. The model was calibrated and validated for Amazonian climatic conditions, and can contribute positively to the improvement of the simulations of the impacts of land use change in the Amazon region. The modified version of the Sinclair model is able to adequately simulate leaf area formation, total biomass, and soybean yield, under northeastern Amazon climatic conditions.
Resumo:
The T3 complex is known to be expressed on the cell surface of mature T cells together with either the alpha-beta heterodimeric T cell receptor (TCR) or the TCR gamma protein. In a number of immature T cell malignancies, however, T3 has been described exclusively in the cytoplasm. We have investigated five such T cell lines with cytoplasmic T3 and could demonstrate by biosynthetic labeling the presence of the alpha and beta chains of the TCR in the cytoplasm of two of them, CEM and Ichikawa. No surface TCR alpha-beta protein could be detected by staining with the WT31 antibody. These observations, therefore, argue against the concept that expression of the TCR alpha chain controls the surface expression of the T3/TCR complex. Interestingly, phorbol 12-myristate 13-acetate (PMA) induced cell surface expression of T3 protein in these two cell lines only. Moreover, on surface-iodinated CEM cells no association of T3 and TCR molecules could be demonstrated after treatment with PMA, and expression of TCR alpha and beta chains was limited to the cytoplasm. In Ichikawa cells, however, PMA induced surface expression of a mature T3/TCR complex. Our findings indicate that separate regulatory mechanisms may exist for the surface expression of the T3 proteins and for the assembly of the T3/TCR complex.
Resumo:
Résumé Cette étude porte sur le flanc inverse de la nappe de Siviez-Mischabel et sur les unités tectoniques sous jacentes (zone de Stalden supérieur et zone Houillère) dans la vallée menant à Zermatt. L'étude structurale du granite permien de Randa (orthogneiss oeillé) permet de mieux comprendre les effets de la déformation alpine sur les roches de socle. La cartographie détaillée de l'orthogneiss et de son encaissant, ainsi que l'étude lithostratigraphique des terrains sédimentaires associés permettent de proposer un schéma structural et cinématique du flanc inverse de la nappe de Siviez-Mischabel et de mieux comprendre ses relations avec les unités tectoniques sous-jacentes. L'analyse structurale de l'orthogneiss de Randa et de son encaissant révèle la superposition de plusieurs phases de déformation ductile. Cet orthogneiss formé sous des conditions métamorphiques du faciès schiste vert possède une forte schistosité alpine avec au moins deux linéations d'extension. La première, L1, orientée NW-SE est associée à la mise en place de la nappe. La seconde, L2, orientée SW-NE, se corrèle au cisaillement ductile du Simplon. La quantification de la déformation au moyen de la méthode de Fry sur les faciès porphyriques donne des ellipses à rapports axiaux compris entre 1.9 et 5.3, en accord avec les valeurs obtenues par d'autres marqueurs {tourmalines étirées, fibres). Les valeurs mesurées parallèlement à L1 ou L2 sont très semblables. La méthode de Fry a nécessité une étude théorique préalable afin de vérifier son applicabilité aux orthogneiss oeillés. La méthode requiert une distribution spatiale homogène et isotrope des marqueurs utilisés. Les tests statistiques effectués ont révélé que les phénocristaux de feldspath alcalin satisfont à cette condition et qu'ils peuvent être utilisés comme marqueur de la déformation au moyen de la méthode de Fry. Les valeurs obtenues révèlent l'importance du cisaillement ductile du Simplon sur la géométrie de la nappe dans la région d'étude. Le levé cartographique a permis d'améliorer la lithostratigraphie de la base de la nappe de Siviez-Mischabel. Trois formations en position renversée peuvent être observées sous les gneiss formant le coeur de la nappe. Ces trois formations forment le coeur du synclinal de St-Niklaus qui connecte la nappe de Siviez-Mischabel à la zone de Stalden supérieur. La datation par U-Pb de zircons détritiques et magmatiques par LA-ICP-MS permet de contraindre l'âge des formations observées (probablement Carbonifère à Trias précoce). Ces données ont des répercussions importantes sur la structure de la nappe dans la région, prouvant l'existence de plusieurs plis avec des séries normales et renversées bien préservées. La définition et la datation de ces formations, ainsi que leur identification dans la-Zone- Houillère avoisinante permettent de mieux comprendre la géométrie initiale et les relations tectoniques des nappes du Pennique moyen dans la vallée de Zermatt. Summary This study investigates the overturned limb of the Siviez-Mischabel nappe and underlying tectonic units (Upper Stalden zone and Houillère zone) in the Mattertal area. Detailed structural analysis in the Permian Randa granite (augen orthogneiss) allows a better understanding of the Alpine deformation effects on basement rocks. Detailed mapping of this orthogneiss and surrounding rocks, and the study of the lithostratigraphy in the related sedimentary horizons allow the proposition of a structural and kinematic model for the overturned limb of the Siviez-Mischabel and to better understand the relations with the underlying tectonic units. The structural analysis of the Randa orthogneiss and surrounding rocks revealed the superposition of several phases of ductile deformation. This orthogneiss formed under greenschist facies metamorphic conditions displays a strong Alpine foliation with at least two stretching lineations. The first lineation, L1, is oriented NW-SE and is related to the nappe emplacement northward. The second one, L2, is related to the Simplon ductile shear zone. Strain estimation using the Fry method has been performed on porphyritic facies of the Randa orthogneiss. The obtained ellipses have axial ratios varying between 1.9 and 5.3, in agreement with strain estimation obtained from other markers (stretched turmalines, fringes). The strain values are very similar if measured parallel to L1 or to L2. A theoretical approach was necessary to verify the relevant application of the Fry method to augen orthogneiss. This method requires that the distribution of the used markers has to be homogeneous and isotropic. Statistical tests have been done and revealed that K-feldspar phenocrysts satisfy these conditions and can be used as strain markers with the Fry method. The obtained strain measurements revealed the importance of the Simplon ductile shear zone on the geometry of the nappe in the studied area. Mapping has improved the lithostratigraphy at the base of the Siviez-Mischabel nappe. Three overturned formations can be observed below the gneisses forming the core of the nappe. These three formations form the St-Niklaus syncline, which connects the Siviez-Mischabel nappe to the underlying Upper Stalden zone. U-Pb dating of detrital and magmatic zircons by LA-ICPMS allowed the age of the observed formations to be constrained (presumably Carboniferous to Early Triassic). This data has critical implications for nappe structure in the region, composed of few recumbent folds with well preserved normal and overturned limbs. The definition and dating of these formations, as well as their identification in the adjacent "Houillère Zone" improve the understanding of the geometry and tectonic relations of the Middle Penninic nappes in the Mattertal.
Resumo:
There is increasing evidence that glial cells, in particular astrocytes, interact dynamically with neurons. The well-known anatomofunctional organization of neurons in the barrel cortex offers a suitable and promising model to study such neuroglial interaction. This review summarizes and discusses recent in vitro as well as in vivo works demonstrating that astrocytes receive, integrate, and respond to neuronal signals. In addition, they are active elements of brain metabolism and exhibit a certain degree of plasticity that affects neuronal activity. Altogether these findings indicate that the barrel cortex presents glial compartments overlapping and interacting with neuronal compartments and that these properties help define barrels as functional and independent units. Finally, this review outlines how the use of the barrel cortex as a model might in the future help to address important questions related to dynamic neuroglia interaction.
Resumo:
Backgrounds: Pro-inflammatory cytokines and high-sensitive C-reactive protein (hs-CRP) are associated with increased risk for cardiovascular disease. Low-dose aspirin for cardiovascular (CV) prevention is reported to have anti-inflammatory effects. The aim of this study was to determine the association between cytokines and hs-CRP levels and low-dose aspirin use for CV prevention in a population-based cohort (CoLaus Study). Methods and Results: Blood samples were assessed in 6,085 participants (3,201 women) aged 35-75 years. Medications' use and indications were recorded. Among aspirin users (n=1'034; 17%), overall low-dose (351; 5.8%) and low-dose for CV prevention (324; 5.3%) users were specifically selected for analysis. IL-1beta, IL-6 and TNF-alpha were assessed by a multiplex particle-based flow cytometric assay and hs-CRP by an immunometric assay. Cytokines and hs-CRP were presented in quartiles. Multivariate analysis adjusting for sex, age, smoking status, body mass index, concomitant use of various immunomodulatory drugs, diabetes mellitus showed no association between cytokines and hs-CRP levels and low-dose aspirin use for CV prevention either comparing the topmost vs. the three other quartiles (OR 95% CI, 0.84 (0.59 - 1.18), 1.03 (0.78 - 1.32), 1.10 (0.83 - 1.46), 1.00 (0.67 - 1.69) for IL-1beta, IL-6, TNF-alpha and hs-CRP, respectively), or comparing the topmost quartile vs. the first one (OR 95% CI, 0.87 (0.60 - 1.26), 1.19 (0.79 - 1.79), 1.26 (0.86 - 1.84), 1.06 (0.67 - 1.69)). Conclusions: Low-dose aspirin use for cardiovascular prevention does not seem to impact plasma cytokine and hs-CRP levels in a population-based cohort.