605 resultados para proceeds


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The canvas support in easel paintings is composed mainly of cellulose. One of the maindegradation paths of cellulose is acid-catalysed hydrolysis, which means that in an acidic environment (low pH), its degradation proceeds at a faster rate (Strlič et al., 2005).The main effect of acid-catalysed hydrolysis is the breaking up of the polymer chains,measured by the “Degree of Polymerisation” (DP). The lowering of the DP value impliesa lower mechanical strength of the textile (Scicolone, 1993), and thus this parameter canbe used to monitor degradation. Knowing these two parameters can, therefore, be veryinformative regarding the condition of the canvas support.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wound healing proceeds by the concerted action of a variety of signals that have been well identified. However, the mechanisms integrating them and coordinating their effects are poorly known. Herein, we reveal how PPARbeta/delta (PPAR: peroxisome proliferator-activated receptor) follows a balanced pattern of expression controlled by a crosstalk between inflammatory cytokines and TGF-beta1. Whereas conditions that mimic the initial inflammatory events stimulate PPARbeta/delta expression, TGF-beta1/Smad3 suppresses this inflammation-induced PPARbeta/delta transcription, as seen in the late re-epithelialization/remodeling events. This TGF-beta1/Smad3 action involves an inhibitory effect on AP-1 activity and DNA binding that results in an inhibition of the AP-1-driven induction of the PPARbeta/delta promoter. As expected from these observations, wound biopsies from Smad3-null mice showed sustained PPARbeta expression as compared to those of their wild-type littermates. Together, these findings suggest a mechanism for setting the necessary balance between inflammatory signals, which trigger PPARbeta/delta expression, and TGF-beta1/Smad3 that governs the timely decrease of this expression as wound healing proceeds to completion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The interrelation of curing time, curing temperature, strength, and reactions in lime-bentonite-water mixtures was examined. Samples were molded at constant density and moisture content and then cured for periods of from 1 to 56 days at constant temperatures that ranged from 5C to 60C. After the appropriate curing time the samples were tested for unconfined compressive strength. The broken samples were then analyzed by x-ray diffractometer and spectrophotometer to determine the identity of the reaction products present after each curing period. It was found that the strength gain of lime-clay mixtures cured at different temperatures is due to different phases of the complex reaction, lime & clay to CSH(gel) to CSH(II) to CSH(I) to tobermorite. The farther the reaction proceeds, the higher the strength. There was also evidence of lattice substitutions in the structure of the calcium silicate hydrates at curing temperatures of 50C and higher. No consistent relationship between time, temperature, strength, and the S/A ration of reaction products existed, but in order to achieve high strengths the apparent C/S ration had to be less than two. The curing temperature had an effect on the strength developed by a given amount of reacted silica in the cured lime-clay mixture, but at a given curing temperature the cured sample that had the largest amount of reacted silica gave the highest strength. Evidence was found to indicate that during the clay reaction some calcium is indeed adsorbed onto the clay structure rather than entering into a pozzolanic reaction. Finally, it was determined that it is possible to determine the amount of silica and alumina in lime-clay reaction products by spectrophotometric analysis with sufficient accuracy for comparison purposes. The spectrophotometric analysis techniques used during the investigation were simple and were not time consuming.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The boll weevil (Anthonomus grandis Boheman) causes high levels of bud abscission in cotton plants due to feeding or oviposition punctures. It has been reported that abscission is mainly due to enzymes present in the insect's saliva, but mechanical damage could also contribute to square abscission. The objective of this paper was to undertake an analysis of the morphological damages caused by the insect in cotton squares using microscopy. Anthers and ovules are the main target of boll weevil feeding. The process initiates by perforation of young sepal and petal tissues and proceeds with subsequent alimentation on stamen and ovary leading to abscission of floral structures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Las dificultades de lectura y escritura se pueden detectar desde el momento en que los niños y niñas inician el aprendizaje de la lectoescritura en la etapa de Educación Infantil. En algunos casos estos alumnos reciben un apoyo escolar que en muchas ocasiones no conlleva las mejoras esperadas, siendo las técnicas y metodologías de refuerzo aplicadas ineficaces. El problema, desde nuestro punto de vista, empieza con el diagnóstico que se realiza a estos jóvenes, que determina las directrices de la intervención idónea en cada caso. La Teoría PASS de la inteligencia nos permite conocer qué procesos están implicados cuando el niño lee o escribe, y parte de la premisa de que si conocemos el perfil cognitivo de un alumno que presenta dificultades podremos entender como estas se originan. Para conocer este perfil cognitivo (los cuatro procesos cognitivos que describe esta teoría: Planificación, Atención, Simultaneo y Secuencial) utilizamos la batería DN-CAS (Das & Naglieri: Cognitive Assessment System). El perfil obtenido al aplicar el DN-CAS nos permitirá conocer el origen de las dificultades de lectura y escritura, saber cuando está justificada una dislexia, descartar problemas emocionales o la presencia de los mismos y diseñar la intervención más adecuada en cada situación

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: To investigate the effect of the first and repeated intravitreal injections of ranibizumab (1.25mg; 0.05ml) on retrobulbar blood flow velocities in patients with wet age-related macular degeneration (AMD). Methods: This prospective non randomized study included twenty consecutive AMD patients. Time- averaged mean blood flow velocities (BFVs) in the central retinal, temporal posterior ciliary and ophthalmic arteries (CRA, TPCA and OA) were measured by ultrasound imaging before, 2 days and 3 weeks after the first injection of ranibizumab, then 6 months after supplemental monthly injections if required. At each visit, complete ophthalmological examination was performed, including best corrected visual acuity measurement according to ETDRS protocol and OCT. Results: In the treated eyes, ranibizumab injection was followed by a significant improvement in visual acuity (from 44.4 ± 21.7, to 50.9±25.9 (p<0.01) at month 6, and a decrease in mean central macular thickness from 377±115 to 267 ± 74 µm (p<0.001) at month 6. At day 2 mean BFVs decreased by 16% in the CRA and by 20% in TPCA (p<0.001, both), then remained stable. Mean BFVs did not change in OA at the day 2 but decreased at week 3 by 18% (p<0.001). Supplemental injections did not lead to additional effects at month 6. No effect was tabulated in the fellow eye. Conclusions: We report an early decrease in mean BFV in CRA and TPRA following intravitreal injections of ranibizumab corresponding to vasoconstrictive effect of this drug. Decrease in mean BFV in all retrobulbar arteries from the week 3 suggests that ranibizumab proceeds to a local and regional vasoconstrictive and antiangiogenic effects after local diffusion. Thus, ranibizumab could induce an actual hypoperfusion of the treated eye which could correspond to a vascular side effect.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Funding for non-road multimodal transportation is a means to provide for future transportation needs and alternatives to provide safe and efficient transportation options. The state supports multimodal transportation in the annual infrastructure budget. Most of the state's appropriations for these non-road modes of transportation are provided from the Rebuild Iowa Infrastructure Fund, or infrastructure-related funds such as restricted capital from tax-emempt bond proceeds. Projects that have received funding include commercial and general aviation infrastructure, public transit infrastructure, freight rail, and passenger rail. In addition, recreational trails that encourage walking and cycling are considered part of multimodal transportation. This issue review provides a general overview of the multimodal transportation grant programs that are funded by the state and administered under the Department of Transportation, or DOT. Other means of state funding for multimodal transportation, a sampling of federally funded programs and how other states fund some of their multimodal transportation programs will be briefly discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A lot of things came together to make 2014 truly exceptional for the Iowa Lottery, and allowing us to fulfill winners’ dreams and raise record proceeds to make a difference in Iowans’ lives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Transport in small-scale biological and soft-matter systems typically occurs under confinement conditions in which particles proceed through obstacles and irregularities of the boundaries that may significantly alter their trajectories. A transport model that assimilates the confinement to the presence of entropic barriers provides an efficient approach to quantify its effect on the particle current and the diffusion coefficient. We review the main peculiarities of entropic transport and treat two cases in which confinement effects play a crucial role, with the appearance of emergent properties. The presence of entropic barriers modifies the mean first-passage time distribution and therefore plays a very important role in ion transport through micro- and nano-channels. The functionality of molecular motors, modeled as Brownian ratchets, is strongly affected when the motor proceeds in a confined medium that may constitute another source of rectification. The interplay between ratchet and entropic rectification gives rise to a wide variety of dynamical behaviors, not observed when the Brownian motor proceeds in an unbounded medium. Entropic transport offers new venues of transport control and particle manipulation and new ways to engineer more efficient devices for transport at the nanoscale.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The development of nuclear hormone receptor antagonists that directly inhibit the association of the receptor with its essential coactivators would allow useful manipulation of nuclear hormone receptor signaling. We previously identified 3-(dibutylamino)-1-(4-hexylphenyl)-propan-1-one (DHPPA), an aromatic β-amino ketone that inhibits coactivator recruitment to thyroid hormone receptor β (TRβ), in a high-throughput screen. Initial evidence suggested that the aromatic β-enone 1-(4-hexylphenyl)-prop-2-en-1-one (HPPE), which alkylates a specific cysteine residue on the TRβ surface, is liberated from DHPPA. Nevertheless, aspects of the mechanism and specificity of action of DHPPA remained unclear. Here, we report an x-ray structure of TRβ with the inhibitor HPPE at 2.3-Å resolution. Unreacted HPPE is located at the interface that normally mediates binding between TRβ and its coactivator. Several lines of evidence, including experiments with TRβ mutants and mass spectroscopic analysis, showed that HPPE specifically alkylates cysteine residue 298 of TRβ, which is located near the activation function-2 pocket. We propose that this covalent adduct formation proceeds through a two-step mechanism: 1) β-elimination to form HPPE; and 2) a covalent bond slowly forms between HPPE and TRβ. DHPPA represents a novel class of potent TRβ antagonist, and its crystal structure suggests new ways to design antagonists that target the assembly of nuclear hormone receptor gene-regulatory complexes and block transcription.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sphingomonas paucimobilis B90A is able to degrade the alpha-, beta-, gamma-, and delta-isomers of hexachlorocyclohexane (HCH). It contains the genes linA, linB, linC, linD, linE, and linR, which have been implicated in HCH degradation. In this study, dynamic expression of the lin genes was measured in chemostat-grown S. paucimobilis B90A by RNA dot blot hybridization and real-time reverse transcriptase PCR upon exposure to a pulse of different HCH isomers. Irrespective of the addition of HCH, linA, linB, and linC were all expressed constitutively. In contrast, linD and linE were induced with alpha-HCH (2 mg/liter) and gamma-HCH (7 mg/liter). A sharp increase in mRNA levels for linD and linE was observed from 10 to 45 min after the addition of alpha- or gamma-HCH. Induction of linD and linE was not detectable upon the addition of 0.7 mg of gamma-HCH per liter, although the compound was degraded by the cells. The addition of beta-HCH (5 mg/liter) or delta-HCH (20 mg/liter) did not lead to linE and linD induction, despite the fact that 50% of the compounds were degraded. This suggests that degradation of beta- and delta-HCH proceeds by a different pathway than that of alpha- and gamma-HCH.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Prosessisimulointiohjelmistojen käyttö on yleistynyt paperiteollisuuden prosessien kartoituksessa ja kyseiset ohjelmistot ovat jo pitkään olleet myös Pöyry Engineering Oy:n työkaluja prosessisuunnittelussa. Tämän työn tavoitteeksi määritettiin prosessisimulointiohjelmistojen käytön selvittäminen suomalaisissa paperitehtaissa sekä prosessisimuloinnin tulevaisuuden näkymien arviointi metsäteollisuuden suunnittelupalveluissa liiketoiminnan kehittämiseksi. Työn teoriaosassa selvitetään mm. seuraavia asioita: mitä prosessisimulointi on, miksi simuloidaan ja mitkä ovat simuloinnin hyödyt ja haasteet. Teoriaosassa esitellään yleisimmät käytössä olevat prosessisimulointiohjelmistot, simulointiprosessin eteneminen sekä prosessisimuloinnin tuotteistamisen vaatimuksia. Työn kokeellisessa osassa selvitettiin kyselyn avulla prosessisimulointiohjelmistojen käyttöä Suomen paperitehtaissa. Kysely lähetettiin kaikille Suomen tärkeimmille paperitehtaille. Kyselyn avulla selvitettiin mm, mitä ohjelmia käytetään, mitä on simuloitu, mitä pitää vielä simuloida ja kuinka tarpeellisena prosessisimulointia pidetään. Työntulokset osoittavat, että kaikilla kyselyyn vastanneilla suomalaisilla paperitehtailla on käytetty prosessisimulointia. Suurin osa simuloinneista on tehty konelinjoihin sekä massa- ja vesijärjestelmiin. Tulevaisuuden tärkeimpänä kohteena pidetään energiavirtojen simulointia. Simulointimallien pitkäjänteisessä hyödyntämisessä ja ylläpidossa on kehitettävää, jossa simulointipalvelujen hankkiminen palveluna on tehtaille todennäköisin vaihtoehto. Johtopäätöksenä on se, että tehtailla on tarvetta prosessisimuloinnille. Ilmapiiri on kyselytuloksien mukaan suotuisa ja simulointi nähdään tarpeellisena työkaluna. Prosessisimuloinnin markkinointia, erillispalvelutuotteen lisäksi, kannattaisi kehittää siten, että simulointimallin ylläpito jatkuisi projektin jälkeen lähipalveluna. Markkinointi pitäisi tehdä jo projektin alkuvaiheessa tai projektin aikana. Simulointiohjelmien kirjosta suunnittelutoimiston kannattaa valita simulointiohjelmistoja, jotka sopivat sille parhaiten. Erityistapauksissa muiden ohjelmien hankintaa kannattaa harkita asiakkaan toivomusten mukaisesti.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1. 1. Summaries 1.1. Preamble and extended abstract The present thesis dissertation addresses the question of antiviral immunity from the particular standpoint of the adaptive T cell-mediated immune response. The experimental work is presented in the form of three published articles (two experimental articles and one review article, see sections 4.1, 4.2 and 4.3 on pages 73, 81 and 91, respectively), describing advances both in our understanding of viral control by CD8 T lymphocytes, and in vaccine development against the Human Immunodeficiency Virus Type 1 (HIV-1). Because the articles focus on rather specialized areas of antiviral immunity, the article sections are preceded by a general introduction (section 3) on the immune system in general, and on four viruses that were addressed in the experimental work, namely HIV-1, Cytomegalovirus (CMV), Epstein Barr Virus (EBV) and Influenzavirus (Flu). This introduction section is aimed at providing a glimpse on viral molecular biology and immunity, to help the hypothetical non-expert reader proceeding into the experimental part. For this reason, each section is presented as individual entity and can be consulted separately. The four viruses described are of peculiar relevance to immunity because they induce an array of opposite host responses. Flu causes a self limiting disease after which the virus is eradicated. CMV and EBV cause pauci-symptomatic or asymptomatic diseases after which the viruses establish lifelong latency in the host cells, but are kept in check by immunity. Eventually, HIV-1 establishes both latency - by inserting its genome into the host cell chromosome - and proceeds in destroying the immune system in a poorly controlled fashion. Hence, understanding the fundamental differences between these kinds of viral host interactions might help develop new strategies to curb progressive diseases caused by viruses such as HIV-1. Publication #1: The first article (section 4.1, page 73) represents the main frame of my laboratory work. It analyses the ability of CD8 T lymphocytes recovered from viral-infected patients to secrete interferon γ (IFN-γ) alone or in conjunction with interleukin 2 (IL-2) when exposed in vitro to their cognate viral antigens. CD8 T cells are instrumental in controlling viral infection. They can identify infected cells by detecting viral antigens presented at the surface of the infected cells, and eliminate both the cell and its infecting virus by triggering apoptosis and/or lysis of the infected cell. Recognition of these antigens triggers the cognate CD8 cells to produce cytokines, including IFN-γ and IL-2, which in turn attract and activate other pro-inflammatory cells. IFN-γ triggers both intrinsic antiviral activity of the infected cells and distant activation of pro-inflammatory cells, which are important for the eradication of infection. IL-2 is essential for clonal expansion of the antigen (Ag)-specific CD8 T cell. Hence the existence of Ag-specific CD8 cells secreting both IFN-γand IL-2 should be beneficial for controlling infection. In this first work we determined the percentage of IFN-y/IL-2 double positive and single IFN-γsecreting CD8 T cells against antigens HIV-1, CMV, EBV and Flu in three groups of subjects: (i) HIV-1 infected patients progressing to disease (progressors), (ii) HIV-1-infected subjects not progressing to disease (long-term non progressors or LTNP), and (iii) HIV negative blood donors. The results disclosed a specific IFN-y/IL-2 double positive CD8 response in all subjects able to control infection. In other words, IFN-y/IL-2 double positive CD8 cells were present in virus-specific CD8 T cells against Flu, CMV and EBV as well against HIV-1 in LTNP. In contrast, progressors only had single IFN-γsecreting CD8 T cells. Hence, the ability to develop an IFN-y/IL-2 double positive response might be critical to control infection, independently of the nature of the virus. Additional experiments helped identify the developmental stage of the missing cells (using different markers such as CD45RA and CCR7) and showed a correlation between the absence of IL-2 secreting CD8 T cells and a failure in the proliferation capacity of virus-specific CD8 T cells. Addition of exogenous IL-2 could restore clonal expansion of HIV-1 specific CD8 T cells, at least in vitro. It could further been shown, that IL-2 secreting CD8 T cells are sufficient to support proliferation even in absence of CD4 help. However, the reason for the missing IFN-y/IL-2 double positive CD8 T cell response in HIV-1 progessors has yet to be determined. Publication #2: The second article (section 4.2, page 81) explores new strategies to trigger CD8 T cell immunity against specific HIV-1 proteins believed to be processed and exposed as "infection signal" at the surface of infected cells. Such signals consist of peptide fragments (8- 13 amino acids) originating from viral proteins and presented to CD8 T cells in the frame of particular cell surface molecules of the major histocompatibility complex class I* (MHC I). To mimic "natural" viral infection, the HIV-1 polyprotein Gagpolnef was inserted and expressed in either of two attenuated viruses i.e. vaccinia virus (MVA) or poxvirus (NYVAC). Mice were infected with these recombinant viruses and specific CD8 T cell response to Gagpolnef peptides was sought. Mice could indeed mount a CD8 T cell response against the HIV-1 antigens, indicating that the system worked, at least in this animal model. To further test whether peptides from Gagpolnef could also be presented in the frame of the human MHC class I proteins, a second round of experiments was performed in "humanized" transgenic mice expressing human MHC molecules. The transgenic mice were also able to load Gagpolnef peptides on their human MHC molecule, and these cells could be detected and destroyed by Ag-specific CD8 T cells isolated from HIV-1-infected patients. Therefore, expressing Gagpolnef on attenuated recombinant viruses might represent a valid strategy for anti-HIV-1 immunization in human. Publication #3: This is a review paper (section 4.3, page 91) describing the immune response to CMV and newly developed methods to detect this cellular immune response. Some of it focuses on the detection of T cells by using in vitro manufactured tetramers. These consist of four MHC class I molecules linked together and loaded with the appropriate antigenic peptide. The tetramer can be labeled with a fluorochrome and analyzed with a fluorescence-activated cell sorter. Taken together, the work presented indicates that (i) an appropriate CD8 T cell response consisting of IFN-y/IL-2 double positive effectors, can potentially control viral infection, including HIV-1 infection, (ii) such a response might be triggered by recombinant viral vaccines, and (iii) CD8 T cell response can be monitored by a variety of techniques, including recently-developed MHC class I tetramers. 1. 2. Préambule et résumé élargi Le présent travail de thèse s'intéresse à l'immunité antivirale du point de vue particulier de la réponse adaptative des cellules T. Le travail expérimental est présenté sous la forme de trois articles publiés (2 articles expérimentaux et 1 article de revue, voir sections 4.1, 4.2 et 4.3, pages 58, 66 et 77, respectivement), décrivant des progrès dans la compréhension du contrôle de l'infection virale par les lymphocytes T CD8, ainsi que dans le développement de nouveaux vaccins contre le Virus d'Immunodéficience de Humaine de type 1 (VIH-1). En raison du caractère spécialisé de l'immunité antivirale de type cellulaire, les articles sont précédés par une introduction générale (section 3), dont le but est de pourvoir le lecteur non avisé avec des bases nécessaire à une meilleure appréhension du travail expérimental. Cette introduction présente les grandes lignes du système immunitaire, et décrit de façon générale les 4 virus utilisés dans le travail expérimental: à savoir le virus VIH-1, le Cytomégalovirus (CMV), le virus Epstein Barr (EBV) et le virus Influenza A (Flu). Toutes les sections sont présentées de façon individuelle et peuvent être consultées séparément. La description des 4 virus a une pertinence particulière quant à leur interaction avec le système immun. En effet, ils induisent une panoplie de réponses immunitaires s'étendant aux extrêmes de la réaction de l'hôte. Influenza A est à l'origine d'une maladie cytopathique aiguë, au décours de laquelle le virus est éradiqué par l'hôte. CMV et EBV sont classiquement à l'origine d'infections pauci-symptomatiques, voire asymptomatiques, après lesquelles les virus persistent de façon latente dans la cellule hôte. Cependant, ils restent sous le contrôle du système immun, qui peut prévenir une éventuelle réactivation. Enfin, VIH-1 s'établit à la fois en infection latente - par l'insertion de son génome dans le chromosome des cellules hôtes - et en infection productive et cytopathique, échappant au contrôle immunitaire et détruisant ses cellules cibles. La compréhension des différences fondamentales entre ces différents types d'interactions virus-hôte devraient faciliter le développement de nouvelles stratégies antivirales. Article 1: Le premier article (section 4.1 Page 58) représente l'objet principal de mon travail de laboratoire. Il analyse la capacité des lymphocytes T CD8 spécifiques de différent virus à sécréter de l'interféron gamma (IFN-y) et/ou de l'interleukine 2 (IL-2) après stimulation par leur antigène spécifique. Les cellules T CD8 jouent un rôle crucial dans le contrôle des infections virales. Elles identifient les cellules infectées en détectant des antigènes viraux présentés à la surface de ces mêmes cellules, et éliminent à la fois les cellules infectées et les virus qu'elles contiennent en induisant l'apoptose et/ou la lyse des cellules cibles. Parallèlement, l'identification de l'antigène par la cellule T CD8 la stimule à sécréter des cytokines. L'IFN-γen est un exemple. L'IFN-γ stimule les cellules infectées à développer une activé antivirale intrinsèque. De plus, il attire sur place d'autres cellules de l'inflammation, et active leur fonction d'éradication des pathogènes. L'IL-2 est un autre exemple. L'IL-2 est essentielle à l'expansion clonale des cellules T CD8 spécifiques à un virus donné. Elle est donc essentielle à augmenter le pool de lymphocytes antiviraux. En conséquence, la double capacité de sécréter de l'IFN-γ et de IL-2 pourrait être un avantage pour le contrôle antiviral par les cellules T CD8. Dans ce travail nous avons comparé les proportions de lymphocytes T CD8 doubles positifs (IFN-γ/IL-2) et simples positifs (IFN-γ) chez trois groupes de sujets: (i) des patients infectés par VIH-1 qui ne contrôlent pas l'infection (progresseurs), (ii) des patients infectés par VIH-1, mais contrôlant l'infection malgré l'absence de traitement ("long term non progressors" [LTNP]) et (iii) des donneurs de sang négatifs pour l'infection à VIH-1. Les résultats ont montré que les individus capables de contrôler une infection possédaient des cellules T CD8 doubles positifs (IFN-γ/IL-2), alors que les patients ne contrôlant pas l'infection procédaient prioritairement des CD8 simples positifs (IFN-γ). Spécifiquement, les lymphocytes T spécifiques pour Flu, CMV, EBV, et VII-1-1 chez les LTNP étaient tous IFN-γ/IL-2 doubles positifs. Au contraire, les lymphocytes T CD8 spécifique à VIH-1 étaient IFN-γ simples positifs chez les progresseurs. La capacité de développer une réponse IFN-γ/IL-2 pourraient être primordiale pour le contrôle de l'infection, indépendamment de la nature du virus. En effet, il a été montré que l'absence de sécrétion d'IL2 par les lymphocytes T CD8 corrélait avec leur incapacité de proliférer. Dans nos mains, cette prolifération a pu être restaurée in vitro par l'adjonction exogène d'IL-2. Toutefois, la faisabilité de ce type de complémentation in vivo n'est pas claire. Des expériences additionnelles ont permis de préciser de stade de développement des lymphocytes doubles positifs et simples positifs par le biais des marqueurs CD45RA et CCR7. Il reste maintenant à comprendre pourquoi certains lymphocytes T CD8 spécifiques sont incapables à sécréter de l'IL-2. Article 2: Le deuxième article explore des nouvelles stratégies pour induire une immunité T CD8 spécifique aux protéines du VIH-1, qui sont édités et exposés à la surface des cellules infectées. Ces signaux consistent en fragments de peptide de 8-13 acide aminés provenant de protéines virales, et exposées à la surface des cellules infectées dans le cadre des molécules spécialisées d'histocompatibilité de classe I (en anglais "major histocompatibility class I" ou MHC I). Pour mimer une infection virale, la polyprotéine Gagpolnef du VIH-1 a été insérée et exprimée dans deux vecteurs viraux atténués, soit MVA (provenant de vaccinia virus) ou NYVAC (provenant d'un poxvirus). Ensuite des souris ont été infectées avec ces virus recombinants et la réponse T CD8 aux peptides issus de Gagpolnef a été étudiée. Les souris ont été capables de développer une réponse de type CD8 T contre ces antigènes du VIH-1. Pour tester si ces antigènes pouvaient aussi être présentés par dans le cadre de molécules MHC humaines, des expériences supplémentaires ont été faites avec des souris exprimant un MHC humain. Les résultats de ces manipulations ont montré que des cellules T CD8 spécifique aux protéines du VIH pouvaient être détectées. Ce travail ouvre de nouvelles options quant à l'utilisation des virus recombinants exprimant Gagpolnef comme stratégie vaccinale contre le virus VIH-I chez l'homme. Article 3: Ces revues décrivent la réponse immunitaire à CMV ainsi que des nouvelles méthodes pouvant servir à sa détection. Une partie du manuscrit décrit la détection de cellule T à l'aide de tétramères. Il s'agit de protéines chimériques composées de 4 quatre molécules MHC liées entre elles. Elles sont ensuite "chargées" avec le peptide antigénique approprié, et utilisée pour détecter les cellules T CD8 spécifiques à ce montage. Elles sont aussi marquées par un fluorochrome, qui permet une analyse avec un cytomètre de flux, et l'isolement ultime des CD8 d'intérêt. En résumé, le travail présenté dans cette thèse indique que (i) une réponse T CD8 appropriée - définie par la présence des cellules effectrices doublement positives pour l'IFN-γ et l'IL-2 - semble indispensable pour le contrôle des infections virales, y compris par le VIH-1, (ii) une telle réponse peut être induite par des vaccin viral recombinant, et (iii) la réponse T CD8 peut être analysée et suivie grâce à plusieurs techniques, incluant celle des tétramères de MHC class I. 1.3. Résumé pour un large public Le système immunitaire humain est composé de différents éléments (cellules, tissus et organes) qui participent aux défenses de l'organisme contre les pathogènes (bactéries, virus). Parmi ces cellules, les lymphocytes T CD8, également appelés cellules tueuses, jouent un rôle important dans la réponse immunitaire et le contrôle des infections virales. Les cellules T CD8 reconnaissent de manière spécifique des fragments de protéines virales qui sont exposés à la surface des cellules infectées par le virus. Suite à cette reconnaissance, les cellules T CD8 sont capables de détruire et d'éliminer ces cellules infectées, ainsi que les virus qu'elles contiennent. Dans le contexte d'une infection par le virus de l'immunodéficience humaine (VIH), le virus responsable du SIDA, il a pu être montré que la présence des cellules T CD8 est primordiale. En effet, en l'absence de ces cellules, les individus infectés par le VIH progressent plus rapidement vers le SIDA. Au cours de la vie, l'Homme est exposé à plusieurs virus. Mais à l'opposé du VIH, certains d'entre eux ne causent pas des maladies graves : par exemple le virus de la grippe (Influenza), le cytomégalovirus ou encore le virus d'Epstein-Barr. Certains de ces virus peuvent être contrôlés et éliminés de l'organisme (p. ex. le virus de la grippe), alors que d'autres ne sont que contrôlés par notre système immunitaire et restent présents en petite quantité dans le corps sans avoir d'effet sur notre santé. Le sujet de mon travail de thèse porte sur la compréhension du mécanisme de contrôle des infections virales par le système immunitaire : pourquoi certains virus peuvent être contrôlés ou même éliminés de l'organisme alors que d'autres, et notamment le VIH, ne le sont pas. Ce travail a permis de démontrer que les cellules T CD8 spécifiques du VIH ne sécrètent pas les mêmes substances, nécessaires au développement d'une réponse antivirale efficace, que les cellules T CD8 spécifiques des virus contrôlés (le virus de la grippe, le cytomégalovirus et le virus d'Epstein-Barr). Parallèlement nous avons également observé que les lymphocytes T CD8 spécifiques du VIH ne possèdent pas la capacité de se diviser. Ils sont ainsi incapables d'être présents en quantité suffisante pour assurer un combat efficace contre le virus du SIDA. La (les) différence(s) entre les cellules T CD8 spécifiques aux virus contrôlés (grippe, cytomégalovirus et Epstein-Barr) et au VIH pourront peut-être nous amener à comprendre comment restaurer une immunité efficace contre ce dernier.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Software engineering is criticized as not being engineering or 'well-developed' science at all. Software engineers seem not to know exactly how long their projects will last, what they will cost, and will the software work properly after release. Measurements have to be taken in software projects to improve this situation. It is of limited use to only collect metrics afterwards. The values of the relevant metrics have to be predicted, too. The predictions (i.e. estimates) form the basis for proper project management. One of the most painful problems in software projects is effort estimation. It has a clear and central effect on other project attributes like cost and schedule, and to product attributes like size and quality. Effort estimation can be used for several purposes. In this thesis only the effort estimation in software projects for project management purposes is discussed. There is a short introduction to the measurement issues, and some metrics relevantin estimation context are presented. Effort estimation methods are covered quite broadly. The main new contribution in this thesis is the new estimation model that has been created. It takes use of the basic concepts of Function Point Analysis, but avoids the problems and pitfalls found in the method. It is relativelyeasy to use and learn. Effort estimation accuracy has significantly improved after taking this model into use. A major innovation related to the new estimationmodel is the identified need for hierarchical software size measurement. The author of this thesis has developed a three level solution for the estimation model. All currently used size metrics are static in nature, but this new proposed metric is dynamic. It takes use of the increased understanding of the nature of the work as specification and design work proceeds. It thus 'grows up' along with software projects. The effort estimation model development is not possible without gathering and analyzing history data. However, there are many problems with data in software engineering. A major roadblock is the amount and quality of data available. This thesis shows some useful techniques that have been successful in gathering and analyzing the data needed. An estimation process is needed to ensure that methods are used in a proper way, estimates are stored, reported and analyzed properly, and they are used for project management activities. A higher mechanism called measurement framework is also introduced shortly. The purpose of the framework is to define and maintain a measurement or estimationprocess. Without a proper framework, the estimation capability of an organization declines. It requires effort even to maintain an achieved level of estimationaccuracy. Estimation results in several successive releases are analyzed. It isclearly seen that the new estimation model works and the estimation improvementactions have been successful. The calibration of the hierarchical model is a critical activity. An example is shown to shed more light on the calibration and the model itself. There are also remarks about the sensitivity of the model. Finally, an example of usage is shown.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article offers an overview of Francoist repression in the Catalan Countries from the outbreak of the Civil War to the first decade after the establishment of the dictatorship. It covers both physical violence and measures such as economic repression, imprisonment, professional purges and the social and moral control to which the population as a whole was subjected. First the type of violence and domination exercised by the insurgents in the territories occupied is briefly examined. Then the author offers an account of the events: she commences in the summer of 1936 in Majorca, the only Catalan-speaking territory to remain in rebel hands, then proceeds to the Lleida region, which was occupied in the spring of 1938, and concludes with the final offensive against Catalonia and Valencia, launched in the winter of that same year. Special stress is laid on the repercussions of the 1939 Law of Political Responsibilities and the meaning attached by the occupiers to the pacification and reconstruction of the conquered territories.