• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 22
  • 18
  • 10
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 60
  • 27
  • 25
  • 23
  • 17
  • 14
  • 12
  • 12
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Analyses des variations de nombres de copies de gènes candidats dans la polyarthrite rhumatoïde / Analysis of copy number variations of candidate genes in rheumatoid arthritis

Ben Kilani, Mohamed Sahbi 10 December 2014 (has links)
Les variations de nombre de copies (CNVs) sont des séquences supérieures à 1kb ayant subi une délétion, une duplication ou une inversion de fragments d'ADNs et sont présents avec une fréquence de 12% dans le génoe humain. Leur caractérisation ainsi que leur association dans les maladies complexes sont, à ce jour, en plein essor. Nous avons donc entrepris l'étude des CNVs de gènes candidats dans les familles de patients atteints de polyarthrite rhumatoïde (PR) en utilisant plusieurs outils de biologie moléculaire. Les CNVs de quatre gènes candidats (GSTMI, GSTT1, FCGR3B et CCL3L1) ont été investigués par PCR classique, qPCR ou Droplet Digital PCR (ddPCR). Mais très vite, la PCR classique a montré qu'elle n'est pas applicable à tous les gènes et que la qPCR était peu sensible et reproductible. Par contre, grâce à la ddPCR, nous avons tout d'abord pu quantifier avec précision les CNVs des gènes GSTM1, FCGR3B et CCL3L1. Par la suite, nous avons pu identifier les génotypes en nombre de copies pour le gène GSTM1 et mettre en évidence une duplication en tandem qui a été confirmée par une Lone Range PCR. La transmission des CNVs au sein des familles étudiées nous a ensuite permis d'identifier tous les génotypes en nombre de copies du gène FCGR3B et certains génotypes du gène CCL3LI. Des événements de recombinaison de novo ont été mis en évidence pour le gène FCGR3B ainsi que des duplications en tandem transmises des parents aux patients pour les trois gènes investigués par ddPCR. Aucune association n'a été mise en évidence entre la PR et les CNVs des quatre gènes candidats. Néanmoins, une transmission préférentielle de la délétion du gène GSTT1 a été mise en évidence, après stratification dans le sous-groupe de patients séropositifs pour le facteur rhumatoïde. Des tendances non significatives ont été observées dans les sous-groupes de cas index avec un âge de début de la maladie inférieur à 40 ans, avec présence de modules (pour le gêne GSTM1), et avec la présence d'auto-anticorps (pur les gènes FCGR3B et CCL3L1). En conclusion, le développement de l'utilisation d'une technologie de pointe et l'accès à des échantillons familiaux sont des atouts indispensables pour caractériser les variants génomiques de nombre de copies, facteurs de risque potentiels des maladies complexes. / Copy number variations (CNVs) are sequences up to 1kb resulting from deletion, duplication and inversion of DNA regions ans are present with a frequency of 12% in the human genome. CNVs characterization and association to complex diseases are still subjects of controversies. We then enhanced the study of CNV's for candidate genes in rhemuatoid arthritis (RA) families, with different methodologies. CNVs of our candidate genes (GSTM1, GSTT1, FCGR3B et CCL3L1) were investigated with standard PCR, quantitative PCR (qPCR) or with Droplet Digital PCR (ddPCR). First we found that standard PCR was not applicable for all genes and that the qPCR was not sensitive and reproductible for CNVs quantification. Second, the ddPCR methodology allowed us to quantify CNVs of GSTM1, FCGR3B, and CCL3L1 with high resolution and to characterize copy number genotypes og GSTM1 gene, leading to the identification of tandem duplicated copies. A long range PCR confirmed this result. CNVs transmission in families allowed the identification of all copy number genotypes for FCGR3B gene and some of CCL3L1 with high resolution and to characterize copy numbers genotypes of GSTM1 gene, leading to the identification of tandem duplicated copies. A long Range PCR confirmed this result. CNVs transmission in families allowed the identification of all copy number genotypes for FCGR3B gene and some of CCL3L1 genotypes. De novo recombination events were highllighted for FCGR3B gene and transmission of the duplication from one parent to the offspring was observed for all genes characterized by ddPCR. No association between RA and candidate genes CNVs was found, but after stratification, we observed a significant preferential transmission of GSTT1 deletion in the subgroup of patients seropositive for rheumatoid factor. We also showed a non-significant tendency in the subgroups of patient with an age at onset inferior to 40 years, with presence of nodules (for GSTM1 gene), and with presence of auto-antibodies (for FCGR3B and CCL3L1 gene). In conclusion, digital PCR is currently the most adequate methodology to accurately genotype CNVs. Analysis of familial sample leads to the identification of duplication events and to the characterization of genotypes, essential for CNVs association in complex diseases.
2

Akgorithmes biostatistiques pour les données omiques en oncologie - Application à l'étude du nombre de copies d'ADN à partir des expériences de microarray

Hupé, Philippe 14 November 2008 (has links) (PDF)
Le cancer est une cause principale de décès et d'importants eorts doivent être réalisés pour vaincre la maladie. La technologie des microarrays est un puissant outil de recherche en oncologie pour comprendre les mécanismes de la progression tumorale qui est due à une perturbation de la régulation des gènes. Par conséquent, l'étude de leur niveau d'expression dans les tumeurs offre une perspective pour comprendre les mécanismes biologiques de la maladie et identier de nouveaux facteurs pronostiques et prédictifs qui aideront le clinicien à choisir la thérapie de chaque patients. Par ailleurs, les tumeurs présentent un changement du nombre de copies d'ADN dont la quantication est aussi possible par microarray. L'utilisation des données de microarray nécessite un traitement statistique approprié permettant de transformer les données brutes en données interprétables biologiquement et cliniquement. Ainsi, nous avons développé des méthodes statistiques qui visent à normaliser et extraire l'information biologique issue des microarrays dédiés à l'étude du nombre de copies d'ADN des tumeurs. Nos méthodes ont permis la caractérisation des tumeurs de haut-risque métastatique dans le mélanome uvéal. Par ailleurs, un des enjeux de l'analyse biostatistique des données de microarrays consiste en l'analyse intégrée de différents types de prols moléculaires. Ainsi, une méthode statistique qui combine les données d'expression de gènes et du nombre de copie d'ADN obtenues par microarrays a été développée dans un contexte de classication supervisée. Les propriétés statistiques de la méthode ont été étudiées et ses performances estimées sur des données simulées et réelles.
3

Bronzino in Duke Cosimo I de' Medici's Court: Manufacturing Propaganda in Sixteenth-Century Italy

Farrell, Bethany January 2021 (has links)
My dissertation “Bronzino in Duke Cosimo I de’ Medici’s Court: Manufacturing Propaganda in Sixteenth-Century Italy” challenges entrenched scholarly approaches on the artist which developed during the twentieth and twenty-first centuries. Bronzino (1503-1572) is best known for his autograph portraits and the painting Allegory with Venus and Cupid; yet the scholarship on the artist has suffered due to the inordinate focus on this very select portion of his artwork. The portraits and allegory have been scrutinized so intensely because they have been deemed masterpieces of the Western canon. However, almost three-quarters of his oeuvre, in particular the copies of the ducal portraits made by Bronzino and his workshop, as well as the religious paintings, have been neglected due to their non-masterpiece status. To bring a fresh approach to Bronzino scholarship, my research hinges on the matter of how the painter’s artistic practices changed when he began to manufacture propaganda for the court of the second duke of Florence, Cosimo I de’ Medici (1519-1574). This topic elicits questions such as how an artist transformed their workshop to a salaried court studio as well as the complicated realities of manufacturing propaganda for a principality. By focusing my dissertation on this topic, my study offers a different way of understanding Bronzino and a way to think with the painter on broader questions related to the life of an early modern court artist. / Art History
4

Infrared correlation functions in Quantum Chromodynamics / Fonctions de corrélation infrarouges de la Chromodynamique Quantique

Peláez Arzúa, Monica Marcela 30 July 2015 (has links)
Le but de cette thèse est l'étude des fonctions de corrélation des théries Yang-Mills dans le régime infrarouge. Il est connu que, à cause de l'invariance jauge, il est nécessaire de fixer la jauge pour calculer des valeurs moyennes analytiquement. La procedure de fixation gauge standard est la procedure de Faddeev-Popov (FP). Le Lagrangien de FP permet de faire des calculs perturbatifs pour la Chromodynamique Quantique dans le régime de hautes énergies dont les résultats sont comparés avec succès avec des expériences. Cependant, dans le régime de basses énergies, il se trouve que la constante de couplage, calculée avec la procedure antérieure, diverge. En conséquence, la théorie des perturbations standard n'est plus valide. D'autre part, les simulations du réseau trouvent que la constante de couplage est finie avec une valeur modérée même dans le régime infrarouge. Ceci suggère qu'il devrait exister une manière de faire des calculs perturbatifs également dans le régime infrarouge. Cette différence dans la constante de couplage peut être due au fait que la procedure de FP n'est pas bien justifiée dans ce régime. Nous proposons de modifier le Lagrangien de FP avec un terme massif pour les gluons. Cette modification est également justifiée par le fait que le réseau trouve un propagateur du gluon qui paraît massive aux basses énergies. Nous utilisons cette version massive pour calculer à une boucle les fonctions de corrélations à deux et trois points pour une configuration cinématique générale et en dimension quelconque dans la jauge de Landau. On trouve que les comparaisons de notre calcul à une boucle avec les résultat du réseau donnent, en géneral, un très bon accord. / The aim of this thesis is to investigate the infrared behaviour of Yang-Mills correlation functions. It is known that the gauge invariance of the theory brings as a consequence the necessity of a gauge fixing procedure in order to compute expectation values analytically. The standard procedure for fixing the gauge is the Faddeev-Popov (FP) procedure which allows one to do perturbation theory in the ultraviolet regime. Perturbative calculations using the FP gauge fixed action successfully reproduce Quantum Chromodynamics observables measured by experiments in the ultraviolet regime. In the infrared regime the coupling constant of the theory computed with the above procedure diverges, and standard perturbation theory does not seem to be valid. However, lattice simulations show that the coupling constant takes finite and not very large value. This suggests that some kind of perturbative calculations should be valid even in the infrared regime. The theoretical justification for the FP procedure depends on the absence of Gribov copies and hence is not valid in the infrared regime (where such copies exist). To correct this we propose to add a mass term for the gluons in the gauge-fixed Lagrangian. The gluon mass term is also motivated by lattice simulations which observe that the gluon propagator behaves as it was massive in the infrared regime. We use this massive extension of the FP gauge fixed action to compute the one loop correction of the two- and three-point correlation functions in the Landau gauge for arbitrary kinematics and dimension. Our one-loop calculations are enough, in general, to reproduce with good accuracy the lattice data available in the literature.
5

Analyse et indexation des flux vidéos dans le domaine compressé H. 264 / Compressed domain indexing and analysis of H. 264 streams

Käs, Christian 22 March 2010 (has links)
Dans cet étude, nous nous concentrons sur l'analyse et l'indexation automatique des séquences vidéo. Cela permet une récupération et un accès efficace aux données. Les vidéos étant généralement stockées et transmises sous forme encodées, notre approche se base sur l'analyse dans le domaine compressé. Ce domaine présente un compromis raisonnable entre cout de calcul et qualité des résultats. Les informations les plus pertinentes encodées dans le flux H.264 sont les vecteurs de mouvement (VM). Ces vecteurs sont associés aux macroblocs dans les images prédites (de type B et P). Nous présentons diverses techniques non-supervisés pour déterminer le mouvement de la caméra, détecter et suivre les objets en mouvement dans les vidéos. Ces analyses sont basées sur les champs de VM. Nous démontrons le potentiel de l'analyse dans le domaine compressé avec plusieurs exemples d'applications, notamment la surveillance de trafic routier et la détection de copies. / The amount of generated audiovisual content continues to increase. In this work, we concentrate on the challenge of automatic video analysis and indexing, which builds the basis for efficient information access and retrieval. Taking advantage of the fact that video in most cases is stored and transmitted in encoded form, we pursue the approach of compressed domain processing, which represents a reasonable trade-off between computational complexity and quality of analysis results. The most valuable information encoded in H.264 streams is the motion vectors (MVs) that are associated with macroblocks in temporally predicted frames of type B and P. We present a number of completely unsupervised techniques to determine the camera motion and to detect and track moving objects from the extracted MV fields. We furthermore present the potential of compressed domain processing through several example applications, including traffic surveillance and video copy detection.
6

“Now exhibiting” : Charles Bird King’s picture gallery, fashioning American taste and nation 1824-1861 / Charles Bird King's picture gallery, fashioning American taste and nation 1824-1861

Dasch, Rowena Houghton 26 February 2013 (has links)
This dissertation is an exploration of Charles Bird King’s Gallery of Paintings. The Gallery opened in 1824 and, aside from a brief hiatus in the mid-1840s, was open to the public through the end of the antebellum era. King, who trained in London at the Royal Academy and under the supervision of Benjamin West, presented to his visitors a diverse display that encompassed portraits, genre scenes, still lifes, trompe l’oeils and history paintings. Though the majority of the paintings on display were his original works across these various genres, at least one third of the collection was made up of copies after the works of European masters as well as after the American portraitist Gilbert Stuart. This study is divided into four chapters. In the first, I explore late-colonial and early-republic public displays of the visual arts. My analysis demonstrates that King’s Gallery was in step with a tradition of viewing that stretched back to John Smibert’s Boston studio in the mid-eighteenth century and created a visual continuity into the mid-nineteenth century. In a second chapter, focused on portraiture, I examine what it meant to King and to his visitors to be “American.” The group of men and women King displayed in his Gallery was far more diverse than typical for the time period. King included many prominent politicians, but no American President after John Quincy Adams (whom King had painted before Adams’ election). Instead he featured portraits of many men of commerce as well as prominent women and numerous American Indians. In the third chapter, I look at a group of King’s original compositions, genre paintings. King’s style in this category was clearly indebted to seventeenth-century Dutch tradition as filtered through an eighteenth- and early-nineteenth-century British lens, in particular the works of Sir David Wilkie. My final chapter continues the exploration of Dutch influences over King’s work. These paintings draw together the themes of King’s sense of humor, his attitudes towards patronage and his methods of circumventing inadequate patronage through the establishment of the Gallery. Finally, they prompt us to reconsider the importance of European precedents in our understanding of how artists and viewers worked together to establish an American visual cultural dialogue. / text
7

Philosophy of art forgeries: the aesthetic difference between originals and copies.

Negrich, René Catherine 23 December 2011 (has links)
This thesis consists of three chapters and deals with the aesthetic status of forgeries regarding works of literature, the visual arts, and musical works. The first chapter deals with the definition of forgery and I explain the difference between forgeries and mere fakes. I also give examples of famous art forgeries. In the second chapter I explain the leading arguments regarding the aesthetic status of forgeries. These arguments come from Nelson Goodman, Alfred Lessing, Mark Sagoff, Denis Dutton, John Hoaglund, Tomas Kulka, Kendall Walton, and Sherri Irvin. In the final chapter I give my own view and explain what exactly is aesthetically wrong with forgeries. My main issue with forgeries deals with deception and with what this deception entails. / Graduate
8

Characterizing dissemination of illegal copies of content through BitTorrent networks

Schmidt, Adler Hoff January 2013 (has links)
Redes BitTorrent (BT) atualmente representam o método Par-a-Par (P2P) de compartilhamento de arquivos pela Internet mais utilizado. Relatórios de monitoramento recentes revelam que as cópias de conteúdo sendo compartilhadas são, em grande maioria, ilegais e que filmes são os tipos de mídia mais populares. Iniciativas de pesquisa que tentaram entender a dinâmica da produção e do compartilhamento de conteúdo em redes BT não conseguiram prover informações precisas acerca da disseminação de cópias ilegais. No presente trabalho realizamos um extenso estudo experimental para caracterizar o comportamento de produtores, publicadores, provedores e consumidores de arquivos violando direitos autorais. O estudo conduzido é baseado em dados coletados durante sete meses de monitoração de enxames compartilhando filmes por meio de uma das comunidades públicas mais populares de BT. Os dados foram obtidos via emprego de uma arquitetura de monitoração do \universo" BitTorrent, o que permitiu popular uma base com informações acerca de mais de 55.000 torrents, 1.000 rastreadores e 1,9 milhões de IPs. Nossa análise não somente mostra que um pequeno grupo de usuários ativos _e responsável pela maior parte do compartilhamento de cópias ilegais, como desvenda relacionamentos existentes entre esses atores e caracteriza os padrões de consumo respeitados pelos usuários interessados nesse tipo de conteúdo. / BitTorrent (BT) networks are nowadays the most employed method of Peerto- Peer (P2P) le sharing in the Internet. Recent monitoring reports reveal that content copies being shared are mostly illegal and movies are the most popular media type. Research e orts carried out to understand the dynamics of content production and sharing in BT networks have been unable to provide precise information regarding the dissemination of illegal copies. In this work we perform an extensive experimental study in order to characterize the behavior of producers, publishers, providers and consumers of copyright-infringing les. This study is based on seven months of traces obtained by monitoring swarms sharing movies via one of the most popular BT public communities. Traces were obtained with an extension of a BitTorrent \universe" observation architecture, which allowed the collection of a database with information about more than 55,000 torrents, 1,000 trackers and 1.9 million IPs. Our analysis not only shows that a small group of active users is responsible for the majority of disseminated illegal copies, as it unravels existing relationships among these actors and characterizes consuming patterns respected by users interested in this particular set of contents.
9

Characterizing dissemination of illegal copies of content through BitTorrent networks

Schmidt, Adler Hoff January 2013 (has links)
Redes BitTorrent (BT) atualmente representam o método Par-a-Par (P2P) de compartilhamento de arquivos pela Internet mais utilizado. Relatórios de monitoramento recentes revelam que as cópias de conteúdo sendo compartilhadas são, em grande maioria, ilegais e que filmes são os tipos de mídia mais populares. Iniciativas de pesquisa que tentaram entender a dinâmica da produção e do compartilhamento de conteúdo em redes BT não conseguiram prover informações precisas acerca da disseminação de cópias ilegais. No presente trabalho realizamos um extenso estudo experimental para caracterizar o comportamento de produtores, publicadores, provedores e consumidores de arquivos violando direitos autorais. O estudo conduzido é baseado em dados coletados durante sete meses de monitoração de enxames compartilhando filmes por meio de uma das comunidades públicas mais populares de BT. Os dados foram obtidos via emprego de uma arquitetura de monitoração do \universo" BitTorrent, o que permitiu popular uma base com informações acerca de mais de 55.000 torrents, 1.000 rastreadores e 1,9 milhões de IPs. Nossa análise não somente mostra que um pequeno grupo de usuários ativos _e responsável pela maior parte do compartilhamento de cópias ilegais, como desvenda relacionamentos existentes entre esses atores e caracteriza os padrões de consumo respeitados pelos usuários interessados nesse tipo de conteúdo. / BitTorrent (BT) networks are nowadays the most employed method of Peerto- Peer (P2P) le sharing in the Internet. Recent monitoring reports reveal that content copies being shared are mostly illegal and movies are the most popular media type. Research e orts carried out to understand the dynamics of content production and sharing in BT networks have been unable to provide precise information regarding the dissemination of illegal copies. In this work we perform an extensive experimental study in order to characterize the behavior of producers, publishers, providers and consumers of copyright-infringing les. This study is based on seven months of traces obtained by monitoring swarms sharing movies via one of the most popular BT public communities. Traces were obtained with an extension of a BitTorrent \universe" observation architecture, which allowed the collection of a database with information about more than 55,000 torrents, 1,000 trackers and 1.9 million IPs. Our analysis not only shows that a small group of active users is responsible for the majority of disseminated illegal copies, as it unravels existing relationships among these actors and characterizes consuming patterns respected by users interested in this particular set of contents.
10

Characterizing dissemination of illegal copies of content through BitTorrent networks

Schmidt, Adler Hoff January 2013 (has links)
Redes BitTorrent (BT) atualmente representam o método Par-a-Par (P2P) de compartilhamento de arquivos pela Internet mais utilizado. Relatórios de monitoramento recentes revelam que as cópias de conteúdo sendo compartilhadas são, em grande maioria, ilegais e que filmes são os tipos de mídia mais populares. Iniciativas de pesquisa que tentaram entender a dinâmica da produção e do compartilhamento de conteúdo em redes BT não conseguiram prover informações precisas acerca da disseminação de cópias ilegais. No presente trabalho realizamos um extenso estudo experimental para caracterizar o comportamento de produtores, publicadores, provedores e consumidores de arquivos violando direitos autorais. O estudo conduzido é baseado em dados coletados durante sete meses de monitoração de enxames compartilhando filmes por meio de uma das comunidades públicas mais populares de BT. Os dados foram obtidos via emprego de uma arquitetura de monitoração do \universo" BitTorrent, o que permitiu popular uma base com informações acerca de mais de 55.000 torrents, 1.000 rastreadores e 1,9 milhões de IPs. Nossa análise não somente mostra que um pequeno grupo de usuários ativos _e responsável pela maior parte do compartilhamento de cópias ilegais, como desvenda relacionamentos existentes entre esses atores e caracteriza os padrões de consumo respeitados pelos usuários interessados nesse tipo de conteúdo. / BitTorrent (BT) networks are nowadays the most employed method of Peerto- Peer (P2P) le sharing in the Internet. Recent monitoring reports reveal that content copies being shared are mostly illegal and movies are the most popular media type. Research e orts carried out to understand the dynamics of content production and sharing in BT networks have been unable to provide precise information regarding the dissemination of illegal copies. In this work we perform an extensive experimental study in order to characterize the behavior of producers, publishers, providers and consumers of copyright-infringing les. This study is based on seven months of traces obtained by monitoring swarms sharing movies via one of the most popular BT public communities. Traces were obtained with an extension of a BitTorrent \universe" observation architecture, which allowed the collection of a database with information about more than 55,000 torrents, 1,000 trackers and 1.9 million IPs. Our analysis not only shows that a small group of active users is responsible for the majority of disseminated illegal copies, as it unravels existing relationships among these actors and characterizes consuming patterns respected by users interested in this particular set of contents.

Page generated in 0.093 seconds