35 research outputs found

    Caractérisation du rôle de Citron Kinase durant la cytokinèse

    Full text link
    La cytokinèse est un processus dont le but est une séparation de deux cellules soeurs en deux entités suite à une mitose. La cytokinèse nécessite la formation d’un anneau contractile (AC) qui va conduire un sillon de clivage vers une ingression à l’équateur de la cellule. L’une des étapes critiques de ce processus est la transition d’un AC dynamique vers une structure stable surnommée l’anneau du midbody (AM), organelle qui va guider la cellule vers l’abscision. La compréhension des mécanismes moléculaires impliqués dans cette transition nous permettrait de mieux comprendre les complexes protéiques impliqués autant au niveau de l’initiation qu’à la terminaison de la cytokinèse. Des défauts ayant lieu lors de cette transition mènent à la formation de cellules binucléées tétraploïdes qui sont observées dans plusieurs pathologies comme le cancer. Afin d’approfondir nos connaissances à ce sujet j’ai utilisé un modèle d’imagerie optique en temps réel dans un modèle cellulaire de Drosophila melanogaster : les cellules S2 de Schneider. Ces études ont mis l’emphase sur un nouveau mécanisme de maturation de la transition AC/AM. Nous avons pu démontrer que la kinase Citron, Sticky, et la septine, Peanut, agissent de manière opposée sur la protéine Anillin pour retenir ou éliminer, respectivement, la membrane plasmique lors de la transition AC/AM. En effet, la diminution d’expression de Sticky par ARNi engendre une perte de contrôle de rétention membranaire de l’AM. À l’inverse, la diminution d’expression de Peanut inhibe la maturation par excrétion membranaire de l’AM. La diminution d’expression simultanée de Sticky et de Peanut conduit l’AC vers des mouvements oscillatoires typiques d’une instabilité de l’AC suite à la perte de fonction de l’Anillin. Sticky est une protéine corticale lors de la cytokinèse dont le rôle et les partenaires d’interaction restent controversés. Pour approfondie nos connaissance de ce sujet, nous avons effectué une étude structurelle et fonctionnelle de Sticky. Cette étude démontre que Sticky possède deux mécanismes de localisation corticale. Le premier dépend de l’Anillin et le deuxième dépend de la petite GTPase Rho1, le régulateur maître de la cytokinèse. Sticky est capable de se localiser à l’AC en présence de l’un ou l’autre de ces deux mécanismes, mais chacun semble être essentiel pour la réussite de la cytokinèse. Le domaine minimal d’interaction entre la Sticky et l’Anillin a été identifié. Une version d’Anillin qui manque le site de liaison à la Sticky est incapable de supporter l’achèvement de la cytokinèse, et les cellules échouent la cytokinèse d’une manière semblable aux cellules dont l’expression de Sticky est diminuée. Similairement, les cellules exprimant une protéine Sticky mutée au site d’interaction avec Rho1-GTP, sont incapables de compléter la cytokinèse lorsque les niveaux endogènes de Sticky sont diminués par ARNi. Ceci suggère que Sticky agit avec Anillin et Rho1 au niveau du cortex pour guider la transition d’un AC dynamique vers un AM stable. Par la mise en évidence et la caractérisation d’un nouveau mécanisme moléculaire essentiel à la cytokinèse, cette thèse constitue des avancements importants au niveau de la cytokinèse.Cytokinesis is a multistep process that allows two sister cells to undergo complete separation following mitosis. Cytokinesis requires the formation of a contractile ring (CR) that will drive cleavage furrow ingression at the equator of the cell. One of the crucial steps in this process is the transition from a dynamic CR to a more stable structure named the midbody ring (MR), which directs the final separation or abscission. Our knowledge of the molecular mechanisms involved in the CR-to-MR transition would presumably improve our understanding of the molecular complexes involved throughout cytokinesis from initiation to abscission. Defects that occur during this transition can lead to the formation of bi-nucleate tetraploid cells that are often observed in pathological conditions such as cancer. I have used Drosophila melanogaster Schneider’s S2 cells to study the CR-to-MR transition. My findings have highlighted a previously uncharacterized maturation process essential for the transition. More specifically, I demonstrate that the Citron Kinase, Sticky, and the Septin, Peanut, have opposing actions on the scaffold protein Anillin to either retain or extrude, respectively, membrane-positive proteins during the CR-to-MR transition. Indeed, Sticky depletion by RNAi led to uncontrolled loss of membrane-associated Anillin at the MR. Conversely, Peanut depletion led to inhibition of MR maturation by membrane extrusion. Co-depletion of Sticky and Peanut led to oscillatory movements of the CR, typical of Anillin depletion. Sticky is a cortical protein during cytokinesis whose role and interacting partners are controversial. I have performed a structure/function analysis of Sticky to better define its role and regulation during cytokinesis. My work shows that Sticky has two mechanisms of cortical localization. The first is through an Anillin interaction and the second is through the small GTPase Rho1, a master regulator of cytokinesis. Sticky can localize to the cortex in the absence of either one of these mechanisms. However, loss of both inhibits its localization. Following the identification of the minimal interaction sites of Anillin and Sticky, I expressed an Anillin mutant that lacked part of this site and found that cells failed cytokinesis in a similar manner to cells depleted of Sticky. Mutation of the Rho1 binding site on Sticky produced similar cytokinesis failures. Altogether, the results suggest that Sticky interacts with Anillin and Rho1 at the cortex to guide the transition from dynamic CR to stable MR. This thesis advances our understanding of cytokinesis by highlighting a previously uncharacterized process of MR maturation and by defining the importance and regulation of Citron Kinase during this process

    MiR-16, un nouveau régulateur du transporteur de glucose dépendant de l’insuline GLUT-4

    Get PDF
    Les microARNs sont des petits ARNs non codants d'environ 22 nucléotides qui régulent négativement la traduction de l'ARN messager cible (ARNm) et ont donc des fonctions cellulaires. Le microARN-16 (miR-16) est connu pour ses effets antiprolifératifs. Nous avons observé que l’expression de miR-16 est diminuée dans les cellules endothéliales humaines sénescentes et quiescentes en comparaison à des cellules prolifératives. Une analyse informatique des sites potentiels de liaison de miR-16 prévoit que GLUT-4, un transporteur du glucose insulinodépendant, pourrait être une cible potentielle du miR-16. Nous avons donc testé l'hypothèse que miR-16 régule négativement le métabolisme du glucose cellulaire. Dans des HUVEC, l'inhibition de miR-16 endogène avec des anti-miRNA oligonucléotides (AMO) augmente les niveaux protéiques de GLUT-4 de 1,7 ± 0,4 fois (p=0,0037 ; n=9). Dans des souris nourries avec un régime alimentaire normal ou riche en graisse et en sucre, l’expression de GLUT-4 dans le muscle squelettique a tendance à corréler négativement avec les niveaux de miR-16 (p=0,0998, r2=0,3866, n=4). Ces résultats suggèrent que miR-16 est un régulateur négatif de GLUT-4 et qu’il pourrait être impliqué dans la régulation du métabolisme cellulaire du glucose.MicroRNAs are small noncoding RNAs of approximately 22 nucleotides that negatively regulate translation of the target messenger RNA (mRNA) and therefore have cellular functions. MicroRNA-16 (miR-16) is known to display anti-proliferative effects. We observed that miR-16 was down-regulated in non-proliferative human senescent endothelial cells. Computational analysis of the potential binding sites of miR-16 predicted that GLUT-4, an insulin-dependent glucose transporter, is a potential target of miR- 16. We therefore tested the hypothesis that miR-16 down-regulates cellular glucose metabolism. In HUVEC, inhibition of using anti-miRNA oligonucleotides (AMO) endogenous miR-16 up-regulated GLUT-4 protein levels 1,7 ± 0,39 folds (p=0,0037; n=9). In mice fed a regular or high fat diet, skeletal muscle expression of GLUT-4 tended to negatively correlate with miR- 16 levels (p=0,0998, r2=0,3866, n=4). These results suggest that miR-16 is a negative regulator of GLUT-4 and may be involved in the regulation of cellular glucose metabolism

    Mathematical Creativity: The Unexpected Links

    Get PDF
    Creativity in mathematics is identified in many forms or we can say is made up of many components. One of these components is The Unexpected Links where one tries to solve a mathematical problem in a nontraditional manner that requires the formation of hidden bridges between distinct mathematical domains or even between seemingly far ideas within the same domain. In this article, we design problems that express unexpected links in mathematics and suit students of intermediate and secondary levels. We prove their feasibility through teachers’ testimonies and through introducing them in classrooms and collecting students’ attitudes with respect to understanding and interest. Results confirm that students can sense such component and that designed problems had caught teachers’ and students’ interest

    Effects of hospital facilities on patient outcomes after cancer surgery: an international, prospective, observational study

    Get PDF
    Background Early death after cancer surgery is higher in low-income and middle-income countries (LMICs) compared with in high-income countries, yet the impact of facility characteristics on early postoperative outcomes is unknown. The aim of this study was to examine the association between hospital infrastructure, resource availability, and processes on early outcomes after cancer surgery worldwide.Methods A multimethods analysis was performed as part of the GlobalSurg 3 study-a multicentre, international, prospective cohort study of patients who had surgery for breast, colorectal, or gastric cancer. The primary outcomes were 30-day mortality and 30-day major complication rates. Potentially beneficial hospital facilities were identified by variable selection to select those associated with 30-day mortality. Adjusted outcomes were determined using generalised estimating equations to account for patient characteristics and country-income group, with population stratification by hospital.Findings Between April 1, 2018, and April 23, 2019, facility-level data were collected for 9685 patients across 238 hospitals in 66 countries (91 hospitals in 20 high-income countries; 57 hospitals in 19 upper-middle-income countries; and 90 hospitals in 27 low-income to lower-middle-income countries). The availability of five hospital facilities was inversely associated with mortality: ultrasound, CT scanner, critical care unit, opioid analgesia, and oncologist. After adjustment for case-mix and country income group, hospitals with three or fewer of these facilities (62 hospitals, 1294 patients) had higher mortality compared with those with four or five (adjusted odds ratio [OR] 3.85 [95% CI 2.58-5.75]; p<0.0001), with excess mortality predominantly explained by a limited capacity to rescue following the development of major complications (63.0% vs 82.7%; OR 0.35 [0.23-0.53]; p<0.0001). Across LMICs, improvements in hospital facilities would prevent one to three deaths for every 100 patients undergoing surgery for cancer.Interpretation Hospitals with higher levels of infrastructure and resources have better outcomes after cancer surgery, independent of country income. Without urgent strengthening of hospital infrastructure and resources, the reductions in cancer-associated mortality associated with improved access will not be realised

    Mutant-IDH1-dependent chromatin state reprogramming, reversibility, and persistence

    Get PDF
    Mutations in IDH1 and IDH2 (encoding isocitrate dehydrogenase 1 and 2) drive the development of gliomas and other human malignancies. Mutant IDH1 induces epigenetic changes that promote tumorigenesis, but the scale and reversibility of these changes are unknown. Here, using human astrocyte and glioma tumorsphere systems, we generate a large-scale atlas of mutant-IDH1-induced epigenomic reprogramming. We characterize the reversibility of the alterations in DNA methylation, the histone landscape, and transcriptional reprogramming that occur following IDH1 mutation. We discover genome-wide coordinate changes in the localization and intensity of multiple histone marks and chromatin states. Mutant IDH1 establishes a CD24+ population with a proliferative advantage and stem-like transcriptional features. Strikingly, prolonged exposure to mutant IDH1 results in irreversible genomic and epigenetic alterations. Together, these observations provide unprecedented high-resolution molecular portraits of mutant-IDH1-dependent epigenomic reprogramming. These findings have substantial implications for understanding of mutant IDH function and for optimizing therapeutic approaches to targeting IDH-mutant tumors

    Maintaining Service Quality in Remote Teaching Environment: Case of Lebanese International University

    No full text
    Purpose: The shift from traditional face-to-face classes to virtual classrooms in response to Covid 19 pandemic has affected the higher education sector worldwide, including Lebanon. Among all private universities in Lebanon, the Lebanese International University (LIU) is the largest in terms of enrolment, which enroll 30% of higher education students in the country. Therefore, this study evaluates the LIU experience in remote teaching. After completing three consecutive online semesters, it was essential to measure to which extent did the remote instructor performance affected the educational service quality at LIU. Methodology: By the end of the Fall 2021 semester, a cross-sectional online survey was conducted among students at the School of Business and a total of 450 usable responses pertaining to undergraduate students were considered for data analysis. Findings: Using SPSS Software, the validity and reliability of the questionnaire has been verified and results showed that remote instructors’ performance has a significant and strong positive correlation with all dimensions of service quality; highest for reliability and lowest for tangible. Moreover, regression analysis results showed that 81.5 % of the variance in service quality scores can be predicted from the remote instructors’ performance. Suggestions: Future studies could collect data in a longitudinal manner and include a more representative student sample of the university students

    An Online Security Protocol for NFC Payment Formally Analyzed by The Scyther Tool

    No full text
    International audienceNowadays, NFC technology is integrated into bank cards, smartphones and sales point terminals in order to immediately execute payment transactions without any physical contact. EMV is the standard intended to secure both contact (traditional) and contactless-NFC payment operations. In fact, researchers in recent years have detected some security vulnerabilities in this protocol (EMV). Therefore, in this paper, we introduce the risks entailed by the vulnerabilities of EMV and particularly those at stake in the case of NFC payment. Hence, in order to overcome EMV weaknesses, we propose a new security protocol based on an online communication with a trusted entity. The proposal is destined to secure contactless-NFC payment transactions using NFC bank cards that are unconnected client payment devices (without Wi-Fi or 4G). A security verification tool called Scyther is used to analyze the correctness of the proposal

    AN INNOVATIVE CLOUD-BASED RFID TRACEABILITY ARCHITECTURE AND SERVICE

    No full text
    International audienceToday, several sectors are demanding the track of their objects to improve the efficiency and reliability of the system. RFID technology enables an automatic identification of objects attached to RFID tags via radio waves and allows reading or writing data without physical contact between an RFID reader and a tag. The main engine of RFID development is the need for traceability in order to ensure the authenticity of objects, avoid counterfeiting and track all objects events. So, RFID technology adds intelligence to the process of identification and traceability and it is the best choice to create tracking systems. Our work aims to provide a secure RFID track and trace architecture which can be implemented in many areas and to design an RFID multi-frequency HF/UHF reader able to interact with HF or UHF tags. Moreover, to ensure and complete the historization of all sector events, we propose to enrich our traceability system with enforceable proofs through an electronic safe Cloud-based platform in a secure manner. The integration of RFID technology with a Cloud platform allows to link RFID objects to the Internet. Consequently, this network of networks represents the concept of the Internet of Things which is the key enabler for our traceability system. The present article is a report of our current research effort and our future work planned

    A Cloud-Based Secure Authentication Protocol for Contactless-NFC Payment

    No full text
    International audienceNowadays, NFC technology is used in contactless payment applications by offering the NFC payment functionality in credit/debit cards, smartphones and payment terminals. Thus, an NFC payment transaction is executed in a simple and practical way. EMV is the security protocol for both contact and contactless payment systems. However, during an EMV payment transaction, this standard does not ensure two main security constraints between a customer payment device and a payment terminal: (1) mutual authentication, (2) confidentiality of sensitive banking data exchanged. These weaknesses represent a major risk in the case of NFC payment because the transaction is performed using NFC radio waves in an open environment. The risk is reduced in the case of contact payment because the transaction is executed in a closed environment by inserting the card into the terminal. In this paper, we propose a new security protocol for NFC payment transactions based on a Cloud infrastructure. We verify the correctness of this proposal using Scyther tool that provides formal proofs for security protocols
    corecore