565 resultados para Human engineering.


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Human lymphatic vascular malformations (LMs), also known as cystic hygromas or lymphangioma, consist of multiple lymphatic endothelial cell-lined lymph-containing cysts. No animal model of this disease exists. To develop a mouse xenograft model of human LM, CD34NegCD31Pos LM lymphatic endothelial cells (LM-LEC) were isolated from surgical specimens and compared to foreskin CD34NegCD31Pos lymphatic endothelial cells (LECs). Cells were implanted into a mouse tissue engineering model for 1, 2 and 4 weeks. In vitro LM-LECs showed increased proliferation and survival under starvation conditions (P < 0.0005 at 48 h, two-way ANOVA), increased migration (P < 0.001, two-way ANOVA) and formed fewer (P = 0.029, independent samples t test), shorter tubes (P = 0.029, independent samples t test) than foreskin LECs. In vivo LM-LECs implanted into a Matrigel™-containing mouse chamber model assembled to develop vessels with dilated cystic lumens lined with flat endothelium, morphology similar to that of clinical LMs. Human foreskin LECs failed to survive implantation. In LM-LEC implanted chambers the percent volume of podoplaninPos vessels was 1.18 ± 2.24 % at 1 week, 6.34 ± 2.68 % at 2 weeks and increasing to 7.67 ± 3.60 % at 4 weeks. In conclusion, the significantly increased proliferation, migration, resistance to apoptosis and decreased tubulogenesis of LM-LECs observed in vitro is likely to account for their survival and assembly into stable LM-like structures when implanted into a mouse vascularised chamber model. This in vivo xenograft model will provide the basis of future studies of LM biology and testing of potential pharmacological interventions for patients with lymphatic malformations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The development of effective therapeutic strategies against prostate cancer bone metastases has been impeded by the lack of adequate animal models that are able to recapitulate the biology of the disease in humans. Bioengineered approaches allow researchers to create sophisticated experimentally and physiologically relevant in vivo models to study interactions between cancer cells and their microenvironment under reproducible conditions. The aim of this study was to engineer a morphologically and functionally intact humanized organ bone which can serve as a homing site for human prostate cancer cells. Transplantation of biodegradable tubular composite scaffolds seeded with human mesenchymal progenitor cells and loaded with rhBMP-7 resulted in the development of a chimeric bone construct including a large number of human mesenchymal cells which were shown to be metabolically active and capable of producing extracellular matrix components. Micro-CT analysis demonstrated that the newly formed ossicle recapitulated the morphological features of a physiological organ bone with a trabecular network surrounded by a cortex-like outer structure. This microenvironment was supportive of the lodgement and maintenance of murine haematopoietic cell clusters, thus mimicking a functional organ bone. Bioluminescence imaging demonstrated that luciferase-transduced human PC3 cells reproducibly homed to the humanized tissue engineered bone constructs, proliferated, and developed macro-metastases. This model allows the analysis of interactions between human prostate cancer cells and a functional humanized bone organ within an immuno-incompetent murine host. The system can serve as a reproducible platform to study effects of therapeutics against prostate cancer bone metastases within a humanized microenvironment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Poly(l-lactide) (PLLA), a versatile biodegradable polymer, is one of the most commonly-used materials for tissue engineering applications. To improve cell affinity for PLLA, poly(ethylene glycol) (PEG) was used to develop diblock copolymers. Human bone marrow stromal cells (hBMSCs) were cultured on MPEG-b-PLLA copolymer films to determine the effects of modification on the attachment and proliferation of hBMSC. The mRNA expression of 84 human extracellular matrix (ECM) and adhesion molecules was analyzed using RT-qPCR to understand the underlying mechanisms. It was found that MPEG-b-PLLA copolymer films significantly improved cell adhesion, extension, and proliferation.This was found to be related to the significant upregulation of two adhesion genes, CDH1 and CTNND2, which encode 1-cadherin and delta-2-catenin, respectively, two key components for the cadherin-catenin complex. In summary, MPEG-b-PLLA copolymer surfaces improved initial cell adhesion by stimulation of adhesion molecule gene expression.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Engineering asset management (EAM) is a rapidly growing and developing field. However, efforts to select and develop engineers in this area are complicated by our lack of understanding of the full range of competencies required to perform. This exploratory study sought to clarify and categorise the professional competencies required of individuals at different hierarchical levels within EAM. Data from 14 field interviews, 61 online surveys, and 10 expert panel interviews were used to develop an initial professional competency framework. Overall, nine competency clusters were identified. These clusters indicate that engineers working in this field need to be able to collaborate and influence others, complete objectives within organisational guidelines, and be able to manage themselves effectively. Limitations and potential uses of this framework in engineering education and research are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Visual information is central to several of the scientific disciplines. This paper studies how scientists working in a multidisciplinary field produce scientific evidence through building and manipulating scientific visualizations. Using ethnographic methods, we studied visualization practices of eight scientists working in the domain of tissue engineering research. Tissue engineering is an upcoming field of research that deals with replacing or regenerating human cells, tissues, or organs to restore or establish normal function. We spent 3 months in the field, where we recorded laboratory sessions of these scientists and used semi-structured interviews to get an insight into their visualization practices. From our results, we elicit two themes characterizing their visualization practices: multiplicity and physicality. In this article, we provide several examples of scientists’ visualization practices to describe these two themes and show that multimodality of such practices plays an important role in scientific visualization.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Using Media-Access-Control (MAC) address for data collection and tracking is a capable and cost effective approach as the traditional ways such as surveys and video surveillance have numerous drawbacks and limitations. Positioning cell-phones by Global System for Mobile communication was considered an attack on people's privacy. MAC addresses just keep a unique log of a WiFi or Bluetooth enabled device for connecting to another device that has not potential privacy infringements. This paper presents the use of MAC address data collection approach for analysis of spatio-temporal dynamics of human in terms of shared space utilization. This paper firstly discuses the critical challenges and key benefits of MAC address data as a tracking technology for monitoring human movement. Here, proximity-based MAC address tracking is postulated as an effective methodology for analysing the complex spatio-temporal dynamics of human movements at shared zones such as lounge and office areas. A case study of university staff lounge area is described in detail and results indicates a significant added value of the methodology for human movement tracking. By analysis of MAC address data in the study area, clear statistics such as staff’s utilisation frequency, utilisation peak periods, and staff time spent is obtained. The analyses also reveal staff’s socialising profiles in terms of group and solo gathering. The paper is concluded with a discussion on why MAC address tracking offers significant advantages for tracking human behaviour in terms of shared space utilisation with respect to other and more prominent technologies, and outlines some of its remaining deficiencies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Previous studies have shown that the human lens contains glycerophospholipids with ether linkages. These lipids differ from conventional glycerophospholipids in that the sn-1 substituent is attached to the glycerol backbone via an 1-O-alkyl or an 1-O-alk-1'-enyl ether rather than an ester bond. The present investigation employed a combination of collision-induced dissociation (CID) and ozone-induced dissociation (OzID) to unambiguously distinguish such 1-O-alkyl and 1-O-alk-1'-enyl ethers. Using these methodologies the human lens was found to contain several abundant 1-O-alkyl glycerophos-phoethanolamines, including GPEtn(16:0e/9Z-18:1), GPEtn(11Z-18:1e/9Z-18:1), and GPEtn(18:0e/9Z-18:1), as well as a related series of unusual 1-O-alkyl glycerophosphoserines, including GPSer(16:0e/9Z-18:1), GPSer(11Z-18:1e/9Z-18:1), GPSer(18:0e/9Z-18:1) that to our knowledge have not previously been observed in human tissue. Isomeric 1-O-alk-1'-enyl ethers were absent or in low abundance. Examination of the double bond position within the phospholipids using OzID revealed that several positional isomers were present, including sites of unsaturation at the n-9, n-7, and even n-5 positions. Tandem CID/OzID experiments revealed a preference for double bonds in the n-7 position of 1-O-ether linked chains, while n-9 double bonds predominated in the ester-linked fatty acids [e.g., GPEtn(11Z-18:1e/9Z-18:1) and GPSer(11Z-18:1e/9Z-18:1)]. Different combinations of these double bond positional isomers within chains at the sn-1 and sn-2 positions point to a remarkable molecular diversity of ether-lipids within the human lens.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giant-step algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human identification protocols in the literature is further reduced. We show that our protocol preserves similar usability while achieves better security than these protocols. A comprehensive security analysis is provided which suggests parameters guaranteeing desired levels of security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Global pressures of burgeoning population growth and consumption are threatening efforts to reduce negative environmental pressures associated with development such as atmospheric, land and water pollution. For example, the world’s population is now growing at over 70 million per year or 1 billion per decade (Brown, 2007), increasing from 3.5 billion in 1970, to 5 billion in 1990, to 7 billion by 2010 (United Nations, 2002). In 1990 only 13 percent of the global population lived in cities, while in 2007 more than half did. More than 60 percent of the global population lives within 100 kilometers of the coastline (World Resources Institute, 2005) and nearly all of the population growth hereon is forecast to happen in developing countries (Postel, 1999). Future levels of stress on the global environment are therefore likely to increase if current trends are used for forecasting, which is particularly challenging as scientists are already observing significant signs of degradation and failure in environmental systems. For example, the Intergovernmental Panel on Climate Change Fourth Assessment Report (IPCC, 2007) provided an nequivocal link between climate change and current human activities, in particular: the burning of fossil fuels; deforestation and land clearing; the use of synthetic greenhouse gases; and decomposition of wastes from landfill. The UK Stern Review concluded that within our lifetime there is between a 77 to 99 percent chance (depending on the climate model used) of the global average temperature rising by more than 2 degrees Celsius (Stern, 2006), with a likely greenhouse gas concentration in the atmosphere of 550 parts per million (ppm) or more by around 2100.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Since World War I, explosions have accounted for over 70% of all injuries in conflict. With the development of improved personnel protection of the torso, improved medical care and faster aeromedical evacuation, casualties are surviving with more severe injuries to the extremities. Understanding the processes involved in the transfer of blast-induced shock waves through biological tissues is essential for supporting efforts aimed at mitigating and treating blast injury. Given the inherent heterogeneities in the human body, we argue that studying these processes demands a highly integrated approach requiring expertise in shock physics, biomechanics and fundamental biological processes. This multidisciplinary systems approach enables one to develop the experimental framework for investigating the material properties of human tissues that are subjected to high compression waves in blast conditions and the fundamental cellular processes altered by this type of stimuli. Ultimately, we hope to use the information gained from these studies in translational research aimed at developing improved protection for those at risk and improved clinical outcomes for those who have been injured from a blast wave.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

New technical and procedural interventions are less likely to be adopted in industry, unless they are smoothly integrated into the existing practices of professionals. In this paper, we provide a case study of the use of ethnographic methods for studying software bug-fixing activities at an industrial engineering conglomerate. We aimed at getting an in-depth understanding of software developers' everyday practices in bug-fixing related projects and in turn inform the design of novel productivity tools. The use of ethnography has allowed us to look at the social side of software maintenance practices. In this paper, we highlight: 1) organizational issues that influence bug-fixing activities; 2) social role of bug tracking systems, and; 3) social issues specific to different phases of bug-fixing activities.