210 resultados para Fold interference


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Food insecurity is the limited availability of, or access to, sufficient amounts of nutritious, culturally-appropriate and safe foods, or the inability to access such foods by socially-acceptable means. Evidence from the United States and Canada suggests that food insecurity may be associated with poor dietary intakes, obesity, and chronic disease including depression and diabetes, thus constituting a significant public health issue. Currently, no existing studies have investigated the dietary and health factors associated with food insecurity among the general Australian population. The current study investigated the potential associations between food insecurity, diet and health among Australian adults (18 years and over) participating in the cross-sectional National Health Survey (n = 19,500). Data were analysed by logistic regression adjusting for sociodemographic covariates. Those from food insecure households were 50% less likely to consume the recommended number of servings of fruit, 60% more likely to report poor health and experienced a 6-fold increase in the risk of severe depressive disorders, compared to their food secure counterparts. Furthermore, food insecurity was associated with a 50% increase in the risk of being diagnosed with ‘high sugar levels’. Finally, women from food insecure households were 30% more likely to be obese compared to their food secure counterparts. These findings suggest that food insecurity may play an important role in preventing adherence with national dietary recommendations, and may increase the risk of obesity and chronic illness. This has important implications for both clinical practice, and the development of interventions and policy to address food insecurity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The feasibility of ex vivo blood production is limited by both biological and engineering challenges. From an engineering perspective, these challenges include the significant volumes required to generate even a single unit of a blood product, as well as the correspondingly high protein consumption required for such large volume cultures. Membrane bioreactors, such as hollow fiber bioreactors (HFBRs), enable cell densities approximately 100-fold greater than traditional culture systems and therefore may enable a significant reduction in culture working volumes. As cultured cells, and larger molecules, are retained within a fraction of the system volume, via a semipermeable membrane it may be possible to reduce protein consumption by limiting supplementation to only this fraction. Typically, HFBRs are complex perfusion systems having total volumes incompatible with bench scale screening and optimization of stem cell-based cultures. In this article we describe the use of a simplified HFBR system to assess the feasibility of this technology to produce blood products from umbilical cord blood-derived CD34+ hematopoietic stem progenitor cells (HSPCs). Unlike conventional HFBR systems used for protein manufacture, where cells are cultured in the extracapillary space, we have cultured cells in the intracapillary space, which is likely more compatible with the large-scale production of blood cell suspension cultures. Using this platform we direct HSPCs down the myeloid lineage, while targeting a 100-fold increase in cell density and the use of protein-free bulk medium. Our results demonstrate the potential of this system to deliver high cell densities, even in the absence of protein supplementation of the bulk medium.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Altered expression of the INT6 gene, encoding the e subunit of the translational initiation factor eIF3, occurs in human breast cancers, but how INT6 relates to carcinogenesis remains unestablished. Here, we show that INT6 is involved in the DNA damage response. INT6 was required for cell survival following γ-irradiation and G(2)-M checkpoint control. RNA interference-mediated silencing of INT6 reduced phosphorylation of the checkpoint kinases CHK1 and CHK2 after DNA damage. In addition, INT6 silencing prevented sustained accumulation of ataxia telangiectasia mutated (ATM) at DNA damage sites in cells treated with γ-radiation or the radiomimetic drug neocarzinostatin. Mechanistically, this result could be explained by interaction of INT6 with ATM, which together with INT6 was recruited to the sites of DNA damage. Finally, INT6 silencing also reduced ubiquitylation events that promote retention of repair proteins at DNA lesions. Accordingly, accumulation of the repair factor BRCA1 was defective in the absence of INT6. Our findings reveal unexpected and striking connections of INT6 with ATM and BRCA1 and suggest that the protective action of INT6 in the onset of breast cancers relies on its involvement in the DNA damage response.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter explores the objectives, principle and methods of climate law. The United Nations Framework Convention on Climate Change (UNFCCC) lays the foundations of the international regime by setting out its ultimate objectives in Article 2, the key principles in Article 3, and the methods of the regime in Article 4. The ultimate objective of the regime – to avoid dangerous anthropogenic interference – is examined and assessments of the Intergovernmental Panel on Climate Change (IPCC) are considered when seeking to understand the definition of this concept. The international environmental principles of: state sovereignty and responsibility, preventative action, cooperation, sustainable development, precaution, polluter pays and common but differentiated responsibility are then examined and their incorporation within the international climate regime instruments evaluated. This is followed by an examination of the methods used by the mitigation and adaptation regimes in seeking to achieve the objective of the UNFCCC. Methods of the mitigation regime include: domestic implementation of policies, setting of standards and targets and allocation of rights, use of flexibility mechanisms, and reporting. While it is noted that methods of the adaptation regime are still evolving, the latter includes measures such as impact assessments, national adaptation plans and the provision of funding.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Elaborated Intrusion theory (EI theory; Kavanagh, Andrade, & May, 2005) posits two main cognitive components in craving: associative processes that lead to intrusive thoughts about the craved substance or activity, and elaborative processes supporting mental imagery of the substance or activity. We used a novel visuospatial task to test the hypothesis that visual imagery plays a key role in craving. Experiment 1 showed that spending 10 min constructing shapes from modeling clay (plasticine) reduced participants' craving for chocolate compared with spending 10 min 'letting your mind wander'. Increasing the load on verbal working memory using a mental arithmetic task (counting backwards by threes) did not reduce craving further. Experiment 2 compared effects on craving of a simpler verbal task (counting by ones) and clay modeling. Clay modeling reduced overall craving strength and strength of craving imagery, and reduced the frequency of thoughts about chocolate. The results are consistent with EI theory, showing that craving is reduced by loading the visuospatial sketchpad of working memory but not by loading the phonological loop. Clay modeling might be a useful self-help tool to help manage craving for chocolate, snacks and other foods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Advanced substation applications, such as synchrophasors and IEC 61850-9-2 sampled value process buses, depend upon highly accurate synchronizing signals for correct operation. The IEEE 1588 Precision Timing Protocol (PTP) is the recommended means of providing precise timing for future substations. This paper presents a quantitative assessment of PTP reliability using Fault Tree Analysis. Two network topologies are proposed that use grandmaster clocks with dual network connections and take advantage of the Best Master Clock Algorithm (BMCA) from IEEE 1588. The cross-connected grandmaster topology doubles reliability, and the addition of a shared third grandmaster gives a nine-fold improvement over duplicated grandmasters. The performance of BMCA mediated handover of the grandmaster role during contingencies in the timing system was evaluated experimentally. The 1 µs performance requirement of sampled values and synchrophasors are met, even during network or GPS antenna outages. Slave clocks are shown to synchronize to the backup grandmaster in response to degraded performance or loss of the main grandmaster. Slave disturbances are less than 350 ns provided the grandmaster reference clocks are not offset from one another. A clear understanding of PTP reliability and the factors that affect availability will encourage the adoption of PTP for substation time synchronization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Prostate cancer is the most frequently diagnosed cancer in males in developed countries. To identify common prostate cancer susceptibility alleles, we genotyped 211,155 SNPs on a custom Illumina array (iCOGS) in blood DNA from 25,074 prostate cancer cases and 24,272 controls from the international PRACTICAL Consortium. Twenty-three new prostate cancer susceptibility loci were identified at genome-wide significance (P < 5 × 10−8). More than 70 prostate cancer susceptibility loci, explaining ~30% of the familial risk for this disease, have now been identified. On the basis of combined risks conferred by the new and previously known risk loci, the top 1% of the risk distribution has a 4.7-fold higher risk than the average of the population being profiled. These results will facilitate population risk stratification for clinical studies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vertical displacements are one of the most relevant parameters for structural health monitoring of bridges in both the short and long terms. Bridge managers around the globe are always looking for a simple way to measure vertical displacements of bridges. However, it is difficult to carry out such measurements. On the other hand, in recent years, with the advancement of fiber-optic technologies, fiber Bragg grating (FBG) sensors are more commonly used in structural health monitoring due to their outstanding advantages including multiplexing capability, immunity of electromagnetic interference as well as high resolution and accuracy. For these reasons, using FBG sensors is proposed to develop a simple, inexpensive and practical method to measure vertical displacements of bridges. A curvature approach for vertical displacement measurements using curvature measurements is proposed. In addition, with the successful development of FBG tilt sensors, an inclination approach is also proposed using inclination measurements. A series of simulation tests of a full- scale bridge was conducted. It shows that both of the approaches can be implemented to determine vertical displacements for bridges with various support conditions, varying stiffness (EI) along the spans and without any prior known loading. These approaches can thus measure vertical displacements for most of slab-on-girder and box-girder bridges. Besides, the approaches are feasible to implement for bridges under various loading. Moreover, with the advantages of FBG sensors, they can be implemented to monitor bridge behavior remotely and in real time. A beam loading test was conducted to determine vertical displacements using FBG strain sensors and tilt sensors. The discrepancies as compared with dial gauges reading using the curvature and inclination approaches are 0.14mm (1.1%) and 0.41mm (3.2%), respectively. Further recommendations of these approaches for developments will also be discussed at the end of the paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The effects of electron irradiation on NiO-containing solid solution systems are described. Partially hydrated NiO solid solutions, e. g. , NiO-MgO, undergo surface reduction to Ni metal after examination by TEM. This surface layer results in the formation of Moire interference patterns.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstraction in its resistance to evident meaning has the capacity to interrupt or at least provide tools with which to question an overly compliant reception of the information to which we are subject. It does so by highlighting a latency or potentiality inherent in materiality that points to the possibility of a critical resistance to this ceaseless flow of sound/image/data. This resistance has been remarked on in differing ways by a number of commentators such as Lyotard, in his exploration of the avant-garde and the sublime for example. This joint paper will initially map the collaborative project by Daniel Mafe and Andrew Brown, Affecting Interference which conjoins painting with digital sound and animations into a single, large scale, immersive exhibition/installation. The work acts as an interstitial point between contrasting approaches to abstraction: the visual and aural, the digital and analogue. The paper will then explore the ramifications of this through the examination of abstraction as ‘noise’, that is as that raw inassimilable materiality, within which lays the creative possibility to forge and embrace the as-yet-unthought and almost-forgotten. It does so by establishing a space for a more poetic and slower paced critical engagement for the viewing and receiving information or data. This slowing of perception through the suspension of easy recognition runs counter to our current ‘high performance’ culture, and it’s requisite demand for speedy assimilation of content, representing instead the poetic encounter with a potentiality or latency inherent in the nameless particularity of that which is.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A novel gold coated femtosecond laser nanostructured sapphire surface – an “optical nose” - based on surface-enhanced Raman spectroscopy (SERS) for detecting vapours of explosive substances was investigated. Four different nitroaromatic vapours at room temperature were tested. Sensor responses were unambiguous and showed response in the range of 0.05 – 15 uM at 25 °C. The laser fabricated substrate nanostructures produced up to an eight-fold increase in Raman signal over that observed on the unstructured portions of the substrate. This work demonstrates a simple sensing system that is compatible with commercial manufacturing practices to detect taggants in explosives which can undertake as part of an integrated security or investigative mission.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Graphene has attracted considerable interest over recent years due to its intrinsic mechanical, thermal and electrical properties. Incorporation of small quantity of graphene fillers into polymer can create novel nanocomposites with improved structural and functional properties. This review introduced the recent progress in fabrication, properties and potential applications of graphene-polymer composites. Recent research clearly confirmed that graphene-polymer nanocomposites are promising materials with applications ranging from transportation, biomedical systems, sensors, electrodes for solar cells and electromagnetic interference. In addition to graphene-polymer nanocomposites, this article also introduced the synergistic effects of hybrid graphene-carbon nanotubes (CNTs) on the properties of composites. Finally, some technical problems associated with the development of these nanocomposites are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Poly (ethylene oxide) based polymer electrolyte impregnated with 2-Mercapto benzimidazole was comprehensively characterized by XRD, UV–visible spectroscopy, FTIR as well as electrochemical impedance spectroscopy. It was found that the crystallization of PEO was dramatically reduced and the ionic conductivity of the electrolyte was increased 4.5 fold by addition of 2-Mercapto benzimidazole. UV–visible and FTIR spectroscopes indicated the formation of charge transfer complex between 2-Mercapto benzimidazole and iodine of the electrolyte. Dye-sensitized solar cells with the polymer electrolytes were assembled. It was found that both the photocurrent density and photovoltage were enhanced with respect to the DSC without 2-Mercapto benzimidazole, leading to a 60% increase of the performance of the cell.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As a novel sensitive element and due to its advantages of immunity to electrical interference, distributed measurement, etc., fiber Bragg grating (FBG) has been researched widely. To realize the substitution of high accurate electronic temperature sensors, high sensitive FBG temperature sensors can be made by taking advantage of its characters of being sensitive to both temperature and strain. Although there are reports about high sensitive FBG temperature sensors, however, few about their stability have been done. We manufactured a high sensitive FBG temperature sensor, and put it together with an average FBG temperature sensor and an electronic crystal temperature sensor into a stainless steel container filled by water to observe the room temperature change. By comparing their results in two weeks, we have found out that: although the high sensitive FBG temperature sensor is in much better agreement with the electronic crystal sensor than the average FBG sensor is, it has occurred some small drifts. Because the drifts appeared in the process of further pulling the FBG, it might be a result of the slip of the FBG fixing points. This contributes some good experiences to the application of FBG in high accuracy temperature measurement.