251 resultados para Orthogonal Activation Functions
Resumo:
This paper translates the concepts of sustainable production to three dimensions of economic, environmental and ecological sustainability to analyze optimal production scales by solving optimizing problems. Economic optimization seeks input-output combinations to maximize profits. Environmental optimization searches for input-output combinations that minimize the polluting effects of materials balance on the surrounding environment. Ecological optimization looks for input-output combinations that minimize the cumulative destruction of the entire ecosystem. Using an aggregate space, the framework illustrates that these optimal scales are often not identical because markets fail to account for all negative externalities. Profit-maximizing firms normally operate at the scales which are larger than optimal scales from the viewpoints of environmental and ecological sustainability; hence policy interventions are favoured. The framework offers a useful tool for efficiency studies and policy implication analysis. The paper provides an empirical investigation using a data set of rice farms in South Korea.
Resumo:
The role of exosomes in cancer development has become the focus of much research, due to the many emerging roles possessed by exosomes. These micro-vesicles that are ubiquitously released in to the extracellular milieu, have been found to regulate immune system function, particularly in tumorigenesis, as well as conditioning future metastatic sites for the attachment and growth of tumor tissue. Through an interaction with a range of host tissue, exosomes are able to generate a pro-tumor environment that is essential for carcinogenesis. Herein, we discuss the contents of exosomes and their contribution to tumorigenesis, as well as their role in chemotherapeutic resistance and the development of novel cancer treatments and the identification of cancer biomarkers.
Resumo:
In this chapter we describe a critical fairytales unit taught to 4.5 to 5.5 year olds in a context of intensifying pressure to raise literacy achievement. The unit was infused with lessons on reinterpreted fairytales followed by process drama activities built around a sophisticated picture book, Beware of the Bears (MacDonald, 2004). The latter entailed a text analytic approach to critical literacy derived from systemic functional linguistics (Halliday, 1978; Halliday & Matthiessen, 2004). This approach provides a way of analysing how words and discourse are used to represent the world in a particular way and shape reader relations with the author in a particular field (Janks, 2010).
Principles in the design of multiphase experiments with a later laboratory phase: Orthogonal designs
Resumo:
The functions of the volunteer functions inventory were combined with the constructs of the theory of planned behaviour (i.e., attitudes, subjective norms, and perceived behavioural control) to establish whether a stronger, single explanatory model prevailed. Undertaken in the context of episodic, skilled volunteering by individuals who were retired or approaching retirement (N = 186), the research advances on prior studies which either examined the predictive capacity of each model independently or compared their explanatory value. Using hierarchical regression analysis, the functions of the volunteer functions inventory (when controlling for demographic variables) explained an additional 7.0% of variability in individuals’ willingness to volunteer over and above that accounted for by the theory of planned behaviour. Significant predictors in the final model included attitudes, subjective norms and perceived behavioural control from the theory of planned behaviour and the understanding function from the volunteer functions inventory. It is proposed that the items comprising the understanding function may represent a deeper psychological construct (e.g., self-actualisation) not accounted for by the theory of planned behaviour. The findings highlight the potential benefit of combining these two prominent models in terms of improving understanding of volunteerism and providing a single parsimonious model for raising rates of this important behaviour.
Resumo:
Theoretical accounts suggest that mirror neurons play a crucial role in social cognition. The current study used transcranial-magnetic stimulation (TMS) to investigate the association between mirror neuron activation and facialemotion processing, a fundamental aspect of social cognition, among healthy adults (n = 20). Facial emotion processing of static (but not dynamic) images correlated significantly with an enhanced motor response, proposed to reflect mirror neuron activation. These correlations did not appear to reflect general facial processing or pattern recognition, and provide support to current theoretical accounts linking the mirror neuron system to aspects of social cognition. We discuss the mechanism by which mirror neurons might facilitate facial emotion recognition.
Resumo:
Purpose – This paper aims to recognise the importance of informal processes within corporate governance and complement existing research in this area by investigating factors associated with the existence of informal interactions between audit committees and internal audit functions and in providing directions for future research. Design/methodology/approach – To examine the existence and drivers of informal interactions between audit committees and internal audit functions, this paper relies on a questionnaire survey of chief audit executives (CAEs) in the UK from listed and non-listed, as well as financial and non-financial, companies. While prior qualitative research suggests that informal interactions do take place, most of the evidence is based on particular organisational setting or on a very small range of interviews. The use of a questionnaire enabled the examination of the existence of internal interactions across a relatively larger number of entities. Findings – The paper finds evidence of audit committees and internal audit functions engaging in informal interactions in addition to formal pre-scheduled regular meetings. Informal interactions complement formal meetings with the audit committee and as such represent additional opportunities for the audit committees to monitor internal audit functions. Audit committees’ informal interactions are significantly and positively associated with audit committee independence, audit chair’s knowledge and experience, and internal audit quality. Originality/value – The results demonstrate the importance of the background of the audit committee chair for the effectiveness of the governance process. This is possibly the first paper to examine the relationship between audit committee quality and internal audit, on the existence and driver of informal interactions. Policy makers should recognize that in addition to formal mechanisms, informal processes, such as communication outside of formal pre-scheduled meetings, play a significant role in corporate governance.
Resumo:
Resistance exercise triggers a subclinical inflammatory response that plays a pivotal role in skeletal muscle regeneration. Nuclear factor‐κB (NF‐κB) is a stress signalling transcription factor that regulates acute and chronic states of inflammation. The classical NF‐κB pathway regulates the early activation of post‐exercise inflammation; however there remains scope for this complex transcription factor to play a more detailed role in post‐exercise muscle recovery. Sixteen volunteers completed a bout of lower body resistance exercise with the ingestion of three 400 mg doses of ibuprofen or a placebo control. Muscle biopsy samples were obtained prior to exercise and at 0, 3 and 24 h post‐exercise and analysed for key markers of NF‐κB activity. Phosphorylated p65 protein expression and p65 inflammatory target genes were elevated immediately post‐exercise independent of the two treatments. These changes did not translate to an increase in p65 DNA binding activity. NF‐κB p50 protein expression and NF‐κB p50 binding activity were lower than pre‐exercise at 0 and 3 h post‐exercise, but were elevated at 24 h post‐exercise. These findings provide novel evidence that two distinct NF‐κB pathways are active in skeletal muscle after resistance exercise. The initial wave of activity involving p65 resembles the classical pathway and is associated with the onset of an acute inflammatory response. The second wave of NF‐κB activity comprises the p50 subunit, which has been previously shown to resolve an acute inflammatory program. The current study showed no effect of the ibuprofen treatment on markers of the NF‐κB pathway, however examination of the within group effects of the exercise protocol suggests that this pathway warrants further research.
Resumo:
We investigated the relationship between mitochondrial biogenesis, cell signalling and antioxidant enzymes by depleting skeletal muscle glutathione with diethyl maleate (DEM) which resulted in a demonstrable increase in oxidative stress during exercise. Animals were divided into six groups: (1) sedentary control rats; (2) sedentary rats treated with DEM; (3) exercise control rats euthanized immediately after exercise; (4) exercise rats + DEM; (5) exercise control rats euthanized 4 h after exercise, and; (6) exercise rats + DEM euthanized 4 h after exercise. Exercising animals ran on the treadmill at a 10% gradient at 20 m/min for the first 30 min. The speed was then increased every 10 min by 1.6 m/min until exhaustion. There was a reduction in total glutathione in the skeletal muscle of DEM treated animals compared to the control animals (P<0.05). Within the control group, total glutathione was higher in the sedentary group compared to after exercise (P<0.05). DEM treatment also significantly increased oxidative stress, as measured by increased plasma F2-isoprostanes (P<0.05). Exercising animals given DEM showed a significantly greater increase in peroxisome proliferator activated receptor γ coactivator-1α(PGC-1α) mRNA compared to the control animals that were exercised (P<0.05). This study provides novel evidence that by reducing the endogenous antioxidant glutathione in skeletal muscle and inducing oxidative stress through exercise, PGC-1α gene expression was augmented. These findings further highlight the important role of exercise induced oxidative stress in the regulation of mitochondrial biogenesis.
Resumo:
Preneel, Govaerts and Vandewalle (PGV) analysed the security of single-block-length block cipher based compression functions assuming that the underlying block cipher has no weaknesses. They showed that 12 out of 64 possible compression functions are collision and (second) preimage resistant. Black, Rogaway and Shrimpton formally proved this result in the ideal cipher model. However, in the indifferentiability security framework introduced by Maurer, Renner and Holenstein, all these 12 schemes are easily differentiable from a fixed input-length random oracle (FIL-RO) even when their underlying block cipher is ideal. We address the problem of building indifferentiable compression functions from the PGV compression functions. We consider a general form of 64 PGV compression functions and replace the linear feed-forward operation in this generic PGV compression function with an ideal block cipher independent of the one used in the generic PGV construction. This modified construction is called a generic modified PGV (MPGV). We analyse indifferentiability of the generic MPGV construction in the ideal cipher model and show that 12 out of 64 MPGV compression functions in this framework are indifferentiable from a FIL-RO. To our knowledge, this is the first result showing that two independent block ciphers are sufficient to design indifferentiable single-block-length compression functions.
Resumo:
Structural damage detection using measured dynamic data for pattern recognition is a promising approach. These pattern recognition techniques utilize artificial neural networks and genetic algorithm to match pattern features. In this study, an artificial neural network–based damage detection method using frequency response functions is presented, which can effectively detect nonlinear damages for a given level of excitation. The main objective of this article is to present a feasible method for structural vibration–based health monitoring, which reduces the dimension of the initial frequency response function data and transforms it into new damage indices and employs artificial neural network method for detecting different levels of nonlinearity using recognized damage patterns from the proposed algorithm. Experimental data of the three-story bookshelf structure at Los Alamos National Laboratory are used to validate the proposed method. Results showed that the levels of nonlinear damages can be identified precisely by the developed artificial neural networks. Moreover, it is identified that artificial neural networks trained with summation frequency response functions give higher precise damage detection results compared to the accuracy of artificial neural networks trained with individual frequency response functions. The proposed method is therefore a promising tool for structural assessment in a real structure because it shows reliable results with experimental data for nonlinear damage detection which renders the frequency response function–based method convenient for structural health monitoring.
Resumo:
The 15 members of the kallikrein-related serine peptidase (KLK) family have diverse tissue-specific expression profiles and roles in a range of cellular processes, including proliferation, migration, invasion, differentiation, inflammation and angiogenesis that are required in both normal physiology as well as pathological conditions. These roles require cleavage of a range of substrates, including extracellular matrix proteins, growth factors, cytokines as well as other proteinases. In addition, it has been clear since the earliest days of KLK research that cleavage of cell surface substrates is also essential in a range of KLK-mediated cellular processes where these peptidases are essentially acting as agonists and antagonists. In this review we focus on these KLK-regulated cell surface receptor systems including bradykinin receptors, proteinase-activated receptors, as well as the plasminogen activator, ephrins and their receptors, and hepatocyte growth factor/Met receptor systems and other plasma membrane proteins. From this analysis it is clear that in many physiological and pathological settings KLKs have the potential to regulate multiple receptor systems simultaneously; an important issue when these peptidases and substrates are targeted in disease.
Resumo:
Canonical Wnt signaling is important in tooth development but it is unclear whether it can induce cementogenesis and promote the regeneration of periodontal tissues lost due to disease. Therefore, the aim of this study is to investigate the influence of canonical Wnt signaling enhancers on human periodontal ligament cell (hPDLCs) cementogenic differentiation in vitro and cementum repair in a rat periodontal defect model. Canonical Wnt signaling was induced by (i) local injection of lithium chloride; (ii) local injection of sclerostin antibody; and (iii) local injection of a lentiviral construct overexpressing β-catenin. The results showed that the local activation of canonical Wnt signaling resulted in significant new cellular cementum deposition and the formation of well-organized periodontal ligament fibers, which was absent in the control group. In vitro experiments using hPDLCs showed that the Wnt signaling pathway activators significantly increased mineralization, alkaline phosphatase (ALP) activity, and gene and protein expression of the bone and cementum markers osteocalcin (OCN), osteopontin (OPN), cementum protein 1 (CEMP1), and cementum attachment protein (CAP). Our results show that the activation of the canonical Wnt signaling pathway can induce in vivo cementum regeneration and in vitro cementogenic differentiation of hPDLCs.
Resumo:
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.