234 resultados para Tata-box
Resumo:
In Australian cinema since the mid-2000s, horror has become a popular and at times commercially viable genre for low-budget and emerging filmmakers targeting international markets. While the annual horror film output of Australia pales in comparison to that of other Anglophone nations like the United States, Great Britain, and Canada, it has produced several significant titles that have performed moderately well at the international box office, from Wolf Creek (Greg McLean, 2005) to Daybreakers (Michael and Peter Spierig, 2009). Yet as part of a broader tradition of Anglophone horror cinema, many Australian horror movies have been heavily influenced by US and to a lesser extent British horror films. Furthermore, Australian horror film production is largely an internationally-oriented sector that relies on its relationships with overseas distributors and often investors. Consequently, the content and style of Australian horror movies have regularly been tailored for international markets. As a direct consequence some filmmakers have sought to trade on the “Australianness” of their product, others have attempted to pass off their films as faux-American, while others still have attempted to develop placeless films effaced of national reference points. This chapter examines local production as part of a broader tradition of Anglophone horror cinema, the influence of US horror movies, and the limitations of the domestic marketplace. The article concludes with an analysis of how the lure of the US market influences Australian filmmakers’ textual strategies.
Resumo:
This paper outlines a review carried out at Queensland University of Technology (QUT) in 2013 to identify the extent to which the centrally supported virtual learning environment met current and future learning and teaching needs. A range of consultation and investigation activities occurred from May to November to encourage open stakeholder feedback as well as to allow for reflection on alternative digital technologies, systems and strategies. This resulted in the development of nine recommendations, which, following a planning phase, will commence being implemented from mid-2014.
Resumo:
The environments that we inhabit shape our everyday lives, influencing our behaviors and responses (Manu, 2013). As we enter an immersive phase of education in which physical and digital environments become inseparable, should we reconsider the role and importance of design on pedagogical practice? This paper explores the reciprocal cause and effect of space, technology and pedagogy in shaping the design of educational experiences within Queensland University of Technology's collaborative learning spaces.
Resumo:
Computational epigenetics is a new area of research focused on exploring how DNA methylation patterns affect transcription factor binding that affect gene expression patterns. The aim of this study was to produce a new protocol for the detection of DNA methylation patterns using computational analysis which can be further confirmed by bisulfite PCR with serial pyrosequencing. The upstream regulatory element and pre-initiation complex relative to CpG islets within the methylenetetrahydrofolate reductase gene were determined via computational analysis and online databases. The 1,104 bp long CpG island located near to or at the alternative promoter site of methylenetetrahydrofolate reductase gene was identified. The CpG plot indicated that CpG islets A and B, within the island, contained 62 and 75 % GC content CpG ratios of 0.70 and 0.80–0.95, respectively. Further exploration of the CpG islets A and B indicates that the transcription start sites were GGC which were absent from the TATA boxes. In addition, although six PROSITE motifs were identified in CpG B, no motifs were detected in CpG A. A number of cis-regulatory elements were found in different regions within the CpGs A and B. Transcription factors were predicted to bind to CpGs A and B with varying affinities depending on the DNA methylation status. In addition, transcription factor binding may influence the expression patterns of the methylenetetrahydrofolate reductase gene by recruiting chromatin condensation inducing factors. These results have significant implications for the understanding of the architecture of transcription factor binding at CpG islets as well as DNA methylation patterns that affect chromatin structure.
Resumo:
This play comes from a research project about how teachers understand and sustain their work in challenging secondary school classrooms. The research asked “How DO teachers work in these classrooms?” not “How SHOULD they?” In the play you meet three teachers who speak candidly about their principles, priorities and vulnerabilities to a pre-service teacher as they move between classes and staffroom. These are real people, real quotes and real feelings taken from real interview data, not idealised guidelines for ‘best practice’. Rather than templates for practice, the play offers a variety of models, issues and food for thought to discuss in teacher education programs. The project was interested in the moral dynamics of classrooms created under the Council of Australian Governments’ 2009 Compact with Young Australians, a policy move that required students to be ‘earning or learning till 17’ across all Australian states. By removing the unemployment benefit for this age group, and tying school attendance to family welfare entitlements, these policies effectively raised the minimum school-leaving age. The risk in this well-intended policy move is that a lack of suitable job opportunities will keep young people at school longer than they want to be there. The effects of this ‘earning or learning’ policy will impact some communities, schools and classrooms much harder than others. The title uses the metaphor of an iceberg to refer to the complex community-school relations that lie below classroom interactions. The idea of a morality play in the play’s title refers back to a medieval form of popular play that used characters to instruct the audience in virtues and values. In the same way, this play seeks to bring to the surface and embody the different moral principles that can inform teacher’s work. The research involved classroom ethnographies of classes for 16 to 17 years olds in non-academic pathways. Eight different teacher/ class combinations were sampled across 2 high schools, 2 TAFE colleges and I hybrid TAFE/school program in three towns experiencing chronic youth unemployment. Their timetabled lessons were observed across 3 to 4 weeks and the teachers and some students were interviewed in each site. The project was funded by an ARC Discovery Early Career Award, 2012-214.
Resumo:
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl. Grøstl is a so-called wide-pipe construction where the size of the internal state is significantly larger than the size of the output. This has the effect that all known, generic attacks on the hash function are made much more difficult. Grøstl has good performance on a wide range of platforms and counter-measures against side-channel attacks are well-understood from similar work on the AES.
Resumo:
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two �fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl
Resumo:
Background No tool exists to measure self-efficacy for overcoming lymphedema-related exercise barriers in individuals with cancer-related lymphedema. However, an existing scale measures confidence to overcome general exercise barriers in cancer survivors. Therefore, the purpose of this study was to develop, validate and assess the reliability of a subscale, to be used in conjunction with the general barriers scale, for determining exercise barriers self-efficacy in individuals facing lymphedema-related exercise barriers. Methods A lymphedema-specific exercise barriers self-efficacy subscale was developed and validated using a cohort of 106 cancer survivors with cancer-related lymphedema, from Brisbane, Australia. An initial ten-item lymphedema-specific barrier subscale was developed and tested, with participant feedback and principal components analysis results used to guide development of the final version. Validity and test-retest reliability analyses were conducted on the final subscale. Results The final lymphedema-specific subscale contained five items. Principal components analysis revealed these items loaded highly (> 0.75) on a separate factor when tested with a well-established nine-item general barriers scale. The final five-item subscale demonstrated good construct and criterion validity, high internal consistency (Cronbach’s alpha=0.93) and test-retest reliability (ICC=0.67, p< 0.01). Conclusions A valid and reliable lymphedema-specific subscale has been developed to assess exercise barriers self-efficacy in individuals with cancer-related lymphedema. This scale can be used in conjunction with an existing general exercise barriers scale to enhance exercise adherence in this understudied patient group.
Resumo:
We show the first deterministic construction of an unconditionally secure multiparty computation (MPC) protocol in the passive adversarial model over black-box non-Abelian groups which is both optimal (secure against an adversary who possesses any t
Resumo:
Background Premature aging syndromes recapitulate many aspects of natural aging and provide an insight into this phenomenon at a molecular and cellular level. The progeria syndromes appear to cause rapid aging through disruption of normal nuclear structure. Recently, a coding mutation (c.34G > A [p.A12T]) in the Barrier to Autointegration Factor 1 (BANF1) gene was identified as the genetic basis of Néstor-Guillermo Progeria syndrome (NGPS). This mutation was described to cause instability in the BANF1 protein, causing a disruption of the nuclear envelope structure. Results Here we demonstrate that the BANF1 A12T protein is indeed correctly folded, stable and that the observed phenotype, is likely due to the disruption of the DNA binding surface of the A12T mutant. We demonstrate, using biochemical assays, that the BANF1 A12T protein is impaired in its ability to bind DNA while its interaction with nuclear envelope proteins is unperturbed. Consistent with this, we demonstrate that ectopic expression of the mutant protein induces the NGPS cellular phenotype, while the protein localizes normally to the nuclear envelope. Conclusions Our study clarifies the role of the A12T mutation in NGPS patients, which will be of importance for understanding the development of the disease.
Resumo:
Models of the mammalian clock have traditionally been based around two feedback loops-the self-repression of Per/Cry by interfering with activation by BMAL/CLOCK, and the repression of Bmal/Clock by the REV-ERB proteins. Recent experimental evidence suggests that the D-box, a transcription factor binding site associated with daytime expression, plays a larger role in clock function than has previously been understood. We present a simplified clock model that highlights the role of the D-box and illustrate an approach for finding maximum-entropy ensembles of model parameters, given experimentally imposed constraints. Parameter variability can be mitigated using prior probability distributions derived from genome-wide studies of cellular kinetics. Our model reproduces predictions concerning the dual regulation of Cry1 by the D-box and Rev-ErbA/ROR response element (RRE) promoter elements and allows for ensemble-based predictions of phase response curves (PRCs). Nonphotic signals such as Neuropeptide Y (NPY) may act by promoting Cry1 expression, whereas photic signals likely act by stimulating expression from the E/E' box. Ensemble generation with parameter probability restraints reveals more about a model's behavior than a single optimal parameter set.
Resumo:
Directed by Alex Proyas, the Knowing is an action-packed science-fiction disaster movie. A well-known Australian director working in Hollywood, Proyas has developed an international reputation for stylised fantasy and science-fiction movies, including the neo-gothic movie The Crow (1994), the complex science-fiction film Dark City (1998), and the adaptation of Isaac Asimov’s sci-fi classic I, Robot (2004) which earned almost US$350 million theatrically worldwide. Knowing was produced for US$50 million and relies heavily upon special effects (including a visually impressive sequence of the world being destroyed) and high-octane action sequences (including a notable plane crash). Knowing’s cast included Australian actors, Rose Byrne and Ben Mendelsohn, and American actor Nicolas Cage. While Knowing received typically poor critical reviews, the movie performed well at the box-office earning over US$183 million worldwide.
Resumo:
Like most of Stephan Elliott’s movies, A Few Best Men is difficult to discuss without focusing on the director himself. A wedding-gone-wrong comedy, A Few Best Men is Elliott’s first Australian feature film in seventeen years. After directing the low-budget crime-thriller Frauds (1993), Elliott achieved worldwide success as writer-director of the Oscar-winning road movie Adventures of Priscilla, Queen of the Desert (1994). A quirky and visually striking film about two drag-queens and a transsexual’s journey across the harsh Australian outback in a bus named Priscilla, the movie earned over US$70 million at the international box-office and became an instant Australian classic. Elliott’s career, however, self-destructed soon after...
Resumo:
The performance space in which Wesley Enoch’s play Black Diggers is being performed at the Brisbane Festival is a large black box. It features a raised stage in the middle which proves versatile for battlegrounds at home and abroad – and later as ground for discriminatory encounters experienced by Aboriginal returned ex-servicemen. The fire-filled 44-gallon drum off to the side creates another space of encounter; there are few other props. Now and then, dates and other details are whitewashed on the black walls...
Resumo:
In recent years disaster risk reduction efforts have focused on disturbances ranging from climate variability, seismic hazards, geo-political instability and public and animal health crises. These factors combined with uncertainty derived from inter-dependencies within and across systems of critical infrastructure create significant problems of governance for the private and public sector alike. The potential for rapid spread of impacts, geographically and virtually, can render a comprehensive understanding of disaster response and recovery needs and risk mitigation issues beyond the grasp of competent authority. Because of such cascading effects communities and governments at local and state-levels are unlikely to face single incidents but rather series of systemic impacts: often appearing concurrently. A further point to note is that both natural and technological hazards can act directly on socio-technical systems as well as being propagated by them: as network events. Such events have been categorised as ‘outside of the box,’ ‘too fast,’ and ‘too strange’ (Lagadec, 2004). Emergent complexities in linked systems can make disaster effects difficult to anticipate and recovery efforts difficult to plan for. Beyond the uncertainties of real world disasters, that might be called familiar or even regular, can we safely assume that the generic capability we use now will suit future disaster contexts? This paper presents initial scoping of research funded by the Bushfire and Natural Hazards Cooperative Research Centre seeking to define future capability needs of disaster management organisations. It explores challenges to anticipating the needs of representative agencies and groups active in before, during and after phases of emergency and disaster situations using capability deficit assessments and scenario assessment.