343 resultados para requirement


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Failure to efficiently induce apoptosis contributes to cisplatin resistance in non-small-cell lung cancer (NSCLC). Although BCL-2-associated X protein (BAX) and BCL-2 antagonist killer (BAK) are critical regulators of the mitochondrial apoptosis pathway, their requirement has not been robustly established in relation to cisplatin. Here, we show that cisplatin can efficiently bypass mitochondrial apoptosis block caused by loss of BAX and BAK, via activation of the extrinsic death receptor pathway in some model cell lines. Apoptosis resistance following cisplatin can only be observed when both extrinsic and intrinsic pathways are blocked, consistent with redundancy between mitochondrial and death receptor pathways in cisplatin-induced apoptosis. In H460 NSCLC cells, caspase-8 cleavage was shown to be induced by cisplatin and is dependent on death receptor 4, death receptor 5, Fas-associated protein with death domain, acid sphingomyelinase and ceramide synthesis. In contrast, cisplatin-resistant cells fail to activate caspase-8 via this pathway despite conserving sensitivity to death ligand-driven activation. Accordingly, caspase-8 activation block acquired during cisplatin resistance, can be bypassed by death receptor agonism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The article offers information on the requirement of the continuing professional development (CPD) training and lifelong learning for the legal registration of the Australian practitioners and pharmacists. Topics discussed include reviewing the competitiveness and pharmacy practice benefits, strategic planning for getting the requirement of CPD, and improving and broadening of the knowledge and developing the personal and professional qualities of pharmacists.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Creating an authentic assessment which at once assesses competencies, scene management, communication and overall patient care is challenging in the competitive tertiary education market. Increasing student numbers and the cost of evaluating scenario based competencies serve to ensure the need for consistent objectivity and need for timely feedback to students on their performance. Objective structured clinical examination (OSCE) is currently the most flexible approach to competency based formative and summative assessment and widely used within paramedic degree programs. Students are understandably compelled to perform well and can be frustrated by not receiving timely and appropriate feedback. Increasingly a number of products aimed at providing a more efficient and paperless approach have begun to enter the market. These products, it is suggested are aimed at medicine programs and not at allied health professions and limited to one operating system and therefore ignore issues surrounding equity and accessibility. OSCE Online aims to address this gap in the market and is tailored to these disciplines. The application will provide a service that can be both tailored and standardised from a pre-written bank, depending upon requirement to fit around the needs of clinical competency assessment. Delivering authentic assessments to address student milestones in their training to become paramedics is the cornerstone of OSCE Online. By not being restricted to a specific device it will address issues of functionality, adaptability, accessibility, authenticity and importantly: transparency and accountability by producing contemporaneous data allowing issues to be easily identified and rectified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The notion of sovereignty is central to any international tax issue. While a nation is free to design its tax laws as it sees fit and raise revenue in accordance with the needs of its citizens, it is not possible to undertake such a task in isolation. In a world of cross-border investments and business transactions, all tax regimes impact on one another. Tax interactions between sovereign states cannot be avoided. Ultimately, the interactions mean that a nation must decide whether to engage in both collaboration and coordination with other nations and supranational bodies alike or maintain an individualised stance in relation to its tax policy. Whatever the decision, there is arguably an exercise in national sovereignty in some form. In the context of an international tax regime, whether that regime is interpreted broadly as meaning international norms generally adopted by nations around the world or domestic regimes legislating for cross-border transactions, rhetoric around national fiscal sovereignty takes on many different forms. At one end of the spectrum it is relied upon by financial secrecy jurisdictions (tax havens) as a defence to their position on the basis that ‘other’ nations cannot interfere with the fiscal sovereignty of a jurisdiction. At the other end of the spectrum, it is argued that profit shifting and international tax avoidance if not stopped is, in and of itself, a threat to a nation’s fiscal sovereignty on the basis that it threatens the ability to tax and raise the revenue needed. This paper considers a modern conceptualisation of sovereignty along with its role within international tax coordination and collaboration to argue that a move towards a more unified approach to addressing international base erosion and profit shifting may be the ultimate exercise of national fiscal sovereignty. By using the current transfer pricing regime as a case study, this paper posits that it is not merely enough to have international agreement on allocation rules to be applied, but that the ultimate exercise of national sovereignty is political agreement with other states to ensure that it is governments which determine the allocational basis of worldwide profits to be taxed. In doing so, it is demonstrated that the arm’s length pricing requirement of the current transfer pricing regime, rather than providing governments with the ability to determine the location of profits, is providing multinational entities with the ultimate power to determine that location. If left unchecked, this will eventually erode a nation’s ability to capture the required tax revenue and, as a consequence, may be deemed a failure by nation states to exercise their fiscal sovereignty.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Low speed rotating machines which are the most critical components in drive train of wind turbines are often menaced by several technical and environmental defects. These factors contribute to mount the economic requirement for Health Monitoring and Condition Monitoring of the systems. When a defect is happened in such system result in reduced energy loss rates from related process and due to it Condition Monitoring techniques that detecting energy loss are very difficult if not possible to use. However, in the case of Acoustic Emission (AE) technique this issue is partly overcome and is well suited for detecting very small energy release rates. Acoustic Emission (AE) as a technique is more than 50 years old and in this new technology the sounds associated with the failure of materials were detected. Acoustic wave is a non-stationary signal which can discover elastic stress waves in a failure component, capable of online monitoring, and is very sensitive to the fault diagnosis. In this paper the history and background of discovering and developing AE is discussed, different ages of developing AE which include Age of Enlightenment (1950-1967), Golden Age of AE (1967-1980), Period of Transition (1980-Present). In the next section the application of AE condition monitoring in machinery process and various systems that applied AE technique in their health monitoring is discussed. In the end an experimental result is proposed by QUT test rig which an outer race bearing fault was simulated to depict the sensitivity of AE for detecting incipient faults in low speed high frequency machine.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim The aim of this study was to establish intensive care unit nurses’ knowledge of delirium within an acute tertiary hospital within South East Asia. Background Delirium is a common, life threatening and often preventable cause of morbidity and mortality among older patients. Undetected and untreated delirium is a catalyst to increased mortality, morbidity, functional decline and results in increased requirement for nursing care, healthcare expense and hospital length of stay. However, despite effective assessment tools to identify delirium in the acute setting, there still remains an inability of ICU nurses’ to accurately identify delirium in the critically ill patient especially that of hypoactive delirium. Method A purposive sample of 53 staff nurses from a 13-bedded medical intensive care unit within an acute tertiary teaching hospital in South East Asia were asked to participate. A 40 item 5-point Likert scale questionnaire was employed to determine the participants’ knowledge of the signs and symptoms; the risk factors and negative outcomes of delirium. Results The overall positively answered mean score was 27 (67.3%) out of a possible 40 questions. Mean scores for knowledge of signs and symptoms, risk factors and negative outcomes were 9.52 (63.5%, n = 15), 11.43 (63.5%, n = 17) and 6.0 (75%, n = 8), respectively. Conclusion Whilst the results of this study are similar to others taken from a western perspective, it appeared that the ICU nurses in this study demonstrated limited knowledge of the signs and symptoms, risk factors and negative outcomes of delirium in the critically patient. The implications for practice of this are important given the outcomes of untreated delirium.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are many challenges in developing research projects in research-naïve clinical settings, especially palliative care where resistance to participate in research has been identified. These challenges to the implementation of research are common in nursing practice and are associated with attitudes towards research participation, and some lack of understanding of research as a process to improve clinical practice. This is despite the professional nursing requirement to conduct research into issues that influence palliative care practice. The purpose of this paper is to describe the process of implementing a clinical research project in collaboration with the clinicians of a palliative care community team and to reflect on the strategies implemented to overcome the challenges involved. The challenges presented here demonstrate the importance of proactively implementing engagement strategies from the inception of a research project in a clinical setting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sudden, violent and otherwise unexplained deaths are investigated in most western jurisdictions through a Coronial or medico-legal process. A crucial element of such an investigation is the legislative requirement to remove the body for autopsy and other medical interventions, processes which can disrupt traditional religious and cultural grieving practices. While recent legislative changes in an increasing number of jurisdictions allow families to raise objections based on religious and cultural grounds, such concerns can be over-ruled, often exacerbating the trauma and grief of families. Based on funded research which interviews a range of Coronial staff in one Australian jurisdiction, this paper explores the disjuncture between medico-legal discourses, which position the body as corpse, and the rise of more ‘therapeutic’ discourses which recognise the family’s wishes to reposition the body as beloved and lamented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Geoscientists are confronted with the challenge of assessing nonlinear phenomena that result from multiphysics coupling across multiple scales from the quantum level to the scale of the earth and from femtoseconds to the 4.5 Ga of history of our planet. We neglect in this review electromagnetic modelling of the processes in the Earth’s core, and focus on four types of couplings that underpin fundamental instabilities in the Earth. These are thermal (T), hydraulic (H), mechanical (M) and chemical (C) processes which are driven and controlled by the transfer of heat to the Earth’s surface. Instabilities appear as faults, folds, compaction bands, shear/fault zones, plate boundaries and convective patterns. Convective patterns emerge from buoyancy overcoming viscous drag at a critical Rayleigh number. All other processes emerge from non-conservative thermodynamic forces with a critical critical dissipative source term, which can be characterised by the modified Gruntfest number Gr. These dissipative processes reach a quasi-steady state when, at maximum dissipation, THMC diffusion (Fourier, Darcy, Biot, Fick) balance the source term. The emerging steady state dissipative patterns are defined by the respective diffusion length scales. These length scales provide a fundamental thermodynamic yardstick for measuring instabilities in the Earth. The implementation of a fully coupled THMC multiscale theoretical framework into an applied workflow is still in its early stages. This is largely owing to the four fundamentally different lengths of the THMC diffusion yardsticks spanning micro-metre to tens of kilometres compounded by the additional necessity to consider microstructure information in the formulation of enriched continua for THMC feedback simulations (i.e., micro-structure enriched continuum formulation). Another challenge is to consider the important factor time which implies that the geomaterial often is very far away from initial yield and flowing on a time scale that cannot be accessed in the laboratory. This leads to the requirement of adopting a thermodynamic framework in conjunction with flow theories of plasticity. This framework allows, unlike consistency plasticity, the description of both solid mechanical and fluid dynamic instabilities. In the applications we show the similarity of THMC feedback patterns across scales such as brittle and ductile folds and faults. A particular interesting case is discussed in detail, where out of the fluid dynamic solution, ductile compaction bands appear which are akin and can be confused with their brittle siblings. The main difference is that they require the factor time and also a much lower driving forces to emerge. These low stress solutions cannot be obtained on short laboratory time scales and they are therefore much more likely to appear in nature than in the laboratory. We finish with a multiscale description of a seminal structure in the Swiss Alps, the Glarus thrust, which puzzled geologists for more than 100 years. Along the Glarus thrust, a km-scale package of rocks (nappe) has been pushed 40 km over its footwall as a solid rock body. The thrust itself is a m-wide ductile shear zone, while in turn the centre of the thrust shows a mm-cm wide central slip zone experiencing periodic extreme deformation akin to a stick-slip event. The m-wide creeping zone is consistent with the THM feedback length scale of solid mechanics, while the ultralocalised central slip zones is most likely a fluid dynamic instability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Disjoint top-view networked cameras are among the most commonly utilized networks in many applications. One of the open questions for these cameras' study is the computation of extrinsic parameters (positions and orientations), named extrinsic calibration or localization of cameras. Current approaches either rely on strict assumptions of the object motion for accurate results or fail to provide results of high accuracy without the requirement of the object motion. To address these shortcomings, we present a location-constrained maximum a posteriori (LMAP) approach by applying known locations in the surveillance area, some of which would be passed by the object opportunistically. The LMAP approach formulates the problem as a joint inference of the extrinsic parameters and object trajectory based on the cameras' observations and the known locations. In addition, a new task-oriented evaluation metric, named MABR (the Maximum value of All image points' Back-projected localization errors' L2 norms Relative to the area of field of view), is presented to assess the quality of the calibration results in an indoor object tracking context. Finally, results herein demonstrate the superior performance of the proposed method over the state-of-the-art algorithm based on the presented MABR and classical evaluation metric in simulations and real experiments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Enterprise resource planning (ERP) systems are rapidly being combined with “big data” analytics processes and publicly available “open data sets”, which are usually outside the arena of the enterprise, to expand activity through better service to current clients as well as identifying new opportunities. Moreover, these activities are now largely based around relevant software systems hosted in a “cloud computing” environment. However, the over 50- year old phrase related to mistrust in computer systems, namely “garbage in, garbage out” or “GIGO”, is used to describe problems of unqualified and unquestioning dependency on information systems. However, a more relevant GIGO interpretation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems based around ERP and open datasets as well as “big data” analytics, particularly in a cloud environment, the ability to verify the authenticity and integrity of the data sets used may be almost impossible. In turn, this may easily result in decision making based upon questionable results which are unverifiable. Illicit “impersonation” of and modifications to legitimate data sets may become a reality while at the same time the ability to audit any derived results of analysis may be an important requirement, particularly in the public sector. The pressing need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment is discussed in this paper. Some current and appropriate technologies currently being offered are also examined. However, severe limitations in addressing the problems identified are found and the paper proposes further necessary research work for the area. (Note: This paper is based on an earlier unpublished paper/presentation “Identity, Addressing, Authenticity and Audit Requirements for Trust in ERP, Analytics and Big/Open Data in a ‘Cloud’ Computing Environment: A Review and Proposal” presented to the Department of Accounting and IT, College of Management, National Chung Chen University, 20 November 2013.)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.