321 resultados para Brand Extensions


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective To quantitatively assess and compare the quality of life (QoL) of women with a self-reported diagnosis of lower limb lymphedema (LLL), to women with lower limb swelling (LLS), and to women without LLL or LLS following treatment for endometrial cancer. Methods 1399 participants in the Australian National Endometrial Cancer Study were sent a follow-up questionnaire 3–5 years after diagnosis. Women were asked if they had experienced swelling in the lower limbs and, if so, whether they had received a diagnosis of lymphedema by a health professional. The 639 women who responded were categorised as: Women with LLL (n = 68), women with LLS (n = 177) and women without LLL or LLS (n = 394). Multivariable-adjusted generalized linear models were used to compare women’s physical and mental QoL by LLL status. Results On average, women were 65 years of age and 4 years after diagnosis. Women with LLL had clinically lower physical QoL (M= 41.8, SE= 1.4) than women without LLL or LLS (M= 45.1, SE= 0.8, p = .07), however, their mental QoL was within the normative range (M= 49.6; SE= 1.1 p = 1.0). Women with LLS had significantly lower physical (M= 41.0, SE= 1.0, p = .003) and mental QoL (M= 46.8; SE= 0.8, p < .0001) than women without LLL or LLS (Mental QoL: M= 50.6, SE= 0.8). Conclusion Although LLL was associated with reductions in physical QoL, LLS was related to reductions in both physical and mental QoL 3-5 years after cancer treatment. Early referral to evidence-based lymphedema programs may prevent long-term impairments to women’s QoL.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Numerous crops grow in sugar regions that have the potential to increase the amount of biomass available to a small bagasse-based pulp factory. Arundo donax and Sorghum offer unique advantages to farmers compared to other agricultural crops. Sorghum bicolour requires only 1/3 of the water of sugarcane. Arundo donax is a very high yield crop, it can also grow with little water but it has the further advantage in that it is also highly stress tolerant, making it suitable for land which is unsuited to other crops. Pulps produced from these crops were benchmarked against sugarcane bagasse pulp. Arundo, sorghum and bagasse were pulped using KOH and anthraquinone to 20 Kappa number so as to produce a bleachable pulp which is suitable for making photocopier paper and tissue products. The unbleached sorghum pulp has better tensile strength properties than the unbleached Arundo pulp (43.8 Nm/g compared to 21.4 Nm/g) and the bleached sorghum pulp tensile strength was similar to bagasse (28.4 Nm/g). At 20 Kappa number, sorghum pulp had acceptable yield for a non-wood fibre (45% c.f. 55% for bagasse), Arundo donax pulp had low tensile strength, and relatively low yield (38.7%), even for an agricultural fibre and required severe cooking conditions to achieve similar delignification to sugarcane bagasse or sorghum. Sorghum and Arundo donax produced thicker handsheets than bagasse (>160 µm c.f. 122 µm for bagasse). In preliminary experiments sorghum and bagasse responded slightly better to Totally Chlorine Free peroxide bleaching (QPP), although none achieved a satisfactory brightness level and further improvement would be required to produce a bleached pulp.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We offer an exposition of Boneh, Boyen, and Goh’s “uber-assumption” family for analyzing the validity and strength of pairing assumptions in the generic-group model, and augment the original BBG framework with a few simple but useful extensions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this chapter is to provide an abstraction for the class of Exponent-Inversion IBE exemplified by the [Bscr ][Bscr ]2 and [Sscr ][Kscr ] schemes, and, on the basis of that abstraction, to show that those schemes do support interesting and useful extensions such as HIBE and ABE. Our results narrow, if not entirely close, the “flexibility gap” between the Exponent-Inversion and Commutative-Blinding IBE concepts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In January 2013, Apple Inc obtained United States trademarks for the design and layout of its retail stores. While innovative brand protection strategies of this kind are not without precedent in the United States, traders in Australia have seemingly not adopted them. This article considers the prospects of an applicant seeking to register a similar trade mark in Australia and the protection such a registration would likely provide.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Process choreographies describe interactions between different business partners and the dependencies between these interactions. While different proposals were made for capturing choreographies at an implementation level, it remains unclear how choreographies should be described on a conceptual level.While the Business Process Modeling Notation (BPMN) is already in use for describing choreographies in terms of interconnected interface behavior models, this paper will introduce interaction modeling using BPMN. Such interaction models do not suffer from incompatibility issues and are better suited for human modelers. BPMN extensions are proposed and a mapping from interaction models to interface behavior models is presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We have previously isolated a series of MCF-7 human breast cancer cell variants which no longer require estrogen-supplementation for tumor growth in nude mice (Clarke et al. Proc Natl Acad Sci USA 86: 3649-3653, 1989). We now report that these hormone-independent and hormone-responsive variants (MIII, MCF7/LCC1) can invade locally from solid mammary fat pad tumors, and produce primary extensions on the surface of intraperitoneal structures including liver, pancreas, and diaphragm. Both lymphatic and hematogenous dissemination are observed, resulting in the establishing of pulmonary, bone, and renal metastases. The pattern of metastasis by MIII and MCF7/LCC1 cells closely resembles that frequently observed in breast cancer patients, and provides the first evidence of metastasis from MCF-7 cells growing in vivo without supplementary estrogen. The interexperimental incidence of metastases, and the time from cell inoculation to the appearance of metastatic disease are variable. The increased metastatic potential is not associated with an increase in either the level of laminin attachment, laminin receptor mRNA expression, or secreted type IV collagenolytic activity. We also did not detect a significant decrease in the steady-state mRNA levels of the metastasis inhibitor nm23 gene. However, when growing without estrogen in vitro, MCF7/LCC1 cells produce elevated levels of the estrogen-inducible cathepsin D enzyme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The peritubular zone of the rat testis has an extensive extracellular matrix (ECM). Fibronectin (FN) is distributed primarily in the basal lamina of the seminiferous tubule boundary tissue and is synthesized by peritubular myoid cells. Several extracellular changes are mediated by growth factors and these changes occur at the time of hormone mediated testicular development, particularly in the peritubular zone. The effects of serum or dibutyryl cyclic AMP (cAMP) on FN production by the mesenchymal peritubular myoid cells were evaluated. Rats of various ages (10, 15, 20, 40 and 80 days) were employed for immunofluorescent localization of rat testicular FN in frozen sections. In all age groups tested, FN was primarily present in a broad layer around each seminiferous tubule, and blood vessel, and in variable distribution throughout the interstitial stroma. By day 20 there was no clear distinction in FN staining between the peritubular zone and the interstitial tissue. This indicates an involvement of FN in the ECM developments which occur in the peritubular zone of the testis at this time. The peritubular myoid cells were isolated from 20-22 day old rat testis and cultured on glass coverslips. These cells were grown to confluence with 10% fetal calf serum (FCS) in medium until day 4 and then subcultured to have secondary monocultures maintained with or without serum. By means of immunofluorescence and cytochemistry using avidin-biotin peroxidase complex it was observed that peritubular myoid cells were positive for FN and most of the FN was localized in the perinuclear region. Subcultured peritubular myoid cells maintained for 4 days in medium containing FCS developed an extensive interconnecting FN matrix. In the presence of 0.5 mM cAMP in culture, FN became localized along the filamentous process of peritubular myoid cells and more prominently in the areas of triangulated multi-cell aggregates as well as on the surface of the contracted small spherical cells. The addition of cAMP in the presence of FCS, also caused a noticeable change in the staining pattern; FN was detected along the filamentous process developing into a complex network of cells encased in an extensive matrix. It would appear that the translocation of FN in the cytoplasmic extensions of peritubular myoid cells may be a direct consequence of morphological changes associated with metabolic regulation of cAMP. This may also be related to the puberty associated development of in vivo changes in the ECM produced by peritubular myoid cells.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The branded pause advertisement is a recently developed online television-advertising format that displays a full-screen still-image banner ad whenever a viewer pauses a streaming-video program. This study used a controlled lab experiment to compare the effectiveness of branded pause advertisements with normal online television advertisements. The results demonstrate that branded pause advertisements are effective but only when combined with a long-exposure advertisement for the same brand. Despite their short exposure time, pause advertisements function as effective reminders, building awareness through repeat exposure. The findings of the current study were similar regardless of whether pause advertisements were activated as a result of viewers’ pausing at a time of their own choosing or whether viewers were interrupted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This presentation provides an overview of my PhD research, which links with the Institute for Urban Indigenous Health (IUIH) and its Deadly Choices team. In the presentation, I introduce my critique of mainstream health promotion practice, highlighting the need for decolonisation of health promotion and the opportunity to learn from health promotion practice that acknowledges Indigenous knowledge, skills and perspectives. I also overview my ethnographic research methodology, which enabled me to be a participant observer with IUIH health promotion practitioners. I canvas some of my findings to date, according to two key areas: the unique way Deadly Choices applies leadership as its model of health promotion practice; and the range of innovative engagement strategies they employed, including the Deadly Choices brand and social media. I conclude by highlighting the counter-narrative and contrast that Deadly Choices provides compared to traditional health promotion approaches with Indigenous people, and identify lessons for decolonisation of heath promotion more broadly.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Globalization, financial deregulation, economic turmoil, and technology breakthroughs are profoundly exposing organizations to business networks. Engaging these networks requires explicit planning from the strategic level down to the operational level of an organization, which significantly affects organizational artefacts such as business services, processes, and resources. Although enterprise architecture (EA) aligns business and IT aspects of organizational systems, previous applications of EA have not comprehensively addressed a methodological framework for planning. In the context of business networks, this study seeks to explore the application of EA for business network planning where it builds upon relevant and well-established prescriptive and descriptive aspects of EA. Prescriptive aspects include integrated models of services, business processes, and resources among other organizational artefacts, at both business and IT levels. Descriptive aspects include ontological classifications of business functionality, which allow EA models to be aligned semantically to organizational artefacts and, ultimately higher-level business strategy. A prominent approach for capturing descriptive aspects of EA is business capability modelling. In order to explore and develop the illustrative extensions of EA through capability modelling, a list of requirements (capability dimensions) for business network planning will be identified and validated through a revelatory case study encompassing different business network manifestations, or situations. These include virtual organization, liquid workforce, business network orchestration, and headquarters-subsidiary. The use of artefacts, conventionally, modelled through EA will be considered in these network situations. Two general considerations for EA extensions are explored for the identified requirements at the level of the network: extension of artefacts through the network and alignment of network level artefacts with individual organization artefacts. The list of requirements provides the basis for a constructivist extension of EA in the following ways. Firstly, for descriptive aspects, it offers constructivist insights to guide extensions for particular EA techniques and concepts. Secondly, for prescriptive aspects it defines a set of capability dimensions, which improve the analysis and assessment of organization capabilities for business network situations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A set system (X, F ) with X= {x 1,...,x m}) and F = {B1...,B n }, where B i ⊆ X, is called an (n, m) cover-free set system (or CF set system) if for any 1 ≤ i, j, k ≤ n and j ≠ k, |B i >2 |B j ∩ B k | +1. In this paper, we show that CF set systems can be used to construct anonymous membership broadcast schemes (or AMB schemes), allowing a center to broadcast a secret identity among a set of users in a such way that the users can verify whether or not the broadcast message contains their valid identity. Our goal is to construct (n, m) CF set systems in which for given m the value n is as large as possible. We give two constructions for CF set systems, the first one from error-correcting codes and the other from combinatorial designs. We link CF set systems to the concept of cover-free family studied by Erdös et al in early 80’s to derive bounds on parameters of CF set systems. We also discuss some possible extensions of the current work, motivated by different application.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-exponent d from the public key (N,e) as long as d < N 1/4. Interestingly, Wiener stated that his attack may sometimes also work when d is slightly larger than N 1/4. This raises the question of how much larger d can be: could the attack work with non-negligible probability for d=N 1/4 + ρ for some constant ρ > 0? We answer this question in the negative by proving a converse to Wiener’s result. Our result shows that, for any fixed ε > 0 and all sufficiently large modulus lengths, Wiener’s attack succeeds with negligible probability over a random choice of d < N δ (in an interval of size Ω(N δ )) as soon as δ > 1/4 + ε. Thus Wiener’s success bound dextensions of the Wiener attack, which are guaranteed to succeed even when δ > 1/4. The known attacks in this class (by Verheul and Van Tilborg and Dujella) run in exponential time, so it is natural to ask whether there exists an attack in this class with subexponential run-time. Our second converse result answers this question also in the negative.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cumulative arrays have played an important role in the early development of the secret sharing theory. They have not been subject to extensive study so far, as the secret sharing schemes built on them generally result in much larger sizes of shares, when compared with other conventional approaches. Recent works in threshold cryptography show that cumulative arrays may be the appropriate building blocks in non-homomorphic threshold cryptosystems where the conventional secret sharing methods are generally of no use. In this paper we study several extensions of cumulative arrays and show that some of these extensions significantly improve the performance of conventional cumulative arrays. In particular, we derive bounds on generalised cumulative arrays and show that the constructions based on perfect hash families are asymptotically optimal. We also introduce the concept of ramp perfect hash families as a generalisation of perfect hash families for the study of ramp secret sharing schemes and ramp cumulative arrays.