359 resultados para physicality requirement


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Matrix Metalloproteinase-2 (MMP-2) is secreted as a zymogen, the activation of which has been associated with metastatic progression in human breast cancer (HBC). Concanavalin A (Con A) has been found to induce activation of MMP-2 in invasive HBC cell lines. Con A effects on the expression of mRNA for membrane-type matrix metalloproteinase (MT-MMP), a newly described cell surface-associated MMP, showed a close temporal correlation with induction of MMP-2 activation. It is surprising that MT-MMP mRNA is constitutively present in the uninduced MDA-MB-231 cell, despite a lack of MMP-2 activation. We have used actinomycin D to demonstrate a partial requirement for de novo gene expression in the induction of MMP-2 activation by Con A in MDA-MB-231 HBC cells. Furthermore, this transcriptional response to Con A appeared to require the continued presence of Con A for its manifestation. The nontranscriptional component of the Con A induction manifests rapidly, is quite substantial, and persists strongly despite actinomycin D abrogation of both constitutive and Con A-induced MT-MMP. Cycloheximide analyses suggest that protein synthesis may be involved in this rapid transcription-independent response. These studies suggest that Con A induces MMP-2-activation in part by up-regulation of MT-MMP expression but has a more complicated mode of action, involving additional nontranscriptional effects, which apparently require protein synthesis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The accuracy of early cost estimates is critical to the success of construction projects. The selected tender price (clients' building cost) is usually seen in previous research as a holistic dependent variable when examining early stage estimates. Unlike other components of construction cost, the amount of contingencies is decided by clients/consultants with consideration of early project information. Cost drivers of contingencies estimates are associated with uncertainty and complexity, and include project size, schedule, ground condition, construction site access, market condition and so on. A path analysis of 133 UK school building contracts was conducted to identify impacts of nine major cost drivers on the determination of contingencies by different clients/cost estimators. This research finds that gross floor area (GFA), schedule and requirement of air conditioning have statistically significant impacts on the contingency determination. The mediating role of schedule between gross floor area and contingencies (GFA→Schedule→Contingencies) was confirmed with the Soble test. The total effects of the three variables on contingencies estimates were obtained with the consideration of this indirect effect. The squared multiple correlation (SMC) of contingencies (=0.624) indicates the identified three variables can explain 62.4% variance of contingencies, and it is comparatively satisfactory considering the heterogeneity among different estimators, unknown estimating techniques and different projects

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sexuality is a subject that has been, at best, marginal in the significant body of literature that has examined gender and mining in contemporary Western nations. This is despite the fact that academics have circled, if not almost bumped into the topic in closely related discussions of hegemonic masculinity and mining work, and of patriarchal familial relations and mining communities. This scholarship has documented what has been and remains women’s primary relationship to mining—that is, as a “mining wife.” How patriarchal relations are manifest in and emerge from this state of affairs has been critiqued with research on the gendered implications of housing arrangements in mining towns, the division of household labor, changing shift-work mining rosters, and the gendered consequences of strikes and mine closures (Williams 1981; Gibson 1992; Gibson-Graham 1996; Rhodes 2005; McDonald, Mayes, and Pini 2012). Despite the centrality of the heterosexual relationship—and indeed heteronormativity—to these discussions, scholars of gender and mining have had little to say on the subject of sexuality. In response to this lacuna, this chapter takes an exploratory lens to the subject of sexuality and the mining industry. We approach the task from the perspective that the mining industry is gendered as masculine. That is, definitions of mining mobilize around masculinized notions of physicality, technical competence with machinery, and strength, as well as emphasize the harshness and dirtiness of the work (Mayes and Pini 2010).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What has Mime got to do with Corporate Communication? As a professional Mime artist on both stage and screen for more than 25 years, the author has been adapting and applying the techniques of Mime to the corporate communication context over a number of years, coaching corporate CEO’s, Executives and Managers, representing both public and private sector corporations and organisations. This unusual inter-contextual skill transfer is the subject of both a book and series of VODCasts by the author (currently in the final stages of completion), which form part of the author’s Doctoral Research and from which this paper is substantially drawn. The author’s professional background is multi-disciplinary – encompassing theatre, television, media, music, tertiary education and corporate training contexts. It is also inter-disciplinary – concerned with the commonality of different artistic mediums and forms and how, where and why these professional disciplines: intersect; interact, and inform each other – and therefore how they support each other - rather than losing creative/professional opportunities because of areas where they might conflict. This paper examines in particular the physicality of presentation and communication – beyond ‘generic’ body-language analysis. It involves the analysis, manipulation and stylisation of human physicality to support and enhance individual inter-professional communication, and how mime performance skills specifically, inform that process. This paper discusses:- • how mime skills clarify and enhance inter-professional communication. • what adaptations need to be applied in that context • getting a ‘performance’ from ‘non-performers’

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Basement membranes serve as significant barriers to the passage of tumor cells but ones which metastatic cells can pass. This involves the production of a cascade of proteases leading to the activation of a specific collagenase that degrades the unique collagen network in basement membrane. Breast cancer cells, when estrogen dependent, show a requirement for estrogen for invasive activity. However, when these cells progress to an estrogen independent state and increased malignancy, they express an invasive phenotype constitutively. Studies with various anti-estrogens suggest that these responses are mediated via the estrogen receptor. Anti-estrogens lacking agonist activity suppress invasiveness as well as growth of the breast cancer cells.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The respective requirements of collagen and MT1-MMP in the activation of MMP-2 by primary fibroblast cultures were explored further. Three-dimensional gels enriched in human collagen types I and III or composed of recombinant human type II or III collagen, caused increased MT1-MMP production (mRNA and protein) and induced MMP-2 activation. Only marginal induction was seen with dried monomeric collagen confirming the need for collagen fibrillar organisation for activation. To our surprise, relatively low amounts (as low as 25 μg/ml) of acid soluble type I collagen added to fibroblast cultures also induced potent MMP-2 activation. However, the requirement for collagen fibril formation by the added collagen was indicated by the inhibition seen when the collagen was pre-incubated with a fibril-blocking peptide, and the reduced activation seen with alkali-treated collagen preparations known to have impaired fibrilisation. Pre-treatment of the collagen with sodium periodate also abrogated MMP-2 activation induction. Further evidence of the requirement for collagen fibril formation was provided by the lack of activation when type IV collagen, which does not form collagen fibrils, was added in the cultures. Fibroblasts derived from MT1-MMP-deficient mice were unable to activate MMP-2 in response to either three-dimensional collagen gel or added collagen solutions, compared to their littermate controls. Collectively, these data indicate that the fibrillar structure of collagen and MT1-MMP are essential for the MMP-2 activational response in fibroblasts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Lindsay v Aumaali [2004] QDC 028 the Court considered whether it could, in effect, postpone the requirement for a compulsory conference under s51A of the Moror Accident insurance Act 1994 (Qld) or the exchange of final offers under s51C of the Act until after the start of proceedings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the current era of global economic instability, business and industry have already identified a widening gap between graduate skills and employability. An important element of this is the lack of entrepreneurial skills in graduates. This Teaching Fellowship investigated two sides of a story about entrepreneurial skills and their teaching. Senior players in the innovation commercialisation industry, a high profile entrepreneurial sector, were surveyed to gauge their needs and experiences of graduates they employ. International contexts of entrepreneurship education were investigated to explore how their teaching programs impart the skills of entrepreneurship. Such knowledge is an essential for the design of education programs that can deliver the entrepreneurial skills deemed important by industry for future sustainability. Two programs of entrepreneurship education are being implemented at QUT that draw on the best practice exemplars investigated during this Fellowship. The QUT Innovation Space (QIS) focuses on capturing the innovation and creativity of students, staff and others. The QIS is a physical and virtual meeting and networking space; a connected community enhancing the engagement of participants. The Q_Hatchery is still embryonic; but it is intended to be an innovation community that brings together nascent entrepreneurial businesses to collaborate, train and support each other. There is a niche between concept product and business incubator where an experiential learning environment for otherwise isolated ‘garage-at-home’ businesses could improve success rates. The QIS and the Q_Hatchery serve as living research laboratories to trial the concepts emerging from the skills survey. The survey of skills requirements of the innovation commercialisation industry has produced a large and high quality data set still being explored. Work experience as an employability factor has already emerged as an industry requirement that provides employee maturity. Exploratory factor analysis of the skills topics surveyed has led to a process-based conceptual model for teaching and learning higher-order entrepreneurial skills. Two foundational skills domains (Knowledge, Awareness) are proposed as prerequisites which allow individuals with a suite of early stage entrepreneurial and behavioural skills (Pre-leadership) to further leverage their careers into a leadership role in industry with development of skills around higher order elements of entrepreneurship, management in new business ventures and progressing winning technologies to market. The next stage of the analysis is to test the proposed model through structured equation modelling. Another factor that emerged quickly from the survey analysis broadens the generic concept of team skills currently voiced in Australian policy documents discussing the employability agenda. While there was recognition of the role of sharing, creating and using knowledge in a team-based interdisciplinary context, the adoption and adaptation of behaviours and attitudes of other team members of different disciplinary backgrounds (interprofessionalism) featured as an issue. Most undergraduates are taught and undertake teamwork in silos and, thus, seldom experience a true real-world interdisciplinary environment. Enhancing the entrepreneurial capacity of Australian industry is essential for the economic health of the country and can only be achieved by addressing the lack of entrepreneurial skills in graduates from the higher education system. This Fellowship has attempted to address this deficiency by identifying the skills requirements and providing frameworks for their teaching.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the revisions to the International Health Regulations (IHR) in 2005, much attention has been turned to how states, particularly developing states, will address core capacity requirements. The question often examined is how states with poor health systems can strengthen their capacity to identify and verify public health emergencies of international concern. A core capacity requirement is that by 2012 states will have a surveillance and response network that operates from the local community to the national level. Much emphasis has turned to the health system capacity required for this task. In this article, I seek to understand the political capacity to perform this task. This article considers how the world's two most populous states,1 1. For the purposes of this paper, I use the word ‘state’ as a shorthand for the nation-state of China and India, or member state as used by the United Nations. View all notes China and India, have sought to communicate outbreak events in times of crisis and calm. I consider what this reporting performance tells us of their capacity to meet their IHR obligations given the two countries differing political institutions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider the following problem: users in a dynamic group store their encrypted documents on an untrusted server, and wish to retrieve documents containing some keywords without any loss of data confidentiality. In this paper, we investigate common secure indices which can make multi-users in a dynamic group to obtain securely the encrypted documents shared among the group members without re-encrypting them. We give a formal definition of common secure index for conjunctive keyword-based retrieval over encrypted data (CSI-CKR), define the security requirement for CSI-CKR, and construct a CSI-CKR based on dynamic accumulators, Paillier’s cryptosystem and blind signatures. The security of proposed scheme is proved under strong RSA and co-DDH assumptions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most signature schemes are randomised and allow many possible signatures for a single message. In this case, it may be possible to produce a new signature on a previously signed message. Some applications require that this type of forgery also be prevented – this requirement is called strong unforgeability. At PKC2006, Boneh Shen and Waters presented an efficient transform based on any randomised trapdoor hash function which converts a weakly unforgeable signature into a strongly unforgeable signature and applied it to construct a strongly unforgeable signature based on the CDH problem. However, the transform of Boneh et al only applies to a class of so-called partitioned signatures. Although many schemes fall in this class, some do not, for example the DSA signature. Hence it is natural to ask whether one can obtain a truly generic efficient transform based on any randomised trapdoor hash function which converts any weakly unforgeable signature into a strongly unforgeable one. We answer this question in the positive by presenting a simple modification of the Boneh-Shen-Waters transform. Our modified transform uses two randomised trapdoor hash functions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We report on the application low-temperature plasmas for roughening Si surfaces which is becoming increasingly important for a number of applications ranging from Si quantum dots to cell and protein attachment for devices such as "laboratory on a chip" and sensors. It is a requirement that Si surface roughening is scalable and is a single-step process. It is shown that the removal of naturally forming SiO2 can be used to assist in the roughening of the surface using a low-temperature plasma-based etching approach, similar to the commonly used in semiconductor micromanufacturing. It is demonstrated that the selectivity of SiO2 /Si etching can be easily controlled by tuning the plasma power, working gas pressure, and other discharge parameters. The achieved selectivity ranges from 0.4 to 25.2 thus providing an effective means for the control of surface roughness of Si during the oxide layer removal, which is required for many advance applications in bio- and nanotechnology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This contribution sheds light on the role of crystal size and phase composition in inducing biomimetic apatite growth on the surface of nanostructured titania films synthesized by reactive magnetron sputtering of Ti targets in Ar+O2 plasmas. Unlike most existing techniques, this method enables one to deposit highly crystalline titania films with a wide range of phase composition and nanocrystal size, without any substrate heating or postannealing. Moreover, by using this dry plasma-based method one can avoid surface hydroxylation at the deposition stage, almost inevitable in wet chemical processes. Results of this work show that high phase purity and optimum crystal size appear to be the essential requirement for efficient apatite formation on magnetron plasma-fabricated bioactive titania coatings. © 2006 Wiley Periodicals, Inc.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (requiring original relation to detect the watermark in watermarked relation). This model has several disadvantages over reversible and blind watermarking (requiring only watermarked relation and secret key from which the watermark is detected and original relation is restored) including inability to identify rightful owner in case of successful secondary watermarking, inability to revert the relation to original data set (required in high precision industries) and requirement to store unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store original database at a secure secondary storage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Numeric sets can be used to store and distribute important information such as currency exchange rates and stock forecasts. It is useful to watermark such data for proving ownership in case of illegal distribution by someone. This paper analyzes the numerical set watermarking model presented by Sion et. al in “On watermarking numeric sets”, identifies it’s weaknesses, and proposes a novel scheme that overcomes these problems. One of the weaknesses of Sion’s watermarking scheme is the requirement to have a normally-distributed set, which is not true for many numeric sets such as forecast figures. Experiments indicate that the scheme is also susceptible to subset addition and secondary watermarking attacks. The watermarking model we propose can be used for numeric sets with arbitrary distribution. Theoretical analysis and experimental results show that the scheme is strongly resilient against sorting, subset selection, subset addition, distortion, and secondary watermarking attacks.