114 resultados para Arnold, Remmie LeRoy, b. 1894.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sections contributed by Jean Sim Agricultural Colleges; p.12 Anzac Park, Townsvile; p.22 Anzac Square, Brisbane; pp.22-23 Benson, Albert Herbert; p.86 Bick, Edward Walter; p.88 Bougainvillea Gardens; p.101 Bowen Park; pp.101-102 Boyd, A.J.; p.103 Brisbane Botanic Gardens; pp.104-105 Bush-house; pp.119-121

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An academic literacies approach frames students as active participants in their own learning as they develop their voice and identity. This paper describes teachers’ perceptions of developing and delivering an academic literacies program to TESOL pre-service teachers in a B.Ed twinning program. Data indicates that an academic literacies program is a dynamic process that is ever evolving in order to meet students’ needs. A cornerstone of the program was the continual and open communication between teachers to ensure that students’ needs were met. Additionally, a collaborative approach between twinning partners needs to occur in order for the benefits of the academic literacies program to continue for students.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Corepressors play a crucial role in negative gene regulation and are defective in several diseases. BCoR is a corepressor for the BCL6 repressor protein. Here we describe and functionally characterize BCoR-L1, a homolog of BCoR. When tethered to a heterologous promoter, BCoR-L1 is capable of strong repression. Like other corepressors, BCoR-L1 associates with histone deacetylase (HDAC) activity. Specifically, BCoR-L1 coprecipitates with the Class II HDACs, HDAC4, HDAC5, and HDAC7, suggesting that they are involved in its role as a transcriptional repressor. BCoR-L1 also interacts with the CtBP corepressor through a CtBP-interacting motif in its amino terminus. Abrogation of the CtBP binding site within BCoR-L1 partially relieves BCoR-L1-mediated transcriptional repression. Furthermore, BCoR-L1 is located on the E-cadherin promoter, a known CtBP-regulated promoter, and represses the E-cadherin promoter activity in a reporter assay. The inhibition of BCoR-L1 expression by RNA-mediated interference results in derepression of E-cadherin in cells that do not normally express E-cadherin, indicating that BCoR-L1 contributes to the repression of an authentic endogenous CtBP target.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A protein-truncating variant of CHEK2, 1100delC, is associated with a moderate increase in breast cancer risk. We have determined the prevalence of this allele in index cases from 300 Australian multiple-case breast cancer families, 95% of which had been found to be negative for mutations in BRCA1 and BRCA2. Only two (0.6%) index cases heterozygous for the CHEK2 mutation were identified. All available relatives in these two families were genotyped, but there was no evidence of co-segregation between the CHEK2 variant and breast cancer. Lymphoblastoid cell lines established from a heterozygous carrier contained approximately 20% of the CHEK2 1100delC mRNA relative to wild-type CHEK2 transcript. However, no truncated CHK2 protein was detectable. Analyses of expression and phosphorylation of wild-type CHK2 suggest that the variant is likely to act by haploinsufficiency. Analysis of CDC25A degradation, a downstream target of CHK2, suggests that some compensation occurs to allow normal degradation of CDC25A. Such compensation of the 1100delC defect in CHEK2 might explain the rather low breast cancer risk associated with the CHEK2 variant, compared to that associated with truncating mutations in BRCA1 or BRCA2.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As detailed in Whitehead, Bunker and Chung (2011), a congestion-charging scheme provides a mechanism to combat congestion whilst simultaneously generating revenue to improve both the road and public transport networks. The aim of this paper is to assess the feasibility of implementing a congestion-charging scheme in the city of Brisbane in Australia and determine the potential effects of this initiative. In order to so, a congestion-charging scheme was designed for Brisbane and modelled using the Brisbane Strategic Transport Model with a base line year of 2026. This paper argues that the implementation of this initiative would prove to be effective in reducing the cities road congestion and increasing the overall sustainability of the region.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Video surveillance technology, based on Closed Circuit Television (CCTV) cameras, is one of the fastest growing markets in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. To overcome this limitation, it is necessary to have “intelligent” processes which are able to highlight the salient data and filter out normal conditions that do not pose a threat to security. In order to create such intelligent systems, an understanding of human behaviour, specifically, suspicious behaviour is required. One of the challenges in achieving this is that human behaviour can only be understood correctly in the context in which it appears. Although context has been exploited in the general computer vision domain, it has not been widely used in the automatic suspicious behaviour detection domain. So, it is essential that context has to be formulated, stored and used by the system in order to understand human behaviour. Finally, since surveillance systems could be modeled as largescale data stream systems, it is difficult to have a complete knowledge base. In this case, the systems need to not only continuously update their knowledge but also be able to retrieve the extracted information which is related to the given context. To address these issues, a context-based approach for detecting suspicious behaviour is proposed. In this approach, contextual information is exploited in order to make a better detection. The proposed approach utilises a data stream clustering algorithm in order to discover the behaviour classes and their frequency of occurrences from the incoming behaviour instances. Contextual information is then used in addition to the above information to detect suspicious behaviour. The proposed approach is able to detect observed, unobserved and contextual suspicious behaviour. Two case studies using video feeds taken from CAVIAR dataset and Z-block building, Queensland University of Technology are presented in order to test the proposed approach. From these experiments, it is shown that by using information about context, the proposed system is able to make a more accurate detection, especially those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information give critical feedback to the system designers to refine the system. Finally, the proposed modified Clustream algorithm enables the system to both continuously update the system’s knowledge and to effectively retrieve the information learned in a given context. The outcomes from this research are: (a) A context-based framework for automatic detecting suspicious behaviour which can be used by an intelligent video surveillance in making decisions; (b) A modified Clustream data stream clustering algorithm which continuously updates the system knowledge and is able to retrieve contextually related information effectively; and (c) An update-describe approach which extends the capability of the existing human local motion features called interest points based features to the data stream environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Without the virtually free services of nature like clean air and water, humans would not last long. Natural systems can be incorporated in existing urban structures or spaces to add public amenity, mitigate the heat island eff ect, reduce pollution, add oxygen, and ensure water, electricity and food security in urban areas. Th ere are many eco-solutions that could radically reduce resource consumption and pollution and even provide surplus ecosystem services in the built environment at little or no operational cost, if adequately supported by design. Th is is the second part of a two part paper that explains what eco-services are, then provides examples of how design can generate natural as well as social capital. Using examples of actual and notional solutions, both papers set out to challenge designers to ‘think again’, and invent ways of creating net positive environmental gains through built environment design.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Violence in nightclubs is a serious problem that has the Australian government launching multimillion dollar drinking campaigns. Research on nightclub violence has focused on identifying contributing social and environmental factors, with many concentrating on a variety of specific issues ranging from financial standpoints with effective target marketing strategies to legal obligations of supplying alcohol and abiding regulatory conditions. Moreover, existing research suggests that there is no single factor that directly affects the rate violence in licensed venues. As detailed in the review paper of Koleczko and Garcia Hansen (2011), there is little research about the physical environment of nightclubs and which specific design properties can be used to determine design standards to ensure/improve the physical design of nightclub environments to reduce patron violence. This current study seeks to address this omission by reporting on a series of interviews with participants from management and design domains. Featured case studies are both located in Fortitude Valley, a Mecca for party-goers and the busiest nightclub district in Queensland. The results and analysis support the conclusions that a number of elements of the physical environment influence elevated patron aggression and assault.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes an effective method for signal-authentication and spoofing detection for civilian GNSS receivers using the GPS L1 C/A and the Galileo E1-B Safety of Life service. The paper discusses various spoofing attack profiles and how the proposed method is able to detect these attacks. This method is relatively low-cost and can be suitable for numerous mass-market applications. This paper is the subject of a pending patent.