245 resultados para Kondo box
Resumo:
There is an intimate interconnectivity between policy guidelines defining reform and the delineation of what research methods would be subsequently applied to determine reform success. Research is guided as much by the metaphors describing it as by the ensuing empirical definition of actions of results obtained from it. In a call for different reform policy metaphors Lumby and English (2010) note, “The primary responsibility for the parlous state of education... lies with the policy makers that have racked our schools with reductive and dehumanizing processes, following the metaphors of market efficiency, and leadership models based on accounting and the characteristics of machine bureaucracy” (p. 127)
Resumo:
This is a professional practice paper for Psychology practitioners to reflect on their skills and therapeutic practices. A Master- practitioner model or Artizan - apprentice analogy is used to understand the development of a practicing psychologist from his/her "salad days" (when we are green [Shakespeare- Anthony and Cleopatra]) to our Autumn years in the profession.
Resumo:
Objective: To explore psychosocial issues perceived to impact the mental health and well-being of resident (non-fly-in fly-out) mine workers at a local mine in regional Queensland. Design: A descriptive qualitative study using semistructured interviews. Setting: The research was conducted on-site at an opencut coal mine in regional Queensland. Participants: Ten miners (nine men) currently employed in workshop, production or supervisory roles. Main outcome measures: Self-reported issues affecting psychological well-being. Results: Participants’ occupation and the surrounding context appeared to have both positive and negative influences on their well-being. Overall findings could be grouped into four key themes: (i) the importance of relationships; (ii) the impact of lifestyle; (iii) work characteristics; and (iv) mental health attitudes. While not without strains on mental health, in general, participants reported that their current situation was superior to their previous mining jobs. This was attributed to close relationships among locally recruited workers, respect for management practices and rosters that allowed adequate sleep recovery and family time between shifts. Conclusions: This study is the first to examine mental health and well being in non-fly-in fly-out mining populations. It suggests that while some issues appear inherent in the mining occupation, personal and organisational support can help workers have a more positive workplace experience. Further work looking at more extensive comparisons over various mining contexts will greatly assist in the development of programs and support structures for rural and regional mine workers.
Resumo:
The DNA damage response encompasses a complex series of signaling pathways that function to regulate and facilitate the repair of damaged DNA. Recent studies have shown that the repair of transcriptionally inactive chromatin, named heterochromatin, is dependent upon the phosphorylation of the co-repressor, Krüppel-associated box (KRAB) domain-associated protein (KAP-1), by the ataxia telangiectasia-mutated (ATM) kinase. Co-repressors, such as KAP-1, function to regulate the rigid structure of heterochromatin by recruiting histone-modifying enzymes, such HDAC1/2, SETDB1, and nucleosome-remodeling complexes such as CHD3. Here, we have characterized a phosphorylation site in the HP1-binding domain of KAP-1, Ser-473, which is phosphorylated by the cell cycle checkpoint kinase Chk2. Expression of a nonphosphorylatable S473A mutant conferred cellular sensitivity to DNA-damaging agents and led to defective repair of DNA double-strand breaks in heterochromatin. In addition, cells expressing S473A also displayed defective mobilization of the HP1-β chromodomain protein. The DNA repair defect observed in cells expressing S473A was alleviated by depletion of HP1-β, suggesting that phosphorylation of KAP-1 on Ser-473 promotes the mobilization of HP1-β from heterochromatin and subsequent DNA repair. These results suggest a novel mechanism of KAP-1-mediated chromatin restructuring via Chk2-regulated HP1-β exchange from heterochromatin, promoting DNA repair.
Resumo:
The Australian Curriculum marks national reforms in social science education, first with the return to the disciplines of history and geography and second, through a new approach to interdisciplinary learning. This paper raises the question of whether the promise of interdisciplinary learning can be realised in the middle years of schooling if teachers have to teach history as a discipline rather than within an over-arching integrated curriculum framework. The paper explores the national blueprints and considers the national history curriculum in light of theories of teachers’ knowledge and middle school education. Evidence from teacher interviews indicates that historical understanding can be achieved through integrated frameworks to meet the goals of middle schooling.
Resumo:
The T-box family transcription factor gene TBX20 acts in a conserved regulatory network, guiding heart formation and patterning in diverse species. Mouse Tbx20 is expressed in cardiac progenitor cells, differentiating cardiomyocytes, and developing valvular tissue, and its deletion or RNA interference-mediated knockdown is catastrophic for heart development. TBX20 interacts physically, functionally, and genetically with other cardiac transcription factors, including NKX2-5, GATA4, and TBX5, mutations of which cause congenital heart disease (CHD). Here, we report nonsense (Q195X) and missense (I152M) germline mutations within the T-box DNA-binding domain of human TBX20 that were associated with a family history of CHD and a complex spectrum of developmental anomalies, including defects in septation, chamber growth, and valvulogenesis. Biophysical characterization of wild-type and mutant proteins indicated how the missense mutation disrupts the structure and function of the TBX20 T-box. Dilated cardiomyopathy was a feature of the TBX20 mutant phenotype in humans and mice, suggesting that mutations in developmental transcription factors can provide a sensitized template for adult-onset heart disease. Our findings are the first to link TBX20 mutations to human pathology. They provide insights into how mutation of different genes in an interactive regulatory circuit lead to diverse clinical phenotypes, with implications for diagnosis, genetic screening, and patient follow-up.
Resumo:
This paper describes a study of the theoretical and experimental behaviour of box-columns of varying b/t ratios under loadings of axial compression and torsion and their combinations. Details of the testing rigs and the testing methods, the results obtained such as the load-deflection curves and the interaction diagrams, and experimental observations regarding the behaviour of box-models and the types of local plastic mechanisms associated with each type of loading are presented. A simplified rigid-plastic analysis is carried out to study the collapse behaviour of box-columns under these loadings, based on the observed plastic mechanisms, and the results are compared with those of experiments.
Resumo:
This thesis examined the possible role of Y-box binding protein 1 (YBX1) in prostate cancer aggression and spread. Novel roles were uncovered for YBX1 in the regulation of several genes previously implicated in prostate cancer, as well as showing an effect for YBX1 in increasing tumour cell invasion and movement and reciprocal regulation of androgen-regulated gene networks. In addition, it was found that Y-box 1 regulated several other well-known cancer genes implicated in breast and other cancers. The work performed in this thesis has strengthened the foundations for pursuing YBX1 as a possible central target molecule in prostate cancer therapeutics.
Resumo:
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.
Resumo:
Despite the fact that Australia is a socially progressive country and boasts one of the largest Gender Dysphoria Clinics in the Southern Hemisphere, delivering services for almost four decades, Australian Governments fail to arrive at any consensus on the legal and human rights approaches to Trans*people. The subsequent lack of recognition does little more than increase the levels of frustration of and the continued discrimination to Trans*people, including adverse mental health problems, in this country. The purpose of this presentation is to provide an overview of the Australian systems that govern Trans*people and to identify how Trans*identities are manipulated in our Federal system of government; a system which offers little to protect the human rights of Trans*people. In order to contextualise the Australian situation, I commence with a brief description on the layers of government which will include how Australian Trans*people are currently protected under the law in those jurisdictions. I then present some of the impracticalities endured by the transitioning individual (single or married) including change of documentation and legal gender status before, during and after surgical transition for both those born on and off shore. This presentation will also include discussion of legislation that has been described by Trans*advocates as “Gesture”, “Cart before the Horse” and “Harmful”. I will conclude with a way forward by suggesting the development of a coordinated all of government approach in consultation with key stakeholders for “Trans* Friendly Legislation” to improve the human and legal rights, and ultimately the health and wellbeing of Australian Trans*identities.
Resumo:
Australia is a difficult market for horror movies. Particularly in recent years, Australia has been regarded as a graveyard for many horror films released theatrically. This is not to say that Australians have not enjoyed the occasional scary movie on the big screen. But what types of horror films have been popular with Australian audiences at the box-office remains poorly understood. Horror films revolve around monsters, the fear of death and the transgression of boundaries, and they aim to scare audiences through ‘gross-out’ or ‘creep-out’ factors (some combine both). The former refers to shocking and graphic portrayals of gore and violence – as seen in the sadistic torture of backpackers in Hostel (Eli Roth, 2005), which depicts limbs being hacked off and eyes being cut from nerve endings. The latter refers to the crafting of fear through mood and suspense without explicit bloodshed, achieved brilliantly in The Sixth Sense’s (M Night Shyamalan, 1999) chilling encounters with ‘dead people’. In creep-out films, it is often what viewers don’t see that is most disturbing. Using an analysis of the top fifty films each year at the Australian box office from 1992 to 2012, this article identifies the most successful horror movies over this period to ascertain what types of horror movies – with reference to creep-out and gross-out factors – have been most popular with domestic audiences.
Resumo:
MADS-box genes similar to Arabidopsis SHORT VEGETATIVE PHASE (SVP) have been implicated in the regulation of flowering in annual species and bud dormancy in perennial species. Kiwifruit (Actinidia spp.) are woody perennial vines where bud dormancy and out-growth affect flower development. To determine the role of SVP-like genes in dormancy and flowering of kiwifruit, four MADS-box genes with homology to Arabidopsis SVP, designated SVP1, SVP2, SVP3, and SVP4, have been identified and analysed in kiwifruit and functionally characterized in Arabidopsis. Phylogenetic analysis indicate that these genes fall into different sub-clades within the SVP-like gene group, suggesting distinct functions. Expression was generally confined to vegetative tissues, and increased transcript accumulation in shoot buds over the winter period suggests a role for these genes in bud dormancy. Down-regulation before flower differentiation indicate possible roles as floral repressors. Over-expression and complementation studies in Arabidopsis resulted in a range of floral reversion phenotypes arising from interactions with Arabidopsis MADS-box proteins, but only SVP1 and SVP3 were able to complement the svp mutant. These results suggest that the kiwifruit SVP-like genes may have distinct roles during bud dormancy and flowering.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
A novel gray-box neural network model (GBNNM), including multi-layer perception (MLP) neural network (NN) and integrators, is proposed for a model identification and fault estimation (MIFE) scheme. With the GBNNM, both the nonlinearity and dynamics of a class of nonlinear dynamic systems can be approximated. Unlike previous NN-based model identification methods, the GBNNM directly inherits system dynamics and separately models system nonlinearities. This model corresponds well with the object system and is easy to build. The GBNNM is embedded online as a normal model reference to obtain the quantitative residual between the object system output and the GBNNM output. This residual can accurately indicate the fault offset value, so it is suitable for differing fault severities. To further estimate the fault parameters (FPs), an improved extended state observer (ESO) using the same NNs (IESONN) from the GBNNM is proposed to avoid requiring the knowledge of ESO nonlinearity. Then, the proposed MIFE scheme is applied for reaction wheels (RW) in a satellite attitude control system (SACS). The scheme using the GBNNM is compared with other NNs in the same fault scenario, and several partial loss of effect (LOE) faults with different severities are considered to validate the effectiveness of the FP estimation and its superiority.
Resumo:
Oncogene-induced senescence (OIS) is a potent tumor-suppressive mechanism that is thought to come at the cost of aging. The Forkhead box O (FOXO) transcription factors are regulators of life span and tumor suppression. However, whether and how FOXOs function in OIS have been unclear. Here, we show a role for FOXO4 in mediating senescence by the human BRAFV600E oncogene, which arises commonly in melanoma. BRAFV600E signaling through mitogen-activated protein kinase/extracellular signal-regulated kinase kinase resulted in increased reactive oxygen species levels and c-Jun NH 2 terminal kinase-mediated activation of FOXO4 via its phosphorylation on Thr223, Ser226, Thr447, and Thr451. BRAFV600E-induced FOXO4 phosphorylation resulted in p21cip1-mediated cell senescence independent of p16 ink4a or p27kip1. Importantly, melanocyte-specific activation of BRAFV600E in vivo resulted in the formation of skin nevi expressing Thr223/Ser226-phosphorylated FOXO4 and elevated p21cip1. Together, these findings support a model in which FOXOs mediate a trade-off between cancer and aging.