26 resultados para Méthode IB


Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Broccoli consumption has been associated with a reduced risk of prostate cancer. Isothiocyanates (ITCs) derived from glucosinolates that accumulate in broccoli are dietary compounds that may mediate these health effects. Sulforaphane (SF, 4-methylsulphinylbutyl ITC) derives from heading broccoli (calabrese) and iberin (IB, 3-methylsulphinypropyl ITC) from sprouting broccoli. While there are many studies regarding the biological activity of SF, mainly undertaken with cancerous cells, there are few studies associated with IB. METHODS: Primary epithelial and stromal cells were derived from benign prostatic hyperplasia tissue. Affymetrix U133 Plus 2.0 whole genome arrays were used to compare global gene expression between these cells, and to quantify changes in gene expression following exposure to physiologically appropriate concentrations of SF and IB. Ontology and pathway analyses were used to interpret results. Changes in expression of a subset of genes were confirmed by real-time RT-PCR. RESULTS: Global gene expression profiling identified epithelial and stromal-specific gene expression profiles. SF induced more changes in epithelial cells, whereas IB was more effective in stromal cells. Although IB and SF induced different changes in gene expression in both epithelial and stromal cells, these were associated with similar pathways, such as cell cycle and detoxification. Both ITCs increased expression of PLAGL1, a tumor suppressor gene, in stromal cells and suppressed expression of the putative tumor promoting genes IFITM1, CSPG2, and VIM in epithelial cells. CONCLUSION: These data suggest that IB and SF both alter genes associated with cancer prevention, and IB should be investigated further as a potential chemopreventative agent.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sulforaphane (SF; 4-methylsulfinylbutyl isothiocyanate), a dietary compound derived from broccoli, may exhibit chemopreventive properties by inducing cell cycle arrest via induction of cyclin-dependent kinase inhibitor 1A (p21(waf1/cip1)), but the exact molecular mechanism has not been determined. Here we evaluate the role of the transcription factor Kruppel-like factor 4 (KLF4) in mediating the induction of p21(waf1/cip1) and cellular differentiation by SF and iberin (IB; 3-methylsulphinyl propyl isothiocyanate), also derived from broccoli. Exposure of Caco-2 and Caco-2/TC7 cells to SF and IB increased expression of both KLF4 and p21(waf1/cip1), whereas exposure of HT29 cells resulted only in induction of p21(waf1/cip1). In Caco-2 cells, small interfering RNA knock down of KLF4 expression attenuated induction of p21(waf1/cip1) in response to either SF or IB treatment. Contrary to expectation, prolonged exposure to SF reduced sucrase isomaltase activity, a marker of small intestinal differentiation in Caco-2 cells. Additional support for the SF-mediated induction of p21(waf1/cip1) by KLF4 was obtained from analyses of gastric tissue of Apc(Min/+) mice following acute intervention with SF but not from the analyses of other tissue of the intestinal tract. These results suggest that induction of p21(waf1/cip1) by SF or IB may be partly mediated by KLF4 in some colon cancer cells and tissues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bomb technicians perform their work while encapsulated in explosive ordnance disposal (EOD) suits. Designed primarily for safety, these suits have an unintended consequence of impairing the body’s natural mechanisms for heat dissipation. Purpose: To quantify the heat strain encountered during an EOD operational scenario in the tropical north of Australia. Methods: All active police male bomb technicians, located in a tropical region of Australia (n=4, experience 7 ± 2.1 yrs, age 34 ± 2 yrs, height 182.3 ± 5.4 cm, body mass 95 ± 4 kg, VO2max 46 ± 5.7 ml.kg-1.min-1) undertook an operational scenario wearing the Med-Eng EOD 9 suit and helmet (~32 kg). The climatic conditions ranged between 27.1–31.8°C ambient temperature, 66-88% relative humidity, and 30.7-34.3°C wet bulb globe temperature. The scenario involved searching a two story non air-conditioned building for a target; carrying and positioning equipment for taking an X-ray; carrying and positioning equipment to disrupt the target; and finally clearing the site. Core temperature and heart rate were continuously monitored, and were used to calculate a physiological strain index (PSI). Urine specific gravity (USG) assessed hydration status and heat associated symptomology were also recorded. Results: The scenario was completed in 121 ± 22 mins (23.4 ± 0.4% work, 76.5 ± 0.4% rest/recovery). Maximum core temperature (38.4 ± 0.2°C), heart rate (173 ± 5.4 bpm, 94 ± 3.3% max), PSI (7.1 ± 0.4) and USG (1.031 ± 0.002) were all elevated after the simulated operation. Heat associated symptomology highlighted that moderate-severe levels of fatigue and thirst were universally experienced, muscle weakness and heat sensations experienced by 75%, and one bomb technician reported confusion and light-headedness. Conclusion: All bomb technicians demonstrated moderate-high levels of heat strain, evidenced by elevated heart rate, core body temperature and PSI. Severe levels of dehydration and noteworthy heat-related symptoms further highlight the risks to health and safety faced by bomb technicians operating in tropical locations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents the results from a study of information behaviours (IB), with specific focus on information- organisation-related behaviours conducted as part of a larger daily diary study with 40 participants. The findings indicate that organisation of information in everyday life is problematic due to various factors, specifically temporal and spatial ones, i.e., the passage of time, along with the difference in the physical environment between when the information was organised and when the information is retrieved. These have implications for information organisation schemas, and point toward the need for a context-sensitive model of information organisation that reflects the relation between information objects, information representation, and information users.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Industrialised building (IB) is considered by many to have an important role to play in China's residential construction industry due to its potential for improved quality, productivity, efficiency, safety and sustainability. It is surprising, therefore, that although a large number of construction programmes have been completed in the country in recent years, very few have been built in this manner. Quite why this situation exists is unknown. The well-known problems with IB, such as the constraints placed on designer freedom, may be the cause. It is equally possible that, as is typical with developing countries such as China, cost or government issues dominate. On the other hand, in comparison with other countries, the construction industry in China has been widely criticised for its lack of modernity. Either way, there is an urgent need to assess and understand the hindrances to the adoption of IB in residential construction in order to identify what corrective measures, if any, need to be taken. Towards this end, we first identify a set of critical factors (CFs) for assessing the hindrances to IB adoption in China. This involves the analysis of research data collected by a questionnaire survey of experienced housing developers and professionals working in China's construction industry sector. Fuzzy set theory is used in the selection of the CFs. These CFs comprise, in rank order: higher initial cost; lack of skilled labour in IB; manufacturing capability and involvement issues and product quality problems; lack of supply chain; lack of codes and standards; and lack of government incentives, directives and promotion. The establishment of the CFs provides a basis for local construction sectors to better equip themselves for future implementation of IB. The findings also indicate a current need for formulating improved policies and strategies to encourage the further development of IB in China at present.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the rapid growth of information on the Web, the study of information searching has let to an increased interest. Information behaviour (IB) researchers and information systems (IS) developers are continuously exploring user - Web search interactions to understand and to help users to provide assistance with their information searching. In attempting to develop models of IB, several studies have identified various factors that govern user's information searching and information retrieval (IR), such as age, gender, prior knowledge and task complexity. However, how users' contextual factors, such as cognitive styles, affect Web search interactions has not been clearly explained by the current models of Web Searching and IR. This study explores the influence of users' cognitive styles on their Web search behaviour. The main goal of the study is to enhance Web search models with a better understanding of how these cognitive styles affect Web searching. Modelling Web search behaviour with a greater understanding of user's cognitive styles can help information science researchers and IS designers to bridge the semantic gap between the user and the IS. To achieve the aims of the study, a user study with 50 participants was conducted. The study adopted a mixed method approach incorporating several data collection strategies to gather a range of qualitative and quantitative data. The study utilised pre-search and post-search questionnaires to collect the participants' demographic information and their level of satisfaction about the search interactions. Riding's (1991) Cognitive Style Analysis (CSA) test was used to assess the participants' cognitive styles. Participants completed three predesigned search tasks and the whole user - web search interactions, including thinkaloud, were captured using a monitoring program. Data analysis involved several qualitative and quantitative techniques: the quantitative data gave raise to detailed findings about users' Web searching and cognitive styles, the qualitative data enriched the findings with illustrative examples. The study results provide valuable insights into Web searching behaviour among different cognitive style users. The findings of the study extend our understanding of Web search behaviour and how users search information on the Web. Three key study findings emerged: • Users' Web search behaviour was demonstrated through information searching strategies, Web navigation styles, query reformulation behaviour and information processing approaches while performing Web searches. The manner in which these Web search patterns were demonstrated varied among the users with different cognitive style groups. • Users' cognitive styles influenced their information searching strategies, query reformulation behaviour, Web navigational styles and information processing approaches. Users with particular cognitive styles followed certain Web search patterns. • Fundamental relationships were evident between users' cognitive styles and their Web search behaviours; and these relationships can be illustrated through modelling Web search behaviour. Two models that depict the associations between Web search interactions, user characteristics and users' cognitive styles were developed. These models provide a greater understanding of Web search behaviour from the user perspective, particularly how users' cognitive styles influence their Web search behaviour. The significance of this research is twofold: it will provide insights for information science researchers, information system designers, academics, educators, trainers and librarians who want to better understand how users with different cognitive styles perform information searching on the Web; at the same time, it will provide assistance and support to the users. The major outcomes of this study are 1) a comprehensive analysis of how users search the Web; 2) extensive discussion on the implications of the models developed in this study for future work; and 3) a theoretical framework to bridge high-level search models and cognitive models.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( IND-CCA ), and can be used to construct privacy-preserving protocols such as deniable authentication. Unlike many other security notions, plaintext awareness is very fragile when it comes to differences between the random oracle and standard models; for example, many implications involving PA in the random oracle model are not valid in the standard model and vice versa. Similarly, strategies for proving PA of schemes in one model cannot be adapted to the other model. Existing research addresses PA in detail only in the public key setting. This paper gives the first formal exploration of plaintext awareness in the identity-based setting and, as initial work, proceeds in the random oracle model. The focus is laid mainly on identity-based key encapsulation mechanisms (IB-KEMs), for which the paper presents the first definitions of plaintext awareness, highlights the role of PA in proof strategies of IND-CCA security, and explores relationships between PA and other security properties. On the practical side, our work offers the first, highly efficient, general approach for building IB-KEMs that are simultaneously plaintext-aware and IND-CCA -secure. Our construction is inspired by the Fujisaki-Okamoto (FO) transform, but demands weaker and more natural properties of its building blocks. This result comes from a new look at the notion of γ -uniformity that was inherent in the original FO transform. We show that for IB-KEMs (and PK-KEMs), this assumption can be replaced with a weaker computational notion, which is in fact implied by one-wayness. Finally, we give the first concrete IB-KEM scheme that is PA and IND-CCA -secure by applying our construction to a popular IB-KEM and optimizing it for better performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The notion of identity-based IB cryptography was proposed by Shamir [177] as a specialization of public key PK cryptography which dispensed with the need for cumbersome directories, certificates, and revocation lists.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ambiguity acceptance test is an important quality control procedure in high precision GNSS data processing. Although the ambiguity acceptance test methods have been extensively investigated, its threshold determine method is still not well understood. Currently, the threshold is determined with the empirical approach or the fixed failure rate (FF-) approach. The empirical approach is simple but lacking in theoretical basis, while the FF-approach is theoretical rigorous but computationally demanding. Hence, the key of the threshold determination problem is how to efficiently determine the threshold in a reasonable way. In this study, a new threshold determination method named threshold function method is proposed to reduce the complexity of the FF-approach. The threshold function method simplifies the FF-approach by a modeling procedure and an approximation procedure. The modeling procedure uses a rational function model to describe the relationship between the FF-difference test threshold and the integer least-squares (ILS) success rate. The approximation procedure replaces the ILS success rate with the easy-to-calculate integer bootstrapping (IB) success rate. Corresponding modeling error and approximation error are analysed with simulation data to avoid nuisance biases and unrealistic stochastic model impact. The results indicate the proposed method can greatly simplify the FF-approach without introducing significant modeling error. The threshold function method makes the fixed failure rate threshold determination method feasible for real-time applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter, we explore the 'darker' faces of international business (IB). Over a decade ago, Eden and Len way (2001) raised the need for examining both the 'bright' and the 'dark' side of globalization in order to achieve a better understanding of the concept and of its impact on IB activities. In doing this, they posited the multinational enterprise (MNE) as the 'key agent' and 'f.1ee' of globalization and discussed, primarily, the relationship between MNEs and nation-states as the central interf.1ce of its impact. Additionally, they posited that, by and large, the community of IB scholars positioned themselves at the bright end of the globalization spectrum, seeing it as essentially positive, whilst most non-governmental organizations (NGOs) and international political economy (IPE) academics set themselves at the dark end. Whilst they acknowledged their own 'bright side' tendencies, they called for a more nuanced consideration of MNEs as what they referred to as the Janus bee' of globalization.