381 resultados para limit state
Resumo:
Antigen stimulation of naive T cells in conjunction with strong costimulatory signals elicits the generation of effector and memory populations. Such terminal differentiation transforms naive T cells capable of differentiating along several terminal pathways in response to pertinent environmental cues into cells that have lost developmental plasticity and exhibit heightened responsiveness. Because these cells exhibit little or no need for the strong costimulatory signals required for full activation of naive T cells, it is generally considered memory and effector T cells are released from the capacity to be inactivated. Here, we show that steadystate dendritic cells constitutively presenting an endogenously expressed antigen inactivate fully differentiated memory and effector CD8+ T cells in vivo through deletion and inactivation. These findings indicate that fully differentiated effector and memory T cells exhibit a previously unappreciated level of plasticity and provide insight into how memory and effector T-cell populations may be regulated. © 2008 by The American Society of Hematology.
Resumo:
Introduction The Elaborated Intrusion Theory of Desire holds that desires for functional and dysfunctional goals share a common form. Both are embodied cognitive events, characterised by affective intensity and frequency. Accordingly, we developed scales to measure motivational cognitions for functional goals (Motivational Thought Frequency, MTF; State Motivation, SM), based on the existing Craving Experience Questionnaire (CEQ). When applied to increasing exercise, MTF and SM showed the same three-factor structure as the CEQ (Intensity, Imagery, Availability). The current study tested the internal structure and concurrent validity of the MTF and SM Scales when applied to control of alcohol consumption (MTF-A; SM-A). Methods Participants (N = 417) were adult tertiary students, staff or community members who had recently engaged in high-risk drinking or were currently trying to control alcohol consumption. They completed an online survey comprising the MTF-A, SM-A, Alcohol Use Disorders Identification Test (AUDIT), Readiness to Change Questionnaire (RCQ) and demographics. Results Confirmatory Factor Analysis gave acceptable fit for the MTF-A, but required the loss of one SM-A item, and was improved by intercorrelations of error terms. Higher scores were associated with more severe problems on the AUDIT and with higher Contemplation and Action scores on the RCQ. Conclusions The MTF-A and SM-A show potential as measures of motivation to control drinking. Future research will examine their predictive validity and sensitivity to change. The scales' application to both increasing functional and decreasing dysfunctional behaviours is consistent with EI Theory's contention that both goal types operate in similar ways.
Resumo:
'Warning constraint limit experience' is an installation comprising drawings, a large scale fabric work, and a performative video. This work explores the performative act of drawing and the limits of language and subjectivity. The fabric work acts as a bodily extension that both facilitates and constrains movement during the drawing process and operates as a provisional structure for viewing the work in the gallery. This work was developed and presented at The Lock-Up Cultural Centre, Newcastle NSW in 2011 and revised for the solo exhibition ‘I build my dwelling’, held at Metro Arts in 2012.
Resumo:
In castrate-resistant prostate cancer (CRPC), the prevailing organ for metastasis is bone, where the survival of cancer cells is regulated by the permissive metastatic niche offered by the bone marrow. The tumour microenvironment and cellular interactions with the matrix and bone cells enable metastasis and lead to cancer cells becoming androgen resistant. Hence, 3D models that mimic CRPC in terms of an androgen deprivation state (ADS) are needed to identify the mechanisms for CPRC growth in bone and further develop therapeutic strategies.
Resumo:
The use of social networking has exploded, with millions of people using various web- and mobile-based services around the world. This increase in social networking use has led to user anxiety related to privacy and the unauthorised exposure of personal information. Large-scale sharing in virtual spaces means that researchers, designers and developers now need to re-consider the issues and challenges of maintaining privacy when using social networking services. This paper provides a comprehensive survey of the current state-of-the-art privacy in social networks for both desktop and mobile uses and devices from various architectural vantage points. The survey will assist researchers and analysts in academia and industry to move towards mitigating many of the privacy issues in social networks.