466 resultados para Inc.
Resumo:
Successful wound repair and normal turnover of the extracellular matrix relies on a balance between matrix metalloproteinases (MMPs) and their natural inhibitors (the TIMPs). When over-expression of MMPs and abnormally high levels of activation or low expression of TIMPs are encountered, excessive degradation of connective tissue and the formation of chronic ulcers can occur. One strategy to rebalance MMPs and TIMPs is to use inhibitors. We have designed a synthetic pseudopeptide inhibitor with an amine linker group based on a known high-affinity peptidomimetic MMP inhibitor have demonstrated inhibition of MMP-1, -2, -3 and -9 activity in standard solutions. The inhibitor was also tethered to a polyethylene glycol hydrogel using a facile reaction between the linker unit on the inhibitor and the hydrogel precursors. After tethering, we observed inhibition of the MMPs although there was an increase in the IC50s which was attributed to poor diffusion of the MMPs into the hydrogels, reduced activity of the tethered inhibitor or incomplete incorporation of the inhibitor into the hydrogels. When the tethered inhibitors were tested against chronic wound fluid we observed significant inhibition in proteolytic activity suggesting our approach may prove useful in rebalancing MMPs within chronic wounds.
Resumo:
Background: Topical administration of growth factors (GFs) has displayed some potential in wound healing, but variable efficacy, high doses and costs have hampered their implementation. Moreover, this approach ignores the fact that wound repair is driven by interactions between multiple GFs and extracellular matrix (ECM) proteins. The Problem: Deep dermal partial thickness burn (DDPTB) injuries are the most common burn presentation to pediatric hospitals and also represent the most difficult burn injury to manage clinically. DDPTB often repair with a hypertrophic scar. Wounds that close rapidly exhibit reduced scarring. Thus treatments that shorten the time taken to close DDTPB’s may coincidently reduce scarring. Basic/Clinical Science Advances: We have observed that multi-protein complexes comprised of IGF and IGF-binding proteins bound to the ECM protein vitronectin (VN) significantly enhance cellular functions relevant to wound repair in human skin keratinocytes. These responses require activation of both the IGF-1R and the VN-binding αv integrins. We have recently evaluated the wound healing potential of these GF:VN complexes in a porcine model of DDTPB injury. Clinical Care Relevance: This pilot study demonstrates that GF:VN complexes hold promise as a wound healing therapy. Enhanced healing responses were observed after treatment with nanogram doses of the GF:VN complexes in vitro and in vivo. Critically healing was achieved using substantially less GF than studies in which GFs alone have been used. Conclusion: These data suggest that coupling GFs to ECM proteins, such as VN, may ultimately prove to be an improved technique for the delivery of novel GF-based wound therapies.
Resumo:
This paper proposes the use of optical flow from a moving robot to provide force feedback to an operator’s joystick to facilitate collision free teleoperation. Optical flow is measured by a pair of wide angle cameras on board the vehicle and used to generate a virtual environmental force that is reflected to the user through the joystick, as well as feeding back into the control of the vehicle. We show that the proposed control is dissipative and prevents the vehicle colliding with the environment as well as providing the operator with a natural feel for the remote environment. Experimental results are provided on the InsectBot holonomic vehicle platform.
Resumo:
To date, most quad-rotor aerial robots have been based on flying toys. Although such systems can be used as prototypes, they are not sufficiently robust to serve as experimental robotics platforms. We have developed the X-4 Flyer, a quad-rotor robot using custom-built chassis and avionics with off-the-shelf motors and batteries, to be a highly reliable experimental platform. The vehicle uses tuned plant dynamics with an onboard embedded attitude controller to stabilise flight. A linear SISO controller was designed to regulate flyer attitude.
Resumo:
Standardization is critical to scientists and regulators to ensure the quality and interoperability of research processes, as well as the safety and efficacy of the attendant research products. This is perhaps most evident in the case of “omics science,” which is enabled by a host of diverse high-throughput technologies such as genomics, proteomics, and metabolomics. But standards are of interest to (and shaped by) others far beyond the immediate realm of individual scientists, laboratories, scientific consortia, or governments that develop, apply, and regulate them. Indeed, scientific standards have consequences for the social, ethical, and legal environment in which innovative technologies are regulated, and thereby command the attention of policy makers and citizens. This article argues that standardization of omics science is both technical and social. A critical synthesis of the social science literature indicates that: (1) standardization requires a degree of flexibility to be practical at the level of scientific practice in disparate sites; (2) the manner in which standards are created, and by whom, will impact their perceived legitimacy and therefore their potential to be used; and (3) the process of standardization itself is important to establishing the legitimacy of an area of scientific research.
Resumo:
This paper proposes a security architecture for the basic cross indexing systems emerging as foundational structures in current health information systems. In these systems unique identifiers are issued to healthcare providers and consumers. In most cases, such numbering schemes are national in scope and must therefore necessarily be used via an indexing system to identify records contained in pre-existing local, regional or national health information systems. Most large scale electronic health record systems envisage that such correlation between national healthcare identifiers and pre-existing identifiers will be performed by some centrally administered cross referencing, or index system. This paper is concerned with the security architecture for such indexing servers and the manner in which they interface with pre-existing health systems (including both workstations and servers). The paper proposes two required structures to achieve the goal of a national scale, and secure exchange of electronic health information, including: (a) the employment of high trust computer systems to perform an indexing function, and (b) the development and deployment of an appropriate high trust interface module, a Healthcare Interface Processor (HIP), to be integrated into the connected workstations or servers of healthcare service providers. This proposed architecture is specifically oriented toward requirements identified in the Connectivity Architecture for Australia’s e-health scheme as outlined by NEHTA and the national e-health strategy released by the Australian Health Ministers.
Resumo:
Emerging evidence supports that prostate cancer originates from a rare sub-population of cells, namely prostate cancer stem cells (CSCs). Conventional therapies for prostate cancer are believed to mainly target the majority of differentiated tumor cells but spare CSCs, which may account for the subsequent disease relapse after treatment. Therefore, successful elimination of CSCs may be an effective strategy to achieve complete remission from this disease. Gamma-tocotrienols (-T3) is one of the vitamin-E constituents which have been shown to have anticancer effects against a wide-range of human cancers. Recently, we have reported that -T3 treatment not only inhibits prostate cancer cell invasion but also sensitizes the cells to docetaxel-induced apoptosis, suggesting that -T3 may be an effective therapeutic agent against advanced stage prostate cancer. Here, we demonstrate for the first time that -T3 can down-regulate the expression of prostate CSC markers (CD133/CD44) in androgen independent (AI) prostate cancer cell lines (PC-3 & DU145), as evident from western blotting analysis. Meanwhile, the spheroid formation ability of the prostate cancer cells was significantly hampered by -T3 treatment. In addition, pre-treatment of PC-3 cells with -T3 was found to suppress tumor initiation ability of the cells. More importantly, while CD133-enriched PC-3 cells were highly resistant to docetaxel treatment, these cells were as sensitive to -T3 treatment as the CD133-depleted population. Our data suggest that -T3 may be an effective agent in targeting prostate CSCs, which may account for its anticancer and chemosensitizing effects reported in previous studies.
Resumo:
Historically, distance education consisted of a combination of face-to-face blocks of time and surface mailed packages. However, advances in information technology literacy and the abundance of personal computers has placed e-learning in increased demand. The authors describe the planning, implementation, and evaluation of the blending of e-learning with face-to-face education in the postgraduate nursing forum. Experiences of this particular student group are also discussed.
Resumo:
This paper introduces a novel technique to directly optimise the Figure of Merit (FOM) for phonetic spoken term detection. The FOM is a popular measure of sTD accuracy, making it an ideal candiate for use as an objective function. A simple linear model is introduced to transform the phone log-posterior probabilities output by a phe classifier to produce enhanced log-posterior features that are more suitable for the STD task. Direct optimisation of the FOM is then performed by training the parameters of this model using a non-linear gradient descent algorithm. Substantial FOM improvements of 11% relative are achieved on held-out evaluation data, demonstrating the generalisability of the approach.
Resumo:
OBJECTIVE Malnutrition is common among peritoneal dialysis (PD) patients. Reduced nutrient intake contributes to this. It has long been assumed that this reflects disturbed appetite. We set out to define the appetite profiles of a group of PD patients using a novel technique. DESIGN Prospective, cross-sectional comparison of PD patients versus controls. SETTING Teaching hospital dialysis unit. PATIENTS 39 PD patients and 42 healthy controls. INTERVENTION Visual analog ratings were recorded at hourly intervals to generate daily profiles for hunger and fullness. Summary statistics were generated to compare the groups. Food intake was measured using 3-day dietary records. MAIN OUTCOME MEASURES Hunger and fullness profiles. Derived hunger and fullness scores. RESULTS Controls demonstrated peaks of hunger before mealtimes, with fullness scores peaking after meals. The PD profiles had much reduced premeal hunger peaks. A postmeal reduction in hunger was evident, but the rest of the trace was flat. The PD fullness profile was also flatter than in the controls. Mean scores were similar despite the marked discrepancy in the profiles. The PD group had lower peak hunger and less diurnal variability in their hunger scores. They also demonstrated much less change in fullness rating around mealtimes, while the mean and peak fullness scores were little different. The reported nutrient intake was significantly lower for PD. CONCLUSION The data suggest that PD patients normalize their mean appetite perception at a lower level of nutrient intake than controls, suggesting that patient-reported appetite may be misleading in clinical practice. There is a loss of the usual daily variation for the PD group, which may contribute to their reduced food intake. The technique described here could be used to assess the impact of interventions upon the abnormal PD appetite profile.
Resumo:
This paper reports on students’ ability to decode mathematical graphics. The findings were: (a) some items showed an insignificant improvement over time; (b) success involves identifying critical perceptual elements in the graphic and incorporating these elements into a solution strategy; and (c) the optimal strategy capitalises on how information is encoded in the graphic. Implications include a need for teachers to be proactive in supporting students’ to develop their graphical knowledge and an awareness that knowledge varies substantially across students.
Resumo:
In the structure of title compound, 2(C3H5N2^+^) C~6~H~8~O~8~^2-^ . 2H~2~O the galactarate dianions have crystallographic inversion symmetry and together with the water molecules of solvation form hydrogen-bonded sheet substructures which extend along the (110) planes in the unit cell. The imidazolium cations link these sheets peripherally down c through carboxyl O...H-N,N'---H...O(hydroxyl) bridges, giving a three-dimensional framework structure.
Resumo:
A number of series of poly(acrylic acids) (PAA) of differing end-groups and molecular mass were used to study the inhibition of calcium oxalate crystallization. The effects of the end-group on crystal speciation and morphology were significant and dramatic, with hexyl-isobutyrate end groups giving preferential formation of calcium oxalate dihydrate (COD) rather than the more stable calcium oxalate monohydrate (COM), while both more hydrophobic end-groups and less-hydrophobic end groups led predominantly to formation of the least thermodynamically stable form of calcium oxalate, calcium oxalate trihydrate. Conversely, molecular mass had little impact on calcium oxalate speciation or crystal morphology. It is probable that the observed effects are related to the rate of desorption of the PAA moiety from the crystal (lite) surfaces and that the results point to a major role for end-group as well as molecular mass in controlling desorption rate.
Resumo:
To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on lin- ear feedback shift registers (LFSRs). In this paper, we extend algebraic analysis to non-LFSR based stream ciphers. Specifically, we perform an algebraic analysis on the RC4 family of stream ciphers, an example of stream ciphers based on dynamic tables, and inves- tigate its implications to potential algebraic attacks on the cipher. This is, to our knowledge, the first pa- per that evaluates the security of RC4 against alge- braic attacks through providing a full set of equations that describe the complex word manipulations in the system. For an arbitrary word size, we derive alge- braic representations for the three main operations used in RC4, namely state extraction, word addition and state permutation. Equations relating the inter- nal states and keystream of RC4 are then obtained from each component of the cipher based on these al- gebraic representations, and analysed in terms of their contributions to the security of RC4 against algebraic attacks. Interestingly, it is shown that each of the three main operations contained in the components has its own unique algebraic properties, and when their respective equations are combined, the resulting system becomes infeasible to solve. This results in a high level of security being achieved by RC4 against algebraic attacks. On the other hand, the removal of an operation from the cipher could compromise this security. Experiments on reduced versions of RC4 have been performed, which confirms the validity of our algebraic analysis and the conclusion that the full RC4 stream cipher seems to be immune to algebraic attacks at present.
Resumo:
This book disseminates current information pertaining to the modulatory effects of foods and other food substances on behavior and neurological pathways and, importantly, vice versa. This ranges from the neuroendocrine control of eating to the effects of life-threatening disease on eating behavior. The importance of this contribution to the scientific literature lies in the fact that food and eating are an essential component of cultural heritage but the effects of perturbations in the food/cognitive axis can be profound. The complex interrelationship between neuropsychological processing, diet, and behavioral outcome is explored within the context of the most contemporary psychobiological research in the area. This comprehensive psychobiology- and pathology-themed text examines the broad spectrum of diet, behavioral, and neuropsychological interactions from normative function to occurrences of severe and enduring psychopathological processes