782 resultados para human identity
Resumo:
We examined acute molecular responses in skeletal muscle to repeated sprint and resistance exercise bouts. Six men [age, 24.7 ± 6.3 yr; body mass, 81.6 ± 7.3 kg; peak oxygen uptake, 47 ± 9.9 ml·kg -1 ·min -1; one repetition maximum (1-RM) leg extension 92.2 ± 12.5 kg; means ± SD] were randomly assigned to trials consisting of either resistance exercise (8 × 5 leg extension, 80% 1-RM) followed by repeated sprints (10 × 6 s, 0.75 N·m torque·kg -1) or vice-versa. Muscle biopsies from vastus lateralis were obtained at rest, 15 min after each exercise bout, and following 3-h recovery to determine early signaling and mRNA responses. There was divergent exercise order-dependent phosphorylation of p70 S6K (S6K). Specifically, initial resistance exercise increased S6K phosphorylation (?75% P < 0.05), but there was no effect when resistance exercise was undertaken after sprints. Exercise decreased IGF-I mRNA following 3-h recovery (?50%, P = 0.06) independent of order, while muscle RING finger mRNA was elevated with a moderate exercise order effect (P < 0.01). When resistance exercise was followed by repeated sprints PGC-1? mRNA was increased (REX1-SPR2; P = 0.02) with a modest distinction between exercise orders. Repeated sprints may promote acute interference on resistance exercise responses by attenuating translation initiation signaling and exacerbating ubiquitin ligase expression. Indeed, repeated sprints appear to generate the overriding acute exercise-induced response when undertaking concurrent repeated sprint and resistance exercise. Accordingly, we suggest that sprint-activities are isolated from resistance training and that adequate recovery time is considered within periodized training plans that incorporate these divergent exercise modes.
Resumo:
We examined acute molecular responses in skeletal muscle to divergent exercise stimuli by combining consecutive bouts of resistance and endurance exercise. Eight men [22.9 ± 6.3 yr, body mass of 73.2 ± 4.5 kg, peak O2 uptake (V?O2peak) of 54.0 ± 5.7 ml·kg-1·min-1] were randomly assigned to complete trials consisting of either resistance exercise (8 x 5 leg extension, 80% 1 repetition maximum) followed by a bout of endurance exercise (30 min cycling, 70% V?O2peak) or vice versa. Muscle biopsies were obtained from the vastus lateralis at rest, 15 min after each exercise bout, and after 3 h of passive recovery to determine early signaling and mRNA responses. Phosphorylation of Akt and Akt1Ser473 were elevated 15 min after resistance exercise compared with cycling, with the greatest increase observed when resistance exercise followed cycling (?55%; P < 0.01). TSC2-mTOR-S6 kinase phosphorylation 15 min after each bout of exercise was similar regardless of the exercise mode. The cumulative effect of combined exercise resulted in disparate mRNA responses. IGF-I mRNA content was reduced when cycling preceded resistance exercise (-42%), whereas muscle ring finger mRNA was elevated when cycling was undertaken after resistance exercise (?52%; P < 0.05). The hexokinase II mRNA level was higher after resistance cycling (?45%; P < 0.05) than after cycling-resistance exercise, whereas modest increases in peroxisome proliferator-activated receptor gamma coactivator-1? mRNA did not reveal an order effect. We conclude that acute responses to diverse bouts of contractile activity are modified by the exercise order. Moreover, undertaking divergent exercise in close proximity influences the acute molecular profile and likely exacerbates acute "interference".
Resumo:
Skeletal muscle contraction stimulates multiple signaling cascades that govern a variety of metabolic and transcriptional events. Akt/protein kinase B regulates metabolism and growth/muscle hypertrophy, but contraction effects on this target and its substrates are varied and may depend on the mode of the contractile stimulus. Accordingly, we determined the effects of endurance or resistance exercise on phosphorylation of Akt and downstream substrates in six trained cyclists who performed a single bout of endurance or resistance exercise separated by ?7 days. Muscle biopsies were taken from the vastus lateralis at rest and immediately after exercise. Akt Ser 473 phosphorylation was increased (1.8-fold; P = 0.011) after endurance but was unchanged after resistance exercise. Conversely, Akt Thr 308 phosphorylation was unaltered after either bout of exercise. Several exercise-responsive phosphoproteins were detected by immunoblot analysis with a phospho-Akt substrate antibody. pp160 and pp300 were identified as AS160 and filamin A, respectively, with increased phosphorylation (2.0- and 4.9-fold, respectively; P < 0.05) after endurance but not resistance exercise. In conclusion, AS160 and filamin A may provide an important link to mediate endurance exercise-induced bioeffects in skeletal muscle.
Resumo:
Online storytelling spaces provide young people who live in rural and remote parts of Australia with an opportunity to develop their personal identities and connect and communicate with other young people. The Australian Broadcasting Corporation’s (ABC’s) rural and regional youth network, Heywire, is such a space (http://www.abc.net.au/heywire/). Heywire invites 16-22 year old Australians who identify as ‘rural’ or ‘regional’ to create an online profile and upload stories about their lives in the form of text, audio, video or photographs. Emerging from my PhD project, this paper describes how rural and regional youth perform their identities through creating stories for the Heywire website, addressing notions of individual and social identities as a sub-theme. Compared with their city counterparts, the youth who live in regional towns or isolated properties have fewer opportunities to socialise with other people their own age. Subsequently computer mediated technologies, particularly the internet, can enable this group of people to connect with each other and develop a sense of community. In this paper I outline how these possibilities exist within an online storytelling space. I describe a number of reasons for young people’s story-sharing on the Heywire website in order to demonstrate the potential for spaces such as this to enable isolated youth to experience a sense of connection and belonging, despite geographical dispersion and physical isolation.
Resumo:
Capstone units are generally seen to have three main aims: integrating the program, reflecting on prior learning, and transitioning into the workplace. However, research indicates that most programs do not achieve outcomes in all three areas with Henscheid (2000) revealing that integration is the major goal of many capstone programs. As well, in the accounting education literature there has been little empirical evidence relating to the effectiveness of student learning as a result of implementing a capstone unit. This study reports on the development and implementation of an accountancy capstone unit at the Queensland University of Technology (QUT), which began in 2006. The main features of this capstone unit are: the use of problem-based learning (PBL); integration of the program; the development of a professional identity whereby classes are broken up into groups of a maximum of five students who take on the persona of a professional accounting firm for an entire semester; and the students, acting as professional advisors within that firm, are required to solve a series of unstructured, multi-dimensional accounting problems based on limited given facts. This process is similar to a professional advisor asking a client about the facts relating to the particular problem of the client and then solving the problem. The research was conducted over nine semesters and involved the collection of both quantitative and qualitative data from a student questionnaire. The results indicate that in terms of student perceptions, the capstone unit was very effective in enhancing integration of the program and enhancing professional identity thereby assisting student transition into the professional accounting workplace. Our approach therefore meets two of the three generally accepted aims of a capstone unit. With accounting educators striving to maximise student learning from a finite set of resources, this approach using PBL has resulted in improved learning outcomes for accounting students about to enter the workplace as professionals.
Resumo:
This paper examines the rise in the politicisation of Islam in Malaysia and links it to the othering of the Malaysian Malay. It is my argument that both were “conquering” tools of Malaysia’s “Father of Modernisation”, Mahathir Mohamad, devised to win the support of the Malay Muslim majority in Malaysia. The many awards bestowed on Mahathir obscure the fact that he was instrumental in the systematic erosion of the power and roles of state institutions, especially at the Federal government level. This includes the significant loss of the independence of the Malaysian judiciary. Whilst per capita income in Malaysia may well have increased eight times under his 22-year leadership, this paper asks why is it that the majority of the Malays remain the largest number among the poor and the more disenfranchised of ethnicities in the country? Why have Malay and Muslim women suffered such a rapid decreasing ability to access justice? This paper examines existing research on the social and political changes Malaysia has experienced with Islamisation and under Mahathir’s rule, as well as studies on Malayness, Malay nationalism and Muslim Malay identity formation. The paper elaborates the othering of a majority people, the Malays in Malaysia, and how this othering has brought forth a fast-growing political power in the name of a supremacist Islam, a puritanical Sunni and Malay Islam. Specific events in the rise and rule of Mahathir as Malaysia’s then Prime Minister are reviewed, such as the banning of The Malay Dilemma, and the split in the United Malays National Organisation (UMNO) in 1987. Also examined is the varying emphasis between Muslim and race, and how during Mahathir’s rule, that strong misogynist and patriarchal attitudes took hold in Malay Muslim consciousness, a colonising consciousness that is othering the perceived cultural and genetic “impurities” within the Malay.
Resumo:
A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.
Resumo:
Countless studies have stressed the importance of social identity, particularly its role in various organizational outcomes, yet questions remain as to how identities initially develop, shift and change based on the configuration of multiple, pluralistic relationships grounded in an organizational setting. The interactive model of social identity formation has been proposed recently to explain the internalization of shared norms and values – critical in identity formation – has not received empirical examination. We analyzed multiple sources of data from nine nuclear professionals over three years to understand the construction of social identity in new entrants entering an organization. Informed by our data analyses, we found support for the interactive model and that age and level of experience influenced whether they undertook an inductive or deductive route of the group norm and value internalization. This study represents an important contribution to the study of social identity and the process by which identities are formed, particularly under conditions of duress or significant organizational disruption.
In-side-out : photojournalists from community and mainstream media organisations in Brazil's favelas
Resumo:
New media initiatives in Brazil's capital, Rio de Janeiro, are attempting to change mainstream ideas about favelas (poor districts) and their inhabitants. This thesis focuses on two of these initiatives that are being run by non-government organisations, Viva Favela and Imagens do Povo. This study takes an ethnographic and discursive approach to investigating and comparing two categories of professional photographers to determine how their working practices contribute to empowering the people living in Brazil's favelas. While mainstream photojournalists mainly cover human rights abuses in the favelas, community photographers challenge stereotypes by presenting images of the favelas' everyday life.
Resumo:
The term fashion system describes inter-relationships between production and consumption, illustrating how the production of fashion is a collective activity. For instance, Yuniya Kawamura (2011) notes systems for the production of fashion differ around the globe and are subject to constant change, and Jennifer Craik (1994, 6) draws attention to an ‘array of competing and intermeshing systems cutting across western and non-western cultures. In China, Shanghai’s nascent fashion system seeks to emulate the Eurocentric system of Fashion Weeks and industry support groups. It promises designers a platform for global competition, yet there are tensions from within. Interaction with a fashion system inevitably means becoming validated or legitimised. Legitimisation in turn depends upon gatekeepers who make aesthetic judgments about the status, quality, and cultural value of a designers work (Becker 2008). My paper offers a new perspective on legitimisation that is drawn mainly from my PhD research. I argue that some Chinese fashion designers are on the path to becoming global fashion designers because they have embraced a global aesthetic that resonates with the human condition, rather than the manufactured authenticity of a Eurocentric fashion system that perpetuates endless consumption. In this way, they are able to ‘self-legitimise’. I contend these designers are ‘designers for humans’, because they are able to look beyond the mythology of fashion brands, and the Eurocentric fashion system, where they explore the tensions of man and culture in their practice. Furthermore, their design ethos pursues beauty, truth and harmony in the Chinese philosophical sense, as well as incorporating financial return in a process that is still enacted through a fashion system. Accordingly, cultural tradition, heritage and modernity, while still valuable, have less impact on their practice.
Resumo:
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( IND-CCA ), and can be used to construct privacy-preserving protocols such as deniable authentication. Unlike many other security notions, plaintext awareness is very fragile when it comes to differences between the random oracle and standard models; for example, many implications involving PA in the random oracle model are not valid in the standard model and vice versa. Similarly, strategies for proving PA of schemes in one model cannot be adapted to the other model. Existing research addresses PA in detail only in the public key setting. This paper gives the first formal exploration of plaintext awareness in the identity-based setting and, as initial work, proceeds in the random oracle model. The focus is laid mainly on identity-based key encapsulation mechanisms (IB-KEMs), for which the paper presents the first definitions of plaintext awareness, highlights the role of PA in proof strategies of IND-CCA security, and explores relationships between PA and other security properties. On the practical side, our work offers the first, highly efficient, general approach for building IB-KEMs that are simultaneously plaintext-aware and IND-CCA -secure. Our construction is inspired by the Fujisaki-Okamoto (FO) transform, but demands weaker and more natural properties of its building blocks. This result comes from a new look at the notion of γ -uniformity that was inherent in the original FO transform. We show that for IB-KEMs (and PK-KEMs), this assumption can be replaced with a weaker computational notion, which is in fact implied by one-wayness. Finally, we give the first concrete IB-KEM scheme that is PA and IND-CCA -secure by applying our construction to a popular IB-KEM and optimizing it for better performance.