116 resultados para safe deposit box


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examined the possible role of Y-box binding protein 1 (YBX1) in prostate cancer aggression and spread. Novel roles were uncovered for YBX1 in the regulation of several genes previously implicated in prostate cancer, as well as showing an effect for YBX1 in increasing tumour cell invasion and movement and reciprocal regulation of androgen-regulated gene networks. In addition, it was found that Y-box 1 regulated several other well-known cancer genes implicated in breast and other cancers. The work performed in this thesis has strengthened the foundations for pursuing YBX1 as a possible central target molecule in prostate cancer therapeutics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The multianion mineral gartrellite PbCu(Fe3+,Cu)(AsO4)2(OH,H2O)2 has been studied by a combination of Raman and infrared spectroscopy. The molecular structure of gartrellite is assessed. Gartrellite is one of the tsumcorite mineral group based upon arsenate and/or sulphate anions. Crystal symmetry is either triclinic in the case of an ordered occupation of two cationic sites, triclinic due to ordering of the H bonds in the case of species with two water molecules per formula unit, or monoclinic in the other cases. Characteristic Raman spectra of the mineral gartrellite enable the assignment of the bands to specific vibrational modes. These spectra are related to the structure of gartrellite. The position of the hydroxyl and water stretching vibrations are related to the strength of the hydrogen bond formed between the OH unit and the AsO3/4 anion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Carbonatites are known to contain the highest concentrations of rare-earth elements (REE) among all igneous rocks. The REE distribution of carbonatites is commonly believed to be controlled by that of the rock forming Ca minerals (i.e., calcite, dolomite, and ankerite) and apatite because of their high modal content and tolerance for the substitution of Ca by light REE (LREE). Contrary to this conjecture, calcite from the Miaoya carbonatite (China), analyzed in situ by laser-ablation inductively-coupled-plasma mass-spectrometry, is characterized by low REE contents (100–260 ppm) and relatively !at chondrite-normalized REE distribution patterns [average (La/Yb)CN=1.6]. The carbonatite contains abundant REE-rich minerals, including monazite and !uorapatite, both precipitated earlier than the REE-poor calcite, and REE-fluorocarbonates that postdated the calcite. Hydrothermal REE-bearing !uorite and barite veins are not observed at Miaoya. The textural and analytical evidence indicates that the initially high concentrations of REE and P in the carbonatitic magma facilitated early precipitation of REE-rich phosphates. Subsequent crystallization of REE-poor calcite led to enrichment of the residual liquid in REE, particularly LREE. This implies that REE are generally incompatible with respect to calcite and the calcite/melt partition coefficients for heavy REE (HREE) are significantly greater than those for LREE. Precipitation of REE-fluorocarbonates late in the evolutionary history resulted in depletion of the residual liquid in LREE, as manifested by the development of HREE-enriched late-stage calcite [(La/Yb)CN=0.7] in syenites associated with the carbonatite. The observed variations of REE distribution between calcite and whole rocks are interpreted to arise from multistage fractional crystallization (phosphates!calcite!REE-!uorocarbonates) from an initially REE-rich carbonatitic liquid.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

I read with great interest the editorial recently published in the British Journal of Anaesthesia that questioned whether sedation by non-anaesthetists is really safe. The authors noted their ‘grave concerns’ about the emerging practice of non-anaesthetist administered propofol (NAAP) during electrophysiology procedures. I offer the following insights into this issue.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Contact lenses are a successful and popular means to correct refractive error and are worn by just under 700,000 Australians1 and approximately 125 million people worldwide. The most serious complication of contact lens wear is microbial keratitis, a potentially sight-threatening corneal infection most often caused by bacteria. Gram-negative bacteria, in particular pseudomonas species, account for the majority of severe bacterial infections. Pathogens such as fungi or amoebae, which feature less often, are associated with significant morbidity. These unusual pathogens have come into the spotlight in recent times with an apparent association with specific lens cleaning solutions...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Prescribing errors remain a significant cause of patient harm. Safe prescribing is not just about writing a prescription, but involves many cognitive and decision-making steps. A set of national prescribing competencies for all prescribers (including non-medical) is needed to guide education and training curricula, assessment and credentialing of individual practitioners. We have identified 12 core competencies for safe prescribing which embody the four stages of the prescribing process – information gathering, clinical decision making, communication, and monitoring and review. These core competencies, along with their learning objectives and assessment methods, provide a useful starting point for teaching safe and effective prescribing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the fact that Australia is a socially progressive country and boasts one of the largest Gender Dysphoria Clinics in the Southern Hemisphere, delivering services for almost four decades, Australian Governments fail to arrive at any consensus on the legal and human rights approaches to Trans*people. The subsequent lack of recognition does little more than increase the levels of frustration of and the continued discrimination to Trans*people, including adverse mental health problems, in this country. The purpose of this presentation is to provide an overview of the Australian systems that govern Trans*people and to identify how Trans*identities are manipulated in our Federal system of government; a system which offers little to protect the human rights of Trans*people. In order to contextualise the Australian situation, I commence with a brief description on the layers of government which will include how Australian Trans*people are currently protected under the law in those jurisdictions. I then present some of the impracticalities endured by the transitioning individual (single or married) including change of documentation and legal gender status before, during and after surgical transition for both those born on and off shore. This presentation will also include discussion of legislation that has been described by Trans*advocates as “Gesture”, “Cart before the Horse” and “Harmful”. I will conclude with a way forward by suggesting the development of a coordinated all of government approach in consultation with key stakeholders for “Trans* Friendly Legislation” to improve the human and legal rights, and ultimately the health and wellbeing of Australian Trans*identities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia is a difficult market for horror movies. Particularly in recent years, Australia has been regarded as a graveyard for many horror films released theatrically. This is not to say that Australians have not enjoyed the occasional scary movie on the big screen. But what types of horror films have been popular with Australian audiences at the box-office remains poorly understood. Horror films revolve around monsters, the fear of death and the transgression of boundaries, and they aim to scare audiences through ‘gross-out’ or ‘creep-out’ factors (some combine both). The former refers to shocking and graphic portrayals of gore and violence – as seen in the sadistic torture of backpackers in Hostel (Eli Roth, 2005), which depicts limbs being hacked off and eyes being cut from nerve endings. The latter refers to the crafting of fear through mood and suspense without explicit bloodshed, achieved brilliantly in The Sixth Sense’s (M Night Shyamalan, 1999) chilling encounters with ‘dead people’. In creep-out films, it is often what viewers don’t see that is most disturbing. Using an analysis of the top fifty films each year at the Australian box office from 1992 to 2012, this article identifies the most successful horror movies over this period to ascertain what types of horror movies – with reference to creep-out and gross-out factors – have been most popular with domestic audiences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction Guidelines existed at the Royal Children’s Hospital (RCH) to direct preoperative/pre-procedural fasting in day patients undergoing general anaesthetic. However audit, risk analyses and a recent research project at the RCH identified prolonged pre-procedural fasting times in children undergoing day surgical and gastroenterology procedures. Aims 1. Reduce median fasting time to <8 hrs for children admitted for a day procedure under general anaesthetic; 2. Identify children at risk of perioperative hypoglycaemia. Methods The study was conducted in 4 phases: 1) revision and implementation of evidence-based perioperative fasting guidelines with staff education relating to these guidelines; 2) cross-sectional descriptive study with day surgical patients (n = 377) requiring preoperative fasting. ‘Normal risk’ and ‘High risk’ groups were identified for fasting hypoglycaemia using an ‘at risk’ checklist. Venous blood glucose (BGL) testing was performed at a) anaesthetic induction; b) prior to first caloric food/fluid postoperatively; 3) chart audit to evaluate efficacy of guidelines and parent information; 4) development of recommendations for clinical practice. Results The median fasting time for children having morning surgery (14 hrs, IQ range 5–22 hrs) was twice as long compared to afternoon lists (7 hrs, IQ range 6–22 hrs) (p < 0.001). Median fasting times were not significantly different between ‘at risk’ and control groups (p = 0.496). However the proportion of children who experienced hypoglycaemia (BGL <3 mmol/L) was greater in the ‘at risk’ group (5, 8%) compared to the control group (18, 4.3%). Although not statistically significant (x2 = 2.254, p = 0.133), ‘at risk’ children appear more likely to experience hypoglycaemia as children in the control group, constituting a clinically significant finding. Conclusion Appropriate identification and management of ‘high risk’ children, will reduce the risk of deleterious sequelae in children undergoing surgical or investigative procedures requiring general anaesthesia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most urban dwelling Australians take secure and safe water supplies for granted. That is, they have an adequate quantity of water at a quality that can be used by people without harm from human and animal wastes, salinity and hardness or pollutants from agriculture and manufacturing industries. Australia wide urban and peri-urban dwellers use safe water for all domestic as well as industrial purposes. However, this is not the situation remote regions in Australia where availability and poor quality water can be a development constraint. Nor is it the case in Sri Lanka where people in rural regions are struggling to obtain a secure supply of water, irrespective of it being safe because of the impact of faecal and other contaminants. The purposes of this paper are to overview: the population and environmental health challenges arising from the lack of safe water in rural and remote communities; response pathways to address water quality issues; and the status of and need for integrated catchment management (ICM) in selected remote regions of Australia and vulnerable and lagging rural regions in Sri Lanka. Conclusions are drawn that focus on the opportunity for inter-regional collaborations between Australia and Sri Lanka for the delivery of safe water through ICM.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

MADS-box genes similar to Arabidopsis SHORT VEGETATIVE PHASE (SVP) have been implicated in the regulation of flowering in annual species and bud dormancy in perennial species. Kiwifruit (Actinidia spp.) are woody perennial vines where bud dormancy and out-growth affect flower development. To determine the role of SVP-like genes in dormancy and flowering of kiwifruit, four MADS-box genes with homology to Arabidopsis SVP, designated SVP1, SVP2, SVP3, and SVP4, have been identified and analysed in kiwifruit and functionally characterized in Arabidopsis. Phylogenetic analysis indicate that these genes fall into different sub-clades within the SVP-like gene group, suggesting distinct functions. Expression was generally confined to vegetative tissues, and increased transcript accumulation in shoot buds over the winter period suggests a role for these genes in bud dormancy. Down-regulation before flower differentiation indicate possible roles as floral repressors. Over-expression and complementation studies in Arabidopsis resulted in a range of floral reversion phenotypes arising from interactions with Arabidopsis MADS-box proteins, but only SVP1 and SVP3 were able to complement the svp mutant. These results suggest that the kiwifruit SVP-like genes may have distinct roles during bud dormancy and flowering.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses the topic of real-time decision making for autonomous city vehicles, i.e., the autonomous vehicles' ability to make appropriate driving decisions in city road traffic situations. The paper explains the overall controls system architecture, the decision making task decomposition, and focuses on how Multiple Criteria Decision Making (MCDM) is used in the process of selecting the most appropriate driving maneuver from the set of feasible ones. Experimental tests show that MCDM is suitable for this new application area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One in eight women living in developed countries will be diagnosed with breast cancer before the age of 85, with the mean age at first diagnosis approximately 60 years. Stage I represents just under 50% of diagnoses, while 45% of cases are diagnosed at later stages (stages II to IV; the remainder being unknown stage). Breast cancer continues to be the most common cause of cancer-related deaths in women , and although survival for women with stage I disease is high (98% 5-year relative survival), survival is significantly lower for those diagnosed with more advanced disease stage (i.e., stages II to IV, 83%; an unknown stage, 50%) .

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Engineering design processes are necessary to attain the requisite standards of integrity for high-assurance safety-related systems. Additionally, human factors design initiatives can provide critical insights that parameterise their development. Unfortunately, the popular perception of human factors as a “forced marriage” between engineering and psychology often provokes views where the ‘human factor’ is perceived as a threat to systems design. Some popular performance-based standards for developing safety-related systems advocate identifying and managing human factors throughout the system lifecycle. However, they also have a tendency to fall short in their guidance on the application of human factors methods and tools, let alone how the outputs generated can be integrated in to various stages of the design process. This case study describes a project that converged engineering with human factors to develop a safety argument for new low-cost railway level crossing technology for system-wide implementation in Australia. The paper enjoins the perspectives of a software engineer and cognitive psychologist and their involvement in the project over two years of collaborative work to develop a safety argument for low-cost level crossing technology. Safety and reliability requirements were informed by applying human factors analytical tools that supported the evaluation and quantification of human reliability where users interfaced with the technology. The project team was confronted with significant challenges in cross-disciplinary engagement, particularly with the complexities of dealing with incongruences in disciplinary language. They were also encouraged to think ‘outside the box’ as to how users of a system interpreted system states and ehaviour. Importantly, some of these states, while considered safe within the boundary of the constituent systems that implemented safety-related functions, could actually lead the users to engage in deviant behaviour. Psychology explained how user compliance could be eroded to levels that effectively undermined levels of risk reduction afforded by systems. Linking the engineering and psychology disciplines intuitively, overall safety performance was improved by introducing technical requirements and making design decisions that minimized the system states and behaviours that led to user deviancy. As a commentary on the utility of transdisciplinary collaboration for technical specification, the processes used to bridge the two disciplines are conceptualised in a graphical model.