150 resultados para 195-1201D
Resumo:
We have tested a methodology for the elimination of the selectable marker gene after Agrobacterium-mediated transformation of barley. This involves segregation of the selectable marker gene away from the gene of interest following co-transformation using a plasmid carrying two T-DNAs, which were located adjacent to each other with no intervening region. A standard binary transformation vector was modified by insertion of a small section composed of an additional left and right T-DNA border, so that the selectable marker gene and the site for insertion of the gene of interest (GOI) were each flanked by a left and right border. Using this vector three different GOIs were transformed into barley. Analysis of transgene inheritance was facilitated by a novel and rapid assay utilizing PCR amplification from macerated leaf tissue. Co-insertion was observed in two thirds of transformants, and among these approximately one quarter had transgene inserts which segregated in the next generation to yield selectable marker-free transgenic plants. Insertion of non-T-DNA plasmid sequences was observed in only one of fourteen SMF lines tested. This technique thus provides a workable system for generating transgenic barley free from selectable marker genes, thereby obviating public concerns regarding proliferation of these genes.
Resumo:
Product Lifecycle Management (PLM) systems are widely used in the manufacturing industry. A core feature of such systems is to provide support for versioning of product data. As workflow functionality is increasingly used in PLM systems, the possibility emerges that the versioning transitions for product objects as encapsulated in process models do not comply with the valid version control policies mandated in the objects’ actual lifecycles. In this paper we propose a solution to tackle the (non-)compliance issues between processes and object version control policies. We formally define the notion of compliance between these two artifacts in product lifecycle management and then develop a compliance checking method which employs a well-established workflow analysis technique. This forms the basis of a tool which offers automated support to the proposed approach. By applying the approach to a collection of real-life specifications in a main PLM system, we demonstrate the practical applicability of our solution to the field.
Resumo:
Purpose: This is one of the first studies to report that the Achenbach internalising scales were much more effective at identifying those with current comorbid depression and anxiety, rather than individual mood disorder. Introduction: The Achenbach behaviour checklists (YSR,YASR) are widely used, low cost screening tools used to assess problem behaviour. Several studies report good association between the checklists and psychiatric diagnoses; although with varying degrees of agreement. Most are cross-sectional studies involving adolescents referred to mental health services; few are in large community-based studies. This study examined the usefulness of the Achenbach internalising scales in the primary screening (both predictive and concurrent)for depression and anxiety. Methods: The sample was 2400 young adults from an Australian population-based prospective birth cohort study. The association between the empirical anxiety and depression scales were individually assessed against DSM-IV depression and anxiety diagnoses. Odds ratios and diagnostic efficiency tests report the findings. Results: Adolescents with internalising symptoms were twice (OR 2.3, 95%CI 1.7 to 3.1) as likely to be diagnosed with later DSM-IV depression. YASR internalising scale predicted DSM-IV mood disorders (depression OR = 6.9, 95% CI 5.0–9.5; anxiety OR = 5.1, 95% CI 3.8–6.7) in the previous 12 months. The internalising scales were much more effective at identifying those with comorbid depression and anxiety. Conclusions: Adolescence and early adulthood are key risk periods for the onset of anxiety and depression. This study found that young people with internalising behaviour problems were more likely to have comorbid depression and anxiety DSM-IV disorder.
Resumo:
Prophylactic surgery including hysterectomy and bilateral salpingo-oophorectomy (BSO) is recommended in BRCA positive women, while in women from the general population, hysterectomy plus BSO may increase the risk of overall mortality. The effect of hysterectomy plus BSO on women previously diagnosed with breast cancer is unknown. We used data from a population-base data linkage study of all women diagnosed with primary breast cancer in Queensland, Australia between 1997 and 2008 (n=21,067). We fitted flexible parametric breast cancer specific and overall survival models with 95% confidence intervals (also known as Royston-Parmar models) to assess the impact of risk-reducing surgery (removal of uterus, one or both ovaries). We also stratified analyses by age 20-49 and 50-79 years, respectively. Overall, 1,426 women (7%) underwent risk-reducing surgery (13% of premenopausal women and 3% of postmenopausal women). No women who had risk-reducing surgery, compared to 171 who did not have risk-reducing surgery developed a gynaecological cancer. Overall, 3,165 (15%) women died, including 2,195 (10%) from breast cancer. Hysterectomy plus BSO was associated with significantly reduced risk of death overall (adjusted HR = 0.69, 95% CI 0.53-0.89; P =0.005). Risk reduction was greater among premenopausal women, whose risk of death halved (HR, 0.45; 95% CI, 0.25-0.79; P < 0.006). This was largely driven by reduction in breast cancer-specific mortality (HR, 0.43; 95% CI, 0.24-0.79; P < 0.006). This population-based study found that risk-reducing surgery halved the mortality risk for premenopausal breast cancer patients. Replication of our results in independent cohorts, and subsequently randomised trials are needed to confirm these findings.
Resumo:
Process improvement has become a number one business priority, and more and more project requests are raised in organizations, seeking approval and resources for process-related projects. Realistically, the total of the requested funds exceeds the allocated budget, the number of projects is higher than the available bandwidth, and only some of these (very often only few) can be supported and most never see any light. Relevant resources are scarce, and correct decisions must be made to make sure that those projects that are of best value are implemented. How can decision makers make the right decision on the following: Which project(s) are to be approved and when to commence work on them? Which projects are most aligned with corporate strategy? How can the project’s value to the business be calculated and explained? How can these decisions be made in a fair, justifiable manner that brings the best results to the company and its stakeholders? This chapter describes a business value scoring (BVS) model that was built, tested, and implemented by a leading financial institution in Australia to address these very questions. The chapter discusses the background and motivations for such an initiative and describes the tool in detail. All components and underlying concepts are explained, together with details on its application. This tool has been successfully implemented in the case organization. The chapter provides practical guidelines for organizations that wish to adopt this approach.
Resumo:
Background Nontuberculous mycobacteria (NTM) are normal inhabitants of a variety of environmental reservoirs including natural and municipal water. The aim of this study was to document the variety of species of NTM in potable water in Brisbane, QLD, with a specific interest in the main pathogens responsible for disease in this region and to explore factors associated with the isolation of NTM. One-litre water samples were collected from 189 routine collection sites in summer and 195 sites in winter. Samples were split, with half decontaminated with CPC 0.005%, then concentrated by filtration and cultured on 7H11 plates in MGIT tubes (winter only). Results Mycobacteria were grown from 40.21% sites in Summer (76/189) and 82.05% sites in winter (160/195). The winter samples yielded the greatest number and variety of mycobacteria as there was a high degree of subculture overgrowth and contamination in summer. Of those samples that did yield mycobacteria in summer, the variety of species differed from those isolated in winter. The inclusion of liquid media increased the yield for some species of NTM. Species that have been documented to cause disease in humans residing in Brisbane that were also found in water include M. gordonae, M. kansasii, M. abscessus, M. chelonae, M. fortuitum complex, M. intracellulare, M. avium complex, M. flavescens, M. interjectum, M. lentiflavum, M. mucogenicum, M. simiae, M. szulgai, M. terrae. M. kansasii was frequently isolated, but M. avium and M. intracellulare (the main pathogens responsible for disease is QLD) were isolated infrequently. Distance of sampling site from treatment plant in summer was associated with isolation of NTM. Pathogenic NTM (defined as those known to cause disease in QLD) were more likely to be identified from sites with narrower diameter pipes, predominantly distribution sample points, and from sites with asbestos cement or modified PVC pipes. Conclusions NTM responsible for human disease can be found in large urban water distribution systems in Australia. Based on our findings, additional point chlorination, maintenance of more constant pressure gradients in the system, and the utilisation of particular pipe materials should be considered.
Resumo:
Tobacco use is a major public health concern, and is associated with a number of mental illnesses as well as increased alcohol/other drug (AOD). Research into treatment for individuals experiencing such comorbidities is limited. Participants (n = 447) were those enrolled in the Depression and Alcohol Integrated and Single-focused Interventions project (Baker et al. 2010), and the Self Help for Alcohol/other drugs and DEpression project (Kay-Lambkin et al. Medical Journal of Australia 195:S44-S50, 2011a, Journal of Medical Internet Research 13(1):e11p11, b), who reported current depression and hazardous alcohol use at entry to the study. Smoking cessation was not targeted in, nor a goal of, treatment. After controlling for socioeconomic variables, tobacco use was not associated with higher levels of depressive symptoms at baseline; however heavy smokers (30+ cigarettes per day) consumed significantly more alcohol at baseline than did non-smokers (13 vs. 9 standard drinks per day). Baseline smoking severity did not impact on depression or alcohol use outcomes over a 12-month period. Reductions in tobacco use between baseline and 3-month follow-up were significantly associated with reductions in depression and alcohol consumption over the same time period. The study results suggest that tobacco use does not interfere with treatment for depression and alcohol use problems, and adds weight to the idea of considering specific treatment for tobacco use in the context of treatment for alcohol/other drug use.
Resumo:
Background: There is a paucity of research assessing health-related quality of life (HRQoL) and self-efficacy in caregivers of relatives with dementia in mainland China. Aims: To compare the level of HRQoL between caregivers and the general population in mainland China and to assess the role of caregiver self-efficacy in the relationship between caregiver social support and HRQoL. Methods: A cross-sectional study was conducted in Shanghai, China. The caregivers were recruited from the outpatient department of a teaching hospital. A total of 195 participants were interviewed, using a survey package including the Chinese version of the 36-Item Short-Form Health Survey (SF-36), demographic data, the variables associated with the impairments of care recipients, perceived social support and caregiver self-efficacy. The caregivers' SF-36 scores were compared with those of the general population in China. Results: The results indicated that the HRQoL of the caregivers was poorer compared with that of the general population when matched for age and gender. Multiple regression analyses revealed that caregiver self-efficacy is a partial mediator between social support and HRQoL, and a partial mediator between behavioral and psychological symptoms of dementia (BPSD) and caregiver mental health. Conclusion: Assisting with managing BPSD and enhancing caregiver self-efficacy can be considered integral parts of interventions to improve caregiver HRQoL.
Resumo:
Poor complaint management may result in organizations losing customers and revenue. Consumers exhibit negative emotional responses when dissatisfied and this may lead to a complaint to a third-party organization. Since little information is available on the role of emotion in the consumer complaint process or how to manage complaints effectively, we offer an emotions perspective by applying Affective Events Theory (AET) to complaint behavior. This study presents the first application of AET in a consumption context and advances a theoretical framework supported by qualitative research for emotional responses to complaints. In contrast to commonly held views on gender and emotion, men as well as women use emotion-focused coping to complain.
Resumo:
This chapter contains sections titled: Introduction Advancing practice in pain management Conclusions References
Resumo:
A largely overlooked aspect of creative design practices is how physical space in design studios plays a role in supporting designers' everyday work. In particular, studio surfaces such as designers' desks, office walls, notice boards, clipboards and drawing boards are full of informative, inspirational and creative artefacts such as, sketches, drawings, posters, story-boards and Post-it notes. Studio surfaces are not just the carriers of information but importantly they are sites of methodic design practices, i.e. they indicate, to an extent, how design is being carried out. This article describes the results of an ethnographic study on the use of workplace surfaces in design studios, from two academic design departments. Using the field study results, the article introduces an idea of ‘artful surfaces’. Artful surfaces emphasise how artfully designers integrate these surfaces into their everyday work and how the organisation of these surfaces comes about helping designers in accomplishing their creative and innovative design practices. Using examples from the field study, the article shows that artful surfaces have both functional and inspirational characteristics. From the field study, three types of artful surfaces are identified: personal; shared; and project-specific. The article suggests that a greater insight into how these artful surfaces are created and used could lead to better design of novel display technologies to support designers' everyday work.
Resumo:
Building a community of shared practice at the classroom level calls for clarity about the important assessment capabilities and dispositions of teachers, especially when teachers are expected to take a direct focus on learning. In this chapter, we present new ways of thinking about teachers’ assessment literacies, offering a formulation of better assessment for the improvement of learning, including three elements, namely (i) assessment criteria and standards; (ii) the teacher’s professional judgment; and (iii) social moderation. The potential of the first element lies in teachers’ classroom practices that deliberately embed assessment criteria and standards in pedagogy in productive ways. The second element involves the engagement of teachers and students in judgment practice, that develops the understanding that judgment involves more than the application of explicit or stated criteria. More fundamental is the matter of how teachers bring to bear stated features of quality and other intellectual and experiential resources in arriving at judgment. That is to say, they range across and orient to explicit (stated), tacit (unstated) and meta-criteria in judgment making. These insights have direct relevance to teachers’ efforts to develop students’ own evaluative experience, especially as this involves students working with stated features of quality for self-assessment and peer-assessment purposes. Further, practices for social moderation are discussed, giving examples of good practice in moderation, how teachers experience moderation and the potential benefits of various types.
Resumo:
Na-dodecylbenzenesulfate (SDBS), a natural anionic surfactant, has been successfully intercalated into a Ca based LDH host structure during tricalcium aluminate hydration in the presence of SDBS aqueous solution (CaAl-SDBS-LDH). The resulting product was characterized by powder X-ray diffraction (XRD), mid-infrared (MIR) spectroscopy combined with near-infrared (NIR) spectroscopy technique, thermal analysis (TG–DTA) and scan electron microscopy (SEM). The XRD results revealed that the interlayer distance of resultant product was expanded to 30.46 Å. MIR combined with NIR spectra offered an effective method to illustrate this intercalation. The NIR spectra (6000–5500 cm−1) displayed prominent bands to expound SDBS intercalated into hydration product of C3A. And the bands around 8300 cm−1 were assigned to the second overtone of the first fundamental of CH stretching vibrations of SDBS. In addition, thermal analysis showed that the dehydration and dehydroxylation took place at ca. 220 °C and 348 °C, respectively. The SEM results appeared approximately hexagonal platy crystallites morphology for CaAl-SDBS-LDH, with particle size smaller and thinner.
Resumo:
The notion of identity-based IB cryptography was proposed by Shamir [177] as a specialization of public key PK cryptography which dispensed with the need for cumbersome directories, certificates, and revocation lists.
Resumo:
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P 1, ..., P n , each with their own private input x i , to compute a function Y = F(x 1, ..., x n ), such that at the end of the protocol, all participants learn the correct value of Y, while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate that in the presence of an active adversary, every function can be computed if and only if the number of corrupted participants, t a , is smaller than n/3. Relaxing the requirement of perfect secrecy and utilizing broadcast channels, one can improve this bound to t a < n/2. All existing MPC protocols assume that uncorrupted participants are truly honest, i.e., they are not even curious in learning other participant secret inputs. Based on this assumption, some MPC protocols are designed in such a way that after elimination of all misbehaving participants, the remaining ones learn all information in the system. This is not consistent with maintaining privacy of the participant inputs. Furthermore, an improvement of the classical results given by Fitzi, Hirt, and Maurer indicates that in addition to t a actively corrupted participants, the adversary may simultaneously corrupt some participants passively. This is in contrast to the assumption that participants who are not corrupted by an active adversary are truly honest. This paper examines the privacy of MPC protocols, and introduces the notion of an omnipresent adversary, which cannot be eliminated from the protocol. The omnipresent adversary can be either a passive, an active or a mixed one. We assume that up to a minority of participants who are not corrupted by an active adversary can be corrupted passively, with the restriction that at any time, the number of corrupted participants does not exceed a predetermined threshold. We will also show that the existence of a t-resilient protocol for a group of n participants, implies the existence of a t’-private protocol for a group of n′ participants. That is, the elimination of misbehaving participants from a t-resilient protocol leads to the decomposition of the protocol. Our adversary model stipulates that a MPC protocol never operates with a set of truly honest participants (which is a more realistic scenario). Therefore, privacy of all participants who properly follow the protocol will be maintained. We present a novel disqualification protocol to avoid a loss of privacy of participants who properly follow the protocol.