591 resultados para Identity expression


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a model-based approach to unify clustering and network modeling using time-course gene expression data. Specifically, our approach uses a mixture model to cluster genes. Genes within the same cluster share a similar expression profile. The network is built over cluster-specific expression profiles using state-space models. We discuss the application of our model to simulated data as well as to time-course gene expression data arising from animal models on prostate cancer progression. The latter application shows that with a combined statistical/bioinformatics analyses, we are able to extract gene-to-gene relationships supported by the literature as well as new plausible relationships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several lines of evidence implicate the p38 mitogen-activated protein kinase (p38 MAPK) in the proinflammatory response to bacterial agents and cytokines. Equally, the transcription factor, nuclear factor (NF)-kappaB, is recognized to be a critical determinant of the inflammatory response in intestinal epithelial cells (IECs). However, the precise inter-relationship between the activation of p38 MAPK and activation of the transcription factor NF-kappaB in the intestinal epithelial cell (IEC) system, remains unknown. Here we show that interleukin (IL)-1beta activates all three MAPKs in Caco-2 cells. The production of IL-8 and monocyte chemotactic protein 1 (MCP-1) was attenuated by 50% when these cells were preincubated with the p38 MAPK inhibitor, SB 203580. Further investigation of the NF-kappaB signalling system revealed that the inhibitory effect was independent of the phosphorylation and degradation of IkappaBalpha, the binding partner of NF-kappaB. This effect was also independent of the DNA binding of the p65 Rel A subunit, as well as transactivation, determined by an NF-kappaB luciferase construct, using both SB 203580 and dominant-negative p38 MAPK. Evaluation of IL-8 and MCP-1 RNA messages by reverse transcription-polymerase chain reaction (RT-PCR) revealed that the inhibitory effect of SB 203580 was associated with a reduction in this parameter. Using an IL-8-luciferase promoter construct, an effect of p38 upon its activation by both pharmacological and dominant-negative p38 construct co-transfection was demonstrated. It is concluded that p38 MAPK influences the expression of chemokines in intestinal epithelial cells, through an effect upon the activation of the chemokine promoter, and does not directly involve the activation of the transcription factor NF-kappaB

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conifers are resistant to attack from a large number of potential herbivores or pathogens. Previous molecular and biochemical characterization of selected conifer defence systems support a model of multigenic, constitutive and induced defences that act on invading insects via physical, chemical, biochemical or ecological (multitrophic) mechanisms. However, the genomic foundation of the complex defence and resistance mechanisms of conifers is largely unknown. As part of a genomics strategy to characterize inducible defences and possible resistance mechanisms of conifers against insect herbivory, we developed a cDNA microarray building upon a new spruce (Picea spp.) expressed sequence tag resource. This first-generation spruce cDNA microarray contains 9720 cDNA elements representing c. 5500 unique genes. We used this array to monitor gene expression in Sitka spruce (Picea sitchensis) bark in response to herbivory by white pine weevils (Pissodes strobi, Curculionidae) or wounding, and in young shoot tips in response to western spruce budworm (Choristoneura occidentalis, Lepidopterae) feeding. Weevils are stem-boring insects that feed on phloem, while budworms are foliage feeding larvae that consume needles and young shoot tips. Both insect species and wounding treatment caused substantial changes of the host plant transcriptome detected in each case by differential gene expression of several thousand array elements at 1 or 2 d after the onset of treatment. Overall, there was considerable overlap among differentially expressed gene sets from these three stress treatments. Functional classification of the induced transcripts revealed genes with roles in general plant defence, octadecanoid and ethylene signalling, transport, secondary metabolism, and transcriptional regulation. Several genes involved in primary metabolic processes such as photosynthesis were down-regulated upon insect feeding or wounding, fitting with the concept of dynamic resource allocation in plant defence. Refined expression analysis using gene-specific primers and real-time PCR for selected transcripts was in agreement with microarray results for most genes tested. This study provides the first large-scale survey of insect-induced defence transcripts in a gymnosperm and provides a platform for functional investigation of plant-insect interactions in spruce. Induction of spruce genes of octadecanoid and ethylene signalling, terpenoid biosynthesis, and phenolic secondary metabolism are discussed in more detail.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Melanoma is one of the most aggressive cancers affecting humans. Although early melanomas are curable with surgical excision, metastatic melanomas are associated with high mortality. The mechanism of melanoma development, progression, and metastasis is largely unknown. In order to uncover genes unique to melanoma cells, we used high-density DNA microarrays to examine the gene expression profiles of metastatic melanoma nodules using benign nevi as controls. Over 190 genes were significantly overexpressed in metastatic melanomas compared with normal nevi by at least 2-fold. One of the most abundantly expressed genes in metastatic melanoma nodules is osteopontin (OPN). Immunohistochemistry staining on tissue microarrays and individual skin biopsies representing different stages of melanoma progression revealed that OPN expression is first acquired at the step of melanoma tissue invasion. In addition, blocking of OPN expression by RNA interference reduced melanoma cell numbers in vitro. Our observations suggest that OPN may be acquired early in melanoma development and progression, and may enhance tumor cell growth in invasive melanoma.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Immediate indefeasibility is the cornerstone of the Torrens system of land registration. However, when combined with the apparent ease in which forged mortgages become registered, the operation of this doctrine can come into question. This article seeks to argue that, rather than question indefeasibility, the focus should be on the verification of identity of parties to land transactions. Whilst no system can ever be infallible, it is suggested that by correctly imposing the responsibility for identity verification on the appropriate individual, the Torrens system can retain immediate indefeasibility as its paramount principle, yet achieve the optimum level of fairness in terms of allocation of responsibility and loss. With the dawn of a new era of electronic conveyancing about to begin, the framework suggested here provides a model for minimising the risks of forged mortgages and appropriately allocating the loss.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This book (256 pages, written in Korean) is a critical essay that reviews, questions, and criticises Korean and Eastern immigrants’ thinking and behaviour styles in Australia from their cultural perspectives, and discuss and proposes a creative cultural dimension for their better life in a multicultural context. Multiculturalism is not supportive of Eastern cultures because of individualistic collection of cultures, while transculturalism facilitates nurture of their culture in a community-oriented way within multicultural circumstances. Korean and Eastern immigrants, sharing oriental cultural systems and values, should approach to the Australian multicultural context with transculturalism which allows creating new cultural values in collaboration with and by participation into local communities. ------------------------------------------------------------ Many Eastern immigrants live in their own ethnic communities without or less interacting with Australian (communities). The author defines this phenomenon as “reverse immigration”. Reverse immigration refers to re-immigrating to their ethnic community in Australia or to their birth country despite they did not anticipate that this would happen to them before immigration to Australia. The author argues that Easterners’ collectivistic culture often devalues individuality and vice versa. Cultural clash between West and East often forces the immigrants to choose reverse immigration because of their lack of understanding of Western culture and their cultural characteristics such as low individuality, high power distance, and high uncertainty avoidance. For example, a vague boundary between individualist and collectivist in a collectivistic context (within their ethnic group) often leads to maladjustment to local communities and enhancement of cultural conservatism. The author proposes that the cultural clash can be overcome by cross-cultural activities named “transculturalism”. To Eastern immigrants, transculturalism can be achieved by acculturation of their two predominant cultures, the third-person perspective and generalised others. In a multicultural context, the former refers to the ability to share another person's feelings and emotions as if they were your own, and the latter does the ability to manage community and public expectations. When both cultural values are used for quality interactions between East and West, they allow Eastern immigrants to be more creative and critical and Australian to be more socially inclusive and culturally tolerant. With these discussions, the author discusses cultural differences throughout the book with four topics (chapters) and proposes transculturalism as a solution to the reverse immigration. ------------------------------------------------------------ Chapter 1 criticises Koreans’ attitudes and methods towards learning English that is less pragmatic and practical, but more likely to be a scholarly study. The author explains that Koreans’ non-pragmatic towards learning English has been firmly built based on their traditional systems and values that Koreans view English as a discipline and an aim of academic achievements rather than a means of communication. Within their cultural context, English can be perceived as more than a language, but something like vastly superior to their language and culture. Their collectivistic culture regards English as an unreachable and heterogeneous one that may threaten their cultural identity, so that “scholarly studying” is only the way to achieve (not learn) it. This discourages the immigrants to engage and involve in daily dialogues by “using” English as a second language. The author further advises the readers to be aware of Eastern collectivistic culture in communication and interaction that sometimes completely reverses private and public topics in a Western context. This leads them to feel that they have no content to talk to natives. ------------------------------------------------------------ Chapter 2 compares between Korea and Australia in terms of their educational systems and values, and proposes how Eastern overseas students can achieve critical and creative thinking within a Western educational setting. Interestingly, this chapter includes an explanation of why Eastern overseas students easily fail assessments including essay writing, oral presentations and discussions. One of the reasons the author explains is that Eastern students are not familiar to criticise others and think creatively, especially when they recognise that their words and ideas may harm the collectivistic harmony. Western educational systems focuses on enhancement of individuality such as self-confidence, self-esteem, and self-expression, while Eastern educational systems foster group-oriented values such as interpersonal relationship, and strong moral and spiritual values. Yet, the author argues that the collectivistic approach to criticism and creativity is often more critical and creative than Western individuals when they know what they are supposed to do for a group (or a community). Therefore, Eastern students need to think their cultural merits and demerits by using an individual perspective rather than generalised others’ perspective. The latter often discourages individual participation in a community, and the generalised others in a Western culture is weaker than Eastern. Furthermore, Western educational systems do not educate students to transform (loose) their individuality to fit into a group or a community. Rather they cultivate individuality for community prosperity. ------------------------------------------------------------ Chapter 3 introduces various cases of reverse immigration in workplaces that many immigrants return to their country or their ethnic community after many trials for acculturation. Reverse immigration is unexpected and not planned before immigration, so that its emotional embarrassment increases such severe social loneliness. Most Eastern immigrant workers have tried to adjust themselves in this new cultural environment at the early stages of immigration. However, their cultural features of collectivism, high power distance, high uncertainty avoidance, and long-term oriented cultures suppress individual initiative and eliminate the space for experiments in ways of acculturation. The author argues that returning to their ethnic community (physically and psychologically) leads to two significant problems: their distorted parenting and becoming more conservatives. The former leads the first generation of immigrants to pressure their children to pursue extrinsic or materialist values, such as financial success, fame and physical appearance, rather than on intrinsic values, while the latter refers to their isolated conservative characters because of their remoteness from the changes of their own country. The author also warns that their ethnic and religious groups actively strengthens immigrants’ social loneliness and systematically discourages immigrants’ interests and desire to be involving into local communities. The ethnic communities and leaders have not been interacting with Australian local communities and, as a result, are eager to conserve outdated cultural systems values. Even they have a tendency to weed out those people who wish to settle down within Australian local communities. They believe that those people can threaten their community’s survival and continuity. ------------------------------------------------------------ Chapter 4 titled multiculturalism argues that Korean and Eastern immigrants should more precisely understand Australia as a multicultural society in a way of collaboratively creating new cultural values. The author introduces multiculturalism with its definitions and history in Australia and argues the limitations of multiculturalism from an Easterner’s perspective. With well known tragedies of the second generations of U.S. immigrants, Cho Seung-Hui, a university student, massacred 32 people on the Virginia Tech before committing suicide and Hidal Hassan, an Army psychiatrist, killed 13 people at Fort Hood and the responses of ethnic community, the author explains that their mental illness may be derived from their parents’ (or ethnic group) culturally isolated attitude and socially static viewpoint of U.S. (Western system and values). The author insists that multiculturalism may restrict Eastern immigrants’ engagement and involvement in local communities. Multiculturalism has been systematically and historically developed based on Western systems and cultural values. In other words, multiculturalism requires high self-confidence and self-esteem that Eastern immigrants less prioritise them. It has been generally known that Easterners put more weight on human relationship than Westerners, but the author claims that this is not true. Within an individualistic culture, Westerners are more interested in building person-to-person connections and relationships. While Easterners are more interested in how individuals can achieve a sense of belonging within a group and a community. Therefore, multiculturalism is an ideology which forces Eastern immigrants to discard their strong desire to be part of a group and does not give a sense of belonging. In a consequence, the author advises that Eastern immigrants should aim towards “transculturalism” which allows them to actively participate in and contribute to their multicultural community. Transculturalism does not ask Easterners to discard their cultural values, but enables them to be a collectivistic individualist (a community leader) who is capable of developing new cultural values in a more creative and productive way. Furthermore, transculturalism encourages Western Australians in a multicultural context to collaborate with ethnic minorities to build a better community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Details of a project which fictionalises the oral history of the life of the author's polio-afflicted grandmother Beth Bevan and her experiences at a home for children with disabilities are presented. The speech and language patterns recognised in the first person narration are described, as also the sense of voice and identity communicated through the oral history.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Systemic acquired resistance (SAR) is a broad-spectrum resistance in plants that involves the upregulation of a battery of pathogenesis-related (PR) genes. NPR1 is a key regulator in the signal transduction pathway that leads to SAR. Mutations in NPR1 result in a failure to induce PR genes in systemic tissues and a heightened susceptibility to pathogen infection, whereas overexpression of the NPR1 protein leads to increased induction of the PR genes and enhanced disease resistance. We analyzed the subcellular localization of NPR1 to gain insight into the mechanism by which this protein regulates SAR. An NPR1–green fluorescent protein fusion protein, which functions the same as the endogenous NPR1 protein, was shown to accumulate in the nucleus in response to activators of SAR. To control the nuclear transport of NPR1, we made a fusion of NPR1 with the glucocorticoid receptor hormone binding domain. Using this steroid-inducible system, we clearly demonstrate that nuclear localization of NPR1 is essential for its activity in inducing PR genes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this study is to contribute to the cross-disciplinary body of literature of identity and organisational culture. This study empirically investigated the Hatch and Schultz (2002) Organisational Identity Dynamics (OID) model to look at linkages between identity, image, and organisational culture. This study used processes defined in the OID model as a theoretical frame by which to understand the relationships between actual and espoused identity manifestations across visual identity, corporate identity, and organisational identity. The linking processes of impressing, mirroring, reflecting, and expressing were discussed at three unique levels in the organisation. The overarching research question of How does the organisational identity dynamics process manifest itself in practice at different levels within an organisation? was used as a means of providing empirical understanding to the previously theoretical OID model. Case study analysis was utilised to provide exploratory data across the organisational groups of: Level A - Senior Marketing and Corporate Communications Management, Level B - Marketing and Corporate Communications Staff, and Level C - Non-Marketing Managers and Employees. Data was collected via 15 in-depth interviews with documentary analysis used as a supporting mechanism to provide triangulation in analysis. Data was analysed against the impressing, mirroring, reflecting, and expressing constructs with specific criteria developed from literature to provide a detailed analysis of each process. Conclusions revealed marked differences in the ways in which OID processes occurred across different levels with implications for the ways in which VI, CI, and OI interact to develop holistic identity across organisational levels. Implications for theory detail the need to understand and utilise cultural understanding in identity programs as well as the value in developing identity communications which represent an actual rather than an espoused position.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This document outlines the system submitted by the Speech and Audio Research Laboratory at the Queensland University of Technology (QUT) for the Speaker Identity Verification: Application task of EVALITA 2009. This competitive submission consisted of a score-level fusion of three component systems; a joint-factor analysis GMM system and two SVM systems using GLDS and GMM supervector kernels. Development evaluation and post-submission results are presented in this study, demonstrating the effectiveness of this fused system approach. This study highlights the challenges associated with system calibration from limited development data and that mismatch between training and testing conditions continues to be a major source of error in speaker verification technology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In automatic facial expression detection, very accurate registration is desired which can be achieved via a deformable model approach where a dense mesh of 60-70 points on the face is used, such as an active appearance model (AAM). However, for applications where manually labeling frames is prohibitive, AAMs do not work well as they do not generalize well to unseen subjects. As such, a more coarse approach is taken for person-independent facial expression detection, where just a couple of key features (such as face and eyes) are tracked using a Viola-Jones type approach. The tracked image is normally post-processed to encode for shift and illumination invariance using a linear bank of filters. Recently, it was shown that this preprocessing step is of no benefit when close to ideal registration has been obtained. In this paper, we present a system based on the Constrained Local Model (CLM) which is a generic or person-independent face alignment algorithm which gains high accuracy. We show these results against the LBP feature extraction on the CK+ and GEMEP datasets.