976 resultados para Identification numbers, Personal.
Resumo:
Multinucleated giant cells and osteoclasts arise through the fusion of mononuclear phagocyte precursors. To elucidate the mechanism by which cells of monocytic lineage fuse and differentiate into giant cells and osteoclasts, we hypothesized that, as with other cell fusion events, specific surface molecules mediate the adhesion/fusion process. It has been observed that macrophages can be induced to fuse with one another in response to specific stimuli or when placed in a specific microenvironment. The formation of giant cells is primarily associated with chronic inflammatory reactions and tumors, while osteoclasts differentiate on bone which they resorb. The fact that, under normal conditions, macrophages and monocytes fail to fuse in regions and tissues where they are present in large numbers suggests the regulated and transient expression of potential fusion molecules. To identify such a fusion-associated molecule, we established a macrophage fusion assay and generated monoclonal antibodies (mAbs) that alter the fusion of macrophages in vitro. We selected four mAbs that each had the ability to block the fusion but not the aggregation of macrophages in vitro. All four antibodies recognize surface proteins of 150 kDa. The expression of the antigens recognized by all four mAbs is restricted to macrophages that have been induced to fuse in vitro and in vivo and is inducible, transient, and regulated, as neither nonfusing macrophages nor macrophages fused in vitro express these antigens. These results support the hypothesis that macrophage fusion is mediated by specific fusion/adhesion molecules and also provide a means to study the molecular mechanisms of macrophage fusion.
Resumo:
To examine the role of complement components as regulators of the expression of endothelial adhesive molecules in response to immune complexes (ICs), we determined whether ICs stimulate both endothelial adhesiveness for leukocytes and expression of E-selectin and intercellular and vascular cell adhesion molecules 1 (ICAM-1 and VCAM-1). We found that ICs [bovine serum albumin (BSA)-anti-BSA] stimulated endothelial cell adhesiveness for added leukocytes in the presence of complement-sufficient normal human serum (NHS) but not in the presence of heat-inactivated serum (HIS) or in tissue culture medium alone. Depletion of complement component C3 or C8 from serum did not prevent enhanced endothelial adhesiveness stimulated by ICs. In contrast, depletion of complement component C1q markedly inhibited IC-stimulated endothelial adhesiveness for leukocytes. When the heat-labile complement component C1q was added to HIS, the capacity of ICs to stimulate endothelial adhesiveness for leukocytes was completely restored. Further evidence for the possible role of C1q in mediating the effect of ICs on endothelial cells was the discovery of the presence of the 100- to 126-kDa C1q-binding protein on the surface of endothelial cells (by cytofluorography) and of message for the 33-kDa C1q receptor in resting endothelial cells (by reverse transcription-PCR). Inhibition of protein synthesis by cycloheximide blocked endothelial adhesiveness for leukocytes stimulated by either interleukin 1 or ICs in the presence of NHS. After stimulation with ICs in the presence of NHS, endothelial cells expressed increased numbers of adhesion molecules (E-selectin, ICAM-1, and VCAM-1). Endothelial expression of adhesion molecules mediated, at least in part, endothelial adhesiveness for leukocytes, since leukocyte adhesion was blocked by monoclonal antibodies directed against E-selectin. These studies show that ICs stimulate endothelial cells to express adhesive proteins for leukocytes in the presence of a heat-labile serum factor. That factor appears to be C1q.
Resumo:
BACKGROUND With increasing demand for umbilical cord blood units (CBUs) with total nucleated cell (TNC) counts of more than 150 × 10(7) , preshipping assessment is mandatory. Umbilical cord blood processing requires aseptic techniques and laboratories with specific air quality and cleanliness. Our aim was to establish a fast and efficient method for determining TNC counts at the obstetric ward without exposing the CBU to the environment. STUDY DESIGN AND METHODS Data from a total of 151 cord blood donations at a single procurement site were included in this prospective study. We measured TNC counts in cord blood aliquots taken from the umbilical cord (TNCCord ), from placenta (TNCPlac ), and from a tubing segment of the sterile collection system (TNCTS ). TNC counts were compared to reference TNC counts in the CBU which were ascertained at the cord blood bank (TNCCBU ). RESULTS TNCTS counts (173 ± 33 × 10(7) cells; calculated for 1 unit) correlated fully with the TNCCBU reference counts (166 ± 33 × 10(7) cells, Pearson's r = 0.97, p < 0.0001). In contrast, TNCCord and TNCPlac counts were more disparate from the reference (r = 0.92 and r = 0.87, respectively). CONCLUSIONS A novel method of measuring TNC counts in tubing segments from the sterile cord blood collection system allows rapid and correct identification of CBUs with high cell numbers at the obstetric ward without exposing cells to the environment. This approach may contribute to cost efficacy as only CBUs with satisfactory TNC counts need to be shipped to the cord blood bank.
Resumo:
"GAO-04-12"
Resumo:
Title varies slightly.
Resumo:
Recent large-scale analyses of mainly full-length cDNA libraries generated from a variety of mouse tissues indicated that almost half of all representative cloned sequences did flat contain ail apparent protein-coding sequence, and were putatively derived from non-protein-coding RNA (ncRNA) genes. However, many of these clones were singletons and the majority were unspliced, raising the possibility that they may be derived from genomic DNA or unprocessed pre-rnRNA contamination during library construction, or alternatively represent nonspecific transcriptional noise. Here we Show, using reverse transcriptase-dependent PCR, microarray, and Northern blot analyses, that many of these clones were derived from genuine transcripts Of unknown function whose expression appears to be regulated. The ncRNA transcripts have larger exons and fewer introns than protein-coding transcripts. Analysis of the genomic landscape around these sequences indicates that some cDNA clones were produced not from terminal poly(A) tracts but internal priming sites within longer transcripts, only a minority of which is encompassed by known genes. A significant proportion of these transcripts exhibit tissue-specific expression patterns, as well as dynamic changes in their expression in macrophages following lipopolysaccharide Stimulation. Taken together, the data provide strong support for the conclusion that ncRNAs are an important, regulated component of the mammalian transcriptome.
Resumo:
Little is known about the extent of allelic diversity of genes in the complex polyploid, sugarcane. Using sucrose phosphate synthase (SPS) Gene (SPS) Family III as an example, we have amplified and sequenced a 400 nt region from this gene from two sugarcane lines that are parents of a mapping population. Ten single nucleotide polymorphisms (SNPs) were identified within the 400 nt region of which seven were present in both lines. In the elite commercial cultivar Q165(A), 10 sequence haplotypes were identified, with four haplotypes recovered at 9% or greater frequency. Based on SNP presence, two clusters of haplotypes were observed. In IJ76-514, a Saccharum officinarum accession, 8 haplotypes were identified with 4 haplotypes recovered at 13% or greater frequency. Again, two clusters of haplotypes were observed. The results suggest that there may be two SPS Gene Family III genes per genome in sugarcane, each with different numbers of different alleles. This suggestion is supported by sequencing results in an elite parental sorghum line, 403463-2-1, in which 4 haplotypes, corresponding to two broad types, were also identified. Primers were designed to the sugarcane SNPs and screened over bulked DNA from high and low Sucrose-containing progeny from a cross between Q165(A) and IJ76-514. The SNP frequency did not vary in the two bulked DNA samples, suggesting that these SNPs from this SPS gene family are not associated with variation in sucrose content. Using an ecotilling approach, two of the SPS Gene Family III haplotypes were mapped to two different linkage groups in homology group 1 in Q165(A). Both haplotypes mapped near QTLs for increased sucrose content but were not themselves associated with any sugar-related trait.
Resumo:
Unusually high concentrations of exchangeable-NH4+ (up to 270 kg-N/ha) were observed in a Vertisol below 1 m in southeast Queensland. This study aimed to identify the source of this NH4+. Preliminary sampling of native vegetation and cropping areas had found that elevated NH4+was only present under cropped soil, indicating that clearing was linked to the NH4+formation. Mechanisms of NH4+formation that may have occurred in the subsoil after clearing were hypothesised to be a) mineralisation of organic-N; b) NO3- reduction to NH4+; and/or c) the release of fixed-NH4+. In addition it was proposed that nitrification was inhibited in the subsoil, and that this allowed any NH4+formed to accumulate over time. Incubation experiments to examine nitrification rates revealed that nitrification was undetectable, and appeared to be limited by a combination of subsoil acidity and low numbers of nitrifying organisms. Mineralisation studies also revealed that the mineralisation of organic-N was undetectable, and that mineralising organisms were limited by acidity. A small amount of nitrate ammonification could be observed with the aid of a 15N tracer if the soil was waterlogged. However, this NH4+was insufficient to account for the overall NH4+accumulation, and these waterlogged conditions were not observed in the field. Concentrations of fixed- NH4+ measured were also too low to have been responsible for the accumulation of exchangeable-NH4+. It was concluded that none of the proposed hypotheses of NH4+formation could account for the NH4+accumulation observed.
Resumo:
This thesis reports the findings of three studies examining relationship status and identity construction in the talk of heterosexual women, from a feminist and social constructionist perspective. Semi-structured interviews were conducted with 12 women in study 1 and 13 women for study 2, between the ages of twenty and eighty-seven, discussing their experiences of relationships. All interviews were transcribed and analysed using discourse analysis, by hand and using the Nudist 6 program. The resulting themes create distinct age-related marital status expectations. Unmarried women were aware they had to marry by a ‘certain age’ or face a ‘lonely spinsterhood’. Through marriage women gained a socially accepted position associated with responsibility for others, self-sacrifice, a home-focused lifestyle and relational identification. Divorce was constructed as the consequence of personal faults and poor relationship care, reassuring the married of their own control over their status. Older unmarried women were constructed as deviant and pitiable, occupying social purgatory as a result of transgressing these valued conventions. Study 3 used repertory grid tasks, with 33 women, analysing transcripts and notes alongside numerical data using Web Grid II internet analysis tool, to produce principle components maps demonstrating the relationships between relationship terms and statuses. This study illuminated the consistency with which women of different ages and status saw marriage as their ideal living situation and outlined the domestic responsibilities associated. Spinsters and single-again women were defined primarily by their lack of marriage and by loneliness. This highlighted the devalued position of older unmarried women. The results of these studies indicated a consistent set of age-related expectations of relationship status, acknowledged by women and reinforced by their families and friends, which render many unmarried women deviant and fail to acknowledge the potential variety of women’s ways of living.
Resumo:
With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their location through a variety of applications and services. Along with the continuing growth of Location-Based Social Networks (LBSNs), security experts have increasingly warned the public of the dangers of exposing sensitive information such as personal location data. Most importantly, in addition to the geographical coordinates of the user’s location, LBSNs allow easy access to an additional set of characteristics of that location, such as the venue type or popularity. In this paper, we investigate the role of location semantics in the identification of LBSN users. We simulate a scenario in which the attacker’s goal is to reveal the identity of a set of LBSN users by observing their check-in activity. We then propose to answer the following question: what are the types of venues that a malicious user has to monitor to maximize the probability of success? Conversely, when should a user decide whether to make his/her check-in to a location public or not? We perform our study on more than 1 million check-ins distributed over 17 urban regions of the United States. Our analysis shows that different types of venues display different discriminative power in terms of user identity, with most of the venues in the “Residence” category providing the highest re-identification success across the urban regions. Interestingly, we also find that users with a high entropy of their check-ins distribution are not necessarily the hardest to identify, suggesting that it is the collective behaviour of the users’ population that determines the complexity of the identification task, rather than the individual behaviour.
Resumo:
One of the greatest concerns related to the popularity of GPS-enabled devices and applications is the increasing availability of the personal location information generated by them and shared with application and service providers. Moreover, people tend to have regular routines and be characterized by a set of “significant places”, thus making it possible to identify a user from his/her mobility data. In this paper we present a series of techniques for identifying individuals from their GPS movements. More specifically, we study the uniqueness of GPS information for three popular datasets, and we provide a detailed analysis of the discriminatory power of speed, direction and distance of travel. Most importantly, we present a simple yet effective technique for the identification of users from location information that are not included in the original dataset used for training, thus raising important privacy concerns for the management of location datasets.
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^
Resumo:
A hydrodynamic threshold between Darcian and non-Darcian flow conditions was found to occur in cubes of Key Largo Limestone from Florida, USA (one cube measuring 0.2 m on each side, the other 0.3 m) at an effective porosity of 33% and a hydraulic conductivity of 10 m/day. Below these values, flow was laminar and could be described as Darcian. Above these values, hydraulic conductivity increased greatly and flow was non-laminar. Reynolds numbers (Re) for these experiments ranged from
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.