977 resultados para institutional mechanisms


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Interleukin(IL)-18 is a pleiotrophic cytokine with functions in immune modulation, angiogenesis and bone metabolism. In this study, the potential of IL-18 as an immunotherapy for prostate cancer (PCa) was examined using the murine model of prostate carcinoma, RM1 and a bone metastatic variant RM1(BM)/B4H7-luc. RM1 and RM1(BM)/B4H7-luc cells were stably transfected to express bioactive IL-18. These cells were implanted into syngeneic immunocompetent mice, with or without an IL-18-neutralising antibody (αIL-18, SK113AE4). IL-18 significantly inhibited the growth of both subcutaneous and orthotopic RM1 tumors and the IL-18 neutralizing antibody abrogated the tumor growth-inhibition. In vivo neutralization of interferon-gamma (IFN-γ) completely eliminated the anti-tumor effects of IL-18 confirming an essential role of IFN-γ as a down-stream mediator of the anti-tumor activity of IL-18. Tumors from mice in which IL-18 and/or IFN-γ was neutralized contained significantly fewer CD4+ and CD8+ T cells than those with functional IL-18. The essential role of adaptive immunity was demonstrated as tumors grew more rapidly in RAG1−/− mice or in mice depleted of CD4+ and/or CD8+ cells than in normal mice. The tumors in RAG1−/− mice were also significantly smaller when IL-18 was present, indicating that innate immune mechanisms are involved. IL-18 also induced an increase in tumor infiltration of macrophages and neutrophils but not NK cells. In other experiments, direct injection of recombinant IL-18 into established tumors also inhibited tumor growth, which was associated with an increase in intratumoral macrophages, but not T cells. These results suggest that local IL-18 in the tumor environment can significantly potentiate anti-tumor immunity in the prostate and clearly demonstrate that this effect is mediated by innate and adaptive immune mechanisms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite a general belief that incentive mechanisms can improve value for money during procurement and performance during project execution, empirical research on the actual effects is nascent. This research focuses on the design and implementation of incentive mechanisms in four different infrastructure projects: two road reconstructions in the Netherlands and two building constructions in Australia. Based on an analytical framework of key motivation drivers, a cross cases analysis is conducted in view of performance on the contract assumptions, selection phase, execution phase and project contract performance. It was identified that despite significant differences in the project characteristics, results indicate that they experience similar contextual drivers on the incentive effectiveness. High value was placed on risk allocation and relationship building in the selection and construction phase. The differences can be explained from both contextual and project related characteristics. Although there are limitations with this research in drawing generalizations across two sets of case projects, the results provide a strong base to explore the nature of incentive systems across different geographical and contextual boundaries in future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter charts the theories and methods being adopted in an investigation of the 'micro-politics' of teacher education policy reception at a site of higher education in Queensland from 1980 to 1990. The paper combines insights and methods from critical ethnography with those from the institutional ethnography of feminist sociologist Dorothy Smith to link local policy activity at the institutional site to broader social structures and processes. In this way, enquiry begins with--and takes into account--the experiences of those groups normally excluded from mainstream and even critical policy analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Queensland University of Technology (QUT) in Brisbane, Australia, is involved in a number of projects funded by the Australian National Data Service (ANDS). Currently, QUT is working on a project (Metadata Stores Project) that uses open source VIVO software to aid in the storage and management of metadata relating to data sets created/managed by the QUT research community. The registry (called QUT Research Data Finder) will support the sharing and reuse of research datasets, within and external to QUT. QUT uses VIVO for both the display and the editing of research metadata.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The introduction of Eragrostis curvula (African Lovegrass, herafter Lovegrass) for pasture improvement across Australia has not been successful. Instead Lovegrass, a C4 perennial grass originating from Southern African, has proven unpalatable to stock and to have low nutritional value if stocks do eat it. It has spread prolifically along roadsides, stream banks, conservation areas and pastures. Because control efforts have not been effective, our aim was to determine the putative mechanisms responsible for the dominance of Lovegrass, specifically disturbance (selective grazing) and competition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper will present program developers and institutional administrators with a program delivery model suitable for cross cultural international delivery developing students from industry through to master’s level tertiary qualifications. The model was designed to meet the needs of property professionals from an industry where technical qualifications are the norm and tertiary qualifications are emerging. A further need was to develop and deliver a program that enhanced the University’s current program profile in both the domestic and international arenas. Early identification of international educational partners, industry need and the ability to service the program were vital to the successful development of Master of Property program. The educational foundations of the program rest in educational partners, local tutorial support, international course management, cultural awareness of and in content, online communication fora, with a delivery focus on problem-based learning, self-directed study, teamwork and the development of a global understanding and awareness of the international property markets. In enrolling students from a diverse cultural background with technical qualifications and/or extensive work experience there are a number of educational barriers to be overcome for all students to successfully progress and complete the program. These barriers disappear when the following mechanisms are employed: individual student pathways, tutorial support by qualified peers, enculturation into tertiary practice, assessment tasks that recognise cultural norms and values, and finally that value is placed on the experiential knowledge, cultural practices and belief systems of the students.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study discrimination based on the hukou system that segregates citizens in groups of migrants and locals in urban China. We use an artefactual field experiment with a labor market framing. We recruit workers on their real labor market as experimental participants and investigate if official discrimination motivates individual discrimination based on hukou status. In our experimental results we observe discrimination based on the hukou characteristic: however, statistical discrimination does not seem to be the source of this, as status is exogeneous for our participants and migrants and locals behave similarly. Furthermore, discrimination increases between two experimental frameworks when motives for statistical discrimination are removed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our understanding of the mechanisms of action of GH and its receptor, the GHR, has advanced significantly in the last decade and has provided some important surprises. It is now clear that the GH-GHR axis activates a number of inter-related signalling pathways, not all of which are dependent on the intracellular tyrosine kinase, JAK2 as originally postulated. JAK2-independent pathways, mediated via the Src family kinases, together with a number of negative regulators of GH signalling and emerging cross-talk mechanisms with other growth factor receptors, provide a complex array of mechanisms that are capable of fine-tuning responses to GH in a cell context dependent manner. Additionally, it is also now clear that GH and the GHR can translocate to the nucleus of target cells and initiate, as yet not well defined, nuclear responses. Continued emphasis on elucidation of these complex mechanisms is critical to provide further insights into the diverse physiological and pathophysiological effects of GH.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research capacity building has become a prominent theme in higher education institutions across the world. To build research capacity, it is necessary to identify areas of challenges academics face within the academia. This case study focuses on Chinese teaching English as a foreign language (TEFL) academics with the purpose of identifying factors that influence their research capacity building. Six TEFL academics from a Chinese national university were interviewed and institutional research documents were analysed. Findings showed that obstacles and difficulties in conducting research were more related to departmental factors than individual characteristics. The institution was keen on developing a research culture, and encouraged research and publications. Departmental support for research was improving, but it seems that it was more generic than tailored to individual needs. The findings of this study provide implications for research administrators in further supporting TEFL academics’ research capacity building.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

QUT’s new metadata repository (data registry), Research Data Finder, has been designed to promote the visibility and discoverability of QUT research datasets. Funded by the Australian National Data Service (ANDS), it will provide a qualitative snapshot of research data outputs created or collected by members of the QUT research community that are available via open or mediated access. As a fully integrated metadata repository Research Data Finder aligns with institutional sources of truth, such as QUT’s research administrative system, ResearchMaster, as well as QUT’s Academic Profiles system to provide high quality data descriptions that increase awareness of, and access to, shareable research data. In addition, the repository and its workflows are designed to foster smoother data management practices, enhance opportunities for collaboration and research, promote cross-disciplinary research and maximize existing research datasets. The metadata schema used in Research Data Finder is the Registry Interchange Format - Collections and Services (RIF-CS), developed by ANDS in 2009. This comprehensive schema is potentially complex for researchers; unlike metadata for publications, which are often made publicly available with the official publication, metadata for datasets are not typically available and need to be created. Research Data Finder uses a hybrid self-deposit and mediated deposit system. In addition to automated ingests from ResearchMaster (research project information) and Academic Profiles system (researcher information), shareable data is identified at a number of key “trigger points” in the research cycle. These include: research grant proposals; ethics applications; Data Management Plans; Liaison Librarian data interviews; and thesis submissions. These ingested records can be supplemented with related metadata including links to related publications, such as those in QUT ePrints. Records deposited in Research Data Finder are harvested by ANDS and made available to a national and international audience via Research Data Australia, ANDS’ discovery service for Australian research data. Researcher and research group metadata records are also harvested by the National Library of Australia (NLA) and these records are then published in Trove (the NLA’s digital information portal). By contributing records to the national infrastructure, QUT data will become more visible. Within Australia and internationally, many funding bodies have already mandated the open access of publications produced from publicly funded research projects, such as those supported by the Australian Research Council (ARC), or the National Health and Medical Research Council (NHMRC). QUT will be well placed to respond to the rapidly evolving climate of research data management. This project is supported by the Australian National Data Service (ANDS). ANDS is supported by the Australian Government through the National Collaborative Research Infrastructure Strategy Program and the Education Investment Fund (EIF) Super Science Initiative.