970 resultados para Functionality
Resumo:
Up to 30% of young people drink at risky levels at least weekly. Yet, many do not view their alcohol use as problematic and focus only on its enjoyment and socialization benefits. Innovative, youth-friendly and highly accessible ways of delivering preventative health messages are required. This paper describes the design, development and prototype testing of ‘Ray’s Night Out’ a new iPhone application for promoting harm minimisation and controlled drinking strategies in young people. Two participatory design workshops were conducted with 5 young people to explore how technology could be used to enhance a good night out drinking. Four existing iPhone alcohol apps were reviewed. Five young people conducted initial prototype testing to refine app content and interface design. Final prototype testing was conducted with 10 young people. Prototype testing indicated young people had a very positive response to the Ray animated character and rated the app highly on aesthetics, engagement, content, functionality, usefulness and youth relevance. The Ray app provides a youth friendly approach to addressing alcohol misuse in young people. The impact of the Ray app on young people’s alcohol use knowledge, attitudes and behaviours is currently being evaluated.
Resumo:
Smartphone technology provides free or inexpensive access to mental health and wellbeing resources. As a result the use of mobile applications for these purposes has increased significantly in recent years. Yet, there is currently no app quality assessment alternative to the popular ‘star’-ratings, which are often unreliable. This presentation describes the development of the Mobile Application Rating Scale (MARS) a new measure for classifying and rating the quality of mobile applications. A review of existing literature on app and web quality identified 25 published papers, conference proceedings, and online resources (published since 1999), which identified 372 explicit quality criteria. Qualitative analysis identified five broad categories of app quality rating criteria: engagement, functionality, aesthetics, information quality, and overall satisfaction, which were refined into the 23-item MARS. Independent ratings of 50 randomly selected mental health and wellbeing mobile apps indicated the MARS had excellent levels of internal consistency (α = 0.92) and inter-rater reliability (ICC = 0.85). The MARS provides practitioners and researchers with an easy-to-use, simple, objective and reliable tool for assessing mobile app quality. It also provides mHealth professionals with a checklist for the design and development of high quality apps.
Resumo:
Epithelial-to-mesenchymal transition (EMT) increases cell migration and invasion, and facilitates metastasis in multiple carcinoma types, but belies epithelial similarities between primary and secondary tumors. This study addresses the importance of mesenchymal-to-epithelial transition (MET) in the formation of clinically significant metastasis. The previously described bladder carcinoma TSU-Pr1 (T24) progression series of cell lines selected in vivo for increasing metastatic ability following systemic seeding was used in this study. It was found that the more metastatic sublines had acquired epithelial characteristics. Epithelial and mesenchymal phenotypes were confirmed in the TSU-Pr1 series by cytoskeletal and morphologic analysis, and by performance in a panel of in vitro assays. Metastatic ability was examined following inoculation at various sites. Epithelial characteristics associated with dramatically increased bone and soft tissue colonization after intracardiac or intratibial injection. In contrast, the more epithelial sublines showed decreased lung metastases following orthotopic inoculation, supporting the concept that EMT is important for the escape of tumor cells from the primary tumor. We confirmed the overexpression of the IIIc subtype of multiple fibroblast growth factor receptors (FGFR) through the TSU-Pr1 series, and targeted abrogation of FGFR2IIIc reversed the MET and associated functionality in this system and increased survival following in vivo inoculation in severe combined immunodeficient mice. This model is the first to specifically model steps of the latter part of the metastatic cascade in isogenic cell lines, and confirms the suspected role of MET in secondary tumor growth.
Resumo:
Hindered amine light stabilisers (HALS) are the most effective antioxidants currently available for polymer systems in post-production, in-service applications, yet the mechanism of their action is still not fully understood. Structural characterisation of HALS in polymer matrices, particularly the identification of structural modifications brought about by oxidative conditions, is critical to aid mechanistic understanding of the prophylactic effects of these molecules. In this work, electrospray ionisation tandem mass spectrometry (ESI-MS/MS) was applied to the analysis of a suite of commercially available 2,2,6,6-tetramethylpiperidine-based HALS. Fragmentation mechanisms for the \[M + H](+) ions are proposed, which provide a rationale for the product ions observed in the MS/MS and MS(3) mass spectra of N-H, N-CH(3), N-C(O)CH(3) and N-OR containing HALS (where R is an alkyl substituent). A common product ion at m/z 123 was identified for the group of antioxidants containing N-H, N-CH3 or N-C(0)CH3 functionality, and this product ion was employed in precursor ion scans on a triple quadrupole mass spectrometer to identify the HALS species present in a crude extract from of a polyester-based coil coating. Using MS/MS, two degradation products were unambiguously identified. This technique provides a simple and selective approach to monitoring HALS structures within complex matrices. Copyright (C) 2010 John Wiley & Sons, Ltd.
Resumo:
Human skin fibroblasts were cultured long-term in the presence of ascorbic acid to allow formation of a three-dimensional collagen matrix, and the effects of this on activation of secreted matrix metalloproteinase-2 (MMP-2) were examined. Accumulation of collagen over time correlated with increased levels of both mature MMP-2 and cell-associated membrane type 1-MMP (MT1-MMP), and subsequently increased mRNA levels for MT1-MMP, providing temporal resolution of the "nontranscriptional" and "transcriptional" effects of collagen on MT-1MMP functionality. MMP-2 activation by these cultures was blocked by inhibitors of prolyl-4-hydroxylase, or when fibroblasts derived from the collagen α1(I) gene-deficient Mov-13 mouse were used. MMP-2 activation by the Mov-13 fibroblasts was rescued by transfection of a full-length α1(I) collagen cDNA, and to our surprise, also by transfection with an α1(I) collagen cDNA carrying a mutation at the C-proteinase cleavage, which almost abrogated fibrillogenesis. Although studies with ascorbate-cultured MT1-MMP-/- fibroblasts showed that MT1-MMP played a significant role in the collagen-induced MMP-2 activation, a residual MT1-MMP-independent activation of MMP-2 was seen which resembled the level of MMP-2 activation persisting when wild-type fibroblasts were cultured in the presence of both ascorbic acid and MMP inhibitors. We were also unable to block this residual activation with inhibitors specific for serinyl, aspartyl, or cysteinyl enzymes.
Resumo:
The influence of αVβ3 integrin on MT1-MMP functionality was studied in human breast cancer cells of differing β3 integrin status. Overexpression of β3 integrin caused increased cell surface expression of αV integrin and increased cellular adhesion to extracellular matrix (ECM) substrates in BT-549, MDA-MB-231 and MCF-7 cells. β3 integrin expression also enhanced the migration of breast cancer cells on ECM substrates and enhanced collagen gel contraction. In vivo, αVβ3 cooperated with MT1-MMP to increase the growth of MCF-7 cells after orthotopic inoculation in immunocompromised mice, but had no influence on in vitro proliferation. Despite these stimulatory effects, overexpression of β3 integrin suppressed the type I collagen (Col I) induced MMP-2 activation in all breast cancer cell lines analyzed. This was also evident in extracts from the MCF-7 tumors in vivo, where MMP-2 activation was stimulated by MT1-MMP transfection, but attenuated with β3 integrin expression. Although our studies confirm important biological effects of αVβ3 integrin on enhancing cell adhesion and migration, ECM remodeling and tumor growth, β3 integrin caused reduced MMP-2 activation in response to Col I in vitro, which appears to be physiologically relevant, as it was also seen in tumor xenografts in vivo. The reduction of MMP-2 activation (and thus MT1-MMP activity) by αVβ3 in response to Col I may be important in scenarios where cells which are activated for matrix degradation need to preserve some pericellular collagen, perhaps as a substrate for cell adhesion and migration, thus maintaining a balanced level of proteolysis required for efficient tumor growth.
Resumo:
Globalization, financial deregulation, economic turmoil, and technology breakthroughs are profoundly exposing organizations to business networks. Engaging these networks requires explicit planning from the strategic level down to the operational level of an organization, which significantly affects organizational artefacts such as business services, processes, and resources. Although enterprise architecture (EA) aligns business and IT aspects of organizational systems, previous applications of EA have not comprehensively addressed a methodological framework for planning. In the context of business networks, this study seeks to explore the application of EA for business network planning where it builds upon relevant and well-established prescriptive and descriptive aspects of EA. Prescriptive aspects include integrated models of services, business processes, and resources among other organizational artefacts, at both business and IT levels. Descriptive aspects include ontological classifications of business functionality, which allow EA models to be aligned semantically to organizational artefacts and, ultimately higher-level business strategy. A prominent approach for capturing descriptive aspects of EA is business capability modelling. In order to explore and develop the illustrative extensions of EA through capability modelling, a list of requirements (capability dimensions) for business network planning will be identified and validated through a revelatory case study encompassing different business network manifestations, or situations. These include virtual organization, liquid workforce, business network orchestration, and headquarters-subsidiary. The use of artefacts, conventionally, modelled through EA will be considered in these network situations. Two general considerations for EA extensions are explored for the identified requirements at the level of the network: extension of artefacts through the network and alignment of network level artefacts with individual organization artefacts. The list of requirements provides the basis for a constructivist extension of EA in the following ways. Firstly, for descriptive aspects, it offers constructivist insights to guide extensions for particular EA techniques and concepts. Secondly, for prescriptive aspects it defines a set of capability dimensions, which improve the analysis and assessment of organization capabilities for business network situations.
Resumo:
This e-book is devoted to the use of spreadsheets in the service of education in a broad spectrum of disciplines: science, mathematics, engineering, business, and general education. The effort is aimed at collecting the works of prominent researchers and educators that make use of spreadsheets as a means to communicate concepts with high educational value. The e-book brings some of the most recent applications of spreadsheets in education and research to the fore. To offer the reader a broad overview of the diversity of applications, carefully chosen articles from engineering (power systems and control), mathematics (calculus, differential equations, and probability), science (physics and chemistry), and education are provided. Some of these applications make use of Visual Basic for Applications (VBA), a versatile computer language that further expands the functionality of spreadsheets. The material included in this e-book should inspire readers to devise their own applications and enhance their teaching and/or learning experience.
Resumo:
During the early design stages of construction projects, accurate and timely cost feedback is critical to design decision making. This is particularly challenging for cost estimators, as they must quickly and accurately estimate the cost of the building when the design is still incomplete and evolving. State-of-the-art software tools typically use a rule-based approach to generate detailed quantities from the design details present in a building model and relate them to the cost items in a cost estimating database. In this paper, we propose a generic approach for creating and maintaining a cost estimate using flexible mappings between a building model and a cost estimate. The approach uses queries on the building design that are used to populate views, and each view is then associated with one or more cost items. The benefit of this approach is that the flexibility of modern query languages allows the estimator to encode a broad variety of relationships between the design and estimate. It also avoids the use of a common standard to which both designers and estimators must conform, allowing the estimator added flexibility and functionality to their work.
Efficient extension of standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Resumo:
Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.
Resumo:
A plasma-assisted concurrent Rf sputtering technique for fabrication of biocompatible, functionally graded CaP-based interlayer on Ti-6Al-4V orthopedic alloy is reported. Each layer in the coating is designed to meet a specific functionality. The adherent to the metal layer features elevated content of Ti and supports excellent ceramic-metal interfacial stability. The middle layer features nanocrystalline structure and mimics natural bone apatites. The technique allows one to reproduce Ca/P ratios intrinsic to major natural calcium phosphates. Surface morphology of the outer, a few to few tens of nanometers thick, layer, has been tailored to fit the requirements for the bio-molecule/protein attachment factors. Various material and surface characterization techniques confirm that the optimal surface morphology of the outer layer is achieved for the process conditions yielding nanocrystalline structure of the middle layer. Preliminary cell culturing tests confirm the link between the tailored nano-scale surface morphology, parameters of the middle nanostructured layer, and overall biocompatibility of the coating.
Resumo:
While organizations strive to leverage the vast information generated daily from social media platforms and both decision makers and consultants are keen to identify and exploit this information’s value, there has been little research into social media in the business context. Social media are diverse, varying in scope and functionality, this diversity entailing a complex of attributes and characteristics, resulting in confusion for both researchers and organizations. Taxonomies are important precursors in emerging fields and are foundational for rigorous theory building. Though aspects of social media have been studied from various discipline perspectives, this work has been largely descriptive. Thus, while the need for a rigorous taxonomy of social media is strong, previous efforts to classify social media suffer limitations – e.g. lack of a systematic taxonomic method, overreliance on intuition, disregard for the users’ perspective, and inadequate consideration of purpose. Thus, this study was mainly initiated by the overarching question “How can social media in the business context be usefully classified?” In order to address this gap, the current paper proposes a systematic method for developing a taxonomy appropriate to study social media in organizations context, combining Nickerson et al,’s (2012) IS taxonomy building guidelines and a Repertory grid (RepGrid) approach.
Resumo:
Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a ‘Universal Designated-Verifier Signature’ (UDVS). A UDVS scheme can function as a standard publicly-verifiable digital signature but has additional functionality which allows any holder of a signature (not necessarily the signer) to designate the signature to any desired designated-verifier (using the verifier’s public key). Given the designated-signature, the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. We propose an efficient deterministic UDVS scheme constructed using any bilinear group-pair. Our UDVS scheme functions as a standard Boneh-Lynn-Shacham (BLS) signature when no verifier-designation is performed, and is therefore compatible with the key-generation, signing and verifying algorithms of the BLS scheme. We prove that our UDVS scheme is secure in the sense of our unforgeability and privacy notions for UDVS schemes, under the Bilinear Diffie-Hellman (BDH) assumption for the underlying group-pair, in the random-oracle model. We also demonstrate a general constructive equivalence between a class of unforgeable and unconditionally-private UDVS schemes having unique signatures (which includes the deterministic UDVS schemes) and a class of ID-Based Encryption (IBE) schemes which contains the Boneh-Franklin IBE scheme but not the Cocks IBE scheme.
Resumo:
Social Networks (SN) users have various privacy requirements to protect their information; to address this issue, a six-stage thematic analysis of scholarly articles related to SN user privacy concerns were synthesized. Then this research combines mixed methods research employing the strengths of quantitative and qualitative research to investigate general SN users, and thus construct a new set of ?ve primary and Twenty-?ve secondary SN user privacy requirements. Such an approach has been rarely used to examine the privacy requirements. Factor analysis results show superior agreement with theoretical predictions and signi?cant improvement over previous alternative models of SN user privacy requirements. This research presented here has the potential to provide for the development of more sophisticated privacy controls which will increase the ability of SN users to: specify their rights in SNs and to determine the protection of their own SN data.
Resumo:
Food is a vital foundation of all human life. It is essential to a myriad of political, socio-cultural, economic and environmental practices throughout history. As Kaplan [1] contends, “the scholarship on food has real pedigree.” Today, practices of food production, consumption and distribution have the potential to go through immensely transformative shifts as network technologies become increasingly embedded in every domain of contemporary life. This presents unique opportunities for further scholarly exploration on this topic, which this special issue intends to address. Information and communication technologies (ICTs) are one of the pillars of contemporary global functionality and sustenance and undoubtedly will continue to present new challenges and opportunities for the future. As such, this special issue of Futures has been brought together to address challenges and opportunities at the intersection of food and ICTs. In particular, the edition asks, what are the key roles that network technologies play in re-shaping social and economic networks of food?