989 resultados para Prove
Resumo:
The Queensland Academy of Sport (QAS) supports over 600 high-level athletes across 20 sports. Given the high cost of injuries (e.g., time out of sport and consequent detraining, expense of rehabilitation, adverse social and economic effects), comprehensive injury management and prevention has become a priority for the QAS. Considering the potential for developing cost-effective, preventative programs, knowledge gained by examination of psychological screening predictors of injury may also prove beneficial for the broader sports medicine community. Aims were to: Objectively summarise existing injury characteristics, including the creation of population-specific norms for scholarship holders at the QAS. Assess relationships between injuries, specific medical factors (e.g., asthma, back pain) and psychological risk factors including life stress, mood, previous psychological diagnoses and disordered eating behaviour over a three-year period. Evaluate the effectiveness of the psychological component of the QAS Health Screening Questionnaire.
Resumo:
INTRODUCTION: I want to argue that understanding masculinity is an important part of understanding gender and sexuality as it relates to information and communications technologies (ICTs), specifically those under the lens of the information-systems community. In order to do this, the landscape of gender and sexuality research in general is referred to along with such research in the field of information systems (IS), with reference as necessary to masculinity studies. I will then suggest some possible areas where a more thorough going theorization may prove useful. In sum, future research might focus on the relation-ship between marginalised masculinities and the construction and consumption of is in work organisations and society…
Resumo:
In part 1 of this update, we put forward the argument that integration in ERP based environments can be achieved in ways other than adopting a software configuration only approach. We drew on evidence from two large ERP implementations to show how, despite the cost implications, some customization, if carefully managed, could prove helpful. In this, the final part of the update, we discuss the benefits, and potential pitfalls, involved in enacting a non-standard based integration strategy. This requires attention to a) broadening the integration definition; b) bringing legacy practices forward and c) developing a customization based integration strategy.
Resumo:
This paper considers the key findings of a year-long collaborative research project focusing on the audience of the London Symphony Orchestra and their introduction of a new mobile telephone (‘app’) ticketing system. A mixed-method approach was employed, utilizing focus groups and questionnaires with over 80 participants, to research a sample group of university students. This research develops our understanding of classical music audiences, and highlights the continued individualistic, middle-class, and exclusionary culture of classical music attendance and patterns of behaviours. The research also suggests that a mobile phone app does prove a useful mechanism for selling discounted tickets, but shows little indication of being a useful means of expanding this audience beyond its traditional demographic.
Resumo:
Thraustochytrids have become of considerable industrial and scientific interest in the past decade due to their health benefits. They have been proven to be the principle source in marine and estuarine fish diets with high percentage of long chain (LC) or polyunsaturated fatty acids (PUFA). Therefore, the oil extracted from fish for human document.forms[0].elements[13].select();consumption is rich in PUFA with high omega-3 fatty acid content. Docosahexaenoic acid (DHA) and eicosapentaenoic acid (EPA) of all of the omega-3 fatty acids, are considered beneficial essential oils for humans with a wide range of health benefits. These include brain and neural development in infants, general wellbeing of adults and drug delivery through precursor molecules. They have become one of the most extensively studied organisms for industrial oil preparations as PUFA extraction from fish becomes less profitable. Many forms of these Thraustochytrid oils are being trialled for human consumption all over the world. In Australia, there has been little research performed on these organisms in the past ten years. A few Australian studies have been conducted in the form of comparative studies related to PUFA production within the related genera, but not focussed on their identification or cellular and genomic characterisation. Therefore, the main aim of this study was to investigate the morphological and genetic characteristics of Australian Thraustochytrids in order to aid in their identification and characterisation, as well as to better understand the effect of environmental conditions in the regulation of PUFA production. It was also noted that there was a knowledge gap in the preservation and total genomic DNA extraction of these organisms for the purposes of scientific research. The cryopreservation of these organisms for studies around the world follows existing generic methods. However, it is well understood that many of these generic methods attract not only high costs for chemicals, but also uses considerable storage space and other resources, all of which can be improved with new or modified approaches. In this context, a simple and inexpensive bead preservation method is described, without compromising the storage shelf life. We also describe, for the first time, the effects of culture age on the successful cryopreservation of Thraustochytrids. It was evident in the literature that DNA and RNA extractions for molecular and genetic studies of Thraustochytrids follow the classical phenol-chloroform extraction methods. It was also observed that modern protocols failed to avoid the use of phenol-chloroform rather than improving preparation and cell disruption. In order to provide a high quantity and quality DNA extraction, a modified protocol has been introduced that employs the use of modern commercial extraction kits and standard laboratory equipment. Thraustochytrids have been shown to be highly conserved in their 18S rDNA gene sequences, which is used as the current standard for identification. It was demonstrated that the 18S rDNA gene sequence limits the recognition of closely related genera or within the genera from each member. Therefore, it was proposed that another profile, such as a randomly amplified polymorphic DNA (RAPD) based profiling system, be tested for use in the characterisation of Thraustochytrids. The RAPD profiles were shown to provide a unique DNA fingerprint for each isolate and small variations in their genome were able to be detected. This method involved the use of a minimum number of standard arbitrary primers and with an increase in the number of different primers used, a very high discrimination between organisms could be achieved. However, the method was not suitable for taxonomic purposes because the results did not correlate with other taxonomic features such as morphology. Another knowledge gap was found with respect to Australian Thraustochytrid growth characteristics, in that these had not been recorded and published. In order to rectify this, a record of colony and microscopic features of 12 selected isolates was performed. The results of preliminary studies indicated that further microbiological and biochemical studies are needed for full characterisation of these organisms. This information is of great importance to bio-prospecting of new Thraustochytrids from Australian ecosystems and would allow for their accurate identification, and so permit the prediction of their PUFA capability by comparison with related genera/species. It was well recognized that environmental stress plays a role in the PUFA production and is mainly due to the reactive oxygen species as abiotic stress (Chiou et al., 2001; Okuyama et al., 2008; Shabala et al., 2009; Shabala et al., 2001). In this aspect, this study makes the first attempt towards better understanding of this phenomenon by way of the use of real-time PCR for the detection of environmental effects on the regulation of PUFA production. Three main environmental conditions including temperature, pH and oxygen availability were monitored as stress inducers. In summary, this study provides novel approaches for the preservation and handling of Thraustochytrids, their molecular biological features, taxonomy, characterisation and responses to environmental factors with respect to their oil production enzymes. The information produced from this study will prove to be vital for both industrial and scientific investigations in the future.
Resumo:
Objective. To assess the effectiveness of workplace interventions in improving physical activity. Data Source. EBSCO research database (and all subdatabases). Study Inclusion and Exclusion Criteria. Articles were published from 2000 to 2010 in English, had appropriate designs, and measured employees' physical activity, energy consumption, and/or body mass index (BMI) as primary outcomes. Articles that did not meet the inclusion criteria were excluded. Data Extraction. Data extracted included study design, study population, duration, intervention activities, outcomes, and results. Data Synthesis. Data were synthesized into one table. Results of each relevant outcome including p values were combined. Results. Twelve (60%) of 20 selected interventions reported an improvement in physical activity level, steps, or BMI, and there was one slowed step reduction in the intervention group. Among these, 10 were less than 6 months in duration; 9 used pedometers; 6 applied Internet-based approaches; and 5 included activities targeting social and environmental levels. Seven of 8 interventions with pre-posttest and quasi-experimental controlled design showed improvement on at least one outcome. However, 7 of 12 randomized controlled trials (RCTs) did not prove effective in any outcome. Conclusion. Interventions that had less rigorous research designs, used pedometers, applied Internet-based approaches, and included activities at social and environmental levels were more likely to report being effective than those without these characteristics.
Resumo:
We prove the existence of novel, shock-fronted travelling wave solutions to a model of wound healing angiogenesis studied in Pettet et al (2000 IMA J. Math. App. Med. 17 395–413) assuming two conjectures hold. In the previous work, the authors showed that for certain parameter values, a heteroclinic orbit in the phase plane representing a smooth travelling wave solution exists. However, upon varying one of the parameters, the heteroclinic orbit was destroyed, or rather cut-off, by a wall of singularities in the phase plane. As a result, they concluded that under this parameter regime no travelling wave solutions existed. Using techniques from geometric singular perturbation theory and canard theory, we show that a travelling wave solution actually still exists for this parameter regime. We construct a heteroclinic orbit passing through the wall of singularities via a folded saddle canard point onto a repelling slow manifold. The orbit leaves this manifold via the fast dynamics and lands on the attracting slow manifold, finally connecting to its end state. This new travelling wave is no longer smooth but exhibits a sharp front or shock. Finally, we identify regions in parameter space where we expect that similar solutions exist. Moreover, we discuss the possibility of more exotic solutions.
Resumo:
Objectives: To develop a new measure of dysfunctional thoughts for family caregivers of people living with dementia. These thoughts can contribute to negative outcomes, but they may be modifiable. Method: A stepwise process was used to develop the Thoughts Questionnaire, commencing with item generation, concept mapping, and pilot testing in a sample of professional and nonprofessional caregivers of people with dementia (n = 18). Next, an independent sample of 35 family caregivers of people with dementia (30 female; M age = 64.30, standard deviation = 10.65) completed: (a) the Thoughts Questionnaire; (b) an existing measure of dysfunctional thoughts, the Dementia Thoughts Caregivers Questionnaire; and (c) separate validated measures of depressive symptoms, caregiver stress, and coping, respectively. Results: The level of agreement with dysfunctional thought statements from the Dementia Thoughts Caregivers Questionnaire and Thoughts Questionnaire was low. However, a small number of Thoughts Questionnaire statements were strongly endorsed by over 85% of the sample. Both dysfunctional thought measures had adequate reliability, but total scores were not significantly intercorrelated (r = .287, p = .095). Only the Thoughts Questionnaire was significantly, positively correlated with most caregiver stress measures. Thoughts Questionnaire items required a much lower reading level than the Dementia Thoughts Caregivers Questionnaire items. Discussion: This study provides preliminary data on a tool for assessing the negative role-related thoughts that family caregivers of people with dementia may experience. Given that these thoughts are implicated in depression but they may be modified, the capacity to identify dysfunctional thoughts may prove useful in caregiver support programs.
Resumo:
DNA may take a leading role in a future generation of blockbuster therapeutics. DNA has inherent advantages over other biomolecules such as protein, RNA and virus-like particles including safety, production simplicity and higher stability at ambient temperatures. Vaccination is the principal measure for preventing influenza and reducing the impact of pandemics; however, vaccines take up to 8-9 months to produce, and the global production capacity is woefully low. With production times as short as 2 weeks, improved safety and stability, bioprocess engineering developments, and the ability to perform numerous therapeutic roles, DNA has the potential to meet the demands of emerging and existing diseases. DNA is experiencing sharp growths in demand as indicated by its use in gene therapy trials and DNA vaccine related patents. Of particular interest for therapeutic use is plasmid DNA (pDNA), a form of non-genomic DNA that makes use of cellular machinery to express proteins or antigens. The production stages of fermentation and downstream purification are considered in this article. Forward looking approaches to purifying and delivering DNA are reported, including affinity chromatography and nasal inhalation. The place that pDNA may take in the preparation for and protection against pandemics is considered. If DNA therapeutics and vaccines prove to be effective, the ultimate scale of production will be huge which shall require associated bioprocess engineering research and development for purification of this large, unique biomolecule.
Resumo:
Malaria is a global health problem; an effective vaccine is urgently needed. Due to the relative poverty and lack of infrastructure in malaria endemic areas, DNA-based vaccines that are stable at ambient temperatures and easy to formulate have great potential. While attention has been focused mainly on antigen selection, vector design and efficacy assessment, the development of a rapid and commercially viable process to manufacture DNA is generally overlooked. We report here a continuous purification technique employing an optimized stationary adsorbent to allow high-vaccine recovery, low-processing time, and, hence, high-productivity. A 40.0 mL monolithic stationary phase was synthesized and functionalized with amino groups from 2-Chloro-N,N- diethylethylamine hydrochloride for anion-exchange isolation of a plasmid DNA (pDNA) that encodes a malaria vaccine candidate, VR1020-PyMSP4/5. Physical characterization of the monolithic polymer showed a macroporous material with a modal pore diameter of 750 nm. The final vaccine product isolated after 3 min elution was homogeneous supercoiled plasmid with gDNA, RNA and protein levels in keeping with clinical regulatory standards. Toxicological studies of the pVR1020-PyMSP4/5 showed a minimum endotoxin level of 0.28 EU/m.g pDNA. This cost-effective technique is cGMP compatible and highly scalable for the production of DNA-based vaccines in commercial quantities, when such vaccines prove to be effective against malaria. © 2008 American Institute of Chemical Engineers.
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
Resumo:
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.
Resumo:
The security of permutation-based hash functions in the ideal permutation model has been studied when the input-length of compression function is larger than the input-length of the permutation function. In this paper, we consider permutation based compression functions that have input lengths shorter than that of the permutation. Under this assumption, we propose a permutation based compression function and prove its security with respect to collision and (second) preimage attacks in the ideal permutation model. The proposed compression function can be seen as a generalization of the compression function of MD6 hash function.
Resumo:
A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among departments. A specification of HD wallets has even been accepted as Bitcoin standard BIP32. Unfortunately, in all existing HD wallets---including BIP32 wallets---an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided. We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called "one more" discrete logarithm problem.
Resumo:
The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.
Resumo:
We propose a new way to build a combined list from K base lists, each containing N items. A combined list consists of top segments of various sizes from each base list so that the total size of all top segments equals N. A sequence of item requests is processed and the goal is to minimize the total number of misses. That is, we seek to build a combined list that contains all the frequently requested items. We first consider the special case of disjoint base lists. There, we design an efficient algorithm that computes the best combined list for a given sequence of requests. In addition, we develop a randomized online algorithm whose expected number of misses is close to that of the best combined list chosen in hindsight. We prove lower bounds that show that the expected number of misses of our randomized algorithm is close to the optimum. In the presence of duplicate items, we show that computing the best combined list is NP-hard. We show that our algorithms still apply to a linearized notion of loss in this case. We expect that this new way of aggregating lists will find many ranking applications.