999 resultados para Research grants
Resumo:
To identify microRNAs potentially involved in melanomagenesis, we compared microRNA expression profiles between melanoma cell lines and cultured melanocytes. The most differentially expressed microRNA between the normal and tumor cell lines was miR-211. We focused on this pigment-cell-enriched miRNA as it is derived from the microphthalmia-associated transcription factor (MITF)-regulated gene, TRPM1 (melastatin). We find that miR-211 expression is greatly decreased in melanoma cells and melanoblasts compared to melanocytes. Bioinformatic analysis identified a large number of potential targets of miR-211, including POU3F2 (BRN2). Inhibition of miR-211 in normal melanocytes resulted in increased BRN2 protein, indicating that endogenous miR-211 represses BRN2 in differentiated cells. Over-expression of miR-211 in melanoma cell lines changed the invasive potential of the cells in vitro through directly targeting BRN2 translation. We propose a model for the apparent non-overlapping expression levels of BRN2 and MITF in melanoma, mediated by miR-211 expression.
Resumo:
Variants of the same process can be encountered within one organization or across different organizations. For example, different municipalities, courts, and rental agencies all need to support highly similar processes. In fact, procurement and sales processes can be found in almost any organization. However, despite these similarities, there is also the need to allow for local variations in a controlled manner. Therefore, many academics and practitioners have advocated the use of configurable process models (sometimes referred to as reference models). A configurable process model describes a family of similar process models in a given domain. Such a model can be configured to obtain a specific process model that is subsequently used to handle individual cases, for instance, to process customer orders. Process configuration is notoriously difficult as there may be all kinds of interdependencies between configuration decisions. In fact, an incorrect configuration may lead to behavioral issues such as deadlocks and livelocks. To address this problem, we present a novel verification approach inspired by the “operating guidelines” used for partner synthesis. We view the configuration process as an external service, and compute a characterization of all such services which meet particular requirements via the notion of configuration guideline. As a result, we can characterize all feasible configurations (i. e., configurations without behavioral problems) at design time, instead of repeatedly checking each individual configuration while configuring a process model.
Resumo:
Background: Exercise interventions during adjuvant cancer therapy have been shown to increase functional capacity, relieve fatigue and distress and may assist rates of chemotherapy completion. These studies have been limited to breast, gastric and mixed cancer groups and it is not yet known if a similar intervention is even feasible among women with ovarian cancer. We aimed to assess safety, feasibility and potential effect of a walking intervention in women undergoing chemotherapy for ovarian cancer. Methods: Women newly diagnosed with ovarian cancer were recruited to participate in an individualised walking intervention throughout chemotherapy and were assessed pre-and post-intervention. Feasibility measures included session adherence, compliance with exercise physiologist prescribed walking targets and self-reported program acceptability. Changes in objective physical functioning (6 minute walk test), self-reported distress (Hospital Anxiety and Depression Scale), symptoms (Memorial Symptom Assessment Scale - Physical) and quality of life (Functional Assessment of Cancer Therapy - Ovarian) were calculated, and chemotherapy completion and adverse intervention effects recorded. Results: Seventeen women were enrolled (63% recruitment rate). Mean age was 60 years (SD = 8 years), 88% were diagnosed with FIGO stage III or IV disease, 14 women underwent adjuvant and three neo-adjuvant chemotherapy. On average, women adhered to > 80% of their intervention sessions and complied with 76% of their walking targets, with the majority walking four days a week at moderate intensity for 30 minutes per session. Meaningful improvements were found in physical functioning, physical symptoms, physical well-being and ovarian cancerspecific quality of life. Most women (76%) completed ≥85% of their planned chemotherapy dose. There were no withdrawals or serious adverse events and all women reported the program as being helpful. Conclusions: These positive preliminary results suggest that this walking intervention for women receiving chemotherapy for ovarian cancer is safe, feasible and acceptable and could be used in development of future work. Trial registration: ACTRN12609000252213
Resumo:
How bloggers and other independent online commentators criticise, correct, and otherwise challenge conventional journalism has been known for years, but has yet to be fully accepted by journalists; hostilities between the media establishment and the new generation of citizen journalists continue to flare up from time to time. The old gatekeeping monopoly of the mass media has been challenged by the new practice of gatewatching: by individual bloggers and by communities of commentators which may not report the news first-hand, but curate and evaluate the news and other information provided by official sources, and thus provide an important service. And this now takes place ever more rapidly, almost in real time: using the latest social networks, which disseminate, share, comment, question, and debunk news reports within minutes, and using additional platforms that enable fast and effective ad hoc collaboration between users. When hundreds of volunteers can prove within a few days that a German minister has been guilty of serious plagiarism, when the world first learns of earthquakes and tsunamis via Twitter – how does journalism manage to keep up?
Resumo:
Many current HCI, social networking, ubiquitous computing, and context aware designs, in order for the design to function, have access to, or collect, significant personal information about the user. This raises concerns about privacy and security, in both the research community and main-stream media. From a practical perspective, in the social world, secrecy and security form an ongoing accomplishment rather than something that is set up and left alone. We explore how design can support privacy as practical action, and investigate the notion of collective information-practice of privacy and security concerns of participants of a mobile, social software for ride sharing. This paper contributes an understanding of HCI security and privacy tensions, discovered while “designing in use” using a Reflective, Agile, Iterative Design (RAID) method.
Resumo:
There is increasing evidence that parenting and feeding interact to influence children’s eating behaviour and weight status. Interpretation of existing research is complicated by the lack of consensus in the conceptualisation and measurement of both ‘parenting’ and ‘feeding’, particularly the distinction between ‘styles’, ‘dimensions’ and ‘practices’. In addition, the lack of validated tools to concurrently assess feeding practices in infancy limits the capacity to examine the relationships between parenting and feeding in infancy and their short- and long-term influence on weight status. In this paper we provide an overview of the constructs examined in this emerging area of research, highlight the conceptual, definitional and measurement challenges and propose a unifying model to aid design and the interpretation of intervention studies. Progress on these methodological issues will contribute to the robust evidence required to justify investment in interventions that focus on parenting and feeding in the context of child obesity prevention.
Resumo:
While the 2007 Australian federal election was notable for the use of social media by the Australian Labor Party in campaigning, the 2010 election took place in a media landscape in which social media–especially Twitter–had become much more embedded in both political journalism and independent political commentary. This article draws on the computer-aided analysis of election-related Twitter messages, collected under the #ausvotes hashtag, to describe the key patterns of activity and thematic foci of the election’s coverage in this particular social media site. It introduces novel metrics for analysing public communication via Twitter, and describes the related methods. What emerges from this analysis is the role of the #ausvotes hashtag as a means of gathering an ad hoc ‘issue public’– a finding which is likely to be replicated for other hashtag communities.
Resumo:
Twitter is now well established as the world’s second most important social media platform, after Facebook. Its 140-character updates are designed for brief messaging, and its network structures are kept relatively flat and simple: messages from users are either public and visible to all (even to unregistered visitors using the Twitter website), or private and visible only to approved ‘followers’ of the sender; there are no more complex definitions of degrees of connection (family, friends, friends of friends) as they are available in other social networks. Over time, Twitter users have developed simple, but effective mechanisms for working around these limitations: ‘#hashtags’, which enable the manual or automatic collation of all tweets containing the same #hashtag, as well allowing users to subscribe to content feeds that contain only those tweets which feature specific #hashtags; and ‘@replies’, which allow senders to direct public messages even to users whom they do not already follow. This paper documents a methodology for extracting public Twitter activity data around specific #hashtags, and for processing these data in order to analyse and visualize the @reply networks existing between participating users – both overall, as a static network, and over time, to highlight the dynamic structure of @reply conversations. Such visualizations enable us to highlight the shifting roles played by individual participants, as well as the response of the overall #hashtag community to new stimuli – such as the entry of new participants or the availability of new information. Over longer timeframes, it is also possible to identify different phases in the overall discussion, or the formation of distinct clusters of preferentially interacting participants.
Resumo:
Our research explores the design of networked technologies to facilitate local suburban communications and to encourage people to engage with their local community. While there are many investigations of interaction designs for networked technologies, most research utilises small exercises, workshops or other short-term studies to investigate interaction designs. However, we have found these short-term methods to be ineffective in the context of understanding local community interaction. Moreover we find that people are resistant to putting their time into workshops and exercises, understandably so because these are academic practices, not local community practices. Our contribution is to detail a long term embedded design approach in which we interact with the community over the long term in the course of normal community goings-on with an evolving exploratory prototype. This paper discusses the embedded approach to working in the wild for extended field research.
Resumo:
Increasingly, studies are reported that examine how conceptual modeling is conducted in practice. Yet, typically the studies to date have examined in isolation how modeling grammars can be, or are, used to develop models of information systems or organizational processes, without considering that such modeling is typically done by means of a modeling tool that extends the modeling functionality offered by a grammar through complementary features. This paper extends the literature by examining how the use of seven different features of modeling tools affects usage beliefs users develop when using modeling grammars for process modeling. We show that five distinct tool features positively affect usefulness, ease of use and satisfaction beliefs of users. We offer a number of interpretations about the findings. We also describe how the results inform decisions of relevance to developers of modeling tools as well as managers in charge for making modeling-related investment decisions.
Resumo:
The quality of conceptual business process models is highly relevant for the design of corresponding information systems. In particular, a precise measurement of model characteristics can be beneficial from a business perspective, helping to save costs thanks to early error detection. This is just as true from a software engineering point of view. In this latter case, models facilitate stakeholder communication and software system design. Research has investigated several proposals as regards measures for business process models, from a rather correlational perspective. This is helpful for understanding, for example size and complexity as general driving forces of error probability. Yet, design decisions usually have to build on thresholds, which can reliably indicate that a certain counter-action has to be taken. This cannot be achieved only by providing measures; it requires a systematic identification of effective and meaningful thresholds. In this paper, we derive thresholds for a set of structural measures for predicting errors in conceptual process models. To this end, we use a collection of 2,000 business process models from practice as a means of determining thresholds, applying an adaptation of the ROC curves method. Furthermore, an extensive validation of the derived thresholds was conducted by using 429 EPC models from an Australian financial institution. Finally, significant thresholds were adapted to refine existing modeling guidelines in a quantitative way.
Resumo:
Objective: Hospital EDs are a significant and high-profile component of Australia’s health-care system, which in recent years have experienced considerable crowding. This crowding is caused by the combination of increasing demand, throughput and output factors. The aim of the present article is to clarify trends in the use of public ED services across Australia with a view to providing an evidence basis for future policy analysis and discussion. Methods: The data for the present article have been extracted, compiled and analysed from publicly available sources for a 10 year period between 2000–2001 and 2009–2010. Results: Demand for public ED care increased by 37% over the decade, an average annual increase of 1.8% in the utilization rate per 1000 persons. There were significant differences in utilization rates and in trends in growth among states and territories that do not easily relate to general population trends alone. Conclusions: This growth in demand exceeds general population growth, and the variability between states both in utilization rates and overall trends defies immediate explanation. The growth in demand for ED services is a partial contributor to the crowding being experienced in EDs across Australia. There is a need for more detailed study, including qualitative analysis of patient motivations in order to identify the factors driving this growth in demand.