945 resultados para Modifications
Resumo:
Using budding yeast, we investigated a negative interaction network among genes for tRNA modifications previously implicated in anticodon-codon interaction: 5-methoxy-carbonyl-methyl-2-thio-uridine (mcm5s2U34: ELP3, URM1), pseudouridine (Ψ38/39: DEG1) and cyclic N6-threonyl-carbamoyl-adenosine (ct6A37: TCD1). In line with functional cross talk between these modifications, we find that combined removal of either ct6A37 or Ψ38/39 and mcm5U34 or s2U34 results in morphologically altered cells with synthetic growth defects. Phenotypic suppression by tRNA overexpression suggests that these defects are caused by malfunction of tRNALysUUU or tRNAGlnUUG, respectively. Indeed, mRNA translation and synthesis of the Gln-rich prion Rnq1 are severely impaired in the absence of Ψ38/39 and mcm5U34 or s2U34, and this defect can be rescued by overexpression of tRNAGlnUUG. Surprisingly, we find that combined modification defects in the anticodon loops of different tRNAs induce similar cell polarity- and nuclear segregation defects that are accompanied by increased aggregation of cellular proteins. Since conditional expression of an artificial aggregation-prone protein triggered similar cytological aberrancies, protein aggregation is likely responsible for loss of morphogenesis and cytokinesis control in mutants with inappropriate tRNA anticodon loop modifications.
Resumo:
La déchirure de la coiffe des rotateurs est une des causes les plus fréquentes de douleur et de dysfonctionnement de l'épaule. La réparation chirurgicale est couramment réalisée chez les patients symptomatiques et de nombreux efforts ont été faits pour améliorer les techniques chirurgicales. Cependant, le taux de re-déchirure est encore élevé ce qui affecte les stratégies de réhabilitation post-opératoire. Les recommandations post-chirurgicales doivent trouver un équilibre optimal entre le repos total afin de protéger le tendon réparé et les activités préconisées afin de restaurer l'amplitude articulaire et la force musculaire. Après une réparation de la coiffe, l'épaule est le plus souvent immobilisée grâce à une écharpe ou une orthèse. Cependant, cette immobilisation limite aussi la mobilité du coude et du poignet. Cette période qui peut durer de 4 à 6 semaines où seuls des mouvements passifs peuvent être réalisés. Ensuite, les patients sont incités à réaliser les exercices actifs assistés et des exercices actifs dans toute la mobilité articulaire pour récupérer respectivement l’amplitude complète de mouvement actif et se préparer aux exercices de résistance réalisés dans la phase suivante de la réadaptation. L’analyse électromyographique des muscles de l'épaule a fourni des évidences scientifiques pour la recommandation de beaucoup d'exercices de réadaptation au cours de cette période. Les activités sollicitant les muscles de la coiffe des rotateurs à moins de 20% de leur activation maximale volontaire sont considérés sécuritaires pour les premières phases de la réhabilitation. À partir de ce concept, l'objectif de cette thèse a été d'évaluer des activités musculaires de l'épaule pendant des mouvements et exercices qui peuvent théoriquement être effectués au cours des premières phases de la réhabilitation. Les trois questions principales de cette thèse sont : 1) Est-ce que la mobilisation du coude et du poignet produisent une grande activité des muscles de la coiffe? 2) Est-ce que les exercices de renforcement musculaire du bras, de l’avant-bras et du torse produisent une grande activité dans les muscles de la coiffe? 3) Au cours d'élévations actives du bras, est-ce que le plan d'élévation affecte l'activité de la coiffe des rotateurs? Dans notre première étude, nous avons évalué 15 muscles de l'épaule chez 14 sujets sains par électromyographie de surface et intramusculaire. Nos résultats ont montré qu’avec une orthèse d’épaule, les mouvements du coude et du poignet et même quelques exercices de renforcement impliquant ces deux articulations, activent de manière sécuritaire les muscles de ii la coiffe. Nous avons également introduit des tâches de la vie quotidienne qui peuvent être effectuées en toute sécurité pendant la période d'immobilisation. Ces résultats peuvent aider à modifier la conception d'orthèses de l’épaule. Dans notre deuxième étude, nous avons montré que l'adduction du bras réalisée contre une mousse à faible densité, positionnée pour remplacer le triangle d’une orthèse, produit des activations des muscles de la coiffe sécuritaires. Dans notre troisième étude, nous avons évalué l'électromyographie des muscles de l’épaule pendant les tâches d'élévation du bras chez 8 patients symptomatiques avec la déchirure de coiffe des rotateurs. Nous avons constaté que l'activité du supra-épineux était significativement plus élevée pendant l’abduction que pendant la scaption et la flexion. Ce résultat suggère une séquence de plan d’élévation active pendant la rééducation. Les résultats présentés dans cette thèse, suggèrent quelques modifications dans les protocoles de réadaptation de l’épaule pendant les 12 premières semaines après la réparation de la coiffe. Ces suggestions fournissent également des évidences scientifiques pour la production d'orthèses plus dynamiques et fonctionnelles à l’articulation de l’épaule.
Resumo:
In this paper we propose an efficient authentication and integrity scheme to support DGPS corrections using the RTCM protocol, such that the identified vulnerabilities in DGPS are mitigated. The proposed scheme is based on the TESLA broadcast protocol with modifications that make it suitable for the bandwidth and processor constrained environment of marine DGPS.
Resumo:
Purpose Waiting for service by customers is an important problem for many financial service marketers. Two new approaches are proposed. First, customer evaluation of the service is increased with an ambient scent. Second a cognitive variable is identified which different iates customers by the way they value time so that they can be segmented. Methodology Pretests included focus groups which highlighted financial services and a pilot test were foll owed by a main sample of 607 subjects. Structural equation modelling and multivariate analysis of covariance were used for analysis. Findings A cognitive variable, the need for time management can be used, together with demographic and customer net worth data, to segment a customer base. Two environmental interventions, music and scent, can increase customer satisfaction among customers kept waiting in a line. Research implications Two original approaches to a rapidly growing service marketing problem are identified. Practical implications Service contact points can reduce incidence of "queue rage" and enhance customer satisfaction by either or both of two simple modifications to the service environment or a preventive strategy of offering targeted customers an alternative. Originality A new method of segmentation and a new environmental intervention are proposed .
Resumo:
This paper examines the vibration characteristics and vibration control of complex ship structures. It is shown that input mobilities of a ship structure at engine supports, due to out-of-plane force or bending moment excitations, are governed by the flexural stiffness of the engine supports. The frequency averaged input mobilities of the ship structure, due to such excitations, can be represented by those of the corresponding infinite beam. The torsional moment input mobility at the engine support can be estimated from the torsional response of the engine bed section under direct excitation. It is found that the inclusion of ship hull and deck plates in the ship structure model has little effect on the frequency-averaged response of the ship structure. This study also shows that vibration propagation in complex ship structures at low frequencies can be attenuated by imposing irregularities to the ring frame locations in ships. Vibration responses of ship structures due to machinery excitations at higher frequencies can be controlled by structural modifications of the local supporting structures such as engine beds in ships.
Resumo:
The weaknesses of ‗traditional‘ modes of instruction in accounting education have been widely discussed. Many contend that the traditional approach limits the ability to provide opportunities for students to raise their competency level and allow them to apply knowledge and skills in professional problem solving situations. However, the recent body of literature suggests that accounting educators are indeed actively experimenting with ‗non-traditional‘ and ‗innovative‘ instructional approaches, where some authors clearly favour one approach over another. But can one instructional approach alone meet the necessary conditions for different learning objectives? Taking into account the ever changing landscape of not only business environments, but also the higher education sector, the premise guiding the collaborators in this research is that it is perhaps counter productive to promote competing dichotomous views of ‗traditional‘ and ‗non-traditional‘ instructional approaches to accounting education, and that the notion of ‗blended learning‘ might provide a useful framework to enhance the learning and teaching of accounting. This paper reports on the first cycle of a longitudinal study, which explores the possibility of using blended learning in first year accounting at one campus of a large regional university. The critical elements of blended learning which emerged in the study are discussed and, consistent with the design-based research framework, the paper also identifies key design modifications for successive cycles of the research.
Resumo:
Large design projects, such as those in the AEC domain, involve collaboration among a number of design disciplines, often in separate locations. With the increase in CAD usage in design offices, there has been an increase in the interest in collaboration using the electronic medium, both synchronously and asynchronously. The use of a single shared database representing a single model of a building has been widely put forward but this paper argues that this does not take into account the different representations required by each discipline. This paper puts forward an environment which provides real-time multi-user collaboration in a 3D virtual world for designers in different locations. Agent technology is used to manage the different views, creation and modifications of objects in the 3D virtual world and the necessary relationships with the database(s) belonging to each discipline.
Resumo:
The adoption of e-business by Small and Medium Enterprises (SMEs) in construction lags from other service and product businesses within the building sector. This paper develops a model to facilitate the uptake of electronic business, especially in relation to SMEs within the Australian construction sector. Ebusiness is defined here as “the undertaking of business-related transactions, communications and information exchanges utilising electronic medium and environment”, the elicited model highlights significant changes needed including skills development, social, economic and cultural issues. The model highlights barriers for SMEs to migrate towards e-transactions, e-bidding, e-tendering and ecollaboration and provides learning and skills development components. The model is derived from case study fieldwork and is to inform diffusion and awareness models for best practice. Empirical techniques included ‘focus group’ interviews and one to one ‘interviews’. Data was transcribed and analysed using cluster analyses. Preliminary results reveal that current models for e-business adoption are not effective within the construction context as they have emerged from other service and product industries - such as retail or tourism. These generic models have largely ignored the nature of the construction industry, and some modifications appears to be required. This paper proposes an alternative adoption model which is more sensitive to the nature of the industry – particularly for e-business uptake in building SME’s.
Resumo:
It has been recognised that brands play a role in industrial markets, but to date a comprehensive model of business-to-business (B2B) branding does not exist, nor has there been an empirical study of the applicability of a full brand equity model in a B2B context. This paper is the first to begin to address these issues. The paper introduces the Customer- Based Brand Equity (CBBE) model by Kevin Keller (1993; 2001; 2003), and empirically tests its applicability in the market of electronic tracking systems for waste management. While Keller claims that the CBBE pyramid can be applied in a B2B context, this research highlights challenges of such an application, and suggests changes to the model are required. Assessing the equity of manufacturers’ brand names is more appropriate than measuring the equity of individual product brands as suggested by Keller. Secondly, the building blocks of Keller’s model appear useful in an organisational context, although differences in the subdimensions are required. Brand feelings appear to lack relevance in the industrial market investigated, and the pinnacle of Keller’s pyramid, resonance, needs serious modifications. Finally, company representatives play a role in building brand equity, indicating a need for this human element to be recognised in a B2B model.
Resumo:
The climatic conditions of tropical and subtropical regions within Australia present, at times, extreme risk of physical activity induced heat illness. Many administrators and teachers in school settings are aware of the general risks of heat related illness. In the absence of reliable information applied at the local level, there is a risk that inappropriate decisions may be made concerning school events that incorporate opportunities to be physically active. Such events may be prematurely cancelled resulting in the loss of necessary time for physical activity. Under high or extremely high risk conditions however, the absence of appropriate modifications or continuation could place the health of students, staff and other parties at risk. School staff and other key stakeholders should understand the mechanisms of escalating risk and be supported to undertake action to reduce the level of risk through appropriate policies, procedures, resources and action plans.
Resumo:
The arrival of substantial cohorts of English language learners from Africa with little, no or severely interrupted schooling is requiring new pedagogic responses from teachers in Australia and other Western countries of refugee re-settlement. If the students are to have optimal educational and life chances, it is crucial for them to acquire resources for conceptually deep and critical literacy tasks while still learning basic reading and writing skills. This requires teachers to extend their pedagogic repertoires: subject area teachers must teach language and literacy alongside content; high school teachers must teach what has been thought of as primary school curriculum. The aim of this article is to describe some teacher responses to these challenges. Data are drawn from a study involving an intensive language school and three high schools, and also from the author’s experience as a homework tutor for refugees. Stand-alone basic skills programs are described, as are modifications of long-established ESL programs. It is also argued that teachers need to find ways of linking with the conceptual knowledge of students who arrive with content area backgrounds different from others in their class. Everyday life experiences prior to, and after re-settlement in the West, are rich with potential in this regard.
Resumo:
Network-based Intrusion Detection Systems (NIDSs) analyse network traffic to detect instances of malicious activity. Typically, this is only possible when the network traffic is accessible for analysis. With the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer access this crucial audit data. In this paper, we present an implementation and evaluation of our approach proposed in Goh et al. (2009). It is based on Shamir's secret-sharing scheme and allows a NIDS to function normally in a VPN without any modifications and without compromising the confidentiality afforded by the VPN.
Resumo:
For over a decade, IT expenditure in China and Malaysia has shown a significant increase, as organisations in these countries are increasingly dependent on information systems (IS) for achieving strategic advantages and business benefits. However, there have been numerous reports of dissatisfaction with IS, and in some cases the effectiveness of the information systems have yet to be reviewed. Two exploratory case studies reported in this paper are the first phase of an overall research in validating the IS-Impact model introduced by Gable, Sedera and Chan in two countries: China and Malaysia. This validation research aims to produce a standard measuring model across different contexts. The purpose of this paper is to present preliminary findings from two exploratory case studies, attempt to test the feasibility of the research design and to investigate applicability of the IS-Impact model in Chinese and Malaysian organisations. Twenty-nine respondents from a Chinese private company and seventeen respondents from a state government in Malaysia were involved in these studies. Findings indicated that most of existing IS-Impact measures are applicable in the study contexts, however, there are some new measures informed by the respondents. Feedback from the case studies also suggested necessary modifications to the Mandarin instrument.
Resumo:
Current multimedia Web search engines still use keywords as the primary means to search. Due to the richness in multimedia contents, general users constantly experience some difficulties in formulating textual queries that are representative enough for their needs. As a result, query reformulation becomes part of an inevitable process in most multimedia searches. Previous Web query formulation studies did not investigate the modification sequences and thus can only report limited findings on the reformulation behavior. In this study, we propose an automatic approach to examine multimedia query reformulation using large-scale transaction logs. The key findings show that search term replacement is the most dominant type of modifications in visual searches but less important in audio searches. Image search users prefer the specified search strategy more than video and audio users. There is also a clear tendency to replace terms with synonyms or associated terms in visual queries. The analysis of the search strategies in different types of multimedia searching provides some insights into user’s searching behavior, which can contribute to the design of future query formulation assistance for keyword-based Web multimedia retrieval systems.
Resumo:
Many surveillance applications (object tracking, abandoned object detection) rely on detecting changes in a scene. Foreground segmentation is an effective way to extract the foreground from the scene, but these techniques cannot discriminate between objects that have temporarily stopped and those that are moving. We propose a series of modifications to an existing foreground segmentation system\cite{Butler2003} so that the foreground is further segmented into two or more layers. This yields an active layer of objects currently in motion and a passive layer of objects that have temporarily ceased motion which can itself be decomposed into multiple static layers. We also propose a variable threshold to cope with variable illumination, a feedback mechanism that allows an external process (i.e. surveillance system) to alter the motion detectors state, and a lighting compensation process and a shadow detector to reduce errors caused by lighting inconsistencies. The technique is demonstrated using outdoor surveillance footage, and is shown to be able to effectively deal with real world lighting conditions and overlapping objects.