164 resultados para ELF-97R
Resumo:
Approximately 200 million people, 5% aged 15-64 worldwide are illicit drug or substance abusers (World Drug Report, 2006). Between 2002 and 2005, an average of 8.2% of 12 year olds and older in the Miami, Fort Lauderdale metropolitan areas used illicit drugs (SAMHSA, 2007). Eight percent of pregnant women, aged 15 to 25, were more likely to have used illicit drugs during pregnancy than pregnant women aged 26 to 44. Alcohol use was 9.8% and cigarette use was 18% for pregnant women aged 15 to 44 (SAMHSA, 2005). Approximately a quarter of annual birth defects are attributed to the exposure of drugs or substance abuse in utero (General Accounting Office, 1991). Physical, psychological and emotional challenges may be present for the illicit drug/substance abuse (ID/SA) mother and infant placing them at a disadvantage early in their relationship (Shonkoff & Marshall, 1990). Mothers with low self efficacy have insecurely attached infants (Donovan, Leavitt, & Walsh, 1987). As the ID/SA mother struggles with wanting to be a good parent, education is needed to help her care for her infant. In this experimental study residential rehabilitating ID/SA mothers peer taught infant massage. Massage builds bonding/attachment between mother and infant (Reese & Storm, 2008) and peer teaching is effective because participants have faced similar challenges and speak the same language (Boud, Cohen, & Sampson 2001). Quantitative data were collected using the General Self-Efficacy and Maternal Attachment Inventory-Revised Scale before and after the 4-week intervention program. A reported result of this study was that empowering ID/SA mothers increased their self-efficacy, which in turn allowed the mothers to tackle challenges encountered and created feelings of being a fit mother to their infants. This research contributes to the existing database promoting evidence-based practice in drug rehabilitation centers. Healthcare personnel, such as nurse educators and maternal-child health practitioners, can develop programs in drug rehabilitation centers that cultivate an environment where the ID/SA rehabilitating mothers can peer teach each other, while creating a support system. Using infant massage as a therapeutic tool can develop a healthy infant and nurture a more positive relationship between mother and infant.
Resumo:
Prostate cancer is a worldwide health concern. Pygopus2 (hPygo2) protein is required for growth in breast, ovarian, cervical and prostate cancer. hPygo2 expression is regulated by the Rb protein via the ETS factor Elf-1 in cervical and breast cancer. Additionally, the ETS family has confirmed roles in carcinogenesis and proliferation. The mechanism of hPygo2 expression has not been elucidated in prostate cancer. My hypothesis proposes that hPygo2 expression is regulated by Elf-1 bound to its promoter region. Prostate cancer cell lines were used to show protein levels of hPygo2, Elf-1 and ETS. ChIP assays confirmed varying binding capability of Elf-1 and ETS factors to the proximal promoter region between cell lines. Elf-1 knockdown experiments were performed, results show no change in hPygo2 protein levels but show reduction in 22Rv1 mRNA levels. These results suggest that Elf-1 might not be exclusively involved in the activation of Pygopus expression in prostate cancer.
Resumo:
Peer reviewed
Resumo:
Peer reviewed
Resumo:
the poetry by J.R. Planché ; composed & arranged with an accompaniment for the piano forte by Carl Maria von Weber.
Resumo:
La invención comprende un sistema para la medición de campos electromagnéticos débiles, en la banda de frecuencias comprendida entre 1 a 100 Hz, donde se localizan señales derivadas de la resonancia natural que ocurre entre la tierra y la ionosfera, las resonancias de Schumann. El sistema está compuesto por un núcleo de material ferromagnético (1) y un conjunto de bobinas separadas entre sí (2), conectadas mediante cables unifilares (8). Un cable de par trenzado (3) conecta el sensor a un sistema electrónico de medida (4) compuesto por un amplificador diferencial (5) al que se acoplan cada par trenzado, en una bifurcación coaxial con las mallas comunes (20), (21) mediante conectores coaxiales (22), (23) y con salida a un convertidor analógico digital (6). La geometría, estructura y materiales del sistema, le confieren sus propiedades de sensibilidad y ancho de banda.
False Anglicisms in Legal and Business English as a Lingua Franca (ELF): A Process of Back-borrowing
Resumo:
False Anglicisms are words which technically are not part of the English language, but "seem" English, due to their shape or resemblance to English words. These are usually the result of new creations/coinages in other languages and/or semantic shifts. Due to the use of English as a Lingua Franca, it is becoming quite common to come across these words in English with the "re-imported" shape and meaning they bring from other languages.
Resumo:
The Mount Isa Basin is a new concept used to describe the area of Palaeo- to Mesoproterozoic rocks south of the Murphy Inlier and inappropriately described presently as the Mount Isa Inlier. The new basin concept presented in this thesis allows for the characterisation of basin-wide structural deformation, correlation of mineralisation with particular lithostratigraphic and seismic stratigraphic packages, and the recognition of areas with petroleum exploration potential. The northern depositional margin of the Mount Isa Basin is the metamorphic, intrusive and volcanic complex here referred to as the Murphy Inlier (not the "Murphy Tectonic Ridge"). The eastern, southern and western boundaries of the basin are obscured by younger basins (Carpentaria, Eromanga and Georgina Basins). The Murphy Inlier rocks comprise the seismic basement to the Mount Isa Basin sequence. Evidence for the continuity of the Mount Isa Basin with the McArthur Basin to the northwest and the Willyama Block (Basin) at Broken Hill to the south is presented. These areas combined with several other areas of similar age are believed to have comprised the Carpentarian Superbasin (new term). The application of seismic exploration within Authority to Prospect (ATP) 423P at the northern margin of the basin was critical to the recognition and definition of the Mount Isa Basin. The Mount Isa Basin is structurally analogous to the Palaeozoic Arkoma Basin of Illinois and Arkansas in southern USA but, as with all basins it contains unique characteristics, a function of its individual development history. The Mount Isa Basin evolved in a manner similar to many well described, Phanerozoic plate tectonic driven basins. A full Wilson Cycle is recognised and a plate tectonic model proposed. The northern Mount Isa Basin is defined as the Proterozoic basin area northwest of the Mount Gordon Fault. Deposition in the northern Mount Isa Basin began with a rift sequence of volcaniclastic sediments followed by a passive margin drift phase comprising mostly carbonate rocks. Following the rift and drift phases, major north-south compression produced east-west thrusting in the south of the basin inverting the older sequences. This compression produced an asymmetric epi- or intra-cratonic clastic dominated peripheral foreland basin provenanced in the south and thinning markedly to a stable platform area (the Murphy Inlier) in the north. The fmal major deformation comprised east-west compression producing north-south aligned faults that are particularly prominent at Mount Isa. Potential field studies of the northern Mount Isa Basin, principally using magnetic data (and to a lesser extent gravity data, satellite images and aerial photographs) exhibit remarkable correlation with the reflection seismic data. The potential field data contributed significantly to the unravelling of the northern Mount Isa Basin architecture and deformation. Structurally, the Mount Isa Basin consists of three distinct regions. From the north to the south they are the Bowthorn Block, the Riversleigh Fold Zone and the Cloncurry Orogen (new names). The Bowthom Block, which is located between the Elizabeth Creek Thrust Zone and the Murphy Inlier, consists of an asymmetric wedge of volcanic, carbonate and clastic rocks. It ranges from over 10 000 m stratigraphic thickness in the south to less than 2000 min the north. The Bowthorn Block is relatively undeformed: however, it contains a series of reverse faults trending east-west that are interpreted from seismic data to be down-to-the-north normal faults that have been reactivated as thrusts. The Riversleigh Fold Zone is a folded and faulted region south of the Bowthorn Block, comprising much of the area formerly referred to as the Lawn Hill Platform. The Cloncurry Orogen consists of the area and sequences equivalent to the former Mount Isa Orogen. The name Cloncurry Orogen clearly distinguishes this area from the wider concept of the Mount Isa Basin. The South Nicholson Group and its probable correlatives, the Pilpah Sandstone and Quamby Conglomerate, comprise a later phase of now largely eroded deposits within the Mount Isa Basin. The name South Nicholson Basin is now outmoded as this terminology only applied to the South Nicholson Group unlike the original broader definition in Brown et al. (1968). Cored slimhole stratigraphic and mineral wells drilled by Amoco, Esso, Elf Aquitaine and Carpentaria Exploration prior to 1986, penetrated much of the stratigraphy and intersected both minor oil and gas shows plus excellent potential source rocks. The raw data were reinterpreted and augmented with seismic stratigraphy and source rock data from resampled mineral and petroleum stratigraphic exploration wells for this study. Since 1986, Comalco Aluminium Limited, as operator of a joint venture with Monument Resources Australia Limited and Bridge Oil Limited, recorded approximately 1000 km of reflection seismic data within the basin and drilled one conventional stratigraphic petroleum well, Beamesbrook-1. This work was the first reflection seismic and first conventional petroleum test of the northern Mount Isa Basin. When incorporated into the newly developed foreland basin and maturity models, a grass roots petroleum exploration play was recognised and this led to the present thesis. The Mount Isa Basin was seen to contain excellent source rocks coupled with potential reservoirs and all of the other essential aspects of a conventional petroleum exploration play. This play, although high risk, was commensurate with the enormous and totally untested petroleum potential of the basin. The basin was assessed for hydrocarbons in 1992 with three conventional exploration wells, Desert Creek-1, Argyle Creek-1 and Egilabria-1. These wells also tested and confrrmed the proposed basin model. No commercially viable oil or gas was encountered although evidence of its former existence was found. In addition to the petroleum exploration, indeed as a consequence of it, the association of the extensive base metal and other mineralisation in the Mount Isa Basin with hydrocarbons could not be overlooked. A comprehensive analysis of the available data suggests a link between the migration and possible generation or destruction of hydrocarbons and metal bearing fluids. Consequently, base metal exploration based on hydrocarbon exploration concepts is probably. the most effective technique in such basins. The metal-hydrocarbon-sedimentary basin-plate tectonic association (analogous to Phanerozoic models) is a compelling outcome of this work on the Palaeo- to Mesoproterozoic Mount lsa Basin. Petroleum within the Bowthom Block was apparently destroyed by hot brines that produced many ore deposits elsewhere in the basin.
Resumo:
ABSTR.4CT Senitivity of dot-immunobindinding ELf SA on nitrocellulose membrane (DotELISA)was compared with double-antibody sandwich ELISA (DAS-ELlSA) on polystyrene plates for the detection of bean yellow mosaic virus (BYMV), broad bean stain virus (WMV-2). Dot-ELISA was 2 and 1O times more sensitive than DAS-ELISA for the detection of BBSV and WMV-2, respectively, whereas DAS-ELISA was more sensitive than Dot-ELiSA for {he detection of BYMV. Both techniques were equally sensitive for the detection of BYDV. Using one day instead uf the two-day procedure, the four viruses were still detectable and the ralative sensitivity of both techniques remained the same.
Resumo:
We have always felt that “something very special” was happening in the 48hr and other similar game jams. This “something” is more than the intensity and challenge of the experience, although this certainly has appeal for the participants. We had an intuition that these intense 48 hour game jams exposed something pertinent to the changing shape of the Australian games industry where we see the demise of the late 20th century large studio - the “Night Elf” model and the growth of the small independent model. There are a large number of wider economic and cultural factors around this evolution but our interest is specifically in the change from “industry” to “creative industry” and the growth of games as a cultural media and art practice. If we are correct in our intuition, then illuminating this something also has important ramifications for those courses which teach game and interaction design and development. Rather than undertake a formal ethno-methodological approach, we decided to track as many of the actors in the event as possible. We documented the experience (Keith Novak’s beautiful B&W photography), the individual and their technology (IOGraph mouse tracking), the teams as a group (Time lapse photography) and movement tracking throughout the whole space (Blue tooth phone tracking). The raw data collected has given us opportunity to start a commentary on the “something special” happening in the 48hr.
Resumo:
This study investigated Chinese College English students. perceptions of pragmatics, their pragmatic competence in selected speech acts, strategies they employed in acquiring pragmatic knowledge, as well as their general approach to learning English as a foreign language. The research was triggered by a national curriculum initiative that prioritizes the need for College English students to enhance their ability to use English effectively in different social interactions (Chinese College English Education and Supervisory Committee, 2007). The traditional "grammar-translation" and "examination-oriented" method is believed to have reduced Chinese College English students to what is dubbed "mute" and "deaf" language learners (Zhang, 2008; Zhao, 2009). Many students lack pragmatic knowledge on how to interpret discourse by relating utterances to their meanings, understanding the intention of language users, and how language is used in specific settings (Bachman & Palmer, 1996, 2010). There is an increasing body of literature on awareness-raising of the importance of pragmatic knowledge and strategies for classroom instruction. However, to date, researchers have tended to focus largely on the teaching of pragmatics, rather than on how students acquire pragmatic competence (Bardovi-Harlig & Dornyei, 1998; Du, 2004; Hou, 2007; Ruan, 2007; Schauer, 2009). It is this gap in the research that this study fills, with a focus on different types of pragmatic knowledge, learner perceptions of such knowledge, and learning strategies that College English students employ in the process of learning English in general, and pragmatics in particular. Three strands of theories of second language acquisition (Ellis, 1985, 1994): pragmatics (Levinson, 1983; Mey, 2001; Yule, 1996), intercultural communications (Kramsch, 1998; Samovar & Porter, 1997; Samovar, Porter & McDaniel, 2009) and English as a lingua franca (ELF) (Canagarajah, 2006; Firth, 1996; Pennycook, 2010) were employed to establish a conceptual framework for data collection and analyses. Key constructs derived from the three related theories helped to form a typology for a detailed examination and theorization of the empirical evidence gathered from different sources. Four research instruments: a questionnaire (N=237), Discourse Completion Tasks (DCTs) (N=55), focus group interviews (N=18), and a textbook tasks analysis were employed to collect data for this systematic inquiry. Data collected by different instruments were analyzed and compared by way of a triangulation to enhance its validity and reliability. Major findings derived from different sources highlighted that, although College English students were grammatically advanced language learners, they displayed limited pragmatic knowledge and a highly restricted repertoire of language learning strategies. The majority of the respondents, however, believed that pragmatic knowledge was as important as linguistic knowledge in the process of developing communicative competence for interaction in different contexts. It was argued that a combination of a less than sufficient English proficiency, limited knowledge of pragmatics, inadequate language materials and tasks, and a small stock of language learning strategies, were a major hindrance to effective learning and communication, resulting in pragmatic failures in many intercultural communication situations. As the first systematic study of how Chinese College English students learned pragmatics, the research provided a solid empirical base for developing a tentative model for the learning of pragmatics in a College English classroom in China and similar educational contexts. The model was strengthened by a unique combination of theories of pragmatics, intercultural communication and ELF. Findings from this research provided insights into how Chinese College English students perceived pragmatics in the English as foreign language (EFL) curriculum, the processes of learning, as well as strategies they utilized in developing linguistic and pragmatic knowledge and competence.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
GO423 was initiated in 2012 as part of a community effort to ensure the vitality of the Queensland Games Sector. In common with other industrialised nations, the game industry in Australia is a reasonably significant contributor to Gross National Product (GNP). Games are played in 92% of Australian homes and the average adult player has been playing them for at least twelve years with 26% playing for more than thirty years (Brand, 2011). Like the games and interactive entertainment industries in other countries, the Australian industry has its roots in the small team model of the 1980s. So, for example, Beam Software, which was established in Melbourne in 1980, was started by two people and Krome Studios was started in 1999 by three. Both these companies grew to employing over 100 people in their heydays (considered large by Antipodean standards), not by producing their own intellectual property (IP) but by content generation for off shore parent companies. Thus our bigger companies grew on a model of service provision and tended not to generate their own IP (Darchen, 2012). There are some no-table exceptions where IP has originated locally and been ac-quired by international companies but in the case of some of the works of which we are most proud, the Australian company took on the role of “Night Elf” – a convenience due to affordances of the time zone which allowed our companies to work while the parent companies slept in a different time zone. In the post GFC climate, the strong Australian dollar and the vulnerability of such service provision means that job security is virtually non-existent with employees invariably being on short-term contracts. These issues are exacerbated by the decline of middle-ground games (those which fall between the triple-A titles and the smaller games often produced for a casual audience). The response to this state of affairs has been the change in the Australian games industry to new recognition of its identity as a wider cultural sector and the rise (or return) of an increasing number of small independent game development companies. ’In-dies’ consist of small teams, often making games for mobile and casual platforms, that depend on producing at least one if not two games a year and who often explore more radical definitions of games as designed cultural objects. The need for innovation and creativity in the Australian context is seen as a vital aspect of the current changing scene where we see the emphasis on the large studio production model give way to an emerging cultural sector model where small independent teams are engaged in shorter design and production schedules driven by digital distribution. In terms of Quality of Life (QoL) this new digital distribution brings with it the danger of 'digital isolation' - a studio can work from home and deliver from home. Community events thus become increasingly important. The GO423 Symposium is a response to these perceived needs and the event is based on the understanding that our new small creative teams depend on the local community of practice in no small way. GO423 thus offers local industry participants the opportunity to talk to each other about their work, to talk to potential new members about their work and to show off their work in a small intimate situation, encouraging both feedback and support.
Resumo:
Women at the boundary. Kyöpeli ( ghost, devil, elf, fairy, enchantress, witch ), Nainen ( woman ), Naara(s) ( female animal, derogatory term for a woman ), Neitsyt ( young, [virgin] woman ), Morsian ( bride ), Akka ( old woman, wife, grandmother ) and Ämmä ( [old] woman, wife, grandmother ) in Finnish place names This study examines a total of about 4,000 Finnish place names which include a specific that refers to a woman: Kyöpeli, Nainen, Naara(s), Neitsyt, Morsian, Akka or Ämmä. The study has two main objectives. First, to interpret the place names in the data, that is, to examine the words included in the data and establish their background and to differentiate names of different ages. In establishing the background of a name, the type of place (e.g. lake, hill or marsh) and its location, as well as the semantics of the feminine specific, are taken into account. The connotations of words referring to a woman are also studied. Words that refer to a woman are often affective and susceptible to changes in meaning, which is reflected in the history of place names. The second main objective is to recognise and highlight mythological place names. Mythology is pivotal for the interpretation of many place names with a feminine specific. The criteria for mythological names have not been explicitly discussed in Finnish onomastics until now, and I seek to determine such criteria in this study with the help of the data. Mythological place names often refer to large and significant natural localities, which are in many cases important boundaries for the community. Names for smaller localities may also be mythological if they refer to a place with a key location or a special topography (e.g. steep or rocky places). I also discuss the stories involved with specific places in the data, such as stories about supernatural beings. Each of the name groups discussed in the study has its own profile. For example, Naara(s) names are so old that naara is no longer understood to refer to a woman. These names have thus often been misinterpreted in onomastics. Names beginning with Morsian, on the other hand, appear to be of fairly recent origin and may be attributed to an international cautionary tale. Names beginning with Nais, Neitsyt, Akka and Ämmä highlight the duality of the data. They include both old names for important natural localities or boundaries and more recent names for modest dwellings, small cultivated areas and useless marshy ponds. This distribution of place names may reflect a cultural shift that changed the status of women in the community.
Resumo:
Three data sets were examined to define the level of interaction of reef associated sharks with the commercial Coral Reef Fin Fish Fishery within the Great Barrier Reef (GBR). Data were examined from fishery logbooks, an observer program within the fishery and a fishery-independent survey conducted as part of the Effects of Line Fishing (ELF) Experiment. The majority of the identified catch was comprised of grey reef (62-72%), whitetip reef (16-29%) and blacktip reef (6-13%) sharks. Logbook data revealed spatially and temporally variable landings of shark from the GBR. Catch per unit effort (CPUE) through time was stable for the period from 1989 to 2006 with no evidence of increase or decline. Data from observer and ELF data sets indicated no differences in CPUE among regions. The ELF data set demonstrated that CPUE was higher in Marine National Park zones (no fishing) when compared to General Use zones (open to fishing). The ongoing and consistent catches of reef sharks in the fishery and effectiveness of no-fishing zones suggest that management zones within the GBR Marine Park are effective at protecting a portion of the reef shark population from exploitation.