980 resultados para Kaltenborn, H. v. (Hans), 1878-1965.
Resumo:
The CDKN2 gene, encoding the cyclin dependent kinase inhibitor p16, is a tumour suppressor gene involved in melanoma and maps to chromosome band 9p22. Mutations or interstitial deletions of this gene have been found both in the germline of familial melanoma cases and somatically in melanoma cell lines. Previous mutation analyses of melanoma cell lines have indicated a high frequency of C:G to T:A transitions, with all of these mutations occurring at dipyrimidine sites. Including three melanoma cell lines carrying tandem CC to TT mutations, the spectrum of mutations so far reported indicates a possible role for u.v. radiation in the mutagenesis of this gene in some tumours. To further examine this hypothesis we have characterised mutations of the CDKN2 gene in 30 melanoma cell lines. Nineteen lines carried complete or partial homozygous deletions of the gene. Of the remaining cell lines, eight were shown by direct sequencing of PCR products from exon 1 and exon 2 to carry a total of nine different mutations of CDKN2. Two cell lines carried tandem CC to TT mutations and a high rate of C:G to T:A transitions was observed. This study provides further evidence for the role of u.v. light in the genesis of melanoma, with one target being the CDKN2 tumour suppressor gene.
Resumo:
The United States Supreme Court has handed down a once in a generation patent law decision that will have important ramifications for the patentability of non-physical methods, both internationally and in Australia. In Bilski v Kappos, the Supreme Court considered whether an invention must either be tied to a machine or apparatus, or transform an article into a different state or thing to be patentable. It also considered for the first time whether business methods are patentable subject matter. The decision will be of particular interest to practitioners who followed the litigation in Grant v Commissioner of Patents, a Federal Court decision in which a Brisbane-based inventor was denied a patent over a method of protecting an asset from the claims of creditors.
Resumo:
This chapter provides an analysis of feedback from key stakeholders, collected as part of a research project, on the problems and tensions evident in the collective work practices of learning advisers employed in learning assistance services at an Australian metropolitan university (Peach, 2003). The term 'learning assistance' is used in the Australian higher education sector generally to refer to student support services that include assistance with academic writing and other study skills. The aim of the study was to help learning advisers and other key stakeholders develop a better understanding of the work activity with a view to using this understanding to generate improvements in service provision. Over twenty problems and associated tensions were identified through stakeholder feedback however the focus of this chapter is the analysis of tensions related to a cluster of problems referred to as cost-efficiency versus quality service. Theoretical modelling derived from the tools made available through cultural historical activity theory and expansive visibilsation (Engestrom and Miettinen, 1999) and excerpts from data are used to illustrate how different understandings of the purpose of learning assistance services impacts on the work practices of learning advisers and creates problems and tensions in relation to the type of service available (including use of technology),level of service available, and learning adviser workload.
Resumo:
In Central Queensland Mining Supplies Pty Ltd v Columbia Steel Casting Co Ltd [2011] QSC 183 Applegarth J considered complaints made by the defendant about the approach the plaintiff had taken in its endeavour to comply with its disclosure obligation under r 211 of the Uniform Civil Procedure Rules 1999 (Qld). The judgment also provides an indication of the direction the court is taking in relation to disclosure and document management in matters involving large numbers of documents.
Resumo:
This work is a theoretical investigation into the coupling of a single excited quantum emitter to the plasmon mode of a V groove waveguide. The V groove waveguide consists of a triangular channel milled in gold and the emitter is modeled as a dipole emitter, and could represent a quantum dot, nitrogen vacancy in diamond, or similar. In this work the dependence of coupling efficiency of emitter to plasmon mode is determined for various geometrical parameters of the emitter-waveguide system. Using the finite element method, the effect on coupling efficiency of the emitter position and orientation, groove angle, groove depth, and tip radius, is studied in detail. We demonstrate that all parameters, with the exception of groove depth, have a significant impact on the attainable coupling efficiency. Understanding the effect of various geometrical parameters on the coupling between emitters and the plasmonic mode of the waveguide is essential for the design and optimization of quantum dot–V groove devices.
Resumo:
This article considers the High Court decision of Cattanach v Melchior, which permitted the recovery of damages for the cost of raising a child born through medical negligence. It discusses the reasoning in each of the judgments and seeks to identify themes so as to explain the divide between the majority and minority. It also considers the impact of legislative intervention in Queensland and New South Wales.
Resumo:
Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation platform ( NeSSi 2 ). Built-in functionalities include dynamic group formation based on node preferences, group-internal communication, group management and an approach for handling the infection process for malware-based attacks. The CIDE simulation environment provides functionalities for easy implementation of collaborating nodes in large-scale setups. We evaluate the group communication mechanism on the one hand and provide a case study and evaluate our collaborative security evaluation platform in a signature exchange scenario on the other.