853 resultados para Defining surveillance


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The transformation-associated recombination (TAR) cloning technique allows selective and accurate isolation of chromosomal regions and genes from complex genomes. The technique is based on in vivo recombination between genomic DNA and a linearized vector containing homologous sequences, or hooks, to the gene of interest. The recombination occurs during transformation of yeast spheroplasts that results in the generation of a yeast artificial chromosome (YAC) containing the gene of interest. To further enhance and refine the TAR cloning technology, we determined the minimal size of a specific hook required for gene isolation utilizing the Tg.AC mouse transgene as a targeted region. For this purpose a set of vectors containing a B1 repeat hook and a Tg.AC-specific hook of variable sizes (from 20 to 800 bp) was constructed and checked for efficiency of transgene isolation by a radial TAR cloning. When vectors with a specific hook that was ≥60 bp were utilized, ∼2% of transformants contained circular YACs with the Tg.AC transgene sequences. Efficiency of cloning dramatically decreased when the TAR vector contained a hook of 40 bp or less. Thus, the minimal length of a unique sequence required for gene isolation by TAR is ∼60 bp. No transgene-positive YAC clones were detected when an ARS element was incorporated into a vector, demonstrating that the absence of a yeast origin of replication in a vector is a prerequisite for efficient gene isolation by TAR cloning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Crystal structures and biochemical analyses of PcrA helicase provide evidence for a model for processive DNA unwinding that involves coupling of single-stranded DNA (ssDNA) tracking to a duplex destabilization activity. The DNA tracking model invokes ATP-dependent flipping of bases between several pockets on the enzyme formed by conserved aromatic amino acid residues. We have used site-directed mutagenesis to confirm the requirement of all of these residues for helicase activity. We also demonstrate that the duplex unwinding defects correlate with an inability of certain mutant proteins to translocate effectively on ssDNA. Moreover, the results define an essential triad of residues within the ssDNA binding site that comprise the ATP-driven DNA motor itself.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Successful HR departments should support key business objectives by establishing metrics that determine the effectiveness of their processes. Functions such as recruiting, benefits, and training are processes that should have metrics. Understanding who measures what, when, and how often is the first step in measuring how much it costs to run HR. The next step is determining which processes are most critical, and then determining the metrics that fit the business needs. Slight adjustments will need to be made as business needs change, but the process for measuring outcomes should not change. This paper will focus on multinational corporations that employ at least ten thousand employees and have a ratio of one HR professional to every hundred fulltime equivalents (FTEs).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives: In Europe, 25% of workers use video display terminals (VDTs). Occupational health surveillance has been considered a key element in the protection of these workers. Nevertheless, it is unclear if guidelines available for this purpose, based on EU standards and available evidence, meet currently accepted quality criteria. The aim of this study was to appraise three sets of European VDT guidelines (UK, France, Spain) in which regulatory and evidence-based approaches for visual health have been formulated and recommendations for practice made. Methods: Three independent appraisers used an adapted AGREE instrument with seven domains to appraise the guidelines. A modified nominal group technique approach was used in two consecutive phases: first, individual evaluation of the three guidelines simultaneously, and second, a face-to-face meeting of appraisers to discuss scoring. Analysis of ratings obtained in each domain and variability among appraisers was undertaken (correlation and kappa coefficients). Results: All guidelines had low domain scores. The domain evaluated most highly was Scope and purpose, while Applicability was scored minimally. The UK guidelines had the highest overall score, and the Spanish ones had the lowest. The analysis of reliability and differences between scores in each domain showed a high level of agreement. Conclusions: These results suggest current guidelines used in these countries need an update. The formulation of evidence-base European guidelines on VDT could help to reduce the significant variation of national guidelines, which may have an impact on practical application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work, we present a multi-camera surveillance system based on the use of self-organizing neural networks to represent events on video. The system processes several tasks in parallel using GPUs (graphic processor units). It addresses multiple vision tasks at various levels, such as segmentation, representation or characterization, analysis and monitoring of the movement. These features allow the construction of a robust representation of the environment and interpret the behavior of mobile agents in the scene. It is also necessary to integrate the vision module into a global system that operates in a complex environment by receiving images from multiple acquisition devices at video frequency. Offering relevant information to higher level systems, monitoring and making decisions in real time, it must accomplish a set of requirements, such as: time constraints, high availability, robustness, high processing speed and re-configurability. We have built a system able to represent and analyze the motion in video acquired by a multi-camera network and to process multi-source data in parallel on a multi-GPU architecture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

These days as we are facing extremely powerful attacks on servers over the Internet (say, by the Advanced Persistent Threat attackers or by Surveillance by powerful adversary), Shamir has claimed that “Cryptography is Ineffective”and some understood it as “Cryptography is Dead!” In this talk I will discuss the implications on cryptographic systems design while facing such strong adversaries. Is crypto dead or we need to design it better, taking into account, mathematical constraints, but also systems vulnerability constraints. Can crypto be effective at all when your computer or your cloud is penetrated? What is lost and what can be saved? These are very basic issues at this point of time, when we are facing potential loss of privacy and security.