956 resultados para Embryo Culture Techniques
Resumo:
This paper reports the results of a mixed method approach to answer: To what extent do cultural values impact on e-service use in Saudi Arabia, and if so how? This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture with focus on our scope: the need for Service Oriented Culture. It will then, briefly, describe the method used and present the qualitative and quantitative findings related to the need for Service Oriented Culture. This research aims to cover a gap in the literature by investigating to what extent the presence of Service Oriented Culture, as one of Saudi Arabia’s cultural values, impacts on e-service use in Saudi Arabia. Surprisingly, the tested hypothesis was rejected: the presence of Service Oriented Culture is not a positive predictor of Intention to Use e-services in Saudi Arabia. It is evidenced that consideration of the impact of the cultural values will mainly contribute to the enhancement of ICTs implementation and use.
Resumo:
This research proposed a new framework for safety culture and examined the influence that culture has on safety in the heavy vehicle industry. The results gave evidence for an industry wide culture, allowing future safety interventions to be designed in a culturally-relevant manner. Designing culturally-relevant interventions may maximise their effectiveness and reduce the levels of resistance to safety that have been evident in past years.
Resumo:
The Bay Area’s Center for Tactical Magic has been performing ‘‘magical’’ art interventions since 2000. The Center’s work augments traditional activist techniques by offering new conceptions of what art and activism can entail in a contemporary urban context. This article explores how Jacques Rancie`re’s reconfigured relationship between art and politics can be applied to the Center’s work, providing new distributions of the sensible for participants.
Resumo:
Banana bunchy top disease (BBTD) caused by banana bunchy top virus (BBTV) was radioactively detected by nucleic acid hybridization techniques. Results showed that, 32P-labelled insert of pBT338 was hybridized with nucleic acid extracts from BBTV-infected plants from Egypt and Australia but not with those from CMV-infected plants from Egypt. Results revealed that BBTV was greatly detected in midrib, roots, meristem, corm, leaves and pseudostem respectively. BBTV was also detected in symptomless young plants prepared from diseased plant materials grown under tissue culture conditions but was not present in those performed from healthy plant materials. The sensitivity of dot blot and Southern blot hybridizations for the detection of BBTV was also performed for the detection of BBTV.
Resumo:
Recurrence relations in mathematics form a very powerful and compact way of looking at a wide range of relationships. Traditionally, the concept of recurrence has often been a difficult one for the secondary teacher to convey to students. Closely related to the powerful proof technique of mathematical induction, recurrences are able to capture many relationships in formulas much simpler than so-called direct or closed formulas. In computer science, recursive coding often has a similar compactness property, and, perhaps not surprisingly, suffers from similar problems in the classroom as recurrences: the students often find both the basic concepts and practicalities elusive. Using models designed to illuminate the relevant principles for the students, we offer a range of examples which use the modern spreadsheet environment to powerfully illustrate the great expressive and computational power of recurrences.
Resumo:
We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.
Resumo:
With nine examples, we seek to illustrate the utility of the Renormalization Group approach as a unification of other asymptotic and perturbation methods.
Resumo:
Introduction: Relatively few attempts have been made to describe and understand women’s alcohol consumption beyond adolescence and young adulthood. In particular, there has been a lack of studies focusing on the alcohol culture that surrounds and guides mature-aged women’s drinking. As part of a larger cross-national comparison, the present study sought to address this gap by identifying the shared beliefs and values that impact on drinking outcomes among mature-aged women in Sweden and Australia. Method: The study was guided by an ethnographic methodology. To generate data, a series of semi-structured interview were conducted with 17 Australian (age = 45-57 years; M = 52.1, SD = 3.9) and 19 Swedish (age = 45-58 years; M = 52.2, SD = 4.8) women. All interviews were transcribed verbatim and thematically analysed. Results: With age, the focus of alcohol as a single purpose vehicle for intoxication had given way to a focus on the enjoyment and ritual of drinking itself; taste had become increasingly important and alcohol was strongly associated with pleasurable environments and experiences. The view of alcohol as a taste experience was particularly pronounced among the Swedish women, with alcohol (most commonly wine) often seen as inseparable from food. Among the Swedish women, this view of alcohol was also associated with a strong de-emphasis of the pharmacological effects of alcohol. In contrast, several Australian women understood and used alcohol as relief for anxiety and stress. Moderate drinking was linked to the social construction of both age and gender in the two samples, while heavy or abusive alcohol consumption was associated with strong proscriptive norms and stigma. Conclusions: Australian and Swedish women share a number of beliefs and values around alcohol, however, these findings also show unique country-level differences. Implications for drinking outcomes are discussed.
Resumo:
The objective of this chapter is to provide an overview of traffic data collection that can and should be used for the calibration and validation of traffic simulation models. There are big differences in availability of data from different sources. Some types of data such as loop detector data are widely available and used. Some can be measured with additional effort, for example, travel time data from GPS probe vehicles. Some types such as trajectory data are available only in rare situations such as research projects.
Resumo:
The routine cultivation of human corneal endothelial cells, with the view to treating patients with endothelial dysfunction, remains a challenging task. While progress in this field has been buoyed by the proposed existence of progenitor cells for the corneal endothelium at the corneal limbus, strategies for exploiting this concept remain unclear. In the course of evaluating methods for growing corneal endothelial cells, we have noted a case where remarkable growth was achieved using a serial explant culture technique. Over the course of 7 months, a single explant of corneal endothelium, acquired from cadaveric human tissue, was sequentially seeded into 7 culture plates and on each occasion produced a confluent cell monolayer. Sample cultures were confirmed as endothelial in origin by positive staining for glypican-4. On each occasion, small cells, closest to the tissue explant, developed into a highly compact layer with an almost homogenous structure. This layer was resistant to removal with trypsin and produced continuous cell outgrowth during multiple culture periods. The small cells gave rise to larger cells with phase-bright cell boundaries and prominent immunostaining for both nestin and telomerase. Nestin and telomerase were also strongly expressed in small cells immediately adjacent to the wound site, following transfer of the explant to another culture plate. These findings are consistent with the theory that progenitor cells for the corneal endothelium reside within the limbus and provide new insights into expected expression patterns for nestin and telomerase within the differentiation pathway.
Resumo:
For the renewable energy sources whose outputs vary continuously, a Z-source current-type inverter has been proposed as a possible buck-boost alternative for grid-interfacing. With a unique X-shaped LC network connected between its dc power source and inverter topology, Z-source current-type inverter is however expected to suffer from compounded resonant complications in addition to those associated with its second-order output filter. To improve its damping performance, this paper proposes the careful integration of Posicast or three-step compensators before the inverter pulse-width modulator for damping triggered resonant oscillations. In total, two compensators are needed for wave-shaping the inverter boost factor and modulation ratio, and they can conveniently be implemented using first-in first-out stacks and embedded timers of modern digital signal processors widely used in motion control applications. Both techniques are found to damp resonance of ac filter well, but for cases of transiting from current-buck to boost state, three-step technique is less effective due to the sudden intermediate discharging interval introduced by its non-monotonic stepping (unlike the monotonic stepping of Posicast damping). These findings have been confirmed both in simulations and experiments using an implemented laboratory prototype.
Resumo:
Molecular interactions that underlie pathophysiological states are being elucidated using techniques that profile proteomicend points in cellular systems. Within the field of cancer research, protein interaction networks play pivotal roles in the establishment and maintenance of the hallmarks of malignancy, including cell division, invasion, and migration. Multiple complementary tools enable a multifaceted view of how signal protein pathway alterations contribute to pathophysiological states.One pivotal technique is signal pathway profiling of patient tissue specimens. This microanalysis technology provides a proteomic snapshot at one point in time of cells directly procured from the native context of a tumor micro environment. To study the adaptive patterns of signal pathway events over time, before and after experimental therapy, it is necessary to obtain biopsies from patients before, during, and after therapy. A complementary approach is the profiling of cultured cell lines with and without treatment. Cultured cell models provide the opportunity to study short-term signal changes occurring over minutes to hours. Through this type of system, the effects of particular pharmacological agents may be used to test the effects of signal pathway inhibition or activation on multiple endpoints within a pathway. The complexity of the data generated has necessitated the development of mathematical models for optimal interpretation of interrelated signaling pathways. In combination,clinical proteomic biopsy profiling, tissue culture proteomic profiling, and mathematical modeling synergistically enable a deeper understanding of how protein associations lead to disease states and present new insights into the design of therapeutic regimens.
Resumo:
This is a case study of a young university striving to generate and sustain a vibrant Research Training culture. The university’s research training framework is informed by a belief in a project management approach to achieving successful research candidature. This has led to the definition and reporting of key milestones during candidature. In turn, these milestones have generated a range of training programs to support Higher Degree Research (HDR) students to meet these milestones in a timely fashion. Each milestone focuses on a specific set of skills blended with supporting the development of different parts of the doctoral thesis. Data on student progress and completion has provided evidence in highlighting the role that the milestones and training are playing in supporting timely completion. A university-wide reporting cycle generated data on the range of workshops and training provided to Higher Degree Research students and supervisors. The report provided details of thesis topic and format, as well as participation in research training events and participant evaluation of those events. Analysis of the data led to recommendations and comments on the strengths and weaknesses of the current research training program. Discussion considered strategies and drivers for enhancements into the future. In particular, the paper reflects on the significant potential role of centrally curated knowledge systems to support HDR student and supervisor access, and engagement and success. The research training program was developed using blended learning as a model. It covered face-to-face workshops as well as online modules. These were supplemented by web portals that offered a range of services to inform and educate students and supervisors and included opportunities for students to interact with each other. Topics ranged from the research life cycle, writing and publication, ethics, managing research data, managing copyright, and project management to use of software and the University’s Code of Conduct for Research. The challenges discussed included: How to reach off campus students and those studying in external modes? How best to promote events to potential participants? How long and what format is best for face-to-face sessions? What online resources best supplement face-to-face offerings? Is there a place for peer-based learning and what form should this take? These questions are raised by a relatively young university seeking to build and sustain a vibrant research culture. The rapid growth in enrolments in recent years has challenged previous one-to-one models of support. This review of research training is timely in seeking strategies to address changing research training support capacity and student needs. Part of the discussion will focus on supervisory training, noting that good supervision is the one remaining place where one-to-one support is provided. Ensuring that supervisors are appropriately equipped to address student expectations is considered in the context of the research training provisions. The paper concludes with reflection on the challenges faced, and recommended ways forward as the number of research students grows into the future.
Resumo:
Increasingly, the library and information science (LIS) practitioner is being challenged to incorporate research into the context of their professional work. This paper reports on the Researcher-Librarian Partnership, a research-mentoring program that was initiated by the International Federation of the Library Association and Institutions. Six new LIS practitioners within their first seven years of professional practice took part in the program. Each was partnered with an experienced LIS researcher who provided mentoring and support. During the 12-month program the new professionals designed and implemented a research project on a topic of interest. This paper outlines the details of the program providing observations on how research mentoring can be a powerful way to ensure all stakeholders – practitioners, educators and professional associations – can plan an active role in supporting the development of a research culture within the profession.