900 resultados para Oriented Strand Board


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Transit oriented developments are high density mixed use developments located within short and easily walkable distance of a major transit centre. These developments are often hypothesised as a means of enticing a mode shift from the private car to sustainable transport modes such as, walking, cycling and public transport. However, it is important to gather evidence to test this hypothesis by determining the travel characteristics of transit oriented developments users. For this purpose, travel surveys were conducted for an urban transit oriented development currently under development. This chapter presents the findings from the preliminary data analysis of the travel surveys. Kelvin Grove Urban Village, a mixed use development located in Brisbane, Australia, has been selected as the case for the transit oriented developments study. Travel data for all groups of transit oriented development users ranging from students to shoppers, and residents to employees were collected. Different survey instruments were used for different transit oriented development users to optimise their response rates, and the performance of these survey instruments are stated herein. The travel characteristics of transit oriented development users are reported in this chapter by explaining mode share, trip length distribution, and time of day of trip. The results of the travel survey reveal that Kelvin Grove Urban Village users use more sustainable modes of transport as compared to other Brisbane residents.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Il Consiglio di Amministrazione (CdA) è il principale organo di governo delle aziende. La letteratura gli attribuisce tre ruoli: controllo, indirizzo strategico e collegamento con l’ambiente (networking). Precedenti studi empirici hanno analizzato se un Consiglio di Amministrazione è attivo o meno in tutti e tre i ruoli in un dato momento. Nel presente lavoro, invece, si propone un approccio «contingente» e si analizzano i ruoli svolti dal CdA al variare delle condizioni interne (aziende in crisi o di successo) ed esterne (aziende in settori competitivi o regolamentati).. L’indagine empirica è stata condotta su un campione di 301 imprese italiane di grandi dimensioni. I risultati supportano la tesi iniziale secondo cui le condizioni interne ed esterne incidono sul ruolo svolto dal CdA. In particolare i risultati evidenziano che il CdA non svolge sempre tutti e tre i ruoli nello stesso momento, ma esso si concentra sul ruolo o sui ruoli che assumono grande importanza nella situazione in cui si trova l’azienda. Con riferimento alle condizioni interne, nelle imprese in crisi il CdA è attivo in tutti e tre i ruoli, mentre in quelle di successo prevale un orientamento verso la funzione strategica. Nelle aziende che operano in settori competitivi il ruolo di controllo è più pressante mentre nei settori regolamentati prevale una funzione di networking.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the development of specifications for an on-board mass monitoring (OBM) application for regulatory requirements in Australia. An earlier paper reported on feasibility study and pilot testing program prior to the specification development [1]. Learnings from the pilot were used to refine this testing process and a full scale testing program was conducted from July to October 2008. The results from the full scale test and evidentiary implications are presented in this report. The draft specification for an evidentiary on-board mass monitoring application is currently under development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: The purpose of this empirical paper is to investigate internal marketing from a behavioural perspective. The impact of internal marketing behaviours, operationalised as an internal market orientation (IMO), on employees’ marketing and other in-role behaviours (IRB) were examined. ---------- Design/methodology/approach: Survey data measuring IMO, market orientation and a range of constructs relevant to the nomological network in which they are embedded were collected from the UK retail managers. These were tested to establish their psychometric properties and the conceptual model was analysed using structural equations modelling, employing a partial least squares methodology. ---------- Findings: IMO has positive consequences for employees’ market-oriented and other IRB. These, in turn, influence marketing success. Research limitations/implications – The paper provides empirical support for the long-held assumption that internal and external marketing are related and that organisations should balance their external focus with some attention to employees. Future research could measure the attitudes and behaviours of managers, employees and customers directly and explore the relationships between them. ---------- Practical implications: Firm must ensure that they do not put the needs of their employees second to those of managers and shareholders; managers must develop their listening skills and organisations must become more responsive to the needs of their employees. ---------- Originality/value: The paper contributes to the scarce body of empirical support for the role of internal marketing in services organisations. For researchers, this paper legitimises the study of internal marketing as a route to external market success; for managers, the study provides quantifiable evidence that focusing on employees’ wants and needs impacts their behaviours towards the market.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The insurance industry discharges a critical role in the Australian economy and is a significant part of the Australian financial services market. The industry relies upon intermediaries, the principal types being brokers and agents, to promote, arrange and distribute their products and services in the market. The pivotal role that they play in this context and sensitivities associated with the consumer oriented products, such as house and contents insurance, has ensured close regulatory attention. Of particular importance was the passage of the Insurance (Agents and Brokers) Act 1984 (Cth), a comprehensive attempt to address the responsibilities of intermediaries as well as particular problem areas associated with the handling of money. However, with the introduction of financial services and market reform early in the new millennium this insurance intermediary specific regulatory approach was abandoned in favour of a market-wide strategy; that is, market reform was based upon across-the-board licensing, disclosure, conduct and fairness standards, and all financial products and services are now regulated at a generic level under Ch 7 of the Corporations Act 2001 (Cth). This article briefly explores the categories of insurance intermediaries and the relevant distinctions between them but focuses mainly upon the regulatory context in which they operate. This context transcends a strictly legal framework as the regulatory body, the Australian Securities and Investments Commission (ASIC), has sought to inform and guide the market through Policy Statements and Regulatory Guides. The usefulness of these guides as an adjunct to the legislation in explaining the scope and operation of regulatory framework is examined. In addition, the article looks at the self-regulatory and dispute resolution practices in this area and their impact. In conclusion an assessment of this across-the-board regulatory regime is advanced.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In cloud computing resource allocation and scheduling of multiple composite web services is an important challenge. This is especially so in a hybrid cloud where there may be some free resources available from private clouds but some fee-paying resources from public clouds. Meeting this challenge involves two classical computational problems. One is assigning resources to each of the tasks in the composite web service. The other is scheduling the allocated resources when each resource may be used by more than one task and may be needed at different points of time. In addition, we must consider Quality-of-Service issues, such as execution time and running costs. Existing approaches to resource allocation and scheduling in public clouds and grid computing are not applicable to this new problem. This paper presents a random-key genetic algorithm that solves new resource allocation and scheduling problem. Experimental results demonstrate the effectiveness and scalability of the algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Damage to genetic material represents a persistent and ubiquitous threat to genomic stability. Once DNA damage is detected, a multifaceted signaling network is activated that halts the cell cycle, initiates repair, and in some instances induces apoptotic cell death. In this article, we will review DNA damage surveillance networks, which maintain the stability of our genome, and discuss the efforts underway to identify chemotherapeutic compounds targeting the core components of DNA double-strand breaks (DSB) response pathway. The majority of tumor cells have defects in maintaining genomic stability owing to the loss of an appropriate response to DNA damage. New anticancer agents are exploiting this vulnerability of cancer cells to enhance therapeutic indexes, with limited normal tissue toxicity. Recently inhibitors of the checkpoint kinases Chk1 and Chk2 have been shown to sensitize tumor cells to DNA damaging agents. In addition, the treatment of BRCA1- or BRCA2-deficient tumor cells with poly(ADP-ribose) polymerase (PARP) inhibitors also leads to specific tumor killing. Due to the numerous roles of p53 in genomic stability and its defects in many human cancers, therapeutic agents that restore p53 activity in tumors are the subject of multiple clinical trials. In this article we highlight the proteins mentioned above and catalog several additional players in the DNA damage response pathway, including ATM, DNA-PK, and the MRN complex, which might be amenable to pharmacological interventions and lead to new approaches to sensitize cancer cells to radio- and chemotherapy. The challenge is how to identify those patients most receptive to these treatments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

hSSB1 is a recently discovered single-stranded DNA binding protein that is essential for efficient repair of DNA double-strand breaks (DSBs) by the homologous recombination pathway. hSSB1 is required for the efficient recruitment of the MRN complex to sites of DSBs and for the efficient initiation of ATM dependent signalling. Here we explore the interplay between hSSB1 and MRN. We demonstrate that hSSB1 binds directly to NBS1, a component of the MRN complex, in a DNA damage independent manner. Consistent with the direct interaction, we observe that hSSB1 greatly stimulates the endo-nuclease activity of the MRN complex, a process that requires the C-terminal tail of hSSB1. Interestingly, analysis of two point mutations in NBS1, associated with Nijmegen breakage syndrome, revealed weaker binding to hSSB1, suggesting a possible disease mechanism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

hSSB1 is a newly discovered single-stranded DNA (ssDNA)-binding protein that is essential for efficient DNA double-strand break signalling through ATM. However, the mechanism by which hSSB1 functions to allow efficient signalling is unknown. Here, we show that hSSB1 is recruited rapidly to sites of double-strand DNA breaks (DSBs) in all interphase cells (G1, S and G2) independently of, CtIP, MDC1 and the MRN complex (Rad50, Mre11, NBS1). However expansion of hSSB1 from the DSB site requires the function of MRN. Strikingly, silencing of hSSB1 prevents foci formation as well as recruitment of MRN to sites of DSBs and leads to a subsequent defect in resection of DSBs as evident by defective RPA and ssDNA generation. Our data suggests that hSSB1 functions upstream of MRN to promote its recruitment at DSBs and is required for efficient resection of DSBs. These findings, together with previous work establish essential roles of hSSB1 in controlling ATM activation and activity, and subsequent DSB resection and homologous recombination (HR).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

DNA double-strand break (DSB) repair via the homologous recombination pathway is a multi-stage process, which results in repair of the DSB without loss of genetic information or fidelity. One essential step in this process is the generation of extended single-stranded DNA (ssDNA) regions at the break site. This ssDNA serves to induce cell cycle checkpoints and is required for Rad51 mediated strand invasion of the sister chromatid. Here, we show that human Exonuclease 1 (Exo1) is required for the normal repair of DSBs by HR. Cells depleted of Exo1 show chromosomal instability and hypersensitivity to ionising radiation (IR) exposure. We find that Exo1 accumulates rapidly at DSBs and is required for the recruitment of RPA and Rad51 to sites of DSBs, suggesting a role for Exo1 in ssDNA generation. Interestingly, the phosphorylation of Exo1 by ATM appears to regulate the activity of Exo1 following resection, allowing optimal Rad51 loading and the completion of HR repair. These data establish a role for Exo1 in resection of DSBs in human cells, highlighting the critical requirement of Exo1 for DSB repair via HR and thus the maintenance of genomic stability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the emergence of multi-core processors into the mainstream, parallel programming is no longer the specialized domain it once was. There is a growing need for systems to allow programmers to more easily reason about data dependencies and inherent parallelism in general purpose programs. Many of these programs are written in popular imperative programming languages like Java and C]. In this thesis I present a system for reasoning about side-effects of evaluation in an abstract and composable manner that is suitable for use by both programmers and automated tools such as compilers. The goal of developing such a system is to both facilitate the automatic exploitation of the inherent parallelism present in imperative programs and to allow programmers to reason about dependencies which may be limiting the parallelism available for exploitation in their applications. Previous work on languages and type systems for parallel computing has tended to focus on providing the programmer with tools to facilitate the manual parallelization of programs; programmers must decide when and where it is safe to employ parallelism without the assistance of the compiler or other automated tools. None of the existing systems combine abstraction and composition with parallelization and correctness checking to produce a framework which helps both programmers and automated tools to reason about inherent parallelism. In this work I present a system for abstractly reasoning about side-effects and data dependencies in modern, imperative, object-oriented languages using a type and effect system based on ideas from Ownership Types. I have developed sufficient conditions for the safe, automated detection and exploitation of a number task, data and loop parallelism patterns in terms of ownership relationships. To validate my work, I have applied my ideas to the C] version 3.0 language to produce a language extension called Zal. I have implemented a compiler for the Zal language as an extension of the GPC] research compiler as a proof of concept of my system. I have used it to parallelize a number of real-world applications to demonstrate the feasibility of my proposed approach. In addition to this empirical validation, I present an argument for the correctness of the type system and language semantics I have proposed as well as sketches of proofs for the correctness of the sufficient conditions for parallelization proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Comparison are required to understand transport benefits of Transit Oriented Developments (TODs). Mode shares of TOD users need to be understood. Accurate travel demand models for TODs are needed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When managers of entrepreneurial companies typically talk about strategies, they first consider what products to make and secondly where to locate the business. The entrepreneurial companies locate in rural areas because of a wish to maintain a certain lifestyle, or because they can combine a resource available there with certain knowledge or interest that they have (Getz and Nilsson, 2004). In addition, many managers of entrepreneurial companies are confident in locating in a rural area, because there often is economic and social structure supportive of local corporate governance. The most central part of corporate governance is the board of directors. In an entrepreneurial company in a rural area, such members of boards are most likely to be individuals in dominant positions influential in the local economy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a hierarchical model for assessing an object-oriented program's security. Security is quantified using structural properties of the program code to identify the ways in which `classified' data values may be transferred between objects. The model begins with a set of low-level security metrics based on traditional design characteristics of object-oriented classes, such as data encapsulation, cohesion and coupling. These metrics are then used to characterise higher-level properties concerning the overall readability and writability of classified data throughout the program. In turn, these metrics are then mapped to well-known security design principles such as `assigning the least privilege' and `reducing the size of the attack surface'. Finally, the entire program's security is summarised as a single security index value. These metrics allow different versions of the same program, or different programs intended to perform the same task, to be compared for their relative security at a number of different abstraction levels. The model is validated via an experiment involving five open source Java programs, using a static analysis tool we have developed to automatically extract the security metrics from compiled Java bytecode.