935 resultados para Familial aggregation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Loss of the short arm of chromosome 1 is frequently observed in many tumor types, including melanoma. We recently localized a third melanoma susceptibility locus to chromosome band 1p22. Critical recombinants in linked families localized the gene to a 15-Mb region between D1S430 and D1S2664. To map the locus more finely we have performed studies to assess allelic loss across the region in a panel of melanomas from 1p22-linked families, sporadic melanomas, and melanoma cell lines. Eighty percent of familial melanomas exhibited loss of heterozygosity (LOH) within the region, with a smallest region of overlapping deletions (SRO) of 9 Mb between D1S207 and D1S435. This high frequency of LOH makes it very likely that the susceptibility locus is a tumor suppressor. In sporadic tumors, four SROs were defined. SRO1 and SRO2 map within the critical recombinant and familial tumor region, indicating that one or the other is likely to harbor the susceptibility gene. However, SRO3 may also be significant because it overlaps with the markers with the highest 2-point LOD score (D1S2776), part of the linkage recombinant region, and the critical region defined in mesothelioma. The candidate genes PRKCL2 and GTF2B, within SRO2, and TGFBR3, CDC7, and EVI5, in a broad region encompassing SRO3, were screened in 1p22-linked melanoma kindreds, but no coding mutations were detected. Allelic loss in melanoma cell lines was significantly less frequent than in fresh tumors, indicating that this gene may not be involved late in progression, such as in overriding cellular senescence, necessary for the propagation of melanoma cells in culture.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently the application of the quasi-steady-state approximation (QSSA) to the stochastic simulation algorithm (SSA) was suggested for the purpose of speeding up stochastic simulations of chemical systems that involve both relatively fast and slow chemical reactions [Rao and Arkin, J. Chem. Phys. 118, 4999 (2003)] and further work has led to the nested and slow-scale SSA. Improved numerical efficiency is obtained by respecting the vastly different time scales characterizing the system and then by advancing only the slow reactions exactly, based on a suitable approximation to the fast reactions. We considerably extend these works by applying the QSSA to numerical methods for the direct solution of the chemical master equation (CME) and, in particular, to the finite state projection algorithm [Munsky and Khammash, J. Chem. Phys. 124, 044104 (2006)], in conjunction with Krylov methods. In addition, we point out some important connections to the literature on the (deterministic) total QSSA (tQSSA) and place the stochastic analogue of the QSSA within the more general framework of aggregation of Markov processes. We demonstrate the new methods on four examples: Michaelis–Menten enzyme kinetics, double phosphorylation, the Goldbeter–Koshland switch, and the mitogen activated protein kinase cascade. Overall, we report dramatic improvements by applying the tQSSA to the CME solver.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Real-time sales assistant service is a problematic component of remote delivery of sales support for customers. Solutions involving web pages, telephony and video support prove problematic when seeking to remotely guide customers in their sales processes, especially with transactions revolving around physically complex artefacts. This process involves a number of services that are often complex in nature, ranging from physical compatibility and configuration factors, to availability and credit services. We propose the application of a combination of virtual worlds and augmented reality to create synthetic environments suitable for remote sales of physical artefacts, right in the home of the purchaser. A high level description of the service structure involved is shown, along with a use case involving the sale of electronic goods and services within an example augmented reality application. We expect this work to have application in many sales domains involving physical objects needing to be sold over the Internet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Graphene, functionalized with oleylamine (OA) and soluble in non-polar organic solvents, was produced on a large scale with a high yield by combining the Hummers process for graphite oxidation, an amine-coupling process to make OA-functionalized graphite oxide (OA-GO), and a novel reduction process using trioctylphosphine (TOP). TOP acts as both a reducing agent and an aggregation-prevention surfactant in the reduction of OA-GO in 1,2-dichlorobenzene (DCB). The reduction of OA-GO is confirmed by X-ray photoelectron spectroscopy, Fourier-transform infrared spectroscopy, X-ray diffraction, thermogravimetric analysis, and Raman spectroscopy. The exfoliation of GO, OA GO, and OA-functionalized graphene (OA-G) is verified by atomic force microscopy. The conductivity of TOP-reduced OA G, which is deduced from the current–voltage characteristics of a vacuum-filtered thin film, shows that the reduction of functionalized GO by TOP is as effective as the reduction of GO by hydrazine.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Society has a need for children to be able to make health care decisions. Homeless children need access to health care. Parents may not be accessible or competent to consent to their child’s health care. The familial relationship may have broken down. Children may not want their parents to know about drug, alcohol or pregnancy related issues. There is legal and academic support for the right of children to make autonomous decisions with respect to their health care. However what these decisions cover and who can make them is not clear. Whether or not a minor has capacity and is therefore competent to consent to medical treatment is a question of law. Some states of Australia have enacted legislation, while others rely on the common law to determine this issue. At common law a minor is capable of giving consent to medical treatment when he or she achieves a sufficient understanding and intelligence to be able to understand fully what is proposed. Known as ‘Gillick competence’ this is a well known principle of law. The question posed by this paper is whether the decision of a ‘Gillick competent’ child can and should be overridden by the court?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a novel, web-accessible scientific workflow system which makes large-scale comparative studies accessible without programming or excessive configuration requirements. GPFlow allows a workflow defined on single input values to be automatically lifted to operate over collections of input values and supports the formation and processing of collections of values without the need for explicit iteration constructs. We introduce a new model for collection processing based on key aggregation and slicing which guarantees processing integrity and facilitates automatic association of inputs, allowing scientific users to manage the combinatorial explosion of data values inherent in large scale comparative studies. The approach is demonstrated using a core task from comparative genomics, and builds upon our previous work in supporting combined interactive and batch operation, through a lightweight web-based user interface.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study explored the reasons underlying adolescents’ perceptions of why their peers engage in bullying in the real and the cyber world. While there has been much research on why bullies engage in such behaviour, ranging from personality characteristics to social or familial reasons, the perceptions of young people on the motives of cyberbullies has not been researched. A new instrument, based on interviews and a literature review was piloted to measure young people’s perceptions of why their peers engage in both traditional and cyberbullying behaviour, according to their role in bullying. Four hundred students were surveyed in three co-educational independent secondary schools. A comparison between perceptions of bullies’ motives in traditional and cyberbullying was made. Implications for interventions with bullies are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Insect monitoring and sampling programmes are used in the stored grains industry for the detection and estimation of insect pests. At the low pest densities dictated by economic and commercial requirements, the accuracy of both detection and abundance estimates can be influenced by variations in the spatial structure of pest populations over short distances. Geostatistical analysis of Rhyzopertha dominica populations in 2 dimensions showed that, in both the horizontal and vertical directions and at all temperatures examined, insect numbers were positively correlated over short (0-5cm) distances, and negatively correlated over longer (≥10cm) distances. Analysis in 3 dimensions showed a similar pattern, with positive correlations over short distances and negative correlations at longer distances. At 35°C, insects were located significantly further from the grain surface than at 25 and 30°C. Dispersion metrics showed statistically significant aggregation in all cases. This is the first research using small sample units, high sampling intensities, and a range of temperatures, to show spatial structuring of R. dominica populations over short distances. This research will have significant implications for sampling in the stored grains industry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Syntaxin 11 (Stx11) is a SNARE protein enriched in cells of the immune system. Loss or mutation of Stx11 results in familial hemophagocytic lymphohistiocytosis type-4 (FHL-4), an autosomal recessive disorder of immune dysregulation characterized by high levels of inflammatory cytokines along with defects in T-cell and natural killer cell function. We show here Stx11 is located on endosomalmembranes including late endosomes and lysosomes in macrophages. While Stx11 did not form a typical trans-SNARE complex, it did bind to the Q-SNARE Vti1b and was able to regulate the availability of Vti1b to form the Q-SNARE complexes Stx6/Stx7/Vtib and Stx7/Stx8/Vti1b. The mutant form of Stx11 sequestered Vti1b from forming the Q-SNARE complex that mediates late endosome to lysosome fusion. Depletion of Stx11 in activated macrophages leads to an accumulation of enlarged late endocytic compartments, increased trafficking to the cell surface and inhibition of late endosome to lysosome fusion. These phenotypes arerescued by the expression of an siRNA-resistant Stx11 construct in Stx11-depleted cells. Our results suggest that by regulating the availability of Vti1b, Stx11 regulates trafficking steps between late endosomes, lysosomes and the cell surface in macrophages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Electronic Health Record (EHR) retrieval processes are complex demanding Information Technology (IT) resources exponentially in particular memory usage. Database-as-a-service (DAS) model approach is proposed to meet the scalability factor of EHR retrieval processes. A simulation study using ranged of EHR records with DAS model was presented. The bucket-indexing model incorporated partitioning fields and bloom filters in a Singleton design pattern were used to implement custom database encryption system. It effectively provided faster responses in the range query compared to different types of queries used such as aggregation queries among the DAS, built-in encryption and the plain-text DBMS. The study also presented with constraints around the approach should consider for other practical applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive medical data should be encrypted in databases. There are many encryption/ decryption techniques and algorithms with regard to preserving privacy and security. Currently their performance is an important factor while the medical data is being managed in databases. Another important factor is that the stakeholders should decide more cost-effective ways to reduce the total cost of ownership. As an alternative, DAS (Data as Service) is a popular outsourcing model to satisfy the cost-effectiveness but it takes a consideration that the encryption/ decryption modules needs to be handled by trustworthy stakeholders. This research project is focusing on the query response times in a DAS model (AES-DAS) and analyses the comparison between the outsourcing model and the in-house model which incorporates Microsoft built-in encryption scheme in a SQL Server. This research project includes building a prototype of medical database schemas. There are 2 types of simulations to carry out the project. The first stage includes 6 databases in order to carry out simulations to measure the performance between plain-text, Microsoft built-in encryption and AES-DAS (Data as Service). Particularly, the AES-DAS incorporates implementations of symmetric key encryption such as AES (Advanced Encryption Standard) and a Bucket indexing processor using Bloom filter. The results are categorised such as character type, numeric type, range queries, range queries using Bucket Index and aggregate queries. The second stage takes the scalability test from 5K to 2560K records. The main result of these simulations is that particularly as an outsourcing model, AES-DAS using the Bucket index shows around 3.32 times faster than a normal AES-DAS under the 70 partitions and 10K record-sized databases. Retrieving Numeric typed data takes shorter time than Character typed data in AES-DAS. The aggregation query response time in AES-DAS is not as consistent as that in MS built-in encryption scheme. The scalability test shows that the DBMS reaches in a certain threshold; the query response time becomes rapidly slower. However, there is more to investigate in order to bring about other outcomes and to construct a secured EMR (Electronic Medical Record) more efficiently from these simulations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Public interest in volunteering in Australia has markedly escalated over the past five years, reflected in a number of publications in the popular, professional and academic press. This interest is welcome, and in many ways, is long overdue. Volunteers, or employing a term we find more useful, voluntarism is important for a number of reasons, not least of which is its structural role in the social institutions we have developed to support people, manage dependencies and facilitate a range of developmental activities across the life span. Voluntarism is an extremely complex social phenomenon. Conceptually, it transcends the sum of its parts, in that it is more than a simple aggregation of instances of individual behaviours. Our core argument here is that this complexity is such that equally intricate and multi-faceted perspectives and models need to be employed to further our understanding. In academic speak, this means that we need to develop analytical frameworks that draw on the breadth and depth of the social sciences...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The mosaic novel - with its independent 'story-tiles' linking together to form a complete narrative - has the potential to act as a reflection on the periodic resurfacing of unconscious memories in the conscious lives of fictional characters. This project is an exploration of the mosaic text as a fictional analogue of involuntary memory. These concepts are investigated as they appear in traditional fairy tales and engaged with in this thesis's creative component, Sourdough and Other Stories (approximately 80,000 words), a mosaic novel comprising sixteen interconnected 'story-tiles'. Traditional fairy tales are non-reflective and conducive to forgetting (i.e. anti-memory); fairy tale characters are frequently portrayed as psychologically two-dimensional, in that there is no examination of the mental and emotional distress caused when children are stolen/ abandoned/ lost and when adults are exiled. Sourdough and Other Stories is a creative examination of, and attempted to remedy, this lack of psychological depth. This creative work is at once something more than a short story collection, and something that is not a traditional novel, but instead a culmination of two modes of writing. It employs the fairy tale form to explore James' 'thorns in the spirit' (1898, p.199) in fiction; the anxiety caused by separation from familial and community groups. The exegesis, A Story Told in Parts - Sourdough and Other Stories is a critical essay (approximately 20,000 words in length), a companion piece to the mosaic novel, which analyses how my research question proceeded from my creative work, and considers the theoretical underpinnings of the creative work and how it enacts the research question: 'Can a writer use the structural possibilities of the mosaic text to create a fictional work that is an analogue of an involuntary memory?' The cumulative effect of the creative and exegetical works should be that of a dialogue between the two components - each text informing the other and providing alternate but complementary lenses with which to view the research question.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper is a selected review of research on issues surrounding the investigation of intra-familial child sexual abuse for children aged eight and above, in the criminal justice system. Particular attention is paid to features of the investigative interview in relation to the child's level of understanding, ability to report and likely emotional response when the proceedings take place. Best practice by police and social care agencies involves establishing valid and reliable information from children while attending to their developmental level and emotional state. The review aims to distil principles optimising this process from both the investigative judicial perspective and the child's focus, as well as from the inter-agency perspective and information sharing. Recommendations are made for improving the interview process based on research and methods from a range of disciplines and to optimise information recording in a format easily shared between agencies. Updated and ongoing training procedures are key to successful practice with training shared across police and social work agencies. The focus of this review is informed by preliminary findings from pilot research in progress on behalf of the Metropolitan Police Child Abuse Investigation Command.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose There has been little community-based research regarding multiple-type victimization experiences of young people in Asia, and none in Malaysia. This study aimed to estimate prevalence, explore gender differences, as well as describe typical perpetrators and family and social risk factors among Malaysian adolescents. Methods A cross-sectional survey of 1,870 students was conducted in 20 randomly selected secondary schools in Selangor state (mean age: 16 years; 58.8% female). The questionnaire included items on individual, family, and social background and different types of victimization experiences in childhood. Results Emotional and physical types of victimization were most common. A significant proportion of adolescents (22.1%) were exposed to more than one type, with 3% reporting all four types. Compared with females, males reported more physical, emotional, and sexual victimization. The excess of sexual victimization among boys was due to higher exposure to noncontact events, whereas prevalence of forced intercourse was equal for both genders (3.0%). Although adult male perpetrators predominate, female adults and peers of both genders also contribute substantially. Low quality of parent–child relationships and poor school and neighborhood environments had the strongest associations with victimization. Family structure (parental divorce, presence of step-parent or single parent, or household size), parental drug use, and rural/urban location were not influential in this sample. Conclusion This study extends the analysis of multiple-type victimization to a Malaysian population. Although some personal, familial, and social factors correlate with those found in western nations, there are cross-cultural differences, especially with regard to the nature of sexual violence based on gender and the influence of family structure.