937 resultados para IP routing


Relevância:

10.00% 10.00%

Publicador:

Resumo:

During invasion and metastasis, cancer cells interact closely with the extracellular matrix molecules by attachment, degradation, and migration. We demonstrated previously the local degradation of fluorescently labeled gelatin matrix by cancer cells at invasive membrane protrusions, called invadopodia. Using the newly developed quantitative fluorescence-activated cell sorting-phagocytosis assay and image analysis of localized degradation of fluorescently labeled matrix, we document here that degradation and site- specific removal of cross-linked gelatin matrix is correlated with the extent of phagocytosis in human breast cancer cells. A higher phagocytic capacity is generally associated with increasing invasiveness, documented in other invasion and motility assays as well. Gelatin phagocytosis is time and cell density dependent, and it is mediated by the actin cytoskeleton. Most of the intracellular gelatin is routed to actively acidified vesicles, as demonstrated by the fluorescent colocalization of gelatin with acidic vesicles, indicating the intracellular degradation of the phagocytosed matrix in lysosomes. We show here that normal intracellular routing is blocked after treatment with acidification inhibitors. In addition, the need for partial proteolytic degradation of the matrix prior to phagocytosis is demonstrated by the inhibition of gelatin phagocytosis with different serine and metalloproteinase inhibitors and its stimulation by conditioned medium containing the matrix metalloproteinases MMP-2 and MMP-9. Our results demonstrate that phagocytosis of extracellular matrix is an inherent feature of breast tumor cells that correlates with and may even directly contribute to their invasive capacity. This assay is useful for screening and evaluating potential anti-invasive agents because it is fast, reproducible, and versatile.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate how email users' characteristics influence their response to phishing emails. A user generally goes through three stages of behaviour upon receiving a phishing email: suspicion of the legitimacy of the email, confirmation of its legitimacy and response by either performing the action requested in the phishing email or not. Using a mixed method approach combining experiments, surveys and semi-structured interviews, we found that a user's behaviour at each stage varies with their personal characteristics such as personality traits and ability to perceive information in an email beyond its content. We found, for example, that users who are submissive, extraverted or open tend to be less suspicious of phishing emails while users who can identify cues such as inconsistent IP address, can avoid falling victim to phishing emails. Our findings enable us to draw practical implications for educating and potentially reducing the incidence of phishing emails victimisation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the outbreak of Severe Acute Respiratory Syndrome (SARS) in 2003, there has been much discussion about whether the international community has moved into a new post-Westphalian era, where states increasingly recognize certain shared norms that guide what they ought to do in responding to infectious disease outbreaks. In this article I identify this new obligation as the ‘duty to report’, and examine competing accounts on the degree to which states appreciate this new obligation are considered by examining state behaviour during the H5N1 human infectious outbreaks in East Asia (since 2004). The article examines reporting behaviour for H5N1 human infectious cases in Cambodia, China, Indonesia, Thailand and Vietnam from 2004 to 2010. The findings lend strong support to the claim that East Asian states have come to accept and comply with the duty to report infectious disease outbreaks and that the assertions of sovereignty in response to global health governance frameworks have not systematically inhibited reporting compliance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

When, in 1977, the Australian electorate provided a double majority to effect a change of section 72 of the Commonwealth Constitution requiring judges of the High Court of Australia to retire at the age of 70 years old, I doubt we understood the continuing capacity of these esteemed members of the judiciary. For the opportunity to sit and talk with Ian Callinan AC who, in compliance with that amendment, retired from the High Court in September 2007, I needed to wait until he returned from The Hague where he was sitting as a Judge ad hoc on the International Court of Justice. Although a native of Casino, New South Wales, Mr Callinan is regarded as a Queenslander. Indeed, he grew up in Brisbane, finished high school at Brisbane Grammar and graduated in law at The University of Queensland. Appointed in 1978 as a Queen’s Counsel, Mr Callinan enjoyed this period of his legal career and we discussed an aspect of the Christopher Skase case, which reinforced my belief that Mr Callinan is an incredibly skilful advocate. On 14 September 1998, ABC Four Corners broadcasted the views of some prominent Australians on the appointment of Mr Callinan to the High Court. In assessing the type of person Mr Callinan is, Tony Morris QC said: “Ian Callinan isn't a coward”, while former Commonwealth Attorney-General, Michael Lavarch, said: “He was regarded as an absolutely outstanding criminal lawyer within the Queensland legal profession, I mean really a top-notch advocate”. I was not interested in raising any of the controversial issues that Mr Callinan has encountered as an advocate in high profile matters. I wanted to know how he felt about his time on the High Court, what his thoughts are on the operation of the High Court, the IP cases he decided, the real life issues that he feels impact on counsel who are appearing before the High Court and the people he regarded as role models. During our conversation, Mr Callinan laughed often and when he did his eyes lit up, revealing his passion for life. He is an incredibly genuine Australian who loved his time as a barrister, enjoyed his role on the High Court, enjoys his current job as mediator, loves writing novels, has a great desire for continual improvement in the quality of legal education and legal advocacy and sees a need for change in IP law. When I asked: “So, what might the future hold for you?”, he laughed and said: “Well, at my age I don’t have a long horizon time”. I said: “Just enjoy the journey?”, to which Mr Callinan responded: “Exactly”.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To date, designed topologies for DC-AC inversion with both voltage-buck and boost capabilities are mainly focused on two-level circuitries with extensions to three-level possibilities left nearly unexplored. Contributing to this area of research, this paper presents the design of a number of viable buck-boost three-level inverters that can also support bidirectional power conversion. The proposed front-end circuitry is developed from the Cuk-derived buck-boost two-level inverter, and by using the "alternative phase opposition disposition" (APOD) modulation scheme, the buck-boost three-level inverters can perform distinct five-level line voltage and three-level phase voltage switching by simply controlling the active switches located in the designed voltage boost section of the circuits. As a cost saving option, one active switch can further be removed from the voltage-boost section of the circuits by simply re-routing the gating commands of the remaining switches without influencing the ac output voltage amplitude. To verify the validity of the proposed inverters, Matlab/PLECS simulations were performed before a laboratory prototype was implemented for experimental testing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Internet and its widespread usage for multimedia document distribution put the copyright issue in a complete new setting. Multimedia documents, specifically those installed on a web page, are no longer passive as they typically include active applets. Copyright protection safeguards the intellectual property (IP) of multimedia documents, which are either sold or distributed free of charge. In this Chapter, the basic tools for copyright protection are discussed. First, general concepts and the vocabulary used in copyright protection of multimedia documents are discussed. Later, taxonomy of watermarking and fingerprinting techniques are studied. This part is concluded by a review of the literature dealing with IP security. The main part of the chapter discusses the generic watermarking scheme and illustrates it on three specific examples: collusion-free watermarking, spread spectrum watermarking, and software fingerprinting. Future trends and conclusions close the chapter.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recurrent congestion caused by high commuter traffic is an irritation to motorway users. Ramp metering (RM) is the most effective motorway control means (M Papageorgiou & Kotsialos, 2002) for significantly reducing motorway congestion. However, given field constraints (e.g. limited ramp space and maximum ramp waiting time), RM cannot eliminate recurrent congestion during the increased long peak hours. This paper, therefore, focuses on rapid congestion recovery to further improve RM systems: that is, to quickly clear congestion in recovery periods. The feasibility of using RM for recovery is analyzed, and a zone recovery strategy (ZRS) for RM is proposed. Note that this study assumes no incident and demand management involved, i.e. no re-routing behavior and strategy considered. This strategy is modeled, calibrated and tested in the northbound model of the Pacific Motorway, Brisbane, Australia in a micro-simulation environment for recurrent congestion scenario, and evaluation results have justified its effectiveness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The common reasons for those in organizations adopting large config- urable packaged software products are compelling. Problems with the existing software situation, the supposed predictability and perceived business benefits of packaged software, and various social influences, can lead to packages being preferred to custom approaches. Yet, for every reason, there is a potential associated problem that must be understood before an informed adoption decision can be made...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Self-development resources are a popular billion -dollar industry worldwide used to improve individuals quality of lives. However, there are insufficient studies for a contemporary conceptualization, especially when it comes to live self-development programs. This paper provides a literature review about current self-development definitions, ideology, concepts, and themes; quality of material provided; quality and characteristics of self-development providers; and the features of the participants who seek such programs. The paper will also discuss the relationsh ip between self-development and related disciplines including coaching, training, mentoring, and motivational speaking. Finally, a new definition will be proposed for self-development coaching programs. Gaps of knowledge are highlighted for further research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study quantifies the motivators and barriers to bikeshare program usage in Australia. An online survey was administered to a sample of annual members of Australia’s two bikeshare programs based in Brisbane and Melbourne, to assess motivations for joining the schemes. Non-members of the programs were also sampled in order to identify current barriers to joining bikeshare. Spatial analysis from Brisbane revealed residential and work locations of non-members were more geographically dispersed than for bikeshare members. An analysis of bikeshare usage in Melbourne showed a strong relationship between docking stations in areas with relatively less accessible public transit opportunities. The most influential barriers to bikeshare use related to motorized travel being too convenient and docking stations not being sufficiently close to home, work and other frequented destinations. The findings suggest that bikeshare programs may attract increased membership by ensuring travel times are competitive with motorized travel, for example through efficient bicycle routing and priority progression and, by expanding docking station locations, and by increasing the level of convenience associated with scheme use. Convenience considerations may include strategic location of docking stations, ease of signing up and integration with public transport.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Effective enforcement of intellectual property (IP) rights has become a significant issue due to concerns about the effects of IP infringement, including trade mark counterfeiting. It is an important issue for the Australian Government as IP rights underpin a strong, modern economy. Criminal offences and civil remedies can be an important element of an enforcement regime. This review of penalties and additional damages in the Trade Marks Act 1995 (Cth) (Trade Marks Act) has been prompted by a recommendation made by the Advisory Council on Intellectual Property (ACIP), recent changes to the Copyright Act 1968 (Cth) (Copyright Act) and concerns raised by stakeholders. The purpose of this paper is to elicit comments on options which IP Australia is considering recommending to Government.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis introduces a theory of intellectual property (IP) law informed by Islamic Shari'a. The sources and objectives of Islamic Shari'a support the theoretical framework underpinning IP laws. However, they strongly emphasise the importance of development goals in intellectual property policy making. This thesis argues that an optimal IP system from an Islamic perspective shall not overprotect IP holders but should instead endeavor to empower people to access knowledge resources to enhance access to education, public health and economic opportunities. Taking Libya as a case study, this thesis makes recommendations for the improvement of IP law that have important broader implications for developing countries.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Effective Quality of Experience (QoE) management for mobile video delivery – to optimize overall user experience while adapting to heterogeneous use contexts – is still a big challenge to date. This paper proposes a mobile video delivery system to emphasize the use of acceptability as the main indicator of QoE to manage the end-to-end factors in delivering mobile video services. The first contribution is a novel framework for user-centric mobile video system that is based on acceptability-based QoE (A-QoE) prediction models, which were derived from comprehensive subjective studies. The second contribution is results from a field study that evaluates the user experience of the proposed system during realistic usage circumstances, addressing the impacts of perceived video quality, loading speed, interest in content, viewing locations, network bandwidth, display devices, and different video coding approaches, including region-of-interest (ROI) enhancement and center zooming

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective Current treatments for cancer pain are often inadequate, particularly when metastasis to bone is involved. The addition to the treatment regimen of another drug that has a complementary analgesic effect may increase the overall analgesia without the necessity to increase doses, thus avoiding dose-related side effects. This project investigated the synergistic effect of the addition of the potassium channel (KCNQ2–3) modulator flupirtine to morphine treatment in a rat model of prostate cancer-induced bone pain. Design Syngeneic prostate cancer cells were injected into the right tibia of male Wistar rats under anesthesia. This led to expanding tumor within the bone in 2 weeks, together with the concurrent development of hyperalgesia to noxious heat. Paw withdrawal thresholds from noxious heat were measured before and after the maximum non-sedating doses of morphine and flupirtine given alone and in combinations. Dose-response curves for morphine (0.13–5.0 mg/kg ip) and flupirtine (1.25–10.0 mg/kg ip) given alone and in fixed-dose combinations were plotted and subjected to an isobolographic analysis. Results Both morphine (ED50 = 0.74 mg/kg) and flupirtine (ED50 = 3.32 mg/kg) caused dose-related anti-hyperalgesia at doses that did not cause sedation. Isobolographic analysis revealed that there was a synergistic interaction between flupirtine and morphine. Addition of flupirtine to morphine treatment improved morphine anti-hyperalgesia, and resulted in the reversal of cancer-induced heat hyperalgesia. Conclusions These results suggest that flupirtine in combination with morphine may be useful clinically to provide better analgesia at lower morphine doses in the management of pain caused by tumors growing in bone.