scispace - formally typeset
Search or ask a question
Institution

Monash University

EducationMelbourne, Victoria, Australia
About: Monash University is a education organization based out in Melbourne, Victoria, Australia. It is known for research contribution in the topics: Population & Poison control. The organization has 35920 authors who have published 100681 publications receiving 3027002 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: However, there are emerging data suggesting that, depending on the model of apoptosis, the loss of deltapsi(m) may not be an early requirement for apoptosis but on the contrary may be a consequence of the apoptotic-signaling pathway as mentioned in this paper.
Abstract: Mitochondrial dysfunction has been shown to participate in the induction of apoptosis and has even been suggested to be central to the apoptotic pathway. Indeed, opening of the mitochondrial permeability transition pore has been demonstrated to induce depolarization of the transmembrane potential (deltapsi(m)), release of apoptogenic factors and loss of oxidative phosphorylation. In some apoptotic systems, loss of deltapsi(m) may be an early event in the apoptotic process. However, there are emerging data suggesting that, depending on the model of apoptosis, the loss of deltapsi(m) may not be an early requirement for apoptosis, but on the contrary may be a consequence of the apoptotic-signaling pathway. Furthermore, to add to these conflicting data, loss of deltapsi(m) has been demonstrated to not be required for cytochrome c release, whereas release of apoptosis inducing factor AIF is dependent upon disruption of deltapsi(m) early in the apoptotic pathway. Together, the existing literature suggests that depending on the cell system under investigation and the apoptotic stimuli used, dissipation of deltapsi(m) may or may not be an early event in the apoptotic pathway. Discrepancies in this area of apoptosis research may be attributed to the fluorochromes used to detect deltapsi(m). Differential degrees of sensitivity of these fluorochromes exist, and there are also important factors that contribute to their ability to accurately discriminate changes in deltapsi(m).

1,244 citations

Journal ArticleDOI
TL;DR: The generation of enriched and expandable preparations of proliferating neural progenitors from human ES cells is reported, indicating that the transplanted cells migrated along established brain migratory tracks in the host brain and differentiated in a region-specific manner, indicating they could respond to local cues and participate in the processes of host brain development.
Abstract: The derivation of neural progenitor cells from human embryonic stem (ES) cells is of value both in the study of early human neurogenesis and in the creation of an unlimited source of donor cells for neural transplantation therapy. Here we report the generation of enriched and expandable preparations of proliferating neural progenitors from human ES cells. The neural progenitors could differentiate in vitro into the three neural lineages--astrocytes, oligodendrocytes, and mature neurons. When human neural progenitors were transplanted into the ventricles of newborn mouse brains, they incorporated in large numbers into the host brain parenchyma, demonstrated widespread distribution, and differentiated into progeny of the three neural lineages. The transplanted cells migrated along established brain migratory tracks in the host brain and differentiated in a region-specific manner, indicating that they could respond to local cues and participate in the processes of host brain development. Our observations set the stage for future developments that may allow the use of human ES cells for the treatment of neurological disorders.

1,243 citations

Journal ArticleDOI
TL;DR: The authors provide a catch-all definition for the flipped classroom, and attempt to retrofit it with a pedagogical rationale, which they articulate through six testable propositions, and construct a theoretical argument that flipped approaches might improve student motivation and help manage cognitive load.
Abstract: Flipped classroom approaches remove the traditional transmissive lecture and replace it with active in-class tasks and pre-/post-class work. Despite the popularity of these approaches in the media, Google search, and casual hallway chats, there is very little evidence of effectiveness or consistency in understanding what a flipped classroom actually is. Although the flipped terminology is new, some of the approaches being labelled ‘flipped’ are actually much older. In this paper, we provide a catch-all definition for the flipped classroom, and attempt to retrofit it with a pedagogical rationale, which we articulate through six testable propositions. These propositions provide a potential agenda for research about flipped approaches and form the structure of our investigation. We construct a theoretical argument that flipped approaches might improve student motivation and help manage cognitive load. We conclude with a call for more specific types of research into the effectiveness of the flipped classroom ...

1,239 citations

Journal ArticleDOI
TL;DR: The ability of muscle to rapidly adapt following the damage from eccentric exercise raises the possibility of clinical applications of mild eccentric exercise, such as for protecting a muscle against more major injuries.
Abstract: In eccentric exercise the contracting muscle is forcibly lengthened; in concentric exercise it shortens. While concentric contractions initiate movements, eccentric contractions slow or stop them. A unique feature of eccentric exercise is that untrained subjects become stiff and sore the day afterwards because of damage to muscle fibres. This review considers two possible initial events as responsible for the subsequent damage, damage to the excitation-contraction coupling system and disruption at the level of the sarcomeres. Other changes seen after eccentric exercise, a fall in active tension, shift in optimum length for active tension, and rise in passive tension, are seen, on balance, to favour sarcomere disruption as the starting point for the damage. As well as damage to muscle fibres there is evidence of disturbance of muscle sense organs and of proprioception. A second period of exercise, a week after the first, produces much less damage. This is the result of an adaptation process. One proposed mechanism for the adaptation is an increase in sarcomere number in muscle fibres. This leads to a secondary shift in the muscle's optimum length for active tension. The ability of muscle to rapidly adapt following the damage from eccentric exercise raises the possibility of clinical applications of mild eccentric exercise, such as for protecting a muscle against more major injuries.

1,234 citations

Book ChapterDOI
Yuliang Zheng1
17 Aug 1997
TL;DR: Signcryption as discussed by the authors is a new cryptographic primitive which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by signature-then-encryption.
Abstract: Secure and authenticated message delivery/storage is one of the major aims of computer and communication security research. The current standard method to achieve this aim is “(digital) signature followed by encryption”. In this paper, we address a question on the cost of secure and authenticated message delivery/storage, namely, whether it is possible to transport/store messages of varying length in a secure and authenticated way with an expense less than that required by “signature followed by encryption”. This question seems to have never been addressed in the literature since the invention of public key cryptography. We then present a positive answer to the question. In particular, we discover a new cryptographic primitive termed as “signcryption” which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by “signature followed by encryption”. For typical security parameters for high level security applications (size of public moduli = 1536 bits), signcryption costs 50% (31%, respectively) less in computation time and 85% (91%, respectively) less in message expansion than does “signature followed by encryption” based on the discrete logarithm problem (factorization problem, respectively).

1,231 citations


Authors

Showing all 36568 results

NameH-indexPapersCitations
Bert Vogelstein247757332094
Kenneth W. Kinzler215640243944
David J. Hunter2131836207050
David R. Williams1782034138789
Yang Yang1712644153049
Lei Jiang1702244135205
Dongyuan Zhao160872106451
Christopher J. O'Donnell159869126278
Leif Groop158919136056
Mark E. Cooper1581463124887
Theo Vos156502186409
Mark J. Smyth15371388783
Rinaldo Bellomo1471714120052
Detlef Weigel14251684670
Geoffrey Burnstock141148899525
Network Information
Related Institutions (5)
University of New South Wales
153.6K papers, 4.8M citations

97% related

University of Sydney
187.3K papers, 6.1M citations

97% related

University of Queensland
155.7K papers, 5.7M citations

97% related

University of Melbourne
174.8K papers, 6.3M citations

96% related

National University of Singapore
165.4K papers, 5.4M citations

92% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023250
20221,020
20219,402
20208,419
20197,409
20186,437