302 resultados para Automatic Generation
Resumo:
Introduction: Inherent and acquired cisplatin resistance reduces the effectiveness of this agent in the management of non-small cell lung cancer (NSCLC). Understanding the molecular mechanisms underlying this process may result in the development of novel agents to enhance the sensitivity of cisplatin. Methods: An isogenic model of cisplatin resistance was generated in a panel of NSCLC cell lines (A549, SKMES-1, MOR, H460). Over a period of twelve months, cisplatin resistant (CisR) cell lines were derived from original, age-matched parent cells (PT) and subsequently characterized. Proliferation (MTT) and clonogenic survival assays (crystal violet) were carried out between PT and CisR cells. Cellular response to cisplatin-induced apoptosis and cell cycle distribution were examined by FACS analysis. A panel of cancer stem cell and pluripotent markers was examined in addition to the EMT proteins, c-Met and β-catenin. Cisplatin-DNA adduct formation, DNA damage (γH2AX) and cellular platinum uptake (ICP-MS) was also assessed. Results: Characterisation studies demonstrated a decreased proliferative capacity of lung tumour cells in response to cisplatin, increased resistance to cisplatin-induced cell death, accumulation of resistant cells in the G0/G1 phase of the cell cycle and enhanced clonogenic survival ability. Moreover, resistant cells displayed a putative stem-like signature with increased expression of CD133+/CD44+cells and increased ALDH activity relative to their corresponding parental cells. The stem cell markers, Nanog, Oct-4 and SOX-2, were significantly upregulated as were the EMT markers, c-Met and β-catenin. While resistant sublines demonstrated decreased uptake of cisplatin in response to treatment, reduced cisplatin-GpG DNA adduct formation and significantly decreased γH2AX foci were observed compared to parental cell lines. Conclusion: Our results identified cisplatin resistant subpopulations of NSCLC cells with a putative stem-like signature, providing a further understanding of the cellular events associated with the cisplatin resistance phenotype in lung cancer. © 2013 Barr et al.
Resumo:
Automatic Call Recognition is vital for environmental monitoring. Patten recognition has been applied in automatic species recognition for years. However, few studies have applied formal syntactic methods to species call structure analysis. This paper introduces a novel method to adopt timed and probabilistic automata in automatic species recognition based upon acoustic components as the primitives. We demonstrate this through one kind of birds in Australia: Eastern Yellow Robin.
Resumo:
In a previous study, we demonstrated that mouse adult F(1) offspring, exposed to a vitamin d deficiency during pregnancy, developed a less severe and delayed Experimental Autoimmune Encephalomyelitis (EAE), when compared with control offspring. We then wondered whether a similar response was observed in the subsequent generation. To answer this question, we assessed F(2) females whose F(1) parents (males or females) were vitamin d-deprived when developing in the uterus of F(0) females. Unexpectedly, we observed that the vitamin d deficiency affecting the F(0) pregnant mice induced a precocious and more severe EAE in the F(2) generation. This paradoxical finding led us to assess its implications for the epidemiology of Multiple Sclerosis (MS) in humans. Using the REFGENSEP database for MS trios (the patient and his/her parents), we collected the parents' dates of birth and assessed a potential season of birth effect that could potentially be indicative of the vitamin d status of the pregnant grandmothers. A trend for a reduced number of births in the Fall for the parents of MS patients was observed but statistical significance was not reached. Further well powered studies are warranted to validate the latter finding.
Resumo:
This paper presents a novel technique for segmenting an audio stream into homogeneous regions according to speaker identities, background noise, music, environmental and channel conditions. Audio segmentation is useful in audio diarization systems, which aim to annotate an input audio stream with information that attributes temporal regions of the audio into their specific sources. The segmentation method introduced in this paper is performed using the Generalized Likelihood Ratio (GLR), computed between two adjacent sliding windows over preprocessed speech. This approach is inspired by the popular segmentation method proposed by the pioneering work of Chen and Gopalakrishnan, using the Bayesian Information Criterion (BIC) with an expanding search window. This paper will aim to identify and address the shortcomings associated with such an approach. The result obtained by the proposed segmentation strategy is evaluated on the 2002 Rich Transcription (RT-02) Evaluation dataset, and a miss rate of 19.47% and a false alarm rate of 16.94% is achieved at the optimal threshold.
Resumo:
The future of the HRM profession depends to at least some extent on the quality of preparation of the next generation of HR professionals. This paper examines bachelor degree programs in HRM and the role of professional associations as influencers of curricula. Some 39% of the 599 AACSB and EQUIS-accredited institutions sampled offer undergraduate degrees in HRM. The programs vary in emphasis on HRM competencies. Unsurprisingly, all include foundation work (perhaps a third of the content) in business management. Grouping degree content by regions globally allows benchmarking of degrees against international trends, along with consideration of the increasingly significant influence on curricula by professional bodies, in preparing the next generation of HRM practitioners to manage in organisations that will require strategic thinking, specialist technical skills, and interpersonal competence.
Resumo:
Purpose: Generation Y (Gen Y) is the newest and largest generation entering the workforce. Gen Y may differ from previous generations in work-related characteristics which may have recruitment and retention repercussions. Currently, limited theoretically-based research exists regarding Gen Y’s work expectations and goals in relation to undergraduate students and graduates. Design/methodology/approach: This study conducted a theoretically-based investigation of the work expectations and goals of student- and working-Gen Y individuals based within a framework incorporating both expectancy-value and goal setting theories. N = 398 provided useable data via an on-line survey. Findings: Overall, some support was found for predictions with career goals loading on a separate component to daily work expectations and significant differences between student- and working- Gen Y on career goals. No significant differences were found, however, between the two groups in daily work expectations. Research limitations/implications: Future research may benefit from adopting a theoretical framework which assesses both daily work expectations and career goals when examining the factors which motivate Gen Y’s decisions to join and remain at a particular organisation. Practical implications: At a practical level, based on the findings, some examples are provided of the means by which organisations may draw upon daily work expectations and career goals of importance to Gen Y and, in doing so, influence the likelihood that a Gen Y individual will join and remain at their particular organisation. Originality/value: This research has demonstrated the utility of adopting a sound theoretical framework in furthering understanding about the motivations which influence organisations’ ability to recruit and retain Gen Y, among both student Gen Y as well as those Gen Y individuals who are already working.
Resumo:
This item provides supplementary materials for the paper mentioned in the title, specifically a range of organisms used in the study. The full abstract for the main paper is as follows: Next Generation Sequencing (NGS) technologies have revolutionised molecular biology, allowing clinical sequencing to become a matter of routine. NGS data sets consist of short sequence reads obtained from the machine, given context and meaning through downstream assembly and annotation. For these techniques to operate successfully, the collected reads must be consistent with the assumed species or species group, and not corrupted in some way. The common bacterium Staphylococcus aureus may cause severe and life-threatening infections in humans,with some strains exhibiting antibiotic resistance. In this paper, we apply an SVM classifier to the important problem of distinguishing S. aureus sequencing projects from alternative pathogens, including closely related Staphylococci. Using a sequence k-mer representation, we achieve precision and recall above 95%, implicating features with important functional associations.
Resumo:
An online survey was conducted to investigate the views and experiences of Australian traffic and transport professionals about practical problems and issues in terms of trip generation and trip chaining for use in Transport Impact Assessment (TIA). Findings from this survey revealed that there is a shortage of appropriate data related to trip generation estimation for use in TIAs in Australia. Establishing a National Trip Generation Database (NTGD) with a centralised responsible organisation for collecting and publishing trip generation data based on federal and state governments’ contribution was found the most accepted solution for resolving this shortage as well as providing national standards and guidelines associated with trip generation definitions, data collection methodology, and TIA preparation process based on updated research. Finally, the study recognised the importance of the trip chaining effects on trip generation estimation and identified most prevalent land uses subject to trip chaining in terms of TIA.
Resumo:
The majority of current first year university students belong to Generation Y. Consequently, research suggests that, in order to more effectively engage them, their particular learning preferences should be acknowledged in the organisation of their learning environments and in the support provided. These preferences are reflected in the Torts Student Peer Mentor Program, which, as part of the undergraduate law degree at the Queensland University of Technology, utilises active learning, structured sessions and teamwork to supplement student understanding of the substantive law of Torts with the development of life-long skills. This article outlines the Program, and its relevance to the learning styles and experiences of Generation Y first year law students transitioning to university, in order to investigate student perceptions of its effectiveness – both generally and, more specifically, in terms of the Program’s capacity to assist students to develop academic and work-related skills.
Resumo:
In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.
Resumo:
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e.g., vectors of features such as CPU utilization, memory usage and network activity). For better detection performance, selection of all possible detectors for a node is desirable but it may not be feasible due to storage and computational overheads. Limiting the number of detectors on the other hand comes with the danger of missing attacks. We present a scheme for the controlled and decentralized division of detector sets where each IDS is assigned to a region of the feature space. We investigate the trade-off between scalability and robustness of detector sets. We address the problem of self-organization in CIDS so that each node generates a distinct set of the detectors to maximize the coverage of the feature space while pairs of nodes exchange their detector sets to provide a controlled level of redundancy. Our contribution is twofold. First, we use Symmetric Balanced Incomplete Block Design, Generalized Quadrangles and Ramanujan Expander Graph based deterministic techniques from combinatorial design theory and graph theory to decide how many and which detectors are exchanged between which pair of IDS nodes. Second, we use a classical epidemic model (SIR model) to show how properties from deterministic techniques can help us to reduce the attack spread rate.
Resumo:
The Beauty Leaf tree (Calophyllum inophyllum) is a potential source of non-edible vegetable oil for producing future generation biodiesel because of its ability to grow in a wide range of climate conditions, easy cultivation, high fruit production rate, and the high oil content in the seed. This plant naturally occurs in the coastal areas of Queensland and the Northern Territory in Australia, and is also widespread in south-east Asia, India and Sri Lanka. Although Beauty Leaf is traditionally used as a source of timber and orientation plant, its potential as a source of second generation biodiesel is yet to be exploited. In this study, the extraction process from the Beauty Leaf oil seed has been optimised in terms of seed preparation, moisture content and oil extraction methods. The two methods that have been considered to extract oil from the seed kernel are mechanical oil extraction using an electric powered screw press, and chemical oil extraction using n-hexane as an oil solvent. The study found that seed preparation has a significant impact on oil yields, especially in the screw press extraction method. Kernels prepared to 15% moisture content provided the highest oil yields for both extraction methods. Mechanical extraction using the screw press can produce oil from correctly prepared product at a low cost, however overall this method is ineffective with relatively low oil yields. Chemical extraction was found to be a very effective method for oil extraction for its consistence performance and high oil yield, but cost of production was relatively higher due to the high cost of solvent. However, a solvent recycle system can be implemented to reduce the production cost of Beauty Leaf biodiesel. The findings of this study are expected to serve as the basis from which industrial scale biodiesel production from Beauty Leaf can be made.
Resumo:
This paper presents a unified view of the relationship between (1) quantity and (2) price generating mechanisms in estimating individual prime construction costs/prices. A brief review of quantity generating techniques is provided with particular emphasis on experientially based assumptive approaches and this is compared with the level of pricing data available for the quantities generated in terms of reliability of the ensuing prime cost estimates. It is argued that there is a tradeoff between the reliability of quantity items and reliability of rates. Thus it is shown that the level of quantity generation is optimised by maximising the joint reliability function of the quantity items and their associated rates. Some thoughts on how this joint reliability function can be evaluated and quantified follow. The application of these ideas is described within the overall strategy of the estimator's decision - "Which estimating technique shall I use for a given level of contract information? - and a case is made for the computer generation of estimates by several methods, with an indication of the reliability of each estimate, the ultimate choice of estimate being left to the estimator concerned. Finally, the potential for the development of automatic estimating systems within this framework is examined.
Resumo:
Eco-driving instructions could reduce fuel consumption to up to 20% (EcoMove, 2010). Participants (N=13) drove an instrumented vehicle (i.e. Toyota Camry 2007) with an automatic transmission. Fuel consumption of the participants were compared before and after they received eco-driving instructions. Participants drove the same vehicle on the same urban route under similar traffic conditions. Results show that, on free flow sections of the track, all participants drove slightly faster (on average, 0.7 Km/h faster), during the lap for which they were instructed to drive in an eco-friendly manner as compared to when they were not given the eco-driving instruction. Suprisingly, eco-driving instructions increased the RPM significantly in most cases. Fuel consumption slightly decreased (6%) after the eco-driving instructions. We have found strong evidence showing that the fuel saving observed in our experiment (urban environment, automatic transmission) fall short of the 20% reduction claimed in other international trials.