143 resultados para harmful algal blooms


Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND AND PURPOSE It has been proposed that BRL37344, SR58611 and CGP12177 activate b3-adrenoceptors in human atrium to increase contractility and L-type Ca2+ current (ICa-L). b3-adrenoceptor agonists are potentially beneficial for the treatment of a variety of diseases but concomitant cardiostimulation would be potentially harmful. It has also been proposed that (-)-CGP12177 activates the low affinity binding site of the b1-adrenoceptor in human atrium. We therefore used BRL37344, SR58611 and (-)-CGP12177 with selective b-adrenoceptor subtype antagonists to clarify cardiostimulant b-adrenoceptor subtypes in human atrium. EXPERIMENTAL APPROACH Human right atrium was obtained from patients without heart failure undergoing coronary artery bypass or valve surgery. Cardiomyocytes were prepared to test BRL37344, SR58611 and CGP12177 effects on ICa-L. Contractile effects were determined on right atrial trabeculae. KEY RESULTS BRL37344 increased force which was antagonized by blockade of b1- and b2-adrenoceptors but not by blockade of b3-adrenoceptors with b3-adrenoceptor-selective L-748,337 (1 mM). The b3-adrenoceptor agonist SR58611 (1 nM–10 mM) did not affect atrial force. BRL37344 and SR58611 did not increase ICa-L at 37°C, but did at 24°C which was prevented by L-748,337. (-)-CGP12177 increased force and ICa-L at both 24°C and 37°C which was prevented by (-)-bupranolol (1–10 mM), but not L-748,337. CONCLUSIONS AND IMPLICATIONS We conclude that the inotropic responses to BRL37344 are mediated through b1- and b2-adrenoceptors. The inotropic and ICa-L responses to (-)-CGP12177 are mediated through the low affinity site b1L-adrenoceptor of the b1-adrenoceptor. b3-adrenoceptor-mediated increases in ICa-L are restricted to low temperatures. Human atrial b3-adrenoceptors do not change contractility and ICa-L at physiological temperature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Path planning and trajectory design for autonomous underwater vehicles (AUVs) is of great importance to the oceanographic research community because automated data collection is becoming more prevalent. Intelligent planning is required to maneuver a vehicle to high-valued locations to perform data collection. In this paper, we present algorithms that determine paths for AUVs to track evolving features of interest in the ocean by considering the output of predictive ocean models. While traversing the computed path, the vehicle provides near-real-time, in situ measurements back to the model, with the intent to increase the skill of future predictions in the local region. The results presented here extend prelim- inary developments of the path planning portion of an end-to-end autonomous prediction and tasking system for aquatic, mobile sensor networks. This extension is the incorporation of multiple vehicles to track the centroid and the boundary of the extent of a feature of interest. Similar algorithms to those presented here are under development to consider additional locations for multiple types of features. The primary focus here is on algorithm development utilizing model predictions to assist in solving the motion planning problem of steering an AUV to high-valued locations, with respect to the data desired. We discuss the design technique to generate the paths, present simulation results and provide experimental data from field deployments for tracking dynamic features by use of an AUV in the Southern California coastal ocean.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Data collection using Autonomous Underwater Vehicles (AUVs) is increasing in importance within the oceano- graphic research community. Contrary to traditional moored or static platforms, mobile sensors require intelligent planning strategies to manoeuvre through the ocean. However, the ability to navigate to high-value locations and collect data with specific scientific merit is worth the planning efforts. In this study, we examine the use of ocean model predictions to determine the locations to be visited by an AUV, and aid in planning the trajectory that the vehicle executes during the sampling mission. The objectives are: a) to provide near-real time, in situ measurements to a large-scale ocean model to increase the skill of future predictions, and b) to utilize ocean model predictions as a component in an end-to-end autonomous prediction and tasking system for aquatic, mobile sensor networks. We present an algorithm designed to generate paths for AUVs to track a dynamically evolving ocean feature utilizing ocean model predictions. This builds on previous work in this area by incorporating the predicted current velocities into the path planning to assist in solving the 3-D motion planning problem of steering an AUV between two selected locations. We present simulation results for tracking a fresh water plume by use of our algorithm. Additionally, we present experimental results from field trials that test the skill of the model used as well as the incorporation of the model predictions into an AUV trajectory planner. These results indicate a modest, but measurable, improvement in surfacing error when the model predictions are incorporated into the planner.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

-

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trajectory design for Autonomous Underwater Vehicles (AUVs) is of great importance to the oceanographic research community. Intelligent planning is required to maneuver a vehicle to high-valued locations for data collection. We consider the use of ocean model predictions to determine the locations to be visited by an AUV, which then provides near-real time, in situ measurements back to the model to increase the skill of future predictions. The motion planning problem of steering the vehicle between the computed waypoints is not considered here. Our focus is on the algorithm to determine relevant points of interest for a chosen oceanographic feature. This represents a first approach to an end to end autonomous prediction and tasking system for aquatic, mobile sensor networks. We design a sampling plan and present experimental results with AUV retasking in the Southern California Bight (SCB) off the coast of Los Angeles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Autonomous Underwater Vehicles (AUVs) are revolutionizing oceanography through their versatility, autonomy and endurance. However, they are still an underutilized technology. For coastal operations, the ability to track a certain feature is of interest to ocean scientists. Adaptive and predictive path planning requires frequent communication with significant data transfer. Currently, most AUVs rely on satellite phones as their primary communication. This communication protocol is expensive and slow. To reduce communication costs and provide adequate data transfer rates, we present a hardware modification along with a software system that provides an alternative robust disruption- tolerant communications framework enabling cost-effective glider operation in coastal regions. The framework is specifically designed to address multi-sensor deployments. We provide a system overview and present testing and coverage data for the network. Additionally, we include an application of ocean-model driven trajectory design, which can benefit from the use of this network and communication system. Simulation and implementation results are presented for single and multiple vehicle deployments. The presented combination of infrastructure, software development and deployment experience brings us closer to the goal of providing a reliable and cost-effective data transfer framework to enable real-time, optimal trajectory design, based on ocean model predictions, to gather in situ measurements of interesting and evolving ocean features and phenomena.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Potentially harmful substance use is common, but many affected people do not receive treatment. Brief face-to-face treatments show impact, as do strategies to assist self-help remotely, by using bibliotherapies, computers or mobile phones. Remotely delivered treatments offer more sustained and multifaceted support than brief interventions, and they show a substantial cost advantage as users increase in number. They may also build skills, confidence and treatment fidelity in providers who use them in sessions. Engagement and retention remain challenges, but electronic treatments show promise in engaging younger populations. Recruitment may be assisted by integration with community campaigns or brief opportunistic interventions. However, routine use of assisted self-help by standard services faces significant challenges. Strategies to optimize adoption are discussed. ----- ----- Research Highlights: ► Many people with risky or problematic drinking do not currently receive treatment. ► Assisted self-help has a significant impact and can be delivered at low cost. ► Maximal effects from assisted self-help require engagement of potential users. ► Marketing campaigns and integration into existing service models may assist.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

β-Adrenoceptor blocking agents (β-blockers) that at low concentrations antagonize cardiostimulant effects of catecholamines, but at high concentrations also cause cardiostimulation, have been appearing since the late 1960s. These cardiostimulant β-blockers, coined non-conventional partial agonists, antagonize the effects of catecholamines through a high-affinity site (β1HAR), but cause cardiostimulation mainly through a low-affinity site (β1LAR) of the myocardial β1-adrenoceptor. The experimental non-conventional partial agonist (−)-CGP12177 increases cardiac L-type Ca2+ current density and Ca2+ transients, shortens action potential duration but augments action potential plateau, increases heart rate and force, as well as causes arrhythmic Ca2+ transients and arrhythmic cardiocyte contractions. Other β-blockers, which do not cause cardiostimulation, consistently have lower affinity for β1LAR than β1HAR. These sites were verified and the cardiac pharmacology of non-conventional partial agonists confirmed on recombinant β1-adrenoceptors and on β1-adrenoceptors overexpressed into the heart. A targeted mutation of Asp138 to Glu138 virtually abolished the pharmacology of β1HAR but left intact the pharmacology of β1LAR. Non-conventional partial agonists may be beneficial for the treatment of peripheral autonomic neuropathy but probably due to their arrhythmic propensities, may be harmful for the treatment of chronic heart failure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Alcohol consumption has been a popular leisure activity among Australian since European Settlement. Australians currently consume 7.2 litres per capita pure alcohol and Australia in regards to alcohol consumption is ranked as the 22nd highest country of 58 countries. Although the alcohol industry has provided leisure, employment and government taxes, alcohol use has also become associated with chronic health problems, crime, public disorder and violence. Drunken and disorderly behaviour is commonly associated with Pubs, Clubs and Hotels, particularly in the late night entertainment areas. Historically, drunkenness and disorderly behaviour has been managed by measures such as floggings, jail and treatment in asylums. Alcohol has also been banned in specific areas and restrictions have applied to hours and days of operation. In more recent times alcohol policies have included extended trading hours, restricted trading hours and bans in some Aboriginal communities in order to reduce alcohol-related violence. Community and business partnerships in and around licensed premises have also developed in order to address the noise, violence and disorderly behaviour that often occurs in the evenings and early mornings. There is an urgent need for the government to be more robust about implementing effective alcohol control policies in order to prevent and reduce the harmful effects of alcohol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Different international plant protection organisations advocate different schemes for conducting pest risk assessments. Most of these schemes use structured questionnaire in which experts are asked to score several items using an ordinal scale. The scores are then combined using a range of procedures, such as simple arithmetic mean, weighted averages, multiplication of scores, and cumulative sums. The most useful schemes will correctly identify harmful pests and identify ones that are not. As the quality of a pest risk assessment can depend on the characteristics of the scoring system used by the risk assessors (i.e., on the number of points of the scale and on the method used for combining the component scores), it is important to assess and compare the performance of different scoring systems. In this article, we proposed a new method for assessing scoring systems. Its principle is to simulate virtual data using a stochastic model and, then, to estimate sensitivity and specificity values from these data for different scoring systems. The interest of our approach was illustrated in a case study where several scoring systems were compared. Data for this analysis were generated using a probabilistic model describing the pest introduction process. The generated data were then used to simulate the outcome of scoring systems and to assess the accuracy of the decisions about positive and negative introduction. The results showed that ordinal scales with at most 5 or 6 points were sufficient and that the multiplication-based scoring systems performed better than their sum-based counterparts. The proposed method could be used in the future to assess a great diversity of scoring systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigates a way to systematically integrate information literacy (IL) into an undergraduate academic programme and develops a model for integrating information literacy across higher education curricula. Curricular integration of information literacy in this study means weaving information literacy into an academic curriculum. In the associated literature, it is also referred to as the information literacy embedding approach or the intra-curricular approach. The key findings identified from this study are presented in 4 categories: the characteristics of IL integration; the key stakeholders in IL integration; IL curricular design strategies; and the process of IL curricular integration. Three key characteristics of the curricular integration of IL are identified: collaboration and negotiation, contextualisation and ongoing interaction with information. The key stakeholders in the curricular integration of IL are recognised as the librarians, the course coordinators and lecturers, the heads of faculties or departments, and the students. Some strategies for IL curricular design include: the use of IL policies and standards in IL curricular design; the combination of face to face and online teaching as an emerging trend; the use of IL assessment tools which play an important role in IL integration. IL can be integrated into the intended curriculum (what an institution expects its students to learn), the offered curriculum (what the teachers teach) and the received curriculum (what students actually learn). IL integration is a process of negotiation, collaboration and the implementation of the intended curriculum. IL can be integrated at different levels of curricula such as: institutional, faculty, departmental, course and class curriculum levels. Based on these key findings, an IL curricular integration model is developed. The model integrates curriculum, pedagogy and learning theories, IL theories, IL guidelines and the collaboration of multiple partners. The model provides a practical approach to integrating IL into multiple courses across an academic degree. The development of the model was based on the IL integration experiences of various disciplines in three universities and the implementation experience of an engineering programme at another university; thus it may be of interest to other disciplines. The model has the potential to enhance IL teaching and learning, curricular development and to implement graduate attributes in higher education. Sociocultural theories are applied to the research process and IL curricular design of this study. Sociocultural theories describe learning as being embedded within social events and occurring as learners interact with other people, objects, and events in a collaborative environment. Sociocultural theories are applied to explore how academic staff and librarians experience the curricular integration of IL; they also support collaboration in the curricular integration of IL and the development of an IL integration model. This study consists of two phases. Phase I (2007) was the interview phase where both academic staff and librarians at three IL active universities were interviewed. During this phase, attention was paid specifically to the practical process of curricular integration of IL and IL activity design. Phase II, the development phase (2007-2008), was conducted at a fourth university. This phase explores the systematic integration of IL into an engineering degree from Year 1 to Year 4. Learning theories such as sociocultural theories, Bloom’s Taxonomy and IL theories are used in IL curricular development. Based on the findings from both phases, an IL integration model was developed. The findings and the model contribute to IL education, research and curricular development in higher education. The sociocultural approach adopted in this study also extends the application of sociocultural theories to the IL integration process and curricular design in higher education.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over recent decades, the field of ethics has been the focus of increasing attention in teaching. This is not surprising given that teaching is a moral activity that is heavily values-laden. Because of this, teachers face ethical dilemmas in the course of their daily work. This paper presents an ethical decision-making model that helps to explain the decision-making processes that individuals or groups are likely to experience when confronted by an ethical dilemma. In order to make sense of the model, we put forward three short ethical dilemma scenarios facing teachers and apply the model to interpret them. Here we identify the critical incident, the forces at play that help to illuminate the incident, the choices confronting the individual and the implications of these choices for the individual, organization and community. Based on our analysis and the wider literature we identify several strategies that may help to minimize the impact of ethical dilemmas. These include the importance of sharing dilemmas with trusted others; having institutional structures in schools that lessen the emergence of harmful actions occurring; the necessity for individual teachers to articulate their own personal and professional ethics; acknowledging that dilemmas have multiple forces at play; the need to educate colleagues about specific issues; and the necessity of appropriate preparation and support for teachers. Of these strategies, providing support for teachers via professional development is explored more fully.