89 resultados para innate and adaptive immunity
Resumo:
The paper discusses robot navigation from biological inspiration. The authors sought to build a model of the rodent brain that is suitable for practical robot navigation. The core model, dubbed RatSLAM, has been demonstrated to have exactly the same advantages described earlier: it can build, maintain, and use maps simultaneously over extended periods of time and can construct maps of large and complex areas from very weak geometric information. The work contrasts with other efforts to embody models of rat brains in robots. The article describes the key elements of the known biology of the rat brain in relation to navigation and how the RatSLAM model captures the ideas from biology in a fashion suitable for implementation on a robotic platform. The paper then outline RatSLAM's performance in two difficult robot navigation challenges, demonstrating how a cognitive robotics approach to navigation can produce results that rival other state of the art approaches in robotics.
Resumo:
Background: Factors that individually influence blood sugar control, health-related quality of life, and diabetes self-care behaviors have been widely investigated; however, most previous diabetes studies have not tested an integrated association between a series of factors and multiple health outcomes. ---------- Objectives: The purposes of this study are to identify risk factors and protective factors and to examine the impact of risk factors and protective factors on adaptive outcomes in people with type 2 diabetes.---------- Design: A descriptive correlational design was used to examine a theoretical model of risk factors, protective factors, and adaptive outcomes.---------- Settings: This study was conducted at the endocrine outpatient departments of three hospitals in Taiwan. Participants A convenience sample of 334 adults with type 2 diabetes aged 40 and over.---------- Methods: Data were collected by a self-reported questionnaire and physiological examination. Using the structural equation modeling technique, measurement and structural regression models were tested.---------- Results: Age and life events reflected the construct of risk factors. The construct of protective factors was explained by diabetes symptoms, coping strategy, and social support. The construct of adaptive outcomes comprised HbA1c, health-related quality of life, and self-care behaviors. Protective factors had a significant direct effect on adaptive outcomes (β = 0.68, p < 0.001); however, risk factors did not predict adaptive outcomes (β = − 0.48, p = 0.118).---------- Conclusions: Identifying and managing risk factors and protective factors are an integral part of diabetes care. This theoretical model provides a better understanding of how risk factors and protective factors work together to influence multiple adaptive outcomes in people living with type 2 diabetes.
Resumo:
Inspection aircraft equipped with cameras and other sensors are routinely used for asset location, inspection, monitoring and hazard identification of oil-gas pipelines, roads, bridges and power transmission grids. This paper is concerned with automated flight of fixed-wing inspection aircraft to track approximately linear infrastructure. We propose a guidance law approach that seeks to maintain aircraft trajectories with desirable position and orientation properties relative to the infrastructure under inspection. Furthermore, this paper also proposes the use of an adaptive maneuver selection approach, in which maneuver primitives are adaptively selected to improve the aircraft’s attitude behaviour. We employ an integrated design methodology particularly suited for an automated inspection aircraft. Simulation studies using full nonlinear semi-coupled six degree-of-freedom equations of motion are used to illustrate the effectiveness of the proposed guidance and adaptive maneuver selection approaches in realistic flight conditions. Experimental flight test results are given to demonstrate the performance of the design.
Resumo:
A key concern in the field of contemporary fashion/textiles design is the emergence of ‘fast fashion’: best explained as "buy it Friday, wear it Saturday and throw it away on Sunday" (O'Loughlin, 2007). In this contemporary retail atmosphere of “pile it high: sell it cheap” and “quick to market”, even designer goods have achieved a throwaway status. This modern culture of consumerism is the antithesis of sustainability and is proving a dilemma surrounding sustainable practice for designers and producers in the disciplines (de Blas, 2010). Design researchers including those in textiles/fashion have begun to explore what is a key question in the 21st century in order to create a vision and reason for their disciplines: Can products be designed to have added value to the consumer and hence contribute to a more sustainable industry? Fashion Textiles Design has much to answer for in contributing to the problems of unsustainable practices on a global scale in design, production and waste. However, designers within this field also have great potential to contribute to practical ‘real world’ solutions. ----- ----- This paper provides an overview of some of the design and technological developments from the fashion/textiles industry, endorsing a model where designers and technicians use their transferrable skills for wellbeing rather than desire. Smart materials in the form of responsive and adaptive fibres and fabrics combined with electro active devices, and ICT are increasingly shaping many aspects of society particularly in the leisure industry and interactive consumer products are ever more visible in healthcare. Combinations of biocompatible delivery devices with bio sensing elements can create analyse, sense and actuate early warning and monitoring systems which can be linked to data logging and patient records via intelligent networks. Patient sympathetic, ‘smart’ fashion/textiles applications based on interdisciplinary expertise utilising textiles design and technology is emerging. An analysis of a series of case studies demonstrates the potential of fashion textiles design practitioners to exploit the concept of value adding through technological garment and textiles applications and enhancement for health and wellbeing and in doing so contribute to a more sustainable future fashion/textiles design industry.
Resumo:
This paper presents background of our research and result of our pilot study to find methods for convincing building users to become active building participants. We speculate this is possible by allowing and motivating users to customise and manage their own built environments. The ultimate aim of this research is to develop open, flexible and adaptive systems that bring awareness to building users to the extent they recognise spaces are for them to change rather than accept spaces are fixed and they are the ones to adapt. We argue this is possible if the architectural hardware is designed to adapt to begin with and more importantly if there are appropriate user interfaces that are designed to work with the hardware. A series of simple prototypes were made to study possibilities through making, installing and experiencing them. Ideas discussed during making and experiencing of prototypes were evaluated to generate further ideas. This method was very useful to speculate unexplored and unknown issues with respect to developing user interfaces for active buildings.
Resumo:
This study examined if organizational identification can account for the mechanisms by which two-change management practices (communication and participation) influence employees’ intentions to support change. The context was a sample of 82 hotel employees in the early stages of a re-brand. Identification with the new hotel fully mediated the relationship between communication and adaptive and proactive intentions to support change, as well as between participation and proactive intentions.
Resumo:
Several track-before-detection approaches for image based aircraft detection have recently been examined in an important automated aircraft collision detection application. A particularly popular approach is a two stage processing paradigm which involves: a morphological spatial filter stage (which aims to emphasize the visual characteristics of targets) followed by a temporal or track filter stage (which aims to emphasize the temporal characteristics of targets). In this paper, we proposed new spot detection techniques for this two stage processing paradigm that fuse together raw and morphological images or fuse together various different morphological images (we call these approaches morphological reinforcement). On the basis of flight test data, the proposed morphological reinforcement operations are shown to offer superior signal to-noise characteristics when compared to standard spatial filter options (such as the close-minus-open and adaptive contour morphological operations). However, system operation characterised curves, which examine detection verses false alarm characteristics after both processing stages, illustrate that system performance is very data dependent.
Resumo:
The immune system plays an important role in defending the body against tumours and other threats. Currently, mechanisms involved in immune system interactions with tumour cells are not fully understood. Here we develop a mathematical tool that can be used in aiding to address this shortfall in understanding. This paper de- scribes a hybrid cellular automata model of the interaction between a growing tumour and cells of the innate and specific immune system including the effects of chemokines that builds on previous models of tumour-immune system interactions. In particular, the model is focused on the response of immune cells to tumour cells and how the dynamics of the tumour cells change due to the immune system of the host. We present results and predictions of in silico experiments including simulations of Kaplan-Meier survival-like curves.
Resumo:
Background. Recent reports have indicated that single-stranded DNA (ssDNA) viruses in the taxonomic families Geminiviridae, Parvoviridae and Anellovirus may be evolving at rates of ∼10-4 substitutions per site per year (subs/site/year). These evolution rates are similar to those of RNA viruses and are surprisingly high given that ssDNA virus replication involves host DNA polymerases with fidelities approximately 10 000 times greater than those of error-prone viral RNA polymerases. Although high ssDNA virus evolution rates were first suggested in evolution experiments involving the geminivirus maize streak virus (MSV), the evolution rate of this virus has never been accurately measured. Also, questions regarding both the mechanistic basis and adaptive value of high geminivirus mutation rates remain unanswered. Results. We determined the short-term evolution rate of MSV using full genome analysis of virus populations initiated from cloned genomes. Three wild type viruses and three defective artificial chimaeric viruses were maintained in planta for up to five years and displayed evolution rates of between 7.4 × 10-4 and 7.9 × 10-4 subs/site/year. Conclusion. These MSV evolution rates are within the ranges observed for other ssDNA viruses and RNA viruses. Although no obvious evidence of positive selection was detected, the uneven distribution of mutations within the defective virus genomes suggests that some of the changes may have been adaptive. We also observed inter-strand nucleotide substitution imbalances that are consistent with a recent proposal that high mutation rates in geminiviruses (and possibly ssDNA viruses in general) may be due to mutagenic processes acting specifically on ssDNA molecules. © 2008 Walt et al; licensee BioMed Central Ltd.
Resumo:
Background To describe the iterative development process and final version of ‘MobileMums’: a physical activity intervention for women with young children (<5 years) delivered primarily via mobile telephone (mHealth) short messaging service (SMS). Methods MobileMums development followed the five steps outlined in the mHealth development and evaluation framework: 1) conceptualization (critique of literature and theory); 2) formative research (focus groups, n= 48); 3) pre-testing (qualitative pilot of intervention components, n= 12); 4) pilot testing (pilot RCT, n= 88); and, 5) qualitative evaluation of the refined intervention (n= 6). Results Key findings identified throughout the development process that shaped the MobileMums program were the need for: behaviour change techniques to be grounded in Social Cognitive Theory; tailored SMS content; two-way SMS interaction; rapport between SMS sender and recipient; an automated software platform to generate and send SMS; and, flexibility in location of a face-to-face delivered component. Conclusions The final version of MobileMums is flexible and adaptive to individual participant’s physical activity goals, expectations and environment. MobileMums is being evaluated in a community-based randomised controlled efficacy trial (ACTRN12611000481976).
Resumo:
This original study creates a philosophy of regeneration reuse, which is a conceptual framework that utilises construction and demolition waste products by building component, relocation and adaptive reuse. Case studies from the greater Brisbane, wider southeast Queensland region and greater London area are used to demonstrate the principles of regeneration reuse through research activities, analysis and evaluation. The regeneration reuse conceptual process draws upon assessing embodied carbon and sustainable benefits to deconstruct rather than destruct, and consider alternative options to waste treatment technologies in the built environment. The importance of waste management is examined, specifically the impacts of governance to the principles of regeneration reuse through analysis of legislation in the Australian and UK jurisdictions. Design process considerations when incorporating the principles of regeneration reuse are defined, and phasing and staging assessment explored to determine the most effective point of intervention in the design process to include waste management strategies.
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.
Resumo:
Introduction: The motivation for developing megavoltage (and kilovoltage) cone beam CT (MV CBCT) capabilities in the radiotherapy treatment room was primarily based on the need to improve patient set-up accuracy. There has recently been an interest in using the cone beam CT data for treatment planning. Accurate treatment planning, however, requires knowledge of the electron density of the tissues receiving radiation in order to calculate dose distributions. This is obtained from CT, utilising a conversion between CT number and electron density of various tissues. The use of MV CBCT has particular advantages compared to treatment planning with kilovoltage CT in the presence of high atomic number materials and requires the conversion of pixel values from the image sets to electron density. Therefore, a study was undertaken to characterise the pixel value to electron density relationship for the Siemens MV CBCT system, MVision, and determine the effect, if any, of differing the number of monitor units used for acquisition. If a significant difference with number of monitor units was seen then pixel value to ED conversions may be required for each of the clinical settings. The calibration of the MV CT images for electron density offers the possibility for a daily recalculation of the dose distribution and the introduction of new adaptive radiotherapy treatment strategies. Methods: A Gammex Electron Density CT Phantom was imaged with the MVCB CT system. The pixel value for each of the sixteen inserts, which ranged from 0.292 to 1.707 relative electron density to the background solid water, was determined by taking the mean value from within a region of interest centred on the insert, over 5 slices within the centre of the phantom. These results were averaged and plotted against the relative electron densities of each insert with a linear least squares fit was preformed. This procedure was performed for images acquired with 5, 8, 15 and 60 monitor units. Results: The linear relationship between MVCT pixel value and ED was demonstrated for all monitor unit settings and over a range of electron densities. The number of monitor units utilised was found to have no significant impact on this relationship. Discussion: It was found that the number of MU utilised does not significantly alter the pixel value obtained for different ED materials. However, to ensure the most accurate and reproducible MV to ED calibration, one MU setting should be chosen and used routinely. To ensure accuracy for the clinical situation this MU setting should correspond to that which is used clinically. If more than one MU setting is used clinically then an average of the CT values acquired with different numbers of MU could be utilized without loss in accuracy. Conclusions: No significant differences have been shown between the pixel value to ED conversion for the Siemens MV CT cone beam unit with change in monitor units. Thus as single conversion curve could be utilised for MV CT treatment planning. To fully utilise MV CT imaging for radiotherapy treatment planning further work will be undertaken to ensure all corrections have been made and dose calculations verified. These dose calculations may be either for treatment planning purposes or for reconstructing the delivered dose distribution from transit dosimetry measurements made using electronic portal imaging devices. This will potentially allow the cumulative dose distribution to be determined through the patient’s multi-fraction treatment and adaptive treatment strategies developed to optimize the tumour response.
Resumo:
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).
Resumo:
Welcome to this introductory guide on using a systems change model to embed Education for Sustainability (EfS) into teacher education. Pressing sustainability issues such as climate change, biodiversity loss and depletion of non-renewable resources pose new challenges for education. The importance of education in preparing future citizens to engage in sustainable living practices and help create a more sustainable world is widely acknowledged. As a result many universities around the world are beginning to recognize the need to integrate EfS into their teacher education programs. However, evidence indicates that there is little or no core EfS knowledge or pedagogy in pre-service teacher courses available to student teachers in a thorough and systematic fashion. Instead efforts are fragmented and individually or, at best, institutionally-based and lacking a systems approach to change, an approach that is seen as essential to achieving a sustainable society (Henderson & Tilbury, 2004). The result is new teachers are graduating without the necessary knowledge or skills to teach in ways that enable them to prepare their students to cope well with the new and emerging challenges their communities face. This guide has been prepared as part of a teaching and learning research project that applied a systems change approach to embedding the learning and teaching of sustainability into pre-service teacher education. The processes, outcomes and lessons learnt from this project are presented here as a guide for navigating pathways to systemic change in the journey of re-orienting teacher education towards sustainability. The guide also highlights how a systems change approach can be used to successfully enact change within a teacher education system. If you are curious about how to introduce and embed EfS into teacher education – or have tried other models and are looking for a more encompassing, transformative approach – this guide is designed to help you. The material presented in this guide is designed to be flexible and adaptive. However you choose to use the content, our aim is to help you and your students develop new perspectives, promote discussion and to engage with a system-wide approach to change.