182 resultados para Renilla reniformis luciferase vectors


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Maize streak virus (MSV; Genus Mastrevirus, Family Geminiviridae) occurs throughout Africa, where it causes what is probably the most serious viral crop disease on the continent. It is obligately transmitted by as many as six leafhopper species in the Genus Cicadulina, but mainly by C. mbila Naudé and C. storeyi. In addition to maize, it can infect over 80 other species in the Family Poaceae. Whereas 11 strains of MSV are currently known, only the MSV-A strain is known to cause economically significant streak disease in maize. Severe maize streak disease (MSD) manifests as pronounced, continuous parallel chlorotic streaks on leaves, with severe stunting of the affected plant and, usuallly, a failure to produce complete cobs or seed. Natural resistance to MSV in maize, and/or maize infections caused by non-maize-adapted MSV strains, can result in narrow, interrupted streaks and no obvious yield losses. MSV epidemiology is primarily governed by environmental influences on its vector species, resulting in erratic epidemics every 3-10 years. Even in epidemic years, disease incidences can vary from a few infected plants per field, with little associated yield loss, to 100% infection rates and complete yield loss. Taxonomy: The only virus species known to cause MSD is MSV, the type member of the Genus Mastrevirus in the Family Geminiviridae. In addition to the MSV-A strain, which causes the most severe form of streak disease in maize, 10 other MSV strains (MSV-B to MSV-K) are known to infect barley, wheat, oats, rye, sugarcane, millet and many wild, mostly annual, grass species. Seven other mastrevirus species, many with host and geographical ranges partially overlapping those of MSV, appear to infect primarily perennial grasses. Physical properties: MSV and all related grass mastreviruses have single-component, circular, single-stranded DNA genomes of approximately 2700 bases, encapsidated in 22 × 38-nm geminate particles comprising two incomplete T = 1 icosahedra, with 22 pentameric capsomers composed of a single 32-kDa capsid protein. Particles are generally stable in buffers of pH 4-8. Disease symptoms: In infected maize plants, streak disease initially manifests as minute, pale, circular spots on the lowest exposed portion of the youngest leaves. The only leaves that develop symptoms are those formed after infection, with older leaves remaining healthy. As the disease progresses, newer leaves emerge containing streaks up to several millimetres in length along the leaf veins, with primary veins being less affected than secondary or tertiary veins. The streaks are often fused laterally, appearing as narrow, broken, chlorotic stripes, which may extend over the entire length of severely affected leaves. Lesion colour generally varies from white to yellow, with some virus strains causing red pigmentation on maize leaves and abnormal shoot and flower bunching in grasses. Reduced photosynthesis and increased respiration usually lead to a reduction in leaf length and plant height; thus, maize plants infected at an early stage become severely stunted, producing undersized, misshapen cobs or giving no yield at all. Yield loss in susceptible maize is directly related to the time of infection: Infected seedlings produce no yield or are killed, whereas plants infected at later times are proportionately less affected. Disease control: Disease avoidance can be practised by only planting maize during the early season when viral inoculum loads are lowest. Leafhopper vectors can also be controlled with insecticides such as carbofuran. However, the development and use of streak-resistant cultivars is probably the most effective and economically viable means of preventing streak epidemics. Naturally occurring tolerance to MSV (meaning that, although plants become systemically infected, they do not suffer serious yield losses) has been found, which has primarily been attributed to a single gene, msv-1. However, other MSV resistance genes also exist and improved resistance has been achieved by concentrating these within individual maiz genotypes. Whereas true MSV immunity (meaning that plants cannot be symptomatically infected by the virus) has been achieved in lines that include multiple small-effect resistance genes together with msv-1, it has proven difficult to transfer this immunity into commercial maize genotypes. An alternative resistance strategy using genetic engineering is currently being investigated in South Africa. Useful websites: 〈http://www.mcb.uct.ac.za/MSV/mastrevirus.htm〉; 〈http://www. danforthcenter.org/iltab/geminiviridae/geminiaccess/mastrevirus/Mastrevirus. htm〉. © 2009 Blackwell Publishing Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Barmah Forest virus (BFV) disease is one of the most widespread mosquito-borne diseases in Australia. The number of outbreaks and the incidence rate of BFV in Australia have attracted growing concerns about the spatio-temporal complexity and underlying risk factors of BFV disease. A large number of notifications has been recorded continuously in Queensland since 1992. Yet, little is known about the spatial and temporal characteristics of the disease. I aim to use notification data to better understand the effects of climatic, demographic, socio-economic and ecological risk factors on the spatial epidemiology of BFV disease transmission, develop predictive risk models and forecast future disease risks under climate change scenarios. Computerised data files of daily notifications of BFV disease and climatic variables in Queensland during 1992-2008 were obtained from Queensland Health and Australian Bureau of Meteorology, respectively. Projections on climate data for years 2025, 2050 and 2100 were obtained from Council of Scientific Industrial Research Organisation. Data on socio-economic, demographic and ecological factors were also obtained from relevant government departments as follows: 1) socio-economic and demographic data from Australian Bureau of Statistics; 2) wetlands data from Department of Environment and Resource Management and 3) tidal readings from Queensland Department of Transport and Main roads. Disease notifications were geocoded and spatial and temporal patterns of disease were investigated using geostatistics. Visualisation of BFV disease incidence rates through mapping reveals the presence of substantial spatio-temporal variation at statistical local areas (SLA) over time. Results reveal high incidence rates of BFV disease along coastal areas compared to the whole area of Queensland. A Mantel-Haenszel Chi-square analysis for trend reveals a statistically significant relationship between BFV disease incidence rates and age groups (ƒÓ2 = 7587, p<0.01). Semi-variogram analysis and smoothed maps created from interpolation techniques indicate that the pattern of spatial autocorrelation was not homogeneous across the state. A cluster analysis was used to detect the hot spots/clusters of BFV disease at a SLA level. Most likely spatial and space-time clusters are detected at the same locations across coastal Queensland (p<0.05). The study demonstrates heterogeneity of disease risk at a SLA level and reveals the spatial and temporal clustering of BFV disease in Queensland. Discriminant analysis was employed to establish a link between wetland classes, climate zones and BFV disease. This is because the importance of wetlands in the transmission of BFV disease remains unclear. The multivariable discriminant modelling analyses demonstrate that wetland types of saline 1, riverine and saline tidal influence were the most significant risk factors for BFV disease in all climate and buffer zones, while lacustrine, palustrine, estuarine and saline 2 and saline 3 wetlands were less important. The model accuracies were 76%, 98% and 100% for BFV risk in subtropical, tropical and temperate climate zones, respectively. This study demonstrates that BFV disease risk varied with wetland class and climate zone. The study suggests that wetlands may act as potential breeding habitats for BFV vectors. Multivariable spatial regression models were applied to assess the impact of spatial climatic, socio-economic and tidal factors on the BFV disease in Queensland. Spatial regression models were developed to account for spatial effects. Spatial regression models generated superior estimates over a traditional regression model. In the spatial regression models, BFV disease incidence shows an inverse relationship with minimum temperature, low tide and distance to coast, and positive relationship with rainfall in coastal areas whereas in whole Queensland the disease shows an inverse relationship with minimum temperature and high tide and positive relationship with rainfall. This study determines the most significant spatial risk factors for BFV disease across Queensland. Empirical models were developed to forecast the future risk of BFV disease outbreaks in coastal Queensland using existing climatic, socio-economic and tidal conditions under climate change scenarios. Logistic regression models were developed using BFV disease outbreak data for the existing period (2000-2008). The most parsimonious model had high sensitivity, specificity and accuracy and this model was used to estimate and forecast BFV disease outbreaks for years 2025, 2050 and 2100 under climate change scenarios for Australia. Important contributions arising from this research are that: (i) it is innovative to identify high-risk coastal areas by creating buffers based on grid-centroid and the use of fine-grained spatial units, i.e., mesh blocks; (ii) a spatial regression method was used to account for spatial dependence and heterogeneity of data in the study area; (iii) it determined a range of potential spatial risk factors for BFV disease; and (iv) it predicted the future risk of BFV disease outbreaks under climate change scenarios in Queensland, Australia. In conclusion, the thesis demonstrates that the distribution of BFV disease exhibits a distinct spatial and temporal variation. Such variation is influenced by a range of spatial risk factors including climatic, demographic, socio-economic, ecological and tidal variables. The thesis demonstrates that spatial regression method can be applied to better understand the transmission dynamics of BFV disease and its risk factors. The research findings show that disease notification data can be integrated with multi-factorial risk factor data to develop build-up models and forecast future potential disease risks under climate change scenarios. This thesis may have implications in BFV disease control and prevention programs in Queensland.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: To determine whether uniform guidelines and training in the stabilization and formation of thermoplastic shells can improve the reproducibility of set-up for Head and Neck cancer patients. Methods and materials: Image based measurements of the planning and treatment positions for 35 head and neck cancer patients undergoing radical radiotherapy were analysed to provide a baseline of the reproducibility of thermoplastic immobilization. Radiation therapists (RT) were surveyed to establish a perception of their confidence in thermoplastic procedures. An evidence based staff training program was created and implemented. Set-up reproduction and staff perception were reviewed to measure the impact of the training program. Results: The mean (SD) 3D vectors of anatomical displacement, measured on the patient images, improved from 4.64 (2.03) for the baseline group compared to 3.02 (1.65) following training (p < 0.01). The proportion of 3D displacements of patient data exceeding 5 mm 3D vector was decreased from 37.1% to 5.7% (p < 0.001) and the 3 mm vector from 85.7% to 42.9% (p < 0.001). The post-training survey scores demonstrated improved confidence in reproducibility of set-up for head and neck patients. Conclusion: The Thermoplastic Shells Training Program has been found to improve the treatment reproducibility for head and neck radiation therapy patients. Uniform guidelines have increased RT confidence in thermoplastic procedures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dengue fever is one of the world’s most important vector-borne diseases. The transmission area of this disease continues to expand due to many factors including urban sprawl, increased travel and global warming. Current preventative techniques are primarily based on controlling mosquito vectors as other prophylactic measures, such as a tetravalent vaccine are unlikely to be available in the foreseeable future. However, the continually increasing dengue incidence suggests that this strategy alone is not sufficient. Epidemiological models attempt to predict future outbreaks using information on the risk factors of the disease. Through a systematic literature review, this paper aims at analyzing the different modeling methods and their outputs in terms of accurately predicting disease outbreaks. We found that many previous studies have not sufficiently accounted for the spatio-temporal features of the disease in the modeling process. Yet with advances in technology, the ability to incorporate such information as well as the socio-environmental aspect allowed for its use as an early warning system, albeit limited geographically to a local scale.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Typical flow fields in a stormwater gross pollutant trap (GPT) with blocked retaining screens were experimentally captured and visualised. Particle image velocimetry (PIV) software was used to capture the flow field data by tracking neutrally buoyant particles with a high speed camera. A technique was developed to apply the Image Based Flow Visualization (IBFV) algorithm to the experimental raw dataset generated by the PIV software. The dataset consisted of scattered 2D point velocity vectors and the IBFV visualisation facilitates flow feature characterisation within the GPT. The flow features played a pivotal role in understanding gross pollutant capture and retention within the GPT. It was found that the IBFV animations revealed otherwise unnoticed flow features and experimental artefacts. For example, a circular tracer marker in the IBFV program visually highlighted streamlines to investigate specific areas and identify the flow features within the GPT.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the past decade the use of long-lasting insecticidal nets (LLINs), in combination with improved drug therapies, indoor residual spraying (IRS) and better health infrastructure, has helped reduce malaria in many African countries for the first time in a generation. However, insecticide resistance in the vector is an evolving threat to these gains. We review emerging and historical data on behavioural resistance in response to LLINs and IRS. Overall the current literature suggests behavioural and species changes may be emerging, but the data are sparse and, at times unconvincing. However, preliminary modelling has demonstrated that behavioural resistance could have significant impacts on the effectiveness of malaria control. We propose seven recommendations to improve understanding of resistance in malaria vectors. Determining the public health impact of physiological and behavioural insecticide resistance is an urgent priority if we are to maintain the significant gains made in reducing malaria morbidity and mortality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rapid increase in the deployment of CCTV systems has led to a greater demand for algorithms that are able to process incoming video feeds. These algorithms are designed to extract information of interest for human operators. During the past several years, there has been a large effort to detect abnormal activities through computer vision techniques. Typically, the problem is formulated as a novelty detection task where the system is trained on normal data and is required to detect events which do not fit the learned `normal' model. Many researchers have tried various sets of features to train different learning models to detect abnormal behaviour in video footage. In this work we propose using a Semi-2D Hidden Markov Model (HMM) to model the normal activities of people. The outliers of the model with insufficient likelihood are identified as abnormal activities. Our Semi-2D HMM is designed to model both the temporal and spatial causalities of the crowd behaviour by assuming the current state of the Hidden Markov Model depends not only on the previous state in the temporal direction, but also on the previous states of the adjacent spatial locations. Two different HMMs are trained to model both the vertical and horizontal spatial causal information. Location features, flow features and optical flow textures are used as the features for the model. The proposed approach is evaluated using the publicly available UCSD datasets and we demonstrate improved performance compared to other state of the art methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a novel evolutionary computation approach to three-dimensional path planning for unmanned aerial vehicles (UAVs) with tactical and kinematic constraints. A genetic algorithm (GA) is modified and extended for path planning. Two GAs are seeded at the initial and final positions with a common objective to minimise their distance apart under given UAV constraints. This is accomplished by the synchronous optimisation of subsequent control vectors. The proposed evolutionary computation approach is called synchronous genetic algorithm (SGA). The sequence of control vectors generated by the SGA constitutes to a near-optimal path plan. The resulting path plan exhibits no discontinuity when transitioning from curve to straight trajectories. Experiments and results show that the paths generated by the SGA are within 2% of the optimal solution. Such a path planner when implemented on a hardware accelerator, such as field programmable gate array chips, can be used in the UAV as on-board replanner, as well as in ground station systems for assisting in high precision planning and modelling of mission scenarios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e.g., vectors of features such as CPU utilization, memory usage and network activity). For better detection performance, selection of all possible detectors for a node is desirable but it may not be feasible due to storage and computational overheads. Limiting the number of detectors on the other hand comes with the danger of missing attacks. We present a scheme for the controlled and decentralized division of detector sets where each IDS is assigned to a region of the feature space. We investigate the trade-off between scalability and robustness of detector sets. We address the problem of self-organization in CIDS so that each node generates a distinct set of the detectors to maximize the coverage of the feature space while pairs of nodes exchange their detector sets to provide a controlled level of redundancy. Our contribution is twofold. First, we use Symmetric Balanced Incomplete Block Design, Generalized Quadrangles and Ramanujan Expander Graph based deterministic techniques from combinatorial design theory and graph theory to decide how many and which detectors are exchanged between which pair of IDS nodes. Second, we use a classical epidemic model (SIR model) to show how properties from deterministic techniques can help us to reduce the attack spread rate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Deep inelastic neutron scattering measurements on liquid 3He-4He mixtures in the normal phase have been performed on the VESUVIO spectrometer at the ISIS pulsed neutron source at exchanged wave vectors of about q≃120.0Å-1. The neutron Compton profiles J(y) of the mixtures were measured along the T=1.96K isotherm for 3He concentrations, x, ranging from 0.1 to 1.0 at saturated vapor pressures. Values of kinetic energies 〈T〉 of 3He and 4He atoms as a function of x, 〈T〉(x), were extracted from the second moment of J(y). The present determinations of 〈T〉(x) confirm previous experimental findings for both isotopes and, in the case of 3He, a substantial disagreement with theory is found. In particular 〈T〉(x) for the 3He atoms is found to be independent of concentration yielding a value 〈T〉3(x=0.1)≃12K, much lower than the value suggested by the most recent theoretical estimates of approximately 19 K.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A significant amount of speech is typically required for speaker verification system development and evaluation, especially in the presence of large intersession variability. This paper introduces a source and utterance duration normalized linear discriminant analysis (SUN-LDA) approaches to compensate session variability in short-utterance i-vector speaker verification systems. Two variations of SUN-LDA are proposed where normalization techniques are used to capture source variation from both short and full-length development i-vectors, one based upon pooling (SUN-LDA-pooled) and the other on concatenation (SUN-LDA-concat) across the duration and source-dependent session variation. Both the SUN-LDA-pooled and SUN-LDA-concat techniques are shown to provide improvement over traditional LDA on NIST 08 truncated 10sec-10sec evaluation conditions, with the highest improvement obtained with the SUN-LDA-concat technique achieving a relative improvement of 8% in EER for mis-matched conditions and over 3% for matched conditions over traditional LDA approaches.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A significant amount of speech data is required to develop a robust speaker verification system, but it is difficult to find enough development speech to match all expected conditions. In this paper we introduce a new approach to Gaussian probabilistic linear discriminant analysis (GPLDA) to estimate reliable model parameters as a linearly weighted model taking more input from the large volume of available telephone data and smaller proportional input from limited microphone data. In comparison to a traditional pooled training approach, where the GPLDA model is trained over both telephone and microphone speech, this linear-weighted GPLDA approach is shown to provide better EER and DCF performance in microphone and mixed conditions in both the NIST 2008 and NIST 2010 evaluation corpora. Based upon these results, we believe that linear-weighted GPLDA will provide a better approach than pooled GPLDA, allowing for the further improvement of GPLDA speaker verification in conditions with limited development data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A new bioluminescent creatine kinase (CK) assay using purified luciferase was used to analyse CK activity in serum samples dried on filter paper. Enzyme activity was preserved for over 1 wk on paper stored at room temperature. At 60°C, CK activity in liquid serum samples was rapidly inactivated, but the activity of enzyme stored on paper was preserved for at least 2 days.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Epstein Barr virus (EBV) is a common γ-herpes virus, infecting approximately 90% of the world‟s population. It is also one of the first known viruses known to be oncogenic, and is associated with a number of tumour types, primarily lymphomas. MicroRNAs (miRNAs) are post-transcriptional regulators of gene expression and many human miRNAs have been associated with the development of malignancies including cancer. EBV was the first human virus identified to express miRNAs and encodes more than 40 miRNAs within its genome. Yet, an understanding of the targets of EBV-miRNAs, and thereby the function of them in pathogenesis remains sadly limited. This study identifies a potential novel target of EBV-miRNAs, MECP2 and characterises the miRNA:mRNA interactions between two previously identified novel targets; Bim and EBF1. In particular, this study focuses upon the interaction between EBF1 and the EBV-miRNA BART11-5p, demonstrating a 151bp region of the EBF1 3‟UTR that is capable of mediating the silencing of luciferase expression by BART11-5p but is not capable of silencing a full length EBF1-3‟UTR luciferase construct. This study provides evidence that EBF1 may be a target of one or more EBV-miRNAs.