438 resultados para ATROPHY INVOLVE
em Queensland University of Technology - ePrints Archive
Resumo:
Metalloproteinases have been implicated in the pathogenesis of equine laminitis and other inflammatory conditions, through their role in the degradation and remodelling of the extracellular matrix environment. Matrix metalloproteinases (MMPs) and their inhibitors are present in normal equine lamellae, with increased secretion and activation of some metalloproteinases reported in horses with laminitis associated with systemic inflammation. It is unknown whether these enzymes are involved in insulin-induced laminitis, which occurs without overt systemic inflammation. In this study, gene expression of MMP-2, MMP-9, MT1-MMP, ADAMTS-4 and TIMP-3 was determined in the lamellar tissue of normal control horses (n = 4) and horses that developed laminitis after 48 h of induced hyperinsulinaemia (n = 4), using quantitative Real Time-Polymerase Chain Reaction (qRT-PCR). Protein concentrations of MMP-2 and MMP-9 were also examined using gelatin zymography in horses subject to prolonged hyperinsulinaemia for 6 h (n = 4), 12 h (n = 4), 24 h (n = 4) and 48 h (n = 4), and in normal control horses (n = 4). The only change in gene expression observed was an upregulation of MMP-9 (p < 0.05) in horses that developed insulin-induced laminitis (48 h). Zymographical analysis showed an increase (p < 0.05) in pro MMP-9 during the acute phase of laminitis (48 h), whereas pro MMP-2 was present in similar concentration in the tissue of all horses. Thus, MMP-2, MT1-MMP, TIMP-3 and ADAMTS-4 do not appear to play a significant role in the pathogenesis of insulin-induced laminitis. The increased expression of MMP-9 may be associated with the infiltration of inflammatory leukocytes, or may be a direct result of hyperinsulinaemia. The exact role of MMP-9 in basement membrane degradation in laminitis is uncertain as it appears to be present largely in the inactive form.
Resumo:
Hamstring strain injuries are amongst the most common and problematic injuries in a wide range of sports that involve high speed running. The comparatively high rate of hamstring injury recurrence is arguably the most concerning aspect of these injuries. A number of modifiable and nonmodifiable risk factors are proposed to predispose athletes to hamstring strains. Potentially, the persistence of risk factors and the development of maladaptations following injury may explain injury recurrence. Here, the role of neuromuscular inhibition following injury is discussed as a potential mechanism for several maladaptations associated with hamstring re-injury. These maladaptations include eccentric hamstring weakness, selective hamstring atrophy and shifts in the knee flexor torque-joint angle relationship. Current evidence indicates that athletes return to competition after hamstring injury having developed maladaptations that predispose them to further injury. When rehabilitating athletes to return to competition following hamstring strain injury, the role of neuromuscular inhibition in re-injury should be considered.
Resumo:
Dysgraphia (agraphia) is a common feature of posterior cortical atrophy (PCA). However, detailed analyses of these spelling and writing impairments are infrequently conducted. LM is a 59-year-old woman with dysgraphia associated with PCA. She presented with a two-year history of decline in her writing and dressmaking skills. A 3D T1-weighted MRI scan confirmed selective bi-parietal atrophy, with relative sparing of the hippocampi and other cortical regions. Analyses of LM's preserved and impaired spelling abilities indicated mild physical letter distortions and a significant spelling deficit characterised by letter substitutions, insertions, omissions, and transpositions that was systematically sensitive to word length while insensitive to real word versus nonword category, word frequency, regularity, imagery, grammatical class and ambiguity. Our findings suggest a primary graphemic buffer disorder underlies LM's spelling errors, possibly originating from disruption to the operation of a fronto-parietal network implicated in verbal working memory.
Resumo:
Ankylosing spondylitis (AS) is a common, highly heritable, inflammatory arthritis for which HLA-B*27 is the major genetic risk factor, although its role in the aetiology of AS remains elusive. To better understand the genetic basis of the MHC susceptibility loci, we genotyped 7,264 MHC SNPs in 22,647 AS cases and controls of European descent. We impute SNPs, classical HLA alleles and amino-acid residues within HLA proteins, and tested these for association to AS status. Here we show that in addition to effects due to HLA-B*27 alleles, several other HLA-B alleles also affect susceptibility. After controlling for the associated haplotypes in HLA-B, we observe independent associations with variants in the HLA-A, HLA-DPB1 and HLA-DRB1 loci. We also demonstrate that the ERAP1 SNP rs30187 association is not restricted only to carriers of HLA-B*27 but also found in HLA-B*40:01 carriers independently of HLA-B*27 genotype.
Resumo:
The morphological and chemical changes occurring during the thermal decomposition of weddelite, CaC2O4·2H2O, have been followed in real time in a heating stage attached to an Environmental Scanning Electron Microscope operating at a pressure of 2 Torr, with a heating rate of 10 °C/min and an equilibration time of approximately 10 min. The dehydration step around 120 °C and the loss of CO around 425 °C do not involve changes in morphology, but changes in the composition were observed. The final reaction of CaCO3 to CaO while evolving CO2 around 600 °C involved the formation of chains of very small oxide particles pseudomorphic to the original oxalate crystals. The change in chemical composition could only be observed after cooling the sample to 350 °C because of the effects of thermal radiation.
Resumo:
Extreme sports and extreme sports participants have been most commonly explored from a negative perspective, for example the 'need to take unnecessary risks'. This study reports on findings that indicate a more positive experience. A phenomenological method was used via unstructured interviews with 15 extreme sports participants and other first hand accounts. The extreme sports included B.A.S.E. jumping, big wave surfing, extreme skiing, waterfall kayaking, extreme mountaineering and solo rope-free climbing. Results indicate that participating in activities that involve a real chance of death, fear and the realisation that nature in its extreme is far greater and more powerful than humanity triggers positive life changes, and an eco-centric standpoint.
Resumo:
Extreme sports and extreme sports participants have been most commonly explored from a negative perspective, for example the “need to take unnecessary risks.” This study explored what can be learned from extreme sports about courage and humility - two positive psychology constructs. A phenomenological method was used via unstructured interviews with 15 extreme sports participants and other first hand accounts. The extreme sports included B.A.S.E. jumping, big wave surfing, extreme skiing, waterfall kayaking, extreme mountaineering and solo rope-free climbing. Results indicate that humility and courage can be deliberately sought out by participating in activities that involve a real chance of death, fear and the realisation that nature in its extreme is far greater and more powerful than humanity.
Resumo:
This paper draws on a study of government initiat ives aimed at facilitating economic development, specifically the Multifunction Polis Feasibility Study involving the governments and business enterprises of Australia and Japan (1987-1991). Large scale projects that involve collaboration between gove rnment and business (termed: large scale collaborative venture LSCV)are identified as one aspect of competing in the new economy . The study pursued the research propos ition that a LSCV can be effectively facilitated by following a theory based process similar to those in corporate practice. An approach to managing such ventures is outlined, based on strategic marketing theory that may enhance their success and thereby help countries part icipate more successfully in global competition through such ventures.
Resumo:
This paper relates to government initiatives which aim at advancing their country’s economic development and investor attractiveness. It identifies large scale projects that involve collaboration between government and business (termed: large scale collaborative venture – LSCV) as one aspect of competing in the new economy. The study pursued the research proposition that a LSCV can be effectively facilitated by following a theory based process similar to what is used in corporate practice. An approach to managing such ventures is outlined, based on strategic marketing theory applied to a major project, the Multifunction Polis. It is proposed that such an approach may enhance the success of a collaborative venture and thereby help countries participate more successfully in global competition through such ventures.
Resumo:
Purpose – This paper compares the experiential consumption values that motivate consumer choice to purchase online for both male and female purchasers and non-purchasers. Design/methodology/approach – Using the theory of consumption value the study examines gendered perceptions of the functional, social and conditional value of using a virtual consumption setting for purchasing. Data was collected through an online survey and analysed using multiple discriminant analysis to determine meaningful differences between male and female purchasers and non-purchasers. Findings – The findings show that male online purchasers are discriminated from female purchasers by social value and from male non-purchasers by conditional value. Female purchasers are discriminated from male purchasers by functional value and from female non-purchasers by social value. Female non-purchasers are discriminated from female purchasers by conditional value. Male non-purchasers are discriminated from male purchasers by functional and social value. Research limitations/implications – Limitations include using an Internet survey and an Australian sample which may impact the generalisability of the findings to a wider population of Internet users. Future research should involve replication of the study in a country more or less developed in terms of gender composition of internet users to extend the generalisability of the findings. Additionally, researchers should examine whether other dimensions of consumption value,such as social influence through on- and off-line communication networks, may influence consumer choice to purchase online. Practical implications – The study provides practical implications for marketers to leverage consumption values that influence male and female consumers’ choice to purchase online and then drive their behaviour online through integrated marketing campaigns that involve both on- and offline strategies. Originality/value – The research makes an original contribution to the consumer behaviour literature as to date, no research has been found that undertakes such a comprehensive gender-based comparison of the perceived value of using a virtual consumption setting for purchasing.
Resumo:
Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web-based applications, such as Google Maps, is ensuring that mapping based applications are becoming commonplace amongst Internet users which has facilitated the rapid growth of geo-mashups. These user generated creations enable Internet users to aggregate and publish information over specific geographical points. This article identifies privacy invasive geo-mashups that involve the unauthorized use of personal information, the inadvertent disclosure of personal information and invasion of privacy issues. Building on Zittrain’s Privacy 2.0, the author contends that first generation information privacy laws, founded on the notions of fair information practices or information privacy principles, may have a limited impact regarding the resolution of privacy problems arising from privacy invasive geo-mashups. Principally because geo-mashups have different patterns of personal information provision, collection, storage and use that reflect fundamental changes in the Web 2.0 environment. The author concludes by recommending embedded technical and social solutions to minimize the risks arising from privacy invasive geo-mashups that could lead to the establishment of guidelines for the general protection of privacy in geo-mashups.
Resumo:
This article discusses the ways in which the relations among professional and non-professional participants in co-creative relations are being reconfigured as part of the shift from a closed industrial paradigm of expertise toward open and distributed expertise networks. This article draws on ethnographic consultancy research undertaken throughout 2007 with Auran Games, a Brisbane, Australia based games developer, to explore the co-creative relationships between professional developers and gamers. This research followed and informed Auran’s online community management and social networking strategies for Fury (http://unleashthefury.com), a massively multiplayer online game released in October 2007. This paper argues that these co-creative forms of expertise involve co-ordinating expertises through social-network markets.
Resumo:
We consider boundary layer flow of a micropolar fluid driven by a porous stretching sheet. A similarity solution is defined, and numerical solutions using Runge-Kutta and quasilinearisation schemes are obtained. A perturbation analysis is also used to derive analytic solutions to first order in the perturbing parameter. The resulting closed form solutions involve relatively complex expressions, and the analysis is made more tractable by a combination of offline and online work using a computational algebra system (CAS). For this combined numerical and analytic approach, the perturbation analysis yields a number of benefits with regard to the numerical work. The existence of a closed form solution helps to discriminate between acceptable and spurious numerical solutions. Also, the expressions obtained from the perturbation work can provide an accurate description of the solution for ranges of parameters where the numerical approaches considered here prove computationally more difficult.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
This document outlines a framework that could be used by government agencies in assessing policy interventions aimed at achieving social outcomes from government construction contracts. The framework represents a rational interpretation of the information gathered during the multi-outcomes construction policies project. The multi-outcomes project focused on the costs and benefits of using public construction contracts to promote the achievement of training and employment and public art objectives. The origin of the policy framework in a cost-benefit appraisal of current policy interventions is evidenced by its emphasis on sensitivity to policy commitment and project circumstances (especially project size and scope).The quantitative and qualitative analysis conducted in the multi-outcomes project highlighted, first, that in the absence of strong industry commitment to policy objectives, policy interventions typically result in high levels of avoidance activity, substantial administrative costs and very few benefits. Thus, for policy action on, for example, training or local employment to be successful compliance issues must be adequately addressed. Currently it appears that pre-qualification schemes (similar to the Priority Access Scheme) and schemes that rely on measuring, for example, the training investments of contractors within particular projects do not achieve high levels of compliance and involve significant administrative costs. Thus, an alternative is suggested in the policy framework developed here: a levy on each public construction project – set as a proportion of the total project costs. Although a full evaluation of this policy alternative was beyond the scope of the multi-outcomes construction policies project, it appears to offer the potential to minimize the transaction costs on contractors whilst enabling the creation of a training agency dedicated to improving the supply of skilled construction labour. A recommendation is thus made that this policy alternative be fully researched and evaluated. As noted above, the outcomes of the multi-outcomes research project also highlighted the need for sensitivity to project circumstances in the development and implementation of polices for public construction projects. Ideally a policy framework would have the flexibility to respond to circumstances where contractors share a commitment to the policy objectives and are able to identify measurable social outcomes from the particular government projects they are involved in. This would involve a project-by-project negotiation of goals and performance measures. It is likely to only be practical for large, longer term projects.