164 resultados para Combat against droughts

em Queensland University of Technology - ePrints Archive


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The therapeutic effects induced by serotonin-selective reuptake inhibitor (SSRI) antidepressants are initially triggered by blocking the serotonin transporter and rely on long-term adaptations of pre- and post-synaptic receptors. We show here that long-term behavioral and neurogenic SSRI effects are abolished after either genetic or pharmacological inactivation of 5-HT(2B) receptors. Conversely, direct agonist stimulation of 5-HT(2B) receptors induces an SSRI-like response in behavioral and neurogenic assays. Moreover, the observation that (i) this receptor is expressed by raphe serotonergic neurons, (ii) the SSRI-induced increase in hippocampal extracellular serotonin concentration is strongly reduced in the absence of functional 5-HT(2B) receptors and (iii) a selective 5-HT(2B) agonist mimics SSRI responses, supports a positive regulation of serotonergic neurons by 5-HT(2B) receptors. The 5-HT(2B) receptor appears, therefore, to positively modulate serotonergic activity and to be required for the therapeutic actions of SSRIs. Consequently, the 5-HT(2B) receptor should be considered as a new tractable target in the combat against depression.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The development of vaccines to combat pathogens that infect across mucosal surfaces has been a major goal of vaccine research. Successful mucosal vaccination requires the co-administration of adjuvants that can overcome the state of immune tolerance normally associated with mucosal application of proteins. In the case of oral immunization, delivery systems are also required to protect vaccine antigens against destruction by gastric pH and digestive enzymes. Furthermore, adjuvants used for mucosal delivery must be free of neurotoxic effects like those induced by the commonly used experimental mucosal adjuvant cholera toxin. Maintenance of the "cold chain" is also essential for the effectiveness of any vaccine and adjuvants/delivery systems that enhance the stability of a vaccine would offer a significant advantage. Needle-free methods of vaccination that induce protective immunity at multiple mucosal surfaces are also desirable for rapid vaccination of large populations. In the present study we show that transcutaneous immunization (TCI) using Lipid C, a novel lipid-based matrix originally developed for oral immunization, containing soluble Helicobacter sonicate significantly reduces the gastric bacterial burden in mice following gastric challenge with live Helicobacter pylori. Protection is associated with the production of splenic gamma interferon and gastric IgA and was achieved without the co-administration of potent and potentially toxic adjuvants, although protection was further enhanced by inclusion of CpG-ODN and cholera toxin in the lipid delivery system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Improvised explosive devices have become the characteristic weapon of conflicts in Iraq and Afghanistan. While little can be done to mitigate against the effects of blast in free-field explosions, scaled blast simulations have shown that the combat boot can attenuate the effects on the vehicle occupants of anti-vehicular mine blasts. Although the combat boot offers some protection to the lower limb, its behaviour at the energies seen in anti-vehicular mine blast has not been documented previously. Methods The sole of eight same-size combat boots from two brands currently used by UK troops deployed to Iraq and Afghanistan were impacted at energies of up to 518 J, using a spring-assisted drop rig. Results The results showed that the Meindl Desert Fox combat boot consistently experienced a lower peak force at lower impact energies and a longer time-to-peak force at higher impact energies when compared with the Lowa Desert Fox combat boot. Discussion This reduction in the peak force and extended rise time, resulting in a lower energy transfer rate, is a potentially positive mitigating effect in terms of the trauma experienced by the lower limb. Conclusion Currently, combat boots are tested under impact at the energies seen during heel strike in running. Through the identification of significantly different behaviours at high loading, this study has shown that there is rationale in adding the performance of combat boots under impact at energies above those set out in international standards to the list of criteria for the selection of a combat boot.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Women with a disability continue to experience social oppression and domestic violence as a consequence of gender and disability dimensions. Current explanations of domestic violence and disability inadequately explain several features that lead women who have a disability to experience violent situations. This article incorporates both disability and material feminist theory as an alternative explanation to the dominant approaches (psychological and sociological traditions) of conceptualising domestic violence. This paper is informed by a study which was concerned with examining the nature and perceptions of violence against women with a physical impairment. The emerging analytical framework integrating material feminist interpretations and disability theory provided a basis for exploring gender and disability dimensions. Insight was also provided by the women who identified as having a disability in the study and who explained domestic violence in terms of a gendered and disabling experience. The article argues that material feminist interpretations and disability theory, with their emphasis on gender relations, disablism and poverty, should be used as an alternative tool for exploring the nature and consequences of violence against women with a disability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Zoonotic schistosomiasis japonica is a major public health problem in China. Bovines, particularly water buffaloes, are thought to play a major role in the transmission of schistosomiasis to humans in China. Preliminary results (1998–2003) of a praziquantel (PZQ)-based pilot intervention study we undertook provided proof of principle that water buffaloes are major reservoir hosts for S. japonicum in the Poyang Lake region, Jiangxi Province. Methods and Findings Here we present the results of a cluster-randomised intervention trial (2004–2007) undertaken in Hunan and Jiangxi Provinces, with increased power and more general applicability to the lake and marshlands regions of southern China. The trial involved four matched pairs of villages with one village within each pair randomly selected as a control (human PZQ treatment only), leaving the other as the intervention (human and bovine PZQ treatment). A sentinel cohort of people to be monitored for new infections for the duration of the study was selected from each village. Results showed that combined human and bovine chemotherapy with PZQ had a greater effect on human incidence than human PZQ treatment alone. Conclusions The results from this study, supported by previous experimental evidence, confirms that bovines are the major reservoir host of human schistosomiasis in the lake and marshland regions of southern China, and reinforce the rationale for the development and deployment of a transmission blocking anti-S. japonicum vaccine targeting bovines.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia has had many inquiries into teaching and teacher education over the last decade. Standards for teaching have been produced by national education systems with many state systems following suit. The Queensland College of Teachers (QCT) advocates ten professional teaching standards for teachers and preservice teachers. How can preservice teachers be measured against advocated professional standards? This study investigated 106 second-year preservice teachers’ perceptions of their development against the QCT standards. A pretest-posttest survey instrument was developed based on the QCT standards and administered to these preservice teachers before and after their science education coursework. Percentages, ANOVAs and t-tests were generated to analyse the results. Findings indicated that 22 of the 24 paired pretest-posttest items were highly significant (p<.001). Percentage increases ranged from as low as 27% in the pretest to as high as 97% in the posttest, yet, there were two items with lower significance (i.e., working in professional science education teams and supporting students’ participation in society). Understanding preservice teachers’ perceptions of their abilities to implement these standards may be a step towards the process of determining the achievement of teaching standards; however, more rigorous measurements will need to be developed for both teachers and preservice teachers. University coursework and related assessments can provide an indication of achieving these standards, especially authentic assessment of preservice teachers’ practices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Positive Buck- Boost (PBB) converter is a known DC-DC converter that can operate in step up and step down modes. Unlike Buck, Boost, and Inverting Buck Boost converters, the inductor current of a PBB can be controlled independently of its voltage conversion ratio. In other words, the inductor of PBB can be utilised as an energy storage unit in addition to its main function of energy transfer. In this paper, the capability of PBB to store energy has been utilised to achieve robustness against input voltage fluctuations and output current changes. The control strategy has been developed to keep accuracy, affordability, and simplicity acceptable. To improve the efficiency of the system a Smart Load Controller (SLC) has been suggested. Applying SLC extra current storage occurs when there is sudden loads change otherwise little extra current is stored.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this chapter is to discuss the relationship between crime and morality, with a specific focus on crimes against morality. While we argue that all crimes have a general moral basis, condemned as wrong or bad and proscribed by society, there is a specific group of offences in modern democratic nations labelled crimes against morality. Included within this group are offences related to prostitution, pornography and homosexuality. What do these crimes have in common? Most clearly they tend to have a sexual basis and are often argued to do sexual harm, in both a moral and /or psychological sense, as well as physically. Conversely they are often argued to be victimless crimes, especially when the acts occur between consenting adults. Finally they are considered essentially private acts but they often occur, and are regulated, in the public domain. Most importantly, each of these crimes against morality has only relatively recently (ie in the past 150 years) become identified and regulated by the state as a criminal offence.