43 resultados para trail pheromone
em Queensland University of Technology - ePrints Archive
Resumo:
A travel article about food and landscape in Alberta. IN THE remote islands off Canada's east coast, I was given an old rule of survival: If you get lost in the forest, follow the bear tracks and eat what the bears eat, except skunk cabbage. There was no second rule for what to do about the bear, should he also appear. No matter. "Do this and you'll live," it says, "just as we did in the past."...
Resumo:
In tephritid fruit flies of the genus Bactrocera Macquart, a group of plant derived compounds (sensu amplo ‘male lures') enhance the mating success of males that have consumed them. For flies responding to the male lure methyl eugenol, this is due to the accumulation of chemicals derived from the male lure in the male rectal gland (site of pheromone synthesis) and the subsequent release of an attractive pheromone. Cuelure, raspberry ketone and zingerone are a second, related group of male lures to which many Bactrocera species respond. Raspberry ketone and cuelure are both known to accumulate in the rectal gland of males as raspberry ketone, but it is not known if the emitted male pheromone is subsequently altered in complexity or is more attractive to females. Using Bactrocera tryoni as our test insect, and cuelure and zingerone as our test chemicals, we assess: (i) lure accumulation in the rectal gland; (ii) if the lures are released exclusively in association with the male pheromone; and (iii) if the pheromone of lure-fed males is more attractive to females than the pheromone of lure-unfed males. As previously documented, we found cuelure was stored in its hydroxyl form of raspberry ketone, while zingerone was stored largely in an unaltered state. Small but consistent amounts of raspberry ketone and β-(4-hydroxy-3-methoxyphenyl)-propionic acid were also detected in zingerone-fed flies. Males released the ingested lures or their analogues, along with endogenous pheromone chemicals, only during the dusk courtship period. More females responded to squashed rectal glands extracted from flies fed on cuelure than to glands from control flies, while more females responded to the pheromone of calling cuelure-fed males than to control males. The response to zingerone treatments in both cases was not different from the control. The results show that male B. tryoni release ingested lures as part of their pheromone blend and, at least for cuelure, this attracts more females.
Resumo:
The specific mechanisms by which selective pressures affect individuals are often difficult to resolve. In tephritid fruit flies, males respond strongly and positively to certain plant derived chemicals. Sexual selection by female choice has been hypothesized as the mechanism driving this behaviour in certain species, as females preferentially mate with males that have fed on these chemicals. This hypothesis is, to date, based on studies of only very few species and its generality is largely untested. We tested the hypothesis on different spatial scales (small cage and seminatural field-cage) using the monophagous fruit fly, Bactrocera cacuminata. This species is known to respond to methyl eugenol (ME), a chemical found in many plant species and one upon which previous studies have focused. Contrary to expectation, no obvious female choice was apparent in selecting ME-fed males over unfed males as measured by the number of matings achieved over time, copulation duration, or time of copulation initiation. However, the number of matings achieved by ME-fed males was significantly greater than unfed males 16 and 32 days after exposure to ME in small cages (but not in a field-cage). This delayed advantage suggests that ME may not influence the pheromone system of B. cacuminata but may have other consequences, acting on some other fitness consequence (e.g., enhancement of physiology or survival) of male exposure to these chemicals. We discuss the ecological and evolutionary implications of our findings to explore alternate hypotheses to explain the patterns of response of dacine fruit flies to specific plant-derived chemicals.
Resumo:
Dr. Young-Ki Paik directs the Yonsei Proteome Research Center in Seoul, Korea and was elected as the President of the Human Proteome Organization (HUPO) in 2009. In the December 2009 issue of the Current Pharmacogenomics and Personalized Medicine (CPPM), Dr. Paik explains the new field of pharmacoproteomics and the approaching wave of “proteomics diagnostics” in relation to personalized medicine, HUPO’s role in advancing proteomics technology applications, the HUPO Proteomics Standards Initiative, and the future impact of proteomics on medicine, science, and society. Additionally, he comments that (1) there is a need for launching a Gene-Centric Human Proteome Project (GCHPP) through which all representative proteins encoded by the genes can be identified and quantified in a specific cell and tissue and, (2) that the innovation frameworks within the diagnostics industry hitherto borrowed from the genetics age may require reevaluation in the case of proteomics, in order to facilitate the uptake of pharmacoproteomics innovations. He stresses the importance of biological/clinical plausibility driving the evolution of biotechnologies such as proteomics,instead of an isolated singular focus on the technology per se. Dr. Paik earned his Ph.D. in biochemistry from the University of Missouri-Columbia and carried out postdoctoral work at the Gladstone Foundation Laboratories of Cardiovascular Disease, University of California at San Francisco. In 2005, his research team at Yonsei University first identified and characterized the chemical structure of C. elegans dauer pheromone (daumone) which controls the aging process of this nematode. He is interviewed by a multidisciplinary team specializing in knowledge translation, technology regulation, health systems governance, and innovation analysis.
Resumo:
This thesis investigates the problem of robot navigation using only landmark bearings. The proposed system allows a robot to move to a ground target location specified by the sensor values observed at this ground target posi- tion. The control actions are computed based on the difference between the current landmark bearings and the target landmark bearings. No Cartesian coordinates with respect to the ground are computed by the control system. The robot navigates using solely information from the bearing sensor space. Most existing robot navigation systems require a ground frame (2D Cartesian coordinate system) in order to navigate from a ground point A to a ground point B. The commonly used sensors such as laser range scanner, sonar, infrared, and vision do not directly provide the 2D ground coordi- nates of the robot. The existing systems use the sensor measurements to localise the robot with respect to a map, a set of 2D coordinates of the objects of interest. It is more natural to navigate between the points in the sensor space corresponding to A and B without requiring the Cartesian map and the localisation process. Research on animals has revealed how insects are able to exploit very limited computational and memory resources to successfully navigate to a desired destination without computing Cartesian positions. For example, a honeybee balances the left and right optical flows to navigate in a nar- row corridor. Unlike many other ants, Cataglyphis bicolor does not secrete pheromone trails in order to find its way home but instead uses the sun as a compass to keep track of its home direction vector. The home vector can be inaccurate, so the ant also uses landmark recognition. More precisely, it takes snapshots and compass headings of some landmarks. To return home, the ant tries to line up the landmarks exactly as they were before it started wandering. This thesis introduces a navigation method based on reflex actions in sensor space. The sensor vector is made of the bearings of some landmarks, and the reflex action is a gradient descent with respect to the distance in sensor space between the current sensor vector and the target sensor vec- tor. Our theoretical analysis shows that except for some fully characterized pathological cases, any point is reachable from any other point by reflex action in the bearing sensor space provided the environment contains three landmarks and is free of obstacles. The trajectories of a robot using reflex navigation, like other image- based visual control strategies, do not correspond necessarily to the shortest paths on the ground, because the sensor error is minimized, not the moving distance on the ground. However, we show that the use of a sequence of waypoints in sensor space can address this problem. In order to identify relevant waypoints, we train a Self Organising Map (SOM) from a set of observations uniformly distributed with respect to the ground. This SOM provides a sense of location to the robot, and allows a form of path planning in sensor space. The navigation proposed system is analysed theoretically, and evaluated both in simulation and with experiments on a real robot.
Resumo:
Investigated the psychometric properties of the original and alternate sets of the Trail Making Test (TMT) and the Controlled Oral Word Association Test (COWAT; A. L. Benton and D. Hamsher, 1978) in 50 orthopedic and 15 closed head injured (1 yr after trauma) patients (aged 15–59 yrs). Although the alternate forms of both measures proved to be stable and consistent with each other in both groups, only the parallel sets of TMT reliably discriminated the clinical group from controls. Practice effects in the head injured were significant only for Trail B of TMT. Factor analysis of the control group's results identified Verbal Knowledge as a major contributor to performance on COWAT, whereas TMT was more dependent on Rapid Visual Search and Visuomotor Sequencing.
Resumo:
Aims: This study investigated the effect of simulated visual impairment on the speed and accuracy of performance on a series of commonly used cognitive tests. ----- Methods: Cognitive performance was assessed for 30 young, visually normal subjects (M=22.0yrs ± 3.1 yrs) using the Digit Symbol Substitution Test (DSST), Trail Making Test (TMT) A and B and the Stroop Colour Word Test under three visual conditions: normal vision and two levels of visually degrading filters (VistechTM) administered in a random order. Distance visual acuity and contrast sensitivity were also assessed for each filter condition. ----- Results: The visual filters, which degraded contrast sensitivity to a greater extent than visual acuity, significantly increased the time to complete (p<0.05), but not the number of errors made, on the DSST and the TMT A and B and affected only some components of the Stroop test.----- Conclusions: Reduced contrast sensitivity had a marked effect on the speed but not the accuracy of performance on commonly used cognitive tests, even in young individuals; the implications of these findings are discussed.
Resumo:
There is considerable evidence that working memory impairment is a common feature of schizophrenia. The present study assessed working memory and executive function in 54 participants with schizophrenia, and a group of 54 normal controls matched to the patients on age, gender and estimated premorbid IQ, using traditional and newer measures of executive function and two dual tasks—Telephone Search with Counting and the Memory Span and Tracking Task. Results indicated that participants with schizophrenia were significantly impaired on all standardised measures of executive function with the exception of a composite measure of the Trail Making Test. Results for the dual task measures demonstrated that while the participants with schizophrenia were unimpaired on immediate digit span recall over a 2-min period, they recalled fewer digit strings and performed more poorly on a tracking task (box-crossing task) compared with controls. In addition, participants with schizophrenia performed more poorly on the tracking task when they were required to simultaneously recall digits strings than when they performed this task alone. Contrary to expectation, results of the telephone search task under dual conditions were not significantly different between groups. These results may reflect the insufficient complexity of the tone-counting task as an interference task. Overall, the present study showed that participants with schizophrenia appear to have a restricted impairment of their working memory system that is evident in tasks in which the visuospatial sketchpad slave system requires central executive control.
Resumo:
Researching administrative history is problematical. A trail of authoritative documents is often hard to find; and useful summaries can be difficult to organise, especially if source material is in paper formats in geographically dispersed locations. In the absence of documents, the reasons for particular decisions and the rationale underpinning particular policies can be confounded as key personnel advance in their professions and retire. The rationale for past decisions may be lost for practical purposes; and if an organisation’s memory of events is diminished, its learning through experience is also diminished. Publishing this document tries to avoid unnecessary duplication of effort by other researchers that need to venture into how policies of charging for public sector information have been justified. The author compiled this work within a somewhat limited time period and the work does not pretend to be a complete or comprehensive analysis of the issues.----- A significant part of the role of government is to provide a framework of legally-enforceable rights and obligations that can support individuals and non-government organisations in their lawful activities. Accordingly, claims that governments should be more ‘business-like’ need careful scrutiny. A significant supply of goods and services occurs as non-market activity where neither benefits nor costs are quantified within conventional accounting systems or in terms of money. Where a government decides to provide information as a service; and information from land registries is archetypical, the transactions occur as a political decision made under a direct or a clearly delegated authority of a parliament with the requisite constitutional powers. This is not a market transaction and the language of the market confuses attempts to describe a number of aspects of how governments allocate resources.----- Cost recovery can be construed as an aspect of taxation that is a sole prerogative of a parliament. The issues are fundamental to political constitutions; but they become more complicated where states cede some taxing powers to a central government as part of a federal system. Nor should the absence of markets be construed necessarily as ‘market failure’ or even ‘government failure’. The absence is often attributable to particular technical, economic and political constraints that preclude the operation of markets. Arguably, greater care is needed in distinguishing between the polity and markets in raising revenues and allocating resources; and that needs to start by removing unhelpful references to ‘business’ in the context of government decision-making.
Resumo:
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Resumo:
The previous investigations have shown that the modal strain energy correlation method, MSEC, could successfully identify the damage of truss bridge structures. However, it has to incorporate the sensitivity matrix to estimate damage and is not reliable in certain damage detection cases. This paper presents an improved MSEC method where the prediction of modal strain energy change vector is differently obtained by running the eigensolutions on-line in optimisation iterations. The particular trail damage treatment group maximising the fitness function close to unity is identified as the detected damage location. This improvement is then compared with the original MSEC method along with other typical correlation-based methods on the finite element model of a simple truss bridge. The contributions to damage detection accuracy of each considered mode is also weighed and discussed. The iterative searching process is operated by using genetic algorithm. The results demonstrate that the improved MSEC method suffices the demand in detecting the damage of truss bridge structures, even when noised measurement is considered.
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.
Resumo:
The aim of this study was to explore the experience of mental health nurses undertaking doctoral studies. The study was conducted in Victoria, Australia. A descriptive exploratory approach to inquiry was used for this study. Participants were mental health nurses who had successfully completed a doctoral qualification. Eligibility for inclusion required participants to be residing in Victoria (irrespective of where their doctoral studies were undertaken) and to have conducted their research within the domain of mental health and/or currently employed in the field of mental health nursing. Of the 20 potential participants invited, 16 accepted the invitation. Five emergent themes were explicated from narrative analyses. These themes were being a trail blazer, positioning for professional advancement, achieving a balance between competing priorities, maintaining a commitment to the development of the profession, and a point of affirmation. An understanding of the experience of undertaking doctoral studies can be used to influence the development of strategies to encourage more mental health nurses to consider undertaking a doctoral degree.