66 resultados para vänd-punkter

em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast


Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: In vitro release testing of vaginal formulations is usually performed in a one-compartment model (OCM) where the release medium, usually comprising pH-adjusted water, an aqueous surfactant solution or a solvent-water solution, provides sink conditions throughout the release experiment. Although this model is useful in evaluating the effect of formulation parameters upon release, it rarely reflects in vivo conditions. Here we report use of a two-compartment diffusion cell model (TCM, comprising a small volume donor, a large volume receptor, and separated by a model epithelial membrane) to more closely mimic in vivo vaginal release and tissue absorption following administration of a UC781 vaginal ring.

METHODS: Macaque-sized matrix silicone elastomer vaginal rings containing 100mg UC781 were prepared by injection molding, and in vitro release testing performed using both OCM (20mL simulated vaginal fluid, SVF) and TCM (5mL SVF in donor cell and variable quantities of Tween 80; silicone elastomer membrane; 100mL 3:2 ethanol/water in receptor cell). In the TCM, drug levels were measured by HPLC in both donor and receptor cells, representing fluid and tissue levels respectively. Rings containing 100mg UC781 and 10% w/w Tween 80 were also manufactured and tested.

RESULTS: The amount of UC781 released from rings was significantly influenced by the choice of release model. Greatest release (56mg/14 days) was measured in the ethanol/water OCM, compared with no measurable release into SVF only. Increasing the concentration of Tween 80 in the SVF medium (1, 3 and 5% w/w) led to increased UC781 release (11, 16 and 18mg, respectively), demonstrating that vaginal fluid solubility of UC781 may be rate-determining in vivo. In the TCM, UC781 accumulates in the receptor cell medium over time, despite not being measured in the donor medium containing the ring device. Incorporation of Tween 80 directly into the ring provided enhanced release in both donor and receptor cells.

CONCLUSIONS: Release of UC781 was influenced by the choice of release medium and the inclusion of Tween 80 in the ring. Although use of SVF-only in the OCM indicated no measurable UC781 release from rings, data from the TCM confirms that UC781 is not only released but is also capable of penetrating across the model epithelial membrane. The TCM may therefore provide a more representative in vitro release model for mimicking in vivo absorption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A single layer, frequency selective surface based, sub-millimeter wave transmission polarizer is presented that converts incident slant linear 45° polarization into circular polarization upon transmission. The polarization convertor consists of a 30 mm diameter 10 thick silicon reinforced metalized screen containing 2700 resonator cells and perforated with nested split ring slot apertures. The screen was designed and optimized using CST Microwave Studio and predictions were validated experimentally by transmission measurements over the 250-365 GHz frequency range. This frequency range is used for remote environmental monitoring and 325 GHz represents a molecular emission line for H2O. The results obtained show good agreement between measured and modeled predictions. The measured 3 dB axial ratio bandwidth was 11.75%, measured minimum Axial Ratio was 0.19 dB and the measured insertion loss of the single layer screen was 3.38 dB

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the signing of the Northern Ireland peace agreement a plethora of community based prisoner self-help organisations have been established wherein former prisoners staff, manage and deliver services to colleagues. By forging and maintaining their collective identities through community based mutual aid, members of these self-help organisations have progressed to create not only individual change/assistance but have also developed and evolved to tackle serious wider social issues which impact on the members of their organisations. This article critically analyses how the conditions of a post conflict society can influence both the development and evolution of these organisations and also how members situate their claims about the self in the organisation and beyond. Using the social movement framework it is argued that the work of these self-help organisations have given rise to a new politics of identity … that is the ‘politically motivated’ ex-prisoner. ©2013 Taylor & Francis

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ancillary (non-sounding) body movements made by expert musicians during performance have been shown to indicate expressive, emotional, and structural features of the music to observers, even if the sound of the performance is absent. If such ancillary body movements are a component of skilled musical performance, then it should follow that acquiring the temporal control of such movements is a feature of musical skill acquisition. This proposition is tested using measures derived from a theory of temporal guidance of movement, “General Tau Theory” (Lee in Ecol Psychol 10:221–250, 1998; Lee et al. in Exp Brain Res 139:151–159, 2001), to compare movements made during performances of intermediate-level clarinetists before and after learning a new piece of music. Results indicate that the temporal control of ancillary body movements made by participants was stronger in performances after the music had been learned and was closer to the measures of temporal control found for an expert musician’s movements. These findings provide evidence that the temporal control of musicians’ ancillary body movements develops with musical learning. These results have implications for other skillful behaviors and nonverbal communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more detail at these lower layers than their wired counterparts as they face unique challenges. The remainder of this chapter will investigate three of these challenges where WiFi deviates significantly from that of wired counterparts:

• Attacks Specific to WiFi Networks: Outlining the additional threats which WIDS must account for: Denial of Service, Encryption Bypass and AP Masquerading attacks.

• The Effect of Deployment Architecture on WIDS Performance: Demonstrating that the deployment environment of a network protected by a WIDS can influence the prioritisation of attacks.

• The Importance of Live Data in WiFi Research: Investigating the different choices for research data sources with an emphasis on encouraging live network data collection for future WiFi research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The IDS (Intrusion Detection System) is a common means of protecting networked systems from attack or malicious misuse. The development and rollout of an IDS can take many different forms in terms of equipment, protocols, connectivity, cost and automation. This is particularly true of WIDS (Wireless Intrusion Detection Systems) which have many more opportunities and challenges associated with data transmission through an open, shared medium.
The operation of a WIDS is a multistep process from origination of an attack through to human readable evaluation. Attention to the performance of each of the processes in the chain from attack detection to evaluation is imperative if an optimum solution is to be sought. At present, research focuses very much on each discrete aspect of a WIDS with little consideration to the operation of the whole system. Taking a holistic view of the technology shows the interconnectivity and inter-dependence between stages, leading to improvements and novel research areas for investigation.
This chapter will outline the general structure of Wireless Intrusion Detection Systems and briefly describe the functions of each development stage, categorised into the following 6 areas:
• Threat Identification,
• Architecture,
• Data Collection,
• Intrusion Detection,
• Alert Correlation,
• Evaluation.
These topics will be considered in broad terms designed for those new to the area. Focus will be placed on ensuring the readers are aware of the impact of choices made at early stages in WIDS development on future stages.