33 resultados para Defining surveillance
em University of Queensland eSpace - Australia
Resumo:
Objective:To investigate the effects of bilateral, surgically induced functional inhibition of the subthalamic nucleus (STN) on general language, high level linguistic abilities, and semantic processing skills in a group of patients with Parkinson’s disease. Methods:Comprehensive linguistic profiles were obtained up to one month before and three months after bilateral implantation of electrodes in the STN during active deep brain stimulation (DBS) in five subjects with Parkinson’s disease (mean age, 63.2 years). Equivalent linguistic profiles were generated over a three month period for a non-surgical control cohort of 16 subjects with Parkinson’s disease (NSPD) (mean age, 64.4 years). Education and disease duration were similar in the two groups. Initial assessment and three month follow up performance profiles were compared within subjects by paired t tests. Reliability change indices (RCI), representing clinically significant alterations in performance over time, were calculated for each of the assessment scores achieved by the five STN-DBS cases and the 16 NSPD controls, relative to performance variability within a group of 16 non-neurologically impaired adults (mean age, 61.9 years). Proportions of reliable change were then compared between the STN-DBS and NSPD groups. Results:Paired comparisons within the STN-DBS group showed prolonged postoperative semantic processing reaction times for a range of word types coded for meanings and meaning relatedness. Case by case analyses of reliable change across language assessments and groups revealed differences in proportions of change over time within the STN-DBS and NSPD groups in the domains of high level linguistics and semantic processing. Specifically, when compared with the NSPD group, the STN-DBS group showed a proportionally significant (p
Resumo:
A minimal defining set of a Steiner triple system on a points (STS(v)) is a partial Steiner triple system contained in only this STS(v), and such that any of its proper subsets is contained in at least two distinct STS(v)s. We consider the standard doubling and tripling constructions for STS(2v + 1) and STS(3v) from STS(v) and show how minimal defining sets of an STS(v) gives rise to minimal defining sets in the larger systems. We use this to construct some new families of defining sets. For example, for Steiner triple systems on, 3" points; we construct minimal defining sets of volumes varying by as much as 7(n-/-).
Resumo:
The concept of the virtual organization (VO) has engendered great interest in the literature, yet there is still little common understanding of the concept, as evidenced by the multitude of labels applied to VOs. In this article, we focus on a “Weberian-ideal-type” definition of the interorganizational VO, posited in our earlier work (Kasper-Fuehrer and Ashkanasy 2001). We argue, however, that this definition left unanswered critical questions relating to the nature and effects of interorganizational VOs. We answer these questions here by explicating the terms in the definition and deriving ten corollaries, or “natural consequences” of our definition. The corollaries posit that interorganizational VOs are temporary in nature, are network organizations, are independent, and are based on swift trust. We suggest further that interorganizational VOs enable small to medium enterprises to exploit market opportunities, and enable VO member organizations to create a value-adding partnership. We also identify information and communication technology (ICT) as the essential enabler of VOs. Finally, we argue that interorganizational VOs act as a single organizational unit and that they therefore constitute a uniquely distinguishable organizational form. We conclude with suggestions for further research, including trust, organizational behavior, transaction economics, virtual HRM, and business strategy.
Resumo:
Natural tumor surveillance capabilities of the host were investigated in six different mouse tumor models where endogenous interleukin (IL)-12. does or does not dictate the efficiency of the innate immune response. Gene-targeted and lymphocyte subset-depleted mice were used to establish the relative importance of natural killer (NK) and NK1.1(+) T (NKT) cells in protection from tumor initiation and metastasis. In the models examined, CD3(-) NK cells were responsible for tumor rejection and protection from metastasis in models where control of major histocompatibility complex class I-deficient tumors was independent of IL-12, A protective role for NKT cells was only observed when tumor rejection required endogenous IL-12 activity. In particular, T cell receptor J alpha 281 gene-targeted mice confirmed a critical function for NKT cells in protection from spontaneous tumors initiated by the chemical carcinogen, methylcholanthrene. This is the first description of an antitumor function for NKT cells in the absence of exogenously administered potent stimulators such as IL-12 or alpha-galactosylceramide.
Resumo:
Immune surveillance by cytotoxic lymphocytes against cancer has been postulated for decades, but direct evidence for the role of cytotoxic lymphocytes in protecting against spontaneous malignancy has been lacking. As the rejection of many experimental cancers by cytotoxic T lymphocytes and natural killer cells is dependent on the pore-forming protein perforin (pfp), we examined pfp-deficient mice for increased cancer susceptibility. Here we show that pfp-deficient mice have a high incidence of malignancy in distinct lymphoid cell lineages (T, B, NKT), indicating a specific requirement for pfp in protection against lymphomagenesis. The susceptibility to lymphoma was accentuated by simultaneous lack of expression of the p53 gene, mutations in which also commonly predispose to human malignancies, including lymphoma. In contrast, the incidence and age of onset of sarcoma was unaffected in p53-deficient mice. Pfp-deficient mice were at least 1,000-fold more susceptible to these lymphomas when transplanted, compared with immunocompetent mice in which tumor rejection was controlled by CD8(+) T lymphocytes. This study is the first that implicates direct cytotoxicity by lymphocytes in regulating lymphomagenesis.
Resumo:
Few studies have demonstrated that innate lymphocytes play a major role in preventing spontaneous tumor formation. We evaluated the development of spontaneous tumors in mice lacking beta-2 microglobulin (beta2m; and thus MHC class I, CD1d, and CD16) and/or perform, since these tumor cells would be expected to activate innate effector cells. Approximately half the cohort of perform gene-targeted mice succumbed to spontaneous disseminated B cell lymphomas and in mice that also lacked beta2m, the lymphomas developed earlier (by more than 100 d) and with greater incidence (84%). B cell lymphomas from perforin/beta2m gene-targeted mice effectively primed cell-mediated cytotoxicity and perform, but not IFN-gamma, IL-12, or IL-18, was absolutely essential for tumor rejection. Activated NK1.1(+) and gammadeltaTCR(+) T cells were abundant at the tumor site, and transplanted tumors were strongly rejected by either, or both, of these cell types. Blockade of a number of different known costimulatory pathways failed to prevent tumor rejection. These results reflect a critical role for NK cells and gammadeltaTCP(+) T cells in innate immune surveillance of B cell lymphomas, mediated by as yet undetermined pathway(s) of tumor recognition.
Targeted! Population segmentation, electronic surveillance and governing the unemployed in Australia
Resumo:
Targeting is increasingly used to manage people. It operates by segmenting populations and providing different levels of opportunities and services to these groups. Each group is subject to different levels of surveillance and scrutiny. This article examines the deployment of targeting in Australian social security. Three case studies of targeting are presented in Australia's management of benefit overpayment and fraud, the distribution of employment services and the application of workfare. In conceptualizing surveillance as governance, the analysis examines the rationalities, technologies and practices that make targeting thinkable, practicable and achievable. In the case studies, targeting is variously conceptualized and justified by calculative risk discourses, moral discourses of obligation and notions of welfare dependency Advanced information technologies are also seen as particularly important in giving rise to the capacity to think about and act on population segments.