50 resultados para WEB application


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The current `fixed-dosage strategy' approach to medicine, means there is much inter-individual variation in drug response. Pharmacogenetics is the study of how inter-individual variations in the DNA sequence of specific genes affect drug responses. This article will highlight current  pharmacogenetic knowledge on important drug metabolizing enzymes, drug transporters and drug targets to understand interindividual variability in drug clearance and responses in clinical practice and potential use in  personalized medicine. Polymorphisms in the cytochrome P450 (CYP) family may have had the most impact on the fate of pharmaceutical drugs. CYP2D6, CYP2C19 and CYP2C9 gene polymorphisms and gene duplications account for the most frequent variations in phase I metabolism of drugs since nearly 80% of drugs in use today are metabolised by these enzymes. Approximately 5% of Europeans and 1% of Asians lack CYP2D6 activity, and these  individuals are known as poor metabolizers. CYP2C9 is another clinically significant drug metabolising enzyme that demonstrates genetic variants. Studies into CYP2C9 polymorphism have highlighted the importance of the CYP2C9*2 and CYP2C9*3 alleles. Extensive polymorphism also occurs in a majority of Phase II drug metabolizing enzymes. One of the most important polymorphisms is thiopurine S-methyl transferases (TPMT) that catalyzes the S-methylation of thiopurine drugs. With respect to drug transport  polymorphism, the most extensively studied drug transporter is  P-glycoprotein (P-gp/MDR1), but the current data on the clinical impact is limited. Polymorphisms in drug transporters may change drug's distribution, excretion and response. Recent advances in molecular research have revealed many of the genes that encode drug targets demonstrate genetic polymorphism. These variations, in many cases, have altered the targets sensitivity to the specific drug molecule and thus have a profound effect on drug efficacy and toxicity. For example, the β2-adrenoreceptor, which is encoded by the ADRB2 gene, illustrates a clinically significant genetic variation in drug targets. The variable number tandem repeat polymorphisms in serotonin transporter (SERT/SLC6A4) gene are associated with response to antidepressants. The distribution of the common variant alleles of genes that encode drug metabolizing enzymes, drug transporters and drug targets has been found to vary among different populations. The promise of pharmacogenetics lies in its potential to identify the right drug at the right dose for the right individual. Drugs with a narrow therapeutic index are thought to benefit more from pharmacogenetic studies. For example, warfarin serves as a good practical example of how pharmacogenetics can be utilized prior to commencement of therapy in order to achieve maximum efficacy and minimum toxicity. As such, pharmacogenetics has the potential to achieve optimal quality use of medicines, and to improve the efficacy and safety of both prospective and licensed drugs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The emergence of Web 2.0 has brought about new Web applications being developed. Represented chiefly by Web applications such as YouTube, MySpace, blogs and Google applications, these community-based technologies are changing the way we use the Internet. One interesting result of these innovations is the extensibility of these applications. For example, YouTubepsilas content can be displayed on other Websites and hence, are popularly dasiaextendedpsila to be displayed on individual blogs and other organization Websites. In this paper, we discussed two applications that were a result of extending Google Earth and Google Maps. These two applications illustrate how new solutions can be quickly built from these extensible applications thus suggesting the future of application development, one that is built upon applications rather than object-oriented components.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The advent of the Internet and the World Wide Web has been instrumental in bringing about the growth in the implementation of web-based information systems (WBIS). Such systems are designed with the aim of improving productivity, data accuracy, and the reduction of paperwork and administrative overheads. Moreover, unlike their conventional non-web-based predecessors, the WBIS are commonly aimed at users who are casual and untrained, geographically distributed and non-homogenous. The dissemination of WBIS necessitates additional infrastructure support in the form of a security system, workflow and transaction management, and web administration. WBIS are commonly developed using an evolutionary approach, whereby the version of the application, acquired from the vendor, is first deployed as a pilot, in order to gather feedback from the target users before the evolutionary cycles commence. While a number of web development methodologies have been proposed by existing research, there is a dearth of empirical evidence that elucidates the experiences of project initiators in pursuing the evolution of web services, a process that undoubtedly involves dealing with stakeholder issues. This research project presents a phenomenological investigation of the experiences of project managers with the implementation of web-based employee service systems (ESS), a domain that has witnessed a sharp growth in Australia in recent times. However, the project managers’ rich, multidimensional account of their experiences with the implementation of ESS revealed the social obstacles and fragility of intra-organizational relationships that demanded a cautious and tactful approach. Thus, the study provides a socio-organizational perspective to web projects in contrast to the functionalist paradigm of current web development methodologies. The research also confirms that consideration of the concerns of stakeholders by project managers is crucial to the successive cycles of ESS evolution. Project managers address stakeholder concerns by pursuing actions that are aimed at encouraging ESS usage, but at the same time, such actions can have consequences necessitating subsequent iterations of system enhancement and improvement. Finally, the research also discovered that despite the different socio-political climate prevalent in various organizations, in which ESS are being implemented, the experiences of project managers in dealing with stakeholder concerns can be captured and independently confirmed in terms of their perceived relevance and usefulness in problem-solving within the application domain.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Self-Assembly Monolayer (SAM) technique, as a novel and developing technique for fabricating layer-by-layer nanofilm on substrates of various sizes, shapes and materials, has received more and more attention in the areas of light-emitting devices, nonlinear optical materials, conductive films, permselective gas membranes, sensors, modification of electrodes, resistance and printing technique. In comparison with other traditional methods, SAM technique has many significant advantages, including simple process, universality, formation with densely packed, well defined, highly ordered surfaces. This paper will give a review on the recent development in SAM technique.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper reports on some physical properties of a conducting polymer, polypyrrole, coated textiles. Polypyrrole was coated on textiles chemically through in-situ solution or vapor polymerisation to produce conducting textiles. The effects of the conductive coating on the physical and mechanical properties of the fibrous materials are presented. The coating durability and conductivity of the textiles have also been examined.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Here we investigate the use of fuzzy measures and averaging aggregation functions for understanding the behavior and tendencies of decision-makers in an ordinal classification problem. Using the Aotools package to approximate the data, we classify each journal based on aggregation of the ISI Web of knowledge indices and discuss the results.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the past decade the massive growth of the Internet brought huge changes in the way humans live their daily life; however, the biggest concern with rapid growth of digital information is how to efficiently manage and filter unwanted data. In this paper, we propose a method for managing RSS feeds from various news websites. A Web service was developed to provide filtered news items extracted from RSS feeds and these were categorized based on classical text categorization algorithms. A client application consuming this Web service retrieves and displays such filtered information. A prototype was implemented using Rapidminer 4.3 as a data mining tool and SVM as a classification algorithm. Experimental results suggest that the proposed method is effective and saves a significant amount of user processing time.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when suchattacks mimic or occur during the flash crowd event of a popular Website. In this paper, we present the design and implementation of CALD, an architectural extension to protect Web servers against various DDoS attacks that masquerade as flash crowds. CALD provides real-time detection using mess tests but is different from other systems that use resembling methods. First, CALD uses a front-end sensor to monitor thetraffic that may contain various DDoS attacks or flash crowds. Intense pulse in the traffic means possible existence of anomalies because this is the basic property of DDoS attacks and flash crowds. Once abnormal traffic is identified, the sensor sends ATTENTION signal to activate the attack detection module. Second, CALD dynamically records the average frequency of each source IP and check the total mess extent. Theoretically, the mess extent of DDoS attacks is larger than the one of flash crowds. Thus, with some parameters from the attack detection module, the filter is capable of letting the legitimate requests through but the attack traffic stopped. Third, CALD may divide the security modules away from the Web servers. As a result, it keeps maximum performance on the kernel web services, regardless of the harassment from DDoS. In the experiments, the records from www.sina.com and www.taobao.com have proved the value of CALD.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the significant growth of botnets, application layer DDoS attacks are much easier to launch using large botnet, and false negative is always a problem for intrusion detection systems in real practice. In this paper, we propose a novel application layer DDoS attack tool, which mimics human browsing behavior following three statistical distributions, the Zipf-like distribution for web page popularity, the Pareto distribution for page request time interval for an individual browser, and the inverse Gaussian distribution for length of browsing path. A Markov model is established for individual bot to generate attack request traffic. Our experiments indicated that the attack traffic that generated by the proposed tool is pretty similar to the real traffic. As a result, the current statistics based detection algorithms will result high false negative rate in general. In order to counter this kind of attacks, we discussed a few preliminary solutions at the end of this paper.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The use of a web Health Portal can be employed not only for reducing health costs but also to view patient's latest medical information (e.g. clinical tests, pathology and radiology results, discharge summaries, prescription renewals, referrals, appointments) in real-time and carry out physician messaging to enhance the information exchanged, managed and shared in the Australian healthcare sector. The Health Portal connects all stakeholders (such as patients and their families, health professionals, care providers, and health regulators) to establish coordination, collaboration and a shared care approach between them to improve overall patient care safety. The paper outlines a Health Portal model for designing a real-time health prevention system. An application of the architecture is described in the area of web Health Portal.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

One of the results of the surge in interest in the internet is the great increase in availability of pictorial and video data. Web browsers such as Netscape give access to an enormous range of such data. In order to make use of large amounts of pictorial and video data, it is necessary to develop indexing and retrieval methods. Pictorial databases have made great progress recently, to the extent that there are now a number of commercially available products. Video databases are now being researched and developed from a number of different viewpoints. Given a general indexing scheme for video, the next step is to reuse clips in further applications. In this paper we present an initial application for the reuse of video clips. The aim of the system is to resequence video clips for a particular application. We have chosen a well-constrained application for this purpose, the aim being to produce a video tour of a campus between designated start and destination points from a set of indexed video clips. We use clips of a guide entering and leaving buildings on our campus, and when visitors select a start location and a destination, the system will retrieve clips suitable for guiding the visitor along the correct path. The system uses an index of spatial relationships of key objects for the video clips to decide which clips provide the correct sequence of motion around the campus. Although the full power of the indexing notation is unnecessary for this simple problem, the results from this initial implementation indicate that the concept could be applicable to more complex problems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although tagging has become increasingly popular in online image and video sharing systems, tags are known to be noisy, ambiguous, incomplete and subjective. These factors can seriously affect the precision of a social tag-based web retrieval system. Therefore improving the precision performance of these social tag-based web retrieval systems has become an increasingly important research topic. To this end, we propose a shared subspace learning framework to leverage a secondary source to improve retrieval performance from a primary dataset. This is achieved by learning a shared subspace between the two sources under a joint Nonnegative Matrix Factorization in which the level of subspace sharing can be explicitly controlled. We derive an efficient algorithm for learning the factorization, analyze its complexity, and provide proof of convergence. We validate the framework on image and video retrieval tasks in which tags from the LabelMe dataset are used to improve image retrieval performance from a Flickr dataset and video retrieval performance from a YouTube dataset. This has implications for how to exploit and transfer knowledge from readily available auxiliary tagging resources to improve another social web retrieval system. Our shared subspace learning framework is applicable to a range of problems where one needs to exploit the strengths existing among multiple and heterogeneous datasets.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The initial development of the Internet and the World Wide Web was based upon the presentation of static information, this only allowed for the access and consumption of that information. The development of Web 2.0 has resulted in a situation where information is displayed in a dynamic manner and allows for interaction between the viewer and the site or application showing this information. The information may no longer just be text based but could be video, audio and information presented in an interactive manner though applications.

The terms terrorist or terrorism are highly emotive terms but the general term, terrorist, is used to denote revolutionaries who seek to use terror systematically to further their views or to govern a particular area. Terrorist organisations are reflective and adoptive, this paper focus on the impact of Web 2.0 and its potential use by terrorist organisations. The paper uses real life case studies to identify the key issues and possible trends.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This poster presents research-in-progress into the educational affordances of so-called Web 2.0 sites, services, with a particular emphasis on those applications that involve forms of shared human-machine cognition and that promote public knowledge networking. This research involves reviewing many hundreds of Web 2.0 tools and selecting approximately 50 for further analysis and exploration as learning applications. In doing so, the research will generate examples of unusual affordances provided by Web 2.0; it will also present a more structured categorisation of the kinds of uses and benefits of these tools. This approach is valuable because much current research and analysis of the impact of Web 2.0 on education, particularly higher education, has emphasised a relatively limited array of tools – principally blogs, wikis and social networking services – that offer educators and students opportunities for student-led collaborative work. Such opportunities involve strong emphasis on constructivist pedagogy: students’ interactions with each other, mediated via the Internet, are viewed as the positive benefit which networked learning can provide. However, Web 2.0 is far more than just collaboration, and associated shared self-expression. In particular, Web 2.0 includes many examples of services that take one form of input from a user and, rather than just sharing it with others, enable the transformation of that input into different forms, either as visualisations, maps, or other re-representations. Web 2.0 is also starting to see the development of knowledge-work engines that embody the concept of shared cognition, in which the service and the user cooperate in the production of some final knowledge output or which present to users knowledge that has already been processed more extensively than through simple searching. Web 2.0 is also closely associated with the idea that knowledge work is now networked and distributed; it involves users appropriating, creating and sharing knowledge products in a very public way, far beyond the narrow ‘audience’ of a particular course or program of study. The research presented in this poster will provide, firstly, examples of the Web 2.0 tools which emphasise these additional ways of exploiting the Internet for networked learning; secondly, the research will provide a first iteration of the overarching structure of categories and classifications which can be used to assess any proposed Web 2.0 application in terms of its affordances for learning as knowledge networking. By understanding these technologies, truly collaborative networked learning can be developed that blends with the emerging cultures of online behaviour increasingly common to contemporary student populations.