940 resultados para spa typing
Resumo:
The World Health Organization recommends that the majority of water monitoring laboratories in the world should test for E. coli daily since thermotolerant coliforms and E. coli are key indicators for risk assessment of recreational waters. Recently, we developed a new SNP method for typing E. coli strains, by which human-specific genotypes were identified. Here, we report the presence of these previously described specific SNP profiles in environmental water, sourced from the Coomera River, located on South East Queensland, Australia, over a period of two years. This study tested for the presence of human-specific E. coli to ascertain whether hydrologic and anthropogenic activity plays a key role in the pollution of the investigated watershed or whether the pollution is from other sources. We found six human-specific SNP profiles and one animal-specific SNP profile consistently across sampling sites and times. We have demonstrated that our SNP genotyping method is able to rapidly identify and characterise human- and animal-specific E. coli isolates in water sources.
Resumo:
This paper presents a comprehensive study to find the most efficient bitrate requirement to deliver mobile video that optimizes bandwidth, while at the same time maintains good user viewing experience. In the study, forty participants were asked to choose the lowest quality video that would still provide for a comfortable and long-term viewing experience, knowing that higher video quality is more expensive and bandwidth intensive. This paper proposes the lowest pleasing bitrates and corresponding encoding parameters for five different content types: cartoon, movie, music, news and sports. It also explores how the lowest pleasing quality is influenced by content type, image resolution, bitrate, and user gender, prior viewing experience, and preference. In addition, it analyzes the trajectory of users’ progression while selecting the lowest pleasing quality. The findings reveal that the lowest bitrate requirement for a pleasing viewing experience is much higher than that of the lowest acceptable quality. Users’ criteria for the lowest pleasing video quality are related to the video’s content features, as well as its usage purpose and the user’s personal preferences. These findings can provide video providers guidance on what quality they should offer to please mobile users.
Resumo:
Staphylococci are important pathogenic bacteria responsible for a range of diseases in humans. The most frequently isolated microorganisms in a hospital microbiology laboratory are staphylococci. The general classification of staphylococci divides them into two major groups; Coagulase-positive staphylococci (e.g. Staphylococcus aureus) and Coagulase-negative staphylococci (e.g. Staphylococcus epidermidis). Coagulase-negative staphylococcal (CoNS) isolates include a variety of species and many different strains but are often dominated by the most important organism of this group, S. epidermidis. Currently, these organisms are regarded as important pathogenic organisms causing infections related to prosthetic materials and surgical wounds. A significant number of S. epidermidis isolates are also resistant to different antimicrobial agents. Virulence factors in CoNS are not very clearly established and not well documented. S. epidermidis is evolving as a resistant and powerful microbe related to nosocomial infections because it has different properties which independently, and in combination, make it a successful infectious agent, especially in the hospital environment. Such characteristics include biofilm formation, drug resistance and the evolution of genetic variables. The purpose of this project was to develop a novel SNP genotyping method to genotype S. epidermidis strains originating from hospital patients and healthy individuals. High-Resolution Melt Analysis was used to assign binary typing profiles to both clinical and commensal strains using a new bioinformatics approach. The presence of antibiotic resistance genes and biofilm coding genes were also interrogated in these isolates.
Resumo:
The automated extraction of roads from aerial imagery can be of value for tasks including mapping, surveillance and change detection. Unfortunately, there are no public databases or standard evaluation protocols for evaluating these techniques. Many techniques are further hindered by a reliance on manual initialisation, making large scale application of the techniques impractical. In this paper, we present a public database and evaluation protocol for the evaluation of road extraction algorithms, and propose an improved automatic seed finding technique to initialise road extraction, based on a combination of geometric and colour features.
Resumo:
Thermal-infrared images have superior statistical properties compared with visible-spectrum images in many low-light or no-light scenarios. However, a detailed understanding of feature detector performance in the thermal modality lags behind that of the visible modality. To address this, the first comprehensive study on feature detector performance on thermal-infrared images is conducted. A dataset is presented which explores a total of ten different environments with a range of statistical properties. An investigation is conducted into the effects of several digital and physical image transformations on detector repeatability in these environments. The effect of non-uniformity noise, unique to the thermal modality, is analyzed. The accumulation of sensor non-uniformities beyond the minimum possible level was found to have only a small negative effect. A limiting of feature counts was found to improve the repeatability performance of several detectors. Most other image transformations had predictable effects on feature stability. The best-performing detector varied considerably depending on the nature of the scene and the test.
Resumo:
Interaction with a mobile device remains difficult due to inherent physical limitations. This dif-ficulty is particularly evident for search, which re-quires typing. We extend the One-Search-Only search paradigm by adding a novel link-browsing scheme built on top of automatic link discovery. A prototype was built for iPhone and tested with 12 subjects. A post-use interview survey suggests that the extended paradigm improves the mobile information seeking experience.
Resumo:
If contemporary artworks are often considered to be puzzles or riddles, then Wilkins Hill take this to a new level. Their recent exhibition Windows impersonating other windows, confronts viewers with an extremely ludic configuration: a spa bath full of almonds, towel racks placed before photos of Martin Heidegger distorted in neat grids, a video of a water tower in a Hamburg park, wooden cut-out speech bubbles and monitors that continuously play interviews with the artists themselves. What does it all mean?
Resumo:
Software as a Service (SaaS) is gaining more and more attention from software users and providers recently. This has raised many new challenges to SaaS providers in providing better SaaSes that suit everyone needs at minimum costs. One of the emerging approaches in tackling this challenge is by delivering the SaaS as a composite SaaS. Delivering it in such an approach has a number of benefits, including flexible offering of the SaaS functions and decreased cost of subscription for users. However, this approach also introduces new problems for SaaS resource management in a Cloud data centre. We present the problem of composite SaaS resource management in Cloud data centre, specifically on its initial placement and resource optimization problems aiming at improving the SaaS performance based on its execution time as well as minimizing the resource usage. Our approach differs from existing literature because it addresses the problems resulting from composite SaaS characteristics, where we focus on the SaaS requirements, constraints and interdependencies. The problems are tackled using evolutionary algorithms. Experimental results demonstrate the efficiency and the scalability of the proposed algorithms.
Novel molecular markers of Chlamydia pecorum genetic diversity in the koala (Phascolarctos cinereus)
Resumo:
Background Chlamydia pecorum is an obligate intracellular bacterium and the causative agent of reproductive and ocular disease in several animal hosts including koalas, sheep, cattle and goats. C. pecorum strains detected in koalas are genetically diverse, raising interesting questions about the origin and transmission of this species within koala hosts. While the ompA gene remains the most widely-used target in C. pecorum typing studies, it is generally recognised that surface protein encoding genes are not suited for phylogenetic analysis and it is becoming increasingly apparent that the ompA gene locus is not congruent with the phylogeny of the C. pecorum genome. Using the recently sequenced C. pecorum genome sequence (E58), we analysed 10 genes, including ompA, to evaluate the use of ompA as a molecular marker in the study of koala C. pecorum genetic diversity. Results Three genes (incA, ORF663, tarP) were found to contain sufficient nucleotide diversity and discriminatory power for detailed analysis and were used, with ompA, to genotype 24 C. pecorum PCR-positive koala samples from four populations. The most robust representation of the phylogeny of these samples was achieved through concatenation of all four gene sequences, enabling the recreation of a "true" phylogenetic signal. OmpA and incA were of limited value as fine-detailed genetic markers as they were unable to confer accurate phylogenetic distinctions between samples. On the other hand, the tarP and ORF663 genes were identified as useful "neutral" and "contingency" markers respectively, to represent the broad evolutionary history and intra-species genetic diversity of koala C. pecorum. Furthermore, the concatenation of ompA, incA and ORF663 sequences highlighted the monophyletic nature of koala C. pecorum infections by demonstrating a single evolutionary trajectory for koala hosts that is distinct from that seen in non-koala hosts. Conclusions While the continued use of ompA as a fine-detailed molecular marker for epidemiological analysis appears justified, the tarP and ORF663 genes also appear to be valuable markers of phylogenetic or biogeographic divisions at the C. pecorum intra-species level. This research has significant implications for future typing studies to understand the phylogeny, genetic diversity, and epidemiology of C. pecorum infections in the koala and other animal species.
Resumo:
Over the past few years, the Midwest ISO has experienced a surge in requests to interconnect large amounts of wind generation, driven largely by a favorable political environment and an abundant wind resource in the Midwestern US. This tremendous influx of proposed generators along with a highly constrained transmission system adversely impacted interconnection queue processing, resulting in an unmanageable backlog. Under these circumstances, Midwest ISO successfully reformed the interconnection tariff to improve cycle times and provide increased certainty to interconnection customers. One of the key features of the reformed queue process is the System Planning and Analysis (SPA) phase which allows integration of the interconnection studies with regional transmission planning. This paper presents a brief background of the queue reform effort and then delves deeply in to the work performed at the Midwest ISO during the first SPA cycle - the study approach, the challenges faced in having to study over 50,000 MWs of wind generation and the effective solutions designed to complete these studies within tariff timelines.
Resumo:
Objective The spondylarthritides (SpA), including ankylosing spondylitis (AS), psoriatic arthritis (PsA), reactive arthritis, and arthritis associated with inflammatory bowel disease, cause chronic inflammation of the large peripheral and axial joints, eyes, skin, ileum, and colon. Genetic studies reveal common candidate genes for AS, PsA, and Crohn's disease, including IL23R, IL12B, STAT3, and CARD9, all of which are associated with interleukin-23 (IL-23) signaling downstream of the dectin 1 β-glucan receptor. In autoimmune-prone SKG mice with mutated ZAP-70, which attenuates T cell receptor signaling and increases the autoreactivity of T cells in the peripheral repertoire, IL-17–dependent inflammatory arthritis developed after dectin 1–mediated fungal infection. This study was undertaken to determine whether SKG mice injected with 1,3-β-glucan (curdlan) develop evidence of SpA, and the relationship of innate and adaptive autoimmunity to this process. Methods SKG mice and control BALB/c mice were injected once with curdlan or mannan. Arthritis was scored weekly, and organs were assessed for pathologic features. Anti–IL-23 monoclonal antibodies were injected into curdlan-treated SKG mice. CD4+ T cells were transferred from curdlan-treated mice to SCID mice, and sera were analyzed for autoantibodies. Results After systemic injection of curdlan, SKG mice developed enthesitis, wrist, ankle, and sacroiliac joint arthritis, dactylitis, plantar fasciitis, vertebral inflammation, ileitis resembling Crohn's disease, and unilateral uveitis. Mannan triggered spondylitis and arthritis. Arthritis and spondylitis were T cell– and IL-23–dependent and were transferable to SCID recipients with CD4+ T cells. SpA was associated with collagen- and proteoglycan-specific autoantibodies. Conclusion Our findings indicate that the SKG ZAP-70W163C mutation predisposes BALB/c mice to SpA, resulting from innate and adaptive autoimmunity, after systemic β-glucan or mannan exposure.
Resumo:
A quick, easy and fun way of learning keyboarding!
Resumo:
In Australia, Vocational Education and Training (VET) programs are delivered in a variety of settings. You can be enrolled within a course in a high school, at a technical institution, private training provider or at your place of employment. Recognition of prior learning, on the job training and industry partnerships are strong factors supporting the change of delivery. The curriculum content within these programs has also changed. For example within the Business Services programs, the prerequisite and corequisite skill of touch keyboarding to an Australian Standard has moved from a core requirement in the 1990’s to an elective requirement in the 2000’s. Where a base skill becomes an elective skill, how does this effect the performance and outcomes for the learner, educator, employer and society as a whole? This paper will explore these issues and investigate the current position of standards within the VET curriculum today.
Resumo:
Touch keyboarding as a vocational skill is disappearing at a time when students and educators across alleducational sectors are expected to use a computer keyboard on a regular basis. there is documentation surrounding the embedding of Information and Communication Technology (ICT) within the curricula and yet within the National Training Packages touch keyboarding, previously considered a core component, is now an elective in the Business Services framework. This situation is an odds with current practice overseas where touch keyboarding is a component of primary and secondary curricula. From Rhetoric to Practice explores the current issues and practice in teaching and learning touch keyboarding in primary, secondary and tertiary institutions. Through structured interview participants detailed current practice of teachers and their students. Further, tertiary students participated in a training program aimed at achquiring touch keyboarding as a skill to enhance their studies. The researcher's background experience of fifteen years teaching touch keyboarding and computer literacty to adults and 30 years in Business Services trade provides a strong basis for this project. The teaching experience is enhanced by industry experience in administration, course coordination in technical, community and tertiary institutions and a strong commitment to the efficient usage of a computer by all. The findings of this project identified coursework expectations requiring all students from kindergarten to tertiary to use a computer keyboard on a weekly basis and that neither teaching nor learning tough keyboarding appears in the primary, secondary and tertiary curricula in New South Wales. Further, teachers recognised tough keyboarding as the prefered style over 'hunt and peck' keyboarding while acknowledging the teaching and learning difficulties of time constraints, the need for qualified touch keyboarding teachers and issues arising when retraining students from existing poor habits. In conclusion, this project recommends that computer keyboarding be defined as a writing tool for education, vocation and life, with early instruction set in primary schooling area and embedding touch keyboarding with the secondary, technical and tertiary areas and finally to draw the attention of educational authorities to the Duty Of Care aspects associated with computer keyboarding in the classroom.
Resumo:
Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial authorised user, a substitute user, or an intruder pretending to be a valid user. Therefore, a system that continuously checks the identity of the user throughout the session is necessary without being intrusive to end-user and/or effectively doing this. Such a system is called a continuous authentication system (CAS). Researchers have applied several approaches for CAS and most of these techniques are based on biometrics. These continuous biometric authentication systems (CBAS) are supplied by user traits and characteristics. One of the main types of biometric is keystroke dynamics which has been widely tried and accepted for providing continuous user authentication. Keystroke dynamics is appealing for many reasons. First, it is less obtrusive, since users will be typing on the computer keyboard anyway. Second, it does not require extra hardware. Finally, keystroke dynamics will be available after the authentication step at the start of the computer session. Currently, there is insufficient research in the CBAS with keystroke dynamics field. To date, most of the existing schemes ignore the continuous authentication scenarios which might affect their practicality in different real world applications. Also, the contemporary CBAS with keystroke dynamics approaches use characters sequences as features that are representative of user typing behavior but their selected features criteria do not guarantee features with strong statistical significance which may cause less accurate statistical user-representation. Furthermore, their selected features do not inherently incorporate user typing behavior. Finally, the existing CBAS that are based on keystroke dynamics are typically dependent on pre-defined user-typing models for continuous authentication. This dependency restricts the systems to authenticate only known users whose typing samples are modelled. This research addresses the previous limitations associated with the existing CBAS schemes by developing a generic model to better identify and understand the characteristics and requirements of each type of CBAS and continuous authentication scenario. Also, the research proposes four statistical-based feature selection techniques that have highest statistical significance and encompasses different user typing behaviors which represent user typing patterns effectively. Finally, the research proposes the user-independent threshold approach that is able to authenticate a user accurately without needing any predefined user typing model a-priori. Also, we enhance the technique to detect the impostor or intruder who may take over during the entire computer session.