961 resultados para Laboratory techniques
Resumo:
Current diagnostic methods for assessing the severity of articular cartilage degenerative conditions, such as osteoarthritis, are inadequate. There is also a lack of techniques that can be used for real-time evaluation of the tissue during surgery to inform treatment decision and eliminate subjectivity. This book, derived from Dr Afara’s doctoral research, presents a scientific framework that is based on near infrared (NIR) spectroscopy for facilitating the non-destructive evaluation of articular cartilage health relative to its structural, functional, and mechanical properties. This development is a component of the ongoing research on advanced endoscopic diagnostic techniques in the Articular Cartilage Biomechanics Research Laboratory of Professor Adekunle Oloyede at Queensland University of Technology (QUT), Brisbane Australia.
Resumo:
An optical system which performs the multiplication of binary numbers is described and proof-of-principle experiments are performed. The simultaneous generation of all partial products, optical regrouping of bit products, and optical carry look-ahead addition are novel features of the proposed scheme which takes advantage of the parallel operations capability of optical computers. The proposed processor uses liquid crystal light valves (LCLVs). By space-sharing the LCLVs one such system could function as an array of multipliers. Together with the optical carry look-ahead adders described, this would constitute an optical matrix-vector multiplier.
Resumo:
Queensland fruit fly, Bactrocera tryoni (Froggatt), is a polyphagous pest, and many citrus types are included among its hosts. While quantification of citrus host use by B. tryoni is lacking, citrus is generally considered a ‘low pressure’ crop. This paper investigates B. tryoni female oviposition preference and offspring performance in five citrus types; Murcott mandarin (Citrus reticulata), Navel orange and Valencia orange (Citrus sinensis), Eureka lemon (Citrus limon) and yellow grapefruit (Citrus paradisi). Oviposition preference was investigated in laboratory-based choice and no-choice experiments, while immature survival and offspring performance were investigated by infesting fruits in the laboratory and evaluating pupal recovery, pupal emergence and F1 fecundity. Fruit size, Brix level and peel toughness were also measured for correlation with host use. Bactrocera tryoni demonstrated an oviposition preference hierarchy among the citrus fruits tested; Murcott and grapefruit were most preferred for oviposition and lemon the least, while preference for Navel and Valencia was intermediate. Peel toughness was negatively correlated with B. tryoni oviposition preference, while no significant correlations were detected between oviposition and Brix level or fruit size. Immature survival in the tested fruit was very low. Murcott was the best host (21% pupal recovery), while all other citrus types that showed pupal recovery of 6% or lower and no pupae were recovered from Valencia orange. In pupae recovered from Navel orange and lemon, adult eclosion was greatly reduced, while in grapefruit and lemon, no eggs were recovered from F1 adults. Based on these laboratory results, many commercial citrus varieties appear to be poor hosts for B. tryoni and may pose a low post-harvest and quarantine risk. These findings need to be confirmed in the field, as they impact on both pre-harvest and post-harvest countermeasures.
Resumo:
Introduction: Undergraduate students studying the Bachelor of Radiation Therapy at Queensland University of Technology (QUT) attend clinical placements in a number of department sites across Queensland. To ensure that the curriculum prepares students for the most common treatments and current techniques in use in these departments, a curriculum matching exercise was performed. Methods: A cross-sectional census was performed on a pre-determined “Snapshot” date in 2012. This was undertaken by the clinical education staff in each department who used a standardized proforma to count the number of patients as well as prescription, equipment, and technique data for a list of tumour site categories. This information was combined into aggregate anonymized data. Results: All 12 Queensland radiation therapy clinical sites participated in the Snapshot data collection exercise to produce a comprehensive overview of clinical practice on the chosen day. A total of 59 different tumour sites were treated on the chosen day and as expected the most common treatment sites were prostate and breast, comprising 46% of patients treated. Data analysis also indicated that intensity-modulated radiotherapy (IMRT) use is relatively high with 19.6% of patients receiving IMRT treatment on the chosen day. Both IMRT and image-guided radiotherapy (IGRT) indications matched recommendations from the evidence. Conclusion: The Snapshot method proved to be a feasible and efficient method of gathering useful
Laboratory and pilot scale pretreatment of sugarcane bagasse by acidified aqueous glycerol solutions
Resumo:
Pretreatment of sugarcane bagasse with acidified aqueous glycerol solution was evaluated at both laboratory and pilot scales. Laboratory scale pretreatment (4.00 g dry mass in 40.00 g liquid) with glycerol solutions containing ≤ 20 wt% water and 1.2 wt% HCl at 130 °C for 60 min resulted in biomass having glucan digestibilities of ≥ 88%. Comparable glucan enzymatic digestibility of 90% was achieved with bagasse pretreated at pilot scale (10 kg dry mass in 60 kg liquid) using a glycerol solution containing 0.4 wt% HCl and 17 wt% water at 130 °C for 15 min. We attribute more efficient pretreatment at pilot scale (despite shorter reaction time and reduced acid content) to improved mixing and heat transfer in a horizontal reactor. Pretreatment of sugarcane bagasse with acid-catalysed glycerol solutions likely produces glycerol-glycosides, which together with hydrolysed lignin are potential substrates for the production of biopolymers.
Resumo:
The use of Wireless Sensor Networks (WSNs) for Structural Health Monitoring (SHM) has become a promising approach due to many advantages such as low cost, fast and flexible deployment. However, inherent technical issues such as data synchronization error and data loss have prevented these distinct systems from being extensively used. Recently, several SHM-oriented WSNs have been proposed and believed to be able to overcome a large number of technical uncertainties. Nevertheless, there is limited research verifying the applicability of those WSNs with respect to demanding SHM applications like modal analysis and damage identification. This paper first presents a brief review of the most inherent uncertainties of the SHM-oriented WSN platforms and then investigates their effects on outcomes and performance of the most robust Output-only Modal Analysis (OMA) techniques when employing merged data from multiple tests. The two OMA families selected for this investigation are Frequency Domain Decomposition (FDD) and Data-driven Stochastic Subspace Identification (SSI-data) due to the fact that they both have been widely applied in the past decade. Experimental accelerations collected by a wired sensory system on a large-scale laboratory bridge model are initially used as clean data before being contaminated by different data pollutants in sequential manner to simulate practical SHM-oriented WSN uncertainties. The results of this study show the robustness of FDD and the precautions needed for SSI-data family when dealing with SHM-WSN uncertainties. Finally, the use of the measurement channel projection for the time-domain OMA techniques and the preferred combination of the OMA techniques to cope with the SHM-WSN uncertainties is recommended.
Resumo:
With the explosive growth of resources available through the Internet, information mismatching and overload have become a severe concern to users. Web users are commonly overwhelmed by huge volume of information and are faced with the challenge of finding the most relevant and reliable information in a timely manner. Personalised information gathering and recommender systems represent state-of-the-art tools for efficient selection of the most relevant and reliable information resources, and the interest in such systems has increased dramatically over the last few years. However, web personalization has not yet been well-exploited; difficulties arise while selecting resources through recommender systems from a technological and social perspective. Aiming to promote high quality research in order to overcome these challenges, this paper provides a comprehensive survey on the recent work and achievements in the areas of personalised web information gathering and recommender systems. The report covers concept-based techniques exploited in personalised information gathering and recommender systems.
Resumo:
This paper investigates advanced channel compensation techniques for the purpose of improving i-vector speaker verification performance in the presence of high intersession variability using the NIST 2008 and 2010 SRE corpora. The performance of four channel compensation techniques: (a) weighted maximum margin criterion (WMMC), (b) source-normalized WMMC (SN-WMMC), (c) weighted linear discriminant analysis (WLDA), and; (d) source-normalized WLDA (SN-WLDA) have been investigated. We show that, by extracting the discriminatory information between pairs of speakers as well as capturing the source variation information in the development i-vector space, the SN-WLDA based cosine similarity scoring (CSS) i-vector system is shown to provide over 20% improvement in EER for NIST 2008 interview and microphone verification and over 10% improvement in EER for NIST 2008 telephone verification, when compared to SN-LDA based CSS i-vector system. Further, score-level fusion techniques are analyzed to combine the best channel compensation approaches, to provide over 8% improvement in DCF over the best single approach, (SN-WLDA), for NIST 2008 interview/ telephone enrolment-verification condition. Finally, we demonstrate that the improvements found in the context of CSS also generalize to state-of-the-art GPLDA with up to 14% relative improvement in EER for NIST SRE 2010 interview and microphone verification and over 7% relative improvement in EER for NIST SRE 2010 telephone verification.
Resumo:
Boron, which is an essential element for plants, is toxic to humans and animals at high concentrations. Layered double hydroxides (LDHs) and thermally activated LDHs have shown good uptake of a range of boron species in laboratory scale experiments when compared to current available methods, which are for the most part ineffective or prohibitively expensive. LDHs were able to remove anions from water by anion exchange, the reformation (or memory) effect and direct precipitation. The main mechanism of boron uptake appeared to be anion exchange, which was confirmed by powder X-ray diffraction (XRD) measurements. Solution pH appeared to have little effect on boron sorption while thermal activation did not always significantly improve boron uptake. In addition, perpetration of numerous LDHs with varying boron anions in the interlayer region by direct co-precipitation and anion exchange have been reported by a number of groups. The composition and orientation of the interlayer boron ions could be identified with reasonable certainty by applying a number of characterisation techniques including: powder XRD, nuclear magnetic resonance spectroscopy (NMR), X-ray photoelectron spectroscopy (XPS) and infrared (IR) spectroscopy. There is still considerable scope for future research on the application of LDHs for the removal of boron contaminants.
Resumo:
Neutrophils constitute 50-60% of all circulating leukocytes; they present the first line of microbicidal defense and are involved in inflammatory responses. To examine immunocompetence in athletes, numerous studies have investigated the effects of exercise on the number of circulating neutrophils and their response to stimulation by chemotactic stimuli and activating factors. Exercise causes a biphasic increase in the number of neutrophils in the blood, arising from increases in catecholamine and cortisol concentrations. Moderate intensity exercise may enhance neutrophil respiratory burst activity, possibly through increases in the concentrations of growth hormone and the inflammatory cytokine IL-6. In contrast, intense or long duration exercise may suppress neutrophil degranulation and the production of reactive oxidants via elevated circulating concentrations of epinephrine (adrenaline) and cortisol. There is evidence of neutrophil degranulation and activation of the respiratory burst following exercise-induced muscle damage. In principle, improved responsiveness of neutrophils to stimulation following exercise of moderate intensity could mean that individuals participating in moderate exercise may have improved resistance to infection. Conversely, competitive athletes undertaking regular intense exercise may be at greater risk of contracting illness. However, there are limited data to support this concept. To elucidate the cellular mechanisms involved in the neutrophil responses to exercise, researchers have examined changes in the expression of cell membrane receptors, the production and release of reactive oxidants and more recently, calcium signaling. The investigation of possible modifications of other signal transduction events following exercise has not been possible because of current methodological limitations. At present, variation in exercise-induced alterations in neutrophil function appears to be due to differences in exercise protocols, training status, sampling points and laboratory assay techniques.
Resumo:
A number of mathematical models investigating certain aspects of the complicated process of wound healing are reported in the literature in recent years. However, effective numerical methods and supporting error analysis for the fractional equations which describe the process of wound healing are still limited. In this paper, we consider the numerical simulation of a fractional mathematical model of epidermal wound healing (FMM-EWH), which is based on the coupled advection-diffusion equations for cell and chemical concentration in a polar coordinate system. The space fractional derivatives are defined in the Left and Right Riemann-Liouville sense. Fractional orders in the advection and diffusion terms belong to the intervals (0, 1) or (1, 2], respectively. Some numerical techniques will be used. Firstly, the coupled advection-diffusion equations are decoupled to a single space fractional advection-diffusion equation in a polar coordinate system. Secondly, we propose a new implicit difference method for simulating this equation by using the equivalent of Riemann-Liouville and Grünwald-Letnikov fractional derivative definitions. Thirdly, its stability and convergence are discussed, respectively. Finally, some numerical results are given to demonstrate the theoretical analysis.
Resumo:
This chapter provides researchers with a guide to some of the types of dating techniques that can be used in geomorpological investigations and issues that need to be addressed when using gechronological data, specifically issues relating to accuracy and precision. This chapter also introduces the 'types' of dating methods that are commonly used in geomorphological studies. This includes sidereal, isotopic, radiogenic, and chemical dating methods.
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.
Resumo:
The feral pig, Sus scrofa, is a widespread and abundant invasive species in Australia. Feral pigs pose a significant threat to the environment, agricultural industry, and human health, and in far north Queensland they endanger World Heritage values of the Wet Tropics. Historical records document the first introduction of domestic pigs into Australia via European settlers in 1788 and subsequent introductions from Asia from 1827 onwards. Since this time, domestic pigs have been accidentally and deliberately released into the wild and significant feral pig populations have become established, resulting in the declaration of this species as a class 2 pest in Queensland. The overall objective of this study was to assess the population genetic structure of feral pigs in far north Queensland, in particular to enable delineation of demographically independent management units. The identification of ecologically meaningful management units using molecular techniques can assist in targeting feral pig control to bring about effective long-term management. Molecular genetic analysis was undertaken on 434 feral pigs from 35 localities between Tully and Innisfail. Seven polymorphic and unlinked microsatellite loci were screened and fixation indices (FST and analogues) and Bayesian clustering methods were used to identify population structure and management units in the study area. Sequencing of the hyper-variable mitochondrial control region (D-loop) of 35 feral pigs was also examined to identify pig ancestry. Three management units were identified in the study at a scale of 25 to 35 km. Even with the strong pattern of genetic structure identified in the study area, some evidence of long distance dispersal and/or translocation was found as a small number of individuals exhibited ancestry from a management unit outside of which they were sampled. Overall, gene flow in the study area was found to be influenced by environmental features such as topography and land use, but no distinct or obvious natural or anthropogenic geographic barriers were identified. Furthermore, strong evidence was found for non-random mating between pigs of European and Asian breeds indicating that feral pig ancestry influences their population genetic structure. Phylogenetic analysis revealed two distinct mitochondrial DNA clades, representing Asian domestic pig breeds and European breeds. A significant finding was that pigs of Asian origin living in Innisfail and south Tully were not mating randomly with European breed pigs populating the nearby Mission Beach area. Feral pig control should be implemented in each of the management units identified in this study. The control should be coordinated across properties within each management unit to prevent re-colonisation from adjacent localities. The adjacent rainforest and National Park Estates, as well as the rainforest-crop boundary should be included in a simultaneous control operation for greater success.