961 resultados para Cp violation
Resumo:
Alcohol use disorders (AUDs) impact millions of individuals and there remain few effective treatment strategies. Despite evidence that neuronal nicotinic acetylcholine receptors (nAChRs) have a role in AUDs, it has not been established which subtypes of the nAChR are involved. Recent human genetic association studies have implicated the gene cluster CHRNA3-CHRNA5-CHRNB4 encoding the α3, α5, and β4 subunits of the nAChR in susceptibility to develop nicotine and alcohol dependence; however, their role in ethanol-mediated behaviors is unknown due to the lack of suitable and selective research tools. To determine the role of the α3, and β4 subunits of the nAChR in ethanol self-administration, we developed and characterized high-affinity partial agonists at α3β4 nAChRs, CP-601932, and PF-4575180. Both CP-601932 and PF-4575180 selectively decrease ethanol but not sucrose consumption and operant self-administration following long-term exposure. We show that the functional potencies of CP-601932 and PF-4575180 at α3β4 nAChRs correlate with their unbound rat brain concentrations, suggesting that the effects on ethanol self-administration are mediated via interaction with α3β4 nAChRs. Also varenicline, an approved smoking cessation aid previously shown to decrease ethanol consumption and seeking in rats and mice, reduces ethanol intake at unbound brain concentrations that allow functional interactions with α3β4 nAChRs. Furthermore, the selective α4β2(*) nAChR antagonist, DHβE, did not reduce ethanol intake. Together, these data provide further support for the human genetic association studies, implicating CHRNA3 and CHRNB4 genes in ethanol-mediated behaviors. CP-601932 has been shown to be safe in humans and may represent a potential novel treatment for AUDs.
Resumo:
The [Cp′3U] metallocenes contain substituted cyclopentadienyl ligands and UIII with f3 electron configuration. They are good π donors and bind π-accepting ligands (L) such as carbon monoxide and isocyanides to form the corresponding adducts [Cp′3U(L)] (see scheme). The π-donating capability of the [Cp′3U] fragments appears to be readily modulated by the substituents on the cyclopentadienyl ligand.
Resumo:
The end of the recent Communist occupation of the many countries bordering Russia marked an end to the tyranny of illegal and forced annexation. Amid these countries are my parents’ homelands, the small Baltic nations of Latvia and Estonia. Their occupation contravenes many of the numerous Articles listed by The Office of the High Commissioner for Human Rights in The Universal Declaration of Human Rights (2008), constituting many acts of violation. As a filmmaker, I was unusually incognizant of these events, despite my relationship to them. My parents never discussed the war, while during the ensuing Communist era, information was conspicuously absent. However, this lack of knowledge provided the incentive that compelled a journey of discovery that resulted in the making of Regimes and Rebels. This Masters project is presented is two parts. The film equates to 70% of the project (52 minutes in length), whilst the exegesis represents the remaining 30%. The film is a ‘human rights’, ‘video diary’ styled documentary film about the Communist occupation of my parents’ homelands, Latvia and Estonia, and the resonating effect of the occupation on our family living in Australia and family still living in the homelands. The production of the video diary is contextualised by this exegesis, which concurrently discusses the burgeoning video diary format as the basis for making a ‘human rights’ documentary film. A discussion about the latter genre of documentary film ensues, encompassing modes of representation, followed by various issues related to production including: issues of aesthetics, styles, digital media, lack of evidence and subjectivity analogous with both filmmaker and audience. Next, work by other filmmakers in the ‘human rights’ genre, linked to the proliferation of Communism in Europe, is discussed and analysed in terms of production and modes of representation. The exegesis ends with my experience as filmmaker and an analysis of factors that arose in making Regimes and Rebels.
Resumo:
Notwithstanding the obvious potential advantages of information and communications technology (ICT) in the enhanced provision of healthcare services, there are some concerns associated with integration of and access to electronic health records. A security violation in health records, such as an unauthorised disclosure or unauthorised alteration of an individual's health information, can significantly undermine both healthcare providers' and consumers' confidence and trust in e-health systems. A crisis in confidence in any national level e-health system could seriously degrade the realisation of the system's potential benefits. In response to the privacy and security requirements for the protection of health information, this research project investigated national and international e-health development activities to identify the necessary requirements for the creation of a trusted health information system architecture consistent with legislative and regulatory requirements and relevant health informatics standards. The research examined the appropriateness and sustainability of the current approaches for the protection of health information. It then proposed an architecture to facilitate the viable and sustainable enforcement of privacy and security in health information systems under the project title "Open and Trusted Health Information Systems (OTHIS)". OTHIS addresses necessary security controls to protect sensitive health information when such data is at rest, during processing and in transit with three separate and achievable security function-based concepts and modules: a) Health Informatics Application Security (HIAS); b) Health Informatics Access Control (HIAC); and c) Health Informatics Network Security (HINS). The outcome of this research is a roadmap for a viable and sustainable architecture for providing robust protection and security of health information including elucidations of three achievable security control subsystem requirements within the proposed architecture. The successful completion of two proof-of-concept prototypes demonstrated the comprehensibility, feasibility and practicality of the HIAC and HIAS models for the development and assessment of trusted health systems. Meanwhile, the OTHIS architecture has provided guidance for technical and security design appropriate to the development and implementation of trusted health information systems whilst simultaneously offering guidance for ongoing research projects. The socio-economic implications of this research can be summarised in the fact that this research embraces the need for low cost security strategies against economic realities by using open-source technologies for overall test implementation. This allows the proposed architecture to be publicly accessible, providing a platform for interoperability to meet real-world application security demands. On the whole, the OTHIS architecture sets a high level of security standard for the establishment and maintenance of both current and future health information systems. This thereby increases healthcare providers‘ and consumers‘ trust in the adoption of electronic health records to realise the associated benefits.
Resumo:
Prevention and safety promotion programmes. Traditionally, in-depth investigations of crash risks are conducted using exposure controlled study or case-control methodology. However, these studies need either observational data for control cases or exogenous exposure data like vehicle-kilometres travel, entry flow or product of conflicting flow for a particular traffic location, or a traffic site. These data are not readily available and often require extensive data collection effort on a system-wide basis. Aim: The objective of this research is to propose an alternative methodology to investigate crash risks of a road user group in different circumstances using readily available traffic police crash data. Methods: This study employs a combination of a log-linear model and the quasi-induced exposure technique to estimate crash risks of a road user group. While the log-linear model reveals the significant interactions and thus the prevalence of crashes of a road user group under various sets of traffic, environmental and roadway factors, the quasi-induced exposure technique estimates relative exposure of that road user in the same set of explanatory variables. Therefore, the combination of these two techniques provides relative measures of crash risks under various influences of roadway, environmental and traffic conditions. The proposed methodology has been illustrated using Brisbane motorcycle crash data of five years. Results: Interpretations of results on different combination of interactive factors show that the poor conspicuity of motorcycles is a predominant cause of motorcycle crashes. Inability of other drivers to correctly judge the speed and distance of an oncoming motorcyclist is also evident in right-of-way violation motorcycle crashes at intersections. Discussion and Conclusions: The combination of a log-linear model and the induced exposure technique is a promising methodology and can be applied to better estimate crash risks of other road users. This study also highlights the importance of considering interaction effects to better understand hazardous situations. A further study on the comparison between the proposed methodology and case-control method would be useful.
Resumo:
Human personality is an important component of psychological factors affecting pedestrian crossing. This paper reports a questionnaire survey on the effects of pedestrian personalities (including neuroticism, extraversion, openness, agreeableness and conscientiousness) on pedestrian violation in China. 675 feedbacks were obtained, of which 535 samples were valid for analysis. The results of the hierarchical regression analysis showed that educational level had significant effect on violation; agreeableness had significant effect on violation, conditional compliance and unconditional compliance; consciousness had significant effect on violation and conditional compliance; extraversion had significant effect on unconditional compliance; neuroticism had significant effect on violation; educational level had significant effect on violation. The results implied that psychological measures played a very important role in pedestrian safety.
Resumo:
This paper reports an observation investigation of pedestrian crossing behaviors conducted at signalized crosswalks in urban areas in Singapore and Beijing on typical workdays. Each crosswalk was observed 3 times in different periods, i.e. normal hours, lunch hours, and rush hours. A total of 103,956 pedestrians were observed. The results showed that lane type, lane number, intersection type, and culture had significant effect on illegal pedestrian crossing in both cities; observation period had no significant effect on pedestrian violation in both cities; the violation rate in Singapore was lower than that in Beijing. However, observers reported that illegal crossing of vulnerable pedestrians, e.g. pregnant, the lame, old men and women, was more obvious in Singapore than that in Beijing. Evidence proved the hypothesis that the violations were related to pedestrians’ cognition of the definition of safety.
Resumo:
Spectrum sensing is considered to be one of the most important tasks in cognitive radio. One of the common assumption among current spectrum sensing detectors is the full presence or complete absence of the primary user within the sensing period. In reality, there are many situations where the primary user signal only occupies a portion of the observed signal and the assumption of primary user duty cycle not necessarily fulfilled. In this paper we show that the true detection performance can degrade from the assumed achievable values when the observed primary user exhibits a certain duty cycle. Therefore, a two-stage detection method incorporating primary user duty cycle that enhances the detection performance is proposed. The proposed detector can improve the probability of detection under low duty cycle at the expense of a small decrease in performance at high duty cycle.
Resumo:
The research team recognized the value of network-level Falling Weight Deflectometer (FWD) testing to evaluate the structural condition trends of flexible pavements. However, practical limitations due to the cost of testing, traffic control and safety concerns and the ability to test a large network may discourage some agencies from conducting the network-level FWD testing. For this reason, the surrogate measure of the Structural Condition Index (SCI) is suggested for use. The main purpose of the research presented in this paper is to investigate data mining strategies and to develop a prediction method of the structural condition trends for network-level applications which does not require FWD testing. The research team first evaluated the existing and historical pavement condition, distress, ride, traffic and other data attributes in the Texas Department of Transportation (TxDOT) Pavement Maintenance Information System (PMIS), applied data mining strategies to the data, discovered useful patterns and knowledge for SCI value prediction, and finally provided a reasonable measure of pavement structural condition which is correlated to the SCI. To evaluate the performance of the developed prediction approach, a case study was conducted using the SCI data calculated from the FWD data collected on flexible pavements over a 5-year period (2005 – 09) from 354 PMIS sections representing 37 pavement sections on the Texas highway system. The preliminary study results showed that the proposed approach can be used as a supportive pavement structural index in the event when FWD deflection data is not available and help pavement managers identify the timing and appropriate treatment level of preventive maintenance activities.
Resumo:
With many important developments over the last century, nowadays orthopedic bone plate now excels over other types of internal fixators in bone fracture fixation. The developments involve the design, material and implementation techniques of the plates. This paper aims to review the evolution in implementation technique and biomaterial of the orthopedic bone plates. Plates were initially used to fix the underlying bones firmly. Accordingly, Compression plate (CP), Dynamic compression plate (DCP), Limited contact dynamic compression plate (LC-DCP) and Point contact fixator (PC-Fix) were developed. Later, the implementation approach was changed to locking, and the Less Invasive Stabilization System (LISS) plate was introduced as a result. Finally, a combination of both of these approaches has been used by introducing the Locking Compression Plate (LCP). Currently, precontoured LCPs are mainly used for bone fracture fixation. In parallel with structure and implementation techniques, numerous advances have occurred in biomaterials of the plates. Titanium and stainless steel alloys are now the most common biomaterials in production of orthopedic bone plates. However, regarding the biocompatibility, bioactivity and biodegradability characteristics of Mg alloys, Ta alloys, SMAs, carbon fiber composites and bioceramics, these materials are considered as potentially suitable for plates. However, due to poor mechanical properties, they have very limited applications. Therefore, further studies are required in future to solve these problems and make them feasible for heavy-duty bone plates.
Resumo:
The overall objective of this thesis is to explore how and why the content of individuals' psychological contracts changes over time. The contract is generally understood as "individual beliefs, shaped by the organisation, regarding the terms of an exchange agreement between individuals and their organisation" (Rousseau, 1995, p. 9). With an overall study sampling frame of 320 graduate organisational newcomers, a mixed method longitudinal research design comprised of three sequential, inter-related studies is employed in order to capture the change process. From the 15 semi-structured interviews conducted in Study 1, the key findings included identifying a relatively high degree of mutuality between employees' and their managers' reciprocal contract beliefs around the time of organisational entry. Also, at this time, individuals had developed specific components of their contract content through a mix of social network information (regarding broader employment expectations) and perceptions of various elements of their particular organisation's reputation (for more firm-specific expectations). Study 2 utilised a four-wave survey approach (available to the full sampling frame) over the 14 months following organisational entry to explore the 'shape' of individuals' contract change trajectories and the role of four theorised change predictors in driving these trajectories. The predictors represented an organisational-level informational cue (perceptions of corporate reputation), a dyadic-level informational cue (perceptions of manager-employee relationship quality) and two individual difference variables (affect and hardiness). Through the use of individual growth modelling, the findings showed differences in the general change patterns across contract content components of perceived employer (exhibiting generally quadratic change patterns) and employee (exhibiting generally no-change patterns) obligations. Further, individuals differentially used the predictor variables to construct beliefs about specific contract content. While both organisational- and dyadic-level cues were focused upon to construct employer obligation beliefs, organisational-level cues and individual difference variables were focused upon to construct employee obligation beliefs. Through undertaking 26 semi-structured interviews, Study 3 focused upon gaining a richer understanding of why participants' contracts changed, or otherwise, over the study period, with a particular focus upon the roles of breach and violation. Breach refers to an employee's perception that an employer obligation has not been met and violation refers to the negative and affective employee reactions which may ensue following a breach. The main contribution of these findings was identifying that subsequent to a breach or violation event a range of 'remediation effects' could be activated by employees which, depending upon their effectiveness, served to instigate either breach or contract repair or both. These effects mostly instigated broader contract repair and were generally cognitive strategies enacted by an individual to re-evaluate the breach situation and re-focus upon other positive aspects of the employment relationship. As such, the findings offered new evidence for a clear distinction between remedial effects which serve to only repair the breach (and thus the contract) and effects which only repair the contract more broadly; however, when effective, both resulted in individuals again viewing their employment relationships positively. Overall, in response to the overarching research question of this thesis, how and why individuals' psychological contract beliefs change, individuals do indeed draw upon various information sources, particularly at the organisational-level, as cues or guides in shaping their contract content. Further, the 'shapes' of the changes in beliefs about employer and employee obligations generally follow different, and not necessarily linear, trajectories over time. Finally, both breach and violation and also remedial actions, which address these occurrences either by remedying the breach itself (and thus the contract) or the contract only, play central roles in guiding individuals' contract changes to greater or lesser degrees. The findings from the thesis provide both academics and practitioners with greater insights into how employees construct their contract beliefs over time, the salient informational cues used to do this and how the effects of breach and violation can be mitigated through creating an environment which facilitates the use of effective remediation strategies.
Resumo:
Tower crane dismantling is one of the most dangerous activities in the construction industry. Tower crane erection and dismantlement causes 10–12% of the fatalities of all crane accidents. The nature of the task is such that off-the-job training is not practicable, and the knowledge and expertise needed has to be gained on the job. However, virtual trainers such as Microsoft Flight Simulator for airplane pilots and mission rehearsal exercise (MRE) for army personnel have been developed and are known to provide a highly successful means of overcoming the risks involved in such on-the-job learning and clearly have potential in construction situations. This paper describes the newly developed multiuser virtual safety training system (MVSTS) aimed at providing a similar learning environment for those involved in tower crane dismantlement. The proposed training system is developed by modifying an existing game engine. Within the close-to-reality virtual environment, trainees can participate in a virtual dismantling process. During the process, they learn the correct dismantling procedure and working location and to cooperate with other trainees by virtually dismantling the crane. The system allows the trainees to experience the complete procedure in a risk-free environment. A case study is provided to demonstrate how the system works and its practical application. The proposed system was evaluated by interviews with 30 construction experts with different backgrounds, divided into three groups according to their experience and trained by the traditional and virtual methods, respectively. The results indicate that the trainees of the proposed system generally learned better than those using the traditional method. The ratings also indicate that the system generally has great potential as a training platform.
Resumo:
Purpose – The purpose of this paper is to summarise a successfully defended doctoral thesis. The main purpose of this paper is to provide a summary of the scope, and main issues raised in the thesis so that readers undertaking studies in the same or connected areas may be aware of current contributions to the topic. The secondary aims are to frame the completed thesis in the context of doctoral-level research in project management as well as offer ideas for further investigation which would serve to extend scientific knowledge on the topic. Design/methodology/approach – Research reported in this paper is based on a quantitative study using inferential statistics aimed at better understanding the actual and potential usage of earned value management (EVM) as applied to external projects under contract. Theories uncovered during the literature review were hypothesized and tested using experiential data collected from 145 EVM practitioners with direct experience on one or more external projects under contract that applied the methodology. Findings – The results of this research suggest that EVM is an effective project management methodology. The principles of EVM were shown to be significant positive predictors of project success on contracted efforts and to be a relatively greater positive predictor of project success when using fixed-price versus cost-plus (CP) type contracts. Moreover, EVM's work-breakdown structure (WBS) utility was shown to positively contribute to the formation of project contracts. The contribution was not significantly different between fixed-price and CP contracted projects, with exceptions in the areas of schedule planning and payment planning. EVM's “S” curve benefited the administration of project contracts. The contribution of the S-curve was not significantly different between fixed-price and CP contracted projects. Furthermore, EVM metrics were shown to also be important contributors to the administration of project contracts. The relative contribution of EVM metrics to projects under fixed-price versus CP contracts was not significantly different, with one exception in the area of evaluating and processing payment requests. Practical implications – These results have important implications for project practitioners, EVM advocates, as well as corporate and governmental policy makers. EVM should be considered for all projects – not only for its positive contribution to project contract development and administration, for its contribution to project success as well, regardless of contract type. Contract type should not be the sole determining factor in the decision whether or not to use EVM. More particularly, the more fixed the contracted project cost, the more the principles of EVM explain the success of the project. The use of EVM mechanics should also be used in all projects regardless of contract type. Payment planning using a WBS should be emphasized in fixed-price contracts using EVM in order to help mitigate performance risk. Schedule planning using a WBS should be emphasized in CP contracts using EVM in order to help mitigate financial risk. Similarly, EVM metrics should be emphasized in fixed-price contracts in evaluating and processing payment requests. Originality/value – This paper provides a summary of cutting-edge research work and a link to the published thesis that researchers can use to help them understand how the research methodology was applied as well as how it can be extended.
Resumo:
Psittacine beak and feather disease (PBFD), caused by Beak and feather disease virus (BFDV), is the most significant infectious disease in psittacines. PBFD is thought to have originated in Australia but is now found worldwide; in Africa, it threatens the survival of the indigenous endangered Cape parrot and the vulnerable black-cheeked lovebird. We investigated the genetic diversity of putative BFDVs from southern Africa. Feathers and heparinized blood samples were collected from 27 birds representing 9 psittacine species, all showing clinical signs of PBFD. DNA extracted from these samples was used for PCR amplification of the putative BFDV coat protein (CP) gene. The nucleotide sequences of the CP genes of 19 unique BFDV isolates were determined and compared with the 24 previously described sequences of BFDV isolates from Australasia and America. Phylogenetic analysis revealed eight BFDV lineages, with the southern African isolates representing at least three distinctly unique genotypes; 10 complete genome sequences were determined, representing at least one of every distinct lineage. The nucleotide diversity of the southern African isolates was calculated to be 6.4% and is comparable to that found in Australia and New Zealand. BFDVs in southern Africa have, however, diverged substantially from viruses found in other parts of the world, as the average distance between the southern African isolates and BFDV isolates from Australia ranged from 8.3 to 10.8%. In addition to point mutations, recombination was found to contribute substantially to the level of genetic variation among BFDVs, with evidence of recombination in all but one of the genomes analyzed.
Resumo:
Circoviruses lack an autonomous DNA polymerase and are dependent on the replication machinery of the host cell for de novo DNA synthesis. Accordingly, the viral DNA needs to cross both the plasma membrane and the nuclear envelope before replication can occur. Here we report on the subcellular distribution of the beak and feather disease virus (BFDV) capsid protein (CP) and replication-associated protein (Rep) expressed via recombinant baculoviruses in an insect cell system and test the hypothesis that the CP is responsible for transporting the viral genome, as well as Rep, across the nuclear envelope. The intracellular localization of the BFDV CP was found to be directed by three partially overlapping bipartite nuclear localization signals (NLSs) situated between residues 16 and 56 at the N terminus of the protein. Moreover, a DNA binding region was also mapped to the N terminus of the protein and falls within the region containing the three putative NLSs. The ability of CP to bind DNA, coupled with the karyophilic nature of this protein, strongly suggests that it may be responsible for nuclear targeting of the viral genome. Interestingly, whereas Rep expressed on its own in insect cells is restricted to the cytoplasm, coexpression with CP alters the subcellular localization of Rep to the nucleus, strongly suggesting that an interaction with CP facilitates movement of Rep into the nucleus. Copyright © 2006, American Society for Microbiology. All Rights Reserved.