876 resultados para Defense Information School
Resumo:
Early transcriptional activation events that occur in bladder immediately following bacterial urinary tract infection (UTI) are not well defined. In this study, we describe the whole bladder transcriptome of uropathogenic Escherichia coli (UPEC) cystitis in mice using genome-wide expression profiling to define the transcriptome of innate immune activation stemming from UPEC colonization of the bladder. Bladder RNA from female C57BL/6 mice, analyzed using 1.0 ST-Affymetrix microarrays, revealed extensive activation of diverse sets of innate immune response genes, including those that encode multiple IL-family members, receptors, metabolic regulators, MAPK activators, and lymphocyte signaling molecules. These were among 1564 genes differentially regulated at 2 h postinfection, highlighting a rapid and broad innate immune response to bladder colonization. Integrative systems-level analyses using InnateDB (http://www.innatedb.com) bioinformatics and ingenuity pathway analysis identified multiple distinct biological pathways in the bladder transcriptome with extensive involvement of lymphocyte signaling, cell cycle alterations, cytoskeletal, and metabolic changes. A key regulator of IL activity identified in the transcriptome was IL-10, which was analyzed functionally to reveal marked exacerbation of cystitis in IL-10–deficient mice. Studies of clinical UTI revealed significantly elevated urinary IL-10 in patients with UPEC cystitis, indicating a role for IL-10 in the innate response to human UTI. The whole bladder transcriptome presented in this work provides new insight into the diversity of innate factors that determine UTI on a genome-wide scale and will be valuable for further data mining. Identification of protective roles for other elements in the transcriptome will provide critical new insight into the complex cascade of events that underpin UTI.
Resumo:
The Queensland University of Technology Research Team has recently edited a book on the idea of information experience. Authors from many parts of the world and focussed on many contexts have contributed chapters. The book represents the first attempt to profile and discuss information experience as a research domain and a research object, together with emphasis on different theories and methods being used in workplace, educational and community contexts. In this session members of the editorial team will introduce the book. We anticipate it will be of interest to any information professionals, students or researchers interested in understanding peoples' information experience.
Resumo:
This research contributes a fully-operational approach for managing business process risk in near real-time. The approach consists of a language for defining risks on top of process models, a technique to detect such risks as they eventuate during the execution of business processes, a recommender system for making risk-informed decisions, and a technique to automatically mitigate the detected risks when they are no longer tolerable. Through the incorporation of risk management elements in all stages of the lifecycle of business processes, this work contributes to the effective integration of the fields of Business Process Management and Risk Management.
Resumo:
The strain data acquired from structural health monitoring (SHM) systems play an important role in the state monitoring and damage identification of bridges. Due to the environmental complexity of civil structures, a better understanding of the actual strain data will help filling the gap between theoretical/laboratorial results and practical application. In the study, the multi-scale features of strain response are first revealed after abundant investigations on the actual data from two typical long-span bridges. Results show that, strain types at the three typical temporal scales of 10^5, 10^2 and 10^0 sec are caused by temperature change, trains and heavy trucks, and have their respective cut-off frequency in the order of 10^-2, 10^-1 and 10^0 Hz. Multi-resolution analysis and wavelet shrinkage are applied for separating and extracting these strain types. During the above process, two methods for determining thresholds are introduced. The excellent ability of wavelet transform on simultaneously time-frequency analysis leads to an effective information extraction. After extraction, the strain data will be compressed at an attractive ratio. This research may contribute to a further understanding of actual strain data of long-span bridges; also, the proposed extracting methodology is applicable on actual SHM systems.
Resumo:
This chapter highlights the varied scope of research in the emerging information experience domain. First, I share my perspective as educator-researcher on information experience and its association with informed learning. Then, in six methodological snapshots I present a selection of qualitative approaches which are suited to investigating information experience. The snapshots feature: action research, constructivist grounded theory, ethnomethodology, expanded critical incident approach, phenomenography and qualitative case study. By way of illustration, six researchers explain how and why they use one of these methods. Finally, I review the key characteristics of the six methods and their respective benefits for information experience research.
Resumo:
Hedonic pricing techniques can be used to generate quantitative information useful to the project appraiser at various stages of the project cycle, most notably project formulation and investment appraisal. To illustrate, a hedonic pricing model is applied to marina berthing charges in England and Wales. The technique determines the relevant marina facilities that are reflected in marina rental price. The contribution of the key marina facilities is expressed in monetary terms as the contribution to cost per overall rental price per foot.
Resumo:
Expert searchers engage with information in a variety of professional settings, as information brokers, reference librarians, information architects and faculty who teach advanced searching. As my recent research shows, the expert searcher’s information experience is defined by profound discernment of critical concepts about information, and a fluid ability to apply this knowledge to their engagement with the information environment. The information experience of the expert searcher means active and intentional participation with the processes and players that created that information environment. Expert searchers become an integral and seamless part of their information environment and also play a role in facilitating the information experiences of others. In this chapter, after discussing my understanding of the concept of information experience, I outline how I used threshold concept theory to explore the information experience of expert searchers. Through the findings, I identify four threshold concepts in the acquisition of search expertise that provide new perspectives on the information experience of the expert searcher. These new perspectives have implications for search engine design and how advanced search skills are taught. Finally, I consider how the fresh insights about the expert searcher’s experiences contribute to wider understanding about information experience.
Resumo:
Health Information Exchange (HIE) is an interesting phenomenon. It is a patient centric health and/or medical information management scenario enhanced by integration of Information and Communication Technologies (ICT). While health information systems are repositioning complex system directives, in the wake of the ‘big data’ paradigm, extracting quality information is challenging. It is anticipated that in this talk, ICT enabled healthcare scenarios with big data analytics will be shared. In addition, research and development regarding big data analytics, such as current trends of using these technologies for health care services and critical research challenges when extracting quality of information to improve quality of life will be discussed.
Resumo:
Information and Communication Technologies are dramatically transforming Allopathic medicine. Technological developments including Tele-medicine, Electronic health records, Standards to ensure computer systems inter-operate, Data mining, Simulation, Decision Support and easy access to medical information each contribute to empowering patients in new ways and change the practice of medicine. To date, informatics has had little impact on Ayurvedic medicine. This tutorial provides an introduction to key informatics initiatives in Allopothic medicine using real examples and suggests how applications can be applied to Ayurvedic medicine.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
This thesis examines, by way of phenomenographic methodology, the qualitatively different ways in which people engaged in Serious Leisure activities (within the area of 'heritage') experience information literacy. The study identified the presence of four distinct categories of information literacy experience, each with variation in regard to the serious leisure participant's experience of learning and information. In addition it also identified the existence of a further dimension of variation pertaining to the way in which individual identity is experienced during engagement with a serious leisure activity.
Resumo:
I develop a model of individuals’ intentions to discontinue information system use. Understanding these intentions is important because they give insights into users’ willingness to carry out system tasks, and provide a basis for maintenance decisions as well as possible replacement decisions. I offer a first conceptualization of factors determining users’ discontinuance intentions on basis of existing literature on technology use, status quo bias and dual factor concepts. The model is grounded in rational choice theory to distinguish determinants of a conscious decision between continuing or discontinuing IS use. I provide details on the empirical test of the model through a field study of IS users in a retail organization. The work will have implications for theory on information systems continuance and dual-factor logic in information system use. The empirical findings will provide suggestions for managers dealing with cessation of information systems and work routine changes in organizations.
Resumo:
Based on an investigation of 106 projects involving the use of building information modelling (BIM), this paper examines current BIM practices in China, and assesses how various practices alter their effectiveness. The results reveal that in current practice BIM is principally employed as a visualization tool, and how it is implemented is significantly associated with project characteristics. BIM use in the majority of the surveyed projects is seen to have positive outcomes, with the benefits of improved task effectiveness being more substantial than those related to efficiency improvement. The results also provide evidence that project characteristics significantly influence the success of BIM use; however, more substantial contributing factors to BIM effectiveness are the extent of integrated use and client/owner support. While indicating that current BIM practices involve both technological and organizational problems, the findings also provide insights into how the potential for BIM could be better exploited within the industry.