954 resultados para Random access system


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Before entering the central nervous system (CNS) immune cells have to penetrate any one of its barriers, namely either the endothelial blood-brain barrier, the epithelial blood-cerebrospinal fluid barrier or the tanycytic barrier around the circumventricular organs, all of which maintain homeostasis within the CNS. The presence of these barriers in combination with the lack of lymphatic vessels and the absence of classical MHC-positive antigen presenting cells characterizes the CNS as an immunologically privileged site. In multiple sclerosis a large number of inflammatory cells gains access to the CNS parenchyma. Studies performed in experimental autoimmune encephalomyelitis (EAE), a rodent model for multiple sclerosis, have enabled us to understand some of the molecular mechanisms involved in immune cell entry into the CNS. In particular, the realization that /alpha4-integrins play a predominant role in leukocyte trafficking to the CNS has led to the development of a novel drug for the treatment of relapsing-remitting multiple sclerosis, which targets /alpha4-integrin mediated immune cell migration to the CNS. At the same time, the involvement of other adhesion and signalling molecules in this process remains to be investigated and novel molecules contributing to immune cell entry into the CNS are still being identified. The entire process of immune cell trafficking into the CNS is strictly controlled by the brain barriers not only under physiological conditions but also during neuroinflammation, when some barrier properties are lost. Thus, immune cell entry into the CNS critically depends on the unique characteristics of the brain barriers maintaining CNS homeostasis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In multiple sclerosis and in its animal model experimental autoimmune encephalomyelitis (EAE), inflammatory cells migrate across the highly specialized endothelial blood-brain barrier (BBB) and gain access to the central nervous system (CNS). It is well established that leukocyte recruitment across this vascular bed is unique due to the predominant involvement of alpha4-integrins in mediating the initial contact to as well as firm adhesion with the endothelium. In contrast, the involvement of the selectins, L-selectin, E- and P-selectin and their respective carbohydrate ligands such as P-selectin glycoprotein (PSGL)-1 in this process has been controversially discussed. Intravital microscopic analysis of immune cell interaction with superficial brain vessels demonstrates a role for E- and P-selectin and their common ligand PSGL-1 in lymphocyte rolling. However, E- and P-selectin-deficient SJL- or C57Bl/6 mice or PSGL-1-deficient C57Bl/6 mice develop EAE indistinguishable from wild-type mice. Considering these apparently discrepant observations, it needs to be discussed whether the molecular mechanisms involved in leukocyte trafficking across superficial brain vessels are irrelevant for EAE pathogenesis or whether the therapeutic efficacy of targeting alpha4-integrins in EAE is truly dependent on the inhibition of leukocyte trafficking across the BBB.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

More than eighteen percent of the world’s population lives without reliable access to clean water, forced to walk long distances to get small amounts of contaminated surface water. Carrying heavy loads of water long distances and ingesting contaminated water can lead to long-term health problems and even death. These problems affect the most vulnerable populations, women, children, and the elderly, more than anyone else. Water access is one of the most pressing issues in development today. Boajibu, a small village in Sierra Leone, where the author served in Peace Corps for two years, lacks access to clean water. Construction of a water distribution system was halted when a civil war broke out in 1992 and has not been continued since. The community currently relies on hand-dug and borehole wells that can become dirty during the dry season, which forces people to drink contaminated water or to travel a far distance to collect clean water. This report is intended to provide a design the system as it was meant to be built. The water system design was completed based on the taps present, interviews with local community leaders, local surveying, and points taken with a GPS. The design is a gravity-fed branched water system, supplied by a natural spring on a hill adjacent to Boajibu. The system’s source is a natural spring on a hill above Boajibu, but the flow rate of the spring is unknown. There has to be enough flow from the spring over a 24-hour period to meet the demands of the users on a daily basis, or what is called providing continuous flow. If the spring has less than this amount of flow, the system must provide intermittent flow, flow that is restricted to a few hours a day. A minimum flow rate of 2.1 liters per second was found to be necessary to provide continuous flow to the users of Boajibu. If this flow is not met, intermittent flow can be provided to the users. In order to aid the construction of a distribution system in the absence of someone with formal engineering training, a table was created detailing water storage tank sizing based on possible source flow rates. A builder can interpolate using the source flow rate found to get the tank size from the table. However, any flow rate below 2.1 liters per second cannot be used in the table. In this case, the builder should size the tank such that it can take in the water that will be supplied overnight, as all the water will be drained during the day because the users will demand more than the spring can supply through the night. In the developing world, there is often a problem collecting enough money to fund large infrastructure projects, such as a water distribution system. Often there is only enough money to add only one or two loops to a water distribution system. It is helpful to know where these one or two loops can be most effectively placed in the system. Various possible loops were designated for the Boajibu water distribution system and the Adaptive Greedy Heuristic Loop Addition Selection Algorithm (AGHLASA) was used to rank the effectiveness of the possible loops to construct. Loop 1 which was furthest upstream was selected because it benefitted the most people for the least cost. While loops which were further downstream were found to be less effective because they would benefit fewer people. Further studies should be conducted on the water use habits of the people of Boajibu to more accurately predict the demands that will be placed on the system. Further population surveying should also be conducted to predict population change over time so that the appropriate capacity can be built into the system to accommodate future growth. The flow at the spring should be measured using a V-notch weir and the system adjusted accordingly. Future studies can be completed adjusting the loop ranking method so that two users who may be using the water system for different lengths of time are not counted the same and vulnerable users are weighted more heavily than more robust users.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This report is a case study of how Mwangalala community accesses water and how that access is maintained. Mwangalala community is located in the northern tip of Karonga district in Malawi, Africa. The case study evaluates how close the community is to meeting target 10 of the Millennium Development Goals, sustainable access to safe drinking water, and evaluates the current water system through Human Centered Design’s criteria of desirability, feasibility, and viability. It also makes recommendations to improve water security in Mwangalala community. Data was collected through two years of immersive observation, interviews with 30 families, and observing two wells on three separate occasions. The 30 interviews provided a sample size of over 10% of the community’s population. Participants were initially self-selected and then invited to participate in the research. I walked along community pathways and accepted invitations to join casual conversations in family compounds. After conversing I asked the family members if they would be willing to participate in my research by talking with me about water. Data collected from the interviews and the observations of two wells were compared and analyzed for common themes. Shallow wells or open wells represented the primary water source for 93% of interview participants. Boreholes were also present in the community, but produced unpalatable water due to high concentrations of dissolved iron and were not used as primary water sources. During observations 75% of community members who used the shallow well, primarily used for consumptive uses like cooking or dinking, were females. Boreholes were primarily used for non-consumptive uses such as watering crops or bathing and 77% of the users were male. Shallow wells could remain in disrepair for two months because the repairman was a volunteer, who was not compensated for the skilled labor required to repair the wells. Community members thought the maintenance fee went towards his salary, so did not compensate the repairman when he performed work. This miscommunication provided no incentive for the repairman to make well repairs a priority, and left community members frustrated with untimely repairs. Shallow wells with functional pumps failed to provide water when the water table levels drop during dry season, forcing community members to seek secondary or tertiary water sources. Open wells, converted from shallow wells after community members did not pay for repairs to the pump, represented 44% of the wells originally installed with Mark V hand pumps. These wells whose pumps were not repaired were located in fields and one beside a church. The functional wells were all located on school grounds or in family compounds, where responsibility for the well’s maintenance is clearly defined. Mwangalala community fails to meet Millennium Development goals because the wells used by the community do not provide sustainable access to safe drinking water. Open wells, used by half the participants in the study, lack a top covering to prevent contamination from debris and wildlife. Shallow well repair times are unsustainable, taking longer than two weeks to be repaired, primarily because the repair persons are expected to provide skilled labor to repair the wells without compensation. Improving water security for Mwangalala can be achieved by improving repair times on shallow wells and making water from boreholes palatable. There are no incentives for a volunteer repair person to fix wells in a timely manner. Repair times can be improved by reducing the number of wells a repair person is responsible for and compensating the person for the skilled labor provided. Water security would be further improved by removing iron particulates from borehole water, thus rendering it palatable. This is possible through point of use filtration utilizing ceramic candles; this would make pumped water available year-round.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While the WTO agreements do not regulate the use of biotechnology per se, their rules can have a profound impact on the use of the technology for both commercial and non-commercial purposes. This book seeks to identify the challenges to international trade regulation that arise from biotechnology. The contributions examine whether existing international obligations of WTO Members are appropriate to deal with the issues arising for the use of biotechnology and whether there is a need for new international legal instruments, including a potential WTO Agreement on Biotechnology. They combine various perspectives on and topics relating to genetic engineering and trade, including human rights and gender; intellectual property rights; traditional knowledge and access and benefit sharing; food security, trade and agricultural production and food safety; and medical research, cloning and international trade.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The estimation of the average travel distance in a low-level picker-to-part order picking system can be done by analytical methods in most cases. Often a uniform distribution of the access frequency over all bin locations is assumed in the storage system. This only applies if the bin location assignment is done randomly. If the access frequency of the articles is considered in the bin location assignment to reduce the average total travel distance of the picker, the access frequency over the bin locations of one aisle can be approximated by an exponential density function or any similar density function. All known calculation methods assume that the average number of orderlines per order is greater than the number of aisles of the storage system. In case of small orders this assumption is often invalid. This paper shows a new approach for calculating the average total travel distance taking into account that the average number of orderlines per order is lower than the total number of aisles in the storage system and the access frequency over the bin locations of an aisle can be approximated by any density function.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

OBJECTIVES Percutaneous closure of the transapical (TA) access site for large-calibre devices is an unsolved issue. We report the first experimental data on the TA PLUG device for true-percutaneous closure following large apical access for transcatheter aortic valve implantation. METHODS The TA PLUG, a self-sealing full-core closure device, was implanted in an acute animal study in six pigs (60.2 ± 0.7 kg). All the pigs received 100 IU/kg of heparin. The targeted activated clotting time was left to normalize spontaneously. After accessing the left ventricular apex with a 39 French introducer, the closure plug device was delivered with a 33 French over-the-wire system under fluoroscopic guidance into the apex. Time to full haemostasis as well as rate of bleeding was recorded. Self-anchoring properties were assessed by haemodynamic push stress under adrenalin challenge. An additional feasibility study was conducted in four pigs (58.4 ± 1.1 kg) with full surgical exposure of the apex, and assessed device anchoring by pull-force measurements with 0.5 Newton (N) increments. All the animals were electively sacrified. Post-mortem analysis of the heart was performed and the renal embolic index assessed. RESULTS Of six apical closure devices, five were correctly inserted and fully deployed at the first attempt. One became blocked in the delivery system and was placed successfully at the second attempt. In all the animals, complete haemostasis was immediate and no leak was recorded during the 5-h observation period. Neither leak nor any device dislodgement was observed under haemodynamic push stress with repeated left ventricular peak pressure of up to 220 mmHg. In the feasibility study assessing pull-stressing, device migration occurred at a force of 3.3 ± 0.5 N corresponding to 247.5 mmHg. Post-mortem analyses confirmed full expansion of all devices at the intended target. No macroscopic damage was identified at the surrounding myocardium. The renal embolic index was zero. CONCLUSIONS True-percutaneous left ventricular apex closure following large access is feasible with the self-sealing TA PLUG. The device allows for immediate haemostasis and a reliable anchoring in the acute animal setting. This is the first report of a true-percutaneous closure for large-calibre transcatheter aortic valve implantation access.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: Statistical shape models are widely used in biomedical research. They are routinely implemented for automatic image segmentation or object identification in medical images. In these fields, however, the acquisition of the large training datasets, required to develop these models, is usually a time-consuming process. Even after this effort, the collections of datasets are often lost or mishandled resulting in replication of work. Objective: To solve these problems, the Virtual Skeleton Database (VSD) is proposed as a centralized storage system where the data necessary to build statistical shape models can be stored and shared. Methods: The VSD provides an online repository system tailored to the needs of the medical research community. The processing of the most common image file types, a statistical shape model framework, and an ontology-based search provide the generic tools to store, exchange, and retrieve digital medical datasets. The hosted data are accessible to the community, and collaborative research catalyzes their productivity. Results: To illustrate the need for an online repository for medical research, three exemplary projects of the VSD are presented: (1) an international collaboration to achieve improvement in cochlear surgery and implant optimization, (2) a population-based analysis of femoral fracture risk between genders, and (3) an online application developed for the evaluation and comparison of the segmentation of brain tumors. Conclusions: The VSD is a novel system for scientific collaboration for the medical image community with a data-centric concept and semantically driven search option for anatomical structures. The repository has been proven to be a useful tool for collaborative model building, as a resource for biomechanical population studies, or to enhance segmentation algorithms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

HYPOTHESIS Facial nerve monitoring can be used synchronous with a high-precision robotic tool as a functional warning to prevent of a collision of the drill bit with the facial nerve during direct cochlear access (DCA). BACKGROUND Minimally invasive direct cochlear access (DCA) aims to eliminate the need for a mastoidectomy by drilling a small tunnel through the facial recess to the cochlea with the aid of stereotactic tool guidance. Because the procedure is performed in a blind manner, structures such as the facial nerve are at risk. Neuromonitoring is a commonly used tool to help surgeons identify the facial nerve (FN) during routine surgical procedures in the mastoid. Recently, neuromonitoring technology was integrated into a commercially available drill system enabling real-time monitoring of the FN. The objective of this study was to determine if this drilling system could be used to warn of an impending collision with the FN during robot-assisted DCA. MATERIALS AND METHODS The sheep was chosen as a suitable model for this study because of its similarity to the human ear anatomy. The same surgical workflow applicable to human patients was performed in the animal model. Bone screws, serving as reference fiducials, were placed in the skull near the ear canal. The sheep head was imaged using a computed tomographic scanner and segmentation of FN, mastoid, and other relevant structures as well as planning of drilling trajectories was carried out using a dedicated software tool. During the actual procedure, a surgical drill system was connected to a nerve monitor and guided by a custom built robot system. As the planned trajectories were drilled, stimulation and EMG response signals were recorded. A postoperative analysis was achieved after each surgery to determine the actual drilled positions. RESULTS Using the calibrated pose synchronized with the EMG signals, the precise relationship between distance to FN and EMG with 3 different stimulation intensities could be determined for 11 different tunnels drilled in 3 different subjects. CONCLUSION From the results, it was determined that the current implementation of the neuromonitoring system lacks sensitivity and repeatability necessary to be used as a warning device in robotic DCA. We hypothesize that this is primarily because of the stimulation pattern achieved using a noninsulated drill as a stimulating probe. Further work is necessary to determine whether specific changes to the design can improve the sensitivity and specificity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aeromonas salmonicida subsp. salmonicida is an important pathogen in salmonid aquaculture and is responsible for the typical furunculosis. The type-three secretion system (T3SS) is a major virulence system. In this work, we review structure and function of this highly sophisticated nanosyringe in A. salmonicida. Based on the literature as well as personal experimental observations, we document the genetic (re)organization, expression regulation, anatomy, putative functional origin and roles in the infectious process of this T3SS. We propose a model of pathogenesis where A. salmonicida induces a temporary immunosuppression state in fish in order to acquire free access to host tissues. Finally, we highlight putative important therapeutic and vaccine strategies to prevent furunculosis of salmonid fish.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The goal of this project is the development of international cooperation for fostering solutions to provide better access to basic healthcare services.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A management information system (MIS) provides a means for collecting, reporting, and analyzing data from all segments of an organization. Such systems are common in business but rare in libraries. The Houston Academy of Medicine-Texas Medical Center Library developed an MIS that operates on a system of networked IBM PCs and Paradox, a commercial database software package. The data collected in the system include monthly reports, client profile information, and data collected at the time of service requests. The MIS assists with enforcement of library policies, ensures that correct information is recorded, and provides reports for library managers. It also can be used to help answer a variety of ad hoc questions. Future plans call for the development of an MIS that could be adapted to other libraries' needs, and a decision-support interface that would facilitate access to the data contained in the MIS databases.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Agrobacterium tumefaciens VirB/D4 type IV secretion system (T4SS) delivers oncogenic T-DNA and effector proteins to susceptible plant cells. This leads to the formation of tumors termed Crown Galls. The VirB/D4 T4SS is comprised of 12 subunits (VirB1 to VirB11 and VirD4), which assemble to form two structures, a secretion channel spanning the cell envelope and a T-pilus extending from the cell surface. In A. tumefaciens, the VirB2 pilin subunit is required for assembly of the secretion channel and is the main subunit of the T-pilus. The focus of this thesis is to define key reactions associated with the T4SS biogenesis pathway involving the VirB2 pilin. Topology studies demonstrated that VirB2 integrates into the inner membrane with two transmembrane regions, a small cytoplasmic loop, and a long periplasmic loop comprised of covalently linked N and C termini. VirB2 was shown by the substituted cysteine accessibility method (SCAM) to adopt distinct structural states when integrated into the inner membrane and when assembled as a component of the secretion channel and the T-pilus. The VirB4 and VirB11 ATPases were shown by SCAM to modulate the structural state of membrane-integrated VirB2 pilin, and evidence was also obtained that VirB4 mediates extraction of pilin from the membrane. A model that VirB4 functions as a pilin dislocase by an energy-dependent mechanism was further supported by coimmunoprecipitation and osmotic shock studies. Mutational studies identified two regions of VirB10, an N-terminal transmembrane domain and an outer membrane-associated domain termed the antennae projection, that contribute selectively to T-pilus biogenesis. Lastly, characterization of a VirB10 mutant that confers a ‘leaky’ channel phenotype further highlighted the role of VirB10 in gating substrate translocation across the outer membrane as well as T-pilus biogenesis. Results of my studies support a working model in which the VirB4 ATPase catalyzes dislocation of membrane-integrated pilin, and distinct domains of VirB10 coordinate pilin incorporation into the secretion channel and the extracellular T-pilus.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

PURPOSE: The purpose of this study was to assess the impact of different policies on access to hormonal contraception and pregnancy rates at two high school-based clinics. METHODS: Two clinics in high schools (Schools A and B), located in a large urban district in the southwest US, provide primary medical care to enrolled students with parental consent; the majority of whom have no health insurance coverage. The hormonal contraceptive dispensing policy of at School clinic A involves providing barrier, hormonal and emergency contraceptive services on site. School clinic B uses a referral policy that directs students to obtain contraception at an off-campus affiliated family planning clinic. Baseline data (age, race and history of prior pregnancy) on female students seeking hormonal contraception at the two clinics between 9/2008-12/2009 were extracted from an electronic administrative database (AHLERS Integrated System). Data on birth control use and pregnancy tests for each student was then tracked electronically through 3/31/2010. The outcomes measures were accessing hormonal contraception and positive pregnancy tests at any point during or after birth control use were started through 12/2009. The appointment keeping rate for contraceptive services and the overall pregnancy rates were compared between the two schools. In addition the pregnancy rates were compared between the two schools for students with and without a prior history of pregnancy. RESULTS: School clinic A: 79 students sought hormonal contraception; mean age 17.5 years; 68% were > 18 years; 77% were Hispanic; and 20% reported prior pregnancy. The mean duration of the observation period was 13 months (4-19 months). All 79 students received hormonal contraception (65% pill and 35% long acting progestin injection) onsite. During the observation period, the overall pregnancy rate was 6% (5/79); 4.7% (3/63) among students with no prior pregnancy. School clinic B: 40 students sought hormonal contraception; mean age 17.5 years; 52% > 18 years; 88 % were Hispanic; and 7.5% reported prior pregnancy. All 40 students were referred to the affiliated clinic. The mean duration of the observation period was 11.9 months (4-19 months). 50% (20) kept their appointment. Pills were dispensed to 85% (17/20) and 15% (3/20) received long acting progestin injection. The overall pregnancy rate was 20% (8/40); 21.6% (8/37) among students with no prior pregnancy. A significantly higher frequency of students seeking hormonal contraception kept their initial appointment for birth control at the school dispensing onsite contraception compared to the school with a referral policy for contraception (p<0.05). The pregnancy rate was significantly higher for the school with a referral policy for contraception compared to the school with onsite contraceptive services (p< 0.05). The pregnancy rate was also significantly higher for students without a prior history of pregnancy in the school with a referral policy for contraception (21.6%) versus the school with onsite contraceptive services (4.7%) (p< 0.05). CONCLUSION: This preliminary study showed that School clinic B with a referral policy had a lower appointment keeping rate for contraceptive services and a higher pregnancy rate than School clinic A with on-site contraceptive services. An on-site dispensing policy for hormonal contraceptives at high school-based health clinics may be a convenient and effective approach to prevent unintended first and repeat pregnancies among adolescents who seek hormonal contraception. This study has strong implications for reproductive health policy, especially as directed toward high-risk teenage populations.