909 resultados para computer-mediated communications
Resumo:
This paper describes the development of an analytical model used to simulate the fatigue behaviour of roof cladding during the passage of a tropical cyclone. The model incorporated into a computer program uses wind pressure data from wind tunnel tests in combination with time history information on wind speed and direction during a tropical cyclone, and experimental fatigue characteristics data of roof claddings. The wind pressure data is analysed using a rainflow form of analysis, and a fatigue damage index calculated using a modified form of Miner's rule. Some of the results obtained to date and their significance in relation to the review of current fatigue tests are presented. The model appears to be reasonable for comparative estimation of fatigue life, but an improvement of Miner's rule is required for the prediction of actual fatigue life.
Resumo:
The IEC 61850 family of standards for substation communication systems were released in the early 2000s, and include IEC 61850-8-1 and IEC 61850-9-2 that enable Ethernet to be used for process-level connections between transmission substation switchyards and control rooms. This paper presents an investigation of process bus protection performance, as the in-service behavior of multi-function process buses is largely unknown. An experimental approach was adopted that used a Real Time Digital Simulator and 'live' substation automation devices. The effect of sampling synchronization error and network traffic on transformer differential protection performance was assessed and compared to conventional hard-wired connections. Ethernet was used for all sampled value measurements, circuit breaker tripping, transformer tap-changer position reports and Precision Time Protocol synchronization of sampled value merging unit sampling. Test results showed that the protection relay under investigation operated correctly with process bus network traffic approaching 100% capacity. The protection system was not adversely affected by synchronizing errors significantly larger than the standards permit, suggesting these requirements may be overly conservative. This 'closed loop' approach, using substation automation hardware, validated the operation of protection relays under extreme conditions. Digital connections using a single shared Ethernet network outperformed conventional hard-wired solutions.
Resumo:
This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level.
Resumo:
Microvessel density (MVD) is a widely used surrogate measure of angiogenesis in pathological specimens and tumour models. Measurement of MVD can be achieved by several methods. Automation of counting methods aims to increase the speed, reliability and reproducibility of these techniques. The image analysis system described here enables MVD measurement to be carried out with minimal expense in any reasonably equipped pathology department or laboratory. It is demonstrated that the system translates easily between tumour types which are suitably stained with minimal calibration. The aim of this paper is to offer this technique to a wider field of researchers in angiogenesis.
Resumo:
Several chronic infections known to be associated with malignancy have established oncogenic properties. However the existence of chronic inflammatory conditions that do not have an established infective cause and are associated with the development of tumours strongly suggests that the inflammatory process itself provides the prerequisite environment for the development of malignancy. This environment includes upregulation of mediators of the inflammatory response such as cyclo-oxygenase (COX)-2 leading to the production of inflammatory cytokines and prostaglandins which themselves may suppress cell mediated immune responses and promote angiogenesis. These factors may also impact on cell growth and survival signalling pathways resulting in induction of cell proliferation and inhibition of apoptosis. Furthermore, chronic inflammation may lead to the production of reactive oxygen species and metabolites such as malondialdehyde within the affected cells that may in turn induce DNA damage and mutations and, as a result, be carcinogenic. Here it is proposed that the conditions provided by a chronic inflammatory environment are so essential for the progression of the neoplastic process that therapeutic intervention aimed at inhibiting inflammation, reducing angiogenesis and stimulating cell mediated immune responses may have a major role in reducing the incidence of common cancers. © 2001 Cancer Research Campaign http://www.bjcancer.com.
Resumo:
Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents. This paper uses probability modelling to test whether this is the case for the 4,000 businesses that responded to the ABACUS survey. It was found that the industry sector that a business belonged to, and business expenditure on computer security, were not related to businesses’ likelihood of detecting computer security incidents. Instead, the number of employees that a business has and whether computer security functions were outsourced were found to be key indicators of businesses’ likelihood of detecting incidents. Some of the implications of these findings are considered in this paper.
Resumo:
With the implementation of the Personally Controlled eHealth Records system (PCEHR) in Australia, shared Electronic Health Records (EHR) are now a reality. However, the characteristic implicit in the PCEHR that puts the consumer (i.e. patient) in control of managing his or her health information within the PCEHR prevents healthcare professionals (HCPs) from utilising it as a one-stop-shop for information at point of care decision making as they cannot trust that a complete record of the consumer's health history is available to them through it. As a result, whilst reaching a major milestone in Australia's eHealth journey, the PCEHR does not reap the full benefits that such a shared EHR system can offer.
Resumo:
The relationship between coronal knee laxity and the restraining properties of the collateral ligaments remains unknown. This study investigated correlations between the structural properties of the collateral ligaments and stress angles used in computer-assisted total knee arthroplasty (TKA), measured with an optically based navigation system. Ten fresh-frozen cadaveric knees (mean age: 81 ± 11 years) were dissected to leave the menisci, cruciate ligaments, posterior joint capsule and collateral ligaments. The resected femur and tibia were rigidly secured within a test system which permitted kinematic registration of the knee using a commercially available image-free navigation system. Frontal plane knee alignment and varus-valgus stress angles were acquired. The force applied during varus-valgus testing was quantified. Medial and lateral bone-collateral ligament-bone specimens were then prepared, mounted within a uni-axial materials testing machine, and extended to failure. Force and displacement data were used to calculate the principal structural properties of the ligaments. The mean varus laxity was 4 ± 1° and the mean valgus laxity was 4 ± 2°. The corresponding mean manual force applied was 10 ± 3 N and 11 ± 4 N, respectively. While measures of knee laxity were independent of the ultimate tensile strength and stiffness of the collateral ligaments, there was a significant correlation between the force applied during stress testing and the instantaneous stiffness of the medial (r = 0.91, p = 0.001) and lateral (r = 0.68, p = 0.04) collateral ligaments. These findings suggest that clinicians may perceive a rate of change of ligament stiffness as the end-point during assessment of collateral knee laxity.
Resumo:
This thesis presents an analysis of the resource allocation problem in Orthogonal Frequency Division Multiplexing based multi-hop wireless communications systems. The study analyzed the tractable nature of the problem and designed several heuristic and fairness-aware resource allocation algorithms. These algorithms are fast and efficient and therefore can improve power management in wireless systems significantly.
Resumo:
Novel computer vision techniques have been developed for automatic monitoring of crowed environments such as airports, railway stations and shopping malls. Using video feeds from multiple cameras, the techniques enable crowd counting, crowd flow monitoring, queue monitoring and abnormal event detection. The outcome of the research is useful for surveillance applications and for obtaining operational metrics to improve business efficiency.
Resumo:
Background Ras-related nuclear protein (Ran) is required for cancer cell survival in vitro and human cancer progression, but the molecular mechanisms are largely unknown. Methods We investigated the effect of the v-myc myelocytomatosis viral oncogene homolog (Myc) on Ran expression by Western blot, chromatin immunoprecipitation, and luciferase reporter assays and the effects of Myc and Ran expression in cancer cells by soft-agar, cell adhesion, and invasion assays. The correlation between Myc and Ran and the association with patient survival were investigated in 14 independent patient cohorts (n = 2430) and analyzed with Spearman's rank correlation and Kaplan-Meier plots coupled with Wilcoxon-Gehan tests, respectively. All statistical tests were two-sided. Results Myc binds to the upstream sequence of Ran and transactivates Ran promoter activity. Overexpression of Myc upregulates Ran expression, whereas knockdown of Myc downregulates Ran expression. Myc or Ran overexpression in breast cancer cells is associated with cancer progression and metastasis. Knockdown of Ran reverses the effect induced by Myc overexpression in breast cancer cells. In clinical data, a positive association between Myc and Ran expression was revealed in 288 breast cancer and 102 lung cancer specimens. Moreover, Ran expression levels differentiate better or poorer survival in Myc overexpressing breast (χ2 = 24.1; relative risk [RR] = 9.1, 95% confidence interval [CI] = 3.3 to 24.7, P <. 001) and lung (χ2 = 6.04; RR = 2.8, 95% CI = 1.2 to 6.3; P =. 01) cancer cohorts. Conclusions Our results suggest that Ran is required for and is a potential therapeutic target of Myc-driven cancer progression in both breast and lung cancers. © 2013 The Author.
Resumo:
Double-stranded RNA (dsRNA) induces an endogenous sequence-specific RNA degradation mechanism in most eukaryotic cells. The mechanism can be harnessed to silence genes in plants by expressing self-complementary single-stranded (hairpin) RNA in which the duplexed region has the same sequence as part of the target gene's mRNA. We describe a number of plasmid vectors for generating hairpin RNAs, including those designed for high-throughput cloning, and provide protocols for their use.
Resumo:
A series of improved vectors have been constructed that are suitable for use in Agrobacterium tumefaciens-mediated monocot transformation. These binary vectors have several useful features, including the selectable marker genes bar (phosphinothricin resistance) or hph (hygromycin resistance) driven by either the cauliflower mosaic virus (CaMV) 35S promoter or the maize ubiquitin promoter, a high-copy-number replication origin that allows reliable mini-prep DNA isolation from Escherichia coli, and a polylinker sequence into which target genes can be easily inserted. A significant improvement has been made to the hph gene by the introduction of an intron into its coding region. The presence of the intron abolishes hph expression in A. tumefaciens, rendering the bacterium susceptible to the selective agent hygromycin B. The use of such an intron-hph vector thus enables the antibiotic in plant culture media to function as both a selective agent for transformed tissue and as a contraselective agent for A. tumefaciens growth, thus minimising the overgrowth of A. tumefaciens on plant tissues during transformation. Furthermore, the intron appears to be correctly spliced in plant cells and significantly enhances hph expression in transformed rice tissue. In our experiments, the use of the intron-hph vector increased the frequency of rice transformation and has enabled the production of transgenic barley.
Resumo:
In plant cells, DICER-LIKE4 processes perfectly double-stranded RNA (dsRNA) into short interfering (si) RNAs, and DICER-LIKE1 generates micro (mi) RNAs from primary miRNA transcripts (pri-miRNA) that form fold-back structures of imperfectly dsRNA. Both si and miRNAs direct the endogenous endonuclease, ARGONAUTE1 to cleave complementary target single-stranded RNAs and either small RNA (sRNA)-directed pathway can be harnessed to silence genes in plants. A routine way of inducing and directing RNA silencing by siRNAs is to express self-complementary single-stranded hairpin RNA (hpRNA), in which the duplexed region has the same sequence as part of the target gene's mRNA. Artificial miRNA (amiRNA)-mediated silencing uses an endogenous pri-miRNA, in which the original miRNA/miRNA* sequence has been replaced with a sequence complementary to the new target gene. In this chapter, we describe the plasmid vector systems routinely used by our research group for the generation of either hpRNA-derived siRNAs or amiRNAs.
Resumo:
Efficient transformation of barley cv. Schooner was achieved using Agrobacterium delivery, hygromycin or bialaphos selection and embryogenic callus. Using this system, transgenic plants were generated that contained either the green fluorescent protein gene, or transgenes derived from barley yellow dwarf (BYDV) and cereal yellow dwarf (CYDV) viruses. Many of these plants contained 1-3 transgene copies that were inherited in a simple Mendelian manner. Some plants containing BYDV and/or CYDV derived transgenes showed reduced virus symptoms and rates of viral replication when challenged with the appropriate virus. The ability to transform Schooner is a significant advance for the Australian barley industry, as this elite malting variety is, and has for the last 15 years been, the most widely grown barley variety in eastern Australia.