927 resultados para User Profiling
Resumo:
Neuropathic pain may arise following peripheral nerve injury though the molecular mechanisms associated with this are unclear. We used proteomic profiling to examine changes in protein expression associated with the formation of hyper-excitable neuromas derived from rodent saphenous nerves. A two-dimensional difference gel electrophoresis ( 2D-DIGE) profiling strategy was employed to examine protein expression changes between developing neuromas and normal nerves in whole tissue lysates. We found around 200 proteins which displayed a > 1.75-fold change in expression between neuroma and normal nerve and identified 55 of these proteins using mass spectrometry. We also used immunoblotting to examine the expression of low-abundance ion channels Nav1.3, Nav1.8 and calcium channel alpha 2 delta-1 subunit in this model, since they have previously been implicated in neuronal hyperexcitability associated with neuropathic pain. Finally, S(35)methionine in vitro labelling of neuroma and control samples was used to demonstrate local protein synthesis of neuron-specific genes. A number of cytoskeletal proteins, enzymes and proteins associated with oxidative stress were up-regulated in neuromas, whilst overall levels of voltage-gated ion channel proteins were unaffected. We conclude that altered mRNA levels reported in the somata of damaged DRG neurons do not necessarily reflect levels of altered proteins in hyper-excitable damaged nerve endings. An altered repertoire of protein expression, local protein synthesis and topological re-arrangements of ion channels may all play important roles in neuroma hyper-excitability.
Resumo:
The paper is an investigation of the exchange of ideas and information between an architect and building users in the early stages of the building design process before the design brief or any drawings have been produced. The purpose of the research is to gain insight into the type of information users exchange with architects in early design conversations and to better understand the influence the format of design interactions and interactional behaviours have on the exchange of information. We report an empirical study of pre-briefing conversations in which the overwhelming majority of the exchanges were about the functional or structural attributes of space, discussion that touched on the phenomenological, perceptual and the symbolic meanings of space were rare. We explore the contextual features of meetings and the conversational strategies taken by the architect to prompt the users for information and the influence these had on the information provided. Recommendations are made on the format and structure of pre-briefing conversations and on designers' strategies for raising the level of information provided by the user beyond the functional or structural attributes of space.
Resumo:
It is evident that quantitative information on different microbial groups and their contribution in terms of activity in the gastrointestinal (GI) tract of humans and animals is required in order to formulate functional diets targeting improved gut function and host health. In this work, quantitative information on levels and spatial distributions of Bacteroides spp, Eubacterium spp, Clostridium spp, Escherichia coli, Bifidobacterium spp and Lactobacillus/Enterococcus spp. along the porcine large intestine was investigated using 16S rRNA targeted probes and fluorescent in situ hybridisation (FISH). Caecum, ascending colon (AC) and rectum luminal digesta from three groups of individually housed growing pigs fed either a corn-soybean basal diet (CON diet) or a prebiotic diet containing 10 g/kg oligofructose (FOS diet) or trans-galactooligosaccharides (TOS diet) at the expense of cornstarch were analysed. DAPI staining was used to enumerate total number of cells in the samples. Populations of total cells, Bacteroides, Eubacterium, Clostridium and Bifidobacterium, declined significantly (P < 0.05) from caecum to rectum, and were not affected by dietary treatments. Populations of Lactobacillus/ Enterococcus and E coli did not differ throughout the large intestine. The relative percent (%) contribution of each bacterial group to the total cell count did not differ between caecum and rectum, with the exception of Eubacterium that was higher in the AC digesta. FISH analysis showed that the sum of all bacterial groups made up a small percentage of the total cells, which was 12.4%, 21.8% and 10.3% in caecum, AC and rectum, respectively. This supports the view that in swine, the diversity of GI microflora might be higher compared to other species. In terms of microflora metabolic activity, the substantially higher numerical trends seen in FOS and TOS treatments regarding total volatile fatty acid, acetate concentrations and glycolytic activities, it could be postulated that FOS and TOS promoted saccharolytic activities in the porcine colon. (c) 2006 Elsevier Ltd. All rights reserved.
Resumo:
Abstract. This paper presents the User-Intimate Requirements Hierarchy Resolution Framework (UI-REF) based on earlier work (Badii 1997-2008) to optimise the requirements engineering process particularly to support userintimate interactive systems co-design. The stages of the UI- EF framework for requirements resolution-and-prioritisation are described. UI-REF has been established to ensure that the most-deeply-valued needs of the majority of stakeholders are elicited and ranked, and the root rationale for requirements evolution is trace-able and contextualised so as to help resolve stakeholder conflicts. UI-REF supports the dynamically evolving requirements of the users in the context of digital economy as under-pinned by online service provisioning. Requirements prioritisation in UI-REF is fully resolved while a promotion path for lower priority requirements is delineated so as to ensure that as the requirements evolve so will their resolution and prioritisation.
Resumo:
An extensive set of machine learning and pattern classification techniques trained and tested on KDD dataset failed in detecting most of the user-to-root attacks. This paper aims to provide an approach for mitigating negative aspects of the mentioned dataset, which led to low detection rates. Genetic algorithm is employed to implement rules for detecting various types of attacks. Rules are formed of the features of the dataset identified as the most important ones for each attack type. In this way we introduce high level of generality and thus achieve high detection rates, but also gain high reduction of the system training time. Thenceforth we re-check the decision of the user-to- root rules with the rules that detect other types of attacks. In this way we decrease the false-positive rate. The model was verified on KDD 99, demonstrating higher detection rates than those reported by the state- of-the-art while maintaining low false-positive rate.
Resumo:
Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in building automation, healthcare and agriculture. In the EU project Hydra1 highlevel security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios especially in the user domains of building automation, healthcare, and agriculture. This paper gives a short introduction to the Hydra project, its user domains and its approach to ensure security by design. Based on the results of a focus group analysis of the building automation domain typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta Model. How concepts such as context security, semantic security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of a technical building automation scenario.
Resumo:
Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in different domains. In the EU project Hydra high-level security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the. Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios. This paper gives a short introduction to the Hydra project and its approach to ensure security by design. Based on the results of a focus group analysis of the user domain "building automation" typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta-Model. How concepts such as context, semantic resolution of security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of it technical building automation scenario.