965 resultados para diagnostic techniques and procedure
Resumo:
Granulation is one of the fundamental operations in particulate processing and has a very ancient history and widespread use. Much fundamental particle science has occurred in the last two decades to help understand the underlying phenomena. Yet, until recently the development of granulation systems was mostly based on popular practice. The use of process systems approaches to the integrated understanding of these operations is providing improved insight into the complex nature of the processes. Improved mathematical representations, new solution techniques and the application of the models to industrial processes are yielding better designs, improved optimisation and tighter control of these systems. The parallel development of advanced instrumentation and the use of inferential approaches provide real-time access to system parameters necessary for improvements in operation. The use of advanced models to help develop real-time plant diagnostic systems provides further evidence of the utility of process system approaches to granulation processes. This paper highlights some of those aspects of granulation. (c) 2005 Elsevier Ltd. All rights reserved.
Resumo:
Aims This paper presents the recommendations, developed from a 3-year consultation process, for a program of research to underpin the development of diagnostic concepts and criteria in the Substance Use Disorders section of the Diagnostic and Statistical Manual of Mental Disorders (DSM) and potentially the relevant section of the next revision of the International Classification of Diseases (ICD). Methods A preliminary list of research topics was developed at the DSM-V Launch Conference in 2004. This led to the presentation of articles on these topics at a specific Substance Use Disorders Conference in February 2005, at the end of which a preliminary list of research questions was developed. This was further refined through an iterative process involving conference participants over the following year. Results Research questions have been placed into four categories: (1) questions that could be addressed immediately through secondary analyses of existing data sets; (2) items likely to require position papers to propose criteria or more focused questions with a view to subsequent analyses of existing data sets; (3) issues that could be proposed for literature reviews, but with a lower probability that these might progress to a data analytic phase; and (4) suggestions or comments that might not require immediate action, but that could be considered by the DSM-V and ICD 11 revision committees as part of their deliberations. Conclusions A broadly based research agenda for the development of diagnostic concepts and criteria for substance use disorders is presented.
Resumo:
Aims paper describes the background to the establishment of the Substance Use Disorders Workgroup, which was charged with developing the research agenda for the development of the next edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM). It summarizes 18 articles that were commissioned to inform that process. Methods A preliminary list of research topics, developed at the DSM-V Launch Conference in 2004, led to the identification of subjects that were subject to formal presentations and detailed discussion at the Substance Use Disorders Conference in February 2005. Results The 18 articles presented in this supplement examine: (1) categorical versus dimensional diagnoses; (2) the neurobiological basis of substance use disorders; (3) social and cultural perspectives; (4) the crosswalk between DSM-IV and the International Classification of Diseases Tenth Revision (ICD-10); (5) comorbidity of substance use disorders and mental health disorders; (6) subtypes of disorders; (7) issues in adolescence; (8) substance-specific criteria; (9) the place of non-substance addictive disorders; and (10) the available research resources. Conclusions In the final paper a broadly based research agenda for the development of diagnostic concepts and criteria for substance use disorders is presented.
Resumo:
Background. We describe the development, reliability and applications of the Diagnostic Interview for Psychoses (DIP), a comprehensive interview schedule for psychotic disorders. Method. The DIP is intended for use by interviewers with a clinical background and was designed to occupy the middle ground between fully structured, lay-administered schedules, and semi-structured., psychiatrist-administered interviews. It encompasses four main domains: (a) demographic data; (b) social functioning and disability; (c) a diagnostic module comprising symptoms, signs and past history ratings; and (d) patterns of service utilization Lind patient-perceived need for services. It generates diagnoses according to several sets of criteria using the OPCRIT computerized diagnostic algorithm and can be administered either on-screen or in a hard-copy format. Results. The DIP proved easy to use and was well accepted in the field. For the diagnostic module, inter-rater reliability was assessed on 20 cases rated by 24 clinicians: good reliability was demonstrated for both ICD-10 and DSM-III-R diagnoses. Seven cases were interviewed 2-11 weeks apart to determine test-retest reliability, with pairwise agreement of 0.8-1.0 for most items. Diagnostic validity was assessed in 10 cases, interviewed with the DIP and using the SCAN as 'gold standard': in nine cases clinical diagnoses were in agreement. Conclusions. The DIP is suitable for use in large-scale epidemiological studies of psychotic disorders. as well as in smaller Studies where time is at a premium. While the diagnostic module stands on its own, the full DIP schedule, covering demography, social functioning and service utilization makes it a versatile multi-purpose tool.
Resumo:
At present there is not a reliable vaccine against herpes virus. Viral protein vaccines as yet have proved unsuccessful to meet the challenge of raising an appropriate immune response. Cantab Pharmaceuticals has produced a virus vaccine that can undergo one round of replication in the recipient in order to produce a more specific immune reaction. This virus is called Disabled Infectious Single Cycle Herpes Simplex Virus (DISC HSV) which has been derived by deleting the essential gH gene from a type 2 herpes virus. This vaccine has been proven to be effective in animal studies. Existing methods for the purification of viruses rely on laboratory techniques and for vaccine production would be on a far too small a scale. There is therefore a need for new virus purification methods to be developed in order to meet these large scale needs. An integrated process for the manufacture of a purified recombinant DISC HSV is described. The process involves culture of complementing Vero (CR2) cells, virus infection and manufacture, virus harvesting and subsequent downstream processing. The identification of suitable growth parameters for the complementing cell line and optimal limes for both infection and harvest are addressed. Various traditional harvest methods were investigated and found not to be suitable for a scaled up process. A method of harvesting, that exploits the elution of cell associated viruses by the competitive binding of exogenous heparin to virus envelope gC proteins, is described and is shown to yield significantly less contaminated process streams than sonication or osmotic approaches that involve cell rupture (with> 10-fold less complementing cell protein). High concentrations of salt (>0.8M NaCl) exhibit the same effect, although the high osmotic strength ruptures cells and increase the contamination of the process stream. This same heparin-gC protein affinity interaction is also shown to provide an efficient adsorptive purification procedure for herpes viruses which avoids the need to pre-treat the harvest material, apart from clarification, prior to chromatography. Subsequent column eluates provide product fractions with a 100-fold increase in virus titre and low levels of complementing cell protein and DNA (0.05 pg protein/pfu and 1.2 x 104 pg DNA/pfu respectively).
Resumo:
A range of chromia pillared montmorillonite and tin oxide pillared laponite clay catalysts, as well as new pillared clay materials such as cerium and europium oxide pillared montmorillonites were synthesised. Methods included both conventional ion exchange techniques and microwave enhanced methods to improve performance and/or reduce preparation time. These catalytic materials were characterised in detail both before and after use in order to study the effect of the preparation parameters (starting material, preparation method, pillaring species, hydroxyl to metal ratio etc.) and the hydro cracking procedure on their properties. This led to a better understanding of the nature of their structure and catalytic operation. These catalysts were evaluated with regards to their performance in hydrocracking coal derived liquids in a conventional microbomb reactor (carried out at Imperial College). Nearly all catalysts displayed better conversions when reused. The chromia pillared montmorillonite CM3 and the tin oxide pillared laponite SL2a showed the best "conversions". The intercalation of chromium in the form of chromia (Cr203) in the interlayer clearly increased conversion. This was attributed to the redox activity of the chromia pillar. However, this increase was not proportional to the increase in chromium content or basal spacing. In the case of tin oxide pillared laponite, the catalytic activity might have been a result of better access to the acid sites due to the delaminated nature of laponite, whose activity was promoted by the presence of tin oxide. The manipulation of the structural properties of the catalysts via pillaring did not seem to have any effect on the catalysts' activity. This was probably due to the collapse of the pillars under hydrocracking conditions as indicated by the similar basal spacing of the catalysts after use. However, the type of the pillaring species had a significant effect on conversion. Whereas pillaring with chromium and tin oxides increased the conversion exhibited by the parent clays, pillaring with cerium and europium oxides appeared to have a detrimental effect. The relatively good performance of the parent clays was attributed to their acid sites, coupled with their macropores which are able to accommodate the very high molecular mass of coal derived liquids. A microwave reactor operating at moderate conditions was modified for hydro cracking coal derived liquids and tested with the conventional catalyst NiMo on alumina. It was thought that microwave irradiation could enable conversion to occur at milder conditions than those conventionally used, coupled with a more effective use of hydrogen. The latter could lead to lower operating costs making the process cost effective. However, in practice excessive coke deposition took place leading to negative total conversion. This was probably due to a very low hydrogen pressure, unable to have any hydro cracking effect even under microwave irradiation. The decomposition of bio-oil under microwave irradiation was studied, aiming to identify the extent to which the properties of bio-oil change as a function of time, temperature, mode of heating, presence of char and catalyst. This information would be helpful not only for upgrading bio-oil to transport fuels, but also for any potential fuel application. During this study the rate constants of bio-oil's decomposition were calculated assuming first order kinetics.
Resumo:
Many planning and control tools, especially network analysis, have been developed in the last four decades. The majority of them were created in military organization to solve the problem of planning and controlling research and development projects. The original version of the network model (i.e. C.P.M/PERT) was transplanted to the construction industry without the consideration of the special nature and environment of construction projects. It suited the purpose of setting up targets and defining objectives, but it failed in satisfying the requirement of detailed planning and control at the site level. Several analytical and heuristic rules based methods were designed and combined with the structure of C.P.M. to eliminate its deficiencies. None of them provides a complete solution to the problem of resource, time and cost control. VERT was designed to deal with new ventures. It is suitable for project evaluation at the development stage. CYCLONE, on the other hand, is concerned with the design and micro-analysis of the production process. This work introduces an extensive critical review of the available planning techniques and addresses the problem of planning for site operation and control. Based on the outline of the nature of site control, this research developed a simulation based network model which combines part of the logics of both VERT and CYCLONE. Several new nodes were designed to model the availability and flow of resources, the overhead and operating cost and special nodes for evaluating time and cost. A large software package is written to handle the input, the simulation process and the output of the model. This package is designed to be used on any microcomputer using MS-DOS operating system. Data from real life projects were used to demonstrate the capability of the technique. Finally, a set of conclusions are drawn regarding the features and limitations of the proposed model, and recommendations for future work are outlined at the end of this thesis.
Resumo:
Report published in the Proceedings of the National Conference on "Education and Research in the Information Society", Plovdiv, May, 2015
Resumo:
We report a unidirectional frequency dissemination scheme for high-fidelity optical carriers deployable over telecommunication networks. For the first time, a 10 Gb/s Binary Phase Shift Keying (BPSK) signal from an ultra-narrow linewidth laser was transmitted through a field-installed optical fibre with round-trip length of 124 km between Cork City and town of Clonakilty, without inline optical amplification. At the receiver, using coherent communication techniques and optical injection-locking the carrier was recovered with noise suppression. The beat signal between the original carrier at the transmitter and recovered carrier at the receiver shows a linewidth of 2.8 kHz. Long term stability measurements revealed fractional instabilities (True Allan deviation) of 3.3 × 10-14 for 1 s averaging time, prior to phase noise cancellation.
Resumo:
The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.
Resumo:
Recently, wireless network technology has grown at such a pace that scientific research has become a practical reality in a very short time span. Mobile wireless communications have witnessed the adoption of several generations, each of them complementing and improving the former. One mobile system that features high data rates and open network architecture is 4G. Currently, the research community and industry, in the field of wireless networks, are working on possible choices for solutions in the 4G system. 4G is a collection of technologies and standards that will allow a range of ubiquitous computing and wireless communication architectures. The researcher considers one of the most important characteristics of future 4G mobile systems the ability to guarantee reliable communications from 100 Mbps, in high mobility links, to as high as 1 Gbps for low mobility users, in addition to high efficiency in the spectrum usage. On mobile wireless communications networks, one important factor is the coverage of large geographical areas. In 4G systems, a hybrid satellite/terrestrial network is crucial to providing users with coverage wherever needed. Subscribers thus require a reliable satellite link to access their services when they are in remote locations, where a terrestrial infrastructure is unavailable. Thus, they must rely upon satellite coverage. Good modulation and access technique are also required in order to transmit high data rates over satellite links to mobile users. This technique must adapt to the characteristics of the satellite channel and also be efficient in the use of allocated bandwidth. Satellite links are fading channels, when used by mobile users. Some measures designed to approach these fading environments make use of: (1) spatial diversity (two receive antenna configuration); (2) time diversity (channel interleaver/spreading techniques); and (3) upper layer FEC. The author proposes the use of OFDM (Orthogonal Frequency Multiple Access) for the satellite link by increasing the time diversity. This technique will allow for an increase of the data rate, as primarily required by multimedia applications, and will also optimally use the available bandwidth. In addition, this dissertation approaches the use of Cooperative Satellite Communications for hybrid satellite/terrestrial networks. By using this technique, the satellite coverage can be extended to areas where there is no direct link to the satellite. For this purpose, a good channel model is necessary.
Resumo:
Smokeless powder additives are usually detected by their extraction from post-blast residues or unburned powder particles followed by analysis using chromatographic techniques. This work presents the first comprehensive study of the detection of the volatile and semi-volatile additives of smokeless powders using solid phase microextraction (SPME) as a sampling and pre-concentration technique. Seventy smokeless powders were studied using laboratory based chromatography techniques and a field deployable ion mobility spectrometer (IMS). The detection of diphenylamine, ethyl and methyl centralite, 2,4-dinitrotoluene, diethyl and dibutyl phthalate by IMS to associate the presence of these compounds to smokeless powders is also reported for the first time. A previously reported SPME-IMS analytical approach facilitates rapid sub-nanogram detection of the vapor phase components of smokeless powders. A mass calibration procedure for the analytical techniques used in this study was developed. Precise and accurate mass delivery of analytes in picoliter volumes was achieved using a drop-on-demand inkjet printing method. Absolute mass detection limits determined using this method for the various analytes of interest ranged between 0.03–0.8 ng for the GC-MS and between 0.03–2 ng for the IMS. Mass response graphs generated for different detection techniques help in the determination of mass extracted from the headspace of each smokeless powder. The analyte mass present in the vapor phase was sufficient for a SPME fiber to extract most analytes at amounts above the detection limits of both chromatographic techniques and the ion mobility spectrometer. Analysis of the large number of smokeless powders revealed that diphenylamine was present in the headspace of 96% of the powders. Ethyl centralite was detected in 47% of the powders and 8% of the powders had methyl centralite available for detection from the headspace sampling of the powders by SPME. Nitroglycerin was the dominant peak present in the headspace of the double-based powders. 2,4-dinitrotoluene which is another important headspace component was detected in 44% of the powders. The powders therefore have more than one headspace component and the detection of a combination of these compounds is achievable by SPME-IMS leading to an association to the presence of smokeless powders.
Resumo:
The purpose of this study is to investigate supervisory support as a moderator of the effects of role conflict and role ambiguity on emotional exhaustion and job satisfaction. This study also examines the moderating role of supervisory support on the relationship between emotional exhaustion and job satisfaction. Data were collected from a sample of frontline hotel employees in Northern Cyprus. The aforementioned relationships were tested based on hierarchical multiple regression analysis. The results demonstrate that supervisory support mitigates the impact of role conflict on emotional exhaustion and further reveal that supervisory support reduces the effect of emotional exhaustion on job satisfaction. There is no empirical support for the rest of the hypothesized relationships. Implications of the empirical results are discussed, and future research directions are offered.
Resumo:
Interest in the health of marine mammals has increased due, in part, to the attention given to human impact on the marine environment. Recent mass strandings of the Atlantic bottlenose dolphin (Tursiops truncatus) and rising mortalities of the endangered Florida manatee (Trichechus manatus latirostris) have raised questions on the extent to which pollution, infectious disease, "stress," and captivity influence the immune system of these animals. This study has provided the first in-depth characterization of immunocytes in the peripheral blood of dolphins (n = 190) and manatees (n = 56). Immunocyte morphology and baseline values were determined in clinically normal animals under free-ranging, stranded and captive living conditions as well as by age and sex. Additionally, immunocyte population dynamics were characterized in sick animals. This was accomplished with traditional cytochemical techniques and new lymphocyte phenotyping methodology which was validated in this study. Traditional cytochemical techniques demonstrated that blood immunocyte morphology and cell numbers are similar to terrestrial mammals with some notable exceptions. The manatee heterophilic granulocyte is a morphologically unique cell and probably functions similarly to the typical mammalian neutrophil. Eosinophils were rarely found in manatees but were uncommonly high in healthy and sick dolphins. Basophils were not identified. Manatees had higher total lymphocyte numbers compared to dolphins and most terrestrial mammals. Lymphocyte subsets identified in healthy animals included T$\rm\sb{h}$, T$\rm\sb{c/s}$, B and NK cells. Dolphin and manatee T and B cell values were higher than those reported in man and most terrestrial mammals. The manatee has extraordinarily high absolute numbers of circulating T$\rm\sb{h}$ cells which suggests an enhanced immunological response capability. With few exceptions, immunocyte types and absolute numbers were not significantly different between free-ranging, stranded and captive categories or between sex and age categories. The evaluation of immunocyte dynamics in various disease states demonstrated a wide variation in cellular responses which provided new insights into innate, humoral and cell-mediated immunity in these species. Additionally, this study demonstrated that lymphocyte phenotyping has diagnostic significance and could be developed into a potential indicator of immunocompetence in both free-ranging and captive dolphin and manatee populations.
Resumo:
The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.