993 resultados para immune monitoring
Resumo:
This paper presents a comprehensive discussion of vegetation management approaches in power line corridors based on aerial remote sensing techniques. We address three issues 1) strategies for risk management in power line corridors, 2) selection of suitable platforms and sensor suite for data collection and 3) the progress in automated data processing techniques for vegetation management. We present initial results from a series of experiments and, challenges and lessons learnt from our project.
Resumo:
Acoustic emission (AE) is the phenomenon where high frequency stress waves are generated by rapid release of energy within a material by sources such as crack initiation or growth. AE technique involves recording these stress waves by means of sensors placed on the surface and subsequent analysis of the recorded signals to gather information such as the nature and location of the source. It is one of the several diagnostic techniques currently used for structural health monitoring (SHM) of civil infrastructure such as bridges. Some of its advantages include ability to provide continuous in-situ monitoring and high sensitivity to crack activity. But several challenges still exist. Due to high sampling rate required for data capture, large amount of data is generated during AE testing. This is further complicated by the presence of a number of spurious sources that can produce AE signals which can then mask desired signals. Hence, an effective data analysis strategy is needed to achieve source discrimination. This also becomes important for long term monitoring applications in order to avoid massive date overload. Analysis of frequency contents of recorded AE signals together with the use of pattern recognition algorithms are some of the advanced and promising data analysis approaches for source discrimination. This paper explores the use of various signal processing tools for analysis of experimental data, with an overall aim of finding an improved method for source identification and discrimination, with particular focus on monitoring of steel bridges.
Resumo:
Bridges are an important part of a nation’s infrastructure and reliable monitoring methods are necessary to ensure their safety and efficiency. Most bridges in use today were built decades ago and are now subjected to changes in load patterns that can cause localized distress, which can result in bridge failure if not corrected. Early detection of damage helps in prolonging lives of bridges and preventing catastrophic failures. This paper briefly reviews the various technologies currently used in health monitoring of bridge structures and in particular discusses the application and challenges of acoustic emission (AE) technology. Some of the results from laboratory experiments on a bridge model are also presented. The main objectives of these experiments are source localisation and assessment. The findings of the study can be expected to enhance the knowledge of acoustic emission process and thereby aid in the development of an effective bridge structure diagnostics system.
Resumo:
This thesis employs the theoretical fusion of disciplinary knowledge, interlacing an analysis from both functional and interpretive frameworks and applies these paradigms to three concepts—organisational identity, the balanced scorecard performance measurement system, and control. As an applied thesis, this study highlights how particular public sector organisations are using a range of multi-disciplinary forms of knowledge constructed for their needs to achieve practical outcomes. Practical evidence of this study is not bound by a single disciplinary field or the concerns raised by academics about the rigorous application of academic knowledge. The study’s value lies in its ability to explore how current communication and accounting knowledge is being used for practical purposes in organisational life. The main focus of this thesis is on identities in an organisational communication context. In exploring the theoretical and practical challenges, the research questions for this thesis were formulated as: 1. Is it possible to effectively control identities in organisations by the use of an integrated performance measurement system—the balanced scorecard—and if so, how? 2. What is the relationship between identities and an integrated performance measurement system—the balanced scorecard—in the identity construction process? Identities in the organisational context have been extensively discussed in graphic design, corporate communication and marketing, strategic management, organisational behaviour, and social psychology literatures. Corporate identity is the self-presentation of the personality of an organisation (Van Riel, 1995; Van Riel & Balmer, 1997), and organisational identity is the statement of central characteristics described by members (Albert & Whetten, 2003). In this study, identity management is positioned as a strategically complex task, embracing not only logo and name, but also multiple dimensions, levels and facets of organisational life. Responding to the collaborative efforts of researchers and practitioners in identity conceptualisation and methodological approaches, this dissertation argues that analysis can be achieved through the use of an integrated framework of identity products, patternings and processes (Cornelissen, Haslam, & Balmer, 2007), transforming conceptualisations of corporate identity, organisational identity and identification studies. Likewise, the performance measurement literature from the accounting field now emphasises the importance of ‘soft’ non-financial measures in gauging performance—potentially allowing the monitoring and regulation of ‘collective’ identities (Cornelissen et al., 2007). The balanced scorecard (BSC) (Kaplan & Norton, 1996a), as the selected integrated performance measurement system, quantifies organisational performance under the four perspectives of finance, customer, internal process, and learning and growth. Broadening the traditional performance measurement boundary, the BSC transforms how organisations perceived themselves (Vaivio, 2007). The rhetorical and communicative value of the BSC has also been emphasised in organisational self-understanding (Malina, Nørreklit, & Selto, 2007; Malmi, 2001; Norreklit, 2000, 2003). Thus, this study establishes a theoretical connection between the controlling effects of the BSC and organisational identity construction. Common to both literatures, the aspects of control became the focus of this dissertation, as ‘the exercise or act of achieving a goal’ (Tompkins & Cheney, 1985, p. 180). This study explores not only traditional technical and bureaucratic control (Edwards, 1981), but also concertive control (Tompkins & Cheney, 1985), shifting the locus of control to employees who make their own decisions towards desired organisational premises (Simon, 1976). The controlling effects on collective identities are explored through the lens of the rhetorical frames mobilised through the power of organisational enthymemes (Tompkins & Cheney, 1985) and identification processes (Ashforth, Harrison, & Corley, 2008). In operationalising the concept of control, two guiding questions were developed to support the research questions: 1.1 How does the use of the balanced scorecard monitor identities in public sector organisations? 1.2 How does the use of the balanced scorecard regulate identities in public sector organisations? This study adopts qualitative multiple case studies using ethnographic techniques. Data were gathered from interviews of 41 managers, organisational documents, and participant observation from 2003 to 2008, to inform an understanding of organisational practices and members’ perceptions in the five cases of two public sector organisations in Australia. Drawing on the functional and interpretive paradigms, the effective design and use of the systems, as well as the understanding of shared meanings of identities and identifications are simultaneously recognised. The analytical structure guided by the ‘bracketing’ (Lewis & Grimes, 1999) and ‘interplay’ strategies (Schultz & Hatch, 1996) preserved, connected and contrasted the unique findings from the multi-paradigms. The ‘temporal bracketing’ strategy (Langley, 1999) from the process view supports the comparative exploration of the analysis over the periods under study. The findings suggest that the effective use of the BSC can monitor and regulate identity products, patternings and processes. In monitoring identities, the flexible BSC framework allowed the case study organisations to monitor various aspects of finance, customer, improvement and organisational capability that included identity dimensions. Such inclusion legitimises identity management as organisational performance. In regulating identities, the use of the BSC created a mechanism to form collective identities by articulating various perspectives and causal linkages, and through the cascading and alignment of multiple scorecards. The BSC—directly reflecting organisationally valued premises and legitimised symbols—acted as an identity product of communication, visual symbols and behavioural guidance. The selective promotion of the BSC measures filtered organisational focus to shape unique identity multiplicity and characteristics within the cases. Further, the use of the BSC facilitated the assimilation of multiple identities by controlling the direction and strength of identifications, engaging different groups of members. More specifically, the tight authority of the BSC framework and systems are explained both by technical and bureaucratic controls, while subtle communication of organisational premises and information filtering is achieved through concertive control. This study confirms that these macro top-down controls mediated the sensebreaking and sensegiving process of organisational identification, supporting research by Ashforth, Harrison and Corley (2008). This study pays attention to members’ power of self-regulation, filling minor premises of the derived logic of their organisation through the playing out of organisational enthymemes (Tompkins & Cheney, 1985). Members are then encouraged to make their own decisions towards the organisational premises embedded in the BSC, through the micro bottom-up identification processes including: enacting organisationally valued identities; sensemaking; and the construction of identity narratives aligned with those organisationally valued premises. Within the process, the self-referential effect of communication encouraged members to believe the organisational messages embedded in the BSC in transforming collective and individual identities. Therefore, communication through the use of the BSC continued the self-producing of normative performance mechanisms, established meanings of identities, and enabled members’ self-regulation in identity construction. Further, this research establishes the relationship between identity and the use of the BSC in terms of identity multiplicity and attributes. The BSC framework constrained and enabled case study organisations and members to monitor and regulate identity multiplicity across a number of dimensions, levels and facets. The use of the BSC constantly heightened the identity attributes of distinctiveness, relativity, visibility, fluidity and manageability in identity construction over time. Overall, this research explains the reciprocal controlling relationships of multiple structures in organisations to achieve a goal. It bridges the gap among corporate and organisational identity theories by adopting Cornelissen, Haslam and Balmer’s (2007) integrated identity framework, and reduces the gap in understanding between identity and performance measurement studies. Parallel review of the process of monitoring and regulating identities from both literatures synthesised the theoretical strengths of both to conceptualise and operationalise identities. This study extends the discussion on positioning identity, culture, commitment, and image and reputation measures in integrated performance measurement systems as organisational capital. Further, this study applies understanding of the multiple forms of control (Edwards, 1979; Tompkins & Cheney, 1985), emphasising the power of organisational members in identification processes, using the notion of rhetorical organisational enthymemes. This highlights the value of the collaborative theoretical power of identity, communication and performance measurement frameworks. These case studies provide practical insights about the public sector where existing bureaucracy and desired organisational identity directions are competing within a large organisational setting. Further research on personal identity and simple control in organisations that fully cascade the BSC down to individual members would provide enriched data. The extended application of the conceptual framework to other public and private sector organisations with a longitudinal view will also contribute to further theory building.
Resumo:
Aim/hypothesis Immune mechanisms have been proposed to play a role in the development of diabetic neuropathy. We employed in vivo corneal confocal microscopy (CCM) to quantify the presence and density of Langerhans cells (LCs) in relation to the extent of corneal nerve damage in Bowman's layer of the cornea in diabetic patients. Methods 128 diabetic patients aged 58±1 yrs with a differing severity of neuropathy based on Neuropathy Deficit Score (NDS—4.7±0.28) and 26 control subjects aged 53±3 yrs were examined. Subjects underwent a full neurological evaluation, evaluation of corneal sensation with non-contact corneal aesthesiometry (NCCA) and corneal nerve morphology using corneal confocal microscopy (CCM). Results The proportion of individuals with LCs was significantly increased in diabetic patients (73.8%) compared to control subjects (46.1%), P=0.001. Furthermore, LC density (no/mm2) was significantly increased in diabetic patients (17.73±1.45) compared to control subjects (6.94±1.58), P=0.001 and there was a significant correlation with age (r=0.162, P=0.047) and severity of neuropathy (r=−0.202, P=0.02). There was a progressive decrease in corneal sensation with increasing severity of neuropathy assessed using NDS in the diabetic patients (r=0.414, P=0.000). Corneal nerve fibre density (P<0.001), branch density (P<0.001) and length (P<0.001) were significantly decreased whilst tortuosity (P<0.01) was increased in diabetic patients with increasing severity of diabetic neuropathy. Conclusion Utilising in vivo corneal confocal microscopy we have demonstrated increased LCs in diabetic patients particularly in the earlier phases of corneal nerve damage suggestive of an immune mediated contribution to corneal nerve damage in diabetes.
Resumo:
The Australian report for the Global Media Monitoring Project 2010 (GMMP 2010) involved a study of 374 stories that were sampled from 26 Australian newspapers, radio and television stations, and internet news services on 10 November 2009. This snapshot of reporting on that day suggests that women are under-represented in the Australian news media as both the sources and creators of news. Females made up only 24% of the 1012 news sources who were heard, read about or seen in the stories that were studied. Neglect of female sources was particularly noticeable in sports news. Women made up only 1% of the 142 sources who were talked about or quoted in sports stories. Female sources of news were disproportionately portrayed as celebrities and victims. Although women made up only 24% of sources overall, they comprised 44% of victims of crimes, accidents, war, health problems, or discrimination. Unsurprisingly, women made up 32% of sources in stories about violent crimes and 29% in stories about disasters, accidents or emergencies – usually in the role of victim. Females were commonly defined in terms of their status as a mother, daughter, wife, sister or other family relationship. Family status was mentioned for 33% of women quoted or discussed in the news stories compared to only 13% of male sources. Women also made up 75% of sources described as homemakers or parents. The Australian GMMP 2010 study also indicates a gender division among the journalists who wrote or presented the news. Only 32% of the stories were written or presented by female reporters and newsreaders. The gender inequality was again most evident in sports journalism. Findings from the Australian report also contributed to the GMMP 2010 Global Report and the Pacific GMMP 2010 Regional Report, which are available at http://whomakesthenews.org/gmmp/gmmp-reports/gmmp-2010-reports
Resumo:
Investigations into the biochemical markers associated with executive function (EF) impairment in children with early and continuously treated phenylketonuria (ECT-PKU) remain largely phenylalanine-only focused, despite experimental data showing that a high phenylalanine:tyrosine (phe:tyr) ratio is more strongly associated with EF deficit than phe alone. A high phe:tyr ratio is hypothesized to lead to a reduction in dopamine synthesis within the brain, which in turn results in the development of EF impairment. This paper provides a snapshot of current practice in the monitoring and/or treatment of tyrosine levels in children with PKU, across 12 countries from Australasia, North America and Europe. Tyrosine monitoring in this population has increased over the last 5 years, with over 80% of clinics surveyed reporting routine monitoring of tyrosine levels in infancy alongside phe levels. Twenty-five percent of clinics surveyed reported actively treating/managing tyrosine levels (with supplemental tyrosine above that contained in PKU formulas) to ensure tyrosine levels remain within normal ranges. Anecdotally, supplemental tyrosine has been reported to ameliorate symptoms of both attention deficit hyperactivity disorder and depression in this population. EF assessment of children with ECT-PKU was likewise highly variable, with 50% of clinics surveyed reporting routine assessments of intellectual function. However when function was assessed, test instruments chosen tended towards global measures of IQ prior to school entry, rather than specific assessment of EF development. Further investigation of the role of tyrosine and its relationship with phe and EF development is needed to establish whether routine tyrosine monitoring and increased supplementation is recommended.
Resumo:
Ocean processes are dynamic and complex events that occur on multiple different spatial and temporal scales. To obtain a synoptic view of such events, ocean scientists focus on the collection of long-term time series data sets. Generally, these time series measurements are continually provided in real or near-real time by fixed sensors, e.g., buoys and moorings. In recent years, an increase in the utilization of mobile sensor platforms, e.g., Autonomous Underwater Vehicles, has been seen to enable dynamic acquisition of time series data sets. However, these mobile assets are not utilized to their full capabilities, generally only performing repeated transects or user-defined patrolling loops. Here, we provide an extension to repeated patrolling of a designated area. Our algorithms provide the ability to adapt a standard mission to increase information gain in areas of greater scientific interest. By implementing a velocity control optimization along the predefined path, we are able to increase or decrease spatiotemporal sampling resolution to satisfy the sampling requirements necessary to properly resolve an oceanic phenomenon. We present a path planning algorithm that defines a sampling path, which is optimized for repeatability. This is followed by the derivation of a velocity controller that defines how the vehicle traverses the given path. The application of these tools is motivated by an ongoing research effort to understand the oceanic region off the coast of Los Angeles, California. The computed paths are implemented with the computed velocities onto autonomous vehicles for data collection during sea trials. Results from this data collection are presented and compared for analysis of the proposed technique.
Resumo:
Autonomous Underwater Vehicles (AUVs) are revolutionizing oceanography through their versatility, autonomy and endurance. However, they are still an underutilized technology. For coastal operations, the ability to track a certain feature is of interest to ocean scientists. Adaptive and predictive path planning requires frequent communication with significant data transfer. Currently, most AUVs rely on satellite phones as their primary communication. This communication protocol is expensive and slow. To reduce communication costs and provide adequate data transfer rates, we present a hardware modification along with a software system that provides an alternative robust disruption- tolerant communications framework enabling cost-effective glider operation in coastal regions. The framework is specifically designed to address multi-sensor deployments. We provide a system overview and present testing and coverage data for the network. Additionally, we include an application of ocean-model driven trajectory design, which can benefit from the use of this network and communication system. Simulation and implementation results are presented for single and multiple vehicle deployments. The presented combination of infrastructure, software development and deployment experience brings us closer to the goal of providing a reliable and cost-effective data transfer framework to enable real-time, optimal trajectory design, based on ocean model predictions, to gather in situ measurements of interesting and evolving ocean features and phenomena.
Resumo:
The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.
Resumo:
Introduces a method to early childhood professionals of observing children as they are involved in everyday play episodes, record children's development and plan for this, while utilising the knowledge and input of the key players in the partnership, parents and teachers.
Resumo:
Problem: Innate immune activation of human cells, for some intracellular pathogens, is advantageous for vacuole morphology and pathogenic viability. It is unknown whether innate immune activation is advantageous to Chlamydia trachomatis viability. ----- ----- Method of study: Innate immune activation of HEp-2 cells during Chlamydia infection was conducted using lipopolysaccharide (LPS), polyI:C, and wedelolactone (innate immune inhibitor) to investigate the impact of these conditions on viability of Chlamydia. ----- ----- Results: The addition of LPS and polyI:C to stimulate activation of the two distinct innate immune pathways (nuclear factor kappa beta and interferon regulatory factor) had no impact on the viability of Chlamydia. However, when compounds targeting either pathway were added in combination with the specific innate immune inhibitor (wedelolactone) a major impact on Chlamydia viability was observed. This impact was found to be due to the induction of apoptosis of the HEp-2 cells under these conditions. ----- ----- Conclusion: This is the first time that induction of apoptosis has been reported in C. trachomatis-infected cells when treated with a combination of innate immune activators and wedelolactone.
Resumo:
Chlamydia trachomatis is an obligate intracellular bacterial pathogen that infects the genital and ocular mucosa of humans, causing infections that can lead to pelvic inflammatory disease, infertility, and blinding trachoma. C. pneumoniae is a respiratory pathogen that is the cause of 12–15% of community-acquired pneumonia. Both chlamydial species were believed to be restricted to the epithelia of the genital, ocular, and respiratory mucosa; however, increasing evidence suggests that both these pathogens can be isolated from peripheral blood of both healthy individuals and patients with inflammatory conditions such as coronary artery disease and asthma. Chlamydia can also be isolated from brain tissues of patients with degenerative neurological disorders such as Alzheimer’s disease and multiple sclerosis, and also from certain lymphomas. An increasing number of in vitro studies suggest that some chlamydial species can infect immune cells, at least at low levels. These infections may alter immune cell function in a way that promotes chlamydial persistence in the host and contributes to the progression of several chronic inflammatory diseases. In this paper, we review the evidence for the growth of Chlamydia in immune cells, particularly monocytes/macrophages and dendritic cells, and describe how infection may affect the function of these cells.
Resumo:
Bridges are valuable assets of every nation. They deteriorate with age and often are subjected to additional loads or different load patterns than originally designed for. These changes in loads can cause localized distress and may result in bridge failure if not corrected in time. Early detection of damage and appropriate retrofitting will aid in preventing bridge failures. Large amounts of money are spent in bridge maintenance all around the world. A need exists for a reliable technology capable of monitoring the structural health of bridges, thereby ensuring they operate safely and efficiently during the whole intended lives. Monitoring of bridges has been traditionally done by means of visual inspection. Visual inspection alone is not capable of locating and identifying all signs of damage, hence a variety of structural health monitoring (SHM) techniques is used regularly nowadays to monitor performance and to assess condition of bridges for early damage detection. Acoustic emission (AE) is one technique that is finding an increasing use in SHM applications of bridges all around the world. The chapter starts with a brief introduction to structural health monitoring and techniques commonly used for monitoring purposes. Acoustic emission technique, wave nature of AE phenomenon, previous applications and limitations and challenges in the use as a SHM technique are also discussed. Scope of the project and work carried out will be explained, followed by some recommendations of work planned in future.