29 resultados para Client puzzle
em Helda - Digital Repository of University of Helsinki
Resumo:
My thesis concerns the plans drawn up by architect Bertel Liljequist (1885 1954) for an industrial corporation and a city in Finland during the interwar years. These were two quite different clients: the Kymi Company operating in Kuusankoski and the City of Helsinki. My study includes the micro-examination of the wider social issues involved. That the industrial community and factories in Kuusankoski be constructed correctly in a way supporting corporate strategy was of primary importance for the company s operations. Through the planning process for Helsinki s abattoirs, I show how a city dealt with the twin problems of hygiene and increasing demand for food resulting from a growth in population. I clarify how society and its economic, political and class structures affected the practice of architecture and its expression in the built environment. I analyse how the different backgrounds and starting points of the clients affected the construction projects under study and architect Bertel Liljequist s work. In studying Liljequist as an industrial designer, I have considered it vital to ascertain the client s intentions and objectives within the framework of the prevailing social situation. I examine the meanings the client wished the architecture to express and also to communicate to those working in the factory and the area as well as to the workers living on company land. The social outlook of the owners and management of Kymi Company implicitly affected the appearance of the factory. A brick fairface for the factories was a safe and natural material at the beginning of the 1920s when taking into consideration the events of the 1918 Civil War. To have built a White factory in the style of a defence building would have been provocative. Outside the factory gates, however, the company supported White architecture. The company used the factory buildings to manifest its power and the dwellings to bind the workers and make them loyal to the company. Architecture was thus one way in which the company manifested its position as the higher and undisputed authority. The role of the City of Helsinki within the planning process was for its officials to provide expert opinions but also to arrange study trips for the architect and the abattoir s general manager. The city also decided on the standard of the design. The city s responsibility for the health of its inhabitants and the requirements of modern meat production can be seen in the minimal architecture and clear functionality of the plant. The architecture left no doubt about the trustworthiness of the modern city. Translation: Michael Wynne-Ellis
Resumo:
This conversation analytical study analyses the interactional practices adopted by speech therapists and their clients during their training in voice therapy. This study also describes how learning takes place during the therapy process. In contrast to traditional voice therapy studies, change is examined here by using qualitative research methodology, namely conversation analysis. This study describes the structures of interaction in voice therapy, shows how the shortcomings in the client s performance are evaluated and corrected and finally, how the voice training sequence and the participation changes during therapy. The database consists of 51 videotaped voice therapy sessions from six clients with voice disorders. The analytic focus is on the practices in one voice training exercise of the trilled /r/. All the sequences of this exercise (in total 36) and all adjacency pairs within (N = 627) were transcribed and analysed in detail. This study shows that voice training consists of successive model imitation adjacency pairs. This adjacency pair works as a resource in voice training. Furthermore, the use of this particular adjacency pair is an institutional practice in all therapies in this study. The structure of interaction in voice training sequences resembles the practices found in aphasia therapy and in speech therapy of children, as well as the practices of educational and counselling interaction and physiotherapy. More than half of the adjacency pairs were expanded to three (or more) part structures as client s responses were typically followed by therapist s feedback. With their feedback turns, therapists: 1) maintain training practice, 2) evaluate the problem of client s performance, 3) deliver information, 4) activate the client to observe the performance and 5) assist her in correcting the performance. This study describes the four different ways that therapists help their clients to improve the performance after encountering a problem. The longitudinal data shows that learning in therapy is manifested in the changing participation. As clients learn to identify their voice features, they can participate in evaluating or correcting their performances by themselves. This study describes the recurrent professional practices of voice therapists and shows how the institutional commitments of voice therapy are managed in and through talk and interaction. The study also provides detailed description of the management of help in voice training. By describing the interaction in training sequences, this study expands the conception of voice rehabilitation and how it can be researched. The results demonstrate that the learning process and therapy outcomes can be assessed by analysing interaction in therapy. Moreover, this analysis lays the foundation for a novel understanding of the practices in speech therapy and for the development of speech therapy theory. By revealing the activities of interaction, it also makes it possible to discuss them explicitly with speech therapy students. Key words: voice therapy, conversation analysis, institutional interaction, learning, change in participation, feedback, evaluation, error correction, self-repair
Resumo:
Väitöskirja on fenomenologinen tutkimus koetusta asiakas-asiantuntijasuhteesta. Tutkimuksen tarkoituksena on selvittää ihmisten välisiä asiakas-asiantuntijatilanteiden suhteita ja siten mahdollistaa asiakkaan hyvinvointia. Tutkimuskohteena on fysioterapiasuhde, jota aiemmin on selvitetty fysioterapeutin parantamisena, asiakkaan terveyden edistämisenä tai vuorovaikutussuhteena. Tässä tutkimuksessa mielenkiinto kohdistuu fysioterapiatilanteissa koettuihin asiakkaiden ja asiantuntijoiden välisiin suhteisiin. Tutkimukseen osallistuivat 16 fysioterapiatilanteen kokenutta asiakasta ja 16 saman tilanteen kokenutta fysioterapeuttia, jotka toimivat tutkimusajankohtana erikoissairaanhoidossa, kunnan terveyskeskuksessa tai yksityisessä fysioterapialaitoksessa. Avoimen yksilöhaastattelun tehtävänä oli kuvata mitä osanottaja koki juuri päättyneessä tilanteessa. Tutkimusaineiston analyysi etenee ensimmäisessä vaiheessa fenomenologisen tutkimuksen mukaan, yksilöllisten ihmisten välisten suhteiden koettujen merkitysten ja merkityskokonaisuuksien analyysiin ja merkitysperspektiivin synteesiin. Tutkimuksen ensimmäisen vaiheen yksilöllisten merkitysperspektiivien perusteella fysioterapiasuhde osoittautui muutossuhteeksi, mikä ei ollut erilainen eri organisaatioissa, vaan siinä ilmeni pedagogisen suhteen oppimisen ja ohjauksen piirteitä. Tutkimuksen toisessa vaiheessa vietiin pedagogisen suhteen mukaisesti yhteen ja vertailtiin yksilöllisten merkitysperspektiivien merkityksiä ja merkityskokonaisuuksia asiakkaiden ja fysioterapian asiantuntijoiden näkökulmina sekä saman tilanteen yhteisenä koettuna näkökulmana. Asiakkaiden näkökulmasta suhteen voimavarana oli hänen kokema kehollinen vieraus, mikä ohjasi asiakas-asiantuntijasuhdetta neljänlaiseen asiakkaan muutossuhteeseen. Fysioterapian asiantuntijoiden näkökulmasta asiaosaamisena oli asiakkaan parantaminen liikkeen tai toiminnan avulla, mikä ohjasi asiakas-asiantuntijasuhdetta asiantuntijan näkökulmasta erilaisiin ohjaussuhteisiin. Samassa tilanteessa asiakkaiden ja asiantuntijan yhteisenä kokemat aukeamat etenivät spontaaneista turvallisuuden ja luottavaisuuden aukeamista aktiivisiin yhteisymmärryksen ja yhteissanoituksen aukeamiin. Pedagoginen suhde avautui merkityskokonaisuuksina joko vain asiakkaalle tai asiantuntijalle tai yhteisenä koettuina pedagogisina aukeamina. Edellä mainituista kolmesta (asiakkaan, asiantuntijan, yhteisenä koettu) näkökulmasta asiakas-asiantuntijasuhde osoittautui tässä tutkimuksessa neljäksi erilaiseksi asiakkaan, asiantuntijan ja yhteytenä koetun näkökulmia yhdistäväksi pedagogiseksi prosessiksi. Tutkimuksen tulosten synteesi osoitti, että pedagogisen prosessin suuntaa muuttavat yhteytenä koettujen aukeamien väliset dialogit, joissa spontaani, yhdessä näkyvä ja yhdessä koettua sanoittava dialogihetket osoittautuivat pedagogista prosessia kääntäviksi mahdollisuuksiksi. Tämän tutkimuksen mukaan vasta aktiivinen yhteistä kieltä tuottava pedagoginen suhde mahdollistaa asiakkaan kokeman kehollisen vierauden ymmärtämisen ja yhteissanoittamisen. Sanoittamalla kokemaansa asiakas voi jakaa kokemaansa toimimattomuutta tutulla kielellä myös muiden kun tilanteessa olleiden kanssa ja siten oppia itsenäisesti ohjaamaan omaa hyvinvointiaan. Tämän tutkimusten tulosten mukaan vain yhdessä (Pentin ja Sarin) tilanteessa pedagoginen prosessi eteni yhteiseksi kieleksi. Tutkimustulokset haastavat kehittämään asiakas-asiantuntijasuhdetta siten, että pedagoginen prosessi voisi toteutua kokonaisuudessaan. Avainsanat: asiakas-asiantuntijasuhde, pedagoginen suhde, fenomenologia, kokemus, merkitysanalyysi, dialogi, fysioterapia
Resumo:
Ei saatavilla
Resumo:
The aim of the study was to find out what kind of view on product quality dressmaker and customer have, how the views differ from each other and how the difference affects dressmaker s work as an entrepreneur. The research data consists of eight thematic interviews: four dressmakers and four customers were interviewed for the study. In the core of customised dressmaking is arelationship between a maker and a client. The product of a dressmaker, a unique dress, is created in an immediate interaction between a dressmaker and a client. Also the quality of a unique dress derives from this interaction. In the results of this study, the views on quality are linked with six themes: dress, process, dressmaker, customer, interaction and enterprise. The dressmakers and the customers agree that the quality of a custom-made dress is based on unique fit. Describing the process the dressmakers insist on the quality of manufacturing. The clients' view on process insists on those phases where they themselves take part: designing and fitting. The personality of the dressmaker is part of quality in both the dressmakers' and the customers' points of view. The dressmakers and the customers are also aware of the customers impact on fulfilling the expectations. The immediate interaction between dressmaker and customer is a key to the unique dressmaking. At its best the interaction is followed by a trusting relationship. Entrustment derives also from a good reputation, which is essential in dressmaker-entrepreneurs marketing strategy. The dressmakers views on quality are product- and manufacturing-based. According to the results of the study there can be seen different types of dressmakers, that emphasise different aspects of quality. At the other end is a manufacturing-based, even transcendent view on quality, which rests on the values of the dressmaker. At the other end lies a customer- and value-based approach, which is founded on fulfilling the expectations and needs of the customer. In their views on quality the customers emphasise the immediate interaction between dressmaker and client. Keywords: quality, dressmaker, customer, entrepreneur
Resumo:
Event-based systems are seen as good candidates for supporting distributed applications in dynamic and ubiquitous environments because they support decoupled and asynchronous many-to-many information dissemination. Event systems are widely used, because asynchronous messaging provides a flexible alternative to RPC (Remote Procedure Call). They are typically implemented using an overlay network of routers. A content-based router forwards event messages based on filters that are installed by subscribers and other routers. The filters are organized into a routing table in order to forward incoming events to proper subscribers and neighbouring routers. This thesis addresses the optimization of content-based routing tables organized using the covering relation and presents novel data structures and configurations for improving local and distributed operation. Data structures are needed for organizing filters into a routing table that supports efficient matching and runtime operation. We present novel results on dynamic filter merging and the integration of filter merging with content-based routing tables. In addition, the thesis examines the cost of client mobility using different protocols and routing topologies. We also present a new matching technique called temporal subspace matching. The technique combines two new features. The first feature, temporal operation, supports notifications, or content profiles, that persist in time. The second feature, subspace matching, allows more expressive semantics, because notifications may contain intervals and be defined as subspaces of the content space. We also present an application of temporal subspace matching pertaining to metadata-based continuous collection and object tracking.
Resumo:
Sensor networks represent an attractive tool to observe the physical world. Networks of tiny sensors can be used to detect a fire in a forest, to monitor the level of pollution in a river, or to check on the structural integrity of a bridge. Application-specific deployments of static-sensor networks have been widely investigated. Commonly, these networks involve a centralized data-collection point and no sharing of data outside the organization that owns it. Although this approach can accommodate many application scenarios, it significantly deviates from the pervasive computing vision of ubiquitous sensing where user applications seamlessly access anytime, anywhere data produced by sensors embedded in the surroundings. With the ubiquity and ever-increasing capabilities of mobile devices, urban environments can help give substance to the ubiquitous sensing vision through Urbanets, spontaneously created urban networks. Urbanets consist of mobile multi-sensor devices, such as smart phones and vehicular systems, public sensor networks deployed by municipalities, and individual sensors incorporated in buildings, roads, or daily artifacts. My thesis is that "multi-sensor mobile devices can be successfully programmed to become the underpinning elements of an open, infrastructure-less, distributed sensing platform that can bring sensor data out of their traditional close-loop networks into everyday urban applications". Urbanets can support a variety of services ranging from emergency and surveillance to tourist guidance and entertainment. For instance, cars can be used to provide traffic information services to alert drivers to upcoming traffic jams, and phones to provide shopping recommender services to inform users of special offers at the mall. Urbanets cannot be programmed using traditional distributed computing models, which assume underlying networks with functionally homogeneous nodes, stable configurations, and known delays. Conversely, Urbanets have functionally heterogeneous nodes, volatile configurations, and unknown delays. Instead, solutions developed for sensor networks and mobile ad hoc networks can be leveraged to provide novel architectures that address Urbanet-specific requirements, while providing useful abstractions that hide the network complexity from the programmer. This dissertation presents two middleware architectures that can support mobile sensing applications in Urbanets. Contory offers a declarative programming model that views Urbanets as a distributed sensor database and exposes an SQL-like interface to developers. Context-aware Migratory Services provides a client-server paradigm, where services are capable of migrating to different nodes in the network in order to maintain a continuous and semantically correct interaction with clients. Compared to previous approaches to supporting mobile sensing urban applications, our architectures are entirely distributed and do not assume constant availability of Internet connectivity. In addition, they allow on-demand collection of sensor data with the accuracy and at the frequency required by every application. These architectures have been implemented in Java and tested on smart phones. They have proved successful in supporting several prototype applications and experimental results obtained in ad hoc networks of phones have demonstrated their feasibility with reasonable performance in terms of latency, memory, and energy consumption.
Resumo:
Portable music players have made it possible to listen to a personal collection of music in almost every situation, and they are often used during some activity to provide a stimulating audio environment. Studies have demonstrated the effects of music on the human body and mind, indicating that selecting music according to situation can, besides making the situation more enjoyable, also make humans perform better. For example, music can boost performance during physical exercises, alleviate stress and positively affect learning. We believe that people intuitively select different types of music for different situations. Based on this hypothesis, we propose a portable music player, AndroMedia, designed to provide personalised music recommendations using the user’s current context and listening habits together with other user’s situational listening patterns. We have developed a prototype that consists of a central server and a PDA client. The client uses Bluetooth sensors to acquire context information and logs user interaction to infer implicit user feedback. The user interface also allows the user to give explicit feedback. Large user interface elements facilitate touch-based usage in busy environments. The prototype provides the necessary framework for using the collected information together with other user’s listening history in a context- enhanced collaborative filtering algorithm to generate context-sensitive recommendations. The current implementation is limited to using traditional collaborative filtering algorithms. We outline the techniques required to create context-aware recommendations and present a survey on mobile context-aware music recommenders found in literature. As opposed to the explored systems, AndroMedia utilises other users’ listening habits when suggesting tunes, and does not require any laborious set up processes.
Resumo:
Current smartphones have a storage capacity of several gigabytes. More and more information is stored on mobile devices. To meet the challenge of information organization, we turn to desktop search. Users often possess multiple devices, and synchronize (subsets of) information between them. This makes file synchronization more important. This thesis presents Dessy, a desktop search and synchronization framework for mobile devices. Dessy uses desktop search techniques, such as indexing, query and index term stemming, and search relevance ranking. Dessy finds files by their content, metadata, and context information. For example, PDF files may be found by their author, subject, title, or text. EXIF data of JPEG files may be used in finding them. User–defined tags can be added to files to organize and retrieve them later. Retrieved files are ranked according to their relevance to the search query. The Dessy prototype uses the BM25 ranking function, used widely in information retrieval. Dessy provides an interface for locating files for both users and applications. Dessy is closely integrated with the Syxaw file synchronizer, which provides efficient file and metadata synchronization, optimizing network usage. Dessy supports synchronization of search results, individual files, and directory trees. It allows finding and synchronizing files that reside on remote computers, or the Internet. Dessy is designed to solve the problem of efficient mobile desktop search and synchronization, also supporting remote and Internet search. Remote searches may be carried out offline using a downloaded index, or while connected to the remote machine on a weak network. To secure user data, transmissions between the Dessy client and server are encrypted using symmetric encryption. Symmetric encryption keys are exchanged with RSA key exchange. Dessy emphasizes extensibility. Also the cryptography can be extended. Users may tag their files with context tags and control custom file metadata. Adding new indexed file types, metadata fields, ranking methods, and index types is easy. Finding files is done with virtual directories, which are views into the user’s files, browseable by regular file managers. On mobile devices, the Dessy GUI provides easy access to the search and synchronization system. This thesis includes results of Dessy synchronization and search experiments, including power usage measurements. Finally, Dessy has been designed with mobility and device constraints in mind. It requires only MIDP 2.0 Mobile Java with FileConnection support, and Java 1.5 on desktop machines.
Resumo:
In recent years, XML has been accepted as the format of messages for several applications. Prominent examples include SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This XML usage is understandable, as the format itself is a well-accepted standard for structured data, and it has excellent support for many popular programming languages, so inventing an application-specific format no longer seems worth the effort. Simultaneously with this XML's rise to prominence there has been an upsurge in the number and capabilities of various mobile devices. These devices are connected through various wireless technologies to larger networks, and a goal of current research is to integrate them seamlessly into these networks. These two developments seem to be at odds with each other. XML as a fully text-based format takes up more processing power and network bandwidth than binary formats would, whereas the battery-powered nature of mobile devices dictates that energy, both in processing and transmitting, be utilized efficiently. This thesis presents the work we have performed to reconcile these two worlds. We present a message transfer service that we have developed to address what we have identified as the three key issues: XML processing at the application level, a more efficient XML serialization format, and the protocol used to transfer messages. Our presentation includes both a high-level architectural view of the whole message transfer service, as well as detailed descriptions of the three new components. These components consist of an API, and an associated data model, for XML processing designed for messaging applications, a binary serialization format for the data model of the API, and a message transfer protocol providing two-way messaging capability with support for client mobility. We also present relevant performance measurements for the service and its components. As a result of this work, we do not consider XML to be inherently incompatible with mobile devices. As the fixed networking world moves toward XML for interoperable data representation, so should the wireless world also do to provide a better-integrated networking infrastructure. However, the problems that XML adoption has touch all of the higher layers of application programming, so instead of concentrating simply on the serialization format we conclude that improvements need to be made in an integrated fashion in all of these layers.
Resumo:
This thesis is an assessment of the hoax hypothesis, mainly propagated in Stephen C. Carlson's 2005 monograph "The Gospel Hoax: Morton Smith's Invention of Secret Mark", which suggests that professor Morton Smith (1915-1991) forged Clement of Alexandria's letter to Theodore. This letter Smith claimed to have discovered as an 18th century copy in the monastery of Mar Saba in 1958. The Introduction narrates the discovery story of Morton Smith and traces the manuscript's whereabouts up to its apparent disappearance in 1990 following with a brief history of scholarship of the MS and some methodological considerations. Chapters 2 and 3 deal with the arguments for the hoax (mainly by Stephen C. Carlson) and against it (mainly Scott G. Brown). Chapter 2 looks at the MS in its physical aspects, and chapter 3 assesses its subject matter. I conclude that some of the details fit reasonably well with the hoax hypothesis, but on the whole the arguments against it are more persuasive. Especially Carlson's use of QDE-analysis (Questioned Document Examination) has many problems. Comparing the handwriting of Clement's letter to Morton Smith's handwriting I conclude that there are some "repeated differences" between them suggesting that Smith is not the writer of the disputed letter. Clement's letter to Theodore derives most likely from antiquity though the exact details of its character are not discussed in length in this thesis. In Chapter 4 I take a special look at Stephen C. Carlson's arguments which propose that Morton Smith hid clues of his identity to the MS and the materials surrounding it. Comparing these alleged clues to known pseudoscientific works I conclude that Carlson utilizes here methods normally reserved for building a conspiracy theory; thus Carlson's hoax hypothesis has serious methodological flaws in respect to these hidden clues. I construct a model of these questionable methods titled "a boisterous pseudohistorical method" that contains three parts: 1) beginning with a question that from the beginning implicitly contains the answer, 2) considering everything will do as evidence for the conspiracy theory, and 3) abandoning probability and thinking literally that everything is connected. I propose that Stephen C. Carlson utilizes these pseudoscientific methods in his unearthing of Morton Smith's "clues". Chapter 5 looks briefly at the literary genre I title "textual puzzle -thriller". Because even biblical scholarship follows the signs of the times, I propose Carlson's hoax hypothesis has its literary equivalents in fiction in titles like Dan Brown's "Da Vinci Code" and in academic works in titles like John Dart's "Decoding Mark". All of these are interested in solving textual puzzles, even though the methodological choices are not acceptable for scholarship. Thus the hoax hypothesis as a whole is alternatively either unpersuasive or plain bad science.
Resumo:
Väitöskirjatutkimuksessa tarkastellaan Taiwanin politiikkaa ensimmäisen vaalien kautta tapahtuneen vallanvaihdon jälkeen (2000) yhteiskunnan rakenteellisen politisoitumisen näkökulmasta. Koska Taiwanilla siirryttiin verettömästi autoritaarisesta yksipuoluejärjestelmästä monipuoluejärjestelmään sitä on pidetty poliittisen muodonmuutoksen mallioppilaana. Aiempi optimismi Taiwanin demokratisoitumisen suhteen on sittemmin vaihtunut pessimismiin, pitkälti yhteiskunnan voimakkaasta politisoitumisesta johtuen. Tutkimuksessa haetaan selitystä tälle politisoitumiselle. Yhteiskunnan rakenteellisella politisoitumisella tarkoitetaan tilannetta, jossa ”poliittisen” alue kasvaa varsinaisia poliittisia instituutioita laajemmaksi. Rakenteellinen politisoituminen muuttuu helposti yhteiskunnalliseksi ongelmaksi, koska siitä usein seuraa normaalin poliittisen toiminnan (esim. lainsäädännän) jähmettyminen, yhteiskunnan jyrkkä jakautuminen, alhainen kynnys poliittisille konflikteille ja yleisen yhteiskunnallisen luottamuksen alentuminen. Toisin kuin esimerkiksi Itä-Euroopassa, Taiwanissa entinen valtapuolue ei romahtanut poliittisen avautumisen myötä vaan säilytti vahvan rakenteellisen asemansa. Kun valta vaihtui ensimmäisen kerran vaalien kautta, vanha valtapuolue ei ollut valmis luovuttamaan poliittisen järjestelmän ohjaksia käsistään. Alkoi vuosia kestänyt taistelu järjestelmän hallinnasta vanhan ja uuden valtapuolueen välillä, jossa yhteiskunta politisoitui voimakkaasti. Tutkimuksessa Taiwanin yhteiskunnan politisoituminen selitetään useiden rakenteellisten piirteiden yhteisvaikutuksen tuloksena. Tällaisia politisoitumista edistäviä rakentellisia piirteitä ovat hidas poliittinen muutos, joka säilytti vanhat poliittiset jakolinjat ja niihin liittyvät vahvat edut ja intressit; sopimaton perustuslaki; Taiwanin epäselvä kansainvälinen asema ja jakautunut identiteetti; sekä sosiaalinen rakenne, joka helpottaa ihmisten nopeaa mobilisointia poliittiisiin mielenilmauksiin. Tutkimuksessa kiinnitetään huomiota toistaiseksi vähän tutkittuun poliittiseen ilmiöön, joidenkin demokratisoituvien yhteiskuntien voimakkaaseen rakenteelliseen politisoitumiseen. Tutkimuksen pääasiallinen havainto on, että yksipuoluejärjestelmän demokratisoituminen kantaa sisällään rakenteellisen politisoitumisen siemenen, jos entinen valtapuolue ei romahda demokratisoitumisen myötä.
Resumo:
Extraintestinal pathogenic Escherichia coli (ExPEC) represent a diverse group of strains of E. coli, which infect extraintestinal sites, such as the urinary tract, the bloodstream, the meninges, the peritoneal cavity, and the lungs. Urinary tract infections (UTIs) caused by uropathogenic E. coli (UPEC), the major subgroup of ExPEC, are among the most prevalent microbial diseases world wide and a substantial burden for public health care systems. UTIs are responsible for serious morbidity and mortality in the elderly, in young children, and in immune-compromised and hospitalized patients. ExPEC strains are different, both from genetic and clinical perspectives, from commensal E. coli strains belonging to the normal intestinal flora and from intestinal pathogenic E. coli strains causing diarrhea. ExPEC strains are characterized by a broad range of alternate virulence factors, such as adhesins, toxins, and iron accumulation systems. Unlike diarrheagenic E. coli, whose distinctive virulence determinants evoke characteristic diarrheagenic symptoms and signs, ExPEC strains are exceedingly heterogeneous and are known to possess no specific virulence factors or a set of factors, which are obligatory for the infection of a certain extraintestinal site (e. g. the urinary tract). The ExPEC genomes are highly diverse mosaic structures in permanent flux. These strains have obtained a significant amount of DNA (predictably up to 25% of the genomes) through acquisition of foreign DNA from diverse related or non-related donor species by lateral transfer of mobile genetic elements, including pathogenicity islands (PAIs), plasmids, phages, transposons, and insertion elements. The ability of ExPEC strains to cause disease is mainly derived from this horizontally acquired gene pool; the extragenous DNA facilitates rapid adaptation of the pathogen to changing conditions and hence the extent of the spectrum of sites that can be infected. However, neither the amount of unique DNA in different ExPEC strains (or UPEC strains) nor the mechanisms lying behind the observed genomic mobility are known. Due to this extreme heterogeneity of the UPEC and ExPEC populations in general, the routine surveillance of ExPEC is exceedingly difficult. In this project, we presented a novel virulence gene algorithm (VGA) for the estimation of the extraintestinal virulence potential (VP, pathogenicity risk) of clinically relevant ExPECs and fecal E. coli isolates. The VGA was based on a DNA microarray specific for the ExPEC phenotype (ExPEC pathoarray). This array contained 77 DNA probes homologous with known (e.g. adhesion factors, iron accumulation systems, and toxins) and putative (e.g. genes predictably involved in adhesion, iron uptake, or in metabolic functions) ExPEC virulence determinants. In total, 25 of DNA probes homologous with known virulence factors and 36 of DNA probes representing putative extraintestinal virulence determinants were found at significantly higher frequency in virulent ExPEC isolates than in commensal E. coli strains. We showed that the ExPEC pathoarray and the VGA could be readily used for the differentiation of highly virulent ExPECs both from less virulent ExPEC clones and from commensal E. coli strains as well. Implementing the VGA in a group of unknown ExPECs (n=53) and fecal E. coli isolates (n=37), 83% of strains were correctly identified as extraintestinal virulent or commensal E. coli. Conversely, 15% of clinical ExPECs and 19% of fecal E. coli strains failed to raster into their respective pathogenic and non-pathogenic groups. Clinical data and virulence gene profiles of these strains warranted the estimated VPs; UPEC strains with atypically low risk-ratios were largely isolated from patients with certain medical history, including diabetes mellitus or catheterization, or from elderly patients. In addition, fecal E. coli strains with VPs characteristic for ExPEC were shown to represent the diagnostically important fraction of resident strains of the gut flora with a high potential of causing extraintestinal infections. Interestingly, a large fraction of DNA probes associated with the ExPEC phenotype corresponded to novel DNA sequences without any known function in UTIs and thus represented new genetic markers for the extraintestinal virulence. These DNA probes included unknown DNA sequences originating from the genomic subtractions of four clinical ExPEC isolates as well as from five novel cosmid sequences identified in the UPEC strains HE300 and JS299. The characterized cosmid sequences (pJS332, pJS448, pJS666, pJS700, and pJS706) revealed complex modular DNA structures with known and unknown DNA fragments arranged in a puzzle-like manner and integrated into the common E. coli genomic backbone. Furthermore, cosmid pJS332 of the UPEC strain HE300, which carried a chromosomal virulence gene cluster (iroBCDEN) encoding the salmochelin siderophore system, was shown to be part of a transmissible plasmid of Salmonella enterica. Taken together, the results of this project pointed towards the assumptions that first, (i) homologous recombination, even within coding genes, contributes to the observed mosaicism of ExPEC genomes and secondly, (ii) besides en block transfer of large DNA regions (e.g. chromosomal PAIs) also rearrangements of small DNA modules provide a means of genomic plasticity. The data presented in this project supplemented previous whole genome sequencing projects of E. coli and indicated that each E. coli genome displays a unique assemblage of individual mosaic structures, which enable these strains to successfully colonize and infect different anatomical sites.
Resumo:
Tutkimuksen keskeinen tehtävä on selvittää, mikä on dokumentoinnin merkitys lastensuojelun sosiaalityön tiedonmuodostuksessa ja ammattikäytännöissä. Asiakirjateksteistä koostuvaa tutkimusaineistoa tarkastellaan kolmesta eri suunnasta kysymällä: 1)Miten asiakirjoja kirjoitetaan? 2) Mitä asiakirjoihin kirjoitetaan? 3) Miksi asiakirjoja kirjoitetaan niin kuin kirjoitetaan? Tutkimusaineisto muodostuu lastensuojelun sosiaalityöntekijöiden laatimista asiakastietojärjestelmään tallennetuista muistiinpanoista ja huostaanottopäätöksistä. Tutkimukseen on valittu 20 huostaanotetun eri-ikäisen lapsen ja heidän perheensä asiakirjat yhteensä 1613 asiakirjatulostussivua. Tekstit ajoittuvat vuodesta 1989 vuoteen 2000. Tutkimusmenetelmä on diskurssianalyyttinen ja tukeutuu Fairclough`n (1997)esittämään kolmiulotteiseen malliin, jossa diskurssi määritellään tekstin, käytäntöjen ja sosiokulttuurisen ympäristön suhteeksi. Diskurssianalyysi on näiden rakenteiden ja niiden välisten suhteiden kuvaamista, tulkintaa ja selittämistä. Fairclough’n mallia mukaillen tutkimuksen analyysi koostuu retoriikan ja tematiikan analyyseistä sekä pragmatiikan näkökulman sisältävästä tarkastelusta. Asiakirjatekstien pilkkominen puhujakategorioihin osoitti tekstien olevan moniäänisiä, useiden henkilöiden näkemyksiä ja mielipiteitä sisältäviä tekstipintoja. Retoriikan analyysi näytti, että lastensuojelun sosiaalityön asiakirjat sisältävät paljon dynaamisia kuvauksia työstä. Asiakirjojen kirjoittaminen moniäänisiksi tuo tekstiin uskottavuutta, ja se on myös yksi retorinen vaikuttamiskeino. Tematiikan tarkastelu osoitti,että asiakirjojen sisällölliset teemat (lapsen hoiva, arjen hallinta, yhteistyö ja päihteiden käyttö) ja kokemukselliset teemat (huoli, vastuu, yhteys ja moraali) toistuvat sisäkkäisinä ja päällekkäisinä säikeinä dynaamisesti vaihdellen. Sosiaalityöntekijät kirjaavat teksteihin monia yhtäaikaisia teemoja, joiden avulla rakentavat ammatillista ymmärrystä kyseessä olevasta tilanteesta. Asiakirjojen tutkiminen pragmatiikan suunnasta toi esiin, kirjoittamisen ja lukemisen kontekstiulottuvuudet sekä tiedonmuodostusprosessin. Asiakirjojen laatiminen on osa sosiaalityön käytäntöjä. Se on myös keskeinen alue ammattikunnan yhteisen ammatillisen ymmärryksen luomisessa ja ylläpitämisessä. Muistiinpanot, huostaanottopäätökset ja lakitekstit ovat intertekstuaalisia. Lastensuojelun sosiaalityön asiakirjojen tutkiminen on avannut uusia mahdollisuuksia ymmärtää sosiaalityön dokumentointiprosessia, merkitystä ja roolia sekä tiedonmuodostuksen dynamiikkaa. Tekstien kirjoittaminen, niiden lukeminen, tietojen siirtäminen ja asiakkaan kuuleminen samoin kuin kuulemisen kirjaaminen ovat sosiaalityön dokumentoinnin keskeisiä haasteita. Tutkimus pyrkii avaamaan ymmärrystä asiakirjatekstien monivivahteiseen ja dynaamiseen maailmaan ja siten myös sosiaalityön dokumentoinnin arkeen. Tarkastelut mahdollistavat työn kehittämisen erityisesti sosiaalityön asiakasvaikuttavuuden mittaamisen ja parantamisen suuntaan. Asiakirjoissa ilmenevä tiedonmuodostuksen dynamiikka syntyy kirjoittamiskäytäntöjen, kirjoittamisen ja lukemisen sekä toimintakäytäntöjen yhteisessä alueessa. Avainsanat: sosiaalityö, lastensuojelu, dokumentointi, asiakirja, diskurssianalyysi, tiedonmuodostus.