84 resultados para Sandoval, Gonzalo de, fl. 1518-1528.
Resumo:
[Quality Management in Construction Projects by Abdul Razzak Rumane, CRC Press, Boca Raton, FL, 2011, 434 pp, ISBN 9781439838716] Issues of quality management, quality control and performance against specification have long been the focus of various business sectors. Recently there has been an additional drive to achieve the continuous improvement and customer satisfaction promised by the 20th-century ‘gurus’ some six or seven decades ago. The engineering and construction industries have generally taken somewhat longer than their counterparts in the manufacturing, service and production sectors to achieve these espoused levels of quality. The construction and engineering sectors stand to realize major rewards from better managing quality in projects. More effort is being put into instructing future participants in the industry as well as assisting existing professionals. This book comes at an opportune time.
Resumo:
Service-oriented Architectures (SOA) and Web services leverage the technical value of solutions in the areas of distributed systems and cross-enterprise integration. The emergence of Internet marketplaces for business services is driving the need to describe services, not only from a technical level, but also from a business and operational perspective. While, SOA and Web services reside in an IT layer, organizations owing Internet marketplaces are requiring advertising and trading business services which reside in a business layer. As a result, the gap between business and IT needs to be closed. This paper presents USDL (Unified Service Description Language), a specification language to describe services from a business, operational and technical perspective. USDL plays a major role in the Internet of Services to describe tradable services which are advertised in electronic marketplaces. The language has been tested using two service marketplaces as use cases.
Resumo:
Objective: We explore how accurately and quickly nurses can identify melodic medical equipment alarms when no mnemonics are used, when alarms may overlap, and when concurrent tasks are performed. Background: The international standard IEC 60601-1-8 (International Electrotechnical Commission, 2005) has proposed simple melodies to distinguish seven alarm sources. Previous studies with nonmedical participants reveal poor learning of melodic alarms and persistent confusions between some of them. The effects of domain expertise, concurrent tasks, and alarm overlaps are unknown. Method: Fourteen intensive care and general medical unit nurses learned the melodic alarms without mnemonics in two sessions on separate days. In the second half of Day 2 the nurses identified single alarms or pairs of alarms played in sequential, partially overlapping, or nearly completely overlapping configurations. For half the experimental blocks nurses performed a concurrent mental arithmetic task. Results: Nurses' learning was poor and was no better than the learning of nonnurses in a previous study. Nurses showed the previously noted confusions between alarms. Overlapping alarms were exceptionally difficult to identify. The concurrent task affected response time but not accuracy. Conclusion: Because of a failure of auditory stream segregation, the melodic alarms cannot be discriminated when they overlap. Directives to sequence the sounding of alarms in medical electrical equipment must be strictly adhered to, or the alarms must redesigned to support better auditory streaming. Application: Actual or potential uses of this research include the implementation of IEC 60601-1-8 alarms in medical electrical equipment.
Resumo:
Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.
Resumo:
Sorghum (Sorghum bicolor (L.) Moench) is the world’s fifth major cereal crop and holds importance as a construction material, food and fodder source. More recently, the potential of this plant as a biofuel source has been noted. Despite its agronomic importance, the use of sorghum production is being constrained by both biotic and abiotic factors. These challenges could be addressed by the use of genetic engineering strategies to complement conventional breeding techniques. However, sorghum is one of the most recalcitrant crops for genetic modification with the lack of an efficient tissue culture system being amongst the chief reasons. Therefore, the aim of this study was to develop an efficient tissue culture system for establishing regenerable embryogenic cell lines, micropropagation and acclimatisation for Sorghum bicolor and use this to optimise parameters for genetic transformation via Agrobacterium-mediated transformation and microprojectile bombardment. Using five different sorghum cultivars, SA281, 296B, SC49, Wray and Rio, numerous parameters were investigated in an attempt to establish an efficient and reproducible tissue culture and transformation system. Using immature embryos (IEs) as explants, regenerable embryogenic cell lines (ECLs) could only be established from cultivars SA281 and 296B. Large amounts of phenolics were produced from IEs of cultivars, SC49, Wary and Rio, and these compounds severely hindered callus formation and development. Cultivar SA281 also produced phenolics during regeneration. Attempts to suppress the production of these compounds in cultivars SA281 and SC49 using activated charcoal, PVP, ascorbic acid, citric acid and liquid filter paper bridge methods were either ineffective or had a detrimental effect on embryogenic callus formation, development and regeneration. Immature embryos sourced during summer were found to be far more responsive in vitro than those sourced during winter. In an attempt to overcome this problem, IEs were sourced from sorghum grown under summer conditions in either a temperature controlled glasshouse or a growth chamber. However, the performance of these explants was still inferior to that of natural summer-sourced explants. Leaf whorls, mature embryos, shoot tips and leaf primordia were found to be unsuitable as explants for establishing ECLs in sorghum cultivars SA281 and 296B. Using the florets of immature inflorescences (IFs) as explants, however, ECLs were established and regenerated for these cultivars, as well as for cultivar Tx430, using callus induction media, SCIM, and regeneration media, VWRM. The best in vitro responses, from the largest possible sized IFs, were obtained using plants at the FL-2 stage (where the last fully opened leaf was two leaves away from the flag leaf). Immature inflorescences could be stored at 25oC for up to three days without affecting their in vitro responses. Compared to IEs, the IFs were more robust in tissue culture and showed responses which were season and growth condition independent. A micropropagation protocol for sorghum was developed in this study. The optimum plant growth regulator (PGR) combination for the micropropagation of in vitro regenerated plantlets was found to be 1.0 mg/L BAP in combination with 0.5 mg/L NAA. With this protocol, cultivars 296B and SA281 produced an average of 57 and 13 off-shoots per plantlet, respectively. The plantlets were successfully acclimatised and developed into phenotypically normal plants that set seeds. A simplified acclimatisation protocol for in vitro regenerated plantlets was also developed. This protocol involved deflasking in vitro plantlets with at least 2 fully-opened healthy leaves and at least 3 roots longer than 1.5 cm, washing the media from the roots with running tap water, planting in 100 mm pots and placing in plastic trays covered with a clear plastic bag in a plant growth chamber. After seven days, the corners of the plastic cover were opened and the bags were completely removed after 10 days. All plantlets were successfully acclimatised regardless of whether 1:1 perlite:potting mix, potting mix, UC mix or vermiculite were used as potting substrates. Parameters were optimised for Agrobacterium-mediated transformation (AMT) of cultivars SA281, 296B and Tx430. The optimal conditions were the use of Agrobacterium strain LBA4404 at an inoculum density of 0.5 OD600nm, heat shock at 43oC for 3 min, use of the surfactant Pluronic F-68 (0.02% w/v) in the inoculation media with a pH of 5.2 and a 3 day co-cultivation period in dark at 22oC. Using these parameters, high frequencies of transient GFP expression was observed in IEs precultured on callus initiation media for 1-7 days as well as in four weeks old IE- and IF-derived callus. Cultivar SA281 appeared very sensitive to Agrobacterium since all tissue turned necrotic within two weeks post-exposure. For cultivar 296B, GFP expression was observed up to 20 days post co-cultivation but no stably transformed plants were regenerated. Using cultivar Tx430, GFP was expressed for up to 50 days post co-cultivation. Although no stably transformed plants of this cultivar were regenerated, this was most likely due to the use of unsuitable regeneration media. Parameters were optimised for transformation by particle bombardment (PB) of cultivars SA281, 296B and Tx430. The optimal conditions were use of 3-7 days old IEs and 4 weeks old IF callus, 4 hour pre- and post-bombardment osmoticum treatment, use of 0.6 µm gold microparticles, helium pressure of 1500 kPa and target distance of 15 cm. Using these parameters for PB, transient GFP expression was observed for up to 14, 30 and 50 days for cultivars SA281, 296B and Tx430, respectively. Further, the use of PB resulted in less tissue necrosis compared to AMT for the respective cultivars. Despite the presence of transient GFP expression, no stably transformed plants were regenerated. The establishment of regenerable ECLs and the optimization of AMT and PB parameters in this study provides a platform for future efforts to develop an efficient transformation protocol for sorghum. The development of GM sorghum will be an important step towards improving its agronomic properties as well as its exploitation for biofuel production.
Resumo:
Summary: Objective: We performed spike triggered functional MRI (fMRI) in a 12 year old girl with Benign Epilepsy with Centro-temporal Spikes (BECTS) and left-sided spikes. Our aim was to demonstrate the cerebral origin of her interictal spikes. Methods: EEG was recorded within the 3 Tesla MRI. Whole brain fMRI images were acquired, beginning 2–3 seconds after spikes. Baseline fMRI images were acquired when there were no spikes for 20 seconds. Image sets were compared with the Student's t-test. Results: Ten spike and 20 baseline brain volumes were analysed. Focal activiation was seen in the inferior left sensorimotor cortex near the face area. The anterior cingulate was more active during baseline than spikes. Conclusions: Left sided epileptiform activity in this patient with BECTS is associated with fMRI activation in the left face region of the somatosensory cortex, which would be consistent with the facial sensorimotor involvement in BECT seizures. The presence of BOLD signal change in other regions raises the possibility that the scalp recorded field of this patient with BECTs may reflect electrical change in more than one brain region.
Resumo:
Purpose: This study used magnetic resonance spectroscopy (MRS) to examine metabolite abnormalities in the temporal and frontal lobe of patients with temporal lobe epilepsy (TLE) of differing severity. Methods: We investigated myoinositol in TLE by using short-echo MRS in 34 TLE patients [26 late onset (LO-TLE), eight hippocampal sclerosis (HS-TLE)], and 16 controls. Single-voxel short-echo (35 ms) MR spectra of temporal and frontal lobes were acquired at 1.5 T and analyzed by using LCModel. Results: The temporal lobe ipsilateral to seizure origin in HS-TLE, but not LO-TLE, had reduced N-acetylaspartate (NA) and elevated myoinositol (MI; HS-TLE NA, 7.8 ± 1.9 mM, control NA, 9.2 ± 1.3 mM; p < 0.05; HS-TLE MI, 6.1 ± 1.6 mM, control mI 4.9 ± 0.8 mM, p< 0.05). Frontal lobe MI was low in both patient groups (LO-TLE, 4.3 ± 0.8 mM; p < 0.05; HS-TLE, 3.6 ±.05 mM; p < 0.001; controls, 4.8 ± 0.5 mM). Ipsilateral frontal lobes had lower MI (3.8 ± 0.7 mM; p < 0.01) than contralateral frontal lobes (4.3 ± 0.8 mM; p < 0.05). Conclusions: MI changes may distinguish between the seizure focus, where MI is increased, and areas of seizure spread where MI is decreased.
Resumo:
Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.
Resumo:
This paper examines the case of a procurement auction for a single project, in which the breakdown of the winning bid into its component items determines the value of payments subsequently made to bidder as the work progresses. Unbalanced bidding, or bid skewing, involves the uneven distribution of mark-up among the component items in such a way as to attempt to derive increased benefit to the unbalancer but without involving any change in the total bid. One form of unbalanced bidding for example, termed Front Loading (FL), is thought to be widespread in practice. This involves overpricing the work items that occur early in the project and underpricing the work items that occur later in the project in order to enhance the bidder's cash flow. Naturally, auctioners attempt to protect themselves from the effects of unbalancing—typically reserving the right to reject a bid that has been detected as unbalanced. As a result, models have been developed to both unbalance bids and detect unbalanced bids but virtually nothing is known of their use, success or otherwise. This is of particular concern for the detection methods as, without testing, there is no way of knowing the extent to which unbalanced bids are remaining undetected or balanced bids are being falsely detected as unbalanced. This paper reports on a simulation study aimed at demonstrating the likely effects of unbalanced bid detection models in a deterministic environment involving FL unbalancing in a Texas DOT detection setting, in which bids are deemed to be unbalanced if an item exceeds a maximum (or fails to reach a minimum) ‘cut-off’ value determined by the Texas method. A proportion of bids are automatically and maximally unbalanced over a long series of simulated contract projects and the profits and detection rates of both the balancers and unbalancers are compared. The results show that, as expected, the balanced bids are often incorrectly detected as unbalanced, with the rate of (mis)detection increasing with the proportion of FL bidders in the auction. It is also shown that, while the profit for balanced bidders remains the same irrespective of the number of FL bidders involved, the FL bidder's profit increases with the greater proportion of FL bidders present in the auction. Sensitivity tests show the results to be generally robust, with (mis)detection rates increasing further when there are fewer bidders in the auction and when more data are averaged to determine the baseline value, but being smaller or larger with increased cut-off values and increased cost and estimate variability depending on the number of FL bidders involved. The FL bidder's expected benefit from unbalancing, on the other hand, increases, when there are fewer bidders in the auction. It also increases when the cut-off rate and discount rate is increased, when there is less variability in the costs and their estimates, and when less data are used in setting the baseline values.
Resumo:
Background: Ureaplasmas are the most prevalent bacteria isolated from preterm deliveries and the prognosis for neonates varies depending on the gestation at delivery. Ureaplasmas vary their surface-exposed antigen (MBA, a virulence mechanism) during chronic intra-amniotic infections, but it is not known when changes first occur during gestation. Method: U. parvum serovar 3 (2x10e7CFU) was injected intra-amniotically (IA) into six experimental cohorts of pregnant ewes (of n=7), 3 days (d) or 7d before delivery at either: 100d, 124d or 140d gestation (term=145d). Control ewes received IA 10B broth. Fetuses were delivered surgically and ureaplasmas cultured from amniotic fluid (AF), chorioamnion, fetal lung (FL) and umbilical cord. Ureaplasmas were tested by western blot to demonstrate MBA variation. Results: The highest number of ureaplasmas were recovered from FL at 100d gestation after 3 days of infection (p<0.03). Six of 7(86%) 100d–3d FL demonstrated an ureaplasma MBA variant, but only 17% and 15% of FL showed an MBA variant after 3d infection at 124d and 140d gestation respectively. Greatest variation of the MBA occurred in AF and FL at 124d gestation after 7d infection. The least MBA variation was observed at 140d; however, at this time the most severe histological chorioamnionitis was observed. Conclusions: After intra-amniotic ureaplasma injections, higher numbers of ureaplasmas gained access to the FL at 100d gestation than observed at later gestations. This may exacerbate the adverse outcomes for neonates delivered early in gestation. In late gestation, ureaplasma MBA variation was minimal, but chorioamnionitis was the most severe. Adverse pregnancy outcomes associated with IA ureaplasma infection may vary depending on the duration of gestation, the number of ureaplasmas isolated from the fetal tissues and the degree of MBA variation.
Resumo:
This chapter is a tutorial that teaches you how to design extended finite state machine (EFSM) test models for a system that you want to test. EFSM models are more powerful and expressive than simple finite state machine (FSM) models, and are one of the most commonly used styles of models for model-based testing, especially for embedded systems. There are many languages and notations in use for writing EFSM models, but in this tutorial we write our EFSM models in the familiar Java programming language. To generate tests from these EFSM models we use ModelJUnit, which is an open-source tool that supports several stochastic test generation algorithms, and we also show how to write your own model-based testing tool. We show how EFSM models can be used for unit testing and system testing of embedded systems, and for offline testing as well as online testing.
Resumo:
Research on Enterprise Resource Planning (ERP) Systems is becoming a well-established research theme in Information Systems (IS) research. Enterprise Resource Planning Systems, given its unique differentiations with other IS applications, have provided an interesting backdrop to test and re-test some of the key and fundamental concepts in IS. While some researchers have tested well-established concepts of technology acceptance, system usage and system success in the context of ERP Systems, others have researched how new paradigms like cloud computing and social media integrate with ERP Systems. Moreover, ERP Systems provided the context for cross disciplinary research such as knowledge management, project management and business process management research. Almost after two-decades since its inception in IS research, this paper provides a critique of 198 papers published on ERP Systems since 2006-2012. We observe patterns on ES research, provide comparisons to past studies and provide future research directions.
Multi-level knowledge transfer in software development outsourcing projects : the agency theory view
Resumo:
In recent years, software development outsourcing has become even more complex. Outsourcing partner have begun‘re- outsourcing’ components of their projects to other outsourcing companies to minimize cost and gain efficiencies, creating a multi-level hierarchy of outsourcing. This research in progress paper presents preliminary findings of a study designed to understand knowledge transfer effectiveness of multi-level software development outsourcing projects. We conceptualize the SD-outsourcing entities using the Agency Theory. This study conceptualizes, operationalises and validates the concept of Knowledge Transfer as a three-phase multidimensional formative index of 1) Domain knowledge, 2) Communication behaviors, and 3) Clarity of requirements. Data analysis identified substantial, significant differences between the Principal and the Agent on two of the three constructs. Using Agency Theory, supported by preliminary findings, the paper also provides prescriptive guidelines of reducing the friction between the Principal and the Agent in multi-level software outsourcing.