999 resultados para Program specification
Resumo:
We present the first mathematical model on the transmission dynamics of Schistosoma japonicum. The work extends Barbour's classic model of schistosome transmission. It allows for the mammalian host heterogeneity characteristic of the S. japonicum life cycle, and solves the problem of under-specification of Barbour's model by the use of Chinese data we are collecting on human-bovine transmission in the Poyang Lake area of Jiangxi Province in China. The model predicts that in the lake/marshland areas of the Yangtze River basin: (1) once-early mass chemotherapy of humans is little better than twice-yearly mass chemotherapy in reducing human prevalence. Depending on the heterogeneity of prevalence within the population, targeted treatment of high prevalence groups, with lower overall coverage, can be more effective than mass treatment with higher overall coverage. Treatment confers a short term benefit only, with prevalence rising to endemic levels once chemotherapy programs are stopped (2) depending on the relative contributions of bovines and humans, bovine treatment can benefit humans almost as much as human treatment. Like human treatment, bovine treatment confers a short-term benefit. A combination of human and bovine treatment will dramatically reduce human prevalence and maintains the reduction for a longer period of time than treatment of a single host, although human prevalence rises once treatment ceases; (3) assuming 75% coverage of bovines, a bovine vaccine which acts on worm fecundity must have about 75% efficacy to reduce the reproduction rate below one and ensure mid-term reduction and long-term elimination of the parasite. Such a vaccination program should be accompanied by an initial period of human treatment to instigate a short-term reduction in prevalence, following which the reduction is enhanced by vaccine effects; (4) if the bovine vaccine is only 45% efficacious (the level of current prototype vaccines) it will lower the endemic prevalence, but will not result in elimination. If it is accompanied by an initial period of human treatment and by a 45% improvement in human sanitation or a 30% reduction in contaminated water contact by humans, elimination is then possible. (C) 2002 Elsevier Science B.V. All rights reserved.
Resumo:
The aim of the research project was to identify the efficacy of the family psychoeducation program as a strategy for reducing the hospital admissions of young people. It also aimed to determine if the family psychoeducation program had an impact on the experience of caregiving and knowledge and satisfaction of services provided by the mental health service. A retrospective chart audit compared readmission history of 27 clients whose families attended a psychoeducation program with readmission history of a matched group of young people whose families did not attend the program. A telephone survey was conducted for both groups of families to investigate knowledge and understanding of services and burden of care. The results indicated that family participation in a brief multiple family psychoeducation program did not reduce the number or duration of admissions of the young people. There was no impact on the level of care for families who attended the psychoeducation program, however, this group showed some evidence of increased knowledge and understanding of services as compared to the control group.
Resumo:
This paper examines the use of on-line discussion as a medium for learning in a pre-service teacher education program. As part of an Education Studies course student teachers engaged in a discussion of issues related to technology and equity in schools. The design of the task and the subsequent analysis of the on-line text were part of a research project investigating whether and how communications technology can be used to integrate and extend the learning of teacher education students. The main argument developed in the paper is that through the on-line activity distinctive sets of writing practices were created. These practices enabled students to make connections between the often disparate parts of teacher education programs-theory and practice, campus and school, research and experience. (C) 2002 Elsevier Science Ltd. All rights reserved.
Resumo:
Purpose: The purpose of this investigation was to evaluate the impact of undertaking peripheral blood stem cell transplantation (PBST) on T-cell number and function, and to determine the role of a mixed type, moderate intensity exercise program in facilitating the recovery of T-cell number and function. Methods: Immunological measures of white blood cell, lymphocyte, CD3(+), CD4(+), and CD8(+) counts, and CD3(+) cell function were assessed pretransplant (PI), immediately posttransplant (PII), and 1 month (II), 2 months (12) and 3 months (PIII) posttransplant. After PII, 12 patients were divided equally into a control group (CG) or exercise intervention group (EG). Results: Lower total T-cell, helper T-cell, and suppressor T-cell counts (P < 0.01), as well as lower T-cell function (P < 0.01), when compared with normative data, were found at PI. More specifically, 88% of the group had CD3(+), CD4(+), and CD8(+) counts that were more than 40%, 20%, and 50% below normal at PI, respectively. Undertaking a PBST caused further adverse changes to the total leukocyte, lymphocyte, CD3(+), CD4(+) and CD8(+) count. and the helper/suppressor ratio. Although CD8(+) counts had returned to normal by PIII, CD3(+), CD4(+), and the CD4(+)/CD8(+) ratio remained significantly lower than normative data (P < 0.01), with 66%, 100%, and 100% of the subject group reporting counts and ratios, respectively, below the normal range. Conclusion: The PBST patients were immunocompromised before undertaking the transplant, and the transplant procedure imposed further adverse changes to the leukocyte and lymphocyte counts. The leukocyte and CD8(+) counts returned to normal within 3 months posttransplant; however, the other immunological parameters assessed demonstrated a delayed recovery. Although participation in the exercise program did not facilitate a faster immune cell recovery, neither did the exercise program hinder or delay recovery.
Resumo:
The rise of component-based software development has created an urgent need for effective application program interface (API) documentation. Experience has shown that it is hard to create precise and readable documentation. Prose documentation can provide a good overview but lacks precision. Formal methods offer precision but the resulting documentation is expensive to develop. Worse, few developers have the skill or inclination to read formal documentation. We present a pragmatic solution to the problem of API documentation. We augment the prose documentation with executable test cases, including expected outputs, and use the prose plus the test cases as the documentation. With appropriate tool support, the test cases are easy to develop and read. Such test cases constitute a completely formal, albeit partial, specification of input/output behavior. Equally important, consistency between code and documentation is demonstrated by running the test cases. This approach provides an attractive bridge between formal and informal documentation. We also present a tool that supports compact and readable test cases; and generation of test drivers and documentation, and illustrate the approach with detailed case studies. (C) 2002 Elsevier Science Inc. All rights reserved.
Resumo:
Backcrossing has been little used in cacao breeding, particularly due to the long time required to transfer genes and recover the genetic background of the recurrent parent. The objective of this study was to select individuals, resulting from the backcross CEPEC-42 x SIC-19, genetically related to the recurrent parent SIC-19 by using RAPD molecular markers, among those with resistance to witches' broom. Of the 31 plants that clustered with SIC-19, 18 from the replanted material remained free of the disease in the field, with good vegetative aspect and, therefore can be used for backcross to reach the desired objective.
Resumo:
Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually oriented towards the imperative or object paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies’ structure, we resort to standard program calculation strategies, based on the so-called Bird-Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general, alternative to slicing functional programs
Resumo:
This paper reports on the development of specific slicing techniques for functional programs and their use for the identification of possible coherent components from monolithic code. An associated tool is also introduced. This piece of research is part of a broader project on program understanding and re-engineering of legacy code supported by formal methods
Resumo:
Current software development often relies on non-trivial coordination logic for combining autonomous services, eventually running on different platforms. As a rule, however, such a coordination layer is strongly woven within the application at source code level. Therefore, its precise identification becomes a major methodological (and technical) problem and a challenge to any program understanding or refactoring process. The approach introduced in this paper resorts to slicing techniques to extract coordination data from source code. Such data are captured in a specific dependency graph structure from which a coordination model can be recovered either in the form of an Orc specification or as a collection of code fragments corresponding to the identification of typical coordination patterns in the system. Tool support is also discussed
Resumo:
Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.
Resumo:
The lack of a commonly accepted de nition of a software component, the proliferation of competing `standards' and component frameworks, is here to stay, raising the fundamental question in component-based development of how to cope in practice with heterogeneity. This paper reports on the design of a Component Repository aimed to give at least a partial answer to the above question. The repository was fully speci ed in Vdm and a working prototype is currently being used in an industrial environment