842 resultados para Anatomical Ontology Mapping
Resumo:
Value network has been studied greatly in the academic research, but a tool for value network mapping is missing. The objective of this study was to design a tool (process) for value network mapping in cross-sector collaboration. Furthermore, the study addressed a future perspective of collaboration, aiming to map the value network potential. During the study was investigated and pondered how to get the full potential of collaboration, by creating new value in collaboration process. These actions are parts of mapping process proposed in the study. The implementation and testing of the mapping process were realized through a case study of cross-sector collaboration in welfare services for elderly in the Eastern Finland. Key representatives in elderly care from public, private and third sectors were interviewed and a workshop with experts from every sector was also conducted in this regard. The value network mapping process designed in this study consists of specific steps that help managers and experts to understand how to get a complex value network map and how to enhance it. Furthermore, it make easier the understanding of how new value can be created in collaboration process. The map can be used in order to motivate participants to be engaged with responsibility in collaboration and to be fully committed in their interactions. It can be also used as a motivator tool for those organizations that intend to engage in collaboration process. Additionally, value network map is a starting point in many value network analyses. Furthermore, the enhanced value network map can be used as a performance measurement tool in cross-sector collaboration.
Resumo:
Software plays an important role in our society and economy. Software development is an intricate process, and it comprises many different tasks: gathering requirements, designing new solutions that fulfill these requirements, as well as implementing these designs using a programming language into a working system. As a consequence, the development of high quality software is a core problem in software engineering. This thesis focuses on the validation of software designs. The issue of the analysis of designs is of great importance, since errors originating from designs may appear in the final system. It is considered economical to rectify the problems as early in the software development process as possible. Practitioners often create and visualize designs using modeling languages, one of the more popular being the Uni ed Modeling Language (UML). The analysis of the designs can be done manually, but in case of large systems, the need of mechanisms that automatically analyze these designs arises. In this thesis, we propose an automatic approach to analyze UML based designs using logic reasoners. This approach firstly proposes the translations of the UML based designs into a language understandable by reasoners in the form of logic facts, and secondly shows how to use the logic reasoners to infer the logical consequences of these logic facts. We have implemented the proposed translations in the form of a tool that can be used with any standard compliant UML modeling tool. Moreover, we authenticate the proposed approach by automatically validating hundreds of UML based designs that consist of thousands of model elements available in an online model repository. The proposed approach is limited in scope, but is fully automatic and does not require any expertise of logic languages from the user. We exemplify the proposed approach with two applications, which include the validation of domain specific languages and the validation of web service interfaces.
Resumo:
Weed mapping is a useful tool for site-specific herbicide applications. The objectives of this study were (1) to determine the percentage of land area covered by weeds in no-till and conventionally tilled fields of common bean using digital image processing and geostatistics, and (2) to compare two types of cameras. Two digital cameras (color and infrared) and a differential GPS were affixed to a center pivot structure for image acquisition. Sample field images were acquired in a regular grid pattern, and the images were processed to estimate the percentage of weed cover. After calculating the georeferenced weed percentage values, maps were constructed using geostatistical techniques. Based on the results, color images are recommended for mapping the percentage of weed cover in no-till systems, while infrared images are recommended for weed mapping in conventional tillage systems.
Resumo:
A growing concern for organisations is how they should deal with increasing amounts of collected data. With fierce competition and smaller margins, organisations that are able to fully realize the potential in the data they collect can gain an advantage over the competitors. It is almost impossible to avoid imprecision when processing large amounts of data. Still, many of the available information systems are not capable of handling imprecise data, even though it can offer various advantages. Expert knowledge stored as linguistic expressions is a good example of imprecise but valuable data, i.e. data that is hard to exactly pinpoint to a definitive value. There is an obvious concern among organisations on how this problem should be handled; finding new methods for processing and storing imprecise data are therefore a key issue. Additionally, it is equally important to show that tacit knowledge and imprecise data can be used with success, which encourages organisations to analyse their imprecise data. The objective of the research conducted was therefore to explore how fuzzy ontologies could facilitate the exploitation and mobilisation of tacit knowledge and imprecise data in organisational and operational decision making processes. The thesis introduces both practical and theoretical advances on how fuzzy logic, ontologies (fuzzy ontologies) and OWA operators can be utilized for different decision making problems. It is demonstrated how a fuzzy ontology can model tacit knowledge which was collected from wine connoisseurs. The approach can be generalised and applied also to other practically important problems, such as intrusion detection. Additionally, a fuzzy ontology is applied in a novel consensus model for group decision making. By combining the fuzzy ontology with Semantic Web affiliated techniques novel applications have been designed. These applications show how the mobilisation of knowledge can successfully utilize also imprecise data. An important part of decision making processes is undeniably aggregation, which in combination with a fuzzy ontology provides a promising basis for demonstrating the benefits that one can retrieve from handling imprecise data. The new aggregation operators defined in the thesis often provide new possibilities to handle imprecision and expert opinions. This is demonstrated through both theoretical examples and practical implementations. This thesis shows the benefits of utilizing all the available data one possess, including imprecise data. By combining the concept of fuzzy ontology with the Semantic Web movement, it aspires to show the corporate world and industry the benefits of embracing fuzzy ontologies and imprecision.
Resumo:
The aim of this study was to identify and map the weed population in a no-tillage area. Geostatistical techniques were used in the mapping in order to assess this information as a tool for the localized application of herbicides. The area of study is 58.08 hectares wide and was sampled in a fixed square grid (which point spaced 50 m, 232 points) using a GPS receiver. In each point the weeds species and population were analyzed in a square with a 0.25 m2 fixed area. The species Ipomoea grandifolia, Gnaphalium spicatum, Richardia spp. and Emilia sonchifolia have presented no spatial dependence. However, the species Conyza spp., C. echinatus and E. indica have shown a spatial correlation. Among the models tested, the spherical model has shown had a better fit for Conyza spp. and Eleusine indica and the Gaussian model for Cenchrus echinatus. The three species have a clumped spatial distribution. The mapping of weeds can be a tool for localized control, making herbicide use more rational, effective and economical.
Resumo:
This study aimed to assess the degree of similarity presented by thematic maps generated by different sampling grids of weed plants in a commercial agricultural area of 7.95 hectares. Monocotyledons and dicotyledons were counted on the 2012/2013 and 2013/2014 harvests, before soybean planting, in the fallow period after wheat harvest, in both years. A regular grid of 10 x 10 m was produced to sample the invasive plants, used as reference, and the counting was done in 1 m² of each sample point, totaling 795 samples in each year, compared to regular grids of 30 and 50 m, generated from the data exclusion of the standard grid. Twenty-two composite soil samples were taken at a depth of 0-20 cm to correlate soil properties with weeds occurrence. For the generation of the thematic maps, the Inverse Distance Weighting (IDW) for interpolation was used; when comparing the maps generated from each grid with the reference map, the kappa coefficient was used to assess the loss of quality of the maps as the number of sample points was reduced. It was observed that the map quality loss was lower in 2013 compared to 2012 when the sampling density of the points was reduced. The 30 x 30 m grids have satisfactorily described the infestation data of the dicotyledons and the 50 x 50 m grids have adequately described the monocotyledon weeds infestation, compared to the standard 10 x 10 m grids.
Resumo:
A. peregrina var. falcata form mutualistic symbiosis with arbuscular mycorrhizal fungus. An anatomical and ultrastructural study was carried out to analyze some aspects of this simbiotic association as well as some root features. The results evidenced the presence of fibers with non-lignified thicked secondary walls in the stele and sparse papillae on root surface. A. peregrina var. falcata mycorrhizas presented features of Arum-type (intercellular hyphae) and Paris-type (extensive coils) arbuscular mycorrhiza. Their general appearance with extraradical hyphae, intracellular coils, intercellular hyphae and arbuscules, is in agreement with arbuscular mycorrhizas of several plants. The ultrastructural observations showed that in intercellular hyphae and arbuscules vacuoles were dominant and that in rough endoplasmatic reticulum and small vesicles seems to be associated with arbuscule senescence process.
Resumo:
The worry about the indiscriminate use of the terms cypsela and achene for the fruits of Asteraceae has been frequently detached by specialists in this family. The present work was developed aiming to verify the existence of arguments to justify the adoption of a term against the other. After historical and anatomical analysis, we concluded that there is technical basis to consider cypsela and achene as different types of fruits. For Asteraceae, the correct is to call cypsela; achenes are only derived from superior ovaries, as in Plumbaginaceae.
Resumo:
Samples of healthy leaves and galls induced by Schizomyia macrocapillata Maia on Bauhinia brevipes Vogel were submitted to routine techniques to investigate gall anatomy and development. Pouch galls are induced on the abaxial surface of unfolded immature leaves, and become spheroid with long reddish hairs covering their external surface. Galls occur isolated or coalesce when in larger numbers. Gall development was divided into six phases: 1) initiation; 2) tissue re-arrangement; 3) tissue differentiation; 4) maturation; 5) growth phase; and 6) dehiscence. This last phase corresponds to gall senescence, which takes place just after the larva exits the chamber to pupate. An important developmental phase of tissue reorientation was recorded after the initiation phase. The presence of hyphae close to the covering layer characterizes this gall as an ambrosia gall and the feeding mode of the gall migde is discussed. Few hyphae were found during the first developmental phases and fungi may play an important role during gall morphogenesis. Neoformed trichomes may provide not only photoprotection but also protection against natural enemies and water loss. The neoformation of phloematic bundles suggests host manipulation and indicates the establishment of a deviating sink.
Resumo:
Continuous loading and unloading can cause breakdown of cranes. In seeking solution to this problem, the use of an intelligent control system for improving the fatigue life of cranes in the control of mechatronics has been under study since 1994. This research focuses on the use of neural networks as possibilities of developing algorithm to map stresses on a crane. The intelligent algorithm was designed to be a part of the system of a crane, the design process started with solid works, ANSYS and co-simulation using MSc Adams software which was incorporated in MATLAB-Simulink and finally MATLAB neural network (NN) for the optimization process. The flexibility of the boom accounted for the accuracy of the maximum stress results in the ADAMS model. The flexibility created in ANSYS produced more accurate results compared to the flexibility model in ADAMS/View using discrete link. The compatibility between.ADAMS and ANSYS softwares was paramount in the efficiency and the accuracy of the results. Von Mises stresses analysis was more suitable for this thesis work because the hydraulic boom was made from construction steel FE-510 of steel grade S355 with yield strength of 355MPa. Von Mises theory was good for further analysis due to ductility of the material and the repeated tensile and shear loading. Neural network predictions for the maximum stresses were then compared with the co-simulation results for accuracy, and the comparison showed that the results obtained from neural network model were sufficiently accurate in predicting the maximum stresses on the boom than co-simulation.
Resumo:
This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.
Resumo:
Morphological, anatomical and biochemical alterations in foliar galls of Alstonia scholaris R. Br. induced by the insect Pauropsylla tuberculata (Psyllidae) are described and quantified. Galls occur isolated or agglomerated on the abaxial surface of the leaf. The insect along with the egg deposits some physiologic fluid which act as a stimulant for the induction of the gall. This stimulus brings about hypertrophy followed by hyperplasia of cells next to the location of the deposited eggs. The psyllid presents three nymphal instars, from eclosion of the egg to the adult. Hyperplasia in the palisade cells is very distinctly noticed. Hypertrophy followed by hyperplasia takes place and brings about elevation of hypodermal and palisade parenchyma which undergoes repeated anticlinal divisions. Neoformation of phloematic bundles were distinctly noticed close to the site of infection. With an increase in the growth of the gall, chlorophyll content in the gall tissue decreases. A steady increase of sugar content is noticed. The immature galled tissue showed almost two fold increases in the protein content. The mature galled tissue showed a very high increase in the proline content compared to the immature galled tissue indicating a stressed condition of the galled tissue.
Resumo:
The present work characterized and compared the anatomical structures of the leaves of Bactris gasipaes (Arecaceae) plants grown under different cultivation conditions (in vitro, ex vitro and in vivo) with the goal of identifying the origins of the difficulties encountered in acclimatizing micro-plants. The Quant program was used to determine leaf tissue thicknesses and areas, and histochemical tests were performed on leaf sections and analyzed using light microscopy. Stomatal and trichome densities were determined using the epidermal impression method and by scanning electronic microscopy. Our results indicated that there were no discernible alterations of the anatomical characteristics of the leaves of micro-plants cultivated under differing conditions and that the thickening of the mesophyll and the vascular fibers indicated adaptive responses to ex vitro conditions. As such, the observed difficulties in acclimatizing peach palm micro-plants to ex vitro conditions cannot be attributed to plant anatomical characteristics acquired during in vitro cultivation.
Resumo:
A new viviparous mutant of maize (Zea mays L.), associated with genetic instability and designated viviparous-12 (vp12), was identified in a synthetic Tuxpeño adapted to tropical regions. In the present work, the linkage group of this new locus was determined. Progenies of inbred line L477 segregating for the vp12 mutant were crossed with waxy-marked reciprocal translocation stocks. The phenotypic frequencies of the wx and vp12 mutants were analyzed in F2 progenies. The results demonstrated that the Viviparous-12 locus of maize is located on the long arm of chromosome 6.
Resumo:
A review of our recent work on the cromosomal evolution of the Drosophila repleta species group is presented. Most studies have focused on the buzzatii species complex, a monophyletic set of 12 species which inhabit the deserts of South America and the West Indies. A statistical analysis of the length and breakpoint distribution of the 86 paracentric inversions observed in this complex has shown that inversion length is a selected trait. Rare inversions are usually small while evolutionary successful inversions, fixed and polymorphic, are predominantly of medium size. There is also a negative correlation between length and number of inversions per species. Finally, the distribution of inversion breakpoints along chromosome 2 is non-random, with chromosomal regions which accumulate up to 8 breakpoints (putative "hot spots"). Comparative gene mapping has also been used to investigate the molecular organization and evolution of chromosomes. Using in situ hybridization, 26 genes have been precisely located on the salivary gland chromosomes of D. repleta and D. buzzatii; another nine have been tentatively identified. The results are fully consistent with the currently accepted chromosomal homologies between D. repleta and D. melanogaster, and no evidence for reciprocal translocations or pericentric inversions has been found. The comparison of the gene map of D. repleta chromosome 2 with that of the homologous chromosome 3R of D. melanogaster shows an extensive reorganization via paracentric inversions and allows to estimate an evolution rate of ~1 inversion fixed per million years for this chromosome