830 resultados para Inquiry-Based Activities


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A review of the historical development of the fishery resources of the Kyoga basin shows that the fishery based on the alien fishes which surplanted the indigenous species in the 1960's and early 1970's has been evolving. The record catches of the 19705 and early 1980's were mainly influenced by increased nutrient supply and enlarged lake volume. The sudden collapse in the fishery particularly of the Nile perch in the mid 1980's was most probably imposed by bad fishing regimes. However, future trends in the fisheries of the Kyoga basin will most likely be controlled by nutrient availability and dynamics as well as by the impact of mans activities in the Kyoga catchment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we use concepts from graph theory and cellular biology represented as ontologies, to carry out semantic mining tasks on signaling pathway networks. Specifically, the paper describes the semantic enrichment of signaling pathway networks. A cell signaling network describes the basic cellular activities and their interactions. The main contribution of this paper is in the signaling pathway research area, it proposes a new technique to analyze and understand how changes in these networks may affect the transmission and flow of information, which produce diseases such as cancer and diabetes. Our approach is based on three concepts from graph theory (modularity, clustering and centrality) frequently used on social networks analysis. Our approach consists into two phases: the first uses the graph theory concepts to determine the cellular groups in the network, which we will call them communities; the second uses ontologies for the semantic enrichment of the cellular communities. The measures used from the graph theory allow us to determine the set of cells that are close (for example, in a disease), and the main cells in each community. We analyze our approach in two cases: TGF-β and the Alzheimer Disease.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Estrogens can be labeled with the positron-emitting radionuclide fluorine-18 (t$\sb{1/2}$ = 110 min) by fluoride ion (n-Bu$\sb4$N$\sp{18}$F) displacement of a 16$\beta$-trifluoromethanesulfonate (triflate) derivative of the corresponding estrone 3-triflate, and purification by HPLC. That sequence has been used to synthesize the 11$\beta$-methoxy 1 and 11$\beta$-ethyl 2 analogues of the breast tumor imaging agent, 16$\alpha$-($\sp{18}$F) fluoro-17$\beta$-estradiol (FES). Tissue distribution studies of 1 and 2 in immature female rats show high selectivity for target tissue (T, uterus) vs non-target (NT, muscle and lung), with T/NT ratios being 43 and 17 at one hour after injection for 1 and 2, respectively. The parent estrogen FES has previously been shown to display an intermediate value for tissue selectivity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The U.S. railroad companies spend billions of dollars every year on railroad track maintenance in order to ensure safety and operational efficiency of their railroad networks. Besides maintenance costs, other costs such as train accident costs, train and shipment delay costs and rolling stock maintenance costs are also closely related to track maintenance activities. Optimizing the track maintenance process on the extensive railroad networks is a very complex problem with major cost implications. Currently, the decision making process for track maintenance planning is largely manual and primarily relies on the knowledge and judgment of experts. There is considerable potential to improve the process by using operations research techniques to develop solutions to the optimization problems on track maintenance. In this dissertation study, we propose a range of mathematical models and solution algorithms for three network-level scheduling problems on track maintenance: track inspection scheduling problem (TISP), production team scheduling problem (PTSP) and job-to-project clustering problem (JTPCP). TISP involves a set of inspection teams which travel over the railroad network to identify track defects. It is a large-scale routing and scheduling problem where thousands of tasks are to be scheduled subject to many difficult side constraints such as periodicity constraints and discrete working time constraints. A vehicle routing problem formulation was proposed for TISP, and a customized heuristic algorithm was developed to solve the model. The algorithm iteratively applies a constructive heuristic and a local search algorithm in an incremental scheduling horizon framework. The proposed model and algorithm have been adopted by a Class I railroad in its decision making process. Real-world case studies show the proposed approach outperforms the manual approach in short-term scheduling and can be used to conduct long-term what-if analyses to yield managerial insights. PTSP schedules capital track maintenance projects, which are the largest track maintenance activities and account for the majority of railroad capital spending. A time-space network model was proposed to formulate PTSP. More than ten types of side constraints were considered in the model, including very complex constraints such as mutual exclusion constraints and consecution constraints. A multiple neighborhood search algorithm, including a decomposition and restriction search and a block-interchange search, was developed to solve the model. Various performance enhancement techniques, such as data reduction, augmented cost function and subproblem prioritization, were developed to improve the algorithm. The proposed approach has been adopted by a Class I railroad for two years. Our numerical results show the model solutions are able to satisfy all hard constraints and most soft constraints. Compared with the existing manual procedure, the proposed approach is able to bring significant cost savings and operational efficiency improvement. JTPCP is an intermediate problem between TISP and PTSP. It focuses on clustering thousands of capital track maintenance jobs (based on the defects identified in track inspection) into projects so that the projects can be scheduled in PTSP. A vehicle routing problem based model and a multiple-step heuristic algorithm were developed to solve this problem. Various side constraints such as mutual exclusion constraints and rounding constraints were considered. The proposed approach has been applied in practice and has shown good performance in both solution quality and efficiency.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The emergence of multidrug-resistant bacterial infections in both the clinical setting and the community has created an environment in which the development of novel antibacterial compounds is necessary to keep dangerous infections at bay. While the derivatization of existing antibiotics by pharmaceutical companies has so far been successful at achieving this end, this strategy is short-term, and the discovery of antibacterials with novel scaffolds would be a greater contribution to the fight of multidrug-resistant infections. Described herein is the application of both target-based and whole cell screening strategies to identify novel antibacterial compounds. In a target-based approach, we sought small-molecule disruptors of the MazEF toxin-antitoxin protein complex. A lack of facile, continuous assays for this target required the development of a fluorometric assay for MazF ribonuclease activity. This assay was employed to further characterize the activity of the MazF enzyme and was used in a screening effort to identify disruptors of the MazEF complex. In addition, by employing a whole cell screening approach, we identified two compounds with potent antibacterial activity. Efforts to characterize the in vitro antibacterial activities displayed by these compounds and to identify their modes of action are described.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

É na busca por compreender a inserção e participação de mulheres na política partidária na contemporaneidade que esta dissertação, situada na linha de pesquisa Culturas, Linguagens e Utopias, tem como objetivo analisar as narrativas de vereadoras de municípios que estão localizados na região sul do Rio Grande do Sul no período de 2009-2012. O corpus de análise constitui-se de entrevistas individuais semiestruturadas com as onze vereadoras participantes a partir da metodologia de investigação narrativa. Partindo das contribuições dos Estudos Culturais e de Gênero em suas vertentes pós-estruturalistas procurou-se problematizar alguns discursos e práticas que emergiram nas narrativas com base nas contribuições da análise do discurso de Michel Foucault. Assim, verificou-se que a representação cultural das mulheres neste campo político está fundamentada em concepções essencialistas do gênero feminino como a sensibilidade. Isso vem provocando discussões na ciência política e nos estudos de gênero a partir de termos como política de ideias, política de desvelo que discutem a presença das mulheres em decorrência ou não desses atributos. O fato é que esses discursos vêm instituindo diferenças na participação de homens e mulheres na política e constituindo formas de ser mulher na política partidária e de fazer política diferenciada das dos homens de forma menos “dura”, “rígida”. Ao debruçar-se na inserção das mulheres nessa esfera pública constatou-se uma trajetória marcada pelas noções de público e privado que impediu ao longo de nossa história a participação das mulheres no campo político e o desenvolvimento de sua cidadania. Além disso, nas narrativas das vereadoras fica evidente que as mulheres não foram constituídas para participarem do que hoje é um direito seu: a esfera pública de decisão da política. Isso foi constatado a partir do convite que foi feito para a candidatura pelos partidos que a partir das cotas partidárias procuraram mais significativamente por mulheres para concorrer. Também se observou neste estudo o capital político de ingresso das mulheres nessa esfera: o capital familiar, capital dos movimentos sociais e capital de ocupação em cargos públicos. Quanto a participação das mulheres no cotidiano de seus mandatos identificamos a dificuldade de ser mulher e política na atualidade. As negociações com os partidos e os colegas, a conciliação entre a família e a vida pública; os focos de atuação dedicados as áreas sociais e nesse destacamos mais significativamente a educação. Por fim, o que pretendemos foi desconfiar da máxima “lugar de mulher não é na política” e conhecer as trajetórias e histórias de mulheres que cotidianamente entre conflitos e disputas lutam pelo seu lugar na esfera pública, pelo exercício de sua cidadania.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The coastal districts, as an intersection of two perfectly different ecosystems of dry land and sea, is one of the most complicated and the richest natural system on earth. Considering these areas are constantly exposed to aggregation of water pollutants and also consequence resulting from construction and development activities, they are very vulnerable. Therefore, "sensitive Coastal areas" has become a common word in the related subjects to marine environment recently. The said title relates to the areas of the coastal lines which are vulnerable to the natural condition or human actions because of ecological, social, economic, educational and research importance, also they need particular supports. The southern coasts of Caspian Sea, In Iran prominent samples are of these sensitive areas which their environment are exposed to demolition and destruction intensely, due to increasing and uncontrolled development. The first stage of protecting and managing the coastal areas is identifying sensitive Coastal areas and broadening the Coasts. In this survey, we attempted to examine a definite area in the southern coasts of Caspian Sea. In Iran, by profiting from the world experiences and concluded researches in Iran especially the concluded studies by marine environment office and the Environment protection organization on the subject of determination criteria of the sensitive ecological districts. For this purpose (In Gilan Province) Boujagh national park district which is located in the mouth of sefidroud river and also is possessed of the special ecological and environmental features and distinctions. In this survey, first they said district is divided proportionally on the basis of using a grid system in order to identify the sensitive ecological districts and broaden the coast, and then the desired indices have been determined and scored by numeral valuation method in each unit and then analysis has been done by using of the geography information system (GIS) and final has estimated economic valuation of sensitive ecological areas that is presented in this essay.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Hand detection on images has important applications on person activities recognition. This thesis focuses on PASCAL Visual Object Classes (VOC) system for hand detection. VOC has become a popular system for object detection, based on twenty common objects, and has been released with a successful deformable parts model in VOC2007. A hand detection on an image is made when the system gets a bounding box which overlaps with at least 50% of any ground truth bounding box for a hand on the image. The initial average precision of this detector is around 0.215 compared with a state-of-art of 0.104; however, color and frequency features for detected bounding boxes contain important information for re-scoring, and the average precision can be improved to 0.218 with these features. Results show that these features help on getting higher precision for low recall, even though the average precision is similar.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years there have been several proposals for alternative pedagogical practices. Most of these proposals are based in the, so called, “active learning”, in opposition to the common “passive learning”, which is centered on transmission of information inside classrooms as well as recognized as teacher-centered procedure. In an active learning pedagogical structure, students have a more participative role in the overall learning/teaching process, being encouraged to face new learning challenges like, for instance, solving problems and developing projects, in an autonomous approach trying to make them, consequently, able to build their own knowledge. The flipped or “inverted” classroom is one of these active learning pedagogical methodologies that emphasizes a learner-centered instruction. According to this approach, the first contact that students have with the content on a particular curriculum subject is not transmitted by the lecturer in the classroom, this teaching strategy requires students to assess and analyze the specific subject before attending to class, therefore the informational component from the lecture is the homework, and class time is dedicated to exercises and assignments, always with support from the instructor, who acts as a facilitator, helping students when needed and offering supplementary explanation as required. The main objective of this paper is to discuss and explore how the use of different types of instructional videos and online activities may be implemented in the flipped classroom procedure (as means of incorporating new content and teaching new competencies) and to describe students’ perceptions of this approach within a course in a Higher Education Institution (HEI), presenting some positive and negative features of this pedagogical practice.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Osteosarcoma is the most frequent malignant primary bone tumor characterized by a high potency to form lung metastases. In this study, the effect of three oversulfated low molecular weight marine bacterial exopolysaccharides (OS-EPS) with different molecular weights (4, 8 and 15 kDa) were first evaluated in vitro on human and murine osteosarcoma cell lines. Different biological activities were studied: cell proliferation, cell adhesion and migration, matrix metalloproteinase expression. This in vitro study showed that only the OS-EPS 15 kDa derivative could inhibit the invasiveness of osteosarcoma cells with an inhibition rate close to 90%. Moreover, this derivative was potent to inhibit both migration and invasiveness of osteosarcoma cell lines; had no significant effect on their cell cycle; and increased slightly the expression of MMP-9, and more highly the expression of its physiological specific tissue inhibitor TIMP-1. Then, the in vivo experiments showed that the OS-EPS 15 kDa derivative had no effect on the primary osteosarcoma tumor induced by osteosarcoma cell lines but was very efficient to inhibit the establishment of lung metastases in vivo. These results can help to better understand the mechanisms of GAGs and GAG-like derivatives in the biology of the tumor cells and their interactions with the bone environment to develop new therapeutic strategies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Database schemas, in many organizations, are considered one of the critical assets to be protected. From database schemas, it is not only possible to infer the information being collected but also the way organizations manage their businesses and/or activities. One of the ways to disclose database schemas is through the Create, Read, Update and Delete (CRUD) expressions. In fact, their use can follow strict security rules or be unregulated by malicious users. In the first case, users are required to master database schemas. This can be critical when applications that access the database directly, which we call database interface applications (DIA), are developed by third party organizations via outsourcing. In the second case, users can disclose partially or totally database schemas following malicious algorithms based on CRUD expressions. To overcome this vulnerability, we propose a new technique where CRUD expressions cannot be directly manipulated by DIAs any more. Whenever a DIA starts-up, the associated database server generates a random codified token for each CRUD expression and sends it to the DIA that the database servers can use to execute the correspondent CRUD expression. In order to validate our proposal, we present a conceptual architectural model and a proof of concept.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Requirements specification has long been recognized as critical activity in software development processes because of its impact on project risks when poorly performed. A large amount of studies addresses theoretical aspects, propositions of techniques, and recommended practices for Requirements Engineering (RE). To be successful, RE have to ensure that the specified requirements are complete and correct what means that all intents of the stakeholders in a given business context are covered by the requirements and that no unnecessary requirement was introduced. However, the accurate capture the business intents of the stakeholders remains a challenge and it is a major factor of software project failures. This master’s dissertation presents a novel method referred to as “Problem-Based SRS” aiming at improving the quality of the Software Requirements Specification (SRS) in the sense that the stated requirements provide suitable answers to real customer ́s businesses issues. In this approach, the knowledge about the software requirements is constructed from the knowledge about the customer ́s problems. Problem-Based SRS consists in an organization of activities and outcome objects through a process that contains five main steps. It aims at supporting the software requirements engineering team to systematically analyze the business context and specify the software requirements, taking also into account a first glance and vision of the software. The quality aspects of the specifications are evaluated using traceability techniques and axiomatic design principles. The cases studies conducted and presented in this document point out that the proposed method can contribute significantly to improve the software requirements specification.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Borututu ( Cochlospermum angolensis Welw.) is a widespread tree in Angola used since antiquity by traditional healers for the prevention and treatment of hepatic diseases and for the prophylaxis of malaria [1]. This plant is mostly consumed as infusions but is also available as dietary supplements, such as piiis, capsules, and syrups, among others. In the present study, the aim was to evaluate the proximate composition and energetic contribution of borututu as weii as its composition in hydrophilic (sugars and organic acids) and lipophilic (fatty acids and tocopherols) compounds, given the fact that this plant is directly introduced in some dietary supplements. Furthermore, the bioactivity (antioxidant, hepatoprotective and antimicrobial activities) of three different formulations of borututu (infusion, pills, and syrup) was assessed and compared, and since plant beneficial properties are often ascribed to phenolic compounds [2], the phenolic profile of the formulations was also analysed. Carbohydrates (88 g/100 g) and fat (2.5 g/100 g) were the major and tl1e minor components of the studied borututu dry barks, respectively, with an energetic contribution of 384 kcal/100 g. Fructose was the most abundant sugar (1.3 g/100 g), foilowed by sucrose, trehalose and glucose (1.1, 0.98 and 0.79 g/100 g, respectively). Oxalic (0.70 g/100 g), malic (0.63 g/100 g) and citric (0.57 g/100 g) acids were present in higher amounts but shikimic and fumaric acids were also detected. Among the fatty acids found in borututu, a prevalence of saturated fatty acids (SF A; 48.2%) was observed, whereas polyunsaturated (PUFA) and monounsaturated (MUFA) fatty acids were detected in relative percentages of 30.9% and 20.8%, respectively. P-tocopherol was the most abundant of the four isoforms found in the sample, foiiowed by o-, a- and y-tocopherol, present in concentrations of 597,43, 3.7 and 2.0 g/100 g, respectively. Borututu infusion revealed the highest antioxidant activity, with EC50 values ranging from 20 to 600 J.lg/mL and was the only formulation inhibiting the growth of an HepG2 ceii line, with a Gl5o value of 146 J.lg/mL. This formulation.also revealed the best antimicrobial capacity and proved to be able to inhibit the growth of Escherichia coli, E. coli ESBL, Staphylococcus aureus and Pseudomonas aeruginosa, with MIC values of 50, 6.2, 1.6 and 25 mg!mL, respectively. Pills revealed activity against some of the studied bacterial strains and the syrup did not reveal antimicrobial activity at the studied concentration. Eilagic acids, methyl ellagic acids, eucaglobulinlglobulusin B and (epi)gaiiocatechin-0-gallate were the compounds present in all the different formulations. The highest concentration of phenolic compounds was found in the infusion extract. Protocatechuic acid was the most abundant phenolic compound in the infusions, the only preparation where it was detected, whereas ( epi)gaiiocatechin- 0-gallate was the main phenolic in the pills and eucaglobulinlglobulusin in the syrup. In a general way, borututu proved to be a good source of phytochemicals such as phenolic compounds, with the infusions revealing the best bioactive properties.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The text analyses the intelligence activity against Poland in the period 1944-1989. The paper also contains a case study, i.e. an analysis of the American intelligence service activity held against Poland. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of Internal Affairs. In order to best illustrate the point, the author presented a number of cases of persons who spied for the USA, which was possible thanks to the analysis of the training materials of the Ministry of Internal Affairs directed to the officers of the Security Service and the Citizens’ Militia. The text tackles the following issues: (1) to what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination?, (2) what was the level of interest of the foreign intelligence services in Poland before the year 1990?, (3) is it possible to indicate the specificity of the U.S. intelligence activity against Poland? 1) The analysis of data indicates that the period 1946-1956 witnessed a great number of convictions for espionage, which is often associated with the peculiar political situation in Poland of that time. Up to 1953, the countries of the Eastern bloc had reproduced the Stalin’s system, which only ceased due to the death of Stalin himself. Since then, the communist systems gradually transformed into the system of nomenklatura. Irrespective of these changes, Poland still witnessed a wave of repressions, which resulted from the threats continuously looming over the communist authorities – combating the anti-communist underground movement, fighting with the Ukrainian Insurgent Army, the Polish government-in-exile, possible revisionism of borders, social discontent related to the socio-political reforms. Hence, a great number of convictions for espionage at that time could be ascribed to purely political sentences. Moreover, equally significant was the fact that the then judicial practice was preoccupied assessing negatively any contacts and relations with foreigners. This excessive number of convictions could ensue from other criminal-law provisions, which applied with respect to the crimes against the State, including espionage. What is also important is the fact that in the Stalin’s period the judiciary personnel acquired their skills and qualifications through intensive courses in law with the predominant spirit of the theory of evidence and law by Andrey Vyshinsky. Additionally, by the decree of 1944 the Penal Code of the Polish Armed Forces was introduced; the code envisaged the increase in the number of offences classified as penalised with death penalty, whereas the high treason was subject to the military jurisdiction (the civilians were prosecuted in military courts till 1955; the espionage, however, still stood under the military jurisdiction). In 1946, there was introduced the Decree on particularly dangerous crimes in the period of the State’s recovery, which was later called a Small Penal Code. 2) The interest that foreign intelligence services expressed in relation to Poland was similar to the one they had in all countries of Eastern and Central Europe. In the case of Poland, it should be noted that foreign intelligence services recruited Polish citizens who had previously stayed abroad and after WWII returned to their home country. The services also gathered information from Poles staying in immigrant camps (e.g. in FRG). The activity of the American intelligence service on the territory of FRG and West Berlin played a key role. The documents of the Ministry of Internal Affairs pointed to the global range of this activity, e.g. through the recruitment of Polish sailors in the ports of the Netherlands, Japan, etc. In line with the development in the 1970s, espionage, which had so far concentrated on the defence and strategic sectors, became focused on science and technology of the People’s Republic of Poland. The acquisition of collaborators in academic circles was much easier, as PRL opened to academic exchange. Due to the system of visas, the process of candidate selection for intelligence services (e.g. the American) began in embassies. In the 1980s, the activity of the foreign intelligence services concentrated on the specific political situation in Poland, i.e. the growing significance of the “Solidarity” social movement. 3) The specificity of the American intelligence activity against Poland was related to the composition of the residency staff, which was the largest in comparison to other Western countries. The wide range of these activities can be proved by the quantitative data of convictions for espionage in the years 1944-1984 (however, one has to bear in mind the factors mentioned earlier in the text, which led to the misinterpretation of these data). Analysing the data and the documents prepared by the Ministry of Internal Affairs, one should treat them with caution, as, frequently, the Polish counter-intelligence service used to classify the ordinary diplomatic practice and any contacts with foreigners as espionage threats. It is clearly visible in the language of the training materials concerned with “secret service methods of the intelligence activity” as well as in the documents on operational activities of the Security Service in relation to foreigners. The level of interest the USA had in Poland was mirrored in the classification of diplomatic posts, according to which Warsaw occupied the second place (the so-called Group “B”) on the three-point scale. The CIA experienced spectacular defeats during their activity in Poland: supporting the Polish underground anti-communist organisation Freedom and Independence and the so-called Munich-Berg episode (both cases took place in the 1950s). The text focuses only on selected issues related to the espionage activities against Poland. Similarly, the analysis of the problem has been based on selected sources, which has limited the research scope - however, it was not the aim of the author to present the espionage activity against Poland in a comprehensive way. In order to assess the real threat posed by the espionage activity, one should analyse the case of persons convicted for espionage in the period 1944-1989, as the available quantitative data, mentioned in the text, cannot constitute an explicit benchmark for the scale of espionage activity. The inaccuracies in the interpretation of data and variables, which can affect the evaluation of this phenomenon, have been pointed out in the text.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Family prevention programs need to be evidence-based in order to guarantee the success of their implementation. The Family Competence Program (FCP), a Spanish cultural adaptation of the Strengthening Families Program (SFP), has developed different measures and processes to gauge the quality of the implementation. This article is dedicated specifically to two of these measures: the evaluation of the facilitators and the assessment of the family engagement techniques. For evaluating the facilitators, a Delphi technique with experts and professionals is undertaken. For assessing the family techniques, both self-evaluation of trainers and evaluation by families are used. Finding underpin that, in the case of facilitators, is important that, after to skills and experience, they need to understand the theory of change of the program. In the case of family engagement techniques, more detailed, comprehensive talks, discussions and group activities lead to better family engagement outcomes.