848 resultados para descriptive name for hypothesised object
Resumo:
When reengineering legacy systems, it is crucial to assess if the legacy behavior has been preserved or how it changed due to the reengineering effort. Ideally if a legacy system is covered by tests, running the tests on the new version can identify potential differences or discrepancies. However, writing tests for an unknown and large system is difficult due to the lack of internal knowledge. It is especially difficult to bring the system to an appropriate state. Our solution is based on the acknowledgment that one of the few trustable piece of information available when approaching a legacy system is the running system itself. Our approach reifies the execution traces and uses logic programming to express tests on them. Thereby it eliminates the need to programatically bring the system in a particular state, and handles the test-writer a high-level abstraction mechanism to query the trace. The resulting system, called TESTLOG, was used on several real-world case studies to validate our claims.
Resumo:
The large, bunodont postcanine teeth in living sea otters (Enhydra lutris) have been likened to those of certain fossil hominins, particularly the ’robust’ australopiths (genus Paranthropus). We examine this evolutionary convergence by conducting fracture experiments on extracted molar teeth of sea otters and modern humans (Homo sapiens) to determine how load-bearing capacity relates to tooth morphology and enamel material properties. In situ optical microscopy and x-ray imaging during simulated occlusal loading reveal the nature of the fracture patterns. Explicit fracture relations are used to analyze the data and to extrapolate the results from humans to earlier hominins. It is shown that the molar teeth of sea otters have considerably thinner enamel than those of humans, making sea otter molars more susceptible to certain kinds of fractures. At the same time, the base diameter of sea otter first molars is larger, diminishing the fracture susceptibility in a compensatory manner. We also conduct nanoindentation tests to map out elastic modulus and hardness of sea otter and human molars through a section thickness, and microindentation tests to measure toughness. We find that while sea otter enamel is just as stiff elastically as human enamel, it is a little softer and tougher. The role of these material factors in the capacity of dentition to resist fracture and deformation is considered. From such comparisons, we argue that early hominin species like Paranthropus most likely consumed hard food objects with substantially higher biting forces than those exerted by modern humans.
Resumo:
A descriptive study was carried out in the district of the Lake Geneva between March 1, 2005 and August 31,2006 to assess the incidence and prevalence of canine babesiosis, to genotype the Babesia species occurring, to assess the most frequently clinical signs found and to address the potential of autochthonous transmission. This included a data assessment on the different tick-populations occurring in the area and on the prevalence of Babesia-DNA in these ticks. A total of 56 veterinary practices participated in the study. By blood smear and PCR, Babesia canis canis was found in 12 out of 21 cases with suspected babesiosis. In an additional 13th case, the parasite could only be detected by PCR. All autochthonous cases originated from the Western part of the Lake Geneva region. Clinical signs in affected dogs included inappetence, apathy, anemia, fever, hemoglobinuria and thrombocytopenia. There were no risk factors with regard to age, sex and breed. Most cases were diagnosed during the spring periods of 2005 and 2006 (11 cases) and two cases in autumn 2005, coinciding with the main activity period of Dermacentor reticulatus, the main vector of B. canis canis. A total of 495 ticks were collected on patients by the veterinarians, 473 were identified as Ixodes sp., 7 as Rhipicephalus sanguineus and 15 as Dermacentor reticulatus. While Ixodes sp. was found in the whole study area, D. reticulatus and R. sanguineus occurred only in the Western part till Lausanne. PCR and sequencing yielded B. canis canis positivity in 3 D. reticulatus specimen, these three ticks were collected from two different dogs both suffering from babesiosis. All R. sanguineus were negative by Babesia-PCR. Global warming, ecological changes in the potential habitat of ticks, increasing host- and vector-populations and increasing mobility of dog owners may be responsible for an emergence situation of infection risk for Babesia spp. by time. E.g., Dermacentor reticulatus has become autochtonously prevalent already till Lausanne in the Lake Geneva region, and further surveillance is suggested to tackle this problem.
Resumo:
We developed an object-oriented cross-platform program to perform three-dimensional (3D) analysis of hip joint morphology using two-dimensional (2D) anteroposterior (AP) pelvic radiographs. Landmarks extracted from 2D AP pelvic radiographs and optionally an additional lateral pelvic X-ray were combined with a cone beam projection model to reconstruct 3D hip joints. Since individual pelvic orientation can vary considerably, a method for standardizing pelvic orientation was implemented to determine the absolute tilt/rotation. The evaluation of anatomically morphologic differences was achieved by reconstructing the projected acetabular rim and the measured hip parameters as if obtained in a standardized neutral orientation. The program had been successfully used to interactively objectify acetabular version in hips with femoro-acetabular impingement or developmental dysplasia. Hip(2)Norm is written in object-oriented programming language C++ using cross-platform software Qt (TrollTech, Oslo, Norway) for graphical user interface (GUI) and is transportable to any platform.
Resumo:
Following last two years’ workshop on dynamic languages at the ECOOP conference, the Dyla 2007 workshop was a successful and popular event. As its name implies, the workshop’s focus was on dynamic languages and their applications. Topics and discussions at the workshop included macro expansion mechanisms, extension of the method lookup algorithm, language interpretation, reflexivity and languages for mobile ad hoc networks. The main goal of this workshop was to bring together different dynamic language communities and favouring cross communities interaction. Dyla 2007 was organised as a full day meeting, partly devoted to presentation of submitted position papers and partly devoted to tool demonstration. All accepted papers can be downloaded from the workshop’s web site. In this report, we provide an overview of the presentations and a summary of discussions.
Resumo:
This morning Dr. Battle will introduce descriptive statistics and linear regression and how to apply these concepts in mathematical modeling. You will also learn how to use a spreadsheet to help with statistical analysis and to create graphs.
Resumo:
File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.
Resumo:
Patients with skin nodules characterized by the infiltrate of pleomorphic small/medium T lymphocytes are currently classified as "primary cutaneous CD4+ small-/medium-sized pleomorphic T-cell lymphoma" (SMPTCL) or as T-cell pseudolymphoma. The distinction is often arbitrary, and patients with similar clinicopathologic features have been included in both groups. We studied 136 patients (male:female = 1:1; median age: 53 years, age range: 3-90 years) with cutaneous lesions that could be classified as small-/medium-sized pleomorphic T-cell lymphoma according to current diagnostic criteria. All but 3 patients presented with solitary nodules located mostly on the head and neck area (75%). Histopathologic features were characterized by nonepidermotropic, nodular, or diffuse infiltrates of small- to medium-sized pleomorphic T lymphocytes. A monoclonal rearrangement of the T-cell receptor-gamma gene was found in 60% of tested cases. Follow-up data available for 45 patients revealed that 41 of them were alive without lymphoma after a median time of 63 months (range: 1-357 months), whereas 4 were alive with cutaneous disease (range: 2-16 months). The incongruity between the indolent clinical course and the worrying histopathologic and molecular features poses difficulties in classifying these cases unambiguously as benign or malignant, and it may be better to refer to them with a descriptive term such as "cutaneous nodular proliferation of pleomorphic T lymphocytes of undetermined significance," rather than forcing them into one or the other category. On the other hand, irrespective of the name given to these equivocal cutaneous lymphoid proliferations, published data support a nonaggressive therapeutic strategy, particularly for patients presenting with solitary lesions.