885 resultados para Construction of mothers
Resumo:
Developing software is a difficult and error-prone activity. Furthermore, the complexity of modern computer applications is significant. Hence,an organised approach to software construction is crucial. Stepwise Feature Introduction – created by R.-J. Back – is a development paradigm, in which software is constructed by adding functionality in small increments. The resulting code has an organised, layered structure and can be easily reused. Moreover, the interaction with the users of the software and the correctness concerns are essential elements of the development process, contributing to high quality and functionality of the final product. The paradigm of Stepwise Feature Introduction has been successfully applied in an academic environment, to a number of small-scale developments. The thesis examines the paradigm and its suitability to construction of large and complex software systems by focusing on the development of two software systems of significant complexity. Throughout the thesis we propose a number of improvements and modifications that should be applied to the paradigm when developing or reengineering large and complex software systems. The discussion in the thesis covers various aspects of software development that relate to Stepwise Feature Introduction. More specifically, we evaluate the paradigm based on the common practices of object-oriented programming and design and agile development methodologies. We also outline the strategy to testing systems built with the paradigm of Stepwise Feature Introduction.
Resumo:
The administration of baculoviruses to insects for bioassay purposes is carried out, in most cases, by contamination of food surfaces with a known amount of occlusion bodies (OBs). Since per os infection is the natural route of infection, occluded recombinant viruses containing crystal protein genes (cry1Ab and cry1Ac) from Bacillus thuringiensis were constructed for comparison with the baculovirus prototype Autographa californica nucleopolyhedrovirus (AcNPV). The transfer vector pAcUW2B was used for construction of occluded recombinant viruses. The transfer vector containing the crystal protein genes was cotransfected with linearized DNA from a non-occluded recombinant virus. The isolation of recombinant viruses was greatly facilitated by the reduction of background "wild type" virus and the increased proportion of recombinant viruses. Since the recombinant viruses containing full-length and truncated forms of the crystal protein genes did not seem to improve the pathogenicity of the recombinant viruses when compared with the wild type AcNPV, and in order to compare expression levels of the full-length crystal proteins produced by non-occluded and occluded recombinant viruses the full-length cry1Ab and cry1Ac genes were chosen for construction of occluded recombinant viruses. The recombinant viruses containing full-length and truncated forms of the crystal protein genes did not seem to improve its pathogenicity but the size of the larvae infected with the recombinant viruses was significantly smaller than that of larvae infected with the wild type virus.
Resumo:
There is currently little empirical knowledge regarding the construction of a musician’s identity and social class. With a theoretical framework based on Bourdieu’s (1984) distinction theory, Bronfenbrenner’s (1979) theory of ecological systems, and the identity theories of Erikson (1950; 1968) and Marcia (1966), a survey called the Musician’s Social Background and Identity Questionnaire (MSBIQ) is developed to test three research hypotheses related to the construction of a musician’s identity, social class and ecological systems of development. The MSBIQ is administered to the music students at Sibelius Academy of the University of Arts Helsinki and Helsinki Metropolia University of Applied Sciences, representing the ’highbrow’ and the ’middlebrow’ samples in the field of music education in Finland. Acquired responses (N = 253) are analyzed and compared with quantitative methods including Pearson’s chi-square test, factor analysis and an adjusted analysis of variance (ANOVA). The study revealed that (1) the music students at Sibelius Academy and Metropolia construct their subjective musician’s identity differently, but (2) social class does not affect this identity construction process significantly. In turn, (3) the ecological systems of development, especially the individual’s residential location, do significantly affect the construction of a musician’s identity, as well as the age at which one starts to play one’s first musical instrument. Furthermore, a novel finding related to the structure of a musician’s identity was the tripartite model of musical identity consisting of the three dimensions of a musician’s identity: (I) ’the subjective dimension of a musician’s identity’, (II) ’the occupational dimension of a musician’s identity’ and, (III) ’the conservative-liberal dimension of a musician’s identity’. According to this finding, a musician’s identity is not a uniform, coherent entity, but a structure consisting of different elements continuously working in parallel within different dimensions. The results and limitations related to the study are discussed, as well as the objectives related to future studies using the MSBIQ to research the identity construction and social backgrounds of a musician or other performing artists.
Resumo:
Our aim was to construct a recombinant adenovirus co-expressing truncated human prostate-specific membrane antigen (tPSMA) and mouse 4-1BBL genes and to determine its effect on dendritic cells (DCs) generated from bone marrow suspensions harvested from C57BL/6 mice for which the effect of 4-1BBL on DCs is not clear, especially during DCs processing tumor-associated antigen. Replication deficient adenovirus AdMaxTM Expression System was used to construct recombinant adenovirus Ad-tPSMA-internal ribosome entry site-mouse 4-1BBL (Ad-tPSMA-IRES-m4-1BBL) and Ad-enhanced green fluorescent protein. Day 7 proliferating DC aggregates generated from C57BL/6 mice were collected as immature DCs and further mature DCs were obtained by lipopolysaccharide activated immature DCs. After DCs were exposed to the recombinant adenovirus with 250 multiplicity of infection, the expression of tPSMA and m4-1BBL proteins were detected by Western blot, and the apoptosis and phenotype of DCs were analyzed by flow cytometry. Cytokines (IL-6 and IL-12) in the supernatant were detected by enzyme-linked immunosorbent assay (ELISA). Proliferation of T cells was detected by allogeneic mixed lymphocyte reactions. The tPSMA and m4-1BBL proteins were expressed correctly. The apoptosis rate of DCs transfected with Ad-tPSMA-IRES-m4-1BBL was 14.6%, lower than that of control DCs. The expression of co-stimulatory molecules [CD80 (81.6 ± 5.4%) and CD86 (80.13 ± 2.81%)] up-regulated in Ad-tPSMA-IRES-m4-1BBL-pulsed DCs, and the level of IL-6 (3960.2 ± 50.54 pg/mL) and IL-12 (249.57 ± 12.51 pg/mL) production in Ad-tPSMA-IRES-m4-1BBL-transduced DCs were significantly higher (P < 0.05) than those in control DCs. Ad-tPSMA-IRES-m4-1BBL induced higher T-cell proliferation (OD450 = 0.614 ± 0.018), indicating that this recombinant adenovirus can effectively enhance the activity of DCs.
Resumo:
Microscopic visualization, especially in transparent micromodels, can provide valuable information to understand the transport phenomena at pore scale in different process occurring in porous materials (food, timber, soils, etc.). Micromodels studies focus mainly on the observation of multi-phase flow, which presents a greater proximity to reality. The aim of this study was to study the process of flexography and its application in the manufacture of polyester resin transparent micromodels and its application to carrots. Materials used to implement a flexo station for micromodels construction were thermoregulated water bath, exposure chamber to UV light, photosensitive substance (photopolymer), RTV silicone polyester resin, and glass plates. In this paper, data on size distribution of a particular kind of carrot we used, and a transparent micromodel with square cross-section as well as a Log-normal pore size distribution with pore radii ranging from 10 to 110 µm (average of 22 µm and micromodel size of 10 × 10 cm) were built. Finally, it stresses that it has successfully implemented the protocol processing 2D polyester resin transparent micromodels.
Resumo:
Abstract The present work describes setting up a laboratory unit for supercritical fluid extraction. In addition to its construction, a survey of cost was done to compare the cost of the homemade unit with that of commercial units. The equipment was validated using an extraction of annatto seeds’ oil, and the extraction and fractionation of fennel oil were used to validate the two separators; for both systems, the solvent was carbon dioxide. The chemical profiles of annatto and fennel extracts were assessed using thin layer chromatography; the images of the chromatographic plates were processed using the free ImageJ software. The cost survey showed that the homemade equipment has a very low cost (~US$ 16,000) compared to commercial equipment. The extraction curves of annatto were similar to those obtained in the literature (yield of 3.8% oil). The separators were validated, producing both a 2.5% fraction of fennel seed extract rich in essential oils and another extract fraction composed mainly of oleoresins. The ImageJ software proved to be a low-cost tool for obtaining an initial evaluation of the chemical profile of the extracts.
Resumo:
This dissertation examines parental disciplinary violence against children in authority records and in the criminal procedure in Finland. The main aim is to analyze disciplinary violence, how it is defined, and how it is constructed as a crime by social workers, the police, and parents. This dissertation consists of four sub-studies and a summary article. In the first sub-study, I examine how disciplinary violence appears in child welfare documents and analyze the decision-making processes and measures taken by the child welfare workers. The second sub-study, utilizing police interview data, examines police officers’ perceptions of disciplinary violence, its criminalization, and its investigation. In addition to this analysis of police officers’ own perceptions, in the third sub-study, I use reports of crime and pre-trial investigation documents to look at what a typical suspicion of disciplinary violence coming to the attention of the police is and examine the decision-making processes of the police. Utilizing authority data, the fourth sub-study analyzes how parents rationalize the use of disciplinary violence to the authorities investigating these suspicions. The research provides findings that are unprecedented in Finland. Firstly, it was shown that social workers’ decision-making processes in suspicions of disciplinary violence follow three pathways of reasoning, with many factors taken into consideration; and in less than one-third of the cases, a request for criminal investigation has been made to the police. Secondly, it was verified that police officers hold different perceptions of disciplinary violence, and these perceptions have multiple effects on the investigation of these cases and the construction of disciplinary violence as a crime. Thirdly, the analysis of the reports of crime and pre-trial investigation documents showed that almost two-thirds of the cases of disciplinary violence had been sent to a prosecutor by the police and, thus, defined as a crime. However, in many cases, acts of disciplinary violence were often seen as ‘educational, petty one-off incidents’ and a possible trial and punishment for the perpetrator were seen as unreasonable. Fourthly, it was found that parents often try to neutralize and rationalize the violence they have used against their children, for example, either by denying the victim, the criminal intent, or the entire act, or relying on the necessity of the forbidden act. The dissertation concludes that disciplinary violence is defined and constructed in authority policies and practices, first and foremost, by the severity of the act, the nature of the act as continuous or singular, the perceived harm caused by the act to a child, and the perceptions of authorities regarding physical punishment of children. The asymmetrical power setting present in disciplinary violence and parents’ legitimized right to raise and discipline their children partly seem to explain why criminal-law processing of these suspicions of violence and understanding these as crimes is difficult. Finally, this research calls for more coherent and consistent authority practices and policies, achieved by educating authorities and increasing awareness on disciplinary violence, questions the need for a concept like ‘disciplinary’ violence, and suggests more emphasis on unambiguous perceptions of a child’s best interest.
Resumo:
The relative ease to concentrate and purify adenoviruses, their well characterized mid-sized genome, and the ability to delete non-essential regions from their genome to accommodate foreign gene, made adenoviruses a suitable candidate for the construction of vectors. The use of adenoviral vectors in gene therapy, vaccination, and as a general vector system for expressing foreign genes have been documented for some time. In this study, the objective was to rescue a BAV3 E1 or E3 recombinant vector carrying the kanamycin resistant gene, a dominant selectable marker with useful applications in studying vectored gene expression in mammalian cells. To accomplish the objective of this study, more information about BAV3 DNA sequences was required in order to make the manipulation of the virus genome accessible. Therefore, sequencing of the BAV3 genome from 1 1 .7% to 30.8% was carried out. Analysis of the determined sequences revealed the primary structure of important viral gene products coded by E2 including BAV3 DNA pol and precursor to terminal protein. Comparative analysis of these proteins with their counterparts from human and non human adenoviruses revealed important insights as to the evolutionary lineage of BAV3. In order to insert the kanamycin resistance gene in either E1 or E3, it was necessary to delete BAV3 sequences to accommodate the foreign gene so as not to exceed the limit of the packaging capacity of the virus. To construct a recombinant BAV3 in which a foreign gene was inserted in the deleted E1 region, an E1 shuttle vector was constructed. This involved the deletion from the viral sequences a region between 1.3% to 9% and inserting the kanamycin resistance gene to replace the deletion. The E1 shuttle vector contained the left (0%- 53.9%) segment of the genome and was expected to generate BAV3 recombinants that can be grown and propagated in cells that can complement the missing E1 functions. To construct a similar shuttle vector for E3 deletion, DNA sequences extending from 78.9% to 82.5% (1281 bp) were deleted from within the E3 region that had been cloned into a plasmid vector. The deleted region corresponds to those that have been shown to be non-essential for viral replication in cell culture. The resulting plasmid was used to construct another recombinant plasmid with BAV3 DNA sequences extending from 37.1% to 100% and with a deletion of E3 sequences that were replaced by kanamycin resistance gene. This shuttle plasmid was used in cotransfections with digested viral DNA in an attempt to rescue a recombinant BAV3 carrying the kanamycin resistance gene to replace the deleted E3. In spite of repeated attempts of transfection, El or E3 recombinant BAV3 were not isolated. It seems that other approaches should be applied to make a final conclusion on BAV3 infectivity.
Resumo:
Construction of the Hutton Sports Center, 219 E. Sycamore St., Chapman College, Orange, California, 1977. The Harold Hutton Sports Center, completed in 1978, is named in honor of this former trustee, and made possible by a gift from his wife, Betty Hutton Williams.
Resumo:
Finding large deletion correcting codes is an important issue in coding theory. Many researchers have studied this topic over the years. Varshamov and Tenegolts constructed the Varshamov-Tenengolts codes (VT codes) and Levenshtein showed the Varshamov-Tenengolts codes are perfect binary one-deletion correcting codes in 1992. Tenegolts constructed T codes to handle the non-binary cases. However the T codes are neither optimal nor perfect, which means some progress can be established. Latterly, Bours showed that perfect deletion-correcting codes have a close relationship with design theory. By this approach, Wang and Yin constructed perfect 5-deletion correcting codes of length 7 for large alphabet size. For our research, we focus on how to extend or combinatorially construct large codes with longer length, few deletions and small but non-binary alphabet especially ternary. After a brief study, we discovered some properties of T codes and produced some large codes by 3 different ways of extending some existing good codes.
Resumo:
Brock’s Monument is owned by Parks Canada and maintained by the Niagara Parks Commission in collaboration with the Friends of Fort George and Niagara National Historic Sites. It is located in Queenston Heights Park atop the Niagara Escarpment. On March 14, 1815, Parliament passed an act to erect a monument to the memory of General Isaac Brock. A design by engineer Francis Hall was selected. He envisioned a 135 ft. tall Tuscan column, made out of stone with a winding staircase inside. By the spring of 1824, work had begun on the monument. In June of that year, the cornerstone was laid and William Lyon Mackenzie was in attendance at the ceremony. It was on October 13th, 1824 (the anniversary of Brock’s death) that 6000 people traveled to Queenston to inter the remains of Brock and Lieutenant-Colonel Macdonell. This was the second burial for both. After 3 years the tower had reached 135 feet, but there was no inscription at the base, the fence around the observation deck had not been installed and there was no statue of Brock. Hall submitted a plan to finish the statue, but he was turned down and a simple ornament was placed where the Brock statue should have been. A massive blast of gunpowder destroyed the monument in 1840. It is alleged that an American sympathizer with the Upper Canada Rebellion set off the blast. Brock and Macdonell’s bodies were reburied in the Hamilton Family Cemetery in Queenston. The present monument was rebuilt in 1853. William Thomas (designer of St. Michael’s Cathedral in Toronto) was the architect. Brock and Macdonell were once again laid to rest in separate vaults at the statue. In 1968, Brock’s Monument was declared a national historical site. In 2005, it was closed to the public due to safety concerns, but it reopened in 2010. Source: http://www.thecanadianencyclopedia.com/articles/brocks-monument-queenston-heights
Resumo:
A complex network is an abstract representation of an intricate system of interrelated elements where the patterns of connection hold significant meaning. One particular complex network is a social network whereby the vertices represent people and edges denote their daily interactions. Understanding social network dynamics can be vital to the mitigation of disease spread as these networks model the interactions, and thus avenues of spread, between individuals. To better understand complex networks, algorithms which generate graphs exhibiting observed properties of real-world networks, known as graph models, are often constructed. While various efforts to aid with the construction of graph models have been proposed using statistical and probabilistic methods, genetic programming (GP) has only recently been considered. However, determining that a graph model of a complex network accurately describes the target network(s) is not a trivial task as the graph models are often stochastic in nature and the notion of similarity is dependent upon the expected behavior of the network. This thesis examines a number of well-known network properties to determine which measures best allowed networks generated by different graph models, and thus the models themselves, to be distinguished. A proposed meta-analysis procedure was used to demonstrate how these network measures interact when used together as classifiers to determine network, and thus model, (dis)similarity. The analytical results form the basis of the fitness evaluation for a GP system used to automatically construct graph models for complex networks. The GP-based automatic inference system was used to reproduce existing, well-known graph models as well as a real-world network. Results indicated that the automatically inferred models exemplified functional similarity when compared to their respective target networks. This approach also showed promise when used to infer a model for a mammalian brain network.