167 research outputs found

    The Influence Ofword of Mouth, Brand Image, and Product Attributes on Blackberry Product Purchasing Decisions.

    Full text link
    Research it is based on a decrease in the sale of blackberry in the last three years. Many factors that must be considered in the decision to buy a product for consideration in decision making. The purpose of this research is: to analyze the influence of word of mouth , brand image, and product attributes on Blackberry product purchasing decisions. This type of research is explanatory type . In this study will explain the influence between the variables to test the hypothesis . The population in this study were all students Fisip Undip . Sampling technique using purposive sampling , namely Fisip Undip student who uses a Blackberry mobile phones . The sampling technique using the formula lameshow, so the sample amounted to 96 respondents . The results showed that word of mouth , brand image and product attributes have a positive and significant influence on purchasing decisions Blackberry products . This is evidenced by test F statistics that indicate 119,559 F count > F table 2,70. The advice given is a Blackberry product companies must constantly innovate by adding features products that are more practical , effective , and expressive

    Pengaruh Paritas terhadap Persentase Estrus dan Kebuntingan Sapi Peranakan Ongole yang Disinkronisasi Estrus Menggunakan Prostaglandin F2α (Pgf2α)

    Get PDF
    The research aimed to determine the effect of parities on the percentage of estrous and conception of OngoleOffspring after estrous synchronization using prostaglandin F2α (PGF2α). The research was held in November2012until February 2013, located in Punggur District, Central Lampung Regency, Lampung Province.This research used Completely Randomized Design (CRD) with three treatments and four replications. Thetreatments were Ongole Offspring heifers (P0); Ongole Offspring which have calved once (P1); and OngoleOffspring which have calved twice (P2). Data of percentage of estrous and conception was analyzed by using Chisquareon level of 5%.The result of the Chi-square analysis showed that parity was not significantly different (P>0,05) to the percentage ofestrous and conception of Ongole Offspring. The estrous percentage of Ongole Offspring was 100%. The conceptionpercentages of Ongole Offspring on P0, P1, and P2 in a row were 25%, 0%, and 25%

    INTEROP deliverable DTG 6.2 : Method repository

    Get PDF
    This deliverable presents the INTEROP method chunks repository (MCR), its architecture and provided services. It includes the definition of a reusable method chunk, its structure, illustrated with examples of method chunks stored in the repository and guidelines for method chunks definition and characterisation covering tasks TG6.2 and TG6.3 of the work plan of the task group. The main result is the definition of the structure of the method chunk repository emphasizing the link to interoperability. Interoperability is a first-class concept in the structure of the method chunk repository. It not only characterizes method chunks, i.e. procedures to solve interoperability problems, but also interoperability cases, i.e. the presentation of actual problems involving interoperability issues. TG 6 has produced three MCR prototypes. Two experiments were undertaken using the Metis system and one using ConceptBase. The task group attended a two-day intense workshop on Metis. As a result, two experiments with Metis as platform for the method chunk repository are under way and reported in this deliverable. One is realizing the structure of the MCR as specified in this report. The other is an alternative approach that serves as a benchmark and is reported in the appendix. The ConceptBase prototype utilizes the metamodel presented in this deliverable. We have analysed three cases involving various aspects of interoperability. One case is about establishing a broker platform for insurance agents, the second about linking the information systems in the public utility sector, and the third case is establishing the relation of the ATHENA Model-Driven Interoperability Framework to the goals of the MCR. The results of the TG6 have been published at the ISD conference 2006 and the ER conference 2006. Copies of the papers are included in the appendix. The report of the example session with the method chunk repository has been shifted towards deliverable TG6.3 (Tutorial of the MCR). This is the more logical place. We want to emphasize that TG6 was not only busy in drafting concepts, exploring the state of the art, and analyzing cases. We are actually experimenting with a prototype and consider this a valuable contribution to the network. As soon as the prototype is stable, knowledge about interoperability solutions can be coded in this repository and can guide designers of interoperable systems by experience knowledge

    IZA COVID-19 crisis response monitoring: short-run labor market impacts of COVID-19, initial policy measures and beyond

    Get PDF
    The unprecedented COVID-19 pandemic has a severe impact on societies, economies and labor markets. However, not all countries, socio-economic groups and sectors are equally affected. For example, occupational groups working in sectors where value chains have been disrupted and lockdowns have had direct impacts are affected more heavily, while the slowdown of hiring activities mostly affects young labor market entrants. As a result, there has been a steep increase in unemployment rates in many countries, but not everywhere to the same extent. Part of this difference can be related to the different role and extent of short-time work schemes, which is now being used more widely than during the Great Recession. Some countries have created or expanded these schemes, making coverage less exclusive and benefits more generous, at least temporarily. But short-time work is certainly not a panacea to “flatten the unemployment curve”. Furthermore, next to providing liquidity support to firms, unemployment benefits have been made more generous in many countries. Often, activation principles have also been temporarily reduced. Some countries have increased access to income support to some extent also for non-standard workers, such as temporary agency workers or self-employed workers, on an ad hoc basis. A major change in working conditions is the broad move towards telework arrangements and work from home. Nonetheless, it appears too early to assess the relative success of national strategies to cope with the pandemic and to revitalize the labor market as well as the medium-term fiscal viability of different support measures. Future monitoring will also have to trace policies to cope with the imminent structural changes that might result from the crisis or might be accelerated by the crisis

    Review on wildlife value orientation for ecotourism resource management

    Get PDF
    Wildlife value orientation (WVO) is important in the management of conflicts in ecotourism, particularly in human and wildlife concerns as human-wildlife conflict reported cases have increased in recent years. Therefore, this article systematically reviews literatures on WVO globally from the context of theoretical approach as well as the effect of modernization on values towards wildlife. The theoretical approach highlights the cognitive hierarchy model and the development of four theories that shapes the cultural thought towards wildlife relevant to ecotourism products. By understanding, through integrated empirical investigation, the values people hold towards wildlife, it enables the development of effective decision makings in handling the conflicts in the realm of ecotourism product or resource management

    Prevalence, molecular markers, and outcome of bronchial squamous carcinoma in situ in high-risk subjects

    Get PDF
    Publisher Copyright: © 2023 The Authors. APMIS published by John Wiley & Sons Ltd on behalf of Scandinavian Societies for Pathology, Medical Microbiology and Immunology. © 2023 The Authors. APMIS published by John Wiley & Sons Ltd on behalf of Scandinavian Societies for Pathology, Medical Microbiology and Immunology.Bronchial squamous carcinoma in situ (CIS) is a preinvasive lesion that is thought to precede invasive carcinoma. We conducted prospective autofluorescence and white light bronchoscopy trials between 1992 and 2016 to assess the prevalence, molecular markers, and outcome of individuals with CIS and other preneoplastic bronchial lesions. Biopsies were evaluated at multiple levels and selected biopsies were tested for aneuploidy and DNA sequenced for TP53 mutation. Thirty-one individuals with CIS were identified. Twenty-two cases of CIS occurred in association with concurrent invasive carcinomas. Seven of the invasive tumors were radiographically occult. In two cases, CIS spread from the focus of invasive carcinoma into contralateral lung lobes, forming secondary invasive tumors. In nine cases, CIS occurred as isolated lesions and one progressed to invasive squamous carcinoma at the same site 40 months after discovery. In a second case, CIS was a precursor of carcinoma at a separate site in a different lobe. In seven cases CIS regressed to a lower grade or disappeared. High level chromosomal aneusomy was often associated with TP53 mutation and with invasive carcinoma. CIS most often occurs in association with invasive squamous carcinoma and may extend along the airways into distant lobes. In rare cases, CIS may be observed to directly transform into invasive carcinoma. CIS may be indicative of invasive tumor at a separate distant site. Isolated CIS may regress. Molecular changes parallel histological changes in CIS and may be used to map clonal expansion in the airways.Peer reviewe

    Measure-Based Inconsistency-Tolerant Maintenance of Database Integrity

    Full text link
    [EN] To maintain integrity, constraint violations should be prevented or repaired. However, it may not be feasible to avoid inconsistency, or to repair all violations at once. Based on an abstract concept of violation measures, updates and repairs can be checked for keeping inconsistency bounded, such that integrity violations are guaranteed to never get out of control. This measure-based approach goes beyond conventional methods that are not meant to be applied in the presence of inconsistency. It also generalizes recently introduced concepts of inconsistency-tolerant integrity maintenance.Partially supported by FEDER and the Spanish grants TIN2009-14460-C03 and TIN2010-17139Decker, H. (2013). Measure-Based Inconsistency-Tolerant Maintenance of Database Integrity. Lecture Notes in Computer Science. 7693:149-173. https://doi.org/10.1007/978-3-642-36008-4_7S1491737693Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley (1995)Abiteboul, S., Vianu, V.: A transaction-based approach to relational database specification. JACM 36(4), 758–789 (1989)Afrati, F., Kolaitis, P.: Repair checking in inconsistent databases: algorithms and complexity. In: 12th ICDT, pp. 31–41. ACM Press (2009)Arenas, M., Bertossi, L., Chomicki, J.: Consistent query answers in inconsistent databases. In: PODS 1999, pp. 68–79. ACM Press (1999)Arieli, O., Denecker, M., Bruynooghe, M.: Distance semantics for database repair. Ann. Math. Artif. Intell. 50, 389–415 (2007)Arni-Bloch, N., Ralyté, J., Léonard, M.: Service–Driven Information Systems Evolution: Handling Integrity Constraints Consistency. In: Persson, A., Stirna, J. (eds.) PoEM 2009. LNBIP, vol. 39, pp. 191–206. Springer, Heidelberg (2009)Bauer, H.: Maß- und Integrationstheorie, 2. Auflage. De Gruyter (1992)Besnard, P., Hunter, A.: Quasi-Classical Logic: Non-Trivializable Classical Reasoning from Inconsistent Information. In: Froidevaux, C., Kohlas, J. (eds.) ECSQARU 1995. LNCS, vol. 946, pp. 44–51. Springer, Heidelberg (1995)Bohanon, P., Fan, W., Flaster, M., Rastogi, R.: A Cost-Based Model and Effective Heuristic for Repairing Constraints by Value Modification. In: Proc. SIGMOD 2005, pp. 143–154. ACM Press (2005)Ceri, S., Cochrane, R., Widom, J.: Practical Applications of Triggers and Constraints: Success and Lingering Issues. In: Proc. 26th VLDB, pp. 254–262. Morgan Kaufmann (2000)Chakravarthy, U., Grant, J., Minker, J.: Logic-based Approach to Semantic Query Optimization. Transactions on Database Systems 15(2), 162–207 (1990)Chomicki, J.: Consistent Query Answering: Five Easy Pieces. In: Schwentick, T., Suciu, D. (eds.) ICDT 2007. LNCS, vol. 4353, pp. 1–17. Springer, Heidelberg (2006)Christiansen, H., Martinenghi, D.: On simplification of database integrity constraints. Fundamenta Informaticae 71(4), 371–417 (2006)Clark, K.: Negation as Failure. In: Gallaire, H., Minker, J. (eds.) Logic and Data Bases, pp. 293–322. Plenum Press (1978)Curino, C., Moon, H., Deutsch, A., Zaniolo, C.: Update Rewriting and Integrity Constraint Maintenance in a Schema Evolution Support System: PRISM++. PVLDB 4, 117–128 (2010)Dawson, J.: The compactness of first-order logic: From Gödel to Lindström. History and Philosophy of Logic 14(1), 15–37 (1993)Decker, H.: The Range Form of Databases and Queries or: How to Avoid Floundering. In: Proc. 5th ÖGAI. Informatik-Fachberichte, vol. 208, pp. 114–123. Springer (1989)Decker, H.: Drawing Updates From Derivations. In: Kanellakis, P.C., Abiteboul, S. (eds.) ICDT 1990. LNCS, vol. 470, pp. 437–451. Springer, Heidelberg (1990)Decker, H.: Extending Inconsistency-Tolerant Integrity Checking by Semantic Query Optimization. In: Bhowmick, S.S., Küng, J., Wagner, R. (eds.) DEXA 2008. LNCS, vol. 5181, pp. 89–96. Springer, Heidelberg (2008)Decker, H.: Answers That Have Integrity. In: Schewe, K.-D., Thalheim, B. (eds.) SDKB 2010. LNCS, vol. 6834, pp. 54–72. Springer, Heidelberg (2011)Decker, H.: Causes of the Violation of Integrity Constraints for Supporting the Quality of Databases. In: Murgante, B., Gervasi, O., Iglesias, A., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2011, Part V. LNCS, vol. 6786, pp. 283–292. Springer, Heidelberg (2011)Decker, H.: Inconsistency-tolerant Integrity Checking based on Inconsistency Metrics. In: König, A., Dengel, A., Hinkelmann, K., Kise, K., Howlett, R.J., Jain, L.C. (eds.) KES 2011, Part II. LNCS, vol. 6882, pp. 548–558. Springer, Heidelberg (2011)Decker, H.: Partial Repairs that Tolerate Inconsistency. In: Eder, J., Bielikova, M., Tjoa, A.M. (eds.) ADBIS 2011. LNCS, vol. 6909, pp. 389–400. Springer, Heidelberg (2011)Decker, H.: Consistent Explanations of Answers to Queries in Inconsistent Knowledge Bases. In: Roth-Berghofer, T., Tintarev, N., Leake, D. (eds.) Explanation-aware Computing, Proc. IJCAI 2011 Workshop ExaCt 2011, pp. 71–80 (2011), http://exact2011.workshop.hm/index.phpDecker, H., Martinenghi, D.: Classifying integrity checking methods with regard to inconsistency tolerance. In: Proc. PPDP 2008, pp. 195–204. ACM Press (2008)Decker, H., Martinenghi, D.: Modeling, Measuring and Monitoring the Quality of Information. In: Heuser, C.A., Pernul, G. (eds.) ER 2009. LNCS, vol. 5833, pp. 212–221. Springer, Heidelberg (2009)Decker, H., Martinenghi, D.: Inconsistency-tolerant Integrity Checking. IEEE TKDE 23(2), 218–234 (2011)Decker, H., Muñoz-Escoí, F.D.: Revisiting and Improving a Result on Integrity Preservation by Concurrent Transactions. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2010 Workshops. LNCS, vol. 6428, pp. 297–306. Springer, Heidelberg (2010)Dung, P., Kowalski, R., Toni, F.: Dialectic Proof Procedures for Assumption-based Admissible Argumentation. Artificial Intelligence 170(2), 114–159 (2006)Ebbinghaus, H.-D., Flum, J.: Finite Model Theory, 2nd edn. Springer (2006)Embury, S., Brandt, S., Robinson, J., Sutherland, I., Bisby, F., Gray, A., Jones, A., White, R.: Adapting integrity enforcement techniques for data reconciliation. Information Systems 26, 657–689 (2001)Enderton, H.: A Mathematical Introduction to Logic, 2nd edn. Academic Press (2001)Eiter, T., Fink, M., Greco, G., Lembo, D.: Repair localization for query answering from inconsistent databases. ACM TODS 33(2), article 10 (2008)Furfaro, F., Greco, S., Molinaro, C.: A three-valued semantics for querying and repairing inconsistent databases. Ann. Math. Artif. Intell. 51(2-4), 167–193 (2007)Grant, J., Hunter, A.: Measuring the Good and the Bad in Inconsistent Information. In: Proc. 22nd IJCAI, pp. 2632–2637 (2011)Greco, G., Greco, S., Zumpano, E.: A logical framework for querying and repairing inconsistent databases. IEEE TKDE 15(6), 1389–1408 (2003)Guessoum, A., Lloyd, J.: Updating knowledge bases. New Generation Computing 8(1), 71–89 (1990)Guessoum, A., Lloyd, J.: Updating knowledge bases II. New Generation Computing 10(1), 73–100 (1991)Gupta, A., Sagiv, Y., Ullman, J., Widom, J.: Constraint checking with partial information. In: Proc. PODS 1994, pp. 45–55. ACM Press (1994)Hunter, A.: Measuring Inconsistency in Knowledge via Quasi-Classical Models. In: Proc. 18th AAAI &14th IAAI, pp. 68–73 (2002)Hunter, A., Konieczny, S.: Approaches to Measuring Inconsistent Information. In: Bertossi, L., Hunter, A., Schaub, T. (eds.) Inconsistency Tolerance. LNCS, vol. 3300, pp. 191–236. Springer, Heidelberg (2005)Hunter, A., Konieczny, S.: Measuring inconsistency through minimal inconsistent sets. In: Brewka, G., Lang, J. (eds.) Principles of Knowledge Representation and Reasoning (Proc. 11th KR), pp. 358–366. AAAI Press (2008)Hunter, A., Konieczny, S.: On the measure of conflicts: Shapley Inconsistency Values. Artificial Intelligence 174, 1007–1026 (2010)Kakas, A., Mancarella, P.: Database updates through abduction. In: Proc. 16th VLDB, pp. 650–661. Morgan Kaufmann (1990)Kakas, A., Kowalski, R., Toni, F.: The role of Abduction in Logic Programming. In: Gabbay, D., Hogger, C., Robinson, J.A. (eds.) Handbook of Logic in Artificial Intelligence and Logic Programming, vol. 5, pp. 235–324. Oxford University Press (1998)Lee, S.Y., Ling, T.W.: Further improvements on integrity constraint checking for stratifiable deductive databases. In: Proc. VLDB 1996, pp. 495–505. Morgan Kaufmann (1996)Lehrer, K.: Relevant Deduction and Minimally Inconsistent Sets. Journal of Philosophy 3(2,3), 153–165 (1973)Mu, K., Liu, W., Jin, Z., Bell, D.: A Syntax-based Approach to Measuring the Degree of Inconsistency for Belief Bases. J. Approx. Reasoning 52(7), 978–999 (2011)Lloyd, J., Sonenberg, L., Topor, R.: Integrity constraint checking in stratified databases. J. Logic Programming 4(4), 331–343 (1987)Lozinskii, E.: Resolving contradictions: A plausible semantics for inconsistent systems. J. Automated Reasoning 12(1), 1–31 (1994)Ma, Y., Qi, G., Hitzler, P.: Computing inconsistency measure based on paraconsistent semantics. J. Logic Computation 21(6), 1257–1281 (2011)Martinenghi, D., Christiansen, H.: Transaction Management with Integrity Checking. In: Andersen, K.V., Debenham, J., Wagner, R. (eds.) DEXA 2005. LNCS, vol. 3588, pp. 606–615. Springer, Heidelberg (2005)Martinenghi, D., Christiansen, H., Decker, H.: Integrity Checking and Maintenance in Relational and Deductive Databases and Beyond. In: Ma, Z. (ed.) Intelligent Databases: Technologies and Applications, pp. 238–285. IGI Global (2006)Martinez, M.V., Pugliese, A., Simari, G.I., Subrahmanian, V.S., Prade, H.: How Dirty Is Your Relational Database? An Axiomatic Approach. In: Mellouli, K. (ed.) ECSQARU 2007. LNCS (LNAI), vol. 4724, pp. 103–114. Springer, Heidelberg (2007)Meyer, J., Wieringa, R. (eds.): Deontic Logic in Computer Science. Wiley (1994)Nicolas, J.M.: Logic for improving integrity checking in relational data bases. Acta Informatica 18, 227–253 (1982)Plexousakis, D., Mylopoulos, J.: Accommodating Integrity Constraints During Database Design. In: Apers, P.M.G., Bouzeghoub, M., Gardarin, G. (eds.) EDBT 1996. LNCS, vol. 1057, pp. 495–513. Springer, Heidelberg (1996)Rahm, E., Do, H.: Data Cleaning: Problems and Current Approaches. Data Engineering Bulletin 23(4), 3–13 (2000)Sadri, F., Kowalski, R.: A theorem-proving approach to database integrity. In: Minker, J. (ed.) Foundations of Deductive Databases and Logic Programming, pp. 313–362. Morgan Kaufmann (1988)Thimm, M.: Measuring Inconsistency in Probabilistic Knowledge Bases. In: Proc. 25th UAI, pp. 530–537. AUAI Press (2009)Vardi, M.: On the integrity of databases with incomplete information. In: Proc. 5th PODS, pp. 252–266. ACM Press (1986)Wijsen, J.: Database repairing using updates. ACM Trans. Database Syst. 30(3), 722–768 (2005

    Refolding by High Pressure of a Toxin Containing Seven Disulfide Bonds: Bothropstoxin-1 from Bothrops jararacussu

    Get PDF
    Aggregation is a serious obstacle for recovery of biologically active heterologous proteins from inclusion bodies (IBs) produced by recombinant bacteria. E. coli transformed with a vector containing the cDNA for Bothropstoxin-1 (BthTx-1) expressed the recombinant product as IBs. In order to obtain the native toxin, insoluble and aggregated protein was refolded using high hydrostatic pressure (HHP). IBs were dissolved and refolded (2 kbar, 16 h), and the effects of protein concentration, as well as changes in ratio and concentration of oxido-shuffling reagents, guanidine hydrochloride (GdnHCl), and pH in the refolding buffer, were assayed. A 32% yield (7.6 mg per liter of bacterial culture) in refolding of the native BthTx-1 was obtained using optimal conditions of the refolding buffer (Tris–HCl buffer, pH 7.5, containing 3 mM of a 2:3 ratio of GSH/GSSG, and 1 M GdnHCl). Scanning electron microscopy (SEM) showed that that disaggregation of part of IBs particles occurred upon compression and that the morphology of the remaining IBs, spherical particles, was not substantially altered. Dose-dependent cytotoxic activity of high-pressure refolded BthTx-1 was shown in C2C12 muscle cells

    The sequences of 150,119 genomes in the UK Biobank

    Get PDF
    Detailed knowledge of how diversity in the sequence of the human genome affects phenotypic diversity depends on a comprehensive and reliable characterization of both sequences and phenotypic variation. Over the past decade, insights into this relationship have been obtained from whole-exome sequencing or whole-genome sequencing of large cohorts with rich phenotypic data(1,2). Here we describe the analysis of whole-genome sequencing of 150,119 individuals from the UK Biobank(3). This constitutes a set of high-quality variants, including 585,040,410 single-nucleotide polymorphisms, representing 7.0% of all possible human single-nucleotide polymorphisms, and 58,707,036 indels. This large set of variants allows us to characterize selection based on sequence variation within a population through a depletion rank score of windows along the genome. Depletion rank analysis shows that coding exons represent a small fraction of regions in the genome subject to strong sequence conservation. We define three cohorts within the UK Biobank: a large British Irish cohort, a smaller African cohort and a South Asian cohort. A haplotype reference panel is provided that allows reliable imputation of most variants carried by three or more sequenced individuals. We identified 895,055 structural variants and 2,536,688 microsatellites, groups of variants typically excluded from large-scale whole-genome sequencing studies. Using this formidable new resource, we provide several examples of trait associations for rare variants with large effects not found previously through studies based on whole-exome sequencing and/or imputation
    corecore