899 research outputs found
Infectious bronchitis virus infections of chickens in Belgium : an epidemiological survey
Between April 2012 and July 2015, cloacal and/or tracheal swab samples were collected from four hundred and twenty-four Belgian chicken broiler, breeder and layer flocks. All flocks were kept for production purposes and presented clinical signs suggestive of an infectious bronchitis virus (IBV) infection. The samples were analyzed by real-time polymerase chain reaction (RT-qPCR) to detect the presence of ribonucleic acid (RNA) of IBV. When positive, approximately four hundred base pairs (bp) encoding for the hypervariable region of the IBV S1 protein were sequenced. Sequencing results, cycle threshold (Ct) values and vaccination history were used as criteria to try and distinguish vaccine strains from field strains. Of all samples examined, 22.4% was negative. In 16.4% of the samples that did contain RNA from IBV, the genotype could not be determined. In most cases, this was due to the recovery of RNA quantities below the lower limit of detection of the sequencing PCR. The remaining positive submissions predominantly revealed RNA from IBV strains that belonged to the 4/91-793B (46.8%), D388-QX (25.2%), D274-D207 (5.8%) and Massachusetts (4.0%) genotypes. Estimations indicated that approximately 58%, 11%, 37% and 46% of these detections, respectively, were vaccine strains. Infections with types CK/CH/Guandong/Xindadi/0903, Ukr/27/2011, NGA/295/2006 and Q1 were observed sporadically. The results indicate that IBV infections are highly prevalent in Belgian chickens and that at least eight different IBV types were circulating during the monitored period. This underlines the necessity of providing flocks with a strong and broad protective immunity against IBV
Understanding moral responsibility in the design of trailers
This paper starts from the presupposition that moral codes often do not suffice to make agents understand their moral responsibility. We will illustrate this statement with a concrete example of engineers who design a truck’s trailer and who do not think traffic safety is part of their responsibility. This opinion clashes with a common supposition that designers in fact should do all that is in their power to ensure safety in traffic. In our opinion this shows the need for a moral philosophy that helps engineers to interpret their responsibility and think more critically about it. For this purpose we will explore the moral philosophy of Alasdair MacIntyre, which is particularly interesting because he locates the beginning of moral thinking in the daily practice of a profession. This is consistent with the history of moral codes, for codes are also the product of moral reflection by professionals. We will use MacIntyre’s philosophy to (1) explain what is wrong with the designers’ understanding of their responsibility and (2) show a possible way to bring their reflection to a more self-critical level. We will also inspect MacIntyre’s proposal critically
Saying Hello World with UML-RSDS - A Solution to the 2011 Instructive Case
In this paper we apply the UML-RSDS notation and tools to the "Hello World"
case studies and explain the underlying development process for this model
transformation approach.Comment: In Proceedings TTC 2011, arXiv:1111.440
Solving the TTC 2011 Model Migration Case with UML-RSDS
In this paper we apply the UML-RSDS notation and tools to the GMF model
migration case study and explain how to use the UML-RSDS tools.Comment: In Proceedings TTC 2011, arXiv:1111.440
Beta asymmetry parameter in the decay of 114In
The beta asymmetry parameter A for the pure Gamow-Teller decay of 114In is
reported. The low temperature nuclear orientation method was combined with a
GEANT4 based simulation code allowing for the first time to address in detail
the effects of scattering and of the magnetic field. The result, A = -0.994 +/-
0.010stat +/- 0.010syst, constitutes the most accurate value for the asymmetry
parameter of a nuclear beta transition to date. The value is in agreement with
the Standard Model prediction of A = -1 and provides new limits on tensor type
charged weak currents.Comment: 11 pages, 2 figures; additional information was added on systematic
effects, the magnetic field map and the calculation of the Qcos(theta) value
Off-lining to tape is not archiving: Why we need real archiving to support media archaeology and ensure our visual effects legacy thrives
© 2019 ISAST This paper examines digital asset archiving and preservation practice in the visual effects (VFX) industry. The authors briefly summarize media archaeology theory and provide an overview of how VFX studios presently archive project assets and records, based on case study and interview research conducted with expert VFX practitioners from leading international studios. In addition, the authors propose that current practice could be improved by adopting archival science methods, including digital preservation practices. Doing so will support media archaeology studies of digital cultures over time and ensure that the legacy of VFX creative and technical production thrives for future generations
Evaluation of Model Transformation Approaches for Model Refactoring
This paper provides a systematic evaluation framework for comparing
model transformation approaches, based upon the ISO/IEC 9126-1
quality characteristics for software systems. We apply this framework to
compare five transformation approaches (QVT-R, ATL, Kermeta, UMLRSDS
and GrGen.NET) on a complex model refactoring case study: the
amalgamation of apparent attribute clones in a class diagram.
The case study highlights the problems with the specification and design
of the refactoring category of model transformations, and provides
a challenging example by which model transformation languages and approaches
can be compared. We take into account a wide range of evaluation
criteria aspects such as correctness, efficiency, flexibility, interoperability,
reusability and robustness, which have not been comprehensively
covered by other comparative surveys of transformation approaches.
The results show clear distinctions between the capabilities and suitabilities
of different approaches to address the refactoring form of transformation
problem
- …