898 research outputs found

    Infectious bronchitis virus infections of chickens in Belgium : an epidemiological survey

    Get PDF
    Between April 2012 and July 2015, cloacal and/or tracheal swab samples were collected from four hundred and twenty-four Belgian chicken broiler, breeder and layer flocks. All flocks were kept for production purposes and presented clinical signs suggestive of an infectious bronchitis virus (IBV) infection. The samples were analyzed by real-time polymerase chain reaction (RT-qPCR) to detect the presence of ribonucleic acid (RNA) of IBV. When positive, approximately four hundred base pairs (bp) encoding for the hypervariable region of the IBV S1 protein were sequenced. Sequencing results, cycle threshold (Ct) values and vaccination history were used as criteria to try and distinguish vaccine strains from field strains. Of all samples examined, 22.4% was negative. In 16.4% of the samples that did contain RNA from IBV, the genotype could not be determined. In most cases, this was due to the recovery of RNA quantities below the lower limit of detection of the sequencing PCR. The remaining positive submissions predominantly revealed RNA from IBV strains that belonged to the 4/91-793B (46.8%), D388-QX (25.2%), D274-D207 (5.8%) and Massachusetts (4.0%) genotypes. Estimations indicated that approximately 58%, 11%, 37% and 46% of these detections, respectively, were vaccine strains. Infections with types CK/CH/Guandong/Xindadi/0903, Ukr/27/2011, NGA/295/2006 and Q1 were observed sporadically. The results indicate that IBV infections are highly prevalent in Belgian chickens and that at least eight different IBV types were circulating during the monitored period. This underlines the necessity of providing flocks with a strong and broad protective immunity against IBV

    Understanding moral responsibility in the design of trailers

    Get PDF
    This paper starts from the presupposition that moral codes often do not suffice to make agents understand their moral responsibility. We will illustrate this statement with a concrete example of engineers who design a truck’s trailer and who do not think traffic safety is part of their responsibility. This opinion clashes with a common supposition that designers in fact should do all that is in their power to ensure safety in traffic. In our opinion this shows the need for a moral philosophy that helps engineers to interpret their responsibility and think more critically about it. For this purpose we will explore the moral philosophy of Alasdair MacIntyre, which is particularly interesting because he locates the beginning of moral thinking in the daily practice of a profession. This is consistent with the history of moral codes, for codes are also the product of moral reflection by professionals. We will use MacIntyre’s philosophy to (1) explain what is wrong with the designers’ understanding of their responsibility and (2) show a possible way to bring their reflection to a more self-critical level. We will also inspect MacIntyre’s proposal critically

    Saying Hello World with UML-RSDS - A Solution to the 2011 Instructive Case

    Full text link
    In this paper we apply the UML-RSDS notation and tools to the "Hello World" case studies and explain the underlying development process for this model transformation approach.Comment: In Proceedings TTC 2011, arXiv:1111.440

    Solving the TTC 2011 Model Migration Case with UML-RSDS

    Full text link
    In this paper we apply the UML-RSDS notation and tools to the GMF model migration case study and explain how to use the UML-RSDS tools.Comment: In Proceedings TTC 2011, arXiv:1111.440

    Beta asymmetry parameter in the decay of 114In

    Full text link
    The beta asymmetry parameter A for the pure Gamow-Teller decay of 114In is reported. The low temperature nuclear orientation method was combined with a GEANT4 based simulation code allowing for the first time to address in detail the effects of scattering and of the magnetic field. The result, A = -0.994 +/- 0.010stat +/- 0.010syst, constitutes the most accurate value for the asymmetry parameter of a nuclear beta transition to date. The value is in agreement with the Standard Model prediction of A = -1 and provides new limits on tensor type charged weak currents.Comment: 11 pages, 2 figures; additional information was added on systematic effects, the magnetic field map and the calculation of the Qcos(theta) value

    Off-lining to tape is not archiving: Why we need real archiving to support media archaeology and ensure our visual effects legacy thrives

    Full text link
    © 2019 ISAST This paper examines digital asset archiving and preservation practice in the visual effects (VFX) industry. The authors briefly summarize media archaeology theory and provide an overview of how VFX studios presently archive project assets and records, based on case study and interview research conducted with expert VFX practitioners from leading international studios. In addition, the authors propose that current practice could be improved by adopting archival science methods, including digital preservation practices. Doing so will support media archaeology studies of digital cultures over time and ensure that the legacy of VFX creative and technical production thrives for future generations

    Evaluation of Model Transformation Approaches for Model Refactoring

    Get PDF
    This paper provides a systematic evaluation framework for comparing model transformation approaches, based upon the ISO/IEC 9126-1 quality characteristics for software systems. We apply this framework to compare five transformation approaches (QVT-R, ATL, Kermeta, UMLRSDS and GrGen.NET) on a complex model refactoring case study: the amalgamation of apparent attribute clones in a class diagram. The case study highlights the problems with the specification and design of the refactoring category of model transformations, and provides a challenging example by which model transformation languages and approaches can be compared. We take into account a wide range of evaluation criteria aspects such as correctness, efficiency, flexibility, interoperability, reusability and robustness, which have not been comprehensively covered by other comparative surveys of transformation approaches. The results show clear distinctions between the capabilities and suitabilities of different approaches to address the refactoring form of transformation problem
    • …
    corecore