Academic literature on the topic 'Interactive Compromise Approach'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Interactive Compromise Approach.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Interactive Compromise Approach"

1

Gupta, Neha, Irfan Ali, and Abdul Bari. "Interactive Fuzzy Goal Programming approach in multi-response stratified sample surveys." Yugoslav Journal of Operations Research 26, no. 2 (2016): 241–58. http://dx.doi.org/10.2298/yjor141021005g.

Full text
Abstract:
In this paper, we applied an Interactive Fuzzy Goal Programming (IFGP) approach with linear, exponential and hyperbolic membership functions, which focuses on maximizing the minimum membership values to determine the preferred compromise solution for the multi-response stratified surveys problem, formulated as a Multi- Objective Non Linear Programming Problem (MONLPP), and by linearizing the nonlinear objective functions at their individual optimum solution, the problem is approximated to an Integer Linear Programming Problem (ILPP). A numerical example based on real data is given, and comparison with some existing allocations viz. Cochran?s compromise allocation, Chatterjee?s compromise allocation and Khowaja?s compromise allocation is made to demonstrate the utility of the approach.
APA, Harvard, Vancouver, ISO, and other styles
2

Tsay, M. T., W. M. Lin, and J. L. Lee. "Interactive best-compromise approach for operation dispatch of cogeneration systems." IEE Proceedings - Generation, Transmission and Distribution 148, no. 4 (2001): 326. http://dx.doi.org/10.1049/ip-gtd:20010163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mandal, Nirmal Kumar. "Geometric Programming Approach to an Interactive Fuzzy Inventory Problem." Advances in Operations Research 2011 (2011): 1–17. http://dx.doi.org/10.1155/2011/521351.

Full text
Abstract:
An interactive multiobjective fuzzy inventory problem with two resource constraints is presented in this paper. The cost parameters and index parameters, the storage space, the budgetary cost, and the objective and constraint goals are imprecise in nature. These parameters and objective goals are quantified by linear/nonlinear membership functions. A compromise solution is obtained by geometric programming method. If the decision maker is not satisfied with this result, he/she may try to update the current solution to his/her satisfactory solution. In this way we implement man-machine interactive procedure to solve the problem through geometric programming method.
APA, Harvard, Vancouver, ISO, and other styles
4

Abderrahim, Zeineb, and Mohamed Salim Bouhlel. "Compression and Visualization Interactive of 3D Mesh." International Journal of Applied Mathematics and Informatics 15 (November 16, 2021): 85–92. http://dx.doi.org/10.46300/91014.2021.15.14.

Full text
Abstract:
The combination of compression and visualization is mentioned as perspective, very few articles treat with this problem. Indeed, in this paper, we proposed a new approach to multiresolution visualization based on a combination of segmentation and multiresolution mesh compression. For this, we proposed a new segmentation method that benefits the organization of faces of the mesh followed by a progressive local compression of regions of mesh to ensure the refinement local of the three-dimensional object. Thus, the quantization precision is adapted to each vertex during the encoding /decoding process to optimize the rate-distortion compromise. The optimization of the treated mesh geometry improves the approximation quality and the compression ratio at each level of resolution. The experimental results show that the proposed algorithm gives competitive results compared to the previous works dealing with the rate-distortion compromise and very satisfactory visual results.
APA, Harvard, Vancouver, ISO, and other styles
5

Walker, H. Douglas. "An alternative approach to goal programming." Canadian Journal of Forest Research 15, no. 2 (1985): 319–25. http://dx.doi.org/10.1139/x85-052.

Full text
Abstract:
An alternative approach to goal programming is described. The approach incorporates both cardinal weighting and ordinal ranking of deviation variables, and does not require apriori specification of goal target levels. Ordinal rankings are used to describe feasible and optimal policy spaces. Cardinal weightings are then adjusted through an interactive procedure until the decision makers are satisfied with the weightings and with the resulting compromise solution. The procedure is demonstrated using a hypothetical reforestation budget allocation problem.
APA, Harvard, Vancouver, ISO, and other styles
6

Baril, Chantal, Soumaya Yacout, and Bernard Clément. "Collaborative Decision-Making in Product Design: An Interactive Multiobjective Approach." Journal of Industrial Engineering 2013 (January 3, 2013): 1–12. http://dx.doi.org/10.1155/2013/201907.

Full text
Abstract:
This paper presents a new procedure to solve multiobjective problems, where the objectives are distributed to various working groups and the decision process is centralized. The approach is interactive and considers the preferences of the working groups. It is based on two techniques: an interactive technique that solves multi-objective problems based on goal programming, and a technique called “linear physical programming” which considers the preferences of the working groups. The approach generates Pareto-optimal solutions. It guides the director in the determination of target values for the objective functions. The approach was tested on two problems that present its capacity to generate Pareto-optimal solutions and to show the convergence to compromise solutions for all the working groups.
APA, Harvard, Vancouver, ISO, and other styles
7

Kuo, Cheng-Chien, and Hong-Chan Chang. "Solving the bi-objective scheduling of switched capacitors using an interactive best-compromise approach." Electric Power Systems Research 46, no. 2 (1998): 133–40. http://dx.doi.org/10.1016/s0378-7796(98)00030-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Current, John R., Charles S. Revelle, and Jared L. Cohon. "An interactive approach to identify the best compromise solution for two objective shortest path problems." Computers & Operations Research 17, no. 2 (1990): 187–98. http://dx.doi.org/10.1016/0305-0548(90)90042-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Weichao, and Aidong Lu. "Interactive Wormhole Detection and Evaluation." Information Visualization 6, no. 1 (2007): 3–17. http://dx.doi.org/10.1057/palgrave.ivs.9500144.

Full text
Abstract:
Wormhole attacks in wireless networks can severely deteriorate network performance and compromise security through spoiling the routing protocols and weakening the security enhancements. This paper develops an approach, interactive visualization of wormholes (IVoW), to monitor and detect such attacks in large-scale wireless networks in real time. We characterize the topology features of a network under wormhole attacks through the node position changes and visualize the information at dynamically adjusted scales. We integrate an automatic detection algorithm with appropriate user interactions to handle complicated scenarios that include a large number of moving nodes and multiple wormhole attackers. Various visual forms have been adopted to assist in the understanding and analysis of reconstructed network topology and to improve the detection accuracy. Extended simulation has demonstrated that the proposed approach can effectively locate the fake neighbor connections without introducing many false alarms. IVoW does not require the wireless nodes to be equipped with any special hardware, thus avoiding any additional cost. We have performed user studies to evaluate the effectiveness of our approach and demonstrate that visual analysis can be successfully combined with network security mechanisms to greatly improve intrusion detection capabilities.
APA, Harvard, Vancouver, ISO, and other styles
10

White, Jonathan, Phil Legg, and Alan Mills. "Interactive Cyber-Physical System Hacking." Journal of The Colloquium for Information Systems Security Education 10, no. 1 (2023): 6. http://dx.doi.org/10.53735/cisse.v10i1.163.

Full text
Abstract:
Cyber Security as an education discipline covers a variety of topics that can be challenging and complex for students who are new to the subject domain. With this in mind, it is crucial that new students are motivated by understanding both the technical aspects of computing and networking, and the real-world implications of compromising these systems. In this paper we approach this task to create an engaging outreach experience, on the concept of cyber-physical systems, using a Scalextric slot-car racetrack. In the activity, students seek to compromise the underlying computer system that is linked to the track and updates the scoreboard system, in order to inflate their own score and to sabotage their opponent. Our investigation with this technique shows high levels of engagement whilst providing an excellent platform for teaching basic concepts of enumeration, brute forcing, and privilege escalation. It also provokes discussion on how this activity relates to real-world cases of cyber-physical systems security in the sports domain and beyond.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Interactive Compromise Approach"

1

Lavecchia, Francesco. "Integrative Approaches to Decode the Co-translational Role of the Phage Vp16 Peptide Deformylase and how it Compromises Host Viability." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLS004/document.

Full text
Abstract:
L'excision de la méthionine N-terminale (NME) est la première modification se produisant au N-terminal des protéines (NPM). Les peptides déformylases (PDF) sont les enzymes impliquées dans ce processus co-traductionnel essentiel et conservé. Les PDFs suppriment le groupe formyle lié à la méthionine initiatrice (iMet) présente au début de toutes les chaînes procaryotes naissantes. Les PDFs agissent au niveau du tunnel de sortie des ribosomes, plaque tournante de nombreux facteurs de biogénèse des protéines associées aux ribosomes (PRB), impliqués non seulement sur les MNP, mais également dans le repliement et la translocation des protéines. La déformylation N-terminale implique 95% du protéome bactérien et contribue directement à la stabilité des protéines. Le récent séquençage à haut débit de milliers de génomes a révolutionné notre perception de la distribution des PDFs dans les différents règnes, révélant des PDFs putatives dans tous les organismes, y compris les virus. En particulier, les études concernant les virus présents dans les échantillons microbiens océaniques ont permis d’identifier des gènes inhabituels de PDF chez les phages, constituant la famille la plus abondante de protéines auxiliaires conservées de ces génomes. La comparaison des séquences identifiées révèle que les PDF virales présentent une forte conservation des trois motifs constituant le site catalytique. Cependant, ces PDFs virales ne présentent pas d'extension C-terminale, région réputée importante des PDFs des autres organismes. Sachant que cette extension est impliquée dans la liaison de la PDF d’E. coli au ribosome et est requise pour son activité déformylase in vivo, il était incertain que les PDFs de phage découvertes avaient une activité déformylase classique. Ainsi, la découverte de ces PDFs virales soulève un certain nombre de questions parmi lesquelles: a) Ces PDFs virales présentent-elles une activité déformylase classique? b) Ces PDFs sont-elles capables de se lier aux ribosomes ? c) Pourquoi autant de virus portent-ils une ou plusieurs déformylases ? Dans ce contexte, l’objectif de ma thèse a été d’entreprendre la caractérisation de ces PDFs de phages marins et en particulier la PDF de Vp16 provenant de bactériophages isolés à l’origine de la souche 16 de Vibrio parahaemolyticus. Nos études révèlent que ces PDFs de phages présentent une activité déformylase à la fois in vitro et in vivo, avec une spécificité de substrat similaire à celle des autres PDFs bactériennes. D'autre part, nous avons montré par des études biochimiques et structurales, combinées à des analyses par mutagenèse dirigée, que les propriétés de la PDF de Vp16 diffèrent significativement de celle des autres PDFs caractérisées précédemment. Il faut aussi noter que l'expression de la PDF Vp16 dans les souches d'E. Coli, même à de faibles concentrations, montre un effet bactéricide marqué à une température inférieure à 37 °C. L’effet bactéricide de la PDF Vp16 est indépendant de la présence de la PDF endogène bactérienne et repose strictement sur son activité déformylase. La caractérisation de ce phénotype a révélé que la létalité induite par Vp16 PDF montrait un lien génétique fort avec des gènes codants pour des facteurs cellulaires impliqués dans le ciblage et le repliement précoce des protéines (Trigger Factor et Sec). Contrairement à ce qui a été montré pour les PDFs bactériennes, Vp16 PDF a une forte affinité pour le ribosome bactérien d’E. coli en cours de traduction, interagissant avec une région ribosomale chevauchant celles des facteurs impliqués dans le transit des protéines vers les voies de sécrétion. Une compétition au niveau du ribosome entre Vp16 PDF et ces RPBs pourrait contribuer à la lyse cellulaire de l’hôte. Mon travail suggère un nouveau mécanisme utilisé par les bactériophages permettant de contrôler la viabilité de l'hôte<br>N-terminal Methionine Excision (NME) is the first occurring N-terminal Protein Modification (NPMs). Peptide deformylases (PDFs) are the enzymes involved in this essential and conserved co-translational process. PDFs remove the formyl group bound to the iMet present at the beginning of all prokaryotic nascent chains. PDFs act on the nascent chain at the level of the ribosome exit tunnel, a central hub for a number of Ribosome-associated Protein Biogenesis factors (RPBs) involved not only on NPMs but also in protein folding and translocation. Deformylation involves 95% of bacterial proteome and it is suggested to directly contribute to protein stability. Recent high-throughput sequencing of thousands of genomes has strongly contributed to revolutionizing our perception of the distribution of PDFs among kingdoms, revealing putative PDFs in all organisms, including viruses. In particular, studies of viruses within oceanic microbial samples retrieved unusual PDFs genes as the most abundant family in most of phage genomes. Sequence comparisons reveal that viral PDFs show high conservation in the three motifs that build the catalytic site; however, viral PDFs do not display a C-terminal extension when compared to the different active PDFs from other organisms. Since this C-terminal extension was shown to be important for PDF-ribosome binding and is required for the in vivo deformylase activity of E. coli PDF, it was unclear whether the discovered phage PDFs might support a classical deformylase activity. Thus, the discovery of these viral PDFs raises a number of questions among which: a) Have these viral PDFs a classical deformylase activity? b) Are these PDFs able to still bind to the ribosomes? c) Why so many viruses carry a peptide deformylase? In this context, the objective of my thesis was to undertake the characterization of these marine phage PDFs and particularly Vp16 PDF derived from the bacteriophages originally isolated from Vibrio Parahaemolyticus strain 16. Our studies reveal that phage PDFs display deformylase activity both in vitro and in vivo with a substrate specificity similar to that of other bacterial PDFs. On the other hand, we showed by biochemical and structural data, combined with site-directed mutagenesis analyses, that Vp16 PDF significantly differs from previously characterized PDFs in terms of their properties, which can be related to its few uncommon peculiarities. Interestingly, expression of Vp16 PDF in E. coli strains, even at low concentrations, exhibited a severe bactericidal effect at temperature lower than 37 °C. This bactericidal effect of Vp16 PDF was independent of the presence of the bacterial endogenous PDF and strictly relied on its PDF activity. Characterization of this phenotype revealed that Vp16 PDF-induced lethality showed a strong genetic link with genes encoding cellular factors involved in nascent pre-secretory protein targeting and folding (Trigger Factor and Sec). Differently from bacterial PDF, I could show that Vp16 PDF has strong affinity for ribosomes with a specific nascent chain, interacting with a ribosomal region overlapping that of factors involved in pre-secretory protein targeting. A competition between Vp16 PDF and these RPBs at the level of the ribosome may contribute to the host lysis, revealing a possible new unrecognized mechanism developed by viruses to control host viability
APA, Harvard, Vancouver, ISO, and other styles
2

Seo, Sang-Hyun. "A study of democratic transition in south Africa : democratic through compromise and institutional choice." Thesis, 2008. http://hdl.handle.net/10500/3401.

Full text
Abstract:
The focus of this study is on South Africa's transition to democracy. It is argued in this thesis, that an analysis of the transition to democracy in South Africa and the transformation of the con ict that prevailed in this divided society could generate new avenues for theorising about transitions to democracy in divided societies amidst con ict. The aim with this thesis is to contribute towards a more comprehensive understanding of the complex nature of the process of transition to democracy, and the relevant theory involved, particularly with regard to transitions in divided societies. One consequence of the deep divisions within South African society has been the increase in violence, which followed liberalisation. The transition to democracy in South Africa, as a result, was characterised by continuing and escalating violence. In South Africa, the authoritarian regime deteriorated mainly because of internal factors, but external factors also played an important role. The analysis of the transition has been guided by the hypothesis that the democratisation of South Africa was accomplished through a compromise that was negotiated between the major political actors and which re ected the intra-, as well as the inter-dynamics in the domains of, state - political society - civil society. Thus, the main theme of this thesis is, that in the analysis of the dynamics of the tran- sition to democracy in South Africa, a basic framework in which the domains of, state - political society - civil society, are the domains where structural variables (such as culture, economic development, class structures, increased education and the international environ- ment) and behavioural variables (such as major political actors, elite factions, organisations from civil society) interact. Thus, in the diachronic analysis of South Africa's transition, an interactive approach, that seeks to relate structural constraints to the shaping of contingent choice, is followed. At the same time, the institutional substitution of a new democratic political dispensation is examined. In conclusion, democracies are complex phenomena, and they are caused by many di er- ent forces and synthesizing the relevant theoretical approaches to political change provides a more cogent and comprehensive explanation of democratic transition in South Africa.<br>(D. Litt. et Phil. (International Politics))
APA, Harvard, Vancouver, ISO, and other styles
3

Seo, Sang-Hyun. "A study on democratic transition in south Africa : democratic through compromise and institutional choice." Thesis, 2008. http://hdl.handle.net/10500/3401.

Full text
Abstract:
The focus of this study is on South Africa's transition to democracy. It is argued in this thesis, that an analysis of the transition to democracy in South Africa and the transformation of the con ict that prevailed in this divided society could generate new avenues for theorising about transitions to democracy in divided societies amidst con ict. The aim with this thesis is to contribute towards a more comprehensive understanding of the complex nature of the process of transition to democracy, and the relevant theory involved, particularly with regard to transitions in divided societies. One consequence of the deep divisions within South African society has been the increase in violence, which followed liberalisation. The transition to democracy in South Africa, as a result, was characterised by continuing and escalating violence. In South Africa, the authoritarian regime deteriorated mainly because of internal factors, but external factors also played an important role. The analysis of the transition has been guided by the hypothesis that the democratisation of South Africa was accomplished through a compromise that was negotiated between the major political actors and which re ected the intra-, as well as the inter-dynamics in the domains of, state - political society - civil society. Thus, the main theme of this thesis is, that in the analysis of the dynamics of the tran- sition to democracy in South Africa, a basic framework in which the domains of, state - political society - civil society, are the domains where structural variables (such as culture, economic development, class structures, increased education and the international environ- ment) and behavioural variables (such as major political actors, elite factions, organisations from civil society) interact. Thus, in the diachronic analysis of South Africa's transition, an interactive approach, that seeks to relate structural constraints to the shaping of contingent choice, is followed. At the same time, the institutional substitution of a new democratic political dispensation is examined. In conclusion, democracies are complex phenomena, and they are caused by many di er- ent forces and synthesizing the relevant theoretical approaches to political change provides a more cogent and comprehensive explanation of democratic transition in South Africa.<br>(D. Litt. et Phil. (International Politics))
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Interactive Compromise Approach"

1

Rieber, Alfred J. Storms over the Balkans during the Second World War. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780192858030.001.0001.

Full text
Abstract:
In a new interpretation of the history of the Balkans during the Second World War, this book explores the tangled political rivalries, cultural clashes, and armed conflicts among the great powers and the indigenous people competing for influence and domination. The author takes an original approach to the region based on the interaction among geography, social conditions, and imperial rivalries that spans several centuries, culminating in three wars during the first half of the twentieth century. Against this background, Rieber focuses on leadership, personified by Mussolini, Hitler, Stalin, Churchill, and Tito, as the key to explaining events. For each one the Balkans represented a strategic prize vital for the fulfillment of their ambitious war aims. For the local forces the destabilization of the war offered the opportunity to reorder societies, expel ethnic minorities and expand national borders. The book illustrates how the leaders of the external powers were forced to improvise their tactics and compromise their ideologies under the pressure of war and the competing claims of their allies and clients. Neither the Axis nor the Allied camps were uniform blocs and deep divisions ran through the ranks of the resistance and those collaborating with the occupying powers. These tensions contributed to the failure of all the participants in the struggle to achieve their aims. The complexities of the wartime experiences help to explain the persistence of memories and unfulfilled aspirations that continue to haunt the region.
APA, Harvard, Vancouver, ISO, and other styles
2

Whittier, Nancy. Frenemies. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190235994.001.0001.

Full text
Abstract:
What happens when activists who usually oppose each other work to advance similar goals? This book re-conceptualizes models of social movements’ relationships with each other and develops a new framework for understanding relationships that are neither coalitions nor countermovements. Rich, empirically grounded case studies of opposition to pornography, child sexual abuse policy, and the Violence Against Women Act show how feminists and conservatives engaged with the issues and with each other, the differences between their approaches, and both their points of overlap and their power struggles. Each case illustrates a different type of relationship: an adversarial yet collaborative interaction around pornography; a narrow, issue-specific, and politically neutral opposition to child sexual abuse; and an ambivalent alliance confined to the policy arena for the Violence Against Women Act. Focusing on activism targeting the federal government from 1980 to 2013, the book draws on a unique, in-depth dataset, including transcripts of Congressional hearings and movement documents, to analyze interpretive processes within the state. Activists constructed frames that enabled cross-ideological support, dealt with the reputational risk of appearing to consort with the enemy, and sometimes compromised or de-emphasized controversial goals in favor of areas of commonality. In the end, feminists and conservatives influenced policy and culture to different degrees in the three case studies, depending on their relative power. Frenemies draws powerful lessons about both the benefits and risks of collaboration across ideological difference.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Interactive Compromise Approach"

1

Hasuike, Takashi, Hideki Katagiri, Hiroe Tsubaki, and Hiroshi Tsuda. "Interactive Approaches for Sightseeing Route Planning under Uncertain Traffic and Ambiguous Tourist's Satisfaction." In New Business Opportunities in the Growing E-Tourism Industry. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8577-2.ch005.

Full text
Abstract:
This paper proposes an interactive approach to obtain an appropriate sightseeing route for the tourist under various uncertain traffic and climate conditions including time-dependent parameters and ambiguous satisfaction values at sightseeing sites. Since the uncertain traffic and climate conditions include time-dependent conditions, Time Expanded Network (TEN) are proposed for each condition. Furthermore, interval numbers for ambiguous satisfaction values are proposed, and hence, the proposed model is formulated as a multiobjective interval programming problem with many constraints derived from network optimization. In order to transform the multiobjective into the single-objective, Minkowski's Lp-metric is introduced as a compromise approach. From the final formulation of our proposed model using the optimistic satisfactory for interval numbers, an interactive algorithm to obtain the appropriate sightseeing route communicating with the tourist is developed.
APA, Harvard, Vancouver, ISO, and other styles
2

Silvera-Tawil, David, Iva Strnadová, and Therese M. Cumming. "Social Stories in Robot-Assisted Therapy for Children with ASD." In Advances in Early Childhood and K-12 Education. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0816-8.ch012.

Full text
Abstract:
Mobile technology devices are commonly used as assistive technology to support children with Autism Spectrum Disorder (ASD) in gaining skills in interpersonal communication. While considered generally safe and effective, there are concerns that a child that is taught to communicate through interactive technologies may become dependent on the virtual world and its rewards, while interpersonal skills are sacrificed or not generalized to real world settings (Bauminger-Zviely, Eden, Zancanaro, Weiss, &amp; Gal, 2013). This chapter theorizes that the anthropomorphic embodiment of humanoid robots may provide a compromise between the real and the virtual worlds. The authors suggest that a humanoid robot can use social stories within an Applied Behavioral Analysis (ABA) framework to support the acquisition of social interaction skills of children with ASD. The objective of this chapter is to contribute to the current literature by providing a description of this intervention and make suggestions for its implementation using a case study approach.
APA, Harvard, Vancouver, ISO, and other styles
3

Janssens, Jurgen. "Digital Transformation Journeys in a Digitized Reality." In Encyclopedia of Information Science and Technology, Fourth Edition. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2255-3.ch059.

Full text
Abstract:
Big Data and Digitization are among the most talked about concepts of the last years. Whereas Big Data has more and more concrete outcomes, Digitization is still seen as far away future. Nowadays, however, the question is not anymore how to prepare for the upcoming Digitization. The question companies and organizations have to ask themselves is how to adapt to and in today's Digitizing World. A correct translation of this strategy is equally important. It requires a dynamic silver lining, compatible with interactive work clusters and a hybrid organization. Typically, this results in a new way of working and an appropriate approach to power this way of working. The way of working needs to be adapted to the redefined borders between reactivity and proactivity, the need for real-time service and contextual adaptation. It needs to be designed for agility. To provide value, an organic compromise has to be found that answers the need for creative freedom, and the need for a solid structure where guidance, management, and development of human capabilities is possible in a structured way.
APA, Harvard, Vancouver, ISO, and other styles
4

Janssens, Jurgen. "Digital Transformation Journeys in a Digitized Reality." In Advanced Methodologies and Technologies in Business Operations and Management. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7362-3.ch021.

Full text
Abstract:
Big data and digitization are among the most talked about concepts of the last years. Whereas big data has more concrete outcomes, digitization is still seen as far away future. Nowadays, however, the question is no longer how to prepare for the upcoming digitization. The question companies and organizations have to ask themselves is how to adapt to today's digitizing world. A correct translation of this strategy is equally important. It requires a dynamic silver lining, compatible with interactive work clusters and a hybrid organization. Typically, this results in a new way of working and an appropriate approach to power this way of working. The way of working needs to be adapted to the redefined borders between reactivity and proactivity, the need for real-time service, and the need for contextual adaptation. It needs to be designed for agility. To provide value, an organic compromise has to be found that answers the need for creative freedom and the need for a solid structure where guidance, management, and development of human capabilities is possible in a structured way.
APA, Harvard, Vancouver, ISO, and other styles
5

Janssens, Jurgen. "Digital Transformation Journeys." In Encyclopedia of Organizational Knowledge, Administration, and Technology. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3473-1.ch176.

Full text
Abstract:
Big Data and Digitization are among the most talked about concepts of the last years. Whereas Big Data has more and more concrete outcomes, Digitization is still seen as far away future. Nowadays, however, the question is not anymore how to prepare for the upcoming Digitization. The question companies and organizations have to ask themselves is how to adapt to and in today's Digitizing World. A correct translation of this strategy is equally important. It requires a dynamic silver lining, compatible with interactive work clusters and a hybrid organization. Typically, this results in a new way of working and an appropriate approach to power this way of working. The way of working needs to be adapted to the redefined borders between reactivity and proactivity, the need for real-time service and contextual adaptation. It needs to be designed for agility. To provide value, an organic compromise has to be found that answers the need for creative freedom, and the need for a solid structure where guidance, management, and development of human capabilities is possible in a structured way.
APA, Harvard, Vancouver, ISO, and other styles
6

Amador, Gonçalo N. P., and Abel J. P. Gomes. "A Simple Physically-Based 3D Liquids Surface Tracking Algorithm." In Innovative Design and Creation of Visual Interfaces. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0285-4.ch019.

Full text
Abstract:
Navier-Stokes-based methods have been used in computer graphics to simulate liquids, especially water. These physically based methods are computationally intensive, and require rendering the water surface at each step of the simulation process. The rendering of water surfaces requires knowing which 3D grid cells are crossed by the water’s surface, that is, tracking the surface across the cells is necessary. Solutions to water surface tracking and rendering problems exist in literature, but they are either too computationally intensive to be appropriate for real-time scenarios, as is the case of deformable implicit surfaces and ray-tracing, or too application-specific, as is the case of height-fields to simulate and render water mantles (e.g., lakes and oceans). This paper proposes a novel solution to water surface tracking that does not compromise the overall simulation performance. This approach differs from previous solutions in that it directly classifies and annotates the density of each 3D grid cell as either water, air, or water-air (i.e., water surface), opening the opportunity for easily reconstructing the water surface at an interactive frame rate.
APA, Harvard, Vancouver, ISO, and other styles
7

El-Affendi, Abdelwahab. "The Moderation of Insecurity: Standing the Eurocentric Democratic Transition Paradigm on Its Head." In After the Arab Revolutions. Edinburgh University Press, 2021. http://dx.doi.org/10.3366/edinburgh/9781474483216.003.0003.

Full text
Abstract:
Proposing to stand the transition ‘paradigm’ on its head by taking the Arab experience as a theoretical starting point, the chapter proceeds to build on the theory[s interactive approach to knowledge. Highlighting the interconnection between two core theoretical concepts – uncertainty and moderation – it links them to a third – insecurity, with levels of (perceived/constructed) insecurity identified as a key explanatory variable, resolving Arab region’s riddles and clarifying the broader international story of democracy. As the paradox at the heart of the transition, uncertainty makes transitions possible, while rendering both the derivation of rules and sustainability elusive. Democracy requires a mitigated, or “bounded” uncertainty to allow genuine democratic competition. However, when the Syrian or Libyan “black hole state” prefers ruin to compromise, the concept of moderation loses sense and utility. Democracy itself becomes securitized, with both internal and international actors deeming it a threat. This spill-over of insecurity provokes interventions to prop up dysfunctional regimes. No exceptionalism here; the same dynamics can explain current threats to established democracies. Given that most “requisites” for democratic consolidation, (national cohesion, moderation, etc.), are instances of insecurity mitigation (including economic insecurity, then we have a very powerful explanatory tool here.
APA, Harvard, Vancouver, ISO, and other styles
8

Leibold, Mathew A., and Alan J. Tessier. "Experimental Compromise and Mechanistic Approaches to the Evolutionary Ecology of Interacting Daphnia Species." In Experimental Ecology. Oxford University PressNew York, NY, 1998. http://dx.doi.org/10.1093/oso/9780195102413.003.0005.

Full text
Abstract:
Abstract The experimental approach has been tremendously useful in community ecology, but it has led to a codified design for experiments, which has been characterized as phenomenological by some critics (Dunham, this volume; Petraitis, this volume). In the conventional approach, investigators select a particular system (i.e., an assemblage at a particular place and time) and conduct perturbation experiments to determine if certain general processes occur (e.g., species removals to detect the occurrence of predation or competition). In some cases, multiple factors are manipulated to determine the “relative importance” of these factors on aspects of the community. This tradition of experiments has rapidly escalated, and standard means have been developed and improved to deal with a wide array of methodological, statistical, and inferential issues (Hurlburt 1984, Hairston 1989, Manly 1992, Underwood 1995). Whereas early experiments often suffered from an array of such problems (Table 5-1), more recent work reflects a greater awareness of these important issues. Improvements on the experimental approach, however, continue to deal poorly with what are perhaps the most important concerns: generality and extrapolation. Advances in these areas come at great cost.
APA, Harvard, Vancouver, ISO, and other styles
9

Falah, Bouchaib, Mohammed Akour, and Samia Oukemeni. "An Alternative Threat Model-Based Approach for Security Testing." In Application Development and Design. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3422-8.ch018.

Full text
Abstract:
In modern interaction, web applications has gained more and more popularity, which leads to a significate growth of exposure to malicious users and vulnerability attacks. This causes organizations and companies to lose valuable information and suffer from bad reputation. One of the effective mitigation practices is to perform security testing against the application before release it to the market. This solution won't protect web application 100% but it will test the application against malicious codes and reduce the high number of potential attacks on web application. One of known security testing approach is threat modeling, which provides an efficient technique to identify threats that can compromise system security. The authors proposed method, in this paper, focuses on improving the effectiveness of the categorization of threats by using Open 10 Web Application Security Project's (OWASP) that are the most critical web application security risks in generating threat trees in order to cover widely known security attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Tandon, Soma Kamal. "A “Novel” Approach to the Moral Dimension of Leadership." In Handbook of Research on Teaching Ethics in Business and Management Education. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-510-6.ch017.

Full text
Abstract:
In recent times ethics and leadership have become dominant concerns in business. The foundations of the business establishment have been shaken by the examples of insider trading, manipulative accounting, and blatant fraud. The cause of ethical compromise can often be traced to the failure on the part of the leadership to actively promote ethical ideals and practices. In the current scenario, it is therefore, essential to give training on ethical leadership. This chapter adopts a three dimensional approach integrating the novel The Devil and Miss Prym into the study of ethics by exploring various related leadership theories. It harnesses the multifaceted nature of literature, which presents the interaction of a variety of characters with radically different beliefs, desires, and behaviours, thus increasing the complexity of an ethical dilemma. Charismatic and Servant leadership have been mapped to virtue ethics. Transactional leadership adopts ethical egoism as an ethical perspective. The transformational leader adopts the utilitarianism approach. Authentic leadership is based on altruistic principles. Deontological ethics is explained with Value Centered leadership. A thematic analysis of the novel has been done to exemplify the components of the leadership theories with an ethical perspective.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Interactive Compromise Approach"

1

Houser, Donald R., Jonny Harianto, B. Chandrasekaran, John Josephson, and Naresh Iyer. "A Multi-Variable Approach to Determine the “Best” Gear Design." In ASME 2000 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/detc2000/ptg-14362.

Full text
Abstract:
Abstract Gear design requires the designer to compromise many design variables in order to determine the best performance of a gear set. Unfortunately the designer has a multiplicity of goals including keeping both bending and pitting stresses under an allowable value, minimizing scoring, achieving minimum efficiency and trying to minimize noise. This latter response variable is rarely considered in the initial gear design. In this work, noise is considered to be one of the more important design considerations. One approach to multi-variable gear design that has been tried is design optimization. Usually optimization techniques are limited in the number of variables that can be handled and with so many response variables, it is difficult to come up with an objective function that reflects the considerations of a real gear designer. In this paper we present a simulation-based approach to gear design that allows the designer to essentially “run all of the cases”. The simulation accounts for the true load distribution of the gears when computing response variables. Also, such factors as manufacturing tolerances may be included in the simulation so that truly robust designs may be obtained. Rather than using an objective function approach, designs are analyzed with a dominance filter that assesses each response variable in a manner that results in the “best” design. After these “best” designs are found, an interactive viewer allows the selection of those designs that best meet the designer’s goals with regard to all design variables. Several examples are presented in this paper. In each case, over 65,000 designs are evaluated and the dominance filter results in from 200 to 900 successful designs, depending on the tolerances that are applied. After sorting with the viewer the designer usually ends up with from 5 to 20 designs whose features may vary significantly, but have similar performances.
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Warren F., and Farrokh Mistree. "Monotonicity and Goal Interaction Diagrams for the Compromise Decision Support Problem." In ASME 1994 Design Technical Conferences collocated with the ASME 1994 International Computers in Engineering Conference and Exhibition and the ASME 1994 8th Annual Database Symposium. American Society of Mechanical Engineers, 1994. http://dx.doi.org/10.1115/detc1994-0057.

Full text
Abstract:
Abstract Our approach in this paper is an introspective one with respect to modeling. Rather than examining what can be done with a model and how it can be built up or synthesized, we focus on the mathematical characteristics and how a model might be broken down or analyzed. Firstly, using monotonicity principles, this culminates in the identification of the nonlinear constraint and goal functionality and variable monotonicity, and secondly, in the development of the Goal Interaction Diagram. As various scenarios are examined, this information leads to improved efficiency and effectiveness within the design process through enhanced understanding. The case study we use to illustrate our approach deals with a real world example, namely, the preliminary design of a naval frigate. A working knowledge of naval architecture, however, is not required to understand the concepts being discussed.
APA, Harvard, Vancouver, ISO, and other styles
3

Glezer, Boris. "Integration of Multi-Disciplinary Factors Into Turbine Cooling Design." In ASME Turbo Expo 2001: Power for Land, Sea, and Air. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/2001-gt-0179.

Full text
Abstract:
The presented paper describes a multi-disciplinary cooling selection practice applied to major gas turbine engine hot section components, including turbine nozzles, blades, discs, combustors and support structures maintaining blade tip clearances. The paper demonstrates the benefits of close interaction between participating disciplines, when this interaction starts in the early phase of the hot section development. The approach targets advances in engine performance and cost by optimizing the design process, often requiring compromises within individual disciplines.
APA, Harvard, Vancouver, ISO, and other styles
4

Elek, Predrag, Miloš Marković, Dejan Jevtić, and Radovan Đurović. "Modeling of shaped charge jet penetration depth: Analytical and numerical approach." In 11th International Scientific Conference on Defensive Technologies - OTEX 2024. Military Technical Institute, Belgrade, 2024. http://dx.doi.org/10.5937/oteh24038e.

Full text
Abstract:
Shaped charge is the most effective armor-piercing mechanism, harnessing explosive charge detonation energy to form and accelerate a hypervelocity metal penetrator known as a jet. The process entails intricate dynamics including detonation wave propagation, its interaction with the metal liner, and subsequent liner collapse leading to jet formation. While both analytical and numerical models offer insight into this complex process, each approach presents distinct challenges. Analytical models, while conceptually straightforward, often rely on simplifications that compromise accuracy. Conversely, uncertainty or even unavailability of relevant material properties and high computational cost are the most important drawbacks of numerical models. Notably, the jet penetration phase imposes significantly greater computational demands compared to preceding processes of jet formation. This research aims at providing a deeper understanding of the jet interaction with target, as well as on determining its influence on penetration depth. We revisit an analytical model based on the virtual origin concept and complement it with numerical simulations using Abaqus/Explicit in a pure Eulerian domain. Through comprehensive analysis, we explore various jet parameters-such as kinetic energy, diameter, length, velocity gradient, and effective standoff distance-and their impact on penetration depth. The insights derived from this study hold practical significance for the preliminary evaluation of the shaped charge's effectiveness and consequent refinement of the design of shaped charge projectiles or warheads.
APA, Harvard, Vancouver, ISO, and other styles
5

Domengès, B., T. Delaroque, K. Danilo, and A. Colder. "Comprehensive Nano-Structural Approach of SSRM Nanocontact on Silicon through TEM-STEM Study." In ISTFA 2011. ASM International, 2011. http://dx.doi.org/10.31399/asm.cp.istfa2011p0132.

Full text
Abstract:
Abstract Scanning Spreading Resistance Microscopy electro-mechanical nanocontacts are nowadays well understood and numerous influent parameters have been identified (Bias, load, surface state of the sample, radius of curvature of the tip). Despite several simulation and modelization possibilities, calibration curves are required to ensure reliable electrical characterizations. In this paper, we bring, through nano-structural studies (Scanning Electron Microscopy, Transmission Electron Microscopy) of surface state of both SSRM tips and doped silicon surface a new understanding of tip-sample interaction during SSRM measurements. As a result of load, a nanometric residual amorphous silicon layer was observed which thickness depends on applied force and might be due to as well the plastic transformation (Si to β-tin phase) as plough-effect residues resulting from the tip indentation into the sample. It appears thus in a failure analysis process to find the best compromise between stable electrical SSRM response and sample/tip surface degradation.
APA, Harvard, Vancouver, ISO, and other styles
6

Shimoga, K. B., A. M. Murray, and P. K. Khosla. "A Touch Display System for Interaction With Remote and Virtual Environments." In ASME 1996 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 1996. http://dx.doi.org/10.1115/imece1996-0378.

Full text
Abstract:
Abstract In this paper, we describe a touch display system suitable for dextrous interaction with remote and virtual environments. The basic framework involves a Utah/MIT robot hand, teleoperated by a human master wearing a VPL Data Glove. The touch reflection system consists of tactile sensors attached to the tips of the robot fingers and micro-actuators, also called tactors, attached to the finger tips of the human operator’s hand. Both the touch sensors and the tactors are commercially available. Experimental results demonstrate the usefulness of the touch display system in a context of dextrous telemanipulation. The approach in this work, though not claimed to be novel, is however simple and inexpensive. The characterization of the force-sensitive resistors, used as touch sensors, and the compromises made on experimental results are of particular interest to the users of similar haptic displays.
APA, Harvard, Vancouver, ISO, and other styles
7

Polanco, Geanette. "Heat Pump Interactive Computer Complementary Learning Tool." In ASME 2016 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/imece2016-66819.

Full text
Abstract:
Currently teaching challenges involve incorporation of new technologies or approaches to address teaching/learning process of students more attracted to technology than before. Additionally, the possibility of having student trough internet demands the use of new technological techniques in order to deliver required concepts in a successful way, especially in those cases where a practical application is involved. This work presents a computer model of the “Heat pump system” equipment located at UiT, The Artic University of Norway - Campus Narvik. This system contains the typical elements in a refrigeration system as a compressor, an evaporator, a condenser, an expansion valve, two filters and a visor. The working fluid inside the refrigerant system is Chlorodifluoromethane (CHClF2) frequently known as refrigerant R22, meanwhile the contraflow fluid in the heat exchanger is water. Golden factor of having experimental facility is the fact that the phenomenon will occur as it is, without any theoretical considerations or assumptions. So, when merging both technology and actual equipment, concepts and definitions can be demonstrated by experimental activities and also the models frequently used can be compared to the actual parameters behaviour. For instance, relation between thermodynamics properties and the mechanical variables as compressor power can be described based on the functioning of the equipment, but the realistic application of isentropic functioning of the compressor can be contrasted against the actual compressor performance, or the isobaric assumption on the heat exchanger can be compared against the heat exchanger working at particular conditions. Refrigeration cycle theoretical computer model can be built based on pressure values before and after the compressor as well as the temperatures at key points, however, actual system will have a complete set of parameter values at different location. Comparing both theoretical and actual cycles on pressure-temperature graph, efficiency of the model can be obtained in an interactive way. In this way, teaching activities will cover the necessary development of analytical thinking about the applicability of different models in different engineering application trough out a refrigeration case. Moreover computer model technique also introduces the possibility of expansion the range of possible refrigerant fluids, which can be tested without compromise the safety of the students when the materials or fluids involved could be considered as hazardous. The presented computer model includes the use of computational tool called PRODE® to calculate the properties of the flow. As result, an interactive computer model was developed as an extra help within the teaching/learning process.
APA, Harvard, Vancouver, ISO, and other styles
8

Driant, Thomas, Stéphane Moreau, Hachimi Fellouah, and Alain Desrochers. "Aero-Thermal Optimization of a Hybrid Roadster Tricycle Using Multidisciplinary Design Optimization Tools." In ASME 2014 4th Joint US-European Fluids Engineering Division Summer Meeting collocated with the ASME 2014 12th International Conference on Nanochannels, Microchannels, and Minichannels. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/fedsm2014-21505.

Full text
Abstract:
To reach the goal of continuous improvement on automotive vehicles, their overall design strategy needs to be reconsidered. Hence, the future design will have to use global approaches like those developed in the aerospace industry where optimization of all interacting fields is performed jointly. This strategy has been applied to the development and optimization of a hybrid roadster aero-thermal management as part of a major Automotive Partnership Canada (APC) project1. The study presented herein seeks the best compromise between the vehicle aerodynamic drag and the cooling efficiency for the internal combustion engine (ICE) and the electric motor. The optimization of the heat exchanger position is first achieved followed by a multidisciplinary design optimization (MDO) approach with three main steps: first, a design of experiment (DOE) involving parametric CAD model generation, steady state CFD calculations and a heat exchanger optimization loop; secondly, approximations of response surfaces methods; finally, multi-objective optimization on the response surfaces using genetic algorithms and particle swarms. The study is constrained to use the automotive manufacturer’s software and to consider the vehicle environment without bringing significant modifications on non-thermal/aerodynamic parts.
APA, Harvard, Vancouver, ISO, and other styles
9

Bristot, Andrea, Hervé P. Morvan, and Kathy A. Simmons. "Evaluation of a Volume of Fluid CFD Methodology for the Oil Film Thickness Estimation in an Aero-Engine Bearing Chamber." In ASME Turbo Expo 2016: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/gt2016-56237.

Full text
Abstract:
The presented work aims to identify a Volume of Fluid (VOF) CFD approach for the transient simulation of air/oil flows inside an aero-engine bearing chamber. Typically VOF requires relatively fine grids and consequently small time-steps to sufficiently resolve the formation of oil films and their interaction with air flows. The need to achieve a stationary-state which requires flow times on the order of seconds makes the compromise between simulation accuracy and simulation times a challenging choice when using the VOF method. In this work, the use of the Compressive Interface Reconstruction scheme with bounded second order implicit time discretization has enabled a significant speed-up of the simulation times against the previously adopted explicit Geometric-Reconstruction scheme. The results are evaluated against experimental data available in the literature.
APA, Harvard, Vancouver, ISO, and other styles
10

Chiatti, Giancarlo, and Ornella Chiavola. "Particulate Deposition Modeling in Diesel Filter." In ASME 2004 Internal Combustion Engine Division Fall Technical Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/icef2004-0981.

Full text
Abstract:
The objective of this work is to evaluate the possibility of extracting information about the filter loading status from the running history of the engine and to assess the interaction between spatial deposition of soot inside the porous wall and the engine operating conditions. The attention is drawn to the non-uniform particles distribution on the channels which may compromise the filter safety as during the thermal regeneration process, the evolution of particulate oxidation results in temperature differences in the soot layer and critical overheating phenomena may originate. CFD simulations are performed by means of a multi dimensional approach in which a two-step stationary calculation is used to simulate the soot loading; results concerning the correlation between the engine operative conditions and the deposition of particulate are presented.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Interactive Compromise Approach"

1

Ficht, Thomas, Gary Splitter, Menachem Banai, and Menachem Davidson. Characterization of B. Melinensis REV 1 Attenuated Mutants. United States Department of Agriculture, 2000. http://dx.doi.org/10.32747/2000.7580667.bard.

Full text
Abstract:
Brucella Mutagenesis (TAMU) The working hypothesis for this study was that survival of Brucella vaccines was directly related to their persistence in the host. This premise is based on previously published work detailing the survival of the currently employed vaccine strains S19 and Rev 1. The approach employed signature-tagged mutagenesis to construct mutants interrupted in individual genes, and the mouse model to identify mutants with attenuated virulence/survival. Intracellular survival in macrophages is the key to both reproductive disease in ruminants and reticuloendothelial disease observed in most other species. Therefore, the mouse model permitted selection of mutants of reduced intracellular survival that would limit their ability to cause reproductive disease in ruminants. Several classes of mutants were expected. Colonization/invasion requires gene products that enhance host-agent interaction or increase resistance to antibacterial activity in macrophages. The establishment of chronic infection requires gene products necessary for intracellular bacterial growth. Maintenance of chronic infection requires gene products that sustain a low-level metabolism during periods characterized little or no growth (1, 2). Of these mutants, the latter group was of greatest interest with regard to our originally stated premise. However, the results obtained do not necessarily support a simplistic model of vaccine efficacy, i.e., long-survival of vaccine strains provides better immunity. Our conclusion can only be that optimal vaccines will only be developed with a thorough understanding of host agent interaction, and will be preferable to the use of fortuitous isolates of unknown genetic background. Each mutant could be distinguished from among a group of mutants by PCR amplification of the signature tag (5). This approach permitted infection of mice with pools of different mutants (including the parental wild-type as a control) and identified 40 mutants with apparently defective survival characteristics that were tentatively assigned to three distinct classes or groups. Group I (n=13) contained organisms that exhibited reduced survival at two weeks post-infection. Organisms in this group were recovered at normal levels by eight weeks and were not studied further, since they may persist in the host. Group II (n=11) contained organisms that were reduced by 2 weeks post infection and remained at reduced levels at eight weeks post-infection. Group III (n=16) contained mutants that were normal at two weeks, but recovered at reduced levels at eight weeks. A subset of these mutants (n= 15) was confirmed to be attenuated in mixed infections (1:1) with the parental wild-type. One of these mutants was eliminated from consideration due to a reduced growth rate in vitro that may account for its apparent growth defect in the mouse model. Although the original plan involved construction of the mutant bank in B. melitensis Rev 1 the low transformability of this strain, prevented accumulation of the necessary number of mutants. In addition, the probability that Rev 1 already carries one genetic defect increases the likelihood that a second defect will severely compromise the survival of this organism. Once key genes have been identified, it is relatively easy to prepare the appropriate genetic constructs (knockouts) lacking these genes in B. melitensis Rev 1 or any other genetic background. The construction of "designer" vaccines is expected to improve immune protection resulting from minor sequence variation corresponding to geographically distinct isolates or to design vaccines for use in specific hosts. A.2 Mouse Model of Brucella Infection (UWISC) Interferon regulatory factor-1-deficient (IRF-1-/- mice have diverse immunodeficient phenotypes that are necessary for conferring proper immune protection to intracellular bacterial infection, such as a 90% reduction of CD8+ T cells, functionally impaired NK cells, as well as a deficiency in iNOS and IL-12p40 induction. Interestingly, IRF-1-/- mice infected with diverse Brucella abortus strains reacted differently in a death and survival manner depending on the dose of injection and the level of virulence. Notably, 50% of IRF-1-/- mice intraperitoneally infected with a sublethal dose in C57BL/6 mice, i.e., 5 x 105 CFU of virulent S2308 or the attenuated vaccine S19, died at 10 and 20 days post-infection, respectively. Interestingly, the same dose of RB51, an attenuated new vaccine strain, did not induce the death of IRF-1-/- mice for the 4 weeks of infection. IRF-1-/- mice infected with four more other genetically manipulated S2308 mutants at 5 x 105 CFU also reacted in a death or survival manner depending on the level of virulence. Splenic CFU from C57BL/6 mice infected with 5 x 105 CFU of S2308, S19, or RB51, as well as four different S2308 mutants supports the finding that reduced virulence correlates with survival Of IRF-1-/- mice. Therefore, these results suggest that IRF-1 regulation of multi-gene transcription plays a crucial role in controlling B. abortus infection, and IRF-1 mice could be used as an animal model to determine the degree of B. abortus virulence by examining death or survival. A3 Diagnostic Tests for Detection of B. melitensis Rev 1 (Kimron) In this project we developed an effective PCR tool that can distinguish between Rev1 field isolates and B. melitensis virulent field strains. This has allowed, for the first time, to monitor epidemiological outbreaks of Rev1 infection in vaccinated flocks and to clearly demonstrate horizontal transfer of the strain from vaccinated ewes to unvaccinated ones. Moreover, two human isolates were characterized as Rev1 isolates implying the risk of use of improperly controlled lots of the vaccine in the national campaign. Since atypical B. melitensis biotype 1 strains have been characterized in Israel, the PCR technique has unequivocally demonstrated that strain Rev1 has not diverted into a virulent mutant. In addition, we could demonstrate that very likely a new prototype biotype 1 strain has evolved in the Middle East compared to the classical strain 16M. All the Israeli field strains have been shown to differ from strain 16M in the PstI digestion profile of the omp2a gene sequence suggesting that the local strains were possibly developed as a separate branch of B. melitensis. Should this be confirmed these data suggest that the Rev1 vaccine may not be an optimal vaccine strain for the Israeli flocks as it shares the same omp2 PstI digestion profile as strain 16M.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography