12 resultados para Out of mind
em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland
Resumo:
COD discharges out of processes have increased in line with elevating brightness demands for mechanical pulp and papers. The share of lignin-like substances in COD discharges is on average 75%. In this thesis, a plant dynamic model was created and validated as a means to predict COD loading and discharges out of a mill. The assays were carried out in one paper mill integrate producing mechanical printing papers. The objective in the modeling of plant dynamics was to predict day averages of COD load and discharges out of mills. This means that online data, like 1) the level of large storage towers of pulp and white water 2) pulp dosages, 3) production rates and 4) internal white water flows and discharges were used to create transients into the balances of solids and white water, referred to as “plant dynamics”. A conversion coefficient was verified between TOC and COD. The conversion coefficient was used for predicting the flows from TOC to COD to the waste water treatment plant. The COD load was modeled with similar uncertainty as in reference TOC sampling. The water balance of waste water treatment was validated by the reference concentration of COD. The difference of COD predictions against references was within the same deviation of TOC-predictions. The modeled yield losses and retention values of TOC in pulping and bleaching processes and the modeled fixing of colloidal TOC to solids between the pulping plant and the aeration basin in the waste water treatment plant were similar to references presented in literature. The valid water balances of the waste water treatment plant and the reduction model of lignin-like substances produced a valid prediction of COD discharges out of the mill. A 30% increase in the release of lignin-like substances in the form of production problems was observed in pulping and bleaching processes. The same increase was observed in COD discharges out of waste water treatment. In the prediction of annual COD discharge, it was noticed that the reduction of lignin has a wide deviation from year to year and from one mill to another. This made it difficult to compare the parameters of COD discharges validated in plant dynamic simulation with another mill producing mechanical printing papers. However, a trend of moving from unbleached towards high-brightness TMP in COD discharges was valid.
Resumo:
Kirjallisuusarvostelu
Resumo:
En populär idé inom dagens filosofiska och psykologiska forskning om interpersonlig förståelse, är idén att vi använder en kognitiv funktion (eller metod) för att förstå andra människor, en så kallad ”theory of mind” funktion. Denna idé förekommer inom ett brett vetenskapligt fält så som inom evolutionspsykologi, inom teorier om barns utveckling, inom teorier om autism, samt inom emotionsfilosofi och moralfilosofi. Avsikten i denna studie är att se närmare på vissa inflytelserika filosofiska och psykologiska teorier om interpersonlig förståelse, teorier som också har en stark koppling till empirisk forskning. I arbetet hävdar Gustafsson att teorierna ifråga avspeglar vissa klassiska, filosofiskt problematiska, antaganden. Dessa antaganden präglar teorierna ifråga samt påverkar hur de empiriska undersökningarna byggs upp och hur resultat tolkas.
Resumo:
Social enterprises apply the best of business for the pursuit of social or environmental mission while also generating revenues. Globally, nearly 1,3 billion people lack access to electricity, as well as another billion having access to only low quality and infrequent electricity. Off-grid renewable energy, like solar, will increasingly have a key role in the solution of the energy access issue. The pioneer gap in off-grid renewable energy consists of financing (or funding) gaps and capacity gaps, to do with both the early stage of the enterprises in question, as well as the early stage of the whole industry. The gaps are emphasised by specific characteristics of off-grid renewable energy business models and the requirements of operating in bottom-of-the-pyramid markets. The marketing perspective to fundraising is chosen to uncover the possible role enterprises themselves have in bridging the pioneer gap. The purpose of this thesis is to study how social enterprises operating in off-grid renewable energy in Africa utilise marketing activities in their investor relations in bridging the pioneer gap. This main research question is divided into the following sub-questions: How does the pioneer gap affect fundraising for these enterprises? How are the funding needs for these enterprises characterised? How do these enterprises build trust in their investor relations? The theoretic framework is built on relationship marketing and investor relations, with an emphasis on creation of trust. The research is conducted as a thematical case study. Primary data is gathered via semi-structured interviews with six solar energy companies and two accelerators. According to the findings, the main components affecting trust-creation are diminished information asymmetry and perceived risk, mission alignment as well as a personal fit or relationship with the investor. Therefore, an enterprise can utilise e.g. the following marketing activities in their investor relations to bridge the pioneer gap: ensuring investor material, the enterprise story and presenting of them is clear, concise and complete to “package” the enterprise as an investment; taking investor needs and motivations into account as well as utilising existing investors as ambassadors.
Resumo:
The main purpose of the present doctoral thesis is to investigate subjective experiences and cognitive processes in four different types of altered states of consciousness: naturally occurring dreaming, cognitively induced hypnosis, pharmacologically induced sedation, and pathological psychosis. Both empirical and theoretical research is carried out, resulting in four empirical and four theoretical studies. The thesis begins with a review of the main concepts used in consciousness research, the most influential philosophical and neurobiological theories of subjective experience, the classification of altered states of consciousness, and the main empirical methods used to study consciousness alterations. Next, findings of the original studies are discussed, as follows. Phenomenal consciousness is found to be dissociable from responsiveness, as subjective experiences do occur in unresponsive states, including anaesthetic-induced sedation and natural sleep, as demonstrated by post-awakening subjective reports. Two new tools for the content analysis of subjective experiences and dreams are presented, focusing on the diversity, complexity and dynamics of phenomenal consciousness. In addition, a new experimental paradigm of serial awakenings from non-rapid eye movement sleep is introduced, which enables more rapid sampling of dream reports than has been available in previous studies. It is also suggested that lucid dreaming can be studied using transcranial brain stimulation techniques and systematic analysis of pre-lucid dreaming. For blind judges, dreams of psychotic patients appear to be indistinguishable from waking mentation reports collected from the same patients, which indicates a close resemblance of these states of mind. However, despite phenomenological similarities, dreaming should not be treated as a uniform research model of psychotic or intact consciousness. Contrary to this, there seems to be a multiplicity of routes of how different states of consciousness can be associated. For instance, seemingly identical time perception distortions in different alterations of consciousness may have diverse underlying causes for these distortions. It is also shown that altered states do not necessarily exhibit impaired cognitive processing compared to a baseline waking state of consciousness: a case study of time perception in a hypnotic virtuoso indicates a more consistent perceptual timing under hypnosis than in a waking state. The thesis ends with a brief discussion of the most promising new perspectives for the study of alterations of consciousness.
Resumo:
The goal of this study was to find and develop new or improved service concepts for rolls in a paper machine and secondary targets were to find out what the KPIs and values of the concepts are. Two methodologies were utilized in researching this problem; firstly sales personnel were interviewed about customer values and KPIs and a questionnaire about service modules were sent out to four BSI (basic sales item) responsible persons. Throughout the research process differences in geographic regions were identified and several customer KPIs and values were discovered. The interviews showed that the main concern for customers is the cost of operations. The goal is to produce the same or in some cases more tons with smaller operating costs. The questionnaire standardized the data about service modules and made it possible to link these values, KPIs and concerns of customers to Valmet’s service offering. Eventually these service modules were used to create a service concepts that offer flexibility, cost savings, safety and peace of mind for the customers. With this new conceptual approach Valmet can more flexibly answer to customer quotations and modify the offering to better generate customer value and customer satisfaction. In addition a new BSI was defined and proposed for pilot projects.
Resumo:
The vast majority of our contemporary society owns a mobile phone, which has resulted in a dramatic rise in the amount of networked computers in recent years. Security issues in the computers have followed the same trend and nearly everyone is now affected by such issues. How could the situation be improved? For software engineers, an obvious answer is to build computer software with security in mind. A problem with building software with security is how to define secure software or how to measure security. This thesis divides the problem into three research questions. First, how can we measure the security of software? Second, what types of tools are available for measuring security? And finally, what do these tools reveal about the security of software? Measuring tools of these kind are commonly called metrics. This thesis is focused on the perspective of software engineers in the software design phase. Focus on the design phase means that code level semantics or programming language specifics are not discussed in this work. Organizational policy, management issues or software development process are also out of the scope. The first two research problems were studied using a literature review while the third was studied using a case study research. The target of the case study was a Java based email server called Apache James, which had details from its changelog and security issues available and the source code was accessible. The research revealed that there is a consensus in the terminology on software security. Security verification activities are commonly divided into evaluation and assurance. The focus of this work was in assurance, which means to verify one’s own work. There are 34 metrics available for security measurements, of which five are evaluation metrics and 29 are assurance metrics. We found, however, that the general quality of these metrics was not good. Only three metrics in the design category passed the inspection criteria and could be used in the case study. The metrics claim to give quantitative information on the security of the software, but in practice they were limited to evaluating different versions of the same software. Apart from being relative, the metrics were unable to detect security issues or point out problems in the design. Furthermore, interpreting the metrics’ results was difficult. In conclusion, the general state of the software security metrics leaves a lot to be desired. The metrics studied had both theoretical and practical issues, and are not suitable for daily engineering workflows. The metrics studied provided a basis for further research, since they pointed out areas where the security metrics were necessary to improve whether verification of security from the design was desired.