44 resultados para differential protection

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Selostus: Tulokastuholaiset ja kasvinsuojelu : taloudellinen näkökulma

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The nature of client-server architecture implies that some modules are delivered to customers. These publicly distributed commercial software components are under risk, because users (and simultaneously potential malefactors) have physical access to some components of the distributed system. The problem becomes even worse if interpreted programming languages are used for creation of client side modules. The language Java, which was designed to be compiled into platform independent byte-code is not an exception and runs the additional risk. Along with advantages like verifying the code before execution (to ensure that program does not produce some illegal operations)Java has some disadvantages. On a stage of byte-code a java program still contains comments, line numbers and some other instructions, which can be used for reverse-engineering. This Master's thesis focuses on protection of Java code based client-server applications. I present a mixture of methods to protect software from tortious acts. Then I shall realize all the theoretical assumptions in a practice and examine their efficiency in examples of Java code. One of the criteria's to evaluate the system is that my product is used for specialized area of interactive television.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pro-gradu tutkielman tavoitteena on tutkia, miten yritykset tasapainoilevat tiedon jakamisen ja suojaamisen välillä innovaatioyhteistyöprojekteissa, ja miten sopimukset, immateriaalioikeudet ja luottamus voivat vaikuttaa tähän tasapainoon. Yhteistyössä yritysten täytyy jakaa tarpeellista tietoa kumppanilleen, mutta toisaalta niiden täytyy varoa, etteivät ne menetä ydinosaamiseensa kuuluvaa tietoa ja kilpailuetuaan. Yrityksillä on useita keinoja tietovuodon estämiseen. Tutkielmassa keskitytään patenttien, sopimusten ja liikesalaisuuksien käyttöön tietoa suojaavina mekanismeina. Kyseiset suojamekanismit vaikuttavat luottamukseen kumppaneiden välillä, ja täten myös näiden halukkuuteen jakaa tietoa kumppaneilleen. Jos kumppanit eivät jaa tarpeeksi tietoa toisilleen, voi yhteistyö epäonnistua. Sopimusten, immateriaalioikeuksien ja luottamuksen rooleja ja vuorovaikutusta tutkitaan kahdenvälisissä yhteistyöprojekteissa. Tutkielmassa esitellään neljä case-esimerkkiä, jotka on koottu suomalaisen metsätoimialan yrityksen haastatteluista.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The parameter setting of a differential evolution algorithm must meet several requirements: efficiency, effectiveness, and reliability. Problems vary. The solution of a particular problem can be represented in different ways. An algorithm most efficient in dealing with a particular representation may be less efficient in dealing with other representations. The development of differential evolution-based methods contributes substantially to research on evolutionary computing and global optimization in general. The objective of this study is to investigatethe differential evolution algorithm, the intelligent adjustment of its controlparameters, and its application. In the thesis, the differential evolution algorithm is first examined using different parameter settings and test functions. Fuzzy control is then employed to make control parameters adaptive based on an optimization process and expert knowledge. The developed algorithms are applied to training radial basis function networks for function approximation with possible variables including centers, widths, and weights of basis functions and both having control parameters kept fixed and adjusted by fuzzy controller. After the influence of control variables on the performance of the differential evolution algorithm was explored, an adaptive version of the differential evolution algorithm was developed and the differential evolution-based radial basis function network training approaches were proposed. Experimental results showed that the performance of the differential evolution algorithm is sensitive to parameter setting, and the best setting was found to be problem dependent. The fuzzy adaptive differential evolution algorithm releases the user load of parameter setting and performs better than those using all fixedparameters. Differential evolution-based approaches are effective for training Gaussian radial basis function networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tässä luomistyössä on esitetty tutkimus informaation suojaamisen menetelmien osalta paikallisissa ja ryhmäkuntaisissa verkoissa. Tutkimukseen kuuluu nykyaikaisten kryptagraafisten järjestelmien, Internetin/Intranetin ohjelmointikeinojen ja pääsyoikeuksien jakelumenetelmien analyysi. Tutkimusten perusteella on laadittu ohjelmiston prototyyppi HTML-tiedostojen suojaamista varten. Ohjelmiston laatimisprosessi on sisältänyt vaatimusten, järjestelmän ja suojelukomponenttien suunnittelun ja protytyypin testauksen. Ohjelmiston realisoinnin jälkeen kirjoitettiin käyttöohjeet. Ohjelmiston prototyyppi suojaa informaatiota HTML-tiedoston koko käytön aikana ja eri yrityksissä voidaan käyttää sitä pienien laajennuksien jälkeen.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Breast cancer is the most common cancer in women, and its development is intimately related to hormonal factors, but how hormones affect breast physiology and tumorigenesis is not sufficiently known. Pregnancy elicits long-term protection from breast cancer, but during the first ten years after pregnancy, breast cancer risk is increased. In previous studies, there has been conflicting data on the role of human chorionic gonadotropin (HCG) and the functionality of its receptor in extragonadal tissues. The aim of this study was to elucidate the role of chronically elevated HCG in mouse physiology. We have created a transgenic (TG) mouse model that overexpresses HCG. HCG is similar to lutenizing hormone (LH), but is secreted almost solely by the placenta during pregnancy. HCG and LH both bind to the LH receptor (LHR). In the current study, mammary gland tumors were observed in HCG TG mice. We elucidated the role of HCG in mammary gland signalling and the effects of LHR mediated signalling in mouse mammary gland gene expression. We also studied the effects of HCG in human breast epithelial cell cultures. Several endocrine disturbances were observed in HCGβ TG female mice, resulting in precocious puberty, infertility, obesity and pituitary and mammary gland tumors. The histology of the mammary gland tumors of HCGβ TG females resembled those observed in mouse models with activated Wnt/β-catenin signalling pathway. Wnts are involved in stem cell regulation and tumorigenesis, and are hormonally regulated in the mammary gland. We observed activated β-catenin signalling and elevated expression of Wnt5b and Wnt7b in TG tumors and mammary glands. Furthermore, we discovered that HCG directly regulates the expression of Wnt5b and Wnt7b in the mouse mammary gland. Pharmacological treatment with HCG also caused upregulation of several Wnt-pathway target genes in ovariectomized wild type (WT) mice in the presence of physiological concentrations of estradiol and progesterone. In addition, differential expression of several metabolic genes was observed, suggesting that HCG affects adipocyte function or glucose metabolism. When WT mice were transplanted with LHR deficient or wild type WT mammary epithelium, differential expression of several genes affecting the Wnt-signalling pathway was observed in microarray analysis. Diminished expression of several genes associated with LHR function in other tissues, such as the ovary, was observed in mammary glands deficient of epithelial LHR. In cultured human mammary epithelial cells HCG upregulated the expression of WNT5B, WNT7B similar to mouse, suggesting that the observations found are relevant in human physiology. These studies suggest that HCG/LHR signalling affects gene expression in non-gonadal tissues, and that Wnt-signalling is regulated by HCG/LH in human and mouse mammary glands.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work describes different possibilities of protection and control system improvement of primary distribution substation. The status of condition and main problems of power networks from reliability point of view in Russia are described. This work studies technologies used today in Russia for protection of distribution networks with their disadvantages. Majority of medium voltage networks (6-35 kV) has isolated network point. There is still no any protection available on the market which allows to estimate distance to fault in case of earth fault. The thesis analyses methods of earth fault distance calculation. On the basis of computer simulation the influence of various factors on calculation accuracy is studied. The practical implementation of the method presupposes usage of digital relay. Application of digital relay is accompanied by numerous opportunities which are described in this work. Also advantages of system implemented on the basis of IEC 61850 standard are examined. Finally, suitability of modern digital relays from GOST standard point of view is analyzed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Power transformer is the most expensive equipment on a substation. It is always necessary to get needed benefit with the lowest expenses. Producing of power transformers with reduced insulation strength is one of the possible ways to reduce expenses. Exploitation of such transformers was begun in the end of 70-th in the last century. Protection from overvoltages was done with valve-type magnetic combined surge arresters with increased blanking voltage during switching overvoltages. Nowadays there is the necessity of replacement of those devices. That’s why modernized nonlinear surge arrester was invented. This master’s thesis is focused on the use research of that modernized device in comparison with usual nonlinear surge arresters. The goal is to show the lightning overvoltages level using different types of nonlinear surge arresters and then calculations of the lightning protection reliability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cells are constantly responding to signals from the surrounding tissues and the environment. To dispose of infected and potentially dangerous cells, to ensure the optimal execution of developmental processes and to maintain tissue homeostasis, a multicellular organism needs to tightly control both the number and the quality of its cells. Apoptosis is a form of active cellular self-destruction that enables an organism to regulate its cell number by deleting damaged or potentially dangerous cells. Apoptosis can be induced by death ligands, which bind to death receptors on the cell surface. Ligation of the receptors leads to the formation of an intracellular death inducing signaling complex (DISC). One of the DISC components is caspase-8, a protease that triggers the caspase cascade and is thereby a key initiator of programmed cell death. The activation of caspase-8 is controlled by the cellular FLICE-inhibitory proteins (c-FLIPs). Consequently, sensitivity towards receptor-mediated apoptosis is determined by the amount of c-FLIP, and the c-FLIP levels are actively regulated for example during erythroid differentiation of K562 erythroleukemia cells and by hyperthermia in Jurkat leukemia cells. The aim of my thesis was to investigate how c-FLIP is regulated during these processes. We found that c-FLIP isoforms are short-lived proteins, although c-FLIPS had an even shorter half-life than c-FLIPL. In both experimental models, increased death receptor sensitivity correlated with induced ubiquitylation and consequent proteasomal degradation of c-FLIP. Furthermore, we elucidated how phosphorylation regulates the biological functions and the turnover of c-FLIP, thereby contributing to death receptor sensitivity. We mapped the first phosphorylation sites on c-FLIP and dissected how their phosphorylation affects c-FLIP. Moreover, we demonstrated that phosphorylation of serine 193, a phosphorylated residue common to all c-FLIPs, is primarily mediated by the classical PKC. Furthermore, we discovered a novel connection between the phosphorylation and ubiquitylation of c-FLIP: phosphorylation of S193 protects c-FLIP from ubiquitylation. Surprisingly, although all c-FLIP isoforms are phosphorylated on this conserved residue, the biological outcome is different for the long and short isoforms, since S193 specifically prolongs the half-lives of the short c-FLIP isoforms, but not c-FLIPL. To summarize, we show that c-FLIP proteins are modified by ubiquitylation and phosphorylation, and that the biological outcomes of these modifications are isoform-specifically determined.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Metaheuristic methods have become increasingly popular approaches in solving global optimization problems. From a practical viewpoint, it is often desirable to perform multimodal optimization which, enables the search of more than one optimal solution to the task at hand. Population-based metaheuristic methods offer a natural basis for multimodal optimization. The topic has received increasing interest especially in the evolutionary computation community. Several niching approaches have been suggested to allow multimodal optimization using evolutionary algorithms. Most global optimization approaches, including metaheuristics, contain global and local search phases. The requirement to locate several optima sets additional requirements for the design of algorithms to be effective in both respects in the context of multimodal optimization. In this thesis, several different multimodal optimization algorithms are studied in regard to how their implementation in the global and local search phases affect their performance in different problems. The study concentrates especially on variations of the Differential Evolution algorithm and their capabilities in multimodal optimization. To separate the global and local search search phases, three multimodal optimization algorithms are proposed, two of which hybridize the Differential Evolution with a local search method. As the theoretical background behind the operation of metaheuristics is not generally thoroughly understood, the research relies heavily on experimental studies in finding out the properties of different approaches. To achieve reliable experimental information, the experimental environment must be carefully chosen to contain appropriate and adequately varying problems. The available selection of multimodal test problems is, however, rather limited, and no general framework exists. As a part of this thesis, such a framework for generating tunable test functions for evaluating different methods of multimodal optimization experimentally is provided and used for testing the algorithms. The results demonstrate that an efficient local phase is essential for creating efficient multimodal optimization algorithms. Adding a suitable global phase has the potential to boost the performance significantly, but the weak local phase may invalidate the advantages gained from the global phase.