19 resultados para Cooperation between Libraries
em AMS Tesi di Dottorato - Alm@DL - Università di Bologna
Resumo:
The Peer-to-Peer network paradigm is drawing the attention of both final users and researchers for its features. P2P networks shift from the classic client-server approach to a high level of decentralization where there is no central control and all the nodes should be able not only to require services, but to provide them to other peers as well. While on one hand such high level of decentralization might lead to interesting properties like scalability and fault tolerance, on the other hand it implies many new problems to deal with. A key feature of many P2P systems is openness, meaning that everybody is potentially able to join a network with no need for subscription or payment systems. The combination of openness and lack of central control makes it feasible for a user to free-ride, that is to increase its own benefit by using services without allocating resources to satisfy other peers’ requests. One of the main goals when designing a P2P system is therefore to achieve cooperation between users. Given the nature of P2P systems based on simple local interactions of many peers having partial knowledge of the whole system, an interesting way to achieve desired properties on a system scale might consist in obtaining them as emergent properties of the many interactions occurring at local node level. Two methods are typically used to face the problem of cooperation in P2P networks: 1) engineering emergent properties when designing the protocol; 2) study the system as a game and apply Game Theory techniques, especially to find Nash Equilibria in the game and to reach them making the system stable against possible deviant behaviors. In this work we present an evolutionary framework to enforce cooperative behaviour in P2P networks that is alternative to both the methods mentioned above. Our approach is based on an evolutionary algorithm inspired by computational sociology and evolutionary game theory, consisting in having each peer periodically trying to copy another peer which is performing better. The proposed algorithms, called SLAC and SLACER, draw inspiration from tag systems originated in computational sociology, the main idea behind the algorithm consists in having low performance nodes copying high performance ones. The algorithm is run locally by every node and leads to an evolution of the network both from the topology and from the nodes’ strategy point of view. Initial tests with a simple Prisoners’ Dilemma application show how SLAC is able to bring the network to a state of high cooperation independently from the initial network conditions. Interesting results are obtained when studying the effect of cheating nodes on SLAC algorithm. In fact in some cases selfish nodes rationally exploiting the system for their own benefit can actually improve system performance from the cooperation formation point of view. The final step is to apply our results to more realistic scenarios. We put our efforts in studying and improving the BitTorrent protocol. BitTorrent was chosen not only for its popularity but because it has many points in common with SLAC and SLACER algorithms, ranging from the game theoretical inspiration (tit-for-tat-like mechanism) to the swarms topology. We discovered fairness, meant as ratio between uploaded and downloaded data, to be a weakness of the original BitTorrent protocol and we drew inspiration from the knowledge of cooperation formation and maintenance mechanism derived from the development and analysis of SLAC and SLACER, to improve fairness and tackle freeriding and cheating in BitTorrent. We produced an extension of BitTorrent called BitFair that has been evaluated through simulation and has shown the abilities of enforcing fairness and tackling free-riding and cheating nodes.
Resumo:
The biological complexity of NGF action is achieved by binding two distinct Neurotrophin receptors, TrkA and p75NTR. While several reports have provided lines of evidence on the interaction between TrkA and p75NTR at the plasma membrane, much fewer data are available on the consequence of such an interaction in terms of intracellular signaling. In this study, we have focused on how p75NTR may affect TrkA downstream signaling with respect to neuronal differentiation. Here, we have shown that cooperation between p75NTR and TrkA results in an increased NGF-mediated TrkA autophosphorylation, leads to a sustained activation of ERK1/2 and accelerates neurite outgrowth. Interestingly, neurite outgrowth is concomitant with a selective enhancement of the AP-1 activity and the transcriptional activation of genes such as GAP-43 and p21(CIP/WAF), known to be involved in the differentiation process. Collectively, our results unveil a functional link between the specific expression profile of neurotrophin receptors in neuronal cells and the NGF-mediated regulation of the differentiation process possibly through a persistent ERKs activation and the selective control of the AP-1 activity. In our studies we discuss the functional role of the neurotrophin receptor p75NTR and TrkA in a ligand-dependent signal transduction. It is known that p75NTR is also involved in the mediation of cell death ligand dependent. Here we show for the first time that the membrane receptor p75NTR, upon binding to b- Amyloid (Ab) peptide, is able to transduce a cytotoxic signal through a mechanism very similar to the one adopted by Tumor Necrosis Factor Receptor 1 (TNFR1), when activated by TNFa. We define that in neuroblastoma cell line Ab cytotoxicity signals through a pathway depending on p75NTR death domain (DD), mostly through some specific conserved residues. We identified that TRADD is the first interactor recruiting to the membrane and activates JNK and NF-kB transcription factors. Since Ab is defined as the most important aetiologic element associated with the Alzheimer’s Disease (AD), characterization of the mechanism involved in the mediation of the neurodegeneration can suggest also new therapeutic approaches.
Resumo:
Unlike traditional wireless networks, characterized by the presence of last-mile, static and reliable infrastructures, Mobile ad Hoc Networks (MANETs) are dynamically formed by collections of mobile and static terminals that exchange data by enabling each other's communication. Supporting multi-hop communication in a MANET is a challenging research area because it requires cooperation between different protocol layers (MAC, routing, transport). In particular, MAC and routing protocols could be considered mutually cooperative protocol layers. When a route is established, the exposed and hidden terminal problems at MAC layer may decrease the end-to-end performance proportionally with the length of each route. Conversely, the contention at MAC layer may cause a routing protocol to respond by initiating new routes queries and routing table updates. Multi-hop communication may also benefit the presence of pseudo-centralized virtual infrastructures obtained by grouping nodes into clusters. Clustering structures may facilitate the spatial reuse of resources by increasing the system capacity: at the same time, the clustering hierarchy may be used to coordinate transmissions events inside the network and to support intra-cluster routing schemes. Again, MAC and clustering protocols could be considered mutually cooperative protocol layers: the clustering scheme could support MAC layer coordination among nodes, by shifting the distributed MAC paradigm towards a pseudo-centralized MAC paradigm. On the other hand, the system benefits of the clustering scheme could be emphasized by the pseudo-centralized MAC layer with the support for differentiated access priorities and controlled contention. In this thesis, we propose cross-layer solutions involving joint design of MAC, clustering and routing protocols in MANETs. As main contribution, we study and analyze the integration of MAC and clustering schemes to support multi-hop communication in large-scale ad hoc networks. A novel clustering protocol, named Availability Clustering (AC), is defined under general nodes' heterogeneity assumptions in terms of connectivity, available energy and relative mobility. On this basis, we design and analyze a distributed and adaptive MAC protocol, named Differentiated Distributed Coordination Function (DDCF), whose focus is to implement adaptive access differentiation based on the node roles, which have been assigned by the upper-layer's clustering scheme. We extensively simulate the proposed clustering scheme by showing its effectiveness in dominating the network dynamics, under some stressing mobility models and different mobility rates. Based on these results, we propose a possible application of the cross-layer MAC+Clustering scheme to support the fast propagation of alert messages in a vehicular environment. At the same time, we investigate the integration of MAC and routing protocols in large scale multi-hop ad-hoc networks. A novel multipath routing scheme is proposed, by extending the AOMDV protocol with a novel load-balancing approach to concurrently distribute the traffic among the multiple paths. We also study the composition effect of a IEEE 802.11-based enhanced MAC forwarding mechanism called Fast Forward (FF), used to reduce the effects of self-contention among frames at the MAC layer. The protocol framework is modelled and extensively simulated for a large set of metrics and scenarios. For both the schemes, the simulation results reveal the benefits of the cross-layer MAC+routing and MAC+clustering approaches over single-layer solutions.
Resumo:
Salt deposits characterize the subsurface of Tuzla (BiH) and made it famous since the ancient times. Archeological discoveries demonstrate the presence of a Neolithic pile-dwelling settlement related to the existence of saltwater springs that contributed to make the most of the area a swampy ground. Since the Roman times, the town is reported as “the City of Salt deposits and Springs”; "tuz" is the Turkish word for salt, as the Ottomans renamed the settlement in the 15th century following their conquest of the medieval Bosnia (Donia and Fine, 1994). Natural brine springs were located everywhere and salt has been evaporated by means of hot charcoals since pre-Roman times. The ancient use of salt was just a small exploitation compared to the massive salt production carried out during the 20th century by means of classical mine methodologies and especially wild brine pumping. In the past salt extraction was practised tapping natural brine springs, while the modern technique consists in about 100 boreholes with pumps tapped to the natural underground brine runs, at an average depth of 400-500 m. The mining operation changed the hydrogeological conditions enabling the downward flow of fresh water causing additional salt dissolution. This process induced severe ground subsidence during the last 60 years reaching up to 10 meters of sinking in the most affected area. Stress and strain of the overlying rocks induced the formation of numerous fractures over a conspicuous area (3 Km2). Consequently serious damages occurred to buildings and infrastructures such as water supply system, sewage networks and power lines. Downtown urban life was compromised by the destruction of more than 2000 buildings that collapsed or needed to be demolished causing the resettlement of about 15000 inhabitants (Tatić, 1979). Recently salt extraction activities have been strongly reduced, but the underground water system is returning to his natural conditions, threatening the flooding of the most collapsed area. During the last 60 years local government developed a monitoring system of the phenomenon, collecting several data about geodetic measurements, amount of brine pumped, piezometry, lithostratigraphy, extension of the salt body and geotechnical parameters. A database was created within a scientific cooperation between the municipality of Tuzla and the city of Rotterdam (D.O.O. Mining Institute Tuzla, 2000). The scientific investigation presented in this dissertation has been financially supported by a cooperation project between the Municipality of Tuzla, The University of Bologna (CIRSA) and the Province of Ravenna. The University of Tuzla (RGGF) gave an important scientific support in particular about the geological and hydrogeological features. Subsidence damage resulting from evaporite dissolution generates substantial losses throughout the world, but the causes are only well understood in a few areas (Gutierrez et al., 2008). The subject of this study is the collapsing phenomenon occurring in Tuzla area with the aim to identify and quantify the several factors involved in the system and their correlations. Tuzla subsidence phenomenon can be defined as geohazard, which represents the consequence of an adverse combination of geological processes and ground conditions precipitated by human activity with the potential to cause harm (Rosenbaum and Culshaw, 2003). Where an hazard induces a risk to a vulnerable element, a risk management process is required. The single factors involved in the subsidence of Tuzla can be considered as hazards. The final objective of this dissertation represents a preliminary risk assessment procedure and guidelines, developed in order to quantify the buildings vulnerability in relation to the overall geohazard that affect the town. The historical available database, never fully processed, have been analyzed by means of geographic information systems and mathematical interpolators (PART I). Modern geomatic applications have been implemented to deeply investigate the most relevant hazards (PART II). In order to monitor and quantify the actual subsidence rates, geodetic GPS technologies have been implemented and 4 survey campaigns have been carried out once a year. Subsidence related fractures system has been identified by means of field surveys and mathematical interpretations of the sinking surface, called curvature analysis. The comparison of mapped and predicted fractures leaded to a better comprehension of the problem. Results confirmed the reliability of fractures identification using curvature analysis applied to sinking data instead of topographic or seismic data. Urban changes evolution has been reconstructed analyzing topographic maps and satellite imageries, identifying the most damaged areas. This part of the investigation was very important for the quantification of buildings vulnerability.
Resumo:
The term Ambient Intelligence (AmI) refers to a vision on the future of the information society where smart, electronic environment are sensitive and responsive to the presence of people and their activities (Context awareness). In an ambient intelligence world, devices work in concert to support people in carrying out their everyday life activities, tasks and rituals in an easy, natural way using information and intelligence that is hidden in the network connecting these devices. This promotes the creation of pervasive environments improving the quality of life of the occupants and enhancing the human experience. AmI stems from the convergence of three key technologies: ubiquitous computing, ubiquitous communication and natural interfaces. Ambient intelligent systems are heterogeneous and require an excellent cooperation between several hardware/software technologies and disciplines, including signal processing, networking and protocols, embedded systems, information management, and distributed algorithms. Since a large amount of fixed and mobile sensors embedded is deployed into the environment, the Wireless Sensor Networks is one of the most relevant enabling technologies for AmI. WSN are complex systems made up of a number of sensor nodes which can be deployed in a target area to sense physical phenomena and communicate with other nodes and base stations. These simple devices typically embed a low power computational unit (microcontrollers, FPGAs etc.), a wireless communication unit, one or more sensors and a some form of energy supply (either batteries or energy scavenger modules). WNS promises of revolutionizing the interactions between the real physical worlds and human beings. Low-cost, low-computational power, low energy consumption and small size are characteristics that must be taken into consideration when designing and dealing with WSNs. To fully exploit the potential of distributed sensing approaches, a set of challengesmust be addressed. Sensor nodes are inherently resource-constrained systems with very low power consumption and small size requirements which enables than to reduce the interference on the physical phenomena sensed and to allow easy and low-cost deployment. They have limited processing speed,storage capacity and communication bandwidth that must be efficiently used to increase the degree of local ”understanding” of the observed phenomena. A particular case of sensor nodes are video sensors. This topic holds strong interest for a wide range of contexts such as military, security, robotics and most recently consumer applications. Vision sensors are extremely effective for medium to long-range sensing because vision provides rich information to human operators. However, image sensors generate a huge amount of data, whichmust be heavily processed before it is transmitted due to the scarce bandwidth capability of radio interfaces. In particular, in video-surveillance, it has been shown that source-side compression is mandatory due to limited bandwidth and delay constraints. Moreover, there is an ample opportunity for performing higher-level processing functions, such as object recognition that has the potential to drastically reduce the required bandwidth (e.g. by transmitting compressed images only when something ‘interesting‘ is detected). The energy cost of image processing must however be carefully minimized. Imaging could play and plays an important role in sensing devices for ambient intelligence. Computer vision can for instance be used for recognising persons and objects and recognising behaviour such as illness and rioting. Having a wireless camera as a camera mote opens the way for distributed scene analysis. More eyes see more than one and a camera system that can observe a scene from multiple directions would be able to overcome occlusion problems and could describe objects in their true 3D appearance. In real-time, these approaches are a recently opened field of research. In this thesis we pay attention to the realities of hardware/software technologies and the design needed to realize systems for distributed monitoring, attempting to propose solutions on open issues and filling the gap between AmI scenarios and hardware reality. The physical implementation of an individual wireless node is constrained by three important metrics which are outlined below. Despite that the design of the sensor network and its sensor nodes is strictly application dependent, a number of constraints should almost always be considered. Among them: • Small form factor to reduce nodes intrusiveness. • Low power consumption to reduce battery size and to extend nodes lifetime. • Low cost for a widespread diffusion. These limitations typically result in the adoption of low power, low cost devices such as low powermicrocontrollers with few kilobytes of RAMand tenth of kilobytes of program memory with whomonly simple data processing algorithms can be implemented. However the overall computational power of the WNS can be very large since the network presents a high degree of parallelism that can be exploited through the adoption of ad-hoc techniques. Furthermore through the fusion of information from the dense mesh of sensors even complex phenomena can be monitored. In this dissertation we present our results in building several AmI applications suitable for a WSN implementation. The work can be divided into two main areas:Low Power Video Sensor Node and Video Processing Alghoritm and Multimodal Surveillance . Low Power Video Sensor Nodes and Video Processing Alghoritms In comparison to scalar sensors, such as temperature, pressure, humidity, velocity, and acceleration sensors, vision sensors generate much higher bandwidth data due to the two-dimensional nature of their pixel array. We have tackled all the constraints listed above and have proposed solutions to overcome the current WSNlimits for Video sensor node. We have designed and developed wireless video sensor nodes focusing on the small size and the flexibility of reuse in different applications. The video nodes target a different design point: the portability (on-board power supply, wireless communication), a scanty power budget (500mW),while still providing a prominent level of intelligence, namely sophisticated classification algorithmand high level of reconfigurability. We developed two different video sensor node: The device architecture of the first one is based on a low-cost low-power FPGA+microcontroller system-on-chip. The second one is based on ARM9 processor. Both systems designed within the above mentioned power envelope could operate in a continuous fashion with Li-Polymer battery pack and solar panel. Novel low power low cost video sensor nodes which, in contrast to sensors that just watch the world, are capable of comprehending the perceived information in order to interpret it locally, are presented. Featuring such intelligence, these nodes would be able to cope with such tasks as recognition of unattended bags in airports, persons carrying potentially dangerous objects, etc.,which normally require a human operator. Vision algorithms for object detection, acquisition like human detection with Support Vector Machine (SVM) classification and abandoned/removed object detection are implemented, described and illustrated on real world data. Multimodal surveillance: In several setup the use of wired video cameras may not be possible. For this reason building an energy efficient wireless vision network for monitoring and surveillance is one of the major efforts in the sensor network community. Energy efficiency for wireless smart camera networks is one of the major efforts in distributed monitoring and surveillance community. For this reason, building an energy efficient wireless vision network for monitoring and surveillance is one of the major efforts in the sensor network community. The Pyroelectric Infra-Red (PIR) sensors have been used to extend the lifetime of a solar-powered video sensor node by providing an energy level dependent trigger to the video camera and the wireless module. Such approach has shown to be able to extend node lifetime and possibly result in continuous operation of the node.Being low-cost, passive (thus low-power) and presenting a limited form factor, PIR sensors are well suited for WSN applications. Moreover techniques to have aggressive power management policies are essential for achieving long-termoperating on standalone distributed cameras needed to improve the power consumption. We have used an adaptive controller like Model Predictive Control (MPC) to help the system to improve the performances outperforming naive power management policies.
Resumo:
Neoplastic overgrowth depends on the cooperation of several mutations ultimately leading to major rearrangements in cellular behaviour. The molecular crosstalk occurring between precancerous and normal cells strongly influences the early steps of the tumourigenic process as well as later stages of the disease. Precancerous cells are often removed by cell death from normal tissues but the mechanisms responsible for such fundamental safeguard processes remain in part elusive. To gain insight into these phenomena I took advantage of the clonal analysis methods available in Drosophila for studying the phenotypes due to loss of function of the neoplastic tumour suppressor lethal giant larvae (lgl). I found that lgl mutant cells growing in wild-type imaginal wing discs are subject to the phenomenon of cell competition and are eliminated by JNK-dependent cell death because they express very low levels of dMyc oncoprotein compared to those in the surrounding tissue. Indeed, in non-competitive backgrounds lgl mutant clones are able to overgrow and upregulate dMyc, overwhelming the neighbouring tissue and forming tumourous masses that display several cancer hallmarks. These phenotypes are completely abolished by reducing dMyc abundance within mutant cells while increasing it in lgl clones growing in a competitive context re-establishes their tumourigenic potential. Similarly, the neoplastic growth observed upon the oncogenic cooperation between lgl mutation and activated Ras/Raf/MAPK signalling was found to be characterised by and dependent on the ability of cancerous cells to upregulate dMyc with respect to the adjacent normal tissue, through both transcriptional and post-transcriptional mechanisms, thereby confirming its key role in lgl-induced tumourigenesis. These results provide first evidence that the dMyc oncoprotein is required in lgl mutant tissue to promote invasive overgrowth in developing and adult epithelial tissues and that dMyc abundance inside versus outside lgl mutant clones plays a key role in driving neoplastic overgrowth.
Resumo:
L’elaborato ha ad oggetto l’analisi delle possibili forme di collaborazione tra vettori nei diversi settori del trasporto, con particolare attenzione all’ambito aeronautico e marittimo. Negli ultimi decenni l’incremento del livello di concorrenza tra i competitors su scala planetaria, a seguito della progressiva liberalizzazione e globalizzazione dei trasporti, ha indotto i vettori ad adottare nuove strategie commerciali dirette alla condivisione del rischio, alla riduzione dei costi di esercizio, all’espansione delle proprie reti e alla flessibilizzazione dei processi interni di adeguamento alle continue espansioni e contrazioni del mercato. Hanno, così, fatto la loro comparsa modelli contrattuali nuovi che differiscono per struttura, livello di integrazione delle parti coinvolte e grado di complessità dell’accordo. Nell’elaborato, pertanto, sono state attentamente esaminate le molteplici figure giuridiche generate dalla prassi commerciale, come gli accordi di codesharing, interlining, wet lease, dry lease, franchising, le grandi alleanze strategiche presenti sia in ambito aeronautico, sia in quello marittimo, le Conferences e i Consorzi. La ricerca, in particolare, è focalizzata, alla luce della prassi contrattuale e della normativa nazionale, comunitaria ed internazionale vigente, sui problemi di qualificazione giuridica di tali accordi e, conseguentemente, sulla disciplina di volta in volta ad essi applicabile, sul loro oggetto, regolamento contrattuale e contenuto. Si è proceduto poi ad uno studio comparativo-contrastivo delle differenze tra le varie forme di partnership e all’approfondimento delle questioni concernenti la tutela degli utenti dei servizi di trasporto, siano essi passeggeri o mittenti. Sono affrontati, infatti, con accurata indagine i profili di responsabilità dei vettori coinvolti, sulla base del quadro normativo di riferimento. Nel corso della ricerca si è data anche particolare attenzione all’analisi della compatibilità degli accordi tra vettori con la disciplina comunitaria della concorrenza, registrando una tendenza della Comunità a piegare l’interpretazione delle norme in materia alle superiori esigenze dell’economia, in considerazione delle peculiarità del mercato del trasporto.
Resumo:
La ricerca analizza la forma di Stato e di Governo e si focalizza nel ruolo importante del Capo dello Stato in funzione alla separazione dei poteri e consolidamento della democrazia in una Repubblica Parlamentare. Questa ricerca comparativa analizza l’evoluzione della forma di governo in Italia e Albania. La ricerca analizza nei dettagli l’evoluzione della forma di Governo, focalizzandosi all’istituzione del Capo dello Stato in Albania dall’indipendenza (1912), evidenziando il ruolo dell’Italia in quest’evoluzione. In maniera comparativa si analizza l’evoluzione dell’istituzione del Capo dello Stato in Italia fin dalla sua unita e gli altri sviluppi i quali servirono come modello per l’Albania, evidenziano l’influenza a livello internazionale che ebbe l’Italia per l’indipendenza dell’Albania, che portò al consolidamento dei loro rapporti. Questa ricerca analizza la collaborazione di questi due Stati la quale culmino con la loro Unione Personale identificandosi nello stesso Capo di Stato. La ricerca inoltre evidenzia che come questa fase sia stata superata dalla II Guerra Mondiale e la Guerra Fredda che vide questi Stati a sviluppare diverse forme di Governo. Per di più la ricerca evidenzia la trasformazione politico-istituzionale e il processo di cambiamento dell’Albania dopo la caduta del muro di Berlino che segno la fine del sistema comunista, che vide l’Albania ad adottare il modello Italiano per il Capo dello Stato.
Resumo:
L’oggetto del lavoro si concentra sull’analisi in chiave giuridica del modello di cooperazione in rete tra le autorità nazionali degli Stati membri nel quadro dello Spazio LSG, allo scopo di valutarne il contributo, le prospettive e il potenziale. La trattazione si suddivide in due parti, precedute da una breve premessa teorica incentrata sull’analisi della nozione di rete e la sua valenza giuridica. La prima parte ricostruisce il percorso di maturazione della cooperazione in rete, dando risalto tanto ai fattori di ordine congiunturale quanto ai fattori giuridici e d’ordine strutturale che sono alla base del processo di retificazione dei settori giustizia e sicurezza. In particolare, vengono elaborati taluni rilievi critici, concernenti l’operatività degli strumenti giuridici che attuano il principio di mutuo riconoscimento e di quelli che danno applicazione al principio di disponibilità delle informazioni. Ciò allo scopo di evidenziare gli ostacoli che, di frequente, impediscono il buon esito delle procedure di cooperazione e di comprendere le potenzialità e le criticità derivanti dall’utilizzo della rete rispetto alla concreta applicazione di tali procedure. La seconda parte si focalizza sull’analisi delle principali reti attive in materia di giustizia e sicurezza, con particolare attenzione ai rispettivi meccanismi di funzionamento. La trattazione si suddivide in due distinte sezioni che si concentrano sulle a) reti che operano a supporto dell’applicazione delle procedure di assistenza giudiziaria e degli strumenti di mutuo riconoscimento e sulle b) reti che operano nel settore della cooperazione informativa e agevolano lo scambio di informazioni operative e tecniche nelle azioni di prevenzione e lotta alla criminalità - specialmente nel settore della protezione dell’economia lecita. La trattazione si conclude con la ricostruzione delle caratteristiche di un modello di rete europea e del ruolo che questo esercita rispetto all’esercizio delle competenze dell’Unione Europea in materia di giustizia e sicurezza.
Resumo:
This research was designed to answer the question of which direction the restructuring of financial regulators should take – consolidation or fragmentation. This research began by examining the need for financial regulation and its related costs. It then continued to describe what types of regulatory structures exist in the world; surveying the regulatory structures in 15 jurisdictions, comparing them and discussing their strengths and weaknesses. This research analyzed the possible regulatory structures using three methodological tools: Game-Theory, Institutional-Design, and Network-Effects. The incentives for regulatory action were examined in Chapter Four using game theory concepts. This chapter predicted how two regulators with overlapping supervisory mandates will behave in two different states of the world (where they can stand to benefit from regulating and where they stand to lose). The insights derived from the games described in this chapter were then used to analyze the different supervisory models that exist in the world. The problem of information-flow was discussed in Chapter Five using tools from institutional design. The idea is based on the need for the right kind of information to reach the hands of the decision maker in the shortest time possible in order to predict, mitigate or stop a financial crisis from occurring. Network effects and congestion in the context of financial regulation were discussed in Chapter Six which applied the literature referring to network effects in general in an attempt to conclude whether consolidating financial regulatory standards on a global level might also yield other positive network effects. Returning to the main research question, this research concluded that in general the fragmented model should be preferable to the consolidated model in most cases as it allows for greater diversity and information-flow. However, in cases in which close cooperation between two authorities is essential, the consolidated model should be used.
Resumo:
Despite extensive research and introduction of innovative therapy, lung cancer prognosis remains poor, with a five years survival of only 17%. The success of pharmacological treatment is often impaired by drug resistance. Thus, the characterization of response mechanisms to anti-cancer compounds and of the molecular mechanisms supporting lung cancer aggressiveness are crucial for patient’s management. In the first part of this thesis, we characterized the molecular mechanism behind resistance of lung cancer cells to the Inhibitors of the Bromodomain and Extraterminal domain containing Proteins (BETi). Through a CRISPR/Cas9 screening we identified three Hippo Pathway members, LATS2, TAOK1 and NF2 as genes implicated in susceptibility to BETi. These genes confer sensitivity to BETi inhibiting TAZ activity. Conversely, TAZ overexpression increases resistance to BETi. We also displayed that BETi downregulate both YAP, TAZ and TEADs expression in several cancer cell lines, implying a novel BETi-dependent cytotoxic mechanism. In the second part of this work, we attempted to characterize the crosstalk between the TAZ gene and its cognate antisense long-non coding RNA (lncRNA) TAZ-AS202 in lung tumorigenesis. As for TAZ downregulation, TAZ-AS202 silencing impairs NSCLC cells proliferation, migration and invasion, suggesting a pro-tumorigenic function for this lncRNA during lung tumorigenesis. TAZ-AS202 regulates TAZ target genes without altering TAZ expression or localization. This finding implies an uncovered functional cooperation between TAZ and TAZ-AS202. Moreover, we found that the EPH-ephrin signaling receptor EPHB2 is a downstream effector affected by both TAZ and TAZ-AS202 silencing. EPHB2 downregulation significantly attenuates cells proliferation, migration and invasion, suggesting that, at least in part, TAZ-AS202 and TAZ pro-oncogenic activity depends on EPH-ephrin signaling final deregulation. Finally, we started to dissect the mechanism underlying the TAZ-AS202 regulatory activity on EPHB2 in lung cancer, which may involve the existence of an intermediate transcription factor and is the object of our ongoing research.
Resumo:
This dissertation addresses the timely questions of transitional justice (TJ) in the aftermath of revolutions against autocratic regimes, dealing with TJ as a constitutional arrangement through the lenses of constitutional economics. After an introductory chapter, chapter 2 deals with why nations rarely adopt meaningful TJ processes in the first place, it then explains the limitations of civil society as the arbiter, facilitator, and enforcer of TJ policies. Chapter 3 tackles the question of which mechanisms to choose? It uses the UN Guidelines on TJ that sets five principal TJ mechanisms. It provides a cost-benefit analysis (CBA) of each mechanism and suggests policy implications accordingly. The CBA inspires chapter 4 analysis, suggesting a tradeoff between restrictive fair trial standards under constitutional laws and justice considerations. The tradeoff explains the suggested efficiency of the balanced TJ approaches that combine trials and amnesties. This approach is used for the case study analysis of TJ in Tunisia after the 2011 revolution in chapter 5. The chapter presents the first index of TJ mechanisms in Tunisia through novel data collected by the author. It shows an ultimate TJ design that ended with a modest harvest in the application. The lack of cooperation between the Tunisian parties, added to the absence of transparency in many TJ measures, threatens any possible positive outcomes of the partial TJ process. It is also alarming regarding constitutional compliance in a system that – until recently - was considered the only democracy in the Arab region. Chapter 6 is a summary
Resumo:
This thesis describes the development of the Sample Fetch Rover (SFR), studied for Mars Sample Return (MSR), an international campaign carried out in cooperation between the National Aeronautics and Space Administration (NASA) and the European Space Agency (ESA). The focus of this document is the design of the electro-mechanical systems of the rover. After placing this work into the general context of robotic planetary exploration and summarising the state of the art for what concerns Mars rovers, the architecture of the Mars Sample Return Campaign is presented. A complete overview of the current SFR architecture is provided, touching upon all the main subsystems of the spacecraft. For each area, it is discussed what are the design drivers, the chosen solutions and whether they use heritage technology (in particular from the ExoMars Rover) or new developments. This research focuses on two topics of particular interest, due to their relevance for the mission and the novelty of their design: locomotion and sample acquisition, which are discussed in depth. The early SFR locomotion concepts are summarised, covering the initial trade-offs and discarded designs for higher traverse performance. Once a consolidated architecture was reached, the locomotion subsystem was developed further, defining the details of the suspension, actuators, deployment mechanisms and wheels. This technology is presented here in detail, including some key analysis and test results that support the design and demonstrate how it responds to the mission requirements. Another major electro-mechanical system developed as part of this work is the one dedicated to sample tube acquisition. The concept of operations of this machinery was defined to be robust against the unknown conditions that characterise the mission. The design process led to a highly automated robotic system which is described here in its main components: vision system, robotic arm and tube storage.
Resumo:
Con questo lavoro si vuole contribuire al dibattito riapertosi con il ritorno dell’Educazione civica in tutte le scuole italiane, a seguito dell’entrata in vigore della Legge 92/2019, in particolare valorizzando il punto di vista degli insegnanti. La ricerca è impostata secondo il disegno quantitativo dell’indagine correlazionale su ampio campione, preparata da una fase esplorativa durante la quale si sono svolte interviste semistrutturate a dieci docenti. A partire dai risultati di tale esplorazione, si è prodotto un questionario che è stato testato e revisionato nell’a.s. 2020-2021. Successivamente si sono condotte due diverse rilevazioni nell’a.s. 2021-2022: la prima su un campione rappresentativo degli insegnanti di scuola secondaria dell’Emilia-Romagna (main study), e la seconda su un campione non rappresentativo su base nazionale (rilevazione di approfondimento). I risultati dell’indagine fanno emergere un’accoglienza parziale delle innovazioni introdotte con la “nuova” Educazione civica. Le maggiori difficoltà si osservano rispetto alla progettazione collegiale dell’insegnamento, che la normativa vorrebbe affidato in contitolarità a tutto il Consiglio di classe, ma rispetto al quale sembra realizzarsi principalmente una “spartizione” delle ore, a cui fanno fronte attività gestite separatamente dai singoli insegnanti. Approcci e pratiche coerenti con i modelli della didattica per competenze tardano ad affermarsi per questo insegnamento, nonostante si siano osservate prime evidenze favorevoli in tal senso. I risultati sollevano il bisogno di maggiore accompagnamento e supporto dei docenti nell’implementazione collegiale di un curricolo di Educazione civica intenzionalmente orientato allo sviluppo delle competenze di cittadinanza.
Resumo:
The femicide in Ciudad Juárez is a story made of extreme violence against women for different reasons, by different actors, under different circumstances, and following different behavioural patterns. All within a gender discrimination frame based on the idea that women are inferior, interchangeable and disposable according to the patriarchal hierarchy still present in Mexico, but strongly reinforced by a sort of conspiracy of silence provoked either by the high impunity rate, the governmental incompetence to solve the crimes, or the general indifference of the population. It is the story of hundreds of kidnapped, raped, in many cases tortured, and murdered young women in the border between Mexico and the United States. The murders first came into light in 1993 and up to now young women continue to “disappear” without any hope of bringing the perpetrators to justice, stopping impunity, convicting the assassins, and bringing justice to the families of the deceased girls and women. The main questions about femicide in Ciudad Juárez seem to be: why were they brutally assassinated?, why most of the crimes have not been solved yet?, why and how is Ciudad Juárez different from other border cities with the same characteristics?, which powers are behind those crimes in a city that implies mainly women as its labor force, and which has the lowest unemployment rate in the whole country? But there are also many other questions dealing more with the context, the Juarences’ lifestyles, the eventual hidden powers behind the crimes, the possible murderers’ reasons, the response of the local civil society, or the international community actions to fight against femicide there, among many other things, that are still waiting for an answer and that this paper will ‘narrate’ in order to provide a holistic panorama for the readers. But above all there is the need to remember that every single woman or girl assassinated there had a name, an identity, a family, a story to be told time after time and as many times as necessary, in order to avoid accepting these crimes just as statistics, as cold numbers that might make us forget the human tragedy that has been flagellating the city since 1993. We must remember as well that their deaths express gender oppression, the inequality of the relations between what is male and what is female, a manifestation of domination, terror, social extermination, patriarchal hegemony, social class and impunity. The city is the perfect mirror where all the contradictions of globalization get reflected. It is there where all the globalization evils are present and survive by sucking their women’s blood. It is a city where some concepts such as gender, migration and power are closely related with a negative connotation.