949 resultados para data protection reform, data protection


Relevância:

60.00% 60.00%

Publicador:

Resumo:

INTRODUCTION: Occupational exposure to grain dust causes respiratory symptoms and pathologies. To decrease these effects, major changes have occurred in the grain processing industry in the last twenty years. However, there are no data on the effects of these changes on workers' respiratory health. OBJECTIVES: The aim of this study was to evaluate the respiratory health of grain workers and farmers involved in different steps of the processing industry of wheat, the most frequently used cereal in Europe, fifteen years after major improvements in collective protective equipment due to mechanisation. MATERIALS AND METHOD: Information on estimated personal exposure to wheat dust was collected from 87 workers exposed to wheat dust and from 62 controls. Lung function (FEV1, FVC, and PEF), exhaled nitrogen monoxide (FENO) and respiratory symptoms were assessed after the period of highest exposure to wheat during the year. Linear regression models were used to explore the associations between exposure indices and respiratory effects. RESULTS: Acute symptoms - cough, sneezing, runny nose, scratchy throat - were significantly more frequent in exposed workers than in controls. Increased mean exposure level, increased cumulative exposure and chronic exposure to more than 6 mg.m (-3) of inhaled wheat dust were significantly associated with decreased spirometric parameters, including FEV1 and PEF (40 ml and 123 ml.s (-1) ), FEV1 and FVC (0.4 ml and 0.5 ml per 100 h.mg.m (-3) ), FEV1 and FVC (20 ml and 20 ml per 100 h at >6 mg.m (-3) ). However, no increase in FENO was associated with increased exposure indices. CONCLUSIONS: The lung functions of wheat-related workers are still affected by their cumulative exposure to wheat dust, despite improvements in the use of collective protective equipment.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mitochondrial function and dynamics are essential for neurotransmission, neural function and neuronal viability. Recently, we showed that the eutherian-specific Armcx gene cluster (Armcx1-6 genes), located in the X chromosome, encodes for a new family of proteins that localise to mitochondria, regulating mitochondrial trafficking. The Armcx gene cluster evolved by retrotransposition of the Armc10 gene mRNA, which is present in all vertebrates and is considered to be the ancestor gene. Here we investigate the genomic organisation, mitochondrial functions and putative neuroprotective role of the Armc10 ancestor gene. The genomic context of the Armc10 locus shows considerable syntenic conservation among vertebrates, and sequence comparisons and CHIP-data suggest the presence of at least three conserved enhancers. We also show that the Armc10 protein localises to mitochondria and that it is highly expressed in the brain. Furthermore, we show that Armc10 levels regulate mitochondrial trafficking in neurons, but not mitochondrial aggregation, by controlling the number of moving mitochondria. We further demonstrate that the Armc10 protein interacts with the KIF5/Miro1-2/Trak2 trafficking complex. Finally, we show that overexpression of Armc10 in neurons prevents A beta-induced mitochondrial fission and neuronal death. Our data suggest both conserved and differential roles of the Armc10/Armcx gene family in regulating mitochondrial dynamics in neurons, and underscore a protective effect of the Armc10 gene against A beta-induced toxicity. Overall, our findings support a further degree of regulation of mitochondrial dynamics in the brain of more evolved mammals.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mitochondrial function and dynamics are essential for neurotransmission, neural function and neuronal viability. Recently, we showed that the eutherian-specific Armcx gene cluster (Armcx1-6 genes), located in the X chromosome, encodes for a new family of proteins that localise to mitochondria, regulating mitochondrial trafficking. The Armcx gene cluster evolved by retrotransposition of the Armc10 gene mRNA, which is present in all vertebrates and is considered to be the ancestor gene. Here we investigate the genomic organisation, mitochondrial functions and putative neuroprotective role of the Armc10 ancestor gene. The genomic context of the Armc10 locus shows considerable syntenic conservation among vertebrates, and sequence comparisons and CHIP-data suggest the presence of at least three conserved enhancers. We also show that the Armc10 protein localises to mitochondria and that it is highly expressed in the brain. Furthermore, we show that Armc10 levels regulate mitochondrial trafficking in neurons, but not mitochondrial aggregation, by controlling the number of moving mitochondria. We further demonstrate that the Armc10 protein interacts with the KIF5/Miro1-2/Trak2 trafficking complex. Finally, we show that overexpression of Armc10 in neurons prevents A beta-induced mitochondrial fission and neuronal death. Our data suggest both conserved and differential roles of the Armc10/Armcx gene family in regulating mitochondrial dynamics in neurons, and underscore a protective effect of the Armc10 gene against A beta-induced toxicity. Overall, our findings support a further degree of regulation of mitochondrial dynamics in the brain of more evolved mammals.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The intellectual property (IP) environment in China is still very immature. There are several problems in legal, political, economic, social-cultural, competitive and labor environment which have hindered IP legal enforcement. Under such circumstances, IP misappropriation is a major concern especially for foreign small and medium-sized enterprises (SMEs) doing business in China. These circumstances require foreign companies, no matter whether they are multinational corporations (MNCs) or SMEs and have own manufacturing in China or not, to take strong IP actions. Therefore, the purpose of this study is to discuss how IP can be protected in China in the case of outsourcing and in the case of own manufacturing. The comparison will consider the process of outsourcing and own manufacturing consisting two stages: preparation stage and operation stage. In order to clarify the conceptual arguments, two illustrative case studies were studied. The case data bases on two semi-structured interviews of the managing directors, field notes and archival data. The findings propose that attention in IP protection should be given to following issues: integrating IP strategy into the company’s business strategy, protecting the most critical knowledge, regarding IP steps as a whole in the protection mechanism and making IP strategy as proactive as possible. The major difference between outsourcing and own manufacturing in IP protection is in the operation stage. Besides, the findings also provide managerial advice on IP protection, e.g. foreign managers should be prepared for IP risks in China, they should establish an own IP protection mechanism which matches the company’s situation and they should consider IP protection as an on-going process.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Bullying can be viewed as goal-oriented behavior in the strive for dominance and prestige in the peer group (Salmivalli, 2010). To ensure the effectiveness of their power demonstrations, bullies often choose targets from among their vulnerable peers (Salmivalli, 2010; Veenstra et al., 2007). A large number of studies have also shown that victimization has severe consequences for the victims’ psychosocial adjustment (Reijntjes, Kamphuis, Prinzie, & Telch, 2010; Ttofi, Farrington, Lösel, & Loeber, 2011). In this thesis I investigate – based on three empirical studies – whether similar dynamics on the risk factors and consequences apply to same- and other-sex victimization. In the empirical studies, we used the data from the randomized control trial of the KiVa antibullying program for the elementary school grades 4–6 (2007–2008), and for the middle school grades 7–9 (2008–2009). We measured same- and other-sex victimization, and victims’ defending relationships by dyadic questions: “By which classmates are you victimized?” and “By which classmates are you supported, comforted, or defended?” In addition, we used self-reports and peer reports to measure adjustment and social status. The findings imply that other-sex victimization may be challenging for antibullying work. First, although targets of bullying seemed to be selected from among vulnerable peers for the most part, perceived popularity increased the risks of other-sex victimization. Popularity of these victims may falsely lead to an impression that the victims are doing well. Second, the consequences considering victims’ later psychosocial adjustment were alarming concerning girls bullied by boys. Thus, despite the fact that the targets may be perceived as popular, other-sex victimization can have even more severe consequences than same-sex victimization. Third, we found that defending relationships were mostly same-sex relationships, and consequently, we may ask whether defending is effective against other-sex bullies. Finally, the KiVa antibullying program was less effective against other-sex victimization in the adolescent sample. The findings altogether emphasize the importance of taking into account the sex composition of the bully-victim dyad, both considering future research on bullying and in the antibullying work with children and adolescents.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Communications play a key role in modern smart grids. New functionalities that make the grids ‘smart’ require the communication network to function properly. Data transmission between intelligent electric devices (IEDs) in the rectifier and the customer-end inverters (CEIs) used for power conversion is also required in the smart grid concept of the low-voltage direct current (LVDC) distribution network. Smart grid applications, such as smart metering, demand side management (DSM), and grid protection applied with communications are all installed in the LVDC system. Thus, besides remote connection to the databases of the grid operators, a local communication network in the LVDC network is needed. One solution applied to implement the communication medium in power distribution grids is power line communication (PLC). There are power cables in the distribution grids, and hence, they may be applied as a communication channel for the distribution-level data. This doctoral thesis proposes an IP-based high-frequency (HF) band PLC data transmission concept for the LVDC network. A general method to implement the Ethernet-based PLC concept between the public distribution rectifier and the customerend inverters in the LVDC grid is introduced. Low-voltage cables are studied as the communication channel in the frequency band of 100 kHz–30 MHz. The communication channel characteristics and the noise in the channel are described. All individual components in the channel are presented in detail, and a channel model, comprising models for each channel component is developed and verified by measurements. The channel noise is also studied by measurements. Theoretical signalto- noise ratio (SNR) and channel capacity analyses and practical data transmission tests are carried out to evaluate the applicability of the PLC concept against the requirements set by the smart grid applications in the LVDC system. The main results concerning the applicability of the PLC concept and its limitations are presented, and suggestion for future research proposed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A postgraduate seminar series with a title Critical Infrastructure Protection against Cyber Threats held at the Department of Military Technology of the National Defence University in the fall of 2013 and 2014. This book is a collection of some of talks that were presented in the seminar. The papers address origin of critical infrastructure protection, wargaming cyberwar in critical infrastructure defence, cyber-target categorization, supervisory control and data acquisition systems vulnerabilities, electric power as critical infrastructure, improving situational awareness of critical infrastructure and trust based situation awareness in high security cloud environment. This set of papers tries to give some insight to current issues of the network-centric critical infrastructure protection. The seminar has always made a publication of the papers but this has been an internal publication of the Finnish Defence Forces and has not hindered publication of the papers in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Glutathione is the major intracellular antioxidant thiol protecting mammalian cells against oxidative stress induced by oxygen- and nitrogen-derived reactive species. In trypanosomes and leishmanias, trypanothione plays a central role in parasite protection against mammalian host defence systems by recycling trypanothione disulphide by the enzyme trypanothione reductase. Although Kinetoplastida parasites lack glutathione reductase, they maintain significant levels of glutathione. The aim of this study was to use Leishmania donovani trypanothione reductase gene mutant clones and different Leishmania species to examine the role of these two individual thiol systems in the protection mechanism against S-nitroso-N-acetyl-D,L-penicillamine (SNAP), a nitrogen-derived reactive species donor. We found that the resistance to SNAP of different species of Leishmania was inversely correlated with their glutathione concentration but not with their total low-molecular weight thiol content (about 0.18 nmol/10(7) parasites, regardless Leishmania species). The glutathione concentration in L. amazonensis, L. donovani, L. major, and L. braziliensis were 0.12, 0.10, 0.08, and 0.04 nmol/10(7) parasites, respectively. L. amazonensis, that have a higher level of glutathione, were less susceptible to SNAP (30 and 100 µM). The IC50 values of SNAP determined to L. amazonensis, L. donovani, L. major, and L. braziliensis were 207.8, 188.5, 160.9, and 83 µM, respectively. We also observed that L. donovani mutants carrying only one trypanothione reductase allele had a decreased capacity to survive (~40%) in the presence of SNAP (30-150 µM). In conclusion, the present data suggest that both antioxidant systems, glutathione and trypanothione/trypanothione reductase, participate in protection of Leishmania against the toxic effect of nitrogen-derived reactive species.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Chagas' disease, caused by the protozoan Trypanosoma cruzi, is a major cause of cardiovascular disability in countries where it is endemic. Damage to the heart microvasculature has been proposed to be an important factor in the pathogenesis of heart dysfunction. Endothelin-1 (ET-1) is a potent vasoconstrictor and exerts its effects via specific ET A and ET B receptors. A few studies have suggested a role for ET-1 and its receptors in the pathogenesis of Chagas' disease. We investigated the effects of treatment with bosentan, an ET A/ET B receptor antagonist, on the course of T. cruzi infection (Y strain) in C57Bl/6 mice. Treatment with bosentan (100 mg kg-1 day-1) was given per os starting day 0 after infection until sacrifice. Bosentan significantly increased myocardial inflammation, with no effects on parasitemia. Although the total number of nests was similar, a lower number of intact amastigote nests was found in the heart of bosentan-treated animals. Bosentan failed to affect the infection-associated increase in the cardiac levels of the cytokines IFN-g and TNF-a and the chemokines CCL2/MCP-1, CCL3/MIP-1a and CCL5/RANTES. In vitro, pre-incubation with ET-1 (0.1 µM) 4 h before infection enhanced the uptake of the parasites by peritoneal macrophages, and this effect was abrogated when macrophages were pre-treated with bosentan (1 µM) 15 min before incubation with ET-1. However, ET-1 did not alter killing of intracellular parasites after 48 h of in vitro infection. Our data suggest that bosentan-treated mice have a delay in controlling parasitism which is compensated for exacerbated inflammation. Infection is eventually controlled in these animals and lethality is unchanged, demonstrating that ET-1 plays a minor role in the protection against acute murine T. cruzi infection.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Since the early 1970's, Canadians have expressed many concerns about the growth of government and its impact on their daily lives. The public has requested increased access to government documents and improved protection of the personal information which is held in government files and data banks. At the same time, both academics and practitioners in the field of public administration have become more interested in the values that public servants bring to their decisions and recommendations. Certain administrative values, such as accountability and integrity, have taken on greater relative importance. The purpose of this thesis is to examine the implementation of Ontario's access and privacy law. It centres on the question of whether or not the Freedom of Information and Protection of Privacy Act, 1987, (FIPPA) has answered the demand for open access to government while at the same time protecting the personal privacy of individual citizens. It also assesses the extent to which this relatively new piece of legislation has made a difference to the people of Ontario. The thesis presents an overview of the issues of freedom of information and protection of privacy in Ontario. It begins with the evolution of the legislation and a description of the law itself. It focuses on the structures and processes which have been established to meet the procedural and administrative demands of the Act. These structures and processes are evaluated in two ways. First, the thesis evaluates how open the Ontario government has become and, second, it determines how Ill carefully the privacy rights of individuals are safeguarded. An analytical framework of administrative values is used to evaluate the overall performance of the government in these two areas. The conclusion is drawn that, overall, the Ontario government has effectively implemented the Freedom of Information and Protection of Privacy Act, particularly by providing access to most government-held documents. The protection of individual privacy has proved to be not only more difficult to achieve, but more difficult to evaluate. However, the administrative culture of the Ontario bureaucracy is shown to be committed to ensuring that the access and privacy rights of citizens are respected.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The use of information and communication technologies in the health and social service sectors, and the development of multi-centred and international research networks present many benefits for society: for example, better follow-up on an individual’s states of health, better quality of care, better control of expenses, and better communication between healthcare professionals. However, this approach raises issues relative to the protection of privacy: more specifically, to the processing of individual health information.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

"Mémoire présenté à la Faculté des études supérieures en vue de l'obtention du grade de maîtrise en droit (LL.M.) option Nouvelles technologies de l'information"

Relevância:

60.00% 60.00%

Publicador:

Resumo:

"Mémoire présenté à la faculté des études supérieures en vue de l'obtention du grade de maître en droit (LL.M.)"

Relevância:

60.00% 60.00%

Publicador:

Resumo:

La survie des réseaux est un domaine d'étude technique très intéressant ainsi qu'une préoccupation critique dans la conception des réseaux. Compte tenu du fait que de plus en plus de données sont transportées à travers des réseaux de communication, une simple panne peut interrompre des millions d'utilisateurs et engendrer des millions de dollars de pertes de revenu. Les techniques de protection des réseaux consistent à fournir une capacité supplémentaire dans un réseau et à réacheminer les flux automatiquement autour de la panne en utilisant cette disponibilité de capacité. Cette thèse porte sur la conception de réseaux optiques intégrant des techniques de survie qui utilisent des schémas de protection basés sur les p-cycles. Plus précisément, les p-cycles de protection par chemin sont exploités dans le contexte de pannes sur les liens. Notre étude se concentre sur la mise en place de structures de protection par p-cycles, et ce, en supposant que les chemins d'opération pour l'ensemble des requêtes sont définis a priori. La majorité des travaux existants utilisent des heuristiques ou des méthodes de résolution ayant de la difficulté à résoudre des instances de grande taille. L'objectif de cette thèse est double. D'une part, nous proposons des modèles et des méthodes de résolution capables d'aborder des problèmes de plus grande taille que ceux déjà présentés dans la littérature. D'autre part, grâce aux nouveaux algorithmes, nous sommes en mesure de produire des solutions optimales ou quasi-optimales. Pour ce faire, nous nous appuyons sur la technique de génération de colonnes, celle-ci étant adéquate pour résoudre des problèmes de programmation linéaire de grande taille. Dans ce projet, la génération de colonnes est utilisée comme une façon intelligente d'énumérer implicitement des cycles prometteurs. Nous proposons d'abord des formulations pour le problème maître et le problème auxiliaire ainsi qu'un premier algorithme de génération de colonnes pour la conception de réseaux protegées par des p-cycles de la protection par chemin. L'algorithme obtient de meilleures solutions, dans un temps raisonnable, que celles obtenues par les méthodes existantes. Par la suite, une formulation plus compacte est proposée pour le problème auxiliaire. De plus, nous présentons une nouvelle méthode de décomposition hiérarchique qui apporte une grande amélioration de l'efficacité globale de l'algorithme. En ce qui concerne les solutions en nombres entiers, nous proposons deux méthodes heurisiques qui arrivent à trouver des bonnes solutions. Nous nous attardons aussi à une comparaison systématique entre les p-cycles et les schémas classiques de protection partagée. Nous effectuons donc une comparaison précise en utilisant des formulations unifiées et basées sur la génération de colonnes pour obtenir des résultats de bonne qualité. Par la suite, nous évaluons empiriquement les versions orientée et non-orientée des p-cycles pour la protection par lien ainsi que pour la protection par chemin, dans des scénarios de trafic asymétrique. Nous montrons quel est le coût de protection additionnel engendré lorsque des systèmes bidirectionnels sont employés dans de tels scénarios. Finalement, nous étudions une formulation de génération de colonnes pour la conception de réseaux avec des p-cycles en présence d'exigences de disponibilité et nous obtenons des premières bornes inférieures pour ce problème.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

La présente recherche a pour but de faire le point sur l'état du droit canadien et sur ses perspectives futures en relation avec les œuvres créées par ordinateurs. L'outil terminologique choisi pour notre objectif est le logiciel de traduction automatique multilingue qui, à cause de sa complexité, s'éloigne le plus du programmeur « créateur» et se rapproche le plus d'œuvres qui ne peuvent être directement attribuées aux linguistes et programmeurs. Ces outils et leurs créations seront d'après nous les prochains outils technologiques à confronter le droit. En effet, dans un avenir prévisible, considérant l'évolution technologique, ces logiciels produiront des textes qui bénéficieront d'une valeur commerciale ajoutée et c'est alors que certains feront valoir leurs « droits », non seulement sur les textes mais aussi sur la technologie. Pour atteindre cet objectif, nous débuterons par un retour historique sur la technologie et ses origines. Par la suite, nous ferons une analyse de la protection actuelle accordée aux logiciels, aux banques de données et aux traductions qu'ils produisent. Nous déterminerons ensuite qui sera responsable des textes produits en relation avec le texte d'origine et avec sa résultante au niveau du droit d'auteur et de celui de la responsabilité civile. Cette recherche nous amènera à conclure que le droit actuel est « mésadapté » tant à l'égard de la protection qu'au niveau de la responsabilité. Ces conclusions devront d'après nous imposer un retour aux principes fondamentaux du droit. Ce fondamentalisme légal sera pour nous le prix à payer pour la légitimité. En effet, plus particulièrement concernant le droit d'auteur, nous conclurons qu'il devra cesser d'être le « fourre-tout» du droit de la propriété intellectuelle et redevenir ce qu'il doit être: un droit qui protège la créativité. Cette démarche prospective tirera ses racines du fait que nous serons obligés de conclure que les juristes canadiens ont refusé, à tort à notre point de vue, de renvoyer au monde des brevets les méthodes et procédés nouveaux et inventifs, ce qui donc a introduit des problématiques inutiles qui exacerbent l'incertitude. Finalement, notre cheminement nous dirigera vers le droit de la responsabilité où nous soutiendrons que le fournisseur ne peut actuellement être responsable du texte produit puisqu'il ne participe pas directement aux choix et ne porte pas atteinte au contenu. Voici donc en quelques mots le cœur de notre recherche qui entrouvre une boîte de Pandore.