867 resultados para Hot spots, levels of delinquency, citizen’s security, critical areas, Bogotá.
Resumo:
Samples were taken at each stage of brewing (malt, milling, mashing, wort separation, hop addition, boiling, whirlpool, dilution, fermentation, warm rest, chill-lagering, beer filtration, carbonation and bottling, pasteurization, and storage). The level of antioxidant activity of unfractionated, low-molecular-mass (LMM) and high-molecular-mass (HMM) fractions was measured by the 2,2'-azinobis(3-ethylbenzothiazoline-6-sulfortic acid) radical cation (ABTS(.+)) and ferric-reducing antioxidant power (FRAP) procedures. Polyphenol levels were assessed by HPLC. The LMM fraction ( 0.001) in catechin and ferulic acid levels. Increases in antioxidant activity levels were observed after mashing, boiling, fermentation, chill-lagering, and pasteurization, in line with previous studies on lager. Additionally, increases in the level of antioxidant activity occurred after wort separation and carbonation and bottling and were accompanied by increases in levels of most monitored polyphenols. Data from the ABTS(.-) and FRAP assays indicated that the compounds contributing to the levels of antioxidant activity responded differently in the two procedures. Levels of ferulic, vanillic, and chlorogenic acids and catechin accounted for 45-61% of the variation in antioxidant activity levels.
Resumo:
The subject matter of the analysis conducted in the text is information and anti-terrorist security of Poland, which has been presented within the context of a clash between two spheres – the state and the private sphere. Furthermore, the issues of security have been supplemented with a description of the tasks and activity of the Internal Security Agency, as well as a synthetic appraisal of a terrorist threat to Poland. The main parts of this work are concerned with: (1) the state and the private sphere, (2) " terrorism " and terrorist offences, (3) the tasks and activity of the Internal Security Agency, (4) an appraisal of a terrorist threat to Poland. Given the necessity to elaborate the research problem, the text features the following research questions: (1) To what extent does referring to a threat to security influence a limitation on rights and freedoms in Poland (with regard to the clash between the state and the private sphere)?, (2) To what extent do the tasks and activity of the Internal Security Agency influence the effectiveness of anti-terrorist security in Poland?
Resumo:
Hot spots of endemism are regarded as important global sites for conservation as they are rich in threatened endemic species and currently experiencing extensive habitat loss. Targeting pre-emptive conservation action to sites that are currently relatively intact but which would be vulnerable to particular human activities if they occurred in the future is, however, also valuable but has received less attention. Here, we address this issue by using data on Endemic Bird Areas (EBAs). First, we identify the ecological factors that affect extinction risk in the face of particular human activities, and then use these insights to identify EBAs that should be priorities for pre-emptive conservation action. Threatened endemic species in EBAs are significantly more likely to be habitat specialists or relatively large-bodied than non-threatened species, when compared across avian families. Increasing habitat loss causes a significant increase in extinction risk among habitat specialists, but we found no evidence to suggest that the presence of alien species/human exploitation causes a significant increase in extinction risk among large-bodied species. This suggests that these particular human activities are contributing to high extinction risk among habitat specialists, but not among large-bodied species. Based on these analyses, we identify 39 EBAs containing 570 species (24% of the total in EBAs) that are not currently threatened with severe habitat loss, but would be ecologically vulnerable to future habitat loss should it occur. We show that these sites tend to be poorly represented in existing priority setting exercises involving hot spots, suggesting that vulnerability must be explicitly included within these exercises if such sites are to be adequately protected.
Resumo:
Samples were taken at each stage of brewing (malt, milling, mashing, wort separation, hop addition, boiling, whirlpool, dilution, fermentation, warm rest, chill-lagering, beer filtration, carbonation and bottling, pasteurization, and storage). The level of antioxidant activity of unfractionated, low-molecular-mass (LMM) and high-molecular-mass (HMM) fractions was measured by the 2,2'-azinobis(3-ethylbenzothiazoline-6-sulfortic acid) radical cation (ABTS(.+)) and ferric-reducing antioxidant power (FRAP) procedures. Polyphenol levels were assessed by HPLC. The LMM fraction (<5 kDa) was responsible for similar to80% of the level of antioxidant activity of the unfractionated malt and beer samples. In the unfractionated samples, significant decreases (P < 0.001) in antioxidant activity levels were observed after milling and beer filtration, with the decrease after beer filtration being accompanied by a significant decrease (P > 0.001) in catechin and ferulic acid levels. Increases in antioxidant activity levels were observed after mashing, boiling, fermentation, chill-lagering, and pasteurization, in line with previous studies on lager. Additionally, increases in the level of antioxidant activity occurred after wort separation and carbonation and bottling and were accompanied by increases in levels of most monitored polyphenols. Data from the ABTS(.-) and FRAP assays indicated that the compounds contributing to the levels of antioxidant activity responded differently in the two procedures. Levels of ferulic, vanillic, and chlorogenic acids and catechin accounted for 45-61% of the variation in antioxidant activity levels.
Resumo:
Wireless video sensor networks have been a hot topic in recent years; the monitoring capability is the central feature of the services offered by a wireless video sensor network can be classified into three major categories: monitoring, alerting, and information on-demand. These features have been applied to a large number of applications related to the environment (agriculture, water, forest and fire detection), military, buildings, health (elderly people and home monitoring), disaster relief, area and industrial monitoring. Security applications oriented toward critical infrastructures and disaster relief are very important applications that many countries have identified as critical in the near future. This paper aims to design a cross layer based protocol to provide the required quality of services for security related applications using wireless video sensor networks. Energy saving, delay and reliability for the delivered data are crucial in the proposed application. Simulation results show that the proposed cross layer based protocol offers a good performance in term of providing the required quality of services for the proposed application.
Resumo:
Dominant paradigms of causal explanation for why and how Western liberal-democracies go to war in the post-Cold War era remain versions of the 'liberal peace' or 'democratic peace' thesis. Yet such explanations have been shown to rest upon deeply problematic epistemological and methodological assumptions. Of equal importance, however, is the failure of these dominant paradigms to account for the 'neoliberal revolution' that has gripped Western liberal-democracies since the 1970s. The transition from liberalism to neoliberalism remains neglected in analyses of the contemporary Western security constellation. Arguing that neoliberalism can be understood simultaneously through the Marxian concept of ideology and the Foucauldian concept of governmentality – that is, as a complementary set of 'ways of seeing' and 'ways of being' – the thesis goes on to analyse British security in policy and practice, considering it as an instantiation of a wider neoliberal way of war. In so doing, the thesis draws upon, but also challenges and develops, established critical discourse analytic methods, incorporating within its purview not only the textual data that is usually considered by discourse analysts, but also material practices of security. This analysis finds that contemporary British security policy is predicated on a neoliberal social ontology, morphology and morality – an ideology or 'way of seeing' – focused on the notion of a globalised 'network-market', and is aimed at rendering circulations through this network-market amenable to neoliberal techniques of government. It is further argued that security practices shaped by this ideology imperfectly and unevenly achieve the realisation of neoliberal 'ways of being' – especially modes of governing self and other or the 'conduct of conduct' – and the re-articulation of subjectivities in line with neoliberal principles of individualism, risk, responsibility and flexibility. The policy and practice of contemporary British 'security' is thus recontextualised as a component of a broader 'neoliberal way of war'.
Resumo:
The anomalies in the anti-Stokes to Stokes intensity ratios in single-molecule surface-enhanced resonance Raman scattering were investigated. Brilliant green and crystal violet dyes were the molecular probes, and the experiments were carried out on an electrochemically activated Ag surface. The results allowed new insights into the origin of these anomalies and led to a new method to confirm the single-molecule regime in surface-enhanced Raman scattering. Moreover, a methodology to estimate the distribution of resonance energies that contributed to the imbalance in the anti-Stokes to Stokes intensity ratios at the electromagnetic hot spots was proposed. This method allowed the local plasmonic resonance energies on the metallic surface to be spatially mapped.
Resumo:
The deep economic recession that hit Sweden and Finland at the beginning of the 90s, and the fall in public revenues and rapidly growing public debts that followed on it, triggered a development of cutbacks and restructuring measures which has resulted in a scientific debate over what this has meant for these countries’ systems of social policy, traditionally resting on the Nordic welfare state paradigm. In this connection, questions of to what extent changes made can be ascribed mainly to the economic constraints posed by the recession at all, or rather, to other more long-term societal trends or phenomena, including globalisation, European integration and/or ideational or ideological shifts among influential (elite) groups, have often been touched upon. Applying an ideas-centred approach, this paper attempts to contribute to the knowledge on the reasoning of influential elite societal groups in social policy issues before, during and after the 90’s recession, by empirically analysing their statements on social security made in the press. A distinction is made between three different levels of proposed policy changes, reaching from minor alterations of single programs to changes of the policy paradigm. Results show that the 1990s did not only mean the emergence of suggestions for minor cutbacks in and alterations of prevailing programmes. The share of suggestions implying de facto a (further) departure from the basic features of the social security system also showed that the model was under continuous pressure throughout the 90s. However, many of the changes suggested were not justified by any clear references to a policy paradigm in either country (or not justified at all). Instead, references to “purely” structural justifications did become more common over time. In this respect, as regards social security, our results cannot confirm the fairly popular notion among many researchers of a clearly ideological attack on the welfare state. However, it remains uncertain whether and to what extent the increased proportion of references to “structural realities” in the 90s should be interpreted as an indication of a change in the idea of what the welfare state is and what the goals behind it are. Results further show that the patterns of the discussion in the two countries studied bore a remarkable resemblance at a general level, whereas there are indications of differences in the driving forces behind suggestions for similar reforms in these two countries.
Resumo:
A commentary on Mendoza et al.'s article entitled, "Ethnic Minority Children’s Active Commuting to School and Association with Physical Activity and Pedestrian Safety Behaviors."
Resumo:
This study addresses deflagration initiation of lean and stoichiometric hydrogen–air mixtures by the sudden discharge of a hot jet of their adiabatic combustion products. The objective is to compute the minimum jet radius required for ignition, a relevant quantity of interest for safety and technological applications. For sufficiently small discharge velocities, the numerical solution of the problem requires integration of the axisymmetric Navier–Stokes equations for chemically reacting ideal-gas mixtures, supplemented by standard descriptions of the molecular transport terms and a suitably reduced chemical-kinetic mechanism for the chemistry description. The computations provide the variation of the critical radius for hot-jet ignition with both the jet velocity and the equivalence ratio of the mixture, giving values that vary between a few tens microns to a few hundred microns in the range of conditions explored. For a given equivalence ratio, the critical radius is found to increase with increasing injection velocities, although the increase is only moderately large. On the other hand, for a given injection velocity, the smallest critical radius is found at stoichiometric conditions.
Resumo:
Organization of transgenes in rice transformed through direct DNA transfer strongly suggests a two-phase integration mechanism. In the “preintegration” phase, transforming plasmid molecules (either intact or partial) are spliced together. This gives rise to rearranged transgenic sequences, which upon integration do not contain any interspersed plant genomic sequences. Subsequently, integration of transgenic DNA into the host genome is initiated. Our experiments suggest that the original site of integration acts as a hot spot, facilitating subsequent integration of successive transgenic molecules at the same locus. The resulting transgenic locus may have plant DNA separating the transgenic sequences. Our data indicate that transformation through direct DNA transfer, specifically particle bombardment, generally results in a single transgenic locus as a result of this two-phase integration mechanism. Transgenic plants generated through such processes may, therefore, be more amenable to breeding programs as the single transgenic locus will be easier to characterize genetically. Results from direct DNA transfer experiments suggest that in the absence of protein factors involved in exogenous DNA transfer through Agrobacterium, the qualitative and/or quantitative efficiency of transformation events is not compromised. Our results cast doubt on the role of Agrobacterium vir genes in the integration process.
Resumo:
This article evaluates the way in which copyright infringement has been gradually shifting from an area of civil liability to one of criminal penalty. Traditionally, consideration of copyright issues has been undertaken from a predominantly legal and/or economic perspectives. Whereas traditional legal analysis can explain what legal changes are occurring, and what impact these changes may have, they may not effectively explain ‘how’ these changes have come to occur. The authors propose an alternative inter-disciplinary approach, combining legal analysis with critical security studies, which may help to explain in greater detail how policies in this field have developed. In particular, through applied securitisation theory, this article intends to demonstrate the appropriation of this field by a security discourse, and its consequences for societal and legal developments. In order to explore how the securitisation framework may be a valid approach to a subject such as copyright law and to determine the extent to which copyright law may be said to have been securitised, this article will begin by explaining the origins and main features of securitisation theory, and its applicability to legal study. The authors will then attempt to apply this framework to the development of a criminal law approach to copyright infringement, by focusing on the security escalation it has undergone, developing from an economic issue into one of international security. The analysis of this evolution will be mainly characterised by the securitisation moves taking place at national, European and international levels. Finally, a general reflection will be carried out on whether the securitisation of copyright has indeed been successful and on what the consequences of such a success could be.
Resumo:
The phenomenon of microscopic hot-spots, during the calcination of MCM-41, was investigated by quantifying the magnitude of the temperature increase during the calcination of a soft MCM-41 mesophase using a SAXS comparative study. This was performed by thermally treating a soft material that was detemplated via Fenton chemistry followed by equilibrating and drying in a low-surface-tension solvent (n-butanol or N,N-dimethylformamide); these samples have limited structural shrinkage. The resulting samples were thermally treated at increasing temperatures, and the structural shrinkage was compared with that of the directly calcined material. By comparing the structural shrinkage, it was found that the microscopic temperature increase would fall between 190 and 250 C, as deduced from N,N-dimethyl-formamide and n-butanol. The order of magnitude of the temperature increase appears to be consistent with the well-known glow effect. It is, however, substantially higher than the experimentally determined macroscopic temperature increase. Several aspects are discussed to interpret this difference. © 2013 Elsevier B.V.