980 resultados para immune protection
Resumo:
Internet and its widespread usage for multimedia document distribution put the copyright issue in a complete new setting. Multimedia documents, specifically those installed on a web page, are no longer passive as they typically include active applets. Copyright protection safeguards the intellectual property (IP) of multimedia documents, which are either sold or distributed free of charge. In this Chapter, the basic tools for copyright protection are discussed. First, general concepts and the vocabulary used in copyright protection of multimedia documents are discussed. Later, taxonomy of watermarking and fingerprinting techniques are studied. This part is concluded by a review of the literature dealing with IP security. The main part of the chapter discusses the generic watermarking scheme and illustrates it on three specific examples: collusion-free watermarking, spread spectrum watermarking, and software fingerprinting. Future trends and conclusions close the chapter.
Resumo:
The paper investigates the design of secret sharing that is immune against cheating (as defined by the Tompa-Woll attack). We examine secret sharing with binary shares and secrets. Bounds on the probability of successful cheating are given for two cases. The first case relates to secret sharing based on bent functions and results in a non-perfect scheme. The second case considers perfect secret sharing built on highly nonlinear balanced Boolean functions.
Resumo:
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong boolean functions. In particular, we prove that for given secret sharing, the average cheating probability over all cheating vectors and all original vectors, i.e., 1/n 2n ∑c=1...n ∑α∈V n ρc,α , denoted by ρ, satisfies ρ ≥ ½, and the equality holds if and only if ρc,α satisfies ρc,α= ½ for every cheating vector δc and every original vector α. In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions.This enables us to construct cheating-immune secret sharing.
Resumo:
This thesis has developed a new approach to trace virtual protection signals in Electrical substation networks. The main goal of the research was to analyse the contents of the virtual signals transferred, using third party software. In doing so, a comprehensive test was done on a distance protection relay, using non-conventional test equipment.
Resumo:
Nature exists. Humans exist. The behaviour of one impacts upon the other. The behaviour of humans is governed by the artificial contrivance described as the law. While the law can in this way control the behaviour of humans and the impact that human behaviour has on nature, the behaviour of nature is governed – if at all- in accordance with nature’s own sets of values which are quintessentially a matter for nature. The relationship between nature and humans may be the object of rules of law, but traditional legal doctrine dictates that humans but not nature are the subjects of the rules of law. The jurisprudence of the earth – it would appear – seeks to equalise in the eyes of the law nature as part of the global environment and humans as part of the global environment. How might this be done?
Resumo:
"This collection of papers offers a broad synopsis of state-of-the-art mathematical methods used in modeling the interaction between tumors and the immune system. These papers were presented at the four-day workshop on Mathematical Models of Tumor-Immune System Dynamics held in Sydney, Australia from January 7th to January 10th, 2013. The workshop brought together applied mathematicians, biologists, and clinicians actively working in the field of cancer immunology to share their current research and to increase awareness of the innovative mathematical tools that are applicable to the growing field of cancer immunology. Recent progress in cancer immunology and advances in immunotherapy suggest that the immune system plays a fundamental role in host defense against tumors and could be utilized to prevent or cure cancer. Although theoretical and experimental studies of tumor-immune system dynamics have a long history, there are still many unanswered questions about the mechanisms that govern the interaction between the immune system and a growing tumor. The multidimensional nature of these complex interactions requires a cross-disciplinary approach to capture more realistic dynamics of the essential biology. The papers presented in this volume explore these issues and the results will be of interest to graduate students and researchers in a variety of fields within mathematical and biological sciences."--Publisher website
Resumo:
Since the inception of the UN Convention on Biological Diversity (CBD) in 1992, little progress has been achieved in terms of involving the business community in protecting biological diversity worldwide. This article assesses the current activities of US Fortune 500 companies with respect to global biodiversity protection and the goals of the CBD. Data and information collected from 500 companies within eight major industrial sectors were further categorized at the company level to assess each company's involvement in global biodiversity protection. Our findings show that although companies' business profiles highly influence their decision-making process regarding the adoption of biodiversity protection policies and measures, their revenue profiles are less influential. We show that despite generating low revenues, companies in the utility sector are more active in the adoption of biodiversity protection policy than those in the financial sector, which generate high revenues. This study also demonstrates that companies must be convinced of the major effects of biodiversity loss on their bottom lines to be motivated to protect biological diversity. Companies' business and business-related risk profiles can also influence the adoption of biodiversity protection policies within the company. The study further demonstrates that a measurable biodiversity impact indicator is necessary for the companies to get seriously involved in the mitigation action. Finally, this study proposes a three-step biodiversity loss mitigation action framework that is drawn upon the assessment of the 500 companies that can contribute to develop an elaborative framework of business sector-specific mitigation plan. © 2013 Copyright Taylor and Francis Group, LLC.
Resumo:
This article assesses the extent to which the recently formulated Chinese concept of “Responsible Protection” (RP) offers a valuable contribution to the normative debate over R2P’s third pillar following the controversy over military intervention in Libya. While RP draws heavily on previous proposals such as the original 2001 ICISS report and Brazil’s “Responsibility while Protecting” (RwP), by amalgamating and re-packaging these earlier ideas in a more restrictive form the initiative represents a new and distinctive interpretation of R2P. However, some aspects of RP are framed too narrowly to provide workable guidelines for determining the permissibility of military intervention for civilian protection purposes, and should therefore be clarified and refined. Nevertheless, the Chinese proposal remains significant because it offers important insights into Beijing’s current stance on R2P. More broadly, China’s RP and Brazil’s RwP initiatives illustrate the growing willingness of rising, non-Western powers to assert their own normative preferences on sovereignty, intervention and global governance.
Resumo:
This thesis introduces a theory of intellectual property (IP) law informed by Islamic Shari'a. The sources and objectives of Islamic Shari'a support the theoretical framework underpinning IP laws. However, they strongly emphasise the importance of development goals in intellectual property policy making. This thesis argues that an optimal IP system from an Islamic perspective shall not overprotect IP holders but should instead endeavor to empower people to access knowledge resources to enhance access to education, public health and economic opportunities. Taking Libya as a case study, this thesis makes recommendations for the improvement of IP law that have important broader implications for developing countries.
Resumo:
Urinary tract infections (UTI) are among the most common infectious diseases of humans and are the most common nosocomial infections in the developed world. It is estimated that 40–50% of women and 5% of men will develop a UTI in their lifetime, and UTI accounts for more than 1 million hospitalizations and $1.6 billion in medical expenses each year in the USA. Uropathogenic Escherichia coli (UPEC) is the primary cause of UTI. This review presents an overview of recent discoveries related to the primary virulence factors of UPEC and major innate immune responses to infection of the lower urinary tract. New and emerging themes in UPEC research are discussed in the context of the interface between host and pathogen.
Resumo:
This report describes the diagnostic features, clinical management and the issues associated with management of a young immunocompetent male who presented with a presumed left Herpes simplex immune stromal keratitis, and ten months later, a right immune stromal keratitis associated with Herpes zoster ophthalmicus.
Resumo:
Purpose: The therapeutic ratio for ionising radiation treatment of tumour is a trade-off between normal tissue side-effects and tumour control. Application of a radioprotector to normal tissue can reduce side-effects. Here we study the effects of a new radioprotector on the cellular response to radiation. Methylproamine is a DNA-binding radioprotector which, on the basis of published pulse radiolysis studies, acts by repair of transient radiation-induced oxidative species on DNA. To substantiate this hypothesis, we studied protection by methylproamine at both clonogenic survival and radiation-induced DNA damage, assessed by γH2AX (histone 2AX phosphorylation at serine 139) focus formation endpoints. Materials and methods: The human keratinocyte cell line FEP1811 was used to study clonogenic survival and yield of γH2AX foci following irradiation (137Cs γ-rays) of cells exposed to various concentrations of methylproamine. Uptake of methylproamine into cell nuclei was measured in parallel. Results: The extent of radioprotection at the clonogenic survival endpoint increased with methylproamine concentration up to a maximum dose modification factor (DMF) of 2.0 at 10 μM. At least 0.1 fmole/nucleus of methylproamine is required to achieve a substantial level of radioprotection (DMF of 1.3) with maximum protection (DMF of 2.0) achieved at 0.23 fmole/nucleus. The γH2AX focus yield per cell nucleus 45 min after irradiation decreased with drug concentration with a DMF of 2.5 at 10 μM. Conclusions: These results are consistent with the hypothesis that radioprotection by methylproamine is mediated by attenuation of the extent of initial DNA damage.