845 resultados para Diplomatic protection
Resumo:
[Code]
Protection des travailleurs contre les courants électriques . Edition mise à jour au 15 octobre 1956
Resumo:
[Code]
Resumo:
Homozygous (delta ccr5/delta ccr5) and heterozygous (CCR5/delta ccr5) deletions in the beta-chemokine receptor 5 (CCR5) gene, which encodes for the major co-receptor for macrophage-tropic HIV-1 entry, have been implicated in resistance to HIV infection and in protection against disease progression, respectively. The CCR5/delta ccr5 genotype was found more frequently in long-term nonprogressors (LTNP) (31.0%) than in progressors (10.6%, p < 0.0001), in agreement with previous studies. Kaplan-Meier survival analyses showed that a slower progression of disease, i.e. higher proportion of subjects with CD4+ T cell counts > 500/microl (p = 0.0006) and a trend toward a slower progression to AIDS (p = 0.077), was associated with the CCR5/delta ccr5 genotype. However, when LTNP were analyzed separately, no significant differences in CD4+ T cell counts (p = 0.12) and viremia levels (p = 0.65) were observed between the wild-type (69% of LTNP) and the heterozygous (31.0%) genotypes. Therefore, there are other factors which play a major role in determining the status of nonprogression in the majority of LTNP. Furthermore, there was no evidence that the CCR5/delta ccr5 genotype was associated with different rates of disease progression in the group of progressors. Taken together, these results indicate that the CCR5/delta ccr5 genotype is neither essential nor sufficient for protection against the progression of HIV disease.
Resumo:
Additions of lactams, imides, (S)-4-benzyl-1,3-oxazolidin-2-one, 2-pyridone, pyrimidine-2,4-diones (AZT derivatives), or inosines to the electron-deficient triple bonds of methyl propynoate, tert-butyl propynoate, 3-butyn-2-one, N-propynoylmorpholine, or N-methoxy-N-methylpropynamide in the presence of many potential catalysts were examined. DABCO and, second, DMAP appeared to be the best (highest reaction rates and E/Z ratios), while RuCl3, RuClCp*(PPh3)2, AuCl, AuCl(PPh3), CuI, and Cu2(OTf)2 were incapable of catalyzing such additions. The groups incorporated (for example, the 2-(methoxycarbonyl)ethenyl group that we name MocVinyl) serve as protecting groups for the above-mentioned heterocyclic CONH or CONHCO moieties. Deprotections were accomplished via exchange with good nucleophiles: the 1-dodecanethiolate anion turned out to be the most general and efficient reagent, but in some particular cases other nucleophiles also worked (e.g., MocVinyl-inosines can be cleaved with succinimide anion). Some structural and mechanistic details have been accounted for with the help of DFT and MP2 calculations.
Resumo:
The nature of client-server architecture implies that some modules are delivered to customers. These publicly distributed commercial software components are under risk, because users (and simultaneously potential malefactors) have physical access to some components of the distributed system. The problem becomes even worse if interpreted programming languages are used for creation of client side modules. The language Java, which was designed to be compiled into platform independent byte-code is not an exception and runs the additional risk. Along with advantages like verifying the code before execution (to ensure that program does not produce some illegal operations)Java has some disadvantages. On a stage of byte-code a java program still contains comments, line numbers and some other instructions, which can be used for reverse-engineering. This Master's thesis focuses on protection of Java code based client-server applications. I present a mixture of methods to protect software from tortious acts. Then I shall realize all the theoretical assumptions in a practice and examine their efficiency in examples of Java code. One of the criteria's to evaluate the system is that my product is used for specialized area of interactive television.
Resumo:
Initial non-inflammatory demyelination in canine distemper virus infection (CDV) develops against a background of severe immunosuppression and is therefore, thought to be virus-induced. However, recently we found a marked invasion of T cells throughout the central nervous system (CNS) in dogs with acute distemper despite drastic damage to the immune system. In the present study, this apparent paradox was further investigated by immunophenotyping of lymphocytes, following experimental CDV challenge in vaccinated and non-vaccinated dogs. In contrast to CDV infected, unprotected dogs, vaccinated dogs did not become immunosuppressed and exhibited a strong antiviral immune response following challenge with virulent CDV. In unprotected dogs rapid and drastic lymphopenia was initially due to depletion of T cells. In peripheral blood, CD4(+) T cells were more sensitive and depleted earlier and for a longer time than CD8(+) cells which recovered soon. In the cerebrospinal fluid (CSF) we could observe an increase in the T cell to B cell and CD8(+) to CD4(+) ratios. Thus, partial protection of the CD8(+) cell population could explain why part of the immune function in acute distemper is preserved. As found earlier, T cells invaded the CNS parenchyma in these dogs but also in the protected challenged dogs, which did not develop any CNS disease at all. Since markers of T cell activation were upregulated in both groups of animals, this phenomenon could in part be related to non-specific penetration of activated T cells through the blood brain barrier. However, in diseased animals much larger numbers of T cells were found in the CNS than in the protected dogs, suggesting that massive invasion of T cells in the brain requires CDV expression in the CNS.
Resumo:
Pro-gradu tutkielman tavoitteena on tutkia, miten yritykset tasapainoilevat tiedon jakamisen ja suojaamisen välillä innovaatioyhteistyöprojekteissa, ja miten sopimukset, immateriaalioikeudet ja luottamus voivat vaikuttaa tähän tasapainoon. Yhteistyössä yritysten täytyy jakaa tarpeellista tietoa kumppanilleen, mutta toisaalta niiden täytyy varoa, etteivät ne menetä ydinosaamiseensa kuuluvaa tietoa ja kilpailuetuaan. Yrityksillä on useita keinoja tietovuodon estämiseen. Tutkielmassa keskitytään patenttien, sopimusten ja liikesalaisuuksien käyttöön tietoa suojaavina mekanismeina. Kyseiset suojamekanismit vaikuttavat luottamukseen kumppaneiden välillä, ja täten myös näiden halukkuuteen jakaa tietoa kumppaneilleen. Jos kumppanit eivät jaa tarpeeksi tietoa toisilleen, voi yhteistyö epäonnistua. Sopimusten, immateriaalioikeuksien ja luottamuksen rooleja ja vuorovaikutusta tutkitaan kahdenvälisissä yhteistyöprojekteissa. Tutkielmassa esitellään neljä case-esimerkkiä, jotka on koottu suomalaisen metsätoimialan yrityksen haastatteluista.