967 resultados para Personal rain protection
Resumo:
Water stress resulted in a specific response leading to a large and significant increase (80-fold) in free proline content of ragi (Eleusine coracana) leaves and seedlings. L-Proline protected ornithine aminotransferase, an enzyme in the pathway for proline biosynthesis, isolated from normal and stressed ragi leaves against heat inactivation and denaturation by urea and guanidinium chloride. The protection of the stressed enzyme by L-proline was much more complete than that of the enzyme isolated from normal leaves. While L-ornithine, one of the substrates, protected the stressed enzyme against inactivation, it enhanced the rate of inactivation of the normal enzyme. α-Ketoglutarate protected both the normal and stressed enzyme against inactivation and denaturation. These results support the suggestion that ornithine aminotransferase has undergone a structural alteration during water stress. In view of the causal relationship between elevated temperature and water stress of plants under natural conditions, the protection afforded by proline against inactivation and denaturation of the enzyme from stressed leaves assumes significance. These results provide an explanation for a possible functional importance of proline accumulation during water stress.
Resumo:
Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis, I explore how information systems can be constructed so that they handle this personal data in a reasonable manner. The thesis provides two kinds of results: on one hand, tools and methods for both the construction as well as the evaluation of ubiquitous and mobile systems---on the other hand an evaluation of the privacy aspects of a ubiquitous social awareness system. The work emphasises real-world experiments as the most important way to study privacy. Additionally, the state of current information systems as regards data protection is studied. The tools and methods in this thesis consist of three distinct contributions. An algorithm for locationing in cellular networks is proposed that does not require the location information to be revealed beyond the user's terminal. A prototyping platform for the creation of context-aware ubiquitous applications called ContextPhone is described and released as open source. Finally, a set of methodological findings for the use of smartphones in social scientific field research is reported. A central contribution of this thesis are the pragmatic tools that allow other researchers to carry out experiments. The evaluation of the ubiquitous social awareness application ContextContacts covers both the usage of the system in general as well as an analysis of privacy implications. The usage of the system is analyzed in the light of how users make inferences of others based on real-time contextual cues mediated by the system, based on several long-term field studies. The analysis of privacy implications draws together the social psychological theory of self-presentation and research in privacy for ubiquitous computing, deriving a set of design guidelines for such systems. The main findings from these studies can be summarized as follows: The fact that ubiquitous computing systems gather more data about users can be used to not only study the use of such systems in an effort to create better systems but in general to study phenomena previously unstudied, such as the dynamic change of social networks. Systems that let people create new ways of presenting themselves to others can be fun for the users---but the self-presentation requires several thoughtful design decisions that allow the manipulation of the image mediated by the system. Finally, the growing amount of computational resources available to the users can be used to allow them to use the data themselves, rather than just being passive subjects of data gathering.
Resumo:
The vastly increased popularity of the Internet as an effective publication and distribution channel of digital works has created serious challenges to enforcing intellectual property rights. Works are widely disseminated on the Internet, with and without permission. This thesis examines the current problems with licence management and copy protection and outlines a new method and system that solve these problems. The WARP system (Works, Authors, Royalties, and Payments) is based on global registration and transfer monitoring of digital works, and accounting and collection of Internet levy funded usage fees payable to the authors and right holders of the works. The detection and counting of downloads is implemented with origrams, short and original parts picked from the contents of the digital work. The origrams are used to create digests, digital fingerprints that identify the piece of work transmitted over the Internet without the need to embed ID tags or any other easily removable metadata in the file.
Resumo:
Marketing of goods under geographical names has always been common. Aims to prevent abuse have given rise to separate forms of legal protection for geographical indications (GIs) both nationally and internationally. The European Community (EC) has also gradually enacted its own legal regime to protect geographical indications. The legal protection of GIs has traditionally been based on the idea that geographical origin endows a product exclusive qualities and characteristics. In today s world we are able to replicate almost any prod-uct anywhere, including its qualities and characteristics. One would think that this would preclude protec-tion from most geographical names, yet the number of geographical indications seems to be rising. GIs are no longer what they used to be. In the EC it is no longer required that a product is endowed exclusive characteristics by its geographical origin as long as consumers associate the product with a certain geo-graphical origin. This departure from the traditional protection of GIs is based on the premise that a geographical name extends beyond and exists apart from the product and therefore deserves protection itself. The thesis tries to clearly articulate the underlying reasons, justifications, principles and policies behind the protection of GIs in the EC and then scrutinise the scope and shape of the GI system in the light of its own justifications. The essential questions it attempts to aswer are (1) What is the basis and criteria for granting GI rights? (2) What is the scope of protection afforded to GIs? and (3) Are these both justified in the light of the functions and policies underlying granting and protecting of GIs? Despite the differences, the actual functions of GIs are in many ways identical to those of trade marks. Geographical indications have a limited role as source and quality indicators in allowing consumers to make informed and efficient choices in the market place. In the EC this role is undermined by allowing able room and discretion for uses that are arbitrary. Nevertheless, generic GIs are unable to play this role. The traditional basis for justifying legal protection seems implausible in most case. Qualities and charac-teristics are more likely to be related to transportable skill and manufacturing methods than the actual geographical location of production. Geographical indications are also incapable of protecting culture from market-induced changes. Protection against genericness, against any misuse, imitation and evocation as well as against exploiting the reputation of a GI seem to be there to protect the GI itself. Expanding or strengthening the already existing GI protection or using it to protect generic GIs cannot be justified with arguments on terroir or culture. The conclusion of the writer is that GIs themselves merit protection only in extremely rare cases and usually only the source and origin function of GIs should be protected. The approach should not be any different from one taken in trade mark law. GI protection should not be used as a means to mo-nopolise names. At the end of the day, the scope of GI protection is nevertheless a policy issue.
Resumo:
Although shame is a universal human emotion and is one of the most difficult emotions to overcome, its origins and nature as well as its effects on psychosocial functioning are not well understood or defined. While psychological and spiritual counselors are aware of the effects and consequences of shame for an individual s internal well-being and social life, shame is often still considered a taboo topic and is not given adequate attention. This study aims to explain the developmental process and effects of shame and shame-proneness for individuals and provide tools for practitioners to work more effectively with their clients who struggle with shame. This study presents the empirical foundation for a grounded theory that describes and explains the nature, origins, and consequences of shame-proneness. The study focused on Finnish participants childhood, adolescence and adulthood experiences and why they developed shame-proneness, what it meant for them as children and adolescents and what it meant for them as adults. The data collection phase of this study began in 2000. The participants were recruited through advertisements in local and country-wide newspapers and magazines. Altogether 325 people responded to the advertisements by sending an essay concerning their shame and guilt experiences. For the present study, 135 essays were selected and from those who sent an essay 19 were selected for in-depth interviews. In addition to essays and interviews, participants personal notebooks and childhood hospital and medical reports as well as their scores on the Internalized Shame Scale were analyzed. The development of shame-proneness and significant experiences and events during childhood and adolescence (e.g., health, parenting and parents behavior, humiliation, bullying, neglect, maltreatment and abuse) are discussed and the connections of shame-proneness to psychological concepts such as self-esteem, attachment, perfectionism, narcissism, submissiveness, pleasing others, heightened interpersonal subjectivity, and codependence are explained. Relationships and effects of shame-proneness on guilt, spirituality, temperament, coping strategies, defenses, personality formation and psychological health are also explicated. In addition, shame expressions and the development of shame triggers as well as internalized and externalized shame are clarified. These connections and developments are represented by the core category lack of gaining love, validation and protection as the authentic self. The conclusions drawn from the study include a categorization of shame-prone Finnish people according to their childhood and adolescent experiences and the characteristics of their shame-proneness and personality. Implications for psychological and spiritual counseling are also discussed. Key words: shame, internalized shame, external shame, shame development, shame triggers, guilt, self-esteem, attachment, narcissism, perfectionism, submissiveness, codependence, childhood neglect, childhood abuse, childhood maltreatment, emotional abuse, sexual abuse, spiritual abuse, psychological well-being
Resumo:
Schutzbrief and marriage permit for Bonuit Hayum, granted by Friedrich August, Herzog zu Nassau, Wiesbaden, manuscript and seal; includes English translation
Resumo:
While much has been written about the relationship between personal epistemologies and learning-teaching approaches, outcomes, and intentions, little has focused specifically on these relationships in the context of teacher education. This chapter addresses changes in preservice teachers’ personal epistemologies by overviewing this emerging body of research and arguing for a new approach to conceptualizing and supporting changes in personal epistemologies based on reflexivity. The overview includes definitions of key concepts and research traditions that have been used since the 1970s and a discussion of the emerging role of epistemic justification as a key mechanism of change in the process of belief development.
Resumo:
This dissertation consists of an introductory section and three theoretical essays analyzing the interaction of corporate governance and restructuring. The essays adopt an incomplete contracts approach and analyze the role of different institutional designs to facilitate the alignment of the objectives of shareholders and management (or employees) over the magnitude of corporate restructuring. The first essay analyzes how a firm's choice of production technology affects the employees' human capital investment. In the essay, the owners of the firm can choose between a specific and a general technology that both require a costly human capital investment by the employees. The specific technology is initially superior in using the human capital of employees but, in contrast to the general technology, it is not compatible with future innovations. As a result, anticipated changes in the specific technology diminish the ex ante incentives of the employees to invest in human capital unless the shareholders grant the employees specific governance mechanisms (a right of veto, severance pay) so as to protect their investments. The results of the first essay indicate that the level of protection that the shareholders are willing to offer falls short of the socially desirable one. Furthermore, when restructuring opportunities become more abundant, it becomes more attractive both socially and from the viewpoint of the shareholders to initially adopt the general technology. The second essay analyzes how the allocation of authority within the firm interacts with the owners' choice of business strategy when the ability of the owners to monitor the project proposals of the management is biased in favor of the status quo strategy. The essay shows that a bias in the monitoring ability will affect not only the allocation of authority within the firm but also the choice of business strategy. Especially, when delegation has positive managerial incentive effects, delegation turns out to be more attractive under the new business strategy because the improved managerial incentives are a way for the owners to compensate their own reduced information gathering ability. This effect, however, simultaneously makes the owners hesitant to switch the strategy since it would involve a more frequent loss of control over the project choice. Consequently, the owners' lack of knowledge of the new business strategy may lead to a suboptimal choice of strategy. The third essay analyzes the implications of CEO succession process for the ideal board structure. In this essay, the presence of the departing CEO on the board facilitates the ability of the board to find a matching successor and to counsel him. However, the ex-CEO's presence may simultaneously also weaken the ability of the board to restructure since the predecessor may use the opportunity to distort the successor's project choice. The results of the essay suggest that the extent of restructuring gains, the firm's ability to hire good outside directors and the importance of board's advisory role affect at which point and for how long the shareholders may want to nominate the predecessor to the board.
Resumo:
Democratic Legitimacy and the Politics of Rights is a research in normative political theory, based on comparative analysis of contemporary democratic theories, classified roughly as conventional liberal, deliberative democratic and radical democratic. Its focus is on the conceptual relationship between alternative sources of democratic legitimacy: democratic inclusion and liberal rights. The relationship between rights and democracy is studied through the following questions: are rights to be seen as external constraints to democracy or as objects of democratic decision making processes? Are individual rights threatened by public participation in politics; do constitutionally protected rights limit the inclusiveness of democratic processes? Are liberal values such as individuality, autonomy and liberty; and democratic values such as equality, inclusion and popular sovereignty mutually conflictual or supportive? Analyzing feminist critique of liberal discourse, the dissertation also raises the question about Enlightenment ideals in current political debates: are the universal norms of liberal democracy inherently dependent on the rationalist grand narratives of modernity and incompatible with the ideal of diversity? Part I of the thesis introduces the sources of democratic legitimacy as presented in the alternative democratic models. Part II analyses how the relationship between rights and democracy is theorized in them. Part III contains arguments by feminists and radical democrats against the tenets of universalist liberal democratic models and responds to that critique by partly endorsing, partly rejecting it. The central argument promoted in the thesis is that while the deconstruction of modern rationalism indicates that rights are political constructions as opposed to externally given moral constraints to politics, this insight does not delegitimize the politics of universal rights as an inherent part of democratic institutions. The research indicates that democracy and universal individual rights are mutually interdependent rather than oppositional; and that democracy is more dependent on an unconditional protection of universal individual rights when it is conceived as inclusive, participatory and plural; as opposed to robust majoritarian rule. The central concepts are: liberalism, democracy, legitimacy, deliberation, inclusion, equality, diversity, conflict, public sphere, rights, individualism, universalism and contextuality. The authors discussed are e.g. John Rawls, Jürgen Habermas, Seyla Benhabib, Iris Young, Chantal Mouffe and Stephen Holmes. The research focuses on contemporary political theory, but the more classical work of John S. Mill, Benjamin Constant, Isaiah Berlin and Hannah Arendt is also included.
Resumo:
Technologies that facilitate the collection and sharing of personal information can feed people's desire for enhanced self-knowledge and help them to change their behaviour, yet for various reasons people can also be reluctant to use such technologies. This paper explores this tension through an interview study in the context of smoking cessation. Our findings show that smokers and recent ex-smokers were ambivalent about their behaviour change as well as about collecting personal information through technology and sharing it with other users. We close with a summary of three challenges emerging from such ambivalence and directions to address them.
Resumo:
Väitöskirjassani tarkastelen informaatiohyödykkeiden ja tekijänoikeuksien taloustiedettä kahdesta eri perspektiivistä. Niistä ensimmäinen kuuluu endogeenisen kasvuteorian alaan. Väitöskirjassani yleistän ”pool of knowledge” -tyyppisen endogeenisen kasvumallin tilanteeseen, jossa patentoitavissa olevalla innovaatiolla on minimikoko, ja jossa uudenlaisen tuotteen patentoinut yritys voi menettää monopolinsa tuotteeseen jäljittelyn johdosta. Mallin kontekstissa voidaan analysoida jäljittelyn ja innovaatioilta vaaditun ”minimikoon” vaikutuksia hyvinvointiin ja talouskasvuun. Kasvun maksimoiva imitaation määrä on mallissa aina nolla, mutta hyvinvoinnin maksimoiva imitaation määrä voi olla positiivinen. Talouskasvun ja hyvinvoinnin maksimoivalla patentoitavissa olevan innovaation ”minimikoolla” voi olla mikä tahansa teoreettista maksimia pienempi arvo. Väitöskirjani kahdessa jälkimmäisessä pääluvussa tarkastelen informaatiohyödykkeiden kaupallista piratismia mikrotaloustieteellisen mallin avulla. Informaatiohyödykkeistä laittomasti tehtyjen kopioiden tuotantokustannukset ovat pienet, ja miltei olemattomat silloin kun niitä levitetään esimerkiksi Internetissä. Koska piraattikopioilla on monta eri tuottajaa, niiden hinnan voitaisiin mikrotaloustieteen teorian perusteella olettaa laskevan melkein nollaan, ja jos näin kävisi, kaupallinen piratismi olisi mahdotonta. Mallissani selitän kaupallisen piratismin olemassaolon olettamalla, että piratismista saatavan rangaistuksen uhka riippuu siitä, kuinka monille kuluttajille piraatti tarjoaa laittomia hyödykkeitä, ja että se siksi vaikuttaa piraattikopioiden markkinoihin mainonnan kustannuksen tavoin. Kaupallisten piraattien kiinteiden kustannusten lisääminen on mallissani aina tekijänoikeuksien haltijan etujen mukaista, mutta ”mainonnan kustannuksen” lisääminen ei välttämättä ole, vaan se saattaa myös alentaa laillisten kopioiden myynnistä saatavia voittoja. Tämä tulos poikkeaa vastaavista aiemmista tuloksista sikäli, että se pätee vaikka tarkasteltuihin informaatiohyödykkeisiin ei liittyisi verkkovaikutuksia. Aiemmin ei-kaupallisen piratismin malleista on usein johdettu tulos, jonka mukaan informaatiohyödykkeen laittomat kopiot voivat kasvattaa laillisten kopioiden myynnistä saatavia voittoja jos laillisten kopioiden arvo niiden käyttäjille riippuu siitä, kuinka monet muut kuluttajat käyttävät samanlaista hyödykettä ja jos piraattikopioiden saatavuus lisää riittävästi laillisten kopioiden arvoa. Väitöskirjan viimeisessä pääluvussa yleistän mallini verkkotoimialoille, ja tutkin yleistämäni mallin avulla sitä, missä tapauksissa vastaava tulos pätee myös kaupalliseen piratismiin.
Resumo:
This thesis clarifies important molecular pathways that are activated during the cell death observed in Huntington’s disease. Huntington’s disease is one of the most common inherited neurodegenerative diseases, which is primarily inherited in an autosomal dominant manner. HD is caused by an expansion of CAG repeats in the first exon of the IT15 gene. IT15 encodes the production of a Huntington’s disease protein huntingtin. Mutation of the IT15 gene results in a long stretch of polyQ residues close to the amino-terminal region of huntingtin. Huntington’s disease is a fatal autosomal neurodegenerative disorder. Despite the current knowledge of HD, the precise mechanism behind the selective neuronal death, and how the disease propagates, still remains an enigma. The studies mainly focused on the control of endoplasmic reticulum (ER) stress triggered by the mutant huntingtin proteins. The ER is a delicate organelle having essential roles in protein folding and calcium regulation. Even the slightest perturbations on ER homeostasis are effective enough to trigger ER stress and its adaptation pathways, called unfolded protein response (UPR). UPR is essential for cellular homeostasis and it adapts ER to the changing environment and decreases ER stress. If adaptation processes fail and stress is excessive and prolonged; irreversible cell death pathways are engaged. The results showed that inhibition of ER stress with chemical agents are able to decrease cell death and formation of toxic cell aggregates caused by mutant huntingtin proteins. The study concentrated also to the NF-κB (nuclear factor-kappaB) pathway, which is activated during ER stress. NF-κB pathway is capable to regulate the levels of important cellular antioxidants. Cellular antioxidants provide a first line of defence against excess reactive oxygen species. Excess accumulation of reactive oxygen species and subsequent activation of oxidative stress damages motley of vital cellular processes and induce cell degeneration. Data showed that mutant huntingtin proteins downregulate the expression levels of NF-κB and vital antioxidants, which was followed by increased oxidative stress and cell death. Treatment with antioxidants and inhibition of oxidative stress were able to counteract these adverse effects. In addition, thesis connects ER stress caused by mutant huntingtin to the cytoprotective autophagy. Autophagy sustains cellular balance by degrading potentially toxic cell proteins and components observed in Huntington’s disease. The results revealed that cytoprotective autophagy is active at the early points (24h) of ER stress after expression of mutant huntingtin proteins. GADD34 (growth arrest and DNA damage-inducible gene 34), which is previously connected to the regulation of translation during cell stress, was shown to control the stimulation of autophagy. However, GADD34 and autophagy were downregulated at later time points (48h) during mutant huntingtin proteins induced ER stress, and subsequently cell survival decreased. Overexpression GADD34 enhanced autophagy and decreased cell death, indicating that GADD34 plays a critical role in cell protection. The thesis reveales new interesting data about the neuronal cell death pathways seen in Huntington’s disease, and how cell degeneration is partly counteracted by various therapeutic agents. Expression of mutant huntingtin proteins is shown to alter signaling events that control ER stress, oxidative stress and autophagy. Despite that Huntington’s disease is mainly an untreatable disorder; these findings offer potential targets and neuroprotective strategies in designing novel therapies for Huntington’s disease.
Resumo:
All positive-strand RNA viruses utilize cellular membranes for the assembly of their replication complexes, which results in extensive membrane modification in infected host cells. These alterations act as structural and functional scaffolds for RNA replication, providing protection for the viral double-stranded RNA against host defences. It is known that different positive-strand RNA viruses alter different cellular membranes. However, the origin of the targeted membranes, the mechanisms that direct replication proteins to specific membranes and the steps in the formation of the membrane bound replication complex are not completely understood. Alphaviruses (including Semliki Forest virus, SFV), members of family Togaviridae, replicate their RNA in association with membranes derived from the endosomal and lysosomal compartment, inducing membrane invaginations called spherules. Spherule structures have been shown to be the specific sites for RNA synthesis. Four replication proteins, nsP1-nsP4, are translated as a polyprotein (P1234) which is processed autocatalytically and gives rise to a membrane-bound replication complex. Membrane binding is mediated via nsP1 which possesses an amphipathic α-helix (binding peptide) in the central region of the protein. The aim of this thesis was to characterize the association of the SFV replication complex with cellular membranes and the modification of the membranes during virus infection. Therefore, it was necessary to set up the system for determining which viral components are needed for inducing the spherules. In addition, the targeting of the replication complex, the formation site of the spherules and their intracellular trafficking were studied in detail. The results of current work demonstrate that mutations in the binding peptide region of nsP1 are lethal for virus replication and change the localization of the polyprotein precursor P123. The replication complex is first targeted to the plasma membrane where membrane invaginations, spherules, are induced. Using a specific regulated endocytosis event the spherules are internalized from the plasma membrane in neutral carrier vesicles and transported via an actin-and microtubule-dependent manner to the pericentriolar area. Homotypic fusions and fusions with pre-existing acidic organelles lead to the maturation of previously described cytopathic vacuoles with hundreds of spherules on their limiting membranes. This work provides new insights into the membrane binding mechanism of SFV replication complex and its role in the virus life cycle. Development of plasmid-driven system for studying the formation of the replication complex described in this thesis allows various applications to address different steps in SFV life cycle and virus-host interactions in the future. This trans-replication system could be applied for many different viruses. In addition, the current work brings up new aspects of membranes and cellular components involved in SFV replication leading to further understanding in the formation and dynamics of the membrane-associated replication complex.
Resumo:
The tackling of coastal eutrophication requires water protection measures based on status assessments of water quality. The main purpose of this thesis was to evaluate whether it is possible both scientifically and within the terms of the European Union Water Framework Directive (WFD) to assess the status of coastal marine waters reliably by using phytoplankton biomass (ww) and chlorophyll a (Chl) as indicators of eutrophication in Finnish coastal waters. Empirical approaches were used to study whether the criteria, established for determining an indicator, are fulfilled. The first criterion (i) was that an indicator should respond to anthropogenic stresses in a predictable manner and has low variability in its response. Summertime Chl could be predicted accurately by nutrient concentrations, but not from the external annual loads alone, because of the rapid affect of primary production and sedimentation close to the loading sources in summer. The most accurate predictions were achieved in the Archipelago Sea, where total phosphorus (TP) and total nitrogen (TN) alone accounted for 87% and 78% of the variation in Chl, respectively. In river estuaries, the TP mass-balance regression model predicted Chl most accurately when nutrients originated from point-sources, whereas land-use regression models were most accurate in cases when nutrients originated mainly from diffuse sources. The inclusion of morphometry (e.g. mean depth) into nutrient models improved accuracy of the predictions. The second criterion (ii) was associated with the WFD. It requires that an indicator should have type-specific reference conditions, which are defined as "conditions where the values of the biological quality elements are at high ecological status". In establishing reference conditions, the empirical approach could only be used in the outer coastal water types, where historical observations of Secchi depth of the early 1900s are available. The most accurate prediction was achieved in the Quark. In the inner coastal water types, reference Chl, estimated from present monitoring data, are imprecise - not only because of the less accurate estimation method but also because the intrinsic characteristics, described for instance by morphometry, vary considerably inside these extensive inner coastal types. As for phytoplankton biomass, the reference values were less accurate than in the case of Chl, because it was possible to estimate reference conditions for biomass only by using the reconstructed Chl values, not the historical Secchi observations. An paleoecological approach was also applied to estimate annual average reference conditions for Chl. In Laajalahti, an urban embayment off Helsinki, strongly loaded by municipal waste waters in the 1960s and 1970s, reference conditions prevailed in the mid- and late 1800s. The recovery of the bay from pollution has been delayed as a consequence of benthic release of nutrients. Laajalahti will probably not achieve the good quality objectives of the WFD on time. The third criterion (iii) was associated with coastal management including the resources it has available. Analyses of Chl are cheap and fast to carry out compared to the analyses of phytoplankton biomass and species composition; the fact which has an effect on number of samples to be taken and thereby on the reliability of assessments. However, analyses on phytoplankton biomass and species composition provide more metrics for ecological classification, the metrics which reveal various aspects of eutrophication contrary to what Chl alone does.