714 resultados para reliance


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Evidence suggests that incumbent parties find it harder to be re-elected in emerging than in advanced democracies because of more serious economic problems in the former. Yet the pro-Islamic Justice and Development Party (AKP) has ruled Turkey since 2002. Does economic performance sufficiently account for the electoral strength of the AKP government? Reliance on economic performance alone to gain public support makes a government vulnerable to economic fluctuations. This study includes time-series regressions for the period 1950-2011 in Turkey and demonstrates that even among Turkey's long-lasting governments, the AKP has particular electoral strength that cannot be adequately explained by economic performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed real-time embedded systems are becoming increasingly important to society. More demands will be made on them and greater reliance will be placed on the delivery of their services. A relevant subset of them is high-integrity or hard real-time systems, where failure can cause loss of life, environmental harm, or significant financial loss. Additionally, the evolution of communication networks and paradigms as well as the necessity of demanding processing power and fault tolerance, motivated the interconnection between electronic devices; many of the communications have the possibility of transferring data at a high speed. The concept of distributed systems emerged as systems where different parts are executed on several nodes that interact with each other via a communication network. Java’s popularity, facilities and platform independence have made it an interesting language for the real-time and embedded community. This was the motivation for the development of RTSJ (Real-Time Specification for Java), which is a language extension intended to allow the development of real-time systems. The use of Java in the development of high-integrity systems requires strict development and testing techniques. However, RTJS includes a number of language features that are forbidden in such systems. In the context of the HIJA project, the HRTJ (Hard Real-Time Java) profile was developed to define a robust subset of the language that is amenable to static analysis for high-integrity system certification. Currently, a specification under the Java community process (JSR- 302) is being developed. Its purpose is to define those capabilities needed to create safety critical applications with Java technology called Safety Critical Java (SCJ). However, neither RTSJ nor its profiles provide facilities to develop distributed realtime applications. This is an important issue, as most of the current and future systems will be distributed. The Distributed RTSJ (DRTSJ) Expert Group was created under the Java community process (JSR-50) in order to define appropriate abstractions to overcome this problem. Currently there is no formal specification. The aim of this thesis is to develop a communication middleware that is suitable for the development of distributed hard real-time systems in Java, based on the integration between the RMI (Remote Method Invocation) model and the HRTJ profile. It has been designed and implemented keeping in mind the main requirements such as the predictability and reliability in the timing behavior and the resource usage. iThe design starts with the definition of a computational model which identifies among other things: the communication model, most appropriate underlying network protocols, the analysis model, and a subset of Java for hard real-time systems. In the design, the remote references are the basic means for building distributed applications which are associated with all non-functional parameters and resources needed to implement synchronous or asynchronous remote invocations with real-time attributes. The proposed middleware separates the resource allocation from the execution itself by defining two phases and a specific threading mechanism that guarantees a suitable timing behavior. It also includes mechanisms to monitor the functional and the timing behavior. It provides independence from network protocol defining a network interface and modules. The JRMP protocol was modified to include two phases, non-functional parameters, and message size optimizations. Although serialization is one of the fundamental operations to ensure proper data transmission, current implementations are not suitable for hard real-time systems and there are no alternatives. This thesis proposes a predictable serialization that introduces a new compiler to generate optimized code according to the computational model. The proposed solution has the advantage of allowing us to schedule the communications and to adjust the memory usage at compilation time. In order to validate the design and the implementation a demanding validation process was carried out with emphasis in the functional behavior, the memory usage, the processor usage (the end-to-end response time and the response time in each functional block) and the network usage (real consumption according to the calculated consumption). The results obtained in an industrial application developed by Thales Avionics (a Flight Management System) and in exhaustive tests show that the design and the prototype are reliable for industrial applications with strict timing requirements. Los sistemas empotrados y distribuidos de tiempo real son cada vez más importantes para la sociedad. Su demanda aumenta y cada vez más dependemos de los servicios que proporcionan. Los sistemas de alta integridad constituyen un subconjunto de gran importancia. Se caracterizan por que un fallo en su funcionamiento puede causar pérdida de vidas humanas, daños en el medio ambiente o cuantiosas pérdidas económicas. La necesidad de satisfacer requisitos temporales estrictos, hace más complejo su desarrollo. Mientras que los sistemas empotrados se sigan expandiendo en nuestra sociedad, es necesario garantizar un coste de desarrollo ajustado mediante el uso técnicas adecuadas en su diseño, mantenimiento y certificación. En concreto, se requiere una tecnología flexible e independiente del hardware. La evolución de las redes y paradigmas de comunicación, así como la necesidad de mayor potencia de cómputo y de tolerancia a fallos, ha motivado la interconexión de dispositivos electrónicos. Los mecanismos de comunicación permiten la transferencia de datos con alta velocidad de transmisión. En este contexto, el concepto de sistema distribuido ha emergido como sistemas donde sus componentes se ejecutan en varios nodos en paralelo y que interactúan entre ellos mediante redes de comunicaciones. Un concepto interesante son los sistemas de tiempo real neutrales respecto a la plataforma de ejecución. Se caracterizan por la falta de conocimiento de esta plataforma durante su diseño. Esta propiedad es relevante, por que conviene que se ejecuten en la mayor variedad de arquitecturas, tienen una vida media mayor de diez anos y el lugar ˜ donde se ejecutan puede variar. El lenguaje de programación Java es una buena base para el desarrollo de este tipo de sistemas. Por este motivo se ha creado RTSJ (Real-Time Specification for Java), que es una extensión del lenguaje para permitir el desarrollo de sistemas de tiempo real. Sin embargo, RTSJ no proporciona facilidades para el desarrollo de aplicaciones distribuidas de tiempo real. Es una limitación importante dado que la mayoría de los actuales y futuros sistemas serán distribuidos. El grupo DRTSJ (DistributedRTSJ) fue creado bajo el proceso de la comunidad de Java (JSR-50) con el fin de definir las abstracciones que aborden dicha limitación, pero en la actualidad aun no existe una especificacion formal. El objetivo de esta tesis es desarrollar un middleware de comunicaciones para el desarrollo de sistemas distribuidos de tiempo real en Java, basado en la integración entre el modelo de RMI (Remote Method Invocation) y el perfil HRTJ. Ha sido diseñado e implementado teniendo en cuenta los requisitos principales, como la predecibilidad y la confiabilidad del comportamiento temporal y el uso de recursos. El diseño parte de la definición de un modelo computacional el cual identifica entre otras cosas: el modelo de comunicaciones, los protocolos de red subyacentes más adecuados, el modelo de análisis, y un subconjunto de Java para sistemas de tiempo real crítico. En el diseño, las referencias remotas son el medio básico para construcción de aplicaciones distribuidas las cuales son asociadas a todos los parámetros no funcionales y los recursos necesarios para la ejecución de invocaciones remotas síncronas o asíncronas con atributos de tiempo real. El middleware propuesto separa la asignación de recursos de la propia ejecución definiendo dos fases y un mecanismo de hebras especifico que garantiza un comportamiento temporal adecuado. Además se ha incluido mecanismos para supervisar el comportamiento funcional y temporal. Se ha buscado independencia del protocolo de red definiendo una interfaz de red y módulos específicos. También se ha modificado el protocolo JRMP para incluir diferentes fases, parámetros no funcionales y optimizaciones de los tamaños de los mensajes. Aunque la serialización es una de las operaciones fundamentales para asegurar la adecuada transmisión de datos, las actuales implementaciones no son adecuadas para sistemas críticos y no hay alternativas. Este trabajo propone una serialización predecible que ha implicado el desarrollo de un nuevo compilador para la generación de código optimizado acorde al modelo computacional. La solución propuesta tiene la ventaja que en tiempo de compilación nos permite planificar las comunicaciones y ajustar el uso de memoria. Con el objetivo de validar el diseño e implementación se ha llevado a cabo un exigente proceso de validación con énfasis en: el comportamiento funcional, el uso de memoria, el uso del procesador (tiempo de respuesta de extremo a extremo y en cada uno de los bloques funcionales) y el uso de la red (consumo real conforme al estimado). Los buenos resultados obtenidos en una aplicación industrial desarrollada por Thales Avionics (un sistema de gestión de vuelo) y en las pruebas exhaustivas han demostrado que el diseño y el prototipo son fiables para aplicaciones industriales con estrictos requisitos temporales.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Europe needs to restructure its energy system. The aim to decrease the reliance on fossil fuels to a higher dependence on renewable energy has now been imposed by The European Commission. In order to achieve this goal there is a great interest in Norway to become "The Green Battery of Europe". In the pursuit of this goal a GIS-tool was created to investigate the pump storage potential in Norway. The tool searches for possible connections between existing reservoirs and dams with the criteria selected by the user. The aim of this thesis was to test the tool and see if the results suggested were plausible, develop a cost calculation method for the PSH lines, and make suggestions for further development of the tool. During the process the tool presented many non-feasible pumped storage hydropower (PSH) connections. The area of Telemark was chosen for the more detailed study. The results were discussed and some improvements were suggested for further development of the tool. Also a sensitivity test was done to see which of the parameters set by the user are the most relevant for the PSH connection suggestion. From a range of the most promising PSH plants suggested by the tool, the one between Songavatn and Totak was chosen for a case study, where there already exists a power plant between both reservoirs. A new Pumped Storage Plant was designed with a power production of 1200 MW. There are still many topics open to discussion, such as how to deal with environmental restrictions, or how to deal with inflows and outflows of the reservoirs from the existing power plants. Consequently the GIS-tool can be a very useful tool to establish the best possible connections between existing reservoirs and dams, but it still needs a deep study and the creation of new parameters for the user.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El presente Trabajo de Fin de Grado (TFG) es el resultado de la necesidad de la seguridad en la construcción del software ya que es uno de los mayores problemas con que se enfrenta hoy la industria debido a la baja calidad de la misma tanto en software de Sistema Operativo, como empotrado y de aplicaciones. La creciente dependencia de software para que se hagan trabajos críticos significa que el valor del software ya no reside únicamente en su capacidad para mejorar o mantener la productividad y la eficiencia. En lugar de ello, su valor también se deriva de su capacidad para continuar operando de forma fiable incluso de cara de los eventos que la amenazan. La capacidad de confiar en que el software seguirá siendo fiable en cualquier circunstancia, con un nivel de confianza justificada, es el objetivo de la seguridad del software. Seguridad del software es importante porque muchas funciones críticas son completamente dependientes del software. Esto hace que el software sea un objetivo de valor muy alto para los atacantes, cuyos motivos pueden ser maliciosos, penales, contenciosos, competitivos, o de naturaleza terrorista. Existen fuentes muy importantes de mejores prácticas, métodos y herramientas para mejorar desde los requisitos en sus aspectos no funcionales, ciclo de vida del software seguro, pasando por la dirección de proyectos hasta su desarrollo, pruebas y despliegue que debe ser tenido en cuenta por los desarrolladores. Este trabajo se centra fundamentalmente en elaborar una guía de mejores prácticas con la información existente CERT, CMMI, Mitre, Cigital, HP, y otras fuentes. También se plantea desarrollar un caso práctico sobre una aplicación dinámica o estática con el fin de explotar sus vulnerabilidades.---ABSTRACT---This Final Project Grade (TFG) is the result of the need for security in software construction as it is one of the biggest problems facing the industry today due to the low quality of it both OS software, embedded software and applications software. The increasing reliance on software for critical jobs means that the value of the software no longer resides solely in its capacity to improve or maintain productivity and efficiency. Instead, its value also stems from its ability to continue to operate reliably even when facing events that threaten it. The ability to trust that the software will remain reliable in all circumstances, with justified confidence level is the goal of software security. The security in software is important because many critical functions are completely dependent of the software. This makes the software to be a very high value target for attackers, whose motives may be by a malicious, by crime, for litigating, by competitiveness or by a terrorist nature. There are very important sources of best practices, methods and tools to improve the requirements in their non-functional aspects, the software life cycle with security in mind, from project management to its phases (development, testing and deployment) which should be taken into account by the developers. This paper focuses primarily on developing a best practice guide with existing information from CERT, CMMI, Mitre, Cigital, HP, and other organizations. It also aims to develop a case study on a dynamic or static application in order to exploit their vulnerabilities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Historically, the prediction of safety margins has been based on system level thermal-hydraulic calculations employing suitable empirical formulations for assembly specific geometries and fuel-element grid spacers. These works have assessed response, margins, and consequences for the system based on one-dimensional two-fluid or drift-flux type thermalhydraulics formulations with fuel-vendor specific hydraulic losses and heat transfer characteristics for various fuel assemblies, including the so-called hot channel. Analysis of the hot channel gives important information on flow rates, fuel element centerline temperature, fuel sheath temperature, and margin to the departure from nucleate boiling. Given the reliance of the above approaches on empirical formulations obtained from complex and often difficult experiments, there is significant interest in obtaining reliable and accurate results from computation tools which employ more fundamental empirical relationships which can be obtained from subsets of the domain or from other scaled experiments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En las últimas décadas, la agricultura sostenible ha sido objeto de gran interés y debate académico, no sólo en términos conceptuales, sino también en términos metodológicos. La persistencia de la inseguridad alimentaria y el deterioro de los recursos naturales en muchas regiones del mundo, ha provocado el surgimiento de numerosas iniciativas centradas en revitalizar la agricultura campesina así como renovadas discusiones sobre el rol que juega la agricultura como motor de desarrollo y principal actividad para alivio de la pobreza. Por ello, cuando hablamos de evaluar sistemas campesinos de montaña, debemos considerar tanto la dimensión alimentaria como las especificidades propias de los sistemas montañosos como base fundamental de la sostenibilidad. Al evaluar la contribución que han hecho alternativas tecnológicas y de manejo en la mejora de la sostenibilidad y la seguridad alimentaria de los sistemas campesinos de montaña en Mesoamérica, surgen tres preguntas de investigación: • ¿Se está evaluando la sostenibilidad de los sistemas campesinos teniendo en cuenta la variabilidad climática, la participación de los agricultores y las dinámicas temporales? • ¿Podemos rescatar tendencias comunes en estos sistemas y extrapolar los resultados a otras zonas? • ¿Son inequívocamente positivas las alternativas propuestas que se han llevado a cabo? En este trabajo se presentan tres evaluaciones de sostenibilidad que tratan de poner de manifiesto cuáles son los retos y oportunidades que enfrentan actualmente los sistemas campesinos de montaña. En primer lugar, se evalúan tres sistemas de manejo agrícola bajo dos años meteorológicamente contrastantes. Se determinó que durante el año que experimentó lluvias abundantes y temperaturas moderadas, los sistemas de bajos insumos, basados en el uso de abonos orgánicos y rotación de cultivos, obtuvieron los mejores resultados en indicadores ecológicos y similares resultados en los económicos y sociales que el sistema de altos insumos químicos. En el segundo año, con heladas tempranas y sequía invernal, la productividad se redujo para todos los sistemas pero los sistemas más diversificados (en variedades de maíz y/o siembra de otros cultivos) pudieron resistir mejor los contratiempos climáticos. En segundo lugar, se evalúa el grado de conocimiento (percepción) campesino para determinar los factores claves que determinan la sostenibilidad de sus sistemas y su seguridad alimentaria. Se determinó que los principales puntos críticos identificados por los campesinos (tamaño de parcela y pendiente del terreno) afectan de forma significativa a cuestiones de índole económica, pero no son capaces de explicar los desequilibrios alimenticios existentes. Realizando un análisis comparativo entre comunidades que presentaban buenos y malos resultados en cuanto a aporte energético y proteico, se determinó que la seguridad alimentaria estaba relacionada con la sostenibilidad de los sistemas y que concretamente estaba ligada a los atributos de equidad y autonomía. Otro resultado destacable fue que las comunidades más marginales y con mayor dificultad de acceso mostraron mayores niveles de inseguridad alimentaria, pero la variabilidad intergrupal fue muy alta. Eso demuestra que la seguridad alimentaria y nutricional forma parte de un complejo sistema de estrategias de autoabastecimiento ligada a la idiosincrasia misma de cada uno de los hogares. En tercer lugar, se evaluó el desempeño de las escuelas de campo de agricultores (ECAs) en la mejora de la sostenibilidad y la seguridad alimentaria de un sistema campesino de montaña. Para ver el efecto del impacto de estas metodologías a largo plazo, se estudiaron tres comunidades donde se habían implementado ECAs hace 8, 5 y 3 años. Encontramos que el impacto fue progresivo ya que fue la comunidad más antigua la que mejores valores obtuvo. El impacto de las ECAs fue rápido y persistente en los indicadores relacionados con la participación, el acceso a servicios básicos y la conservación de los recursos naturales. El estudio demostró un claro potencial de las ECAs en la mejora general de la sostenibilidad y la seguridad alimentaria de estos sistemas, sin embargo se observó una relación directa entre el aumento de producción agrícola y el uso de insumos externos, lo que puede suponer un punto crítico para los ideales sostenibles. ABSTRACT During the last decades, sustainable agriculture has been the subject of considerable academic interest and debate, not only in conceptual terms, but also in methodological ones. The persistence of high levels of environmental degradation and food insecurity in many regions has led to new initiatives focused on revitalizing peasant agriculture and renewed discussions of the role of sustainable agriculture as an engine for development, environmental conservation and poverty alleviation. Therefore, to assess mountain farming systems, we must consider food dimension and taking into account the specificities of the mountain systems as the foundation of sustainability. When evaluating contribution of technological and management alternative proposals in achieving sustainability and food security for peasant farming systems in Mesoamerican highlands, three research questions arise: • Is sustainability of peasant-farming systems being evaluated taking into account climate variability, participation of farmers and temporal dynamics? • Can we rescue common trends in these systems and extrapolate the results to other areas? • What alternative proposals that have been conducted are unequivocally positives? In this document, we present three evaluations of sustainability that try to highlight the challenges and opportunities that currently face mountain farming systems in Mesoamerica. First, we evaluate the sustainability of three agricultural management systems in two contrasting weather years. We determined that during the first year that exposed heavy rains and moderate temperatures, low-input systems, which are based on the use of organic fertilizers and crop rotation, provided better results in terms of ecological indicators and equal results in terms of economic and social indicators than those achieved using a high chemical input system. In the second year, which featured early frosts and a winter drought, productivity declined in all systems; however, the most diversified systems (in terms of the maize varieties grown and the sowing of other crops) more successfully resisted these climatic adversities. Second, we evaluate the farmers’ perception to determine the key drivers for achieving their sustainability and food and nutritional security. We determined that the key factors identified by farmers (landholding size and slope of cropland) exerted significant impacts on economic disparities but did not explain the malnutrition levels. We compared two contrasting hamlets according to their energy and protein supply, one namely Limón Timoté (LT), which did not present food problems and Limón Peña Blanca (LP), which did exhibit food insecurity. The results showed that FNS is linked to sustainability, and it is primarily related to the sustainability attributes of self-reliance and equity. Although the more marginated and inaccessible community exhibited more food insecurity, food and nutritional security depend upon a complex array of self-sufficiency strategies that remain linked to individual household idiosyncrasies. Third, we evaluated the impact of farmer field schools for improving the sustainability and food security of peasant mountain systems. In order to appreciate the long-term impact, we studied three communities where FFSs were implemented eight, five and three years ago, respectively. We found that FFSs have a gradual impact, as the community that first implemented FFSs scores highest. The impact of FFSs was broad and long-lasting for indicators related to participation, access to basic services and conservation of natural resources. This study demonstrates the potential of FFSs, but more attention will have to be paid to critical indicators in order to scale up their potential in the future. We observed a direct relationship between the increase in agricultural production and the use of external inputs, which is a critical point for sustainable ideals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

DNA topoisomerase II is a homodimeric molecular machine that couples ATP usage to the transport of one DNA segment through a transient break in another segment. In the presence of a nonhydrolyzable ATP analog, the enzyme is known to promote a single turnover of DNA transport. Current models for the enzyme’s mechanism based on this result have hydrolysis of two ATPs as the last step, used only to reset the enzyme for another round of reaction. Using rapid-quench techniques, topoisomerase II recently was shown to hydrolyze its two bound ATPs in a strictly sequential manner. This result is incongruous with the models based on the nonhydrolyzable ATP analog data. Here we present evidence that hydrolysis of one ATP by topoisomerase II precedes, and accelerates, DNA transport. These results indicate that important features of this enzyme’s mechanism previously have been overlooked because of the reliance on nonhydrolyzable analogs for studying a single reaction turnover. A model for the mechanism of topoisomerase II is presented to show how hydrolysis of one ATP could drive DNA transport.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Ca2+ channel α1A-subunit is a voltage-gated, pore-forming membrane protein positioned at the intersection of two important lines of research: one exploring the diversity of Ca2+ channels and their physiological roles, and the other pursuing mechanisms of ataxia, dystonia, epilepsy, and migraine. α1A-Subunits are thought to support both P- and Q-type Ca2+ channel currents, but the most direct test, a null mutant, has not been described, nor is it known which changes in neurotransmission might arise from elimination of the predominant Ca2+ delivery system at excitatory nerve terminals. We generated α1A-deficient mice (α1A−/−) and found that they developed a rapidly progressive neurological deficit with specific characteristics of ataxia and dystonia before dying ≈3–4 weeks after birth. P-type currents in Purkinje neurons and P- and Q-type currents in cerebellar granule cells were eliminated completely whereas other Ca2+ channel types, including those involved in triggering transmitter release, also underwent concomitant changes in density. Synaptic transmission in α1A−/− hippocampal slices persisted despite the lack of P/Q-type channels but showed enhanced reliance on N-type and R-type Ca2+ entry. The α1A−/− mice provide a starting point for unraveling neuropathological mechanisms of human diseases generated by mutations in α1A.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Contracting to provide technological information (TI) is a significant challenge. TI is an unusual commodity in five ways. (i) TI is difficult to count and value; conventional indicators, such as patents and citations, hardly indicate value. TI is often sold at different prices to different parties. (ii) To value TI, it may be necessary to “give away the secret.” This danger, despite nondisclosure agreements, inhibits efforts to market TI. (iii) To prove its value, TI is often bundled into complete products, such as a computer chip or pharmaceutical product. Efficient exchange, by contrast, would involve merely the raw information. (iv) Sellers’ superior knowledge about TI’s value make buyers wary of overpaying. (v) Inefficient contracts are often designed to secure rents from TI. For example, licensing agreements charge more than marginal cost. These contracting difficulties affect the way TI is produced, encouraging self-reliance. This should be an advantage to large firms. However, small research and development firms spend more per employee than large firms, and nonprofit universities are major producers. Networks of organizational relationships, particularly between universities and industry, are critical in transmitting TI. Implicit barter—money for guidance—is common. Property rights for TI are hard to establish. Patents, quite suitable for better mousetraps, are inadequate for an era when we design better mice. Much TI is not patented, and what is patented sets fuzzy demarcations. New organizational forms are a promising approach to contracting difficulties for TI. Webs of relationships, formal and informal, involving universities, start-up firms, corporate giants, and venture capitalists play a major role in facilitating the production and spread of TI.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cutaneous melanomas of Tyr-SV40E transgenic mice (mice whose transgene consists of the tyrosinase promoter fused to the coding regions of simian virus 40 early genes) strikingly resemble human melanomas in their development and progression. Unlike human melanomas, the mouse tumors all arise in genetically identical individuals, thereby better enabling expression of specific genes to be characterized in relation to advancing malignancy. The products of pigment genes are of particular interest because peptides derived from these proteins have been reported to function as autoantigens with immunotherapeutic potential in some melanoma patients. However, the diminished pigmentation characteristic of many advanced melanomas raises the possibility that some of the relevant products may no longer be expressed in the most malignant cells. We have therefore investigated the contributions of several pigment genes in melanotic vs. relatively amelanotic components of primary and metastatic mouse melanomas. The analyses reveal marked differences within and among tumors in levels of mRNAs and proteins encoded by the wild-type alleles at the albino, brown, slaty, and silver loci. Tyrosinase (the protein encoded by the albino locus) was most often either absent or undetectable as melanization declined. The protein encoded by the slaty locus (tyrosinase-related protein 2) was the only one of those tested that was clearly present in all the tumor samples. These results suggest that sole reliance on targeting tyrosinase-based antigens might selectively favor survival of more malignant cells, whereas targeting the ensemble of the antigens tested might contribute toward a more inclusive and effective antimelanoma strategy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To combat unsustainable transportation systems characterized by reliance on petroleum, polluting emissions, traffic congestion and suburban sprawl, planners encourage mixed use, densely populated areas that provide individuals with opportunities to live, work, eat and shop without necessarily having to drive private automobiles to accommodate their needs. Despite these attempts, the frequency and duration of automobile trips has consistently increased in the United States throughout past decades. While many studies have focused on how residential proximity to transit influences travel behavior, the effect of workplace location has largely been ignored. This paper asks, does working near a TOD influence the travel behaviors of workers differently than workers living near a TOD? We examine the non-work travel behaviors of workers based upon their commuting mode and proximity to TODs. The data came from a 2009 travel behavior survey by the Denver Regional Council of Governments, which contains 8,000 households, 16,000 individuals, and nearly 80,000 trips. We measure sustainable travel behaviors as reduced mileage, reduced number of trips, and increased use of non-automobile transportation. The results of this study indicate that closer proximity of both households and workplaces to TODs decrease levels of car commuting and that non-car commuting leads to more sustainable personal travel behaviors characterized by more trips made with alternative modes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this thesis is to determine if households with moderate incomes have the opportunity to acquire pecuniary wealth. In an environment of increasing globalization, labor-eliminating technology, and an overburdened entitlement system, the position of wealth is necessary for households with a penchant for early retirement and particularly for those that will inevitably succumb to involuntary retirement. In these writings, qualitative and quantitative descriptions of wealth are offered; two microeconomic metrics are introduced to identify baseline wealth and to gauge proximity to this value; and strategies are devised to close the gap between these metrics. The construct of the economic intertemporal household budget was used as the basis for this research whereby conventional measures of wealth, i.e. net worth and liquid net worth, have been coupled with historical and empirical household data to define and extrapolate wealth and wealth proximity metrics. The major finding is wealth is a dynamic variable contingent upon consumption level rather than income or saving levels. And because households exercise a greater degree of autonomy over consumption, moderate earners are afforded the same opportunities as high earners. The position of wealth is necessary because it sustains consumption in the event of an unwelcomed retirement and it can assuage reliance on entitlement programs. For the majority of households, wealth is a matter of choice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A forensic report is the primary work product of a forensic psychologist. The aim of a forensic report is to inform and influence the court. Unlike a clinical report, a forensic report influences the outcome of a legal conflict. This means that greater care must be taken in writing the report. The following errors (Grisso, 2010) were used to discuss best practices in forensic report writing: failure to answer the referral question, organization problems, language problems, mixed data and interpretation, inclusion of irrelevant data, over-reliance on a single source of data, improper psychological test use, failure to consider alternative hypotheses, and opinions without sufficient explanation. The purpose of this paper is to provide in one place all the information needed to improve forensic report writing, and to help the reader apply the literature using specific examples. Redacted report samples were collected from psychologists, graduate psychology trainees, teaching assistant experience, and clinical work. Identified errors in these samples were then corrected using the recommendations in the literature. Geared toward graduate psychology trainees, each section should serve both as a tutorial and as a brief checklist to help the reader avoid common pitfalls and assist in promoting better forensic report writing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As society becomes increasingly less binary, and moves towards a more spectrum based approach to mental illness, medical illness, and personality, it becomes necessary to address this shift within formerly rigid institutions. This paper explores this shift as it is occurring within correctional settings around the United States concerning the medical care, housing, and safety of transgendered inmates. As there is no legal standard for the housing or access to gender-affirming medical care (i.e., hormone therapy, sexual reassignment surgery), these issues are addressed on an institutional level, with very little consistency throughout the country. Currently, most institutions follow a genitalia-based system of classification. Within the system, core beliefs are held, some adaptive and some no longer adaptive, that drive the system's behavior and outcomes. With regard to transgendered inmates, several underlying beliefs within the system serve to maintain the status quo; however, the most basic underpinning is the system's reliance on a binary gender system. As views of humane treatment of the incarcerated expand and modernize, the role of mental health within corrections has also expanded. Psychologists, social workers, counselors, and psychiatrists are found in almost all correctional facilities, and have become a voice of advocacy for an often underserved population.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Three usually unexpressed, and too often unnoticed, conceptual dichotomies underlie our perception and understanding of lawyers’ ethics. First, the existence of a special body of professional ethics and professional regulation presupposes some special need or risk. Criminal and civil law are apparently insufficient. Ordinary day-to-day morality and ordinary ethics, likewise, are not considered to be enough. What is the risk entailed by the notion of a profession that is special; who needs protection, and from what? Two quite different possible answers to this question provide the first of the three dichotomies examined in this article: one can understand the risk as primarily to a vulnerable client from a powerful professional; or, to the contrary, from a powerful client-lawyer combination toward vulnerable others. Second, what is the foundational orientation of lawyers? Are lawyers serving primarily their particular clients, and those clients’ preferences, choices and autonomy? Or is the primary allegiance of lawyers to some community or collective goal or interest distinct from the particular goals or interests of the client? The third dichotomy concerns not the substance of the risk, or the primary orientation, but the appropriate means of responding to that risk or that fundamental obligation. Should professional ethics be implemented primarily through rules? Or, should we rely on character and the discretion of lawyers to make a thought out, all things considered, decision? Each of these three presents a fundamental difference in how we perceive and address issues of lawyers’ ethics. Each affects our understanding and analysis on multiple levels, from (1) determining the appropriate or requisite conduct in a particular situation, to (2) framing a specific rule or approach for a particular category of situations, to (3) more general or abstract theory or policy. A person’s inclinations in regard to the dichotomies affects the conclusions that person will reach on each of those levels of analysis, yet those inclinations and assumptions are frequently unexamined and unarticulated. One’s position on each of the dichotomies tends to structure the approach and outcome without the issues and choice having been explicitly addressed or possibly even noticed. This article is an effort to ameliorate that problem. Part I addresses the question of what is the risk in the work of lawyers, or the function of lawyers, for which professional ethics is the answer. The concluding section focuses on the particular problem of the corporation as client. Part II then asks the related and possibly consequent question of what is the foundational orientation or allegiance of the lawyer? Is it to the individual client? Or is it to some larger community interest? Again, the concluding section focuses on the corporation. Part III turns to the means or method for addressing the obligations and possible problems of the professional ethics of lawyers. Should lawyers’ ethics guide and confine the conduct of lawyers primarily through rules? Or should it function primarily through reliance on the knowledge, judgment and character of lawyers? If the latter were the guide, ethical decisions would be made on a situation by situation basis under the discretion of each lawyer. Toward the end of each discussion possibilities for bridging the dichotomy are considered (and with such bridges each dichotomy may come to look more like a spectrum or continuum.). At several points after its introduction in Parts I and II, the special problem of the corporation as client is revisited and possible solutions suggested. Illustrating the usefulness of keeping the dichotomies in view, Part IV applies them to several exemplary situations of ethical difficulty in actual lawyer practice. For readers finding it difficult to envision the consequences of these distinctions, turning ahead to Part IV may be useful in making the discussion more concrete. Some commonalities across the dichotomies and connections among them are then developed in the concluding section, Part V.