889 resultados para Human Symbolic Thinking and Acting
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-07
Resumo:
This paper is part of the Project “Adaptive thinking and flexible computation: Critical issues”. In this paper we discuss different perspectives of flexibility and adaptive thinking in literature. We also discuss the idea of proceptual thinking and how this idea is important in our perspective of adaptive thinking. The paper analyses a situation developed with a first grade classroom and its teacher named the day number. It is a daily activity at the beginning of the school day. It consists on to look for the date number and to think about different ways of writing it using the four arithmetic operations. The analyzed activity was developed on March 19, so the challenge was to write 19 in several ways. The data show the pupils’ enthusiasm and their efforts to find different ways of writing the number. Some used large numbers and division, which they were just starting to learn. The pupils presented symbolic expressions of 19, decomposing and recomposing it in a flexible manner.
Resumo:
This project posits a link between representations of animals or animality and representations of illness in the Victorian novel, and examines the narrative uses and ideological consequences of such representations. Figurations of animality and illness in Victorian fiction have been examined extensively as distinct phenomena, but examining their connection allows for a more complex view of the role of sympathy in the Victorian novel. The commonplace in novel criticism is that Victorian authors, whether effectively or not, constructed their novels with a view to the expansion of sympathy. This dissertation intervenes in the discussion of the Victorian novel as a vehicle for sympathy by positing that texts and scenes in which representations of illness and animality are conjoined reveal where the novel draws the boundaries of the human, and the often surprising limits it sets on sympathetic feeling. In such moments, textual cues train or direct readerly sympathies in ways that suggest a particular definition of the human, but that direction of sympathy is not always towards an enlarged sympathy, or an enlarged definition of the human. There is an equally (and increasingly) powerful antipathetic impulse in many of these texts, which estranges readerly sympathy from putatively deviant, degenerate, or dangerous groups. These two opposing impulses—the sympathetic and the antipathetic—often coexist in the same novel or even the same scene, creating an ideological and affective friction, and both draw on the same tropes of illness and animality. Examining the intersection of these different discourses—sympathy, illness, and animality-- in these novels reveals the way that major Victorian debates about human nature, evolution and degeneration, and moral responsibility shaped the novels of the era as vehicles for both antipathy and sympathy. Focusing on the novels of the Brontës and Thomas Hardy, this dissertation examines in depth the interconnected ways that representations of animals and animality and representations of illness function in the Victorian novel, as they allow authors to explore or redefine the boundary between the human and the non-human, the boundary between sympathy and antipathy, and the limits of sympathy itself.
Resumo:
Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
Language provides an interesting lens to look at state-building processes because of its cross-cutting nature. For example, in addition to its symbolic value and appeal, a national language has other roles in the process, including: (a) becoming the primary medium of communication which permits the nation to function efficiently in its political and economic life, (b) promoting social cohesion, allowing the nation to develop a common culture, and (c) forming a primordial basis for self-determination. Moreover, because of its cross-cutting nature, language interventions are rarely isolated activities. Languages are adopted by speakers, taking root in and spreading between communities because they are legitimated by legislation, and then reproduced through institutions like the education and military systems. Pádraig Ó’ Riagáin (1997) makes a case for this observing that “Language policy is formulated, implemented, and accomplishes its results within a complex interrelated set of economic, social, and political processes which include, inter alia, the operation of other non-language state policies” (p. 45). In the Turkish case, its foundational role in the formation of the Turkish nation-state but its linkages to human rights issues raises interesting issues about how socio-cultural practices become reproduced through institutional infrastructure formation. This dissertation is a country-level case study looking at Turkey’s nation-state building process through the lens of its language and education policy development processes with a focus on the early years of the Republic between 1927 and 1970. This project examines how different groups self-identified or were self-identified (as the case may be) in official Turkish statistical publications (e.g., the Turkish annual statistical yearbooks and the population censuses) during that time period when language and ethnicity data was made publicly available. The overarching questions this dissertation explores include: 1.What were the geo-political conditions surrounding the development and influencing the Turkish government’s language and education policies? 2.Are there any observable patterns in the geo-spatial distribution of language, literacy, and education participation rates over time? In what ways, are these traditionally linked variables (language, literacy, education participation) problematic? 3.What do changes in population identifiers, e.g., language and ethnicity, suggest about the government’s approach towards nation-state building through the construction of a civic Turkish identity and institution building? Archival secondary source data was digitized, aggregated by categories relevant to this project at national and provincial levels and over the course of time (primarily between 1927 and 2000). The data was then re-aggregated into values that could be longitudinally compared and then layered on aspatial administrative maps. This dissertation contributes to existing body of social policy literature by taking an interdisciplinary approach in looking at the larger socio-economic contexts in which language and education policies are produced.
Resumo:
Acute myeloid leukemia (AML) involves the proliferation, abnormal survival and arrest of cells at a very early stage of myeloid cell differentiation. The biological and clinical heterogeneity of this disease complicates treatment and highlights the significance of understanding the underlying causes of AML, which may constitute potential therapeutic targets, as well as offer prognostic information. Tribbles homolog 2 (Trib2) is a potent murine oncogene capable of inducing transplantable AML with complete penetrance. The pathogenicity of Trib2 is attributed to its ability to induce proteasomal degradation of the full length isoform of the transcription factor CCAAT/enhancer-binding protein alpha (C/EBPα p42). The role of TRIB2 in human AML cells, however, has not been systematically investigated or targeted. Across human cancers, TRIB2 oncogenic activity was found to be associated with its elevated expression. In the context of AML, TRIB2 overexpression was suggested to be associated with the large and heterogeneous subset of cytogenetically normal AML patients. Based upon the observation that overexpression of TRIB2 has a role in cellular transformation, the effect of modulating its expression in human AML was examined in a human AML cell line that expresses high levels of TRIB2, U937 cells. Specific suppression of TRIB2 led to impaired cell growth, as a consequence of both an increase in apoptosis and a decrease in cell proliferation. Consistent with these in vitro results, TRIB2 silencing strongly reduced progression of the U937 in vivo xenografts, accompanied by detection of a lower spleen weight when compared with mice transplanted with TRIB2- expressing control cells. Gene expression analysis suggested that TRIB2 modulates apoptosis and cell-cycle sensitivity by influencing the expression of a subset of genes known to have implications on these phenotypes. Furthermore, TRIB2 was found to be expressed in a significant subset of AML patient samples analysed. To investigate whether increased expression of this gene could be afforded prognostic significance, primary AML cells with dichotomized levels of TRIB2 transcripts were evaluated in terms of their xenoengraftment potential, an assay reported to correlate with disease aggressiveness observed in humans. A small cohort of analysed samples with higher TRIB2 expression did not associate with preferential leukaemic cell engraftment in highly immune-deficient mice, hence, not predicting for an adverse prognosis. However, further experiments including a larger cohort of well characterized AML patients would be needed to clarify TRIB2 significance in the diagnostic setting. Collectively, these data support a functional role for TRIB2 in the maintenance of the oncogenic properties of human AML cells and suggest TRIB2 can be considered a rational therapeutic target. Proteasome inhibition has emerged as an attractive target for the development of novel anti-cancer therapies and results from translational research and clinical trials support the idea that proteasome inhibitors should be considered in the treatment of AML. The present study argued that proteasome inhibition would effectively inhibit the function of TRIB2 by abrogating C/EBPα p42 protein degradation and that it would be an effective pharmacological targeting strategy in TRIB2-positive AMLs. Here, a number of cell models expressing high levels of TRIB2 were successfully targeted by treatment with proteasome inhibitors, as demonstrated by multiple measurements that included increased cytotoxicity, inhibition of clonogenic growth and anti-AML activity in vivo. Mechanistically, it was shown that block of the TRIB2 degradative function led to an increase of C/EBPα p42 and that response was specific to the TRIB2-C/EBPα axis. Specificity was addressed by a panel of experiments showing that U937 cells (express detectable levels of endogenous TRIB2 and C/EBPα) treated with the proteasome inhibitor bortezomib (Brtz) displayed a higher cytotoxic response upon TRIB2 overexpression and that ectopic expression of C/EBPα rescued cell death. Additionally, in C/EBPα-negative leukaemia cells, K562 and Kasumi 1, Brtz-induced toxicity was not increased following TRIB2 overexpression supporting the specificity of the compound on the TRIB2-C/EBPα axis. Together these findings provide pre-clinical evidence that TRIB2- expressing AML cells can be pharmacologically targeted with proteasome inhibition due, in part, to blockage of the TRIB2 proteolytic function on C/EBPα p42. A large body of evidence indicates that AML arises through the stepwise acquisition of genetic and epigenetic changes. Mass spectrometry data has identified an interaction between TRIB2 and the epigenetic regulator Protein Arginine Methyltransferase 5 (PRMT5). Following assessment of TRIB2‟s role in AML cell survival and effective targeting of the TRIB2-C/EBPα degradation pathway, a putative TRIB2/PRMT5 cooperation was investigated in order to gain a deeper understanding of the molecular network in which TRIB2 acts as a potent myeloid oncogene. First, a microarray data set was interrogated for PRMT5 expression levels and the primary enzyme responsible for symmetric dimethylation was found to be transcribed at significantly higher levels in AML patients when compared to healthy controls. Next, depletion of PRMT5 in the U937 cell line was shown to reduce the transformative phenotype in the high expressing TRIB2 AML cells, which suggests that PRMT5 and TRIB2 may cooperate to maintain the leukaemogenic potential. Importantly, PRMT5 was identified as a TRIB2-interacting protein by means of a protein tagging approach to purify TRIB2 complexes from 293T cells. These findings trigger further research aimed at understanding the underlying mechanism and the functional significance of this interplay. In summary, the present study provides experimental evidence that TRIB2 has an important oncogenic role in human AML maintenance and, importantly in such a molecularly heterogeneous disease, provides the rational basis to consider proteasome inhibition as an effective targeting strategy for AML patients with high TRIB2 expression. Finally, the identification of PRMT5 as a TRIB2-interacting protein opens a new level of regulation to consider in AML. This work may contribute to our further understanding and therapeutic strategies in acute leukaemias.
Resumo:
International audience
Resumo:
Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
This book is a synthesizing reflection on the Holocaust commemoration, in which space becomes a starting point for discussion. The author understands space primarily as an amalgam of physical and social components, where various commemorative processes may occur. The first part of the book draws attention to the material aspect of space, which determines its character and function. Material culture has been a long ignored and depreciated dimension of human culture in the humanities and social sciences, because it was perceived as passive and fully controlled by human will, and therefore insignificant in the course of social and historical processes. An example of the Nazi system perfectly illustrates how important were the restrictions and prohibitions on the usage of mundane objects, and in general, the whole material culture in relation to macro and micro space management — the state, cities, neighborhoods and houses, but also parks and swimming pools, factories and offices or shops and theaters. The importance of things and space was also clearly visible in exploitative policies present in overcrowded ghettos and concentration and death camps. For this very reason, when we study spatial forms of Holocaust commemoration, it should be acknowledged that the first traces, proofs and mementoes of the murdered were their things. The first "monuments" showing the enormity of the destruction are thus primarily gigantic piles of objects — shoes, glasses, toys, clothes, suitcases, toothbrushes, etc., which together with the extensive camps’ space try to recall the scale of a crime impossible to understand or imagine. The first chapter shows the importance of introducing the material dimension in thinking about space and commemoration, and it ends with a question about one of the key concepts for the book, a monument, which can be understood as both object (singular or plural) and architecture (sculptures, buildings, highways). However, the term monument tends to be used rather in a later and traditional sense, as an architectural, figurative form commemorating the heroic deeds, carved in stone or cast in bronze. Therefore, the next chapter reconstructs this narrower line of thinking, together with a discussion about what form a monument commemorating a subject as delicate and sensitive as the Holocaust should take on. This leads to an idea of the counter-monument, the concept which was supposed to be the answer to the mentioned representational dilemma on the one hand, and which would disassociate it from the Nazi’s traditional monuments on the other hand. This chapter clarifies the counter-monument definition and explains the misunderstandings and confusions generated on the basis of this concept by following the dynamics of the new commemorative form and by investigating monuments from the ‘80s and ‘90s erected in Germany. In the next chapter, I examine various forms of the Holocaust commemoration in Berlin, a city famous for its bold, monumental, and even controversial projects. We find among them the entire spectrum of memorials – big, monumental, and abstract forms, like Peter Eisenman’s Memorial to the Murdered Jews of Europe or Daniel Liebeskind’s Jewish Museum Berlin; flat, invisible, and employing the idea of emptiness, like Christian Boltanski’s Missing House or Micha Ullman’s Book Burning Memorial; the dispersed and decentralized, like Renata Stih and Frieder Schnock’s Memory Places or Gunter Demnig’s Stumbling Blocks. I enrich descriptions of the monuments by signaling at this point their second, extended life, which manifests itself in the alternative modes of (mis)use, consisting of various social activities or artistic performances. The formal wealth of the outlined projects creates a wide panorama of possible solutions to the Holocaust commemoration problems. However, the discussions accompanying the building of monuments and their "future life" after realization emphasize the importance of the social component that permeates the biography of the monument, and therefore significantly influences its foreseen design. The book also addresses the relationship of space, place and memory in a specific situation, when commemoration is performed secretly or remains as unrealized potential. Although place is the most common space associated with memory, today the nature of this relationship changes, and is what indicates popularity and employment of such terms as Marc Augé’s non-places or Pierre Nora’s site of memory. I include and develop these concepts about space and memory in my reflections to describe qualitatively different phenomena occurring in Central and Eastern European countries. These are unsettling places in rural areas like glades or parking lots, markets and playgrounds in urban settings. I link them to the post-war time and modernization processes and call them sites of non-memory and non-sites of memory. Another part of the book deals with a completely different form of commemoration called Mystery of memory. Grodzka Gate - NN Theatre in Lublin initiated it in 2000 and as a form it situates itself closer to the art of theater than architecture. Real spaces and places of everyday interactions become a stage for these performances, such as the “Jewish town” in Lublin or the Majdanek concentration camp. The minimalist scenography modifies space and reveals its previously unseen dimensions, while the actors — residents and people especially related to places like survivors and Righteous Among the Nations — are involved in the course of the show thanks to various rituals and symbolic gestures. The performance should be distinguished from social actions, because it incorporates tools known from religious rituals and art, which together saturate the mystery of memory with an aura of uniqueness. The last discussed commemoration mode takes the form of exposition space. I examine an exhibition concerning the fate of the incarcerated children presented in one of the barracks of the Majdanek State Museum in Lublin. The Primer – Children in Majdanek Camp is unique for several reasons. First, because even though it is exhibited in the camp barrack, it uses a completely different filter to tell the story of the camp in comparison to the exhibitions in the rest of the barracks. For this reason, one experiences immersing oneself in all subsequent levels of space and narrative accompanying them – at first, in a general narrative about the camp, and later in a specifically arranged space marked by children’s experiences, their language and thinking, and hence formed in a way more accessible for younger visitors. Second, the exhibition resigns from didacticism and distancing descriptions, and takes an advantage of eyewitnesses and survivors’ testimonies instead. Third, the exhibition space evokes an aura of strangeness similar to a fairy tale or a dream. It is accomplished thanks to the arrangement of various, usually highly symbolic material objects, and by favoring the fragrance and phonic sensations, movement, while belittling visual stimulations. The exhibition creates an impression of a place open to thinking and experiencing, and functions as an asylum, a radically different form to its camp surrounding characterized by a more overwhelming and austere space.
Resumo:
Abstract : Providing high-quality clinical experiences to prepare students for the complexities of the current health-care system has become a challenge for nurse educators. Additionally, there are concerns that the current model of clinical practice is suboptimal. Consequently, nursing programs have explored the partial replacement of traditional in-hospital clinical experiences with a simulated clinical experience. Despite research demonstrating numerous benefits to students following participation in simulation activities, insufficient research conducted within Québec exists to convince the governing bodies (Ordre des infirmières et des infirmiers du Québec, OIIQ; Ministère de L’Éducation supérieur, de la Recherche, de la Science et de la Technologie) to fully embrace simulation as part of nurse training. The purpose of this study was to examine the use of a simulated clinical experience (SCE) as a viable, partial pedagogical substitute for traditional clinical experience by examining the effects of a SCE on CEGEP nursing students’ perceptions of self-efficacy (confidence), and their ability to achieve course objectives. The findings will contribute new information to the current body of research in simulation. The specific case of obstetrical practice was examined. Based on two sections of the Nursing III-Health and Illness (180-30K-AB) course, the sample was comprised of 65 students (thirty-one students from section 0001 and thirty-four students from section 0002) whose mean age was 24.8 years. With two sections of the course available, the opportunity for comparison was possible. A triangulation mixed method design was used. An adapted version of Ravert’s (2004) Nursing Skills for Evaluation tool was utilized to collect data regarding students’ perceptions of confidence related to the nursing skills required for care of mothers and their newborns. Students’ performance and achievement of course objectives was measured through an Objective Structured Clinical Examination (OSCE) consisting of three marked stations designed to test the theoretical and clinical aspects of course content. The OSCE was administered at the end of the semester following completion of the traditional clinical experience. Students’ qualitative comments on the post -test survey, along with journal entries served to support the quantitative scale evaluation. Two of the twelve days (15 hours) allocated for obstetrical clinical experience were replaced by a SCE (17%) over the course of the semester. Students participated in various simulation activities developed to address a range of cognitive, psychomotor and critical thinking skills. Scenarios incorporating the use of human patient simulators, and designed using the Jeffries Framework (2005), exposed students to the care of families and infants during the perinatal period to both reflect and build upon class and course content in achievement of course objectives and program competencies. Active participation in all simulation activities exposed students to Bandura’s four main sources of experience (mastery experiences, vicarious experiences, social persuasion, and physiologic/emotional responses) to enhance the development of students’ self-efficacy. Results of the pre-test and post-test summative scores revealed a statistically significant increase in student confidence in performing skills related to maternal and newborn care (p < .0001) following participation in the SCE. Confidence pre-test and post-test scores were not affected by the students’ section. Skills related to the care of the post-partum mother following vaginal or Caesarean section delivery showed the greatest change in confidence ratings. OSCE results showed a mean total class score (both sections) of 57.4 (70.0 %) with normal distribution. Mean scores were 56.5 (68.9%) for section 0001 and 58.3 (71.1%) for section 0002. Total scores were similar between sections (p =0.342) based on pairwise comparison. Analysis of OSCE scores as compared to students’ final course grade revealed similar distributions. Finally, qualitative analysis identified how students’ perceived the SCE. Students cited gains in knowledge, development of psychomotor skills and improved clinical judgement following participation in simulation activities. These were attributed to the « hands on » practice obtained from working in small groups, a safe and authentic learning environment and one in which students could make mistakes and correct errors as having the greatest impact on learning through simulation.
Resumo:
We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new ‘Danger Theory’ (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of ‘grounding’ the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
The call to access and preserve the state records that document crimes committed by the state during Guatemala’s civil war has become an archival imperative entangled with neoliberal human rights discourses of “truth, justice, and memory.” 200,000 people were killed and disappeared in Guatemala’s civil war including acts of genocide in which 85% of massacres involved sexual violence committed against Mayan women. This dissertation argues that in an attempt to tell the official story of the civil war, American Human Rights organizations and academic institutions have constructed a normative identity whose humanity is attached to a scientific and evidentiary value as well as an archival status representing the materiality and institutionality of the record. Consequently, Human Rights discourses grounded in Western knowledges, in particular archival science and law, which prioritize the appearance of truth erase the material and epistemological experience of indigenous women during wartimes. As a result, the subjectivity that has surfaced on the record as most legible has mostly pertained to non-indigenous, middle class, urban, leftist men who were victims of enforced disappearance not genocide. This dissertation investigates this conflicting narrative that remembers a non-indigenous revolutionary masculine hero and grants him justice in human rights courtrooms simply because of a document attesting to his death. A main research question addressed in this project is why the promise of "truth and justice" under the name of human rights becomes a contentious site for gendered indigenous bodies? I conduct a discursive and rhetorical analysis of documentary film, declassified Guatemalan police and military records such as Operation Sofia, a military log known for “documenting the genocide” during rural counterinsurgencies executed by the military. I interrogate the ways in which racialized feminicides or the hyper-sexualized racial violence that has historically dehumanized indigenous women falls outside of discourses of vision constructed by Western positivist knowledges to reinscribe the ideal human right subject. I argue for alternative epistemological frames that recognize genocide as sexualized and gendered structures that have simultaneously produced racialized feminicides in order to disrupt the colonial structures of capitalism, patriarchy and heterosexuality. Ironically, these structures of power remain untouched by the dominant human rights discourse and its academic, NGO, and state collaborators that seek "truth and justice" in post-conflict Guatemala.
Resumo:
This article deals with climate change from a linguistic perspective. Climate change is an extremely complex issue that has exercised the minds of experts and policy makers with renewed urgency in recent years. It has prompted an explosion of writing in the media, on the internet and in the domain of popular science and literature, as well as a proliferation of new compounds around the word ‘carbon’ as a hub, such as ‘carbon indulgence’, a new compound that will be studied in this article. Through a linguistic analysis of lexical and discourse formations around such ‘carbon compounds’ we aim to contribute to a broader understanding of the meaning of climate change. Lexical carbon compounds are used here as indicators for observing how human symbolic cultures change and adapt in response to environmental threats and how symbolic innovation and transmission occurs.
Resumo:
Dissertação de mestrado, Biotecnologia, Faculdade de Ciências e Tecnologia, Universidade do Algarve, 2014
Resumo:
"The emergence and abuse of synthetic cannabinoids has been increasing as an alternative to cannabis, mainly among youth. As their appearance on the drug market has been recent, the pharmacological and toxicological profiles of these psychoactive substances are poorly understood. Current studies suggest that they have stronger effects compared to their natural alternatives and their metabolites retain affinity towards CB1 receptors in CNS. Since studies on its toxicological properties are scarce, the effects of the drug in human derived cell lines were investigated. The present study was designed to explore the toxicological impact of parent drug versus phase I metabolites of synthetic cannabinoids on human cells with and without CB1 receptor. The human cell line of neuroblastoma SH-SY5Y and human kidney cell line HEK-293T were exposed to JWH-018 and to its N-(3-hydroxypentyl) metabolite. Cell toxicity was evaluated using the MTT and LDH assay. Additionally, a dual staining methodology with fluorescent Annexin V-FITC and propidium iodide was performed to address the question of whether JWH-018 N-(3-hydroxypentyl) metabolite is inducing cell death through apoptosis or necrosis, in HEK293T and SH-SY5Y cell lines. The obtained results show that JWH-018 does not cause a statistically significant decrease in cell viability, in contrast to its N-(3-hydroxypentyl) metabolite, which at ≥25μM causes a significant decrease in cell viability. Both cell lines are affected by JWH-018 metabolite. Our results point to higher toxicity of JWH-018 metabolite when compared to its parent drug, suggesting a non-CB1 receptor mediated toxicological mechanism. Comparing the results from Annexin V/PI with MTT and LDH assays of SH-SY5Y and HEK293T in the presence of the synthetic cannabinoid metabolite, emerges the picture that cellular viability decreases and associated death is occurring through necrosis."