869 resultados para Protection of Privacy


Relevância:

100.00% 100.00%

Publicador:

Resumo:

SUMMARYThe incidence of type 2 diabetes (T2D) is increasing worldwide and is linked to the enhancement of obesity. The principal cause of T2D development is insulin resistance, which lead to the increase of insulin production by the pancreatic beta-cells. In a pathological environment, namely dyslipidaemia, hyperglycaemia and inflammation, beta-cell compensation will fail in more vulnerable cells and diabetes will occur. High Density Lipoproteins (HDLs), commonly named "good cholesterol" are known to be atheroprotective. Low levels of HDLs are associated with increased prevalence of cardiovascular disease but are also an independent risk factor for the development of T2D. HDLs were demonstrated to protect pancreatic beta-cells against several stresses. However the molecular mechanisms of the protection are unknown and the objectives of this work were to try to elucidate the way how HDLs protect. The first approach was a broad screening of genes regulated by the stress and HDLs. A microarray analysis was performed on beta-cells stressed by serum deprivation and rescued by HDLs. Among the genes regulated, we focused on 4E-BP1, a cap-dependent translational inhibitor. In addition, HDLs were also found to protect against several other stresses.Endoplasmic reticulum (ER) stress is a mechanism that may play a role in the onset of T2D. The unfolded protein response (UPR) is a physiological process that aims at maintaining ER homeostasis in conditions where the protein folding and secretion is perturbed. Specific signalling pathways are involved in the increase of folding, export and degradation capacity of the ER. However, in case where the stress is prolonged, this mechanism turns to be pathological, by inducing cell death effector pathways, leading to beta-cell apoptosis. In our study, we discovered that HDLs were protective against ER stress induced by drugs and physiological stresses such as saturated free fatty acids. HDLs protected beta-cells by promoting ER homeostasis via the improvement of the folding and trafficking od proteins from the ER to the Golgi apparatus.Altogether our results suggest that HDLs are important for beta-cell function and survival, by protecting them from several stresses and acting on ER homeostasis. This suggests that attempt in keeping normal HDLs levels or function in patients is crucial to lessen the development of T2D.RÉSUMÉL'incidence du diabète de type 2 est en constante augmentation et est fortement liée à l'accroissement du taux d'obésité. La cause principale du diabète de type 2 est la résistance à l'insuline, qui entraîne une surproduction d'insuline par les cellules bêta pancréatiques. Dans un environnement pathologique associé à l'obésité (dyslipidémie, hyperglycémie et inflammation), les cellules bêta les plus vulnérables ne sont plus capables de compenser en augmentant leur production d'insuline, dysfonctionnent, ce qui conduit à leur mort par apoptose. Les lipoprotéines de hautes densités (HDLs), communément appelées (( bon cholestérol », sont connues pour leurs propriétés protectrices contre l'athérosclérose. Des niveaux bas de HDLs sanguins sont associés au risque de développer un diabète de type 2. Les HDLs ont également montré des propriétés protectrices contre divers stresses dans la cellule bêta. Cependant, les mécanismes de protection restent encore inconnus et l'objectif de ce travail a été d'investiguer les mécanismes moléculaires de protection des HDLs. La première approche choisie a été une étude du profil d'expression génique par puce à ADN afin d'identifier les gènes régulés par le stress et les HDLs. Parmi les gènes régulés, notre intérêt s'est porté sur 4E-BP1, un inhibiteur de la traduction coiffe- dépendante, dont l'induction par le stress était corrélée avec une augmentation de l'apoptose. Suite à cette étude, les HDLs ont également montrés un rôle protecteur contre d'autres stresses. Il s'agit particulièrement du stress du réticulum endoplasmique (RE), qui est un mécanisme qui semble jouer un rôle clé dans le développement du diabète. L'UPR (« Unfolded Protein Response ») est un processus physiologique tendant à maintenir l'homéostasie du réticulum endoplasmique, organelle prépondérante pour la fonction des cellules sécrétrices, notamment lorsqu'elle est soumise à des conditions extrêmes telles que des perturbations de la conformation tertiaire des protéines ou de la sécrétion. Dans ces cas, des voies de signalisation moléculaires sont activées, ce qui mène à l'exportation des protéines mal repliées, à leur dégradation et à l'augmentation de l'expression de chaperonnes capables d'améliorer le repliement des protéines mal formées. Toutefois, en cas de stress persistant, ce mécanisme de protection s'avère être pathologique. En induisant des voies de signalisation effectrices de l'apoptose, il conduit finalement au développement du diabète. Dans cette étude, nous avons démontré que les HDLs étaient capables de protéger la cellule bêta contre le stress du RE induits par des inhibiteurs (thapsigargine, tunicamycine) ou des stresses physiologiques tels que les acides gras libres. Les HDLs ont la capacité d'améliorer l'homéostasie du RE, notamment en favorisant le repliement et le transfert des protéines du RE à l'appareil de Golgi.En résumé, ces données suggèrent que les HDLs sont bénéfiques pour la survie des cellules bêta soumises à des stresses impliqués dans le développement du diabète, notamment en restaurant l'homéostasie du RE. Ces résultats conduisent à soutenir que le maintien des taux de cholestérol joue un rôle important dans la limitation de l'incidence du diabète.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the past, many pier columns were deteriorating due to attack by chlorides. The chloride (from deicers) has attacked the substructures by drainage from the superstructure. Piers supporting grade separation bridges are also subject to chlorides contained in the direct splash from lower level traffic. Repairs of these piers are both difficult and costly. In this project, four different sealants were applied to piers to evaluate their use in the protection of the concrete against chloride-ions. One pier was left untreated to use as a control pier with which to compare the protected piers. This project began in 1980 and was to be completed in 1985, but at that time it was determined further testing was needed to make a more conclusive evaluation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The corrosion of reinforcing steel within concrete has always been a problem in construction of bridge decks. With low slump concrete and epoxy rebar, progress has been made in controlling the corrosion. There is concern, however, that the chloride also attacks the substructures, specifically the pier columns. They are subject to chloride attack by chemical deicers in the drainage from the bridge deck. Piers supporting grade separation bridges are also subject to chlorides contained in the direct splash from the lower level traffic. In this project, a field evaluation was conducted to evaluate the effectiveness of commercially available products in preventing chloride intrusion.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is the objective of this project to determine, via field tests, the long term effectiveness of several available systems as their ability to protect concrete surfaces against the intrusion of chloride ions. Early concepts of this project included utilizing personnel from several offices within the Highway Division of the Iowa Department of Transportation. Cooperation and coordination with regularly scheduled activities were considered imperative. A meeting for this purpose was held on April 16, 1980. This meeting was attended by the investigators, Mr. Bernard C. Brown, Office of Materials, Mr. Richard Merritt, District 6 Materials Engineer, Mr. John Saunders, District 6 Maintenance Engineer, and Mr. James Phinney, Resident Maintenance Engineer.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Additions of lactams, imides, (S)-4-benzyl-1,3-oxazolidin-2-one, 2-pyridone, pyrimidine-2,4-diones (AZT derivatives), or inosines to the electron-deficient triple bonds of methyl propynoate, tert-butyl propynoate, 3-butyn-2-one, N-propynoylmorpholine, or N-methoxy-N-methylpropynamide in the presence of many potential catalysts were examined. DABCO and, second, DMAP appeared to be the best (highest reaction rates and E/Z ratios), while RuCl3, RuClCp*(PPh3)2, AuCl, AuCl(PPh3), CuI, and Cu2(OTf)2 were incapable of catalyzing such additions. The groups incorporated (for example, the 2-(methoxycarbonyl)ethenyl group that we name MocVinyl) serve as protecting groups for the above-mentioned heterocyclic CONH or CONHCO moieties. Deprotections were accomplished via exchange with good nucleophiles: the 1-dodecanethiolate anion turned out to be the most general and efficient reagent, but in some particular cases other nucleophiles also worked (e.g., MocVinyl-inosines can be cleaved with succinimide anion). Some structural and mechanistic details have been accounted for with the help of DFT and MP2 calculations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cyclic peptides and peptoids were prepared using the thiolene Michael-type reaction. The linear precursors were provided with additional functional groups allowing for subsequent conjugation: an orthogonally protected thiol, a protected maleimide, or an alkyne. The functional group for conjugation was placed either within the cycle or in an external position. The click reactions employed for conjugation with suitably derivatized nucleoside or oligonucleotides were either cycloadditions (Diels-Alder, Cu(I)-catalyzed azide-alkyne) or the same Michael-type reaction as for cyclization.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Additions of lactams, imides, (S)-4-benzyl-1,3-oxazolidin-2-one, 2-pyridone, pyrimidine-2,4-diones (AZT derivatives), or inosines to the electron-deficient triple bonds of methyl propynoate, tert-butyl propynoate, 3-butyn-2-one, N-propynoylmorpholine, or N-methoxy-N-methylpropynamide in the presence of many potential catalysts were examined. DABCO and, second, DMAP appeared to be the best (highest reaction rates and E/Z ratios), while RuCl3, RuClCp*(PPh3)2, AuCl, AuCl(PPh3), CuI, and Cu2(OTf)2 were incapable of catalyzing such additions. The groups incorporated (for example, the 2-(methoxycarbonyl)ethenyl group that we name MocVinyl) serve as protecting groups for the above-mentioned heterocyclic CONH or CONHCO moieties. Deprotections were accomplished via exchange with good nucleophiles: the 1-dodecanethiolate anion turned out to be the most general and efficient reagent, but in some particular cases other nucleophiles also worked (e.g., MocVinyl-inosines can be cleaved with succinimide anion). Some structural and mechanistic details have been accounted for with the help of DFT and MP2 calculations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The nature of client-server architecture implies that some modules are delivered to customers. These publicly distributed commercial software components are under risk, because users (and simultaneously potential malefactors) have physical access to some components of the distributed system. The problem becomes even worse if interpreted programming languages are used for creation of client side modules. The language Java, which was designed to be compiled into platform independent byte-code is not an exception and runs the additional risk. Along with advantages like verifying the code before execution (to ensure that program does not produce some illegal operations)Java has some disadvantages. On a stage of byte-code a java program still contains comments, line numbers and some other instructions, which can be used for reverse-engineering. This Master's thesis focuses on protection of Java code based client-server applications. I present a mixture of methods to protect software from tortious acts. Then I shall realize all the theoretical assumptions in a practice and examine their efficiency in examples of Java code. One of the criteria's to evaluate the system is that my product is used for specialized area of interactive television.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Evidences collected from smartphones users show a growing desire of personalization offered by services for mobile devices. However, the need to accurately identify users' contexts has important implications for user's privacy and it increases the amount of trust, which users are requested to have in the service providers. In this paper, we introduce a model that describes the role of personalization and control in users' assessment of cost and benefits associated to the disclosure of private information. We present an instantiation of such model, a context-aware application for smartphones based on the Android operating system, in which users' private information are protected. Focus group interviews were conducted to examine users' privacy concerns before and after having used our application. Obtained results confirm the utility of our artifact and provide support to our theoretical model, which extends previous literature on privacy calculus and user's acceptance of context-aware technology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Power transformer is the most expensive equipment on a substation. It is always necessary to get needed benefit with the lowest expenses. Producing of power transformers with reduced insulation strength is one of the possible ways to reduce expenses. Exploitation of such transformers was begun in the end of 70-th in the last century. Protection from overvoltages was done with valve-type magnetic combined surge arresters with increased blanking voltage during switching overvoltages. Nowadays there is the necessity of replacement of those devices. That’s why modernized nonlinear surge arrester was invented. This master’s thesis is focused on the use research of that modernized device in comparison with usual nonlinear surge arresters. The goal is to show the lightning overvoltages level using different types of nonlinear surge arresters and then calculations of the lightning protection reliability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The future of privacy in the information age is a highly debated topic. In particular, new and emerging technologies such as ICTs and cognitive technologies are seen as threats to privacy. This thesis explores images of the future of privacy among non-experts within the time frame from the present until the year 2050. The aims of the study are to conceptualise privacy as a social and dynamic phenomenon, to understand how privacy is conceptualised among citizens and to analyse ideal-typical images of the future of privacy using the causal layered analysis method. The theoretical background of the thesis combines critical futures studies and critical realism, and the empirical material is drawn from three focus group sessions held in spring 2012 as part of the PRACTIS project. From a critical realist perspective, privacy is conceptualised as a social institution which creates and maintains boundaries between normative circles and preserves the social freedom of individuals. Privacy changes when actors with particular interests engage in technology-enabled practices which challenge current privacy norms. The thesis adopts a position of technological realism as opposed to determinism or neutralism. In the empirical part, the focus group participants are divided into four clusters based on differences in privacy conceptions and perceived threats and solutions. The clusters are fundamentalists, pragmatists, individualists and collectivists. Correspondingly, four ideal-typical images of the future are composed: ‘drift to low privacy’, ‘continuity and benign evolution’, ‘privatised privacy and an uncertain future’, and ‘responsible future or moral decline’. The images are analysed using the four layers of causal layered analysis: litany, system, worldview and myth. Each image has its strengths and weaknesses. The individualistic images tend to be fatalistic in character while the collectivistic images are somewhat utopian. In addition, the images have two common weaknesses: lack of recognition of ongoing developments and simplistic conceptions of privacy based on a dichotomy between the individual and society. The thesis argues for a dialectical understanding of futures as present images of the future and as outcomes of real processes and mechanisms. The first steps in promoting desirable futures are the awareness of privacy as a social institution, the awareness of current images of the future, including their assumptions and weaknesses, and an attitude of responsibility where futures are seen as the consequences of present choices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We investigated kidney and lung alterations caused by intercellular adhesion molecule type 1 (ICAM-1) blockade after ischemia and reperfusion of hind limb skeletal muscles. Rats were submitted to ligature of the infrarenal aorta for 6 h. The animals were randomized into three groups of 6 rats each: group I, sacrificed after ischemia; group II, reperfusion for 24 h, and group III, reperfusion for 24 h after receiving monoclonal anti-ICAM-1 antibodies. At the end of the experiment, blood samples were collected for creatinine, lactate dehydrogenase, creatine phosphokinase, potassium, pH and leukocyte counts. Samples were taken from the muscles of the hind limbs and from the kidneys and lungs for histological analysis and measurement of the neutrophil infiltrate by myeloperoxidase staining. The groups did not differ significantly with regard to the laboratory tests. There were no major histological alterations in the kidneys. An intense neutrophil infiltrate in the lungs, similar in all groups, was detected. Myeloperoxidase determination showed that after reperfusion there was significantly less retention of polymorphonuclear neutrophils in the muscles (352 ± 70 vs 1451 ± 235 × 10² neutrophils/mg; P<0.01) and in the kidneys (526 ± 89 vs 852 ± 73 × 10² neutrophils/mg; P<0.01) of the animals that received anti-ICAM-1 before perfusion compared to the group that did not. The use of anti-ICAM-1 antibodies in this experimental model minimized neutrophil influx, thus reducing the inflammatory process, in the muscles and kidneys after ischemia and reperfusion of the hind limbs.