969 resultados para SUGGESTED EXPLANATION
Resumo:
One of the most important reference groups for Mycenaean pottery is the Mycenae/Berbati (MB). In several studies, a second group has been identified (MBKR). The chemical compositions were similar to MB, but with important differences in the Na, K and Rb contents. The present study suggests that these differences are due to selective alteration and contamination processes that are indirectly determined by the original firing temperature. Therefore, groups MB and MBKR should be considered as a single reference group.
Resumo:
OBJECTIVES: To investigate the frequency of interim analyses, stopping rules, and data safety and monitoring boards (DSMBs) in protocols of randomized controlled trials (RCTs); to examine these features across different reasons for trial discontinuation; and to identify discrepancies in reporting between protocols and publications. STUDY DESIGN AND SETTING: We used data from a cohort of RCT protocols approved between 2000 and 2003 by six research ethics committees in Switzerland, Germany, and Canada. RESULTS: Of 894 RCT protocols, 289 prespecified interim analyses (32.3%), 153 stopping rules (17.1%), and 257 DSMBs (28.7%). Overall, 249 of 894 RCTs (27.9%) were prematurely discontinued; mostly due to reasons such as poor recruitment, administrative reasons, or unexpected harm. Forty-six of 249 RCTs (18.4%) were discontinued due to early benefit or futility; of those, 37 (80.4%) were stopped outside a formal interim analysis or stopping rule. Of 515 published RCTs, there were discrepancies between protocols and publications for interim analyses (21.1%), stopping rules (14.4%), and DSMBs (19.6%). CONCLUSION: Two-thirds of RCT protocols did not consider interim analyses, stopping rules, or DSMBs. Most RCTs discontinued for early benefit or futility were stopped without a prespecified mechanism. When assessing trial manuscripts, journals should require access to the protocol.
Resumo:
Several authors in the 17th century used the atomic hypothesis to explain observable phenomena. This paper analyzes some ideas about chemical transformation proposed by the English physician Walter Charleton. In Physiologia Epicuro-Gassendo-Charltoniana (London, 1654), Charleton examined philosophical aspects of the atomic theory, and suggested that the best explanation for all natural phenomena would be only in terms of atoms and their motions. Sometimes, however, he had to attribute to the atoms some kind of "internal virtue", to explain more complex properties of the matter. His idea of "element", and the little use of experimentation and quantification, also limited the range of Charleton's theory.
Resumo:
Here we discuss two consecutive MERLIN observations of the X-ray binary LS I +61° 303 . The first observation shows a double-sided jet extending up to about 200 AU on both sides of a central source. The jet shows a bent S-shaped structure similar to the one displayed by the well-known precessing jet of SS 433 . The precession suggested in the first MERLIN image becomes evident in the second one, showing a one-sided bent jet significantly rotated with respect to the jet of the day before. We conclude that the derived precession of the relativistic (beta=0.6) jet explains puzzling previous VLBI results. Moreover, the fact that the precession is fast could be the explanation of the never understood short term (days) variability of the associated gamma-ray source 2CG 135+01 / 3EG J0241+6103
Resumo:
Dreaming is a pure form of phenomenality, created by the brain untouched by external stimulation or behavioral activity, yet including a full range of phenomenal contents. Thus, it has been suggested that the dreaming brain could be used as a model system in a biological research program on consciousness (Revonsuo, 2006). In the present thesis, the philosophical view of biological realism is accepted, and thus, dreaming is considered as a natural biological phenomenon, explainable in naturalistic terms. The major theoretical contribution of the present thesis is that it explores dreaming from a multidisciplinary perspective, integrating information from various fields of science, such as dream research, consciousness research, evolutionary psychology, and cognitive neuroscience. Further, it places dreaming into a multilevel framework, and investigates the constitutive, etiological, and contextual explanations for dreaming. Currently, the only theory offering a full multilevel explanation for dreaming, that is, a theory including constitutive, etiological, and contextual level explanations, is the Threat Simulation Theory (TST) (Revonsuo, 2000a; 2000b). The empirical significance of the present thesis lies in the tests conducted to test this specific theory put forth to explain the form, content, and biological function of dreaming. The first step in the empirical testing of the TST was to define exact criteria for what is a ‘threatening event’ in dreams, and then to develop a detailed and reliable content analysis scale with which it is possible to empirically explore and quantify threatening events in dreams. The second step was to seek answers to the following questions derived from the TST: How frequent threatening events are in dreams? What kind of qualities these events have? How threatening events in dreams relate to the most recently encoded or the most salient memory traces of threatening events experienced in waking life? What are the effects of exposure to severe waking life threat on dreams? The results reveal that threatening events are relatively frequent in dreams, and that the simulated threats are realistic. The most common threats include aggression, are targeted mainly against the dream self, and include simulations of relevant and appropriate defensive actions. Further, real threat experiences activate the threat simulation system in a unique manner, and dream content is modulated by the activation of long term episodic memory traces with highest negative saliency. To sum up, most of the predictions of the TST tested in this thesis received considerable support. The TST presents a strong argument that explains the specific design of dreams as threat simulations. The TST also offers a plausible explanation for why dreaming would have been selected for: because dreaming interacted with the environment in such a way that enhanced fitness of ancestral humans. By referring to a single threat simulation mechanism it furthermore manages to explain a wide variety of dream content data that already exists in the literature, and to predict the overall statistical patterns of threat content in different samples of dreams. The TST and the empirical tests conducted to test the theory are a prime example of what a multidisciplinary approach to mental phenomena can accomplish. Thus far, dreaming seems to have always resided in the periphery of science, never regarded worth to be studied by the mainstream. Nevertheless, when brought to the spotlight, the study of dreaming can greatly benefit from ideas in diverse branches of science. Vice versa, knowledge learned from the study of dreaming can be applied in various disciplines. The main contribution of the present thesis lies in putting dreaming back where it belongs, that is, into the spotlight in the cross-road of various disciplines.
Resumo:
In any discipline, where uncertainty and variability are present, it is important to haveprinciples which are accepted as inviolate and which should therefore drive statisticalmodelling, statistical analysis of data and any inferences from such an analysis.Despite the fact that two such principles have existed over the last two decades andfrom these a sensible, meaningful methodology has been developed for the statisticalanalysis of compositional data, the application of inappropriate and/or meaninglessmethods persists in many areas of application. This paper identifies at least tencommon fallacies and confusions in compositional data analysis with illustrativeexamples and provides readers with necessary, and hopefully sufficient, arguments topersuade the culprits why and how they should amend their ways
Resumo:
Innovation has been widely recognized as an important driver of firm competitiveness, and the firm’s internal research and development (R&D) activities are often considered to have a critical role in innovation activities. Internal R&D is, however, not the source of innovation as firms may tap into knowledge necessary for innovation also through various types of sourcing agreements or by collaborating with other organizations. The objective of this study is to analyze the way firms go about organizing efficiently their innovation boundaries. Within this context, the analysis is focused, firstly, on the relation between innovation boundaries and firm innovation performance and, secondly, on the factors explaining innovation boundary organization. The innovation literature recognizes that the sources of innovation depend on the nature of technology but does not offer a sufficient tool for analyzing innovation boundary options and their efficiency. Thus, this study suggests incorporating insights from transaction cost economics (TCE) complemented with dynamic governance costs and benefits into the analysis. The thesis consists of two parts. The first part introduces the background of the study, research objectives, an overview of the empirical studies, and the general conclusions of the study. The second part is formed of five publications. The overall results firstly indicate that although the relation between firm innovation boundary options is partly industry sector-specific, the firm level search strategies and knowledge transfer capabilities are important for innovation performance independently of the sector. Secondly, the results show that the attributes suggested by TCE alone do not offer a sufficient explanation of innovation boundary selection, especially under conditions of high levels of (radical) uncertainty. Based on the results, the dynamic governance cost and benefit framework complements the static TCE when firm innovation boundaries are scrutinized.
Resumo:
In this paper I am concerned with the problem of applying the notion of rigidity to general terms. In Naming and Necessity, Kripke has clearly suggested that we should include some general terms among the rigid ones, namely, those common nouns semantically correlated with natural substances, species and phenomena, in general, natural kinds -'water', 'tiger', 'heat'- and some adjectives -'red', 'hot', 'loud'. However, the notion of rigidity has been defined for singular terms; after all, the notion that Kripke has provided us with is the notion of a rigid designator. But general terms do not designate single individuals: rather, they apply to many of them. In sum, the original concept of rigidity cannot be straightforwardly applied to general terms: it has to be somehow redefined in order to make it cover them. As is known, two main positions have been put forward to accomplish that task: the identity of designation conception, according to which a rigid general term is one that designates the same property or kind in all possible worlds, and the essentialist conception, which conceives of a rigid general term as an essentialist one, namely, a term that expresses an essential property of an object. My purpose in the present paper is to defend a particular version of the identity of designation conception: on the proposed approach, a rigid general term will be one that expresses the same property in all possible worlds and names the property it expresses. In my opinion, the position can be established on the basis of an inference to the best explanation of our intuitive interpretation and evaluation, relative to counterfactual circumstances, of statements containing different kinds of general terms, which is strictly analogous to our intuitive interpretation and evaluation, relative to such circumstances, of statements containing different kinds of singular ones. I will argue that it is possible to offer a new solution to the trivialization problem that is thought to threaten all versions of the identity of designation conception of rigidity. Finally, I will also sketch a solution to the so-called 'over-generalization and under-generalization problems', both closely related to the above-mentioned one.
Resumo:
Energy efficiency is one of the major objectives which should be achieved in order to implement the limited energy resources of the world in a sustainable way. Since radiative heat transfer is the dominant heat transfer mechanism in most of fossil fuel combustion systems, more accurate insight and models may cause improvement in the energy efficiency of the new designed combustion systems. The radiative properties of combustion gases are highly wavelength dependent. Better models for calculating the radiative properties of combustion gases are highly required in the modeling of large scale industrial combustion systems. With detailed knowledge of spectral radiative properties of gases, the modeling of combustion processes in the different applications can be more accurate. In order to propose a new method for effective non gray modeling of radiative heat transfer in combustion systems, different models for the spectral properties of gases including SNBM, EWBM, and WSGGM have been studied in this research. Using this detailed analysis of different approaches, the thesis presents new methods for gray and non gray radiative heat transfer modeling in homogeneous and inhomogeneous H2O–CO2 mixtures at atmospheric pressure. The proposed method is able to support the modeling of a wide range of combustion systems including the oxy-fired combustion scenario. The new methods are based on implementing some pre-obtained correlations for the total emissivity and band absorption coefficient of H2O–CO2 mixtures in different temperatures, gas compositions, and optical path lengths. They can be easily used within any commercial CFD software for radiative heat transfer modeling resulting in more accurate, simple, and fast calculations. The new methods were successfully used in CFD modeling by applying them to industrial scale backpass channel under oxy-fired conditions. The developed approaches are more accurate compared with other methods; moreover, they can provide complete explanation and detailed analysis of the radiation heat transfer in different systems under different combustion conditions. The methods were verified by applying them to some benchmarks, and they showed a good level of accuracy and computational speed compared to other methods. Furthermore, the implementation of the suggested banded approach in CFD software is very easy and straightforward.
Resumo:
Reactive arthritis (ReA) is an inflammatory joint disease triggered by certain bacterial infections e.g. gastroenteritis caused by Salmonella. ReA is strongly associated to HLA-B27. However, the mechanism behind this association is unknown but it is suggested that the bacteria or bacterial compartments persist in the body. In this study, it was investigated whether the intracellular signaling is altered in HLA-B27- transfected U937 monocytic macrophages. Moreover, the contribution of HLA–B27 heavy chain (HC) misfolding was of interest. The study revealed that p38 activity plays a crucial role in controlling intracellular Salmonella Enteritidis in U937 cells. The replication of intracellular bacteria was dependent on p38 kinase and the activity of p38 was dysregulated in HLA-B27- transfected cells expressing misfolding heavy chains (HCs). Also the double-stranded RNA -dependent kinase (PKR) that modifies p38 signaling was overexpressed and hypophosphorylated upon infection and lipopolysaccharide stimulation. The expression of CCAAT enhancer binding protein beta (C/EBPβ) was found to be increased after infection and stimulation. Increased amount of full length human antigen R (HuR), disturbed HuR cleavage and reduced dependence on PKR after infection were observed. All the findings were linked to HLA-B27 HCs containing misfoldingassociated glutamic acid 45 (Glu45) at the peptide binding groove. The results indicate that the expression of HLA-B27 modulates the intracellular environment of U937 monocytic macrophages by altering signaling. This phenomenon is at least partially associated to the HLA-B27 misfolding. These observations offer a novel explanation how HLA-B27 may modulate inflammatory response induced by ReA-triggering bacteria.
Resumo:
Online sexual solicitation (solicitation) of youth has received widespread media and research attention during the last decade. The prevalence rates of youth who have experienced solicitation or solicitation attempts vary between studies depending on the methodology used (e.g., whether youth or adults are the target study group). In studies focusing on youth victims, the prevalence of solicitation attempts made by adults during the past year is typically reported to be between 5 and 9%. Adults who solicit youth online have been found to use deception and other manipulative behaviors to gain access to sexual activities with youth. However, previous studies have lacked a control group of adults who solicit other adults online. Without this comparison, one could argue that deceiving others online about one’s identity, and engaging in manipulative behaviors, is an inherent part of most online sexual interactions with strangers. Additionally, little is known about the associations between manipulative behaviors and the solicitation outcomes. In research concerning offline sexual behaviors, it has been noted that situational factors, such as sexual arousal, may alter both sexual interest and behavior. The effects of situational factors on online sexual behaviors have been less extensively studied (especially so with a quantitative approach); no studies have to date focused on adults’ solicitation of youth. Investigating the role of a lowered sexual age preference and the role of situational factors in the soliciting adults could be an important step in order to receive deeper knowledge of the role of traits and states in the context of solicitation. Additionally, there is a lack of knowledge of the effect of the age of the youth. Although previous studies on solicitation has found that older youth, compared with younger youth and children, are more often solicited, the possible reasons for this have not been investigated. Are adults who solicit youth affected by legal deterrence (through the legal age of consent), is it because older youth are more available online, or are the adults’ age preferences merely a product of a normally distributed age preference in the population? The purpose of the present thesis was fivefold: 1) to obtain an estimate of the frequency of adults’ solicitation of youth as self-reported and observed in actual behavior; 2) to explore whether the legal age of consent (LAC) affects solicitation frequency, or whether a normally distributed sexual age preference more accurately describe the proportion of solicited youth of different ages; 3) to investigate the associations of both traits (e.g., lower sexual age preference) and states (immediate situational factors, such as alcohol intoxication), and the solicitation target; 4) to explore whether adults who solicit youth and adults who solicit adults are equally deceitful and manipulative online, and whether the different solicitation outcomes are as common in both groups; and 5) to investigate whether the deceitful and manipulative behaviors engaged in had different associations with the solicitation outcomes depending on the age of the solicited. In the survey study, a convenience sample of 1393 adult participants (aged 18 years or older) self-reported any online communication with strangers during the past year. Of these, 56% (776 respondents) reported that they had solicited or attempted to solicit at least one stranger. Of the respondents, 453 (58.4%) were men, and 323 (41.6%) were women. Participants with only adult contacts (18 years or older) constituted the majority (640 respondents). In contrast, 136 individuals reported a youth contact (a 13 year old or younger, or a 14 to 17-year old). Approximately half of the participants were men in the adult contact group, while 75% of the participants were men in the youth contact group. Approximately 60% of the participants with youth contacts were recruited from two websites associated with a pedophilic sexual interest. In an online quasi-experimental study, with researchers impersonating youth of different ages (10–18 year olds) in chat rooms, 251 online conversations with chat room visitors made up the entire sample. All chat room visitors alleged to be men. The self-reported frequency of having solicited youth (0–17-year olds) during the past year was approximately 10% in our sample of adults who reported communicating with any strangers online. When we observed this behavior in chat rooms, we found that approximately 30% of the chat room visitors who believed they interacted with a 10 to 14 year old attempted to solicit the youth. We found that solicitation attempts increased equally much when increasing the age of the impersonated youth from 14 to 16, as from 16 to 18. Thus, we concluded that a normally distributed age preference in the population was a more plausible explanation to the effect of the age of the solicited, rather than the LAC (here; 15 and 16). If the chat room visitors would have been deterred only by the LAC, we would have expected that the change in amount of solicitation attempts from an illegal age group to a legal age group would have been significantly stronger than changes between age groups within illegal-illegal and legal-legal groups. Our subsample of survey participants from the pedophilia-related websites expectedly reported that they had solicited youth more often in comparison to the sample gathered through general (i.e., not associated with any particular sexual preference) websites. We also found that participants with a youth contact reported higher levels of sexual arousal and shame before the sexual interaction with their online contact, compared with participants with an adult contact. Additionally, the participants with youth contacts who reported consumption of child- and adolescent pornography also reported being more sexually aroused before the interaction, compared to the participants with youth contacts who did not report consumption of these kinds of pornography. We also found clear indications that the online sexual interaction had an alleviatory effect on reported levels of sadness, boredom and stress, independent of the age of the contact. Generally, the participants with youth and adult contacts reported deceiving their contacts as often and suggesting keeping the communication a secret from someone as often. Participants with a youth contact, however, reported using more persuasion techniques for online sexual purposes or for the purpose of an offline meeting, compared to those with an adult contact. In the chat rooms, we found that more indirect ways of future sexual communication (e.g., continuing chatting) was suggested by the chat room visitors that were under the assumption of interacting with youth aged 10 to 14, compared with more direct means (e.g., meeting offline). Survey participants with youth contacts who had used deception, suggested keeping the interactions a secret, and/or persuaded their contact by appealing to the contacts feelings of love and attachment for the participant had also more often engaged in cybersex with the contact. No other manipulative behaviors were associated with the other investigated solicitation outcomes (receiving a sexual picture, meeting offline, and engaging in sexual contact offline) within this group of participants. However, using deception, suggesting secrecy and using persuasion was also positively associated with certain solicitation outcomes within participants with an adult contact. In summary, adults’ solicitation of youth is much more frequent when observed in chat rooms than self-reported. Additionally, an underlying lowered sexual age preference seems to be a motivating factor on a group level in adults who solicit youth. We concluded that directed prevention efforts should be made on pedophiliarelated websites. Additionally, the role of situational factors, especially sexual arousal in persons with a pedo- or hebephilic sexual interest should be investigated further in the context of online sexual solicitation.
Resumo:
The adequate way of neutralizing the Dutch disease is the imposition of a variable tax on the export of the commodity that originates the disease. If such tax is equivalent to the "size" of the Dutch disease, it will shifts to the right its supply curve of the commodity in relation to the exchange rate, giving the existing domestic supply and the international demand, the exchange rate will depreciate at the value of the tax, and the equilibrium exchange rate will move from the "current" to the "industrial" equilibrium.
Resumo:
Adenoviral vectors are currently the most widely used gene therapeutic vectors, but their inability to integrate into host chromosomal DNA shortened their transgene expression and limited their use in clinical trials. In this project, we initially planned to develop a technique to test the effect of the early region 1 (E1) on adenovirus integration by comparing the integration efficiencies between an E1-deleted adenoviral vector (SubE1) and an Elcontaining vector (SubE3). However, we did not harvest any SubE3 virus, even if we repeated the transfection and successfully rescued the SubE1 virus (2/4 transfections generated viruses) and positive control virus (6/6). The failure of rescuing SubE3 could be caused by the instability of the genomic plasmid pFG173, as it had frequent intemal deletions when we were purifying It. Therefore, we developed techniques to test the effect of E1 on homologous recombination (HR) since literature suggested that adenovirus integration is initiated by HR. We attempted to silence the E1 in 293 cells by transfecting E1A/B-specific small interfering RNA (siRNA). However, no silenced phenotype was observed, even if we varied the concentrations of E1A/B siRNA (from 30 nM to 270 nM) and checked the silencing effects at different time points (48, 72, 96 h). One possible explanation would be that the E1A/B siRNA sequences are not potent enough to Induce the silenced phenotype. For evaluating HR efficiencies, an HR assay system based on bacterial transfonmatJon was designed. We constmcted two plasmids ( designated as pUC19-dl1 and pUC19-dl2) containing different defective lacZa cassettes (forming white colonies after transformation) that can generate a functional lacZa cassette (forming blue colonies) through HR after transfecting into 293 cells. The HR efficiencies would be expressed as the percentages of the blue colonies among all the colonies. Unfortunately, after transfonnation of plasmid isolated from 293 cells, no colony was found, even at a transformation efficiency of 1.8x10^ colonies/pg pUC19, suggesting the sensitivity of this system was low. To enhance the sensitivity, PCR was used. We designed a set of primers that can only amplify the recombinant plasmid fomied through HR. Therefore, the HR efficiencies among different treatments can be evaluated by the amplification results, and this system could be used to test the effect of E1 region on adenovirus integration. In addition, to our knowledge there was no previous studies using PCR/ Realtime PCR to evaluate HR efficiency, so this system also provides a PCR-based method to carry out the HR assays.
Resumo:
This study has three purposes: to establish a chronologically controlled vegetational history for a number of sites in south Southwestern Ontario; to utilize the resulting data to support and/or add to the current understanding of Quaternary geology and stratigraphy, and the glacial and postglacial history of the Great Lakes in south Southwestern Ontario; and to attempt to propose a possible explanation for the extinction of the mastodon in Southern Ontario. Palynological and geochronological analyses were conducted on material collected from eleven sites (east to west): Verbeke Mastodon Site, Woloshko Mastodon Site, Walker Pond II, Pond Mills I, Lake Hunger Bog, Bouckaert Site. Mabee Site, Cornell Bog. Colles Lake I, Folden Mastodon Site and Forest Pond. Individual geochronologically controlled (where possible) vegetational histories were reconstructed for each of the sites investigated. The results of the individual studies, when considered in overview. indicated the existance of an established closed boreal forest throughout south Southwestern Ontario by 10,000 years B.P. This evidence for a significant climatic change coincident throughout south Southwestern Ontario supports the proposed age of 10,000 years B.P. for the Pleistocene/Holocene Boundary (Terasmae, 1972). Remnant patches of 'open spruce parkland' persisted in small local 'wet' areas. It was in these areas that the mastodon was restricted during early Holocene time. With continued encroachment by the surrounding boreal forest, possibly speeded up by this browser's destructive feeding habits, the spruce enclaves shrank and the mastodon became extinct in south Southwestern Ontario. The results of this thesis basically support Dreimanis' (1967, 1968) proposed 'Environmental-Climatic' theory for mastodon extinction. It is suggested that increased dryness during the present interglacial compared to the climate of earlier interglacials may be the key to unravelling the problem of mastodon extinction in eastern North America.
Resumo:
Cover title.