996 resultados para Ancient Order of United Workmen. Grand Legion of the Select Knights (Ont.)
Resumo:
The Atlas Mountains in Morocco are considered as type examples of intracontinental chains, with high topography that contrasts with moderate crustal shortening and thickening. Whereas recent geological studies and geodynamic modeling have suggested the existence of dynamic topography to explain this apparent contradiction, there is a lack of modern geophysical data at the crustal scale to corroborate this hypothesis. Newly-acquired magnetotelluric data image the electrical resistivity distribution of the crust from the Middle Atlas to the Anti-Atlas, crossing the tabular Moulouya Plain and the High Atlas. All the units show different and unique electrical signatures throughout the crust reflecting the tectonic history of development of each one. In the upper crust electrical resistivity values may be associated to sediment sequences in the Moulouya and Anti-Atlas and to crustal scale fault systems in the High Atlas developed during the Cenozoic times. In the lower crust the low resistivity anomaly found below the Mouluya plain, together with other geophysical (low velocity anomaly, lack of earthquakes and minimum Bouguer anomaly) and geochemical (Neogene-Quaternary intraplate alkaline volcanic fields) evidence, infer the existence of a small degree of partial melt at the base of the lower crust. The low resistivity anomaly found below the Anti-Atlas may be associated with a relict subduction of Precambrian oceanic sediments, or to precipitated minerals during the release of fluids from the mantle during the accretion of the Anti-Atlas to the West African Supercontinent during the Panafrican orogeny ca. 685 Ma).
Resumo:
Bacterial classification is a long-standing problem for taxonomists and species definition itself is constantly debated among specialists. The classification of strict intracellular bacteria such as members of the order Chlamydiales mainly relies on DNA- or protein-based phylogenetic reconstructions because these organisms exhibit few phenotypic differences and are difficult to culture. The availability of full genome sequences allows the comparison of the performance of conserved protein sequences to reconstruct Chlamydiales phylogeny. This approach permits the identification of markers that maximize the phylogenetic signal and the robustness of the inferred tree. In this study, a set of 424 core proteins was identified and concatenated to reconstruct a reference species tree. Although individual protein trees present variable topologies, we detected only few cases of incongruence with the reference species tree, which were due to horizontal gene transfers. Detailed analysis of the phylogenetic information of individual protein sequences (i) showed that phylogenies based on single randomly chosen core proteins are not reliable and (ii) led to the identification of twenty taxonomically highly reliable proteins, allowing the reconstruction of a robust tree close to the reference species tree. We recommend using these protein sequences to precisely classify newly discovered isolates at the family, genus and species levels.
Resumo:
BACKGROUND: Data evaluating the chronological order of appearance of extraintestinal manifestations (EIMs) relative to the time of inflammatory bowel disease (IBD) diagnosis is currently lacking. We aimed to assess the type, frequency, and chronological order of appearance of EIMs in patients with IBD. METHODS: Data from the Swiss Inflammatory Bowel Disease Cohort Study were analyzed. RESULTS: The data on 1249 patients were analyzed (49.8% female, median age: 40 [interquartile range, 30-51 yr], 735 [58.8%] with Crohn's disease, 483 [38.7%] with ulcerative colitis, and 31 [2.5%] with indeterminate colitis). A total of 366 patients presented with EIMs (29.3%). Of those, 63.4% presented with 1, 26.5% with 2, 4.9% with 3, 2.5% with 4, and 2.7% with 5 EIMs during their lifetime. Patients presented with the following diseases as first EIMs: peripheral arthritis 70.0%, aphthous stomatitis 21.6%, axial arthropathy/ankylosing spondylitis 16.4%, uveitis 13.7%, erythema nodosum 12.6%, primary sclerosing cholangitis 6.6%, pyoderma gangrenosum 4.9%, and psoriasis 2.7%. In 25.8% of cases, patients presented with their first EIM before IBD was diagnosed (median time 5 mo before IBD diagnosis: range, 0-25 mo), and in 74.2% of cases, the first EIM manifested itself after IBD diagnosis (median: 92 mo; range, 29-183 mo). CONCLUSIONS: In one quarter of patients with IBD, EIMs appeared before the time of IBD diagnosis. Occurrence of EIMs should prompt physicians to look for potential underlying IBD.
Resumo:
Genetic tools have greatly aided in tracing the sources and colonization history of introduced species. However, recurrent introductions and repeated shuffling of populations may have blurred some of the genetic signals left by ancient introductions. Styela plicata is a solitary ascidian distributed worldwide. Although its origin remains unclear, this species is believed to have spread worldwide by travelling on ship's hulls. The goals of this study were to infer the genetic structure and global phylogeography of S. plicata and to look for present-day and historical genetic patterns. Two genetic markers were used: a fragment of the mitochondrial gene Cytochrome Oxidase subunit I (COI) and a fragment of the nuclear gene Adenine Nucleotide Transporter/ADP-ATP Translocase (ANT). A total of 368 individuals for COI and 315 for ANT were sequenced from 17 locations worldwide. The levels of gene diversity were moderate for COI to high for ANT. The Mediterranean populations showed the least diversity and allelic richness for both markers, while the Indian, Atlantic and Pacific Oceans had the highest gene and nucleotide diversities. Network and phylogenetic analyses with COI and ANT revealed two groups of alleles separated by 15 and 4 mutational steps, respectively. The existence of different lineages suggested an ancient population split. However, the geographic distributions of these groups did not show any consistent pattern, indicating different phylogeographic histories for each gene. Genetic divergence was significant for many population-pairs irrespective of the geographic distance among them. Stochastic introduction events are reflected in the uneven distribution of COI and ANT allele frequencies and groups among many populations. Our results confirmed that S. plicata has been present in all studied oceans for a long time, and that recurrent colonization events and occasional shuffling among populations have determined the actual genetic structure of this species.
Resumo:
Sport betting is a lucrative business for bookmakers, for the lucky (or wise) punters, but also for governments and for sport. While not new or even recent, the deviances linked to sport betting, primarily match-fixing, have gained increased media exposure in the past decade. This exploratory study is a qualitative content analysis of the press coverage of sport betting-related deviances in football in two countries (UK and France), using in each case two leading national publications over a period of five years. Data analysis indicates a mounting coverage of sport betting scandals, with teams, players and criminals increasingly framed as culprits, while authorities and federations primarily assume a positive role. As for the origin of sport betting deviances, French newspapers tend to blame the system (in an abstract way); British newspapers, in contrast, focus more on individual weaknesses, notably greed. This article contributed to the growing body of literature on the importance of these deviances and on the way they are perceived by sport organizations, legislators and the public at large.
Embracing the dark : the magic order of Dragon Rouge : its practice in dark magic and meaning making
Resumo:
Avhandlingen undersöker den Afrikanska Unionens freds- och säkerhetsråd och dess roll i framhävandet och upprätthållandet av fred, säkerhet och stabilitet i Afrika. Detta freds- och säkerhetsråd etablerades formellt 2004 och opererar under den Afrikanska Unionen (AU) som å sin sida upprättades 2002. Den Afrikanska Unionens freds- och säkerhetsråds roll i framhävandet av fred, säkerhet och stabilitet gör rådet till en hörnsten inom ramen för konfliktförebyggande och -hantering, samt konfliktlösning på den afrikanska kontinenten. Den Afrikanska Unionens freds- och säkerhetsråd spelar också en högst viktig roll i implementeringen av ansvaret att beskydda civilbefolkningen i konfliktsituationer. För uppfyllandet av sitt mandat att framhäva och upprätthålla fred, säkerhet och stabilitet i Afrika krävs det att freds- och säkerhetsrådet samarbetar med andra institutioner och mekanismer som handhar internationella och regionala freds- och säkerhetsärenden. Avhandlingen analyserar tre dimensioner av denna typ av relationer som freds- och säkerhetsrådet bör etablera med dessa organ och mekanismer för att kunna utföra sitt mandat effektivt. Först analyseras relationen mellan Afrikanska Unionens freds- och säkerhetsråd och Förenta Nationernas säkerhetsråd som också beskrivs i artikel 17 (1) i protokollet som förde till etablerandet av AU:s freds- och säkerhetsråd. Analysen understryker FN:s säkerhetsråd som det organ som bär det primära ansvaret i förhållande till fred och säkerhet, medan AU:s freds- och säkerhetsråd fungerar som en kompletterande komponent i sin roll som ett regionalt organ. Avhandlingen fortsätter med att analysera förhållandet mellan AU:s freds- och säkerhetsråd och andra organ inom AU, samt andra relevanta institutioner som framgår av artikel 10, 18 (1), 19 och 20 i protokollet för rådets etablerande. Avhandlingen diskuterar i detalj hur samarbetet mellan AU:s freds- och säkerhetsråd och dessa institutioner och organ kunde förstärkas till fördel för effektivt framhävande och upprätthållande av fred och säkerhet i Afrika. Slutligen analyserar avhandlingen samarbetet mellan AU:s freds- och säkerhetsråd och sub-regionala mekanismer etablerade under regionala ekonomiska gemenskaper som beskrivs i artikel 16 i protokollet för etablerandet av rådet. Avhandlingen diskuterar i detalj rollen för de sub-regionala mekanismerna i den afrikanska freds- och säkerhetsarkitekturen. Avhandlingen diskuterar vidare förhållandet mellan de sub-regionala mekanismerna och den afrikanska stand-by styrkan ASF och förutsättningarna för detta arrangemang att bemöta afrikanska konflikter. Avhandlingen fokuserar också på en harmoniserings- och samarbetsprocess i förhållande till de sub-regionala mekanismerna, de regionala ekonomiska gemenskaperna och den Afrikanska Unionens freds- och säkerhetsråd. Kort sagt beskriver avhandlingen hur förhållandet mellan AU:s freds- och säkerhetsråd och de ovan nämnda organ och mekanismer har en faktisk och potentiell möjlighet att effektivt bidra till fred, säkerhet och stabilitet i Afrika. Avhandlingen identifierar utmaningarna kring att göra detta till ett fungerande förhållande samtidigt som den genererar både generella och specifika rekommendationer om hur dessa utmaningar bäst kan bemötas. Några av dessa utmaningar utgörs av följande aspekter: konflikten mellan AU:s och FN:s reglemang i bemötandet av freds- och säkerhetsutmaningar; de olika metoderna i FN och AU vid implementeringen av principen av universell jurisdiktion; konflikten mellan de olika mandaten som AU:s freds- och säkerhetsråd och FN:s säkerhetsråd har i förhållande till implementeringen av principen om intervention; och konflikten mellan lagarna och metoderna i förhållande till AU:s freds- och säkerhetsråd och de regionala mekanismerna. En av de huvudsakliga rekommendationerna i avhandlingen i bemötandet av de ovan nämnda utmaningarna är att harmonisera de olika systemen för att försäkra att det föreligger ett samordnat bemötande av konflikter i Afrika. Efter att ha identifierat luckorna i AU:s freds- och säkerhetsprotokoll med speciell fokus på förhållandet mellan rådet och de relevanta organen och mekanismerna rekommenderar avhandlingen ett antal tillägg och modifieringar till instrumentet ifråga för att effektivera, stärka och upprätthålla detta förhållande. Avhandlingen föreslår att dessa tillägg och modifieringar skulle företas under 2014 då detta år markerar 10 år efter att AU:s freds- och säkerhetsråd etablerades. Idén bakom detta företagandet ligger i att 10 år torde vara en tillfredställande tidsperiod för att mäta hur freds- och säkerhetsrådet har fungerat och hur dess förhållande med de relevanta institutionerna och mekanismerna kunde förbättras. Avhandlingen representerar den bredaste och nyaste studien inom ramen för artikel 16, 17, 18, 19 och 20 i protokollet för AU:s freds- och säkerhetsråd och introducerar ett innovativt bemötande av utmaningar till fred, säkerhet och stabilitet på den afrikanska kontinenten. Avhandlingen bidrar till teorin och praxisen i AU:s freds- och säkerhetsråd vilket kan vara av intresse för både forskare och praktiker i folkrätt såväl som i internationella freds- och säkerhetsstudier, speciellt i Afrika.
Resumo:
The Electronic Government (e-Government) means delivering the services and information to the citizens and businesses through the use of Information and Communication Technology (ICT) in order to enable them to interact more effectively with the government, and to increase the quality of the services. As many other governments in the developed and developing countries, the Kurdistan Regional Government (KRG) has embarked on the e-Government initiatives. This study revealed that there are various challenges which affect the e-Government in the Kurdistan Region of Iraq (KRI), but also a lot of e-Government progress has happened. In addition, based on the United Nations’ e-Government maturity level benchmarking, the e-Government in the KRI is at the interactive stage. In this study the services that the citizens want from the government in order to implement an appropriate e-Government were also identified.
Resumo:
The subject of this dissertation, which belongs to the field of Classical Philology, are the definitions of the art of grammar found in Greek and Latin sources from the Classical era to the second century CE. Definitions survive from grammarians, philosophers, and general scholars. I have examined these definitions from two main points of view: how they are formed, and how they reflect the development of the art itself. Defining formed part of dialectic, in practice also of rhetoric, and was perceived as important from the Classical era onwards. Definitions of grammar seem to have become established as part of preliminary discussions, located at the beginning of grammatical manuals (tékhnai, artes). These discussions included certain principal notions of the art; in addition to the definition, a list of the parts of the art was also typically included. These lists were formed by two different methods: division (diaíresis, divisio) and partition (merismós, partitio). Many of the grammarians may actually have been unfamiliar with these methods, unlike the two most important scholars of the Late Republic, Varro and Cicero. Significant attention was devoted to the question whether the art of grammar is based on lógos or empeiría. This epistemological question had its roots in medical theories, which were prominent in Alexandria. In the history of the concept of grammatiké or grammatica, three stages become evident. In the Classical era, the Greek term is used to refer to a very concrete art of letters (grámmata); from the Hellenistic era onwards it refers to the art developed by the Alexandrian scholars, a matter of textual and literary criticism. Towards the end of the Hellenistic era, the grammarian also becomes involved with the question of correct language, which gradually begins to appear in the definitions as well.
Resumo:
This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.
Resumo:
Inneh. bl. a. en engelsk öfvers af Runebergs "Vårt land".
Resumo:
When two stimuli are presented simultaneously to an observer, the perceived temporal order does not always correspond to the actual one. In three experiments we examined how the location and spatial predictability of visual stimuli modulate the perception of temporal order. Thirty-two participants had to report the temporal order of appearance of two visual stimuli. In Experiment 1, both stimuli were presented at the same eccentricity and no perceptual asynchrony between them was found. In Experiment 2, one stimulus was presented close to the fixation point and the other, peripheral, stimulus was presented in separate blocks in two eccentricities (4.8º and 9.6º). We found that the peripheral stimulus was perceived to be delayed in relation to the central one, with no significant difference between the delays obtained in the two eccentricities. In Experiment 3, using three eccentricities (2.5º, 7.3º and 12.1º) for the presentation of the peripheral stimulus, we compared a condition in which its location was highly predictable with two other conditions in which its location was progressively less predictable. Here, the perception of the peripheral stimulus was also delayed in relation to the central one, with this delay depending on both the eccentricity and predictability of the stimulus. We argue that attentional deployment, manipulated by the spatial predictability of the stimulus, seems to play an important role in the temporal order perception of visual stimuli. Yet, under whichever condition of spatial predictability, basic sensory and attentional processes are unavoidably entangled and both factors must concur to the perception of temporal order.
Resumo:
In the present paper we discuss the development of "wave-front", an instrument for determining the lower and higher optical aberrations of the human eye. We also discuss the advantages that such instrumentation and techniques might bring to the ophthalmology professional of the 21st century. By shining a small light spot on the retina of subjects and observing the light that is reflected back from within the eye, we are able to quantitatively determine the amount of lower order aberrations (astigmatism, myopia, hyperopia) and higher order aberrations (coma, spherical aberration, etc.). We have measured artificial eyes with calibrated ametropia ranging from +5 to -5 D, with and without 2 D astigmatism with axis at 45º and 90º. We used a device known as the Hartmann-Shack (HS) sensor, originally developed for measuring the optical aberrations of optical instruments and general refracting surfaces in astronomical telescopes. The HS sensor sends information to a computer software for decomposition of wave-front aberrations into a set of Zernike polynomials. These polynomials have special mathematical properties and are more suitable in this case than the traditional Seidel polynomials. We have demonstrated that this technique is more precise than conventional autorefraction, with a root mean square error (RMSE) of less than 0.1 µm for a 4-mm diameter pupil. In terms of dioptric power this represents an RMSE error of less than 0.04 D and 5º for the axis. This precision is sufficient for customized corneal ablations, among other applications.