911 resultados para Internal working model
Resumo:
Two classes of RNA ligands that bound to separate, high affinity nucleic acid binding sites on Q beta replicase were previously identified. RNA ligands to the two sites, referred to as site I and site II, were used to investigate the molecular mechanism of RNA replication employed by the four-subunit replicase. Replication inhibition by site I- and site II-specific ligands defined two subsets of replicatable RNAs. When provided with appropriate 3' ends, ligands to either site served as replication templates. UV crosslinking experiments revealed that site I is associated with the S1 subunit, site II with elongation factor Tu, and polymerization with the viral subunit of the holoenzyme. These results provide the framework for a three site model describing template recognition and product strand initiation by Q beta replicase.
Resumo:
This study had mainly two goals: First of all, adult attachement was investigated in 28 patients with chronic psychosis and 18 controls, using the"Adult Attachment Interiew". This, as no previous research had ever done so with a scientific validated instrument. Diagnostic evaluations were performed with the SCID and symptomtic evaluation with the BPRS. Results showed that patients were more likely to have experienced traumatic experiences with their primary caregivers during their childhood then have controls. We were able to identify as well a high prevalence of insecure avoidant attachement in patients, which highlights the functional dimension of psychosis in the maintenance of the relation to primary attachement figures. This study shows that insecure avoidant attachement is related to an early outset as well as to an unfavourable prognosis. Second, quite a few researches on spirituality in psychosis have shown that patients were more likely to have spiritual believes or practices then indiviuals of a nonclinical population. Coping strategies related to spirituality and religion were identified as efficient for the majority. They can help dealing with all types of difficulties, specific symptoms and may enhance life quality (Mohr et al., 2006). Therefore we have investigated some of the underlying psychological processes in this type of coping strategies, using the conceptual framework of Bowlby's attachement theory. For most participants, both patients and controls, « spiritual figures » are functionning as attachement figures. Most of them are transposing the internal working model, achieved in relation to their primary caregivers, towards their "spiritual figure" even in case of an insecure attachement. - Cette recherche poursuit essentiellement deux objectifs. Premièrement, elle examine les modèles d'attachement à l'aide du « Adult Attachment Interview » chez 28 personnes souffrant de psychose chronique et chez 18 personnes ne souffrant d'aucune affection psychiatrique. En effet, aucune étude avant celle-ci n'avait investigué l'attachement chez des patients psychotiques chroniques à l'aide d'instruments scientifiquement validés. Les évaluations diagnostiques ont été réalisées à l'aide du SCID et les évaluations symptomatologiques à l'aide du BPRS. Dans ce contexte, nous avons pu montrer qu'une majorité de patients avaient été victimes d'expériences relationnelles traumatisantes en lien avec leurs premières figures d'attachement durant l'enfance. Nos résultats indiquent également l'importante prévalence d'un attachement insécure-détaché, qui reflète la dimension fonctionnelle des symptômes psychotiques visant la préservation du lien aux principales figures d'attachement. Ceux-ci montrent encore qu'un attachement insécure-détaché est associé à un début précoce de la maladie ainsi qu'à un pronostic défavorable. Deuxièmement, de nombreuses études ont montré que les patients psychotiques avaient davantage recours à des croyances et pratiques spirituelles/religieuses pour tenter de faire face à leurs difficultés que la population générale. Ce recours s'avère être efficace pour un grand nombre d'entre eux. Il leur permet souvent une meilleure gestion des difficultés, des symptômes et globalement améliore leur qualité de vie (Mohr et al., 2006). Nous avons donc examiné certaines des dimensions psychiques sousjacentes à ce type de stratégie de coping à l'aide de l'arrière-plan conceptuel de la théorie de l'attachement de Bowlby. Nous avons effectivement constaté qu'un grand nombre de participants, patients et contrôles, investissent des figures spirituelles sur le mode de l'attachement. Même en cas d'un attachement insécure, la majorité d'entre eux transposent leurs modèles internes opérants, acquis dans leur relation aux premières figures d'attachement, sur leur croyance en des figures spirituelles.
Resumo:
Cette recherche a été inspirée par les travaux de John Bowlby sur l’attachement ainsi que par les écrits psychanalytiques de Sigmund Freud et de Donald Winnicott sur le développement de la relation père-garçon. Trois objectifs ont été formulés dans la présente étude : A) Les jeunes garçons d’âge préscolaire pourraient-ils projeter, à travers quelques sessions de jeu symbolique libre, leurs représentations paternelles? B) S’ils les projettent, quelle est la nature de ces représentations paternelles? C) Existe-t-il une relation entre le type d’attachement (évalué par un instrument standard) et les représentations paternelles projetées dans le jeu symbolique libre? Dix garçons de quatre ans ont été filmés à la maison et dans une garderie pendant, en moyenne, quatre sessions totalisant par enfant, une durée moyenne de deux heures trente minutes de jeu symbolique. Le type d’attachement a été évalué à l’aide de l’Attachment Story Completion Task. Les résultats démontrent que l’ensemble des garçons ont été en mesure de projeter des représentations paternelles basées sur la figure du père. Tous ces garçons ont perçu le père comme une figure de protection et huit enfants sur dix ont exprimé verbalement leur attachement à ce dernier. Un enfant de type évitant (type A) n’a pas évoqué la figure du père dans son jeu. Ce père était rarement à la maison pour s’occuper de son garçon. Enfin, le dernier enfant, de type ambivalent (un enfant particulièrement agressif de type C), a présenté dans son jeu des interactions négatives avec le père et ce, tout au long des sessions de jeu symbolique. Il appert ainsi que le jeu symbolique permet à l’enfant de projeter des représentations de la figure paternelle. Ces représentations sont en lien avec le type d’attachement que l’enfant détient au moment de l’évaluation.
Resumo:
Resumen basado en el de la publicación
Resumo:
Over the past two decades, interest in the psychological development of children has steadily increased (Beg, Casey, & Saunders, 2007), presumably because statistics describing childhood psychological illness are alarming. Certain parent interaction styles or behaviors are known to influence child adjustment. According to attachment theory, the reason for these findings is that interaction with a caregiver informs an individual’s construction of an internal working model (IWM) of the self in relation to others in the environment. The purpose of this study was to gain a greater understanding of the factors contributing to child adjustment by examining the influence of parents’ emotional functioning and parent responsiveness to children’s bids for interaction. This dissertation tested a multivariate model of attachment-related processes and outcomes with an ethnically diverse sample. Results partially supported the model, in that parent emotional intelligence predicted some aspects of child adjustment. Overall, the study adds to knowledge about how parent characteristics influence child adjustment and provides support for conceptualizing emotional intelligence as a concrete and observable manifestation of the nonconscious attachment IWM.
Resumo:
Provenance plays a pivotal in tracing the origin of something and determining how and why something had occurred. With the emergence of the cloud and the benefits it encompasses, there has been a rapid proliferation of services being adopted by commercial and government sectors. However, trust and security concerns for such services are on an unprecedented scale. Currently, these services expose very little internal working to their customers; this can cause accountability and compliance issues especially in the event of a fault or error, customers and providers are left to point finger at each other. Provenance-based traceability provides a mean to address part of this problem by being able to capture and query events occurred in the past to understand how and why it took place. However, due to the complexity of the cloud infrastructure, the current provenance models lack the expressibility required to describe the inner-working of a cloud service. For a complete solution, a provenance-aware policy language is also required for operators and users to define policies for compliance purpose. The current policy standards do not cater for such requirement. To address these issues, in this paper we propose a provenance (traceability) model cProv, and a provenance-aware policy language (cProvl) to capture traceability data, and express policies for validating against the model. For implementation, we have extended the XACML3.0 architecture to support provenance, and provided a translator that converts cProvl policy and request into XACML type.
Resumo:
Temos vindo a assistir nos últimos anos a uma evolução no que respeita à avaliação do risco de crédito. As constantes alterações de regulamentação bancária, que resultam dos Acordos de Basileia, têm vindo a impor novas normas que condicionam a quantidade e a qualidade do risco de crédito que as Instituições de Crédito podem assumir nos seus balanços. É de grande importância as Instituições de Crédito avaliarem o risco de crédito, as garantias e o custo de capital, pois têm um impacto direto na sua gestão nomeadamente quanto à afetação de recursos e proteção contra perdas. Desta forma, pretende-se com o presente trabalho elaborar e estruturar um modelo de rating interno através de técnicas estatísticas, assim como identificar as variáveis estatisticamente relevantes no modelo considerado. Foi delineada uma metodologia de investigação mista, considerando na primeira parte do trabalho uma pesquisa qualitativa e na segunda parte uma abordagem quantitativa. Através da análise documental, fez-se uma abordagem dos conceitos teóricos e da regulamentação que serve de base ao presente trabalho. No estudo de caso, o modelo de rating interno foi desenvolvido utilizando a técnica estatística designada de regressão linear múltipla. A amostra considerada foi obtida através da base de dados SABI e é constituída por cem empresas solventes, situadas na zona de Paredes, num horizonte temporal de 2011-2013. A nossa análise baseou-se em três cenários, correspondendo cada cenário aos dados de cada ano (2011, 2012 e 2013). Para validar os pressupostos do modelo foram efetuados testes estatísticos de Durbin Watson e o teste de significância - F (ANOVA). Por fim, para obtermos a classificação de rating de cada variável foi aplicada a técnica dos percentis. Pela análise dos três cenários considerados, verificou-se que o cenário dois foi o que obteve maior coeficiente de determinação. Verificou-se ainda que as variáveis independentes, rácio de liquidez geral, grau de cobertura do ativo total pelo fundo de maneio e rácio de endividamento global são estatisticamente relevantes.
Resumo:
Bowlby proposed that the individual's social experiences, as early as in infancy, contribute to the construction of Internal Working Models (IWMs) of attachment, which will later guide the individual's expectations and behaviors in close relationships all along his or her life. The qualitative, individual characteristics of these models reflect the specificity of the individual's early experiences with attachment figures. The attachment literature globally shows that the qualities of IWMs are neither gender specific nor cultural specific. Procedures to evaluate IWMs in adulthood have been well established, based on narrative accounts of childhood experiences. Narrative procedures at earlier ages (e.g., in the preschool years) have been proposed, such as Bretherton's Attachment Story Completion Task (ASCT), to evaluate attachment representations. More than 500 ASCT narratives of preschoolers, coming from five different countries, have been collected, in the perspective of examining possible interactions between gender and culture regarding attachment representations. A specific Q-Sort coding procedure (CCH) has been used to evaluate several dimensions of the narratives. Girls' narratives appeared as systematically more secure than those of same-age boys, whatever their culture. The magnitude of gender differences, however, varied between countries. Taylor's model of gender-specific responses to stress and Harwood's and Posada's hypothesis on inter-cultural differences regarding caregiving are evoked to understand the differences across gender and countries.
Resumo:
Regulatory agencies such as Europol, Frontex, Eurojust, CEPOL as well as bodies such as OLAF, have over the past decade become increasingly active within the institutional architecture constituting the EU’s Area of Freedom, Security and Justice and are now placed at the forefront of implementing and developing the EU’s internal security model. A prominent feature of agency activity is the large-scale proliferation of ‘knowledge’ on security threats via the production of policy tools such as threat assessments, risk analyses, periodic and situation reports. These instruments now play a critical role in providing the evidence-base that supports EU policymaking, with agency-generated ‘knowledge’ feeding political priority setting and decision-making within the EU’s new Internal Security Strategy (ISS). This paper examines the nature and purpose of knowledge generated by EU Home Affairs agencies. It asks where does this knowledge originate? How does it measure against criteria of objectivity, scientific rigour, reliability and accuracy? And how is it processed in order to frame threats, justify actions and set priorities under the ISS?
Resumo:
This study examined the meaning-making and psychosocial processes of five female legacy students at Bucknell University, each of whom having had at least one parent graduate from the institution. With a research philosophy, design, and methodology rooted in qualitative inquiry and phenomenology, inductive data analysis led to three primary categories that underscored legacy identity development. The first, Paradox of Influence and Identity, revealed through six themes nuanced experiences of separation-individuation. Second, Teaching and Learning, comprised of five themes, illuminated the impact of family — and of Bucknell parent alumni in particular — on their children’s internal working models. Lastly, Bucknell — the Environmental Contextand the five themes grouped therein highlighted the contributions of University community members, and of the campus culture and climate itself, to the co-construction of psychosocial formation. A tentative outline of grounded theory was offered, which explored categorical relationships; Paradox of Influence and Identity emerged as thedominant phenomenon, informing and being reinforced by the data of Teaching and Learning and Bucknell — the Environmental Context. Provisional intervention strategies for student affairs practice, in the contexts of academics, residential life, and career development, were discussed. Further, triangulated research is needed to substantiate and evolve the findings and theoretical model of this thesis.
Resumo:
Transformers are very important elements of any power system. Unfortunately, they are subjected to through-faults and abnormal operating conditions which can affect not only the transformer itself but also other equipment connected to the transformer. Thus, it is essential to provide sufficient protection for transformers as well as the best possible selectivity and sensitivity of the protection. Nowadays microprocessor-based relays are widely used to protect power equipment. Current differential and voltage protection strategies are used in transformer protection applications and provide fast and sensitive multi-level protection and monitoring. The elements responsible for detecting turn-to-turn and turn-to-ground faults are the negative-sequence percentage differential element and restricted earth-fault (REF) element, respectively. During severe internal faults current transformers can saturate and slow down the speed of relay operation which affects the degree of equipment damage. The scope of this work is to develop a modeling methodology to perform simulations and laboratory tests for internal faults such as turn-to-turn and turn-to-ground for two step-down power transformers with capacity ratings of 11.2 MVA and 290 MVA. The simulated current waveforms are injected to a microprocessor relay to check its sensitivity for these internal faults. Saturation of current transformers is also studied in this work. All simulations are performed with the Alternative Transients Program (ATP) utilizing the internal fault model for three-phase two-winding transformers. The tested microprocessor relay is the SEL-487E current differential and voltage protection relay. The results showed that the ATP internal fault model can be used for testing microprocessor relays for any percentage of turns involved in an internal fault. An interesting observation from the experiments was that the SEL-487E relay is more sensitive to turn-to-turn faults than advertized for the transformers studied. The sensitivity of the restricted earth-fault element was confirmed. CT saturation cases showed that low accuracy CTs can be saturated with a high percentage of turn-to-turn faults, where the CT burden will affect the extent of saturation. Recommendations for future work include more accurate simulation of internal faults, transformer energization inrush, and other scenarios involving core saturation, using the newest version of the internal fault model. The SEL-487E relay or other microprocessor relays should again be tested for performance. Also, application of a grounding bank to the delta-connected side of a transformer will increase the zone of protection and relay performance can be tested for internal ground faults on both sides of a transformer.
Resumo:
A cikk a belső ellenőrzésnek a hatékony társaságirányításhoz való hozzájárulását és ennek a versenyképességre gyakorolt hatását vizsgálja. A belső ellenőrzés és a társaságirányítás kölcsönös összefüggésben áll egymással. Nemcsak a belső ellenőrzés hat a társaságirányításra, hanem a releváns társaságirányítási struktúrák, emberi kapcsolatok és magatartásformák jelentős hatást gyakorolnak a belső ellenőrzés színvonalára és hatékonyságára. A cikk ezért különös figyelmet szentel a belső ellenőröknek az igazgatósággal, az auditbizottsággal/felügyelőbizottsággal, a menedzsmenttel és a könyvvizsgálóval való kapcsolatainak vizsgálatára. Rávilágít a belső ellenőrzés legfőbb funkciójára, amely objektív bizonyosságot nyújt az igazgatóság és a felső vezetők számára a kockázatok azonosítására, kezelésére és elfogadható szintre történő csökkentésére szolgáló kontrollfolyamatok megfelelőségéről és hatékonyságáról. A bemutatott belső ellenőrzési modell azt a szemléletet közvetíti, hogy a belső ellenőrzés által nyújtott objektív bizonyosság megszerzése nemcsak a jogszabályoknak vagy az ajánlásoknak való megfelelés, hanem a társaságok versenyképessége szempontjából is kiemelkedő jelentőségű. _________ The purpose of this paper is to consider the contribution of internal audit to the sound corporate governance and the impact of that on the competitiveness of the companies. There is a mutual dependency between internal audit and corporate governance. Not only the internal audit has impact on the corporate governance but the relevant governance structures, relationships and behaviour influence the level and effectiveness of the internal audit. Therefore the present paper is highly concerned with the internal auditors` relationships with the board, audit committee/supervisory board, senior management and the external auditor. It highlights the internal audit function, that provides objective assurance to the board and senior management about the adequacy and effectiveness of the processes by which risks are identified, managed, controlled and mitigated to acceptable levels. The internal audit model demonstrated represents an approach, according to that getting objective assurance provided by internal audit is important not only to be in line with laws and recommendations but to facilitate the corporate competitiveness.