• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 32
  • 13
  • 5
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 84
  • 43
  • 15
  • 13
  • 11
  • 11
  • 11
  • 10
  • 10
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Biocontainment system for bacterial antigen delivery carriers

Al-Mamari, Ahmed January 2017 (has links)
Genetically modified organisms (GMOs) are confined physically in order to contain their spread in nature and to minimise chances of horizontal gene transfer. However, with the potential that GMOs hold as cheap, reliable and efficient micro-machines, their eventual uncontrolled release into the wider space is becoming more likely. Indeed, their application as environmental sensors is largely increasing. Nevertheless, the field of synthetic biology may also afford solutions to the problem. A major potential application of GMOs is the delivery of antigens to human and animal hosts, through the utilization of live, engineered microbes. Recombinant technology is promising for several reasons including their capacity to be less reactogenic, more potent, safer and genetically definable. Also, they have the potential to provide protection against multiple targets simultaneously, are relatively inexpensive and can be eradicated with antibiotics, as the need arises. Besides, delivery of vaccines to mucosal surfaces is more efficient. Mutant Salmonella expressing heterologous antigens have been shown to induce protection against a variety of pathogens. Nevertheless, limited containment systems are available that can be applicable for bacterial antigen carriers. This project aims to design safeguards for the bacterial antigen delivery systems that limit ORF translatability and self-inactivates/destructs upon exit from the host. In this work, double quadruplet codons were suppressed by orthogonal tRNAs, providing a barrier for gene translation in the recipient cells when antigen is horizontally transferred. Furthermore, three kill switches were designed that are activated by a decrease in temperature from 37 °C. First, Sau3AI endonuclease was activated by protein self-splicing at low temperature mediated by Mtu recA intein. The activation of the endonuclease led to three-fold logarithmic decrease in the number of viable cells within two hours of gene expression. Second, RNA-dependent activation of RNase 7 showed a reduction in the number of viable cells at low temperature of three logarithmic folds. RNase 7 was controlled by the cspA 5’UTR, which sequesters ribosome binding site at 37 °C and allows translation at low temperature. Third, CspA 5’UTR was shown to regulate expression of TEV protease at 37 °C and low temperature. This led to bacterial cellular inhibition within two hours of TEV induction and five-fold logarithmic reduction in the number of viable cells at low temperature. In addition, for the first time and contrary to previous studies, the TEV protease was shown to inhibit cellular growth. It was also shown that biofilm formation was drastically impaired by the TEV activity. The three killing switches and the quadruplet translation system are poised to function as robust safeguards for bacterial antigen delivery systems.
62

La convergence de la sécurité informatique et de la protection des renseignements personnels : vers une nouvelle approche juridique

Vincente, Ana Isabel 07 1900 (has links)
Le développement exponentiel des réseaux informatiques a largement contribué à augmenter le volume des renseignements personnels disponibles et à remplacer les méthodes désuètes de collecte des renseignements par des méthodes plus rapides et plus efficaces. La vie privée et le contrôle sur les informations personnelles, telles que nous les connaissions il y a quelques décennies, sont des notions difficilement compatibles avec la société ouverte et commerciale comme la nôtre. Face à cette nouvelle réalité menaçante pour les droits et libertés de l'homme, il est essentiel de donner un cadre technique et légal stable qui garantisse un niveau de protection adéquat de ces données personnelles. Pour rester dans le marché ou bénéficier de la confiance des individus, les entreprises et les gouvernements doivent posséder une infrastructure de sécurité informatique efficace. Cette nouvelle donne a tendance à devenir plus qu'une simple règle de compétitivité, elle se transforme en une authentique obligation légale de protéger les données à caractère personnel par des mesures de sécurité adéquates et suffisantes. Ce mémoire aborde justement ces deux points: premièrement, l'étude du développement d'une obligation légale de sécurité et ensuite, l'encadrement juridique de la mise en place d'un programme de sécurisation des données personnelles par des mesures de sécurités qui respectent les standards minimaux imposés par les textes législatifs nationaux et internationaux. / The latest development in information networks largelly contributed to the increasing amount of personal data being collected by the public and private sector and the replacement of old fashioned collection methods by faster and cheaper techniques. Notions of privacy and control of personnal data are not as we used to know them a decade ago and they became somehow incompatible with an open and commercial society in which we live. Facing this new and dangerous reality to fondamental human rights and liberties, it is pressing to give a legal and technical stable framework insuring an adequate level of protection to personnal data. To keep a competitive position in the market and maintain individuals trust in the system, companies and governments must guarantee an efficent security infrastructure. If this feature was until now a strategie advantage, it has become an authentic legal obligation to protect personnal data by suffisant safeguards. The purpose of this work is essentially consider those two statements: the study of the development of a legal obligation to guarantee the security of personnal data and the legal backing for the implementation of a security policy respecting minimal standards imposed by national and international laws. / "Mémoire présenté à la Faculté des études supérieures en vue de l'obtention du grade de maîtrise en droit (LL.M.) option Nouvelles technologies de l'information"
63

Damming the Mekong: the social, economic and environmental consequences of the Nam Theun 2 Hydroelectric Project

Wolf, Jason 03 January 2013 (has links)
More than a decade after the World Bank was forced out of the dam-building industry due to the social and environmental consequences of the projects they helped to finance, World Bank support for the development of the Nam Theun 2 (NT2) Hydroelectric Project, located atop the bio-diverse Nakai Plateau in central Laos, signals the re-emergence of the Bank’s involvement in large-scale dam construction initiatives. The NT2 project is the Bank’s response to its international critics. The project is a ‘test case’ for a new model of hydropower development that seeks to counteract any negative consequences to the surrounding environment and populations through the enactment of a new set of environmental and social safeguards that the Bank had spent over a decade developing. As the optimal consequence, if NT2 achieves the goal of safeguarding the bio-diverse environment of the Nakai region through the creation and implementation of long-term ‘socially and environmentally sustainable’ livelihood activities capable of raising the living standards and income levels of Nakai villagers beyond the national poverty line, then the NT2 model of development will be validated and its use in other World Bank supported hydroelectric initiatives all but assured. The alternative result is that the new safeguard mechanisms fail to achieve these goals, significantly contributing to the destabilization of one of the of the most environmentally and culturally unique regions in the world. This thesis analyzes the effectiveness of NT2 social and environmental safeguards in order to determine to what extent this new model of development is achieving the objectives it set prior to construction. Using a range of data, it analyzes outcomes produced from the core safeguards program of the project: the resettlement livelihoods’ programmes. Analysis of villagers’ livelihoods after resettlement clearly indicates that the NT2 model was never able to overcome challenges posed by reduced access to forest and agricultural lands for re-establishing villagers’ core land-based livelihood activities. As a result, many villagers have abandoned the livelihoods programmes at resettlement villages across the Plateau. In the short term, these villagers have, nevertheless, significantly increased their incomes through intensified commercial fishing and export-oriented rare timber and endangered wildlife extraction activities. The problem for NT2 developers such as the World Bank is that this form of economic activity is neither socially nor environmentally sustainable, placing the regional environment, local populations and the NT2 project in jeopardy. / Graduate
64

Pagrindinių įtariamojo teisių procesinės garantijos / Procedural safeguards of suspect’s fundamental rigths

Sitnikaitė, Jurgita 15 March 2006 (has links)
It is the first Lithuania's steps towards legal state and that is why it is particulary important for the criminal procedure law and legal practise to clear out what kind of suspect right's procedural safeguards are settled in Criminal Procedural Code of Lithuania Republic and how efective and fulfilling the minimal standards,reflecting European countries traditions, they are.According to the above mentioned information, the objective of this work is to find out optimal suspects fundamental rights procedural safeguards.
65

Reliability Engineering Approach to Probabilistic Proliferation Resistance Analysis of the Example Sodium Fast Reactor Fuel Cycle Facility

Cronholm, Lillian Marie 2011 August 1900 (has links)
International Atomic Energy Agency (IAEA) safeguards are one method of proliferation resistance which is applied at most nuclear facilities worldwide. IAEA safeguards act to prevent the diversion of nuclear materials from a facility through the deterrence of detection. However, even with IAEA safeguards present at a facility, the country where the facility is located may still attempt to proliferate nuclear material by exploiting weaknesses in the safeguards system. The IAEA's mission is to detect the diversion of nuclear materials as soon as possible and ideally before it can be weaponized. Modern IAEA safeguards utilize unattended monitoring systems (UMS) to perform nuclear material accountancy and maintain the continuity of knowledge with regards to the position of nuclear material at a facility. This research focuses on evaluating the reliability of unattended monitoring systems and integrating the probabilistic failure of these systems into the comprehensive probabilistic proliferation resistance model of a facility. To accomplish this, this research applies reliability engineering analysis methods to probabilistic proliferation resistance modeling. This approach is demonstrated through the analysis of a safeguards design for the Example Sodium Fast Reactor Fuel Cycle Facility (ESFR FCF). The ESFR FCF UMS were analyzed to demonstrate the analysis and design processes that an analyst or designer would go through when evaluating/designing the proliferation resistance component of a safeguards system. When comparing the mean time to failure (MTTF) for the system without redundancies versus one with redundancies, it is apparent that redundancies are necessary to achieve a design without routine failures. A reliability engineering approach to probabilistic safeguards system analysis and design can be used to reach meaningful conclusions regarding the proliferation resistance of a UMS. The methods developed in this research provide analysts and designers alike a process to follow to evaluate the reliability of a UMS.
66

Desenvolvimento de metodologias utilizadas nas áreas de salvaguardas e forense nuclear baseadas na técnica LA-HR-ICP-MS / Development of methodologies used in Nuclear Safeguards and Nuclear Forensic based on LA-HR-ICP-MS technique

Rafael Coelho Marin 14 November 2013 (has links)
A amostragem ambiental por esfregaço ou swipe samples é uma metodologia que vem sendo empregada rotineiramente pela Agência Internacional de Energia Atômica (AIEA) para verificar se os Estados signatários do Acordo de Salvaguardas estão realizando atividades nucleares não declaradas. A análise dessas amostras ambientais é complementar aos procedimentos de salvaguardas convencionais para a verificação das informações cedidas pelos Estados. Neste trabalho, foi descrita uma metodologia que visa a fortalecer os processos de salvaguarda nuclear e da ciência forense nuclear no país. A proposta é estudar e avaliar a técnica de ablação à laser acoplada a um espectrômetro de massa de alta resolução com fonte de plasma indutivamente acoplado (LA-HR-ICP-MS Laser Ablation High Resolution Inductively Coupled Plasma Mass Spectrometry), como técnica alternativa para a análise das amostras de esfregaço. Adicionalmente, foram empregadas outras técnicas complementares (atividade radioativa, microscopia eletrônica de varredura e espectroscopia de energia dispersiva) com o intuito de garantir maior segurança ao processo de inspeção de salvaguardas e investigações forenses nucleares. A precisão, medida através do desvio padrão relativo (DPR),dos resultados obtidos para as razões isotópicas 234U/238U, 235U/238U e 236U/238U do padrão analisado (CRM -125A) para a medida do fator de discriminação de massa foram, respectivamente, 1,3 %, 0,2 % e 7,6 %. Já as incertezas percentuais (u %), que também contemplam o DPR das medições, variaram de 3,5 % a 29,8 % para as medições da razão isotópica 235U/238U e de 16,6 % a 42,9 % para a razão isotópica 234U/238U. Esses valores mostraram-se compatíveis com outros estudos que utilizaram a mesma técnica para análise de amostras reais coletadas em uma instalação nuclear. As amostras coletadas apresentaram nível de enriquecimento que variou de (2,3 ± 0,7) % (amostra 3 corredor de acesso à instalação) a (17,3 ± 2,8) % (amostra 18 bancada de recuperação de UF4). A partir da coleta de amostras nesses diversos pontos, desde a entrada da instalação até a bancada em que se manuseia o urânio enriquecido, foi possível detectar diversos níveis de enriquecimento no isótopo 235U. / Environmental sampling performed by means of swipe samples is a methodology frequently employed by International Atomic Energy Agency (IAEA) to verify if the signatory States of the Safeguards Agreements are conducing unauthorized activities. Swipe samples analysis is complementary to the Safeguards ordinary procedures used to verify the information given by the States. In this work it was described a methodology intending to strengthen the nuclear safeguards and nuclear forensics procedures. The proposal is to study and evaluate the laser ablation high resolution inductively coupled plasma mass spectrometry (LA-HR-ICP-MS) technique as an alternative to analyze the real-life swipe samples. The precision achieved through the standard(CRM -125A)measurements, represented by the relative standard deviation (RSD), was respectively 1.3 %, 0.2 % e 7.6 %for the 234U/238U, 235U/238U e 236U/238Uisotopes ratios. The percent uncertainties (u %), which covers the RSD, ranged from 3.5 % to 29.8 % to the 235U/238U measurements and from 16.6 % to 42.9 % to the 234U/238U isotope ratio. These results were compatible with former studies performed by the LA-HR-ICP-MS that analyzed real-life swipe samples collected at a nuclear facility. Swipe samples collected from several points of the nuclear facility presented enrichment level ranging from (2.3 ± 0.7) % (sample 3) to (17.3 ± 2.8) % (sample18). They also allowed detecting different enrichment levels within the facility.
67

Managing Manufacturing Outsourcing Relationships

Skowronski, Keith Collins 22 November 2016 (has links)
No description available.
68

Regulace Dublin III v Itálii / The Gap between Policy and Practice: Dublin Regulation III in Post-Overburdened Italy

Trabelsi, Ines January 2019 (has links)
Focused on procedural safeguards for asylum seekers contained within Dublin Regulation III (Articles 4 and 5), this thesis has the aim of understanding why Italian administrations are still not compliant with these rights, which are nevertheless guaranteed in directly applicable and immediately enforceable EU legislation. This study turns its attention to the enforcement obstacles, and explores the factors that might impede compliance with the law, some of which appeared less self-evident than others. Before proceeding to a technical on-the-ground analysis of the problem informed by expert interviews, the previously assumed argument of 'overburdened peripheral state' is first taken off the debate, since, as the thesis explains, due to recent policies, Italy has not been burdened during the last two years and yet has still been demonstrating lack of compliance. The results point to two clear distinct factors: a poor administration lacking staff, training and autonomy, as well as a lack of control and sanction from EU and National entities, and lack of litigation from below. Further results hinting at the potential existence of political interference in administrations' non-application of these articles have also been highlighted but not confirmed as those are in need of more thorough research....
69

Exchanging Approaches: Evaluating Methods to Counter Chinese Currency Undervaluation

Trask, Brandon Marshall 28 November 2013 (has links)
I evaluate four possible approaches the United States may take to address China's practice of undervaluing the renminbi: 1) a challenge under Article XV of the GATT and the associated IMF provisions; 2) countervailing duties; 3) antidumping measures; and 4) safeguard measures. I conclude that the first three approaches are unlikely to succeed; there are a number of legal and political obstacles to the pursuit of these remedies. While the current WTO safeguards regime is likely insufficient, a new safeguards regime can--and should--be developed. I review and critique Dani Rodrik's proposal for a new safeguards regime and set out my own basic blueprint for a significantly expanded safeguards regime, emphasizing that flexibility in the realm of international trade law would help to secure overall stability in international trade itself. In order to be effective shock absorbers, safeguards must become far more flexible.
70

Exchanging Approaches: Evaluating Methods to Counter Chinese Currency Undervaluation

Trask, Brandon Marshall 28 November 2013 (has links)
I evaluate four possible approaches the United States may take to address China's practice of undervaluing the renminbi: 1) a challenge under Article XV of the GATT and the associated IMF provisions; 2) countervailing duties; 3) antidumping measures; and 4) safeguard measures. I conclude that the first three approaches are unlikely to succeed; there are a number of legal and political obstacles to the pursuit of these remedies. While the current WTO safeguards regime is likely insufficient, a new safeguards regime can--and should--be developed. I review and critique Dani Rodrik's proposal for a new safeguards regime and set out my own basic blueprint for a significantly expanded safeguards regime, emphasizing that flexibility in the realm of international trade law would help to secure overall stability in international trade itself. In order to be effective shock absorbers, safeguards must become far more flexible.

Page generated in 0.0464 seconds