Sökresultat

Filtyp

Din sökning på "*" gav 547951 sökträffar

Institutional Risk

The concept of institutional risk is defined as the risk that the regulator will not meet its organizational and policy objectives. The counterpart of institutional risk is societal risk, that is, the risks in society that regulators are entrusted to manage. In recent decades risk management has for various reasons become an attractive solution for societal regulation on all levels. Despite this s

Properties of electrolyte-filled glass microelectrodes : a model analysis

A novel dynamic mathematical microelectrode model (a model of solvent and solute kinetics in electrolyte-filled microelectrodes) was deduced from experimental observations made on standard (single-barrelled, 3.0 M KCl-filled, approximately 10 M[ohm]) electrodes using (a) electrodiffusion, electro-osmosis, and continuity equations that were placed into the constraints of electrode geometry, and (b)

Analysis of leak current properties in the lobster stretch receptor neurone

Experiments were performed to characterize the so-called leak current of the slowly adapting stretch receptor neurone of the European lobster with respect to its ionic basis, its kinetics and its pharmacology. Estimates of the leak current were obtained by subtraction of a Na-K pump current and of an unspecific impalement current from a non-dynamic ('instantaneous') current, recorded in a voltage

Properties of electrolyte-filled glass microelectrodes : an experimental study

The electrochemical and electrical properties of geometrically defined electrolyte-filled microelectrodes were studied at various transelectrode current passages, using radiotracer (38Cl and 42K) and electrical techniques. Geometrically, the electrodes were defined by their tip properties that, for standard (single-barrelled, 3.0 M KCl-filled, approximately 10 M[ohm]) electrodes implied a tip open

Islamic Modernities in Southeast Asia. Exploring Indonesian Popular and Visual Culture, by Leonie Schmidt

In Islamic Modernities in Southeast Asia, Leonie Schmidt provides a thorough analysis of contemporary Islamic-themed popular and visual cultures, mainly in Indonesia. This book is an essential read for those who wish to understand multiple modernities unfolding in post-1998 Indonesia (the Reformasi era). By using the term Islamic, she refers to any ‘cultural practices that are considered bernafask

IoT protection through device to cloud synchronization

This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable high level application model and where the execution state of the application of the IoT device is 'mirrored' in a cloud executed machine. This machine

Providing User Security Guarantees in Public Infrastructure Clouds

The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants-insulated from the minutiae of hardware maintenance-rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organizations operating on sensitive data avoid migrating oper

On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake

DTLS is a transport layer security protocol designed to provide secure communication over unreliable datagram protocols. Before starting to communicate, a DTLS client and server perform a specific handshake in order to establish a secure session and agree on a common security context. However, the DTLS handshake is affected by two relevant issues. First, the DTLS server is vulnerable to a specific

Bootstrapping trust in software defined networks

Software-Defined Networking (SDN) is a novel architectural model for cloud network infrastructure, improving resource utilization, scalability and administration. SDN deployments increasingly rely on virtual switches executing on commodity operating systems with large code bases, which are prime targets for adversaries attacking the network infrastructure. We describe and implement TruSDN, a frame

Perioperative alcohol cessation intervention for postoperative complications

Background: Risky consumption of alcohol is a global problem. More than 3.3 million deaths annually are associated with risky use of alcohol, and global alcohol consumption continues to increase. People who have high alcohol consumption often require planned and emergency surgical procedures. Risky drinking is associated with increased postoperative complications such as infections, cardiopulmonar

Aerodynamics of manoeuvring flight in brown long-eared bats (Plecotus auritus)

In this study, we explicitly examine the aerodynamics of manoeuvring flight in animals. We studied brown long-eared bats flying in a wind tunnel while performing basic sideways manoeuvres. We used particle image velocimetry in combination with high-speed filming to link aerodynamics and kinematics to understand the mechanistic basis of manoeuvres. We predicted that the bats would primarily use the

Sexual dimorphism in a top predator (Notophthalmus viridescens) drives aquatic prey community assembly

Intraspecific variation can have important consequences for the structure and function of ecological communities, and serves to link community ecology to evolutionary processes. Differences between the sexes are an overwhelmingly common form of intraspecific variation, but its community-level consequences have never been experimentally investigated. Here, we manipulate the sex ratio of a sexually

High-level software requirements and iteration changes : a predictive model

Knowing whether a software feature will be completed in its planned iteration can help with release planning decisions. However, existing research has focused on predictions of only low-level software tasks, like bug fixes. In this paper, we describe a mixed-method empirical study on three large IBM projects. We investigated the types of iteration changes that occur. We show that up to 54% of high

Protected areas act as a buffer against detrimental effects of climate change—Evidence from large-scale, long-term abundance data

Climate change is driving species to shift their distributions toward high altitudes and latitudes, while habitat loss and fragmentation may hamper species ability to follow their climatic envelope. These two drivers of change may act in synergy, with particularly disastrous impacts on biodiversity. Protected areas, PAs, may thus represent crucial buffers against the compounded effects of climate

Toll-like receptor 3 agonist, polyinosinic-polycytidylic acid, upregulates carbonic anhydrase ii in human keratinocytes

Carbonic anhydrases are ubiquitously expressed enzymes that reversibly hydrate carbon dioxide to bicar-bonate and protons. While the main function of carbonic anhydrases is to regulate pH and osmotic balance, their involvement in other physiological processes remains to be explored. This study analysed changes in mRNA and protein levels of carbonic anhydrase II in human primary keratinocytes treat

The approximability of maximum rooted triplets consistency with fan triplets and forbidden triplets

The NP-hard maximum rooted resolved triplets consistency problem (MRTC) takes as input a set [Formula presented] of leaf labels and a set [Formula presented] of resolved triplets over [Formula presented] and asks for a rooted phylogenetic tree that is consistent with the maximum number of elements in [Formula presented]. This article studies the approximability of a generalization of the problem c