2,877 research outputs found

    Art Deaccessions and the Limits of Fiduciary Duty

    Get PDF
    Art deaccessions prompt lawsuits against museums, and some commentators advocate using the stricter trust standard of care, instead of the prevailing corporate standard (business judgment rule), to evaluate the conduct of non‑profit museum boards. This Article explores the consequences of adopting the trust standard by applying it to previously unavailable deaccession policies of prominent art museums. It finds that so long as museum boards adhere to these policies, their decisions would satisfy the trust standard. This outcome illustrates an important limitation of fiduciary law: the trust standard evaluates procedural care but cannot assess deaccessions on their merits. Yet this limitation, far from undercutting the trust rule, balances judicial review with protecting boards’ management discretion. This Article ventures beyond formalist analysis of fiduciary duty and examines the non‑legal, substantive rules governing art deaccessions. It argues that complemented by non‑legal rules, the trust standard provides the best framework for adjudicating deaccession lawsuits because it ensures judicial scrutiny of deaccession procedures while leaving appraisal of deaccessions’ merits to museum professionals and the public they serve. Sue Chen J.D. Duke Law School \u270

    Desynchronization of Large Scale Delayed Neural Networks

    Get PDF
    We consider a ring of identical neurons with delayed nearest neighborhood inhibitory interaction. Under general conditions, such a network has a slowly oscillatory synchronous periodic solution which is completely characterized by a scalar delay di erential equation with negative feedback. Despite the fact that the slowly oscillatory periodic solution of the scalar equation is stable, we show that the associated synchronous solution is unstable if the size of the network is large

    Correlates of undefined cause of injury coded mortality data in Australia

    Get PDF
    The objective of this research was to identify the level of detail regarding the external causes of death in Australia and ascertain problematic areas where data quality improvement efforts may be focused. The 2003 national mortality dataset of 12591 deaths with an external cause of injury as the underlying cause of death (UCOD) or multiple cause of death (MCOD) based on ICD-10 code assignment from death certificate information was obtained. Logistic regression models were used to examine the precision of coded external cause of injury data.---- It was found that overall, accidents were the most poorly defined of all intent code blocks with over 30% of accidents being undefined, representing 2314 deaths in 2003. More undefined codes were identified in MCOD data than for UCOD data. Deaths certified by doctors were more likely to use undefined codes than deaths certified by a coroner or government medical office.---- To improve the quality of external cause of injuries leading to or associated with death, certifiers need to be made aware of the importance of documenting all information pertaining to the cause of the injury and the intent behind the incident, either through education or more explicit instructions on the death certificate and accompanying instructional materials. It is important that researchers are aware of the validity of the data when they make interpretations as to the underlying causes of fatal injuries and causes of injury associated with deaths

    Obscurin and KCTD6 regulate cullin-dependent small ankyrin-1 (sAnk1.5) protein turnover.

    Get PDF
    Protein turnover through cullin-3 is tightly regulated by posttranslational modifications, the COP9 signalosome, and BTB/POZ-domain proteins that link cullin-3 to specific substrates for ubiquitylation. In this paper, we report how potassium channel tetramerization domain containing 6 (KCTD6) represents a novel substrate adaptor for cullin-3, effectively regulating protein levels of the muscle small ankyrin-1 isoform 5 (sAnk1.5). Binding of sAnk1.5 to KCTD6, and its subsequent turnover is regulated through posttranslational modification by nedd8, ubiquitin, and acetylation of C-terminal lysine residues. The presence of the sAnk1.5 binding partner obscurin, and mutation of lysine residues increased sAnk1.5 protein levels, as did knockdown of KCTD6 in cardiomyocytes. Obscurin knockout muscle displayed reduced sAnk1.5 levels and mislocalization of the sAnk1.5/KCTD6 complex. Scaffolding functions of obscurin may therefore prevent activation of the cullin-mediated protein degradation machinery and ubiquitylation of sAnk1.5 through sequestration of sAnk1.5/KCTD6 at the sarcomeric M-band, away from the Z-disk-associated cullin-3. The interaction of KCTD6 with ankyrin-1 may have implications beyond muscle for hereditary spherocytosis, as KCTD6 is also present in erythrocytes, and erythrocyte ankyrin isoforms contain its mapped minimal binding site

    A question of Taiwan

    Full text link

    The effect of elbow position and grip span on isometric grip strength and force distribution of fingers.

    Get PDF
    Injuries to the hand, lower arm, and shoulder are often attributed to inappropriate use or poor design of hand tools. Isometric grip, performed with the angled handles of pliers was investigated in this study. For this thesis, three factors were studied. They were grip type (traditional and reversed grip), elbow position (0\sp\circ, 30\sp\circ, 60\sp\circ, 90\sp\circ, and 120\sp\circ), and grip span (50, 60, and 70 mm). The resultant forces between the jaws of the pliers and finger forces were measured under each condition. The purpose of this study was to evaluate the effect of elbow position and grip span on grip strength and force distribution across the fingers. The results showed that elbow position, grip span and grip type have significant effects on resultant force and finger force. The forces were statistically higher at the fully extended elbow position than at the 30\sp\circ, 90\sp\circ and 120\sp\circ elbow positions, and the resultant force was higher at the 60\sp\circ, 30\sp\circ, and 90\sp\circ positions than at the 120\sp\circ position. Regardless of elbow positions and grip type the optimal grip span was found to be 50 mm and forces decreased as grip span increased. The resultant force obtained in a traditional grip exceeded the force obtained in a reversed grip. Also, the finger force varied according to elbow position, grip span and grip type. The influences of these factors also varied according to fingers. Interactions between grip span and grip type were found in index and ring fingers. (Abstract shortened by UMI.)Dept. of Industrial and Manufacturing Systems Engineering. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis1997 .C4255. Source: Masters Abstracts International, Volume: 37-01, page: 0334. Thesis (M.A.Sc.)--University of Windsor (Canada), 1997

    Recent progress in the analysis of iced airfoils and wings

    Get PDF
    Recent work on the analysis of iced airfoils and wings is described. Ice shapes for multielement airfoils and wings are computed using an extension of the LEWICE code that was developed for single airfoils. The aerodynamic properties of the iced wing are determined with an interactive scheme in which the solutions of the inviscid flow equations are obtained from a panel method and the solutions of the viscous flow equations are obtained from an inverse three-dimensional finite-difference boundary-layer method. A new interaction law is used to couple the inviscid and viscous flow solutions. The newly developed LEWICE multielement code is amplified to a high-lift configuration to calculate the ice shapes on the slat and on the main airfoil and on a four-element airfoil. The application of the LEWICE wing code to the calculation of ice shapes on a MS-317 swept wing shows good agreement with measurements. The interactive boundary-layer method is applied to a tapered iced wing in order to study the effect of icing on the aerodynamic properties of the wing at several angles of attack

    Peer to Peer Mobile Coupons: Adding Incentives without Sacrificing Security

    Get PDF
    Mobile commerce is flourishing today due to the advance of the mobile technology. Many conventional marketing activities are moving their ways to the mobile environment. Efficient marketing instruments such as the paper coupons and the electronic coupons are also evolving into the mobile coupons. In comparison with conventional coupons, mobile coupons are personalized and suitable for peer to peer delivery. Coupons are commonly issued by the merchants, used by the interested customers, and discarded by the uninterested receivers. Raising the redemption rate of the coupon will increase the sales of the promoted items. The raise can be accomplished by forwarding coupons from uninterested receivers to potentially interested customers. The ease-of-use exchange mechanism in mobile devices pushes the delivery in the peer to peer environment. Moreover, the characteristic of personalization inspires trust into mobile coupons. Thus, adding the incentives of coupon forwarding, such as a reward bonus, may activate the movement of stationary coupons and eventually increase the redemption rate of mobile coupons. Nevertheless, the incentives adding may bring the threats of alterations and forgery; if the adding mechanism is improperly made. Additionally, complicated security means are hindered by the limitations of storage space, computation power, and communication bandwidth of mobile devices. Therefore, we propose a scheme that uses digital signatures for verifying the incentive-added coupons and design a hash chain to detect possible forgery. The proposed scheme may increase the use of peer to peer mobile coupons without sacrificing the security
    • …
    corecore