272 resultados para Duncan, Erika


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Where a secured lender elects to appoint a receiver and manager, the appointment document standardly provides for the receiver and manager to act as the agent of the debtor. This article considers the significance of this agency in the context of three specific issues that have the potential to arise in the receivership of a corporate borrower across all Australian jurisdictions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Efforts to improve the performance of commercial buildings have often focused on encouraging green design, construction and building operation; however, the business case is not very compelling if considering the energy cost savings alone. In recent years green building has been driven by a sense that it will improve the productivity of occupants, something with even greater economic returns than energy savings. Reducing energy demand in commercial buildings in a way that encourages greater productivity is not yet well understood as it involves a set of complex and interdependent factors. This project investigates these factors and focuses on the performance of and interaction between: green design elements, indoor environment quality, tenant/ leasing agreements and culture, occupant experience, and building management practices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research is one of the subjects that students in the health professions often find challenging and yet the process of finding, critiquing, using and evaluating information is essential to professional development and practice. This book introduces fundamental research concepts that are relevant to the wider health-care and disability support sector while also making strong connections to the various areas of practice that students identify with.Examples and cases are taken from a wide range of professions and countries to help students understand the significance of research used by colleagues from other disciplines and become interprofessional practitioners.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As in the first edition of the book, this chapter outlines the most important ways in which intellectual property is protected in Australia, and also the factors which affect the rights of joint venture participants in the absence of specific agreement between such participants. It then examines particular issues which may be considered in preparing appropriate documentation for any joint venture which involves the utilisation or generation of intellectual property to ensure that the joint venture participants achieve their desired result in terms of the allocation of ownership and control of such rights. The analysis includes and explanation of the special considerations which affect co-operation in research between industry and a university or government research institution. Finally, the rights of the joint venturers to intellectual property upon termination of the joint ventures are considered. The chapter incorporates the legislative changes and new cases in the field since the publication of the first edition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Subheadings: What is health promotion? Research and health promotion practice Planning and evaluation as the cornerstones of evidence

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The interest in utilising multiple heterogeneous Unmanned Aerial Vehicles (UAVs) in close proximity is growing rapidly. As such, many challenges are presented in the effective coordination and management of these UAVs; converting the current n-to-1 paradigm (n operators operating a single UAV) to the 1-to-n paradigm (one operator managing n UAVs). This paper introduces an Information Abstraction methodology used to produce the functional capability framework initially proposed by Chen et al. and its Level Of Detail (LOD) indexing scale. This framework was validated through comparing the operator workload and Situation Awareness (SA) of three experiment scenarios involving multiple autonomously heterogeneous UAVs. The first scenario was set in a high LOD configuration with highly abstracted UAV functional information; the second scenario was set in a mixed LOD configuration; and the final scenario was set in a low LOD configuration with maximal UAV functional information. Results show that there is a significant statistical decrease in operator workload when a UAV’s functional information is displayed at its physical form (low LOD - maximal information) when comparing to the mixed LOD configuration.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Flower development in kiwifruit (Actinidia spp.) is initiated in the first growing season, when undifferentiated primordia are established in latent shoot buds. These primordia can differentiate into flowers in the second growing season, after the winter dormancy period and upon accumulation of adequate winter chilling. Kiwifruit is an important horticultural crop, yet little is known about the molecular regulation of flower development. Results To study kiwifruit flower development, nine MADS-box genes were identified and functionally characterized. Protein sequence alignment, phenotypes obtained upon overexpression in Arabidopsis and expression patterns suggest that the identified genes are required for floral meristem and floral organ specification. Their role during budbreak and flower development was studied. A spontaneous kiwifruit mutant was utilized to correlate the extended expression domains of these flowering genes with abnormal floral development. Conclusions This study provides a description of flower development in kiwifruit at the molecular level. It has identified markers for flower development, and candidates for manipulation of kiwifruit growth, phase change and time of flowering. The expression in normal and aberrant flowers provided a model for kiwifruit flower development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

MicroRNAs (miRNAs) are a class of small non-coding RNAs with a critical role in development and environmental responses. Efficient and reliable detection of miRNAs is an essential step towards understanding their roles in specific cells and tissues. However, gel-based assays currently used to detect miRNAs are very limited in terms of throughput, sensitivity and specificity. Here we provide protocols for detection and quantification of miRNAs by RT-PCR. We describe an end-point and real-time looped RT-PCR procedure and demonstrate detection of miRNAs from as little as 20 pg of plant tissue total RNA and from total RNA isolated from as little as 0.1 l of phloem sap. In addition, we have developed an alternative real-time PCR assay that can further improve specificity when detecting low abundant miRNAs. Using this assay, we have demonstrated that miRNAs are differentially expressed in the phloem sap and the surrounding vascular tissue. This method enables fast, sensitive and specific miRNA expression profiling and is suitable for facilitation of high-throughput detection and quantification of miRNA expression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the developing digital economy, the notion of traditional attack on enterprises of national significance or interest has transcended into different modes of electronic attack, surpassing accepted traditional forms of physical attack upon a target. The terrorist attacks that took place in the United States on September 11, 2001 demonstrated the physical devastation that could occur if any nation were the target of a large-scale terrorist attack. Therefore, there is a need to protect criticalnational infrastructure and critical information infrastructure. In particular,this protection is crucial for the proper functioning of a modern society and for a government to fulfill one of its most important prerogatives – namely, the protection of its people. Computer networks have many benefits that governments, corporations, and individuals alike take advantage of in order to promote and perform their duties and roles. Today, there is almost complete dependence on private sector telecommunication infrastructures and the associated computer hardware and software systems.1 These infrastructures and systems even support government and defense activity.2 This Article discusses possible attacks on critical information infrastructures and the government reactions to these attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This DVD describes a curriculum project embedded into the subject The Global Teacher (code: CLB049/LCB327, Faculty of Education, Queensland University of Technology). The Global Teacher is a subject within the undergraduate degree program for pre-service teachers and provides a global perspective on socio-political issues that shape education. The curriculum in The Global Teacher was designed around a collaborative partnership between Queensland University of Technology and State Library Queensland. Through this collaboration, State Library became not only a resource for information, but also helped to develop the pedagogical skills of the pre-service teaachers by guiding them in exhibiting and curating Global Teacher themes for a broader community-based audience. The collaboration became part of the assessment for The Global Teacher, requiring the pre-service teachers to visually translate their understandings of global educational issues into a public exhibition, which was held at State Library Queensland on 1st May, 2013. This DVD is a creative work explaining the stages of this collaborative project. It explores the learning outcomes achieved, using the voices of participants: the pre-service teachers, the QUT teacher educators and staff of State Library Queensland. A detailed description of this project is to be found at: http://libguides.library.qut.edu.au/content.php?pid=595206&sid=4908024&preview=1b455ed4f2c606d19702090f85d1f965

Relevância:

10.00% 10.00%

Publicador:

Resumo:

SVP-like MADS domain transcription factors have been shown to regulate flowering time and both inflorescence and flower development in annual plants, while having effects on growth cessation and terminal bud formation in perennial species. Previously, four SVP genes were described in woody perennial vine kiwifruit (Actinidia spp.), with possible distinct roles in bud dormancy and flowering. Kiwifruit SVP3 transcript was confined to vegetative tissues and acted as a repressor of flowering as it was able to rescue the Arabidopsis svp41 mutant. To characterize kiwifruit SVP3 further, ectopic expression in kiwifruit species was performed. Ectopic expression of SVP3 in A. deliciosa did not affect general plant growth or the duration of endodormancy. Ectopic expression of SVP3 in A. eriantha also resulted in plants with normal vegetative growth, bud break, and flowering time. However, significantly prolonged and abnormal flower, fruit, and seed development were observed, arising from SVP3 interactions with kiwifruit floral homeotic MADS-domain proteins. Petal pigmentation was reduced as a result of SVP3-mediated interference with transcription of the kiwifruit flower tissue-specific R2R3 MYB regulator, MYB110a, and the gene encoding the key anthocyanin biosynthetic step, F3GT1. Constitutive expression of SVP3 had a similar impact on reproductive development in transgenic tobacco. The flowering time was not affected in day-neutral and photoperiod-responsive Nicotiana tabacum cultivars, but anthesis and seed germination were significantly delayed. The accumulation of anthocyanin in petals was reduced and the same underlying mechanism of R2R3 MYB NtAN2 transcript reduction was demonstrated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cumulative arrays have played an important role in the early development of the secret sharing theory. They have not been subject to extensive study so far, as the secret sharing schemes built on them generally result in much larger sizes of shares, when compared with other conventional approaches. Recent works in threshold cryptography show that cumulative arrays may be the appropriate building blocks in non-homomorphic threshold cryptosystems where the conventional secret sharing methods are generally of no use. In this paper we study several extensions of cumulative arrays and show that some of these extensions significantly improve the performance of conventional cumulative arrays. In particular, we derive bounds on generalised cumulative arrays and show that the constructions based on perfect hash families are asymptotically optimal. We also introduce the concept of ramp perfect hash families as a generalisation of perfect hash families for the study of ramp secret sharing schemes and ramp cumulative arrays.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Australian Civil Aviation Safety Authority (CASA) currently lists more than 100 separate entities or organisations which maintain a UAS Operator Certificate (UOC) [1]. Approved operations are overwhelmingly a permutation of aerial photography, surveillance, survey or spotting and predominantly, are restricted to Visual Line of Sight (VLOS) operations, below 400 feet, and not within 3 NM of an aerodrome. However, demand is increasing for a Remote Piloted Aerial System (RPAS) regulatory regime which facilitates more expansive operations, in particular unsegregated, Beyond Visual Line of Sight (BVLOS) operations. Despite this demand, there is national and international apprehension regarding the necessary levels of airworthiness and operational regulation required to maintain safety and minimise the risk associated with unsegregated operations. Fundamental to addressing these legitimate concerns will be the mechanisms that underpin safe separation and collision avoidance. Whilst a large body of research has been dedicated to investigating on-board, Sense and Avoid (SAA) technology necessary to meet this challenge, this paper focuses on the contribution of the NAS to separation assurance, and how it will support, as well as complicate RPAS integration. The paper collates and presents key, but historically disparate, threads of Australian RPAS and NAS related information, and distils it with a filter focused on minimising RPAS collision risk. Our ongoing effort is motivated by the need to better understand the separation assurance contribution provided by the NAS layers, in the first instance, and subsequently employ this information to identify scenarios where the coincident collision risk is demonstrably low, providing legitimate substantiation for concessions on equipage and airworthiness standards.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book analyses the principles underlying the construction and application of a number of boilerplate and other clauses commonly included in commercial contracts. The first Part of the work deals with general principles of interpretation. It then considers clauses which allocate commercial risk; clauses relating to performance; clauses introducing new parties by way of assignment, novation or nomination; clauses such as guarantees and indemnities which create liabilities in third parties; and dispute resolution clauses including governing law. The authors highlight common issues surrounding the application of these clauses in practice and, where appropriate, make drafting recommendations based on their analysis of case law and the operation of relevant statutes. This is a very accessible resource for all commercial practitioners.