83 resultados para insecticidal nets
Resumo:
Although a wide range of periodic surface nets can be grown on low index silicon surfaces, only a few of these have quasi-one dimensional symmetry. If high index silicon surfaces, such as (553) and (557), are used instead, the surface unit cell contains steps. It is possible to fabricate a number of quasi-one dimensional nanoline systems on the terraces and some of these have nested energy bands near the Fermi level. These nano-scale systems may support exotic many-electron states produced by enhanced electron correlations and a reduction in electron screening in one spatial dimension. In this paper, our groups' experimental and theoretical studies of nanolines phases, grown on both low index and vicinal silicon surfaces are reviewed. These studies give us insight into the electronic properties of artificial nanoline structures.
Resumo:
Reducing unwanted trawl bycatch is actively encouraged in Australia, particularly in prawn trawl fisheries. We tested the performance of a Bycatch Reduction Device, the Yarrow Fisheye, during two periods of commercial fishing operations in Australia's Northern Prawn Fishery, by comparing the catches of paired treatment and control nets. We compared the catch weights of the small fish and invertebrate bycatch, and the commercially important tiger prawns, from 42 trawls in 2002. The Yarrow Fisheye reduced the weight of small bycatch by a mean of 22.7%, with no loss of tiger prawn. We also compared the numbers of seasnakes caught in 41 and 72 trawls during the spring trawling seasons of 2004 and 2005, respectively. The Yarrow Fisheye reduced the catches by a mean of 43.3%. Flume-tank tests of the Yarrow Fisheye showed that this device created a slow water-flow region extending over 2 m downstream from its position in the net, and close to where the catch accumulates. Finfish and seasnakes may be exploiting this slow water-flow region to escape via the eye, Although the reductions in fish and seasnake bycatch were excellent, we think they could be further improved by relating differences in fisheye position and localised water displacements, to design and rigging changes.
Resumo:
The biomass and species composition of tropical phytoplankton in Albatross Bay, Gulf of Carpentaria, northern Australia, were examined monthly for 6 yr (1986 to 1992). Chlorophyll a (chl a) concentrations were highest (2 to 5.7 mu g l(-1)) in the wet season at inshore sites, usually coinciding with low salinities (30 to 33 ppt) and high temperatures (29 to 32 degrees C). At the offshore sites chi a concentrations were lower (0.2 to 2 mu g l(-1)) and did not vary seasonally. Nitrate and phosphate concentrations were generally low (0 to 3.68 mu M and 0.09 to 3 mu M for nitrate and phosphate respectively), whereas silicate was present in concentrations in the range 0.19 to 13 mu M. The phytoplankton community was dominated by diatoms, particularly at the inshore sites, as determined by a combination of microscopic and high-performance liquid chromatography (HPLC) pigment analyses. At the offshore sites the proportion of green flagellates increased. The cyanobacterium genus Trichodesmium and the diatom genera Chaetoceros, Rhizosolenia, Bacteriastrum and Thalassionema dominated the phytoplankton caught in 37 mu m mesh nets; however, in contrast to many other coastal areas studied worldwide there was no distinct species succession of the diatoms and only Trichodesmium showed seasonal changes in abundance. This reflects a stable phytoplankton community in waters without pulses of physical and chemical disturbances. These results are discussed in the context of the commercial prawn fishery in the Gulf of Carpentaria and the possible effect of phytoplankton on prawn larval growth and survival.
Resumo:
- Introduction Malaria cases have dwindled in Bhutan with aim of malaria elimination by 2016. The aims of this study are to determine the trends and burden of malaria, the costs of intensified control activities, the main donors of the control activities and the costs of different preventive measures in the pre-elimination phase (2006-2014). - Methods A descriptive analysis of malaria surveillance data from 2006-2014 was carried out, using data from the Vector-borne Disease Control Programme (VDCP), Bhutan. Malaria morbidity and mortality among local Bhutanese and foreign nationals were analysed. The cost of different control and preventive measures, and estimation of the average numbers of long-lasting insecticidal nests (LLINs) per person were calculated. - Findings There were 5,491 confirmed malaria cases from 2006 to 2014. By 2013, there was an average of one LLIN for every 1·51 individuals. The Global Fund was the main international donor accounting for > 80% of the total funds. The cost of procuring LLINs accounted for > 90% of the total cost of prevention measures. - Interpretation The malaria burden reduced significantly over the study period with high coverage of LLINs in Bhutan. This foreseeable challenges that require national attention to maintain malaria-free status after elimination are importation of malaria, particularly from India; continued protection of the population in endemic districts through complete coverage with LLINs and IRS; and exploration of local funding modalities post elimination in the event there is a reduction in international funding.
Resumo:
Behavioral profiles have been proposed as a behavioral abstraction of dynamic systems, specifically in the context of business process modeling. A behavioral profile can be seen as a complete graph over a set of task labels, where each edge is annotated with one relation from a given set of binary behavioral relations. Since their introduction, behavioral profiles were argued to provide a convenient way for comparing pairs of process models with respect to their behavior or computing behavioral similarity between process models. Still, as of today, there is little understanding of the expressive power of behavioral profiles. Via counter-examples, several authors have shown that behavioral profiles over various sets of behavioral relations cannot distinguish certain systems up to trace equivalence, even for restricted classes of systems represented as safe workflow nets. This paper studies the expressive power of behavioral profiles from two angles. Firstly, the paper investigates the expressive power of behavioral profiles and systems captured as acyclic workflow nets. It is shown that for unlabeled acyclic workflow net systems, behavioral profiles over a simple set of behavioral relations are expressive up to configuration equivalence. When systems are labeled, this result does not hold for any of several previously proposed sets of behavioral relations. Secondly, the paper compares the expressive power of behavioral profiles and regular languages. It is shown that for any set of behavioral relations, behavioral profiles are strictly less expressive than regular languages, entailing that behavioral profiles cannot be used to decide trace equivalence of finite automata and thus Petri nets.
Resumo:
This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically, it examines one of the standardised SCADA protocols called the Distributed Network Protocol Version 3, which attempts to provide a security mechanism to ensure that messages transmitted between devices, are adequately secured from rogue applications. To achieve this, the thesis applies formal methods from theoretical computer science to formally analyse the correctness of the protocol.
Resumo:
Genetic engineering of Bacillus thuringiensis (Bt) Cry proteins has resulted in the synthesis of various novel toxin proteins with enhanced insecticidal activity and specificity towards different insect pests. In this study, a fusion protein consisting of the DI–DII domains of Cry1Ac and garlic lectin (ASAL) has been designed in silico by replacing the DIII domain of Cry1Ac with ASAL. The binding interface between the DI–DII domains of Cry1Ac and lectin has been identified using protein–protein docking studies. Free energy of binding calculations and interaction profiles between the Cry1Ac and lectin domains confirmed the stability of fusion protein. A total of 18 hydrogen bonds was observed in the DI–DII–lectin fusion protein compared to 11 hydrogen bonds in the Cry1Ac (DI–DII–DIII) protein. Molecular mechanics/Poisson–Boltzmann (generalized-Born) surface area [MM/PB (GB) SA] methods were used for predicting free energy of interactions of the fusion proteins. Protein–protein docking studies based on the number of hydrogen bonds, hydrophobic interactions, aromatic–aromatic, aromatic–sulphur, cation–pi interactions and binding energy of Cry1Ac/fusion proteins with the aminopeptidase N (APN) of Manduca sexta rationalised the higher binding affinity of the fusion protein with the APN receptor compared to that of the Cry1Ac–APN complex, as predicted by ZDOCK, Rosetta and ClusPro analysis. The molecular binding interface between the fusion protein and the APN receptor is well packed, analogously to that of the Cry1Ac–APN complex. These findings offer scope for the design and development of customized fusion molecules for improved pest management in crop plants.
Resumo:
The Body Area Network (BAN) is an emerging technology that focuses on monitoring physiological data in, on and around the human body. BAN technology permits wearable and implanted sensors to collect vital data about the human body and transmit it to other nodes via low-energy communication. In this paper, we investigate interactions in terms of data flows between parties involved in BANs under four different scenarios targeting outdoor and indoor medical environments: hospital, home, emergency and open areas. Based on these scenarios, we identify data flow requirements between BAN elements such as sensors and control units (CUs) and parties involved in BANs such as the patient, doctors, nurses and relatives. Identified requirements are used to generate BAN data flow models. Petri Nets (PNs) are used as the formal modelling language. We check the validity of the models and compare them with the existing related work. Finally, using the models, we identify communication and security requirements based on the most common active and passive attack scenarios.