112 resultados para Plants, Protection of
Resumo:
The properties of CdS nanoparticles incorporated onto mesoporous TiO2 films by a successive ionic layer adsorption and reaction (SILAR) method were investigated by Raman spectroscopy, UV-visible spectroscopy, transmission electron microscopy (TEM) and X-ray photoelectron spectroscopy (XPS). High resolution TEM indicated that the synthesized CdS particles were hexagonal phase and the particle sizes were less than 5 nm when SILAR cycles were fewer than 9. Quantum size effect was found with the CdS sensitized TiO2 films prepared with up to 9 SILAR cycles. The band gap of CdS nanoparticles decreased from 2.65 eV to 2.37 eV with the increase of the SILAR cycles from 1 to 11. The investigation of the stability of the CdS/TiO2 films in air under illumination (440.6 µW/cm2) showed that the photodegradation rate was up to 85% per day for the sample prepared with 3 SILAR cycles. XPS analysis indicated that the photodegradation was due to the oxidation of CdS, leading to the transformation from sulphide to sulphate (CdSO4). Furthermore, the degradation rate was strongly dependent upon the particle size of CdS. Smaller particles showed faster degradation rate. The size-dependent photo-induced oxidization was rationalized with the variation of size-dependent distribution of surface atoms of CdS particles. Molecular Dynamics (MD) simulation has indicated that the surface sulphide anion of a large CdS particle such as CdS made with 11 cycles (CdS11, particle size = 5.6 nm) accounts for 9.6% of the material whereas this value is increased to 19.2% for (CdS3) based smaller particles (particle size: 2.7 nm). Nevertheless, CdS nanoparticles coated with ZnS material showed a significantly enhanced stability under illumination in air. A nearly 100% protection of CdS from photon induced oxidation with a ZnS coating layer prepared using four SILAR cycles, suggesting the formation of a nearly complete coating layer on the CdS nanoparticles.
Resumo:
--Critically discusses the role of International Maritime Organization (IMO) in the protection of the marine environment --Presents a clear, updated, concise and critical overview of the IMO marine environmental legal instruments --A fresh outlook on the north-south tensions in the IMO marine environmental discourses --Critically examines the principle of common but differentiated responsibilities in the context of IMO This book examines the role of The International Maritime Organization (IMO) in the prevention and control of pollution of the marine environment from vessels with a particular reference to the current north-south tensions regarding the strategy for combating climate change in the maritime sector as well as the prevention of marine pollution from the ship-breaking industry. The IMO, a United Nations specialized agency, has been entrusted with the duty to provide machinery for cooperation among governments for the prevention and control of pollution of the marine environment from vessels. The organization is responsible for drafting legal instruments as well as for facilitating technical cooperation for the protection of the marine environment. Although IMO legal instruments are mainly targeted at the prevention of pollution of the marine environment from vessels, there is a trend towards a liberal interpretation of this, and the organization has expanded its work to areas like shipbreaking, which is essentially a land-based industry.
Resumo:
Outdoor air pollution is a killer. A recent report from the World Health Organization estimated that 3.7 million deaths per year are due to outdoor air pollution. Most of these deaths are in low and middle income countries, with China being the country that often springs to mind. However, Australia still has a relatively big air pollution problem with an estimated 3,000 deaths per year. Traffic pollution is the major contributor to urban air pollution in Australia. Extreme events, such dust storms, bushfires and the recent coal fire in Morwell, dramatically increase pollution levels (for days or weeks) and are also very hazardous to health. Australian governments in the last 30 years have committed to improving air quality, and policies have been discussed and implemented with the aim of creating cleaner air. One key policy measure is the National Environment Protection Measures for air quality. These set standards for six important outdoor pollutants. Their key goal is to create “ambient air quality that allows for the adequate protection of human health and wellbeing”.
Resumo:
Through an examination of Wallace v Kam, this article considers and evaluates the law of causation in the specific context of a medical practitioner’s duty to provide information to patients concerning material risks of treatment. To supply a contextual background for the analysis which follows, Part II summarises the basic principles of causation law, while Part III provides an overview of the case and the reasoning adopted in the decisions at first instance and on appeal. With particular emphasis upon the reasoning in the courts of appeal, Part IV then examines the implications of the case in the context of other jurisprudence in this field and, in so doing, provides a framework for a structured consideration of causation issues in future non-disclosure cases under the Australian civil liability legislation. As will become clear, Wallace was fundamentally decided on the basis of policy reasoning centred upon the purpose behind the legal duty violated. Although the plurality in Rogers v Whitaker rejected the utility of expressions such as ‘the patient’s right of self-determination’ in this context, some Australian jurisprudence may be thought to frame the practitioner’s duty to warn in terms of promoting a patient’s autonomy, or right to decide whether to submit to treatment proposed. Accordingly, the impact of Wallace upon the protection of this right, and the interrelation between it and the duty to warn’s purpose, is investigated. The analysis in Part IV also evaluates the courts’ reasoning in Wallace by questioning the extent to which Wallace’s approach to liability and causal connection in non-disclosure of risk cases: depends upon the nature and classification of the risk(s) in question; and can be reconciled with the way in which patients make decisions. Finally, Part V adopts a comparative approach by considering whether the same decision might be reached if Wallace was determined according to English law.
Resumo:
Targeted monitoring of threatened species within plantations is becoming more important due to forest certification programmes’ requirement to consider protection of threatened species, and to increase knowledge of the distribution of species. To determine patterns of long-tailed bat (Chalinolobus tuberculatus) activity in different habitat structures, with the aim of improving the likelihood of detection by targeting monitoring, we monitored one stand of 26 year-old Pinus radiata over seven months between December 2007 and June 2008 in Kinleith Forest, an exotic plantation forest centred around Tokoroa, South Waikato, New Zealand. Activity was determined by acoustic recording equipment, which is able to detect and record bats’ echolocation calls. We monitored activity from sunset to sunrise along a road through the stand, along stand edges, and in the interior of the stand. Bats were recorded on 80% of the 35 nights monitored. All activity throughout the monitoring period was detected on the edge of the stand or along the road. No bats were detected within the interior of the stand. Bat activity was highest along the road through the stand (40.4% of all passes), followed by an edge with stream running alongside (35.2%), along the road within a skidsite (19.8%), and along an edge without a stream (4.6%). There was a significant positive relationship between bat pass rate (bat passes h-1) and the feeding buzz rate (feeding buzzes h-1) indicating that bat activity was associated with feeding and not just commuting. Bat feeding activity was also highest along the road through the stand (59.2% of feeding buzzes), followed by the road within the skidsite (30.6%), and along the stream-side edge (10.2%). No feeding buzzes were recorded in either the interior or along the edge without the stream. Differences in overall feeding activity were significant only between the road and edge and between edges with and without a stream. Bat activity was detected each month and always by the second night of monitoring, and in this stand was highest during April. We recommend targeted monitoring for long-tailed bats be focused on road-side and stand edge habitat, and along streams, and that monitoring take place for at least three nights to maximise probability of detection.
Resumo:
Protection of passwords used to authenticate computer systems and networks is one of the most important application of cryptographic hash functions. Due to the application of precomputed memory look up attacks such as birthday and dictionary attacks on the hash values of passwords to find passwords, it is usually recommended to apply hash function to the combination of both the salt and password, denoted salt||password, to prevent these attacks. In this paper, we present the first security analysis of salt||password hashing application. We show that when hash functions based on the compression functions with easily found fixed points are used to compute the salt||password hashes, these hashes are susceptible to precomputed offline birthday attacks. For example, this attack is applicable to the salt||password hashes computed using the standard hash functions such as MD5, SHA-1, SHA-256 and SHA-512 that are based on the popular Davies-Meyer compression function. This attack exposes a subtle property of this application that although the provision of salt prevents an attacker from finding passwords, salts prefixed to the passwords do not prevent an attacker from doing a precomputed birthday attack to forge an unknown password. In this forgery attack, we demonstrate the possibility of building multiple passwords for an unknown password for the same hash value and salt. Interestingly, password||salt (i.e. salts suffixed to the passwords) hashes computed using Davies-Meyer hash functions are not susceptible to this attack, showing the first security gap between the prefix-salt and suffix-salt methods of hashing passwords.
Resumo:
The notion of being sure that you have completely eradicated an invasive species is fanciful because of imperfect detection and persistent seed banks. Eradication is commonly declared either on an ad hoc basis, on notions of seed bank longevity, or on setting arbitrary thresholds of 1% or 5% confidence that the species is not present. Rather than declaring eradication at some arbitrary level of confidence, we take an economic approach in which we stop looking when the expected costs outweigh the expected benefits. We develop theory that determines the number of years of absent surveys required to minimize the net expected cost. Given detection of a species is imperfect, the optimal stopping time is a trade-off between the cost of continued surveying and the cost of escape and damage if eradication is declared too soon. A simple rule of thumb compares well to the exact optimal solution using stochastic dynamic programming. Application of the approach to the eradication programme of Helenium amarum reveals that the actual stopping time was a precautionary one given the ranges for each parameter. © 2006 Blackwell Publishing Ltd/CNRS.
Resumo:
Background Improving hand hygiene among health care workers (HCWs) is the single most effective intervention to reduce health care associated infections in hospitals. Understanding the cognitive determinants of hand hygiene decisions for HCWs with the greatest patient contact (nurses) is essential to improve compliance. The aim of this study was to explore hospital-based nurses’ beliefs associated with performing hand hygiene guided by the World Health Organization’s (WHO) 5 critical moments. Using the belief-base framework of the Theory of Planned Behaviour, we examined attitudinal, normative, and control beliefs underpinning nurses’ decisions to perform hand hygiene according to the recently implemented national guidelines. Methods Thematic content analysis of qualitative data from focus group discussions with hospital-based registered nurses from 5 wards across 3 hospitals in Queensland, Australia. Results Important advantages (protection of patient and self), disadvantages (time, hand damage), referents (supportive: patients, colleagues; unsupportive: some doctors), barriers (being too busy, emergency situations), and facilitators (accessibility of sinks/products, training, reminders) were identified. There was some equivocation regarding the relative importance of hand washing following contact with patient surroundings. Conclusions The belief base of the theory of planned behaviour provided a useful framework to explore systematically the underlying beliefs of nurses’ hand hygiene decisions according to the 5 critical moments, allowing comparisons with previous belief studies. A commitment to improve nurses’ hand hygiene practice across the 5 moments should focus on individual strategies to combat distraction from other duties, peer-based initiatives to foster a sense of shared responsibility, and management-driven solutions to tackle staffing and resource issues. Hand hygiene following touching a patient’s surroundings continues to be reported as the most neglected opportunity for compliance.
Resumo:
In response to scientific breakthroughs in biotechnology, the development of new technologies, and the demands of a hungry capitalist marketplace, patent law has expanded to accommodate a range of biological inventions. There has been much academic and public debate as to whether gene patents have a positive impact upon research and development, health-care, and the protection of the environment. In a satire of prevailing patenting practices, the English poet and part-time casino waitress, Donna MacLean, sought a patent application - GB0000180.0 - in respect of herself. She explained that she had satisfied the usual patent criteria - in that she was novel, inventive, and useful: It has taken 30 years of hard labor for me to discover and invent myself, and now I wish to protect my invention from unauthorized exploitation, genetic or otherwise. I am new: I have led a private existence and I have not made the invention of myself public. I am not obvious (2000: 18). MacLean said she had many industrial applications. ’For example, my genes can be used in medical research to extremely profitable ends - I therefore wish to have sole control of my own genetic material' (2000: 18). She observed in an interview: ’There's a kind of unpleasant, grasping, greedy atmosphere at the moment around the mapping of the human genome ... I wanted to see if a human being could protect their own genes in law' (Meek, 2000). This special issue of Law in Context charts a new era in the long-standing debate over biological inventions. In the wake of the expansion of patentable subject matter, there has been great strain placed upon patent criteria - such as ’novelty', ’inventive step', and ’utility'. Furthermore, there has been a new focus upon legal doctrines which facilitate access to patented inventions - like the defence of experimental use, the ’Bolar' exception, patent pooling, and compulsory licensing. There has been a concerted effort to renew patent law with an infusion of ethical principles dealing with informed consent and benefit sharing. There has also been a backlash against the commercialisation of biological inventions, and a call by some activists for the abolition of patents on genetic inventions. This collection considers a wide range of biological inventions - ranging from micro-organisms, plants and flowers and transgenic animals to genes, express sequence tags, and research tools, as well as genetic diagnostic tests and pharmaceutical drugs. It is thus an important corrective to much policy work, which has been limited in its purview to merely gene patents and biomedical research. This collection compares and contrasts the various approaches of a number of jurisdictions to the legal problems in respect of biological inventions. In particular, it looks at the complexities of the 1998 European Union Directive on the Legal Protection of Biotechnological Inventions, as well as decisions of member states, such as the Netherlands, and peripheral states, like Iceland. The edition considers US jurisprudence on patent law and policy, as well as recent developments in Canada. It also focuses upon recent developments in Australia - especially in the wake of parallel policy inquiries into gene patents and access to genetic resources.
Resumo:
A central dimension of the State’s responsibility in a liberal democracy and any just society is the protection of individuals’ central rights and freedoms, and the creation of the minimum conditions under which each individual has an opportunity to lead a life of sufficient equality, dignity and value. A special subset of this responsibility is to protect those who are unable to protect themselves from genuine harm. Substantial numbers of children suffer serious physical, emotional and sexual abuse, and neglect at the hands of their parents and caregivers or by other known parties. Child abuse and neglect occurs in a situation of extreme power asymmetry. The physical, social, behavioural and economic costs to the individual, and the social and economic costs to communities, are vast. Children are not generally able to protect themselves from serious abuse and neglect. This enlivens both the State’s responsibility to protect the child, and the debate about how that responsibility can and should be discharged. A core question arises for all societies, given that most serious child maltreatment occurs in the family sphere, is unlikely to be disclosed, causes substantial harm to both individual and community, and infringes fundamental individual rights and freedoms. The question is: how can society identify these situations so that the maltreatment can be interrupted, the child’s needs for security and safety, and health and other rehabilitation can be met, and the family’s needs can be addressed to reduce the likelihood of recurrence? This chapter proposes a theoretical framework applicable for any society that is considering justifiable and effective policy approaches to identify and respond to cases of serious child abuse and neglect. The core of the theoretical framework is based on major principles from both classical liberal political philosophy (Locke and Mill), and leading political philosophers from the twentieth century and the first part of the new millennium (Rawls, Rorty, Okin, Nussbaum), and is further situated within fundamental frameworks of civil and criminal law, and health and economics.
Resumo:
In response to scientific breakthroughs in biotechnology, the development of new technologies, and the demands of a hungry capitalist marketplace, patent law has expanded to accommodate a range of biological inventions. There has been much academic and public debate as to whether gene patents have a positive impact upon research and development, health-care, and the protection of the environment. In a satire of prevailing patenting practices, the English poet and part-time casino waitress, Donna MacLean, sought a patent application - GB0000180.0 - in respect of herself. She explained that she had satisfied the usual patent criteria - in that she was novel, inventive, and useful: It has taken 30 years of hard labor for me to discover and invent myself, and now I wish to protect my invention from unauthorized exploitation, genetic or otherwise. I am new: I have led a private existence and I have not made the invention of myself public. I am not obvious (2000: 18). MacLean said she had many industrial applications. 'For example, my genes can be used in medical research to extremely profitable ends - I therefore wish to have sole control of my own genetic material' (2000: 18). She observed in an interview: 'There's a kind of unpleasant, grasping, greedy atmosphere at the moment around the mapping of the human genome ... I wanted to see if a human being could protect their own genes in law' (Meek, 2000). This special issue of Law in Context charts a new era in the long-standing debate over biological inventions. In the wake of the expansion of patentable subject matter, there has been great strain placed upon patent criteria - such as 'novelty', 'inventive step', and 'utility'. Furthermore, there has been a new focus upon legal doctrines which facilitate access to patented inventions - like the defence of experimental use, the 'Bolar' exception, patent pooling, and compulsory licensing. There has been a concerted effort to renew patent law with an infusion of ethical principles dealing with informed consent and benefit sharing. There has also been a backlash against the commercialisation of biological inventions, and a call by some activists for the abolition of patents on genetic inventions. This collection considers a wide range of biological inventions - ranging from micro-organisms, plants and flowers and transgenic animals to genes, express sequence tags, and research tools, as well as genetic diagnostic tests and pharmaceutical drugs. It is thus an important corrective to much policy work, which has been limited in its purview to merely gene patents and biomedical research. This collection compares and contrasts the various approaches of a number of jurisdictions to the legal problems in respect of biological inventions. In particular, it looks at the complexities of the 1998 European Union Directive on the Legal Protection of Biotechnological Inventions, as well as decisions of member states, such as the Netherlands, and peripheral states, like Iceland. The edition considers US jurisprudence on patent law and policy, as well as recent developments in Canada. It also focuses upon recent developments in Australia - especially in the wake of parallel policy inquiries into gene patents and access to genetic resources.
Resumo:
In a three day trial in April 2008, the United States District Court for the Southern District of New York considered whether the Harry Potter Lexicon infringed the intellectual property rights of J.K. Rowling and Warner Brothers. The case has attracted great media attention. As John Crace, a reporter for The Guardian, observed: “On one side: global-celebrity author J.K. Rowling. On the other: an amateur fan site devoted to the world's favourite boy wizard. At stake: the soul of Harry Potter.” J.K. Rowling is the author of the seven book Harry Potter series, which tell the story of a young wizard, Harry Potter, and his battles with Voldemort, the Lord of Darkness. As the court papers noted, “The Harry Potter Books are a modern day publishing phenomenon and success story.” Warner Brothers sought and obtained the film rights to the series. The entertainment company has thus far produced five films; a sixth is due in November 2008; and the final instalment is planned. The Harry Potter Lexicon is a reference guide created by Steven Vander Ark, a former grade school teacher. He has organised a large volume of material on the Harry Potter books and the Harry Potter films on a website in an alphabetical listing, from “A-Z”. The founder of RDR Books, Roger Rapoport, approached Ark to publish the Harry Potter Lexicon in a book form. Ark agreed to this request, and provided the publisher with a condensed version of the web-site. After RDR Books announced its intention to publish the reference book, J.K. Rowling and Warner Brothers brought a legal action in the United States District Court for the Southern District of New York, alleging that the publishers of the Harry Potter Lexicon were in breach of various intellectual property rights. A spokesperson for Warner Brothers and J.K. Rowling observed: "A fan’s affectionate enthusiasm should not obscure acts of plagiarism. The publishers knew what they were doing. The problem remains that the Lexicon takes an enormous amount of Ms. Rowling’s work and adds virtually no original commentary of its own. As we’ve said in court, it takes too much and adds too little. Authors have a duty to prevent the exploitation of their works by people who contribute nothing original, creative or interpretive." The litigation involves the intersection of copyright law, trade mark law, and consumer protection law. It has a wider significance because it deals with the protection of authorial rights; the use of literary indexes, supplements and reference guides; and the clash between character merchandising and fan fiction.
Resumo:
In his 1987 book, The Media Lab: Inventing the Future at MIT, Stewart Brand provides an insight into the visions of the future of the media in the 1970s and 1980s. 1 He notes that Nicolas Negroponte made a compelling case for the foundation of a media laboratory at MIT with diagrams detailing the convergence of three sectors of the media—the broadcast and motion picture industry; the print and publishing industry; and the computer industry. Stewart Brand commented: ‘If Negroponte was right and communications technologies really are converging, you would look for signs that technological homogenisation was dissolving old boundaries out of existence, and you would expect an explosion of new media where those boundaries used to be’. Two decades later, technology developers, media analysts and lawyers have become excited about the latest phase of media convergence. In 2006, the faddish Time Magazine heralded the arrival of various Web 2.0 social networking services: You can learn more about how Americans live just by looking at the backgrounds of YouTube videos—those rumpled bedrooms and toy‐strewn basement rec rooms—than you could from 1,000 hours of network television. And we didn’t just watch, we also worked. Like crazy. We made Facebook profiles and Second Life avatars and reviewed books at Amazon and recorded podcasts. We blogged about our candidates losing and wrote songs about getting dumped. We camcordered bombing runs and built open‐source software. America loves its solitary geniuses—its Einsteins, its Edisons, its Jobses—but those lonely dreamers may have to learn to play with others. Car companies are running open design contests. Reuters is carrying blog postings alongside its regular news feed. Microsoft is working overtime to fend off user‐created Linux. We’re looking at an explosion of productivity and innovation, and it’s just getting started, as millions of minds that would otherwise have drowned in obscurity get backhauled into the global intellectual economy. The magazine announced that Time’s Person of the Year was ‘You’, the everyman and everywoman consumer ‘for seizing the reins of the global media, for founding and framing the new digital democracy, for working for nothing and beating the pros at their own game’. This review essay considers three recent books, which have explored the legal dimensions of new media. In contrast to the unbridled exuberance of Time Magazine, this series of legal works displays an anxious trepidation about the legal ramifications associated with the rise of social networking services. In his tour de force, The Future of Reputation: Gossip, Rumor, and Privacy on the Internet, Daniel Solove considers the implications of social networking services, such as Facebook and YouTube, for the legal protection of reputation under privacy law and defamation law. Andrew Kenyon’s edited collection, TV Futures: Digital Television Policy in Australia, explores the intersection between media law and copyright law in the regulation of digital television and Internet videos. In The Future of the Internet and How to Stop It, Jonathan Zittrain explores the impact of ‘generative’ technologies and ‘tethered applications’—considering everything from the Apple Mac and the iPhone to the One Laptop per Child programme.
Resumo:
This article addresses the need of an implementation mechanism for the protection of refugees’ rights. However, it is contended that the principle forms part of Customary International Law, under which it is binding on all states irrespective of whether or not they are parties to the Convention Relating to the Status of Refugees 1951 or its Protocol 1967. Since last decade, U.S and its allies have been fighting to curve terrorism which has raised many issues such as human rights violation, deportation, expulsion, extradition, rendition and many more. Pakistan has played a very critical role in War against Terrorism, particularly in reference of war in Afghanistan. Particular concern of this article is the violation of refugees’ rights in Pakistan in 2008 and 2010. This article would highlight the legislation regarding non-expulsion of Afghan refugees from Pakistan to a territory where they have well founded fear of persecution. Article is divided into three parts, the first one deals with “Principle of Non-Refoulement”, the second one deals with “exceptions to the principle” whereas the last one discusses the violation of the very principle in Pakistan with reference to Afghan refugees.
Resumo:
It is now widely acknowledged that student mental well-being is a critical factor in the tertiary student learning experience and is important to student learning success. The issue of student mental well-being also has implications for effective student transition out of university and into the world of work. It is therefore vital that intentional strategies are adopted by universities both within the formal curriculum, and outside it, to promote student well-being and to work proactively and preventatively to avoid a decline in student psychological well-being. This paper describes how the Queensland University of Technology Law School is using animation to teach students about the importance for their learning success of the protection of their mental well-being. Mayer and Moreno (2002) define an animation as an external representation with three main characteristics: (1) it is a pictorial representation, (2) it depicts apparent movement, and (3) it consists of objects that are artificially created through drawing or some other modelling technique. Research into the effectiveness of animation as a tool for tertiary student learning engagement is relatively new and growing field of enquiry. Nash argues, for example, that animations provide a “rich, immersive environment [that] encourages action and interactivity, which overcome an often dehumanizing learning management system approach” (Nash, 2009, 25). Nicholas states that contemporary millennial students in universities today, have been immersed in animated multimedia since their birth and in fact need multimedia to learn and communicate effectively (2008). However, it has also been established, for example through the work of Lowe (2003, 2004, 2008) that animations can place additional perceptual, attentional, and cognitive demands on students that they are not always equipped to cope with. There are many different genres of animation. The dominant style of animation used in the university learning environment is expository animation. This approach is a useful tool for visualising dynamic processes and is used to support student understanding of subjects and themes that might otherwise be perceived as theoretically difficult and disengaging. It is also a form of animation that can be constructed to avoid any potential negative impact on cognitive load that the animated genre might have. However, the nature of expository animation has limitations for engaging students, and can present as clinical and static. For this reason, the project applied Kombartzky, Ploetzner, Schlag, and Metz’s (2010) cognitive strategy for effective student learning from expository animation, and developed a hybrid form of animation that takes advantage of the best elements of expository animation techniques along with more engaging short narrative techniques. First, the paper examines the existing literature on the use of animation in tertiary educational contexts. Second, the paper describes how animation was used at QUT Law School to teach students about the issue of mental well-being and its importance to their learning success. Finally, the paper analyses the potential of the use of animation, and of the cognitive strategy and animation approach trialled in the project, as a teaching tool for the promotion of student learning about the importance of mental well-being.