36 resultados para Cyanobacterial bloom

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Migration is usually analysed as a function of state policy of sending and receiving countries in the context of global movements of people. Thus, despite their sponsorship and support of thousands of migrants, independent, voluntary, religious and ethnic organisations have often been marginalised in international migration studies. This article arises from a broader investigation into the role of such organisations in the peopling of Australia and Canada from the 1890s to 1939: their visions, relationships with governments, significance and legacies. The aim is to bring a new perspective to comparative migration and population research and to assess how far such organisations paralleled, or stepped outside of, the racialised, gendered and class structures of ofŽficial immigration policies and  practices of the time. Here the focus is particularly on the place of women and girls in the migration schemes of some of the organisations operating in both Australia and Canada. The use of case studies such as the British Women’s Emigration Association, the Salvation Army and Dr Barnardo’s Homes provides an opportunity to examine the sexual distinctions implicit in these schemes and the direction of both women and men into what were seen at the time as gender-appropriate societal roles and occupations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explores the tacit understanding of teachers in the field of gifted educational practices after their participation in gifted education professional development. The data for this article are drawn from a single-case qualitative study where semi-structured interviews were held with teachers, administrators and support staff in a metropolitan Victorian primary school. The findings lead to two main arguments: first, that some teachers preserved their deeply entrenched beliefs and assumptions about the gifted, the talented and intelligence[s]; and second, that teachers, without critical examination, eagerly adopted and adapted Gardner's Multiple Intelligences theory, overlaid with Bloom's Revised Taxonomy of Thinking as a means for addressing individual differences in the classroom. The article argues that teachers welcomed the Gardner/Bloom matrix for its 'tick-the-box' simplicity, with little insight into the theoretical models. Whilst the matrix had an immediate value in the mixed ability classrooms, in the long term it did not support the learning needs of gifted students. [Author abstract]

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Described herein are microcapsules and emulsions prepared from low Bloom gelatin and methods of making and using thereof.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The basic limnology, nutrient and hydraulic budgets and recent history (using fossil remains in the sediments) of Lake Wallace have been studies to determine factors that predispose the lake to the development of potentially toxic algal blooms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Jellyfish (Cnidaria: Scyphozoa) are increasingly thought to play a number of important ecosystem roles, but often fundamental knowledge of their distribution, seasonality and inter-annual variability is lacking. Bloom forming species, due to their high densities, can have particularly intense trophic and socio-economic impacts. In northern Europe it is known that one particularly large (up to 30 kg wet weight) bloom forming jellyfish is Rhizostoma spp. Given the potential importance, we set out to review all known records from peer-reviewed and broader public literature of the jellyfish R. octopus (Linnaeus) and R. pulmo (Macri) (Scyphozoa: Rhizostomae) across western Europe. These data revealed distinct hotspots where regular Rhizostoma spp. aggregations appeared to form, with other sites characterized by occasional abundances and a widespread distribution of infrequent observations. Surveys of known R. octopus hotspots around the Irish Sea also revealed marked inter-annual variation with particularly high abundances forming during 2003. The location of such consistent aggregations and inter-annual variances are discussed in relation to physical, climatic and dietary variations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless ad hoc networks, especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad hoc networks is a critical securing measure method employed to mitigate these problems. In this paper, we propose a novel secure and anonymous source routing protocol, called SADSR, based on Dynamic Source Routing (DSR) for wireless ad hoc networks. In the proposed scheme, we use the pseudonym, pseudonym based cryptography and the bloom filter to establish secure and anonymous routing in wireless ad hoc networks. Compared to other anonymous routing protocol, SADSR is not only anonymous but also the secure in the routing discover process and data transmission process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cross-flows (winds or currents) affect animal movements [1-3]. Animals can temporarily be carried off course or permanently carried away from their preferred habitat by drift depending on their own traveling speed in relation to that of the flow [1]. Animals able to only weakly fly or swim will be the most impacted (e.g., [4]). To circumvent this problem, animals must be able to detect the effects of flow on their movements and respond to it [1, 2]. Here, we show that a weakly swimming organism, the jellyfish Rhizostoma octopus, can orientate its movements with respect to currents and that this behavior is key to the maintenance of blooms and essential to reduce the probability of stranding. We combined insitu observations with first-time deployment of accelerometers on free-ranging jellyfish and simulated the behavior observed in wild jellyfish within a high-resolution hydrodynamic model. Our results show that jellyfish can actively swim countercurrent in response to current drift, leading to significant life-history benefits, i.e., increased chance of survival and facilitated bloom formation. Current-oriented swimming may be achieved by jellyfish either directly detecting current shear across their body surface [5] or indirectly assessing drift direction using other cues (e.g., magnetic, infrasound). Our coupled behavioral-hydrodynamic model provides new evidence that current-oriented swimming contributes to jellyfish being able to form aggregations of hundreds to millions of individuals for up to several months, which may have substantial ecosystem and socioeconomic consequences [6, 7]. It also contributes to improve predictions of jellyfish blooms' magnitude and movements in coastal waters. Current drift can have major and potentially negative effects on the lives of weakly swimming species in particular. Fossette etal. show that jellyfish modulate their swimming behavior in relation to current. Such oriented swimming has significant life-history benefits, such as increased bloom formation and a reduction of probability of stranding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unknown RFID tags appear when the unread tagged objects are moved in or tagged objects are misplaced. This paper studies the practically important problem of unknown tag detection while taking both time-efficiency and energy-efficiency of battery-powered active tags into consideration. We first propose a Sampling Bloom Filter which generalizes the standard Bloom Filter. Using the new filtering technique, we propose the Sampling Bloom Filter-based Unknown tag Detection Protocol (SBF-UDP), whose detection accuracy is tunable by the end users. We present the theoretical analysis to minimize the time and energy costs. SBF-UDP can be tuned to either the time-saving mode or the energy-saving mode, according to the specific requirements. Extensive simulations are conducted to evaluate the performance of the proposed protocol. The experimental results show that SBF-UDP considerably outperforms the previous related protocols in terms of both time-efficiency and energy-efficiency. For example, when 3 or more unknown tags appear in the RFID system with 30 000 known tags, the proposed SBF-UDP is able to successfully report the existence of unknown tags with a confidence more than 99%. While our protocol runs 9 times faster than the fastest existing scheme and reducing the energy consumption by more than 80%.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identified and characterized microbial nanowires in three different cyanobacteria and studied their potential role in cell-metalloid/metal interactions

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Currently high-speed networks have been attacked by successive waves of Distributed Denial of Service (DDoS) attacks. There are two major challenges on DDoS defense in the high-speed networks. One is to sensitively and accurately detect attack traffic, and the other is to filter out the attack traffic quickly, which mainly depends on high-speed packet classification. Unfortunately most current defense approaches can not efficiently detect and quickly filter out attack traffic. Our approach is to find the network anomalies by using neural network, deploy the system at distributed routers, identify the attack packets, and then filter them quickly by a Bloom filter-based classifier. The evaluation results show that this approach can be used to defend against both intensive and subtle DDoS attacks, and can catch DDoS attacks’ characteristic of starting from multiple sources to a single victim. The simple complexity, high classification speed and low storage requirements make it especially suitable for DDoS defense in high-speed networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently high-speed networks have been utilized by attackers as Distributed Denial of Service (DDoS) attack infrastructure. Services on high-speed networks also have been attacked by successive waves of the DDoS attacks. How to sensitively and accurately detect the attack traffic, and quickly filter out the attack packets are still the major challenges in DDoS defense. Unfortunately most current defense approaches can not efficiently fulfill these tasks. Our approach is to find the network anomalies by using neural network and classify DDoS packets by a Bloom filter-based classifier (BFC). BFC is a set of spaceefficient data structures and algorithms for packet classification. The evaluation results show that the simple complexity, high classification speed and accuracy and low storage requirements of this classifier make it not only suitable for DDoS filtering in high-speed networks, but also suitable for other applications such as string matching for intrusion detection systems and IP lookup for programmable routers.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Data mining is playing an important role in decision making for business activities and governmental administration. Since many organizations or their divisions do not possess the in-house expertise and infrastructure for data mining, it is beneficial to delegate data mining tasks to external service providers. However, the organizations or divisions may lose of private information during the delegating process. In this paper, we present a Bloom filter based solution to enable organizations or their divisions to delegate the tasks of mining association rules while protecting data privacy. Our approach can achieve high precision in data mining by only trading-off storage requirements, instead of by trading-off the level of privacy preserving.