970 resultados para Piper cubeba
Resumo:
In the early 1990's the University of Salford was typical of most pre-1992 Universities in that whilst students provided much of it's income, little attention was paid to pedagogy. As Warren Piper (1994) observed, University teachers were professional in their subject areas but generally did not seek to acquire a pedagogy of HE. This was the case in Alsford. Courses were efficiently run but only a minority of staff were engaged in actively considering learning and teaching issues. Instead staff time was spent on research and commercial activity.----- In the mid-1990's the teaching environment began to change significantly. As well as Dearing, the advent of QAA and teaching quality reviews, Salford was already experiencing changes in the characteristics of its student body. Wideing access was on our agenda before it was so predominant nationally. With increasing numbers and heterogeneity of students as well as these external factors, new challenges were facing the University and teaching domain.----- This paper describes how a culture which values teaching, learning and pedagogic inquiry is being created in the university. It then focuses on parts of this process specific to the Faculty of Business and Informatics, namely the Faculty's Learning and Teaching Research Network and the establishment of the Centre for Construction Education in the School of Construction and Property Management.----- The Faculty of Business and Informatics' Learning and Teaching Research Network aims to raise the profile, quality and volume of pedagogic research across the five schools in the faculty. The initiative is targeted at all academics regardless of previous research experience. We hope to grow and nurture research potential where it exists and to acknowledge and use the existing expertise of subject-based researchers in collaborative ventures. We work on the principle that people are deliged to share what they know but need appreciation and feedback for doing so. A further ain is to surface and celebrate the significant amount of tacit knowledge in the area of pedagogy evidenced by the strength of student and employer feedback in many areas of the faculty's teaching.----- The Faculty embraces generic and core management expertise but also includes applied management disciplines in information systems and construction and property management where internationally leading research activities and networked centres of excellence have been established. Drawing from this experience, and within the context of the Faculty network, a Centre for Construction Education is being established with key international external partners to develop a sustainable business model of an enterprising pedagogic centre that can undertake useful research to underpin teaching in the Faculty whilst offering sustainable business services to allow it to benefit from pump-priming grant funding.----- Internal and external networking are important elements in our plans and ongoing work. Key to this are our links with the LTSN subject centres (BEST and CEBE) and the LTSN generic centre. The paper discusses networking as a concept and gives examples of practices which have proved useful in this context.----- The academic influences on our approach are also examined. Dixon’s (2000) work examining how a range of companies succeed through internal knowledge sharing has provided a range of transferable practices. We also examine the notion of dialogue in this context, defined by Ballantyne (1999) as ‘The interactive human process of reasoning together which comes into being through interactions based on spontaneity or need and is enabled by trust’ Social constructionist principles of Practical Authorship (Shotter, 1993, Pavlica, Holman and Thorpe, 1998)) have also proved useful in developing our perspective on learning and knowledge creation within our community of practice.
Resumo:
The incidence and mortality of oral cancer in Taiwanese men have increased over the past decade, primarily associated with a surge in the popularity of betel quid chewing. The aim of this study was to examine the experience of six Taiwanese men with oral cancer, who were aged between 40 and 60 years, using a qualitative approach. The three major themes emerging from the data include: (i) understanding the cancer diagnosis; (ii) the challenges of cancer treatment; and (iii) adapting to difference. Increasing nurses' understanding of the experiential aspects of oral cancer in this population is required if nurses are to develop successful health promotion programmes and nursing interventions to meet these patients' needs.
Resumo:
Background: Mood and anxiety disorders pose significant health burdens on the community. Kava and St John’s wort (SJW) are the most commonly used herbal medicines in the treatment of anxiety and depressive disorders, respectively. Objectives: To conduct a comprehensive review of kava and SJW, to review any evidence of efficacy, mode of action, pharmacokinetics, safety and use in Major Depressive Disorder (MDD), Bipolar Disorder (BP), Seasonal Affective Disorder (SAD), Generalized Anxiety Disorder (GAD), Social Phobia (SP), Panic Disorder (PD), Obsessive-Compulsive Disorder (OCD), and Post Traumatic Stress Disorder (PTSD). Methods: A systematic review was conducted using the electronic databases MEDLINE, CINAHL, and The Cochrane Library during late 2008. The search criteria involved mood and anxiety disorder search terms in combination with kava, Piper methysticum, kavalactones, St John’s wort, Hypericum perforatum, hypericin and hyperforin. Additional search criteria for safety, pharmacodynamics , and pharmacokinetics was employed. A subsequent forward search was conducted of the papers using Web of Science cited reference search. Results: Current evidence supports the use of SJW in treating mild-moderate depression, and for kava in treatment of generalized anxiety. In respect to the other disorders, only weak preliminary evidence exists for use of SJW in SAD. Currently there is no published human trial on use of kava in affective disorders, or in OCD, PTSD, PD or SP. These disorders constitute potential applications that warrant exploration. Conclusions: Current evidence for herbal medicines in the treatment of depression and anxiety only supports the use of Hypericum perforatum for depression, and Piper methysticum for generalized anxiety.
Resumo:
Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.
Resumo:
Many randomised controlled trials (RCT) have been conducted using Piper methysticum (kava), however no qualitative research exploring the experience of taking kava during a clinical trial has previously been reported. ---------- Patients and methods: A qualitative research component (in the form of semi structured and open ended written questions) was incorporated into an RCT to explore the experiences of those participating in a clinical trial of kava. The written questions were provided to participants at weeks 2 and 3 (after randomisation, after each controlled phase). The researcher and participants were blinded as to whether they were taking kava or placebo. Two open ended questions were posed to elucidate their experiences from taking either kava or placebo. Thematic analysis was undertaken and researcher triangulation employed to ensure analytical rigour. Key themes after the kava phases were a reduction in anxiety and stress, and calming or relaxing mental effects. Other themes related to improvement in sleep and in somatic anxiety symptoms. ---------- Results: Kava use did not cause any serious adverse reactions although a few respondents reported nausea or other gastrointestinal side effects. This represents the first documented qualitative investigation of the experience of taking kava during a clinical trial. The primary themes involved anxiolytic and calming effects, with only a minor theme reflecting side effects. Our exploratory qualitative data was consistent with the significant quantitative results revealed in the study and provides additional support to suggest the trial results did not exclude any important positive or negative effects (at least as experienced by the trial participants).
Resumo:
The creative work of this study is a novel-length work of literary fiction called Keeping House (published as Grace's Table, by University of Queensland Press, April 2014). Grace has not had twelve people at her table for a long time. Hers isn't the kind of family who share regular Sunday meals. As Grace prepares the feast, she reflects on her life, her marriage and her friendships. When the three generations of her family come together, simmering tensions from the past threaten to boil over. The one thing that no one can talk about is the one thing that no one can forget. Grace's Table is a moving and often funny novel using food as a language to explore the power of memory and the family rituals that define us. The exegetical component of this study does not adhere to traditional research pedagogies. Instead, it follows the model of what the literature describes as fictocriticism. It is the intention that the exegesis be read as a hybrid genre; one that combines creative practice and theory and blurs the boundaries between philosophy and fiction. In offering itself as an alternative to the exegetical canon it provides a model for the multiplicity of knowledge production suited to the discipline of practice-led research. The exegesis mirrors structural elements of the creative work by inviting twelve guests into the domestic space of the novel to share a meal. The guests, chosen for their diverse thinking, enable examination of the various agents of power involved in the delivery of food. Their ideas cross genders, ages and time periods; their motivations and opinions often collide. Some are more concerned with the spatial politics of where food is consumed, others with its actual preparation and consumption. Each, however, provides a series of creative reflective conversations throughout the meal which help to answer the research question: How can disempowered women take authority within their domestic space? Michel de Certeau must defend his "operational tactics" or "art of the weak" 1 as a means by which women can subvert the colonisation of their domestic space against Michel Foucault's ideas about the functions of a "disciplinary apparatus". 2 Erving Goffman argues that the success of de Certeau's "tactics" depends upon his theories of "performance" and "masquerade" 3; a claim de Certeau refutes. Doreen Massey and the author combine forces in arguing for space, time and politics to be seen as interconnected, non-static and often contested. The author calls for identity, or sense of self, to be considered a further dimension which impacts on the function of spatial models. Yu-Fi Tuan speaks of the intimacy of kitchens; Gaston Bachelard the power of daydreams; and Jean Anthelme Brillat-Savarin gives the reader a taste of the nourishing arts. Roland Barthes forces the author to reconsider her function as a writer and her understanding of the reader's relationship with a text. Fictional characters from two texts have a place at the table – Marian from The Edible Woman by Margaret Atwood 4 and Lilian from Lilian's Story by Kate Grenville. 5 Each explores how they successfully subverted expectations of their gender. The author interprets and applies elements of the conversations to support Grace's tactics in the novel as well as those related to her own creative research practice. Grace serves her guests, reflecting on what is said and how it relates to her story. Over coffee, the two come together to examine what each has learned.
Resumo:
The decisions in Perdis v The Nominal Defendant [2003] QCA 555, Miller v the Nominal Defendant [2003] QCA 558 and Piper v the Nominal Defendant [2003] QCA 557 were handed down contemporaneously by the Queensland Court of Appeal on December 15 2003. They consider important issues as to the construction of key provisions of the Motor Accident Insurance Act 1994 (Qld)
Resumo:
This chapter considers the role of the law in communicating patient safety. Downie, Lahey, Ford, et al’s (2006) preventing, knowing and responding theoretical framework is adopted to classify the different elements of patient safety law. Rather than setting out all relevant patient safety laws in detail, this chapter highlights key legal strategies which are employed to: prevent the occurrence of patient safety incidents (preventing); support the discovery and open discussion of patient safety incidents when they do occur (knowing),; and guide responses after they occur (responding) (Downie, Lahey, Ford, et al 2006). The law is increasingly being invoked to facilitate open discussion of and communication surrounding patient safety. After highlighting some legal strategies used to communicate patient safety, two practice examples are presented. The practice examples highlight different aspects of patient safety law and are indicative of communication issues commonly faced in practice. The first practice example focuses on the role of the Ccoroner in communicating patient safety. This example highlights the investigative role of the law in relation to patient safety (knowing). It also showcases the preventing responding and preventing elements in respect of the significant number of communication errors that can occur in a multi-disciplinary, networked health system. The main focus of the second practice example is responding example illustrates how the law responds to health service providers’ and professionals’ miscommunication (and subsequent incidents) during treatment, however it also touches upon knowing and preventing.
Resumo:
Natural products constitute an important source of new drugs. The bioavailability of the drugs depends on their absorption, distribution, metabolism and elimination. To achieve good bioavailability, the drug must be soluble in water, stable in the gastrointestinal tract and palatable. Binding proteins may improve the solubility of drug compounds, masking unwanted properties, such as bad taste, bitterness or toxicity, transporting or protecting these compounds during processing and storage. The focus of this thesis was to study the interactions, including ligand binding and the effect of pH and temperature, of bovine and reindeer β-lactoglobulin (βLG) with such compounds as retinoids, phenolic compounds as well as with compounds from plant extracts, and to investigate the transport properties of the βLG-ligand complex. To examine the binding interactions of different ligands to βLG, new methods were developed. The fluorescence binding method for the evaluation of ligand binding to βLG was miniaturized from a quartz cell to a 96-well plate. A method of ultrafiltration sampling combined with high-performance liquid chromatography was developed to assess the binding of compounds from extracts. The interactions of phenolic compounds or retinoids and βLG were investigated using the 96-well plate method. The majority of flavones, flavonols, flavanones and isoflavones and all of the retinoids included were shown to bind to bovine and reindeer βLG. Phenolic compounds, contrary to retinol, were not released at acidic pH. Those results suggest that βLG may have more binding sites, probably also on the surface of βLG. An extract from Camellia sinensis (L.) O. Kunze (black tea), Urtica dioica L. (nettle) and Piper nigrum (black pepper) were used to evaluate whether βLG could bind compounds from plant extracts. Piperine from P. nigrum was found to bind tightly and rutin from U. dioica weakly to βLG. No components from C. sinensis bound to βLG in our experiment. The uptake and membrane permeation of bovine and reindeer βLG, free and bound with retinol, palmitic acid and cholesterol, were investigated using Caco-2 cell monolayers. Both bovine and reindeer βLG were able to cross the Caco-2 cell membrane. Free and βLG-bound retinol and palmitic acid were transported equally, whereas cholesterol could not cross the Caco-2 cell monolayer free or bound to βLG. Our results showed that βLG can bind different natural product compounds, but cannot enhance transport of retinol, palmitic acid or cholesterol through Caco-2 cells. Despite this, βLG, as a water-soluble binding protein, may improve the solubility of natural compounds, possibly protecting them from early degradation and transporting some of them through the stomach. Furthermore, it may decrease their bad or bitter taste during oral administration of drugs or in food preparations. βLG can also enhance or decrease the health benefits of herbal teas and food preparations by binding compounds from extracts.
Resumo:
Tick resistant cattle could provide a potentially sustainable and environmentally sound method of controlling cattle ticks. Advances in genomics and the availability of the bovine genome sequence open up opportunities to identify useful and selectable genes controlling cattle tick resistance. Using quantitative real-time PCR and the Affymetrix bovine array platform, differences in gene expression of skin biopsies from tick resistant Bos indicus (Brahman) and tick susceptible Bos taurus (Holstein-Friesian) cattle following tick challenge were examined. We identified 138 significant differentially-expressed genes, including several immunological/host defence genes, extracellular matrix proteins, and transcription factors as well as genes involved in lipid metabolism. Three key pathways, represented by genes differentially expressed in resistant Brahmans, were identified; the development of the cell-mediated immune response, structural integrity of the dermis and intracellular Ca 2+ levels. Ca2+, which is implicated in host responses to microbial stimuli, may be required for the enhancement or fine-tuning of transcriptional activation of Ca2+- dependant host defence signalling pathways. Animal Genomics for Animal Health International Symposium, Paris, October 2007: (Proceedings)
Resumo:
The cattle tick Rhipicephalus microplus (formerly Boophilus microplus) is responsible for severe production losses to the cattle industry worldwide. It has long been known that different breeds of cattle can resist tick infestation to varying degrees; however, the mechanisms by which resistant cattle prevent heavy infestation are largely unknown. The aim of this study was to determine whether gene expression varied significantly between skin sampling sites (neck, chest and tail region), and whether changes in gene expression could be detected in samples taken at tick attachment sites (tick attached to skin sample) compared with samples taken from non-attachment sites (no tick attachment). We present here the results of an experiment examining the expression of a panel of forty-four genes in skin sections taken from Bos indicus (Brahman) cattle of known high resistance, and Bos taurus (Holstein-Friesian) cattle of known low resistance to the cattle tick. The forty-four genes chosen for this study included genes known to be involved in several immune processes, some structural genes, and some genes previously suggested to be of importance in tick resistance by other researchers. The expression of fifteen gene transcripts increased significantly in Holstein-Friesian skin samples at tick attachment sites. The higher expression of many genes involved in innate inflammatory processes in the Holstein-Friesian animals at tick attachment sites suggests this breed is exhibiting a non-directed pathological response to infestation. Of the forty-four genes analysed, no transcripts were detected in higher abundance at tick attachment sites in the Brahman cattle compared with similar samples from the Holstein-Friesian group, nor difference between attachment site and non-attachment site samples within the Brahman group. The results presented here suggest that the means by which these two cattle breeds respond to tick infestation differ and warrant further investigation.
Resumo:
Physical and psychological decline is common in the post-treatment breast cancer population, yet the efficacy of concurrent interventions to meet both physical- psychosocial needs in this population has not been extensively examined. PURPOSE: This study explores the effects of a combined exercise and psychosocial intervention model on selected physiological-psychological parameters in post-treated breast cancer. METHODS: Forty-one breast cancer survivors were randomly assigned to one of four groups for an 8-week intervention: exercise only [EX, n=13] (aerobic and resistance training), psychosocial therapy only [PS, n=11] (biofeedback), combined EX and PS [EX+PS, n=11], or to control conditions [CO, n=6]. Mean delta score (post-intervention - baseline) were calculated for each of the following: body weight, % body fat (skin folds), predicted VO2max (Modified Bruce Protocol), overall dynamic muscular endurance [OME] (RMCRI protocol), static balance (Single leg stance test), dynamic balance (360° turn and 4-square step test), fatigue (Revised Piper Scale), and quality of life (FACT-B). A one-way ANOVA was used to analyze the preliminary results of this on-going randomized trial. RESULTS: Overall, there were significant differences in the delta scores for predicted VO2max, OME, and dynamic balance among the 4 groups (p<0.05). The EX+PS group showed a significant improvement in VO2max compared with the PS group (4.2 ± 3.8 vs. -0.9 ± 4.2 mL/kg/min; p<0.05). Both the EX+PS and EX groups showed significant improvements in OME compared with the PS and CO groups (44.5 ± 23.5 and 43.4 ± 22.1 vs. -3.9 ± 15.2 and 2.7 ± 13.7 repetitions; p<0.05). All 3 intervention groups showed significant improvements in dynamic balance compared with the CO group (-0.8 ± 0.6, -0.6 ± 0.8, and -0.6 ±1.0 vs. 0.6 ± 0.6 seconds; p<0.05). Overall, changes in fatigue tended towards significance among the 4 groups (p = 0.08), with decreased fatigue in the intervention groups and increased fatigue in the CO group. CONCLUSIONS: Our preliminary findings suggest that EX and PS seem to produce greater positive changes in the outcome measures than CO. However, at this point no definite conclusions can be made on the additive effects of combining the EX and PS interventions.
Resumo:
Bos taurus indicus cattle are less susceptible to infestation with Rhipicephalus (Boophilus) microplus than Bos taurus taurus cattle but the immunological basis of this difference is not understood. We compared the dynamics of leukocyte infiltrations (T cell subsets, B cells, major histocompatibility complex (MHC) class II-expressing cells, granulocytes) in the skin near the mouthparts of larvae of R. microplus in B. t. indicus and B. t. taurus cattle. Previously naïve cattle were infested with 50,000 larvae (B. t. indicus) or 10,000 larvae (B. t. taurus) weekly for 6 weeks. One week after the last infestation all of the animals were infested with 20,000 larvae of R. microplus. Skin punch biopsies were taken from all animals on the day before the primary infestation and from sites of larval attachment on the day after the first, second, fourth and final infestations. Infiltrations with CD3+, CD4+, CD8+ and [gamma][delta] T cells followed the same pattern in both breeds, showing relatively little change during the first four weekly infestations, followed by substantial increases at 7 weeks post-primary infestation. There was a tendency for more of all cell types except granulocytes to be observed in the skin of B. t. indicus cattle but the differences between the two breeds were consistently significant only for [gamma][delta] T cells. Granulocyte infiltrations increased more rapidly from the day after infestation and were higher in B. t. taurus cattle than in B. t. indicus. Granulocytes and MHC class II-expressing cells infiltrated the areas closest to the mouthparts of larvae. A large volume of granulocyte antigens was seen in the gut of attached, feeding larvae.
Resumo:
Hendersonia osteospermi was found for the first time in Australia on leaf spots of the introduced invasive plant Chrysanthemoides monilifera ssp. rotundata (bitou bush) in coastal regions of New South Wales. Pathogenicity tests on species from 11 tribes in the family Asteraceae, demonstrated that H. osteospermi caused severe necrosis on leaves and stems of C. monilifera ssp. rotundata and its congener C. monilifera ssp. monilifera (boneseed). Small necrotic spots also developed on Osteospermum fruticosum and Dimorphotheca cuneata in the Calenduleae and on Helianthus annuus (sunflower) in the Heliantheae. None of the other plant species tested developed leaf spots, although H. osteospermi was re-isolated from senescent leaves of Cynara scolymus (globe artichoke) in the Cynareae and Vernonia cinerea in the Vernonieae. Single ascospores from ascomata of a Pleospora-like fungus found on diseased stems of bitou bush produced H. osteospermi in culture, which proved the anamorph/teleomorph connection. The ITS region of both a single-ascospore isolate and a single-conidium isolate were sequenced and found to be identical. The taxonomic status of H. osteospermi is re-examined and Austropleospora osteospermi gen. et sp. nov. is described as its teleomorph based on morphology, host range tests and DNA sequence analysis. The potential of A. osteospermi for the biological control of bitou bush and boneseed in Australia is discussed.
Resumo:
Forest destruction for agriculture continues to be a major threat to the rich biological diversity in the East Usambara Mountains in the north-eastern corner of Tanzania. The highest ratio of endemic plant and animal species found on 100 km2 anywhere in the world is depending on the remaining natural forests. Forests are vitally important for the local population in many different ways, and nationally they are an important source of water and hydroelectricity. The soils, of low fertility and mostly acidic Ferrasols, mainly have the nutrients in the topsoil. After clear-cutting, the soils soon become poor when the topsoil is eroded. High-value cardamom is nowadays unsustainably cultivated in the natural forests of the East Usambaras. The general aim was to study the possibilities to develop new profitable and sustainable agroforestry systems for the benefit of the local people that could contribute to relieving the pressure on the remaining natural forests in the East Usambara Mountains. Results from a spice crop agroforestry trial, established in cooperation with a local farmer, showed a clear advantage of intercropping cardamom (Elettaria cardamomum) and black pepper (Piper nigrum) with trees, especially with Grevillea robusta. The nitrogen fixing tree species Gliricidia sepium also improved the nitrogen and organic matter content of the soil over levels found in the natural forest. With improved agroforestry methods for spice production the households generated as much as13 times the net income obtained with traditional forest cultivation practices. There are thus sustainable and profitable ways to cultivate spices as cash crops in well-managed homegardens. However, the farmers need stable markets, access to credit and comprehensive extension services. The soil fertility depletion should be reversed with organic manure application and an enabling policy environment for the smallholder-farming sector. Strong farmers organisations and equal rights to resources and decision-making are needed. Organic spices have an increasing demand, and their export would be profitable for these farmers. What is, however, most needed for a change is a political will of a government that understands the importance of agricultural and forestry development for poverty reduction.