950 resultados para Attachment security
Resumo:
The particles of Potato virus A (PVA; genus Potyvirus) are helically constructed filaments that contain multiple copies of a single type of coat-protein (CP) subunit and a single copy of genome-linked protein (VPg), attached to one end of the virion. Examination of negatively-stained virions by electron microscopy revealed flexuous, rod-shaped particles with no obvious terminal structures. It is known that particles of several filamentous plant viruses incorporate additional minor protein components, forming stable complexes that mediate particle disassembly, movement or transmission by insect vectors. The first objective of this work was to study the interaction of PVA movement-associated proteins with virus particles and how these interactions contribute to the morphology and function of the virus particles. Purified particles of PVA were examined by atomic force microscopy (AFM) and immuno-gold electron microscopy. A protrusion was found at one end of some of the potyvirus particles, associated with the 5' end of the viral RNA. The tip contained two virus-encoded proteins, the genome-linked protein (VPg) and the helper-component proteinase (HC-Pro). Both are required for cell-to-cell movement of the virus. Biochemical and electron microscopy studies of purified PVA samples also revealed the presence of another protein required for cell-to-cell movement the cylindrical inclusion protein (CI), which is also an RNA helicase/ATPase. Centrifugation through a 5-40% sucrose gradient separated virus particles with no detectable CI to a fraction that remained in the gradient, from the CI-associated particles that went to the pellet. Both types of particles were infectious. AFM and translation experiments demonstrated that when the viral CI was not present in the sample, PVA virions had a beads-on-a-string phenotype, and RNA within the virus particles was more accessible to translation. The second objective of this work was to study phosphorylation of PVA movement-associated and structural proteins (CP and VPg) in vitro and, if possible, in vivo. PVA virion structural protein CP is necessary for virus cell-to-cell movement. The tobacco protein kinase CK2 was identified as a kinase phosphorylating PVA CP. A major site of CK2 phosphorylation in PVA CP was identified as a single threonine within a CK2 consensus sequence. Amino acid substitutions affecting the CK2 consensus sequence in CP resulted in viruses that were defective in cell-to-cell and long-distance movement. The CK2 regulation of virion assembly and cell-to-cell movement by phosphorylation of CP was possibly due to the inhibition of CP binding to viral RNA. Four putative phosphorylation sites were identified from an in vitro phosphorylated recombinant VPg. All four were mutated and the spread of mutant viruses in two different host plants was studied. Two putative phosphorylation site mutants (Thr45 and Thr49) had phenotypes identical to that of a wild type (WT) virus infection in both Nicotiana benthamiana and N. tabacum plants. The other two mutant viruses (Thr132/Ser133 and Thr168) showed different phenotypes with increased or decreased accumulation rates, respectively, in inoculated and the first two systemically infected leaves of N. benthamiana. The same mutants were occasionally restricted to single cells in N. tabacum plants, suggesting the importance of these amino acids in the PVA infection cycle in N. tabacum.
Resumo:
The prospect of climate change has revived both fears of food insecurity and its corollary, market opportunities for agricultural production. In Australia, with its long history of state-sponsored agricultural development, there is renewed interest in the agricultural development of tropical and sub-tropical northern regions. Climate projections suggest that there will be less water available to the main irrigation systems of the eastern central and southern regions of Australia, while net rainfall could be sustained or even increase in the northern areas. Hence, there could be more intensive use of northern agricultural areas, with the relocation of some production of economically important commodities such as vegetables, rice and cotton. The problem is that the expansion of cropping in northern Australia has been constrained by agronomic and economic considerations. The present paper examines the economics, at both farm and regional level, of relocating some cotton production from the east-central irrigation areas to the north where there is an existing irrigation scheme together with some industry and individual interest in such relocation. Integrated modelling and expert knowledge are used to examine this example of prospective climate change adaptation. Farm-level simulations show that without adaptation, overall gross margins will decrease under a combination of climate change and reduction in water availability. A dynamic regional Computable General Equilibrium model is used to explore two scenarios of relocating cotton production from south east Queensland, to sugar-dominated areas in northern Queensland. Overall, an increase in real economic output and real income was realized when some cotton production was relocated to sugar cane fallow land/new land. There were, however, large negative effects on regional economies where cotton production displaced sugar cane. It is concluded that even excluding the agronomic uncertainties, which are not examined here, there is unlikely to be significant market-driven relocation of cotton production.
Resumo:
As business environments become even more competitive, project teams are required to make an effort to operate external linkages from within an organization or across organizational boundaries. Nevertheless, some members boundary-span less extensively, isolating themselves and their project teams from external environments. Our study examines why some members boundary-span more or less through the framework of group attachment theory. Data from 521 project-team members in construction and engineering industries revealed that the more individuals worry about their project team’s acceptance (group attachment anxiety), the more likely they are to perceive intergroup competition, and thus put more efforts into operating external linkages and resources to help their own teams outperform competitors. In contrast, a tendency to distrust their project teams (group attachment avoidance) generates members’ negative construal of their team’s external image, and thus fewer efforts are made at operating external linkages. Thus, project leaders and members with high group-attachment-anxiety may be best qualified for external tasks.
Resumo:
In this paper I conduct a Foucauldian discourse analysis of a political speech given by Brendon Nelson in 2006 when the Australian Minister for Defence in the Howard Coalition Government. The speech connects conceptualisations of terror, globalization, education and literacy as part of a whole of government security strategy. The analysis examines this speech as an example of a liberal way of governing the conduct of diverse and unpredictable populations. My analysis suggests that the apparatus of government has been strategically used in order to biopolitically contain the rise of complex social forces and protect a set of homogenous cultural values. The purposes of education and uses of literacy are seen as instruments for the inscription of a coded set of values understood to be synonymous with civil society.
Resumo:
This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically, it examines one of the standardised SCADA protocols called the Distributed Network Protocol Version 3, which attempts to provide a security mechanism to ensure that messages transmitted between devices, are adequately secured from rogue applications. To achieve this, the thesis applies formal methods from theoretical computer science to formally analyse the correctness of the protocol.
Resumo:
Experiments on the leaching of copper from chalcopyrite mineral by the bacterium Thiobacillus ferrooxidans show that, in the presence of adequate amounts of sulphide, iron-grown bacteria preferentially oxidise sulphur in the ore (through direct attachment) rather than ferrous sulphate in solution. At 20% pulp density, the leaching initially takes place by a predominantly direct mechanism. The cell density in the liquid phase increases, but the Fe2+ is not oxidised. However, in the later stages when less solid substrate is available and the cell density becomes very high, the bacteria start oxidising Fe2+ in the liquid phase, thus contributing to the indirect mechanism of leaching. Contrary to expectations, the rate of leaching increased with increasing particle size in spite of the decreasing specific surface area. This has been found to be due to increasing attachment efficiency with increase in particle size.
Resumo:
The main objective of on-line dynamic security assessment is to take preventive action if required or decide remedial action if a contingency actually occurs. Stability limits are obtained for different contingencies. The mode of instability is one of the outputs of dynamic security analysis. When a power system becomes unstable, it splits initially into two groups of generators, and there is a unique cutset in the transmission network known as critical cutset across which the angles become unbounded. The knowledge of critical cutset is additional information obtained from dynamic security assessment, which can be used for initiating preventive control actions, deciding emergency control actions, and adaptive out-of-step relaying. In this article, an analytical technique for the fast prediction of the critical cutset by system simulation for a short duration is presented. Case studies on the New England ten-generator system are presented. The article also suggests the applications of the identification of critical cutsets.
Resumo:
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
Resumo:
This paper uses original survey data of the Great East Japan earthquake disaster victims to examine their decision to apply for the temporary housing as well as the timing of application. We assess the effects of victims’ attachment to their locality as well as variation in victims’ information seeking behavior. We additionally consider various factors such as income, age, employment and family structure that are generally considered to affect the decision to choose temporary housing as victims’ solution for their displacement. Empirical results indicate that, ceteris paribus, as the degree of attachment increases, victims are more likely to apply for the temporary housing but attachment does not affect the timing of application. On the other hand, the victims who actively seek information and are able to collect higher quality information are less likely to apply for the temporary housing and if they do apply then they apply relatively later.
Resumo:
The Body Area Network (BAN) is an emerging technology that focuses on monitoring physiological data in, on and around the human body. BAN technology permits wearable and implanted sensors to collect vital data about the human body and transmit it to other nodes via low-energy communication. In this paper, we investigate interactions in terms of data flows between parties involved in BANs under four different scenarios targeting outdoor and indoor medical environments: hospital, home, emergency and open areas. Based on these scenarios, we identify data flow requirements between BAN elements such as sensors and control units (CUs) and parties involved in BANs such as the patient, doctors, nurses and relatives. Identified requirements are used to generate BAN data flow models. Petri Nets (PNs) are used as the formal modelling language. We check the validity of the models and compare them with the existing related work. Finally, using the models, we identify communication and security requirements based on the most common active and passive attack scenarios.
Resumo:
A theoretical framework of the link between climate change, rural development, sustainable agriculture, poverty, and food security is presented. Some options to respond to climate change are described. Current knowledge and potential effects on agricultural productivity is discussed. Necessary conditions for successful adaptation includes secured property rights to land, institutions that make market access possible and credit possibilities. The options of mitigation and enhanced adaptive capacity and the requirements for their implementation are discussed.
Resumo:
A split-cassette arrangement has been incorporated in the Weissenberg camera for recording all reflections on the upper level photographs either as elongated or as contracted spots. This arrangement employs two semicylindrical cassettes which are separated by a horizontal plane. These half-cassettes are translated in opposite directions. A suitable split-cassette attachment has been constructed for the Unicam Weissenberg goniometer S-35 The subject of 'displaced-film' Weissenberg photograph is also discussed.
Resumo:
This study examines how Finnish foreign and security policy has been influenced by the European Union and its Common Foreign and Security Policy. It points to a growing interplay and misfit between the external expectations originating from the European level and the domestic expectations and traditional ways-of-doing-things. It is concluded that the deepening European integration in the sphere of foreign, security and defence policy has played a significant role in a number of transformations in the Finnish policies since 1995. New, more European, meanings have been attached to the key concepts of Finnish foreign and security policy. Neutrality and traditional peacekeeping have been replaced by a minimalist reading of military non-alignment and participation in crisis management operations and EU battle groups. Traditional small state identity has been recast more and more as small member stateness . At the same time Finland has entered an era of post-consensus in national foreign and security policy. A key theoretical argument in the background of the study is that collective understandings attached to European policies, when not resonating well with domestic understandings, cause adaptation pressures on domestic-level processes and may lead to changes in the way interests and identities are constructed. This means that Europeanization is principally seen as identity reconstruction. Consequently, the theoretical framework of the study builds on the Europeanization research literature and constructivist IR theory on state identity. Foreign and security policy is defined as the practice in which state identity is reproduced, and the key foreign and security policy concepts are seen as the vehicles of identity production. It is concluded that for Finland, participation in the EU s foreign, security and defence policies represents not only a tool for responding to the changes in the international security environment but also a new means of self-identification. Concerning the Finnish attempts of projecting national interests on the European security policy agenda, it is concluded that they mainly relate to the compatibility of the potential development of EU s defence dimension with the Finnish military non-alignment. Although neutrality was cast aside in the official security policy when Finland joined the EU, the analysis shows that its impact has continued in the domestic political debate and in the mind-set of the decision-makers. The primary research material includes official Finnish foreign and security policy documentation and the related parliamentary debates from 1994 to 2007. This study serves also as a comprehensive empirical overview on Finland s reactions and contributions to the EU Common Foreign and Security Policy.