966 resultados para Counterpart funds.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

As we encounter a policy landscape where increasingly the education lexicon includes keywords such as data, evidence, quality, standards, it is interesting to revisit Garth Boomer's contribution regarding teachers as researchers. As an early-career classroom teacher in the mid-1970s, I was inspired by Boomer's provocation to engage with research as a practitioner seeking evidence of learning (or not learning). Since that time, convinced of the power of teacher research in enhancing both student and teacher learning, I have devoted a good deal of my academic life to finding ways of supporting teachers to engage in research - from finding funds to facilitate teacher-researcher networks, through designing research projects with teacher-researchers as key collaborators, to embedding practitioner inquiry in university courses wherever possible pre- and in-service.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Upward long-distance mobile silencing has been shown to be phloem mediated in several different solanaceous species. We show that the Arabidopsis (Arabidopsis thaliana) seedling grafting system and a counterpart inducible system generate upwardly spreading long-distance silencing that travels not in the phloem but by template-dependent reiterated short-distance cell-to-cell spread through the cells of the central stele. Examining the movement of the silencing front revealed a largely unrecognized zone of tissue, below the apical meristem, that is resistant to the silencing signal and that may provide a gating or protective barrier against small RNA signals. Using a range of auxin and actin transport inhibitors revealed that, in this zone, alteration of vesicular transport together with cytoskeleton dynamics prevented or retarded the spread of the silencing signal. This suggests that small RNAs are transported from cell to cell via plasmodesmata rather than diffusing from their source in the phloem.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A suite of plant expression vectors (pPLEX), constructed from the gene regulation signals from subterranean clover stunt virus (SCSV) genome, has previously been used in dicot transformation for a variety of applications in plant biotechnology. To assess their use for the transformation of monocots, a number of modifications were made to the basic vector series and assessed in rice. In their unmodified forms, the SCSV promoters directed low levels of gene expression, however, insertion of an intron between the promoter and the transgene open reading frame (analogous to the rice actin and maize ubiquitin promoter systems) increased transgene expression 50-fold. The expression patterns from the intron-modified SCSV (segments 4 and 7) promoters were very similar to those directed by the actin or ubiquitin promoters. All promoter systems investigated directed expression that appeared to be constitutive within leaf tissue, and localised to the epidermal and vascular tissues of the root. The pPLEX vectors described here are an important counterpart to the dicot pPLEX series and have the potential to be useful in monocot research and biotechnology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Barley yellow dwarf luteovirus-GPV (BYDV-GPV) is a common problem in Chinese wheat crops but is unrecorded elsewhere. A defining characteristic of GPV is its capacity to be transmitted efficiently by both Schizaphis graminum and Rhopaloshiphum padi. This dual aphid species transmission contrasts with those of BYDV-RPV and BYDV-SGV, globally distributed viruses, which are efficiently transmitted only by Rhopaloshiphum padi and Schizaphis graminum respectively. The viral RNA sequences encoding the coat protein (22K) gene, the movement protein (17K) gene, the region surrounding the conserved GDD motif of the polymerase gene and the intergenic sequences between these genes were determined for GPV and an Australian isolate of BYDV-RPV (RPVa). In all three genes, the sequences of GPV and RPVa were more similar to those of an American isolate of BYDV-RPV (RPVu) than to any other luteovirus for which there is data available. RPVa and RPVu were very similar, especially their coat proteins which had 97% identity at the amino acid level. The coat protein of GPV had 76% and 78% amino acid identity with RPVa and RPVu respectively. The data suggest that RPVu and RPVa are correctly named as strains of the same serotype and that GPV is sufficiently different from either RPV strain to be considered a distinct BYDV type. The coat protein and movement protein genes of GPV are very dissimilar to SGV. The polymerase sequences of RPVu, RPVa and GPV show close affinities with those of the sobemo-like luteoviruses and little similarity with those of the carmo-like luteoviruses. The sequences of the coat proteins, movement proteins and the polymerase segments of BYDV serotypes, other than RPV and GPV, form a cluster that is separate from their counterpart sequences from dicot-infecting luteoviruses. The RPV and GPV isolates consistently fall within a dicot-infecting cluster. This suggests that RPV and GPV evolved from within this group of viruses. Since these other viruses all infect dicots it seems likely that their common ancestor infected a dicot and that RPV and GPV evolved from a virus that switched hosts from a dicot to a monocot.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Whether superannuation fund members will achieve adequate retirement incomes is, at least in part, dependent on the superannuation choices they make during their working lives. The two important prerequisites of informed choice are access to good quality information and possession of knowledge and skills to evaluate that information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper focuses on a pilot study that explored the situated mathematical knowledge of mothers and children in one Torres Strait Islander community in Australia. The community encouraged parental involvement in their children’s learning and schooling. The study explored parents’ understandings of mathematics and how their children came to learn about it on the island. A funds of knowledge approach was used in the study. This approach is based on the premise that people are competent and have knowledge that has been historically and culturally accumulated into a body of knowledge and skills essential for their functioning and well-being (Moll, 1992). The participants, three adults and one child are featured in this paper. Three separate events are described with epiphanic or illuminative moments analysed to ascertain the features that enabled an understanding of the nature of the mathematical events. The study found that Indigenous ways of knowing of mathematics were deeply embedded in rich cultural practices that were tied to the community. This finding has implications for teachers of children in the early years. Where school mathematics is often presented as disembodied and isolated facts with children seeing little relevance, learning a different perspective of mathematics that is tied to the resources and practices of children’s lives and facilitated through social relationships, may go a long way to improving the engagement of children and their parents in learning and schooling.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Interdisciplinary research is often funded by national government initiatives or large corporate sponsorship, and as such, demands periodic reporting on the use of those funds. For reasons of accountability, governance and communication to the tax payer, knowledge of the outcomes of the research need to be measured and understood. The interdisciplinary approach to research raises many challenges for impact reporting. This presentation will consider what are the best practice workflow models and methodologies.Novel methodologies that can be added to the usual metrics of academic publications include analysis of percentage share of total publications in a subject or keyword field, calculating most cited publication in a key phrase category, analysis of who has cited or reviewed the work, and benchmarking of this data against others in that same category. At QUT, interest in how collaborative networking is trending in a research theme has led to the creation of some useful co-authorship graphs that demonstrate the network positions of authors and the strength of their scientific collaborations within a group. The scale of international collaborations is also worth including in the assessment. However, despite all of the tools and techniques available, the most useful way a researcher can help themselves and the process is to set up and maintain their researcher identifier and profile.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Process improvement has become a number one business priority, and more and more project requests are raised in organizations, seeking approval and resources for process-related projects. Realistically, the total of the requested funds exceeds the allocated budget, the number of projects is higher than the available bandwidth, and only some of these (very often only few) can be supported and most never see any light. Relevant resources are scarce, and correct decisions must be made to make sure that those projects that are of best value are implemented. How can decision makers make the right decision on the following: Which project(s) are to be approved and when to commence work on them? Which projects are most aligned with corporate strategy? How can the project’s value to the business be calculated and explained? How can these decisions be made in a fair, justifiable manner that brings the best results to the company and its stakeholders? This chapter describes a business value scoring (BVS) model that was built, tested, and implemented by a leading financial institution in Australia to address these very questions. The chapter discusses the background and motivations for such an initiative and describes the tool in detail. All components and underlying concepts are explained, together with details on its application. This tool has been successfully implemented in the case organization. The chapter provides practical guidelines for organizations that wish to adopt this approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hot spot identification (HSID) aims to identify potential sites—roadway segments, intersections, crosswalks, interchanges, ramps, etc.—with disproportionately high crash risk relative to similar sites. An inefficient HSID methodology might result in either identifying a safe site as high risk (false positive) or a high risk site as safe (false negative), and consequently lead to the misuse the available public funds, to poor investment decisions, and to inefficient risk management practice. Current HSID methods suffer from issues like underreporting of minor injury and property damage only (PDO) crashes, challenges of accounting for crash severity into the methodology, and selection of a proper safety performance function to model crash data that is often heavily skewed by a preponderance of zeros. Addressing these challenges, this paper proposes a combination of a PDO equivalency calculation and quantile regression technique to identify hot spots in a transportation network. In particular, issues related to underreporting and crash severity are tackled by incorporating equivalent PDO crashes, whilst the concerns related to the non-count nature of equivalent PDO crashes and the skewness of crash data are addressed by the non-parametric quantile regression technique. The proposed method identifies covariate effects on various quantiles of a population, rather than the population mean like most methods in practice, which more closely corresponds with how black spots are identified in practice. The proposed methodology is illustrated using rural road segment data from Korea and compared against the traditional EB method with negative binomial regression. Application of a quantile regression model on equivalent PDO crashes enables identification of a set of high-risk sites that reflect the true safety costs to the society, simultaneously reduces the influence of under-reported PDO and minor injury crashes, and overcomes the limitation of traditional NB model in dealing with preponderance of zeros problem or right skewed dataset.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australia has been populated for more than 40,000 years with Indigenous Australians joined by European settlers only 230 years ago. The first settlers consisted of convicts from more than 28 countries and members of the British army who arrived in 1788 to establish a British penal colony. Mass migration in the nineteenth century with one and a half million immigrants from Europe, principally from the United Kingdom and Ireland (Haines and Shlomowitz, 1992), established the continent as an Anglo society in the Pacific. In the twentieth century immigrants came from many European countries and in the latter decades from many parts of Asia and the Middle East (Collins, 1991, pp.10-13). In the 21st century Australia has an ethnically and culturally diverse population. The original Indigenous population of Australia accounts for approximately 460,000 or 2.5 per cent of the total population (ABS, 2006a). Estimates are that around 4.5m. persons in the population (close to 20 per cent), were born outside Australia with the majority of these arriving from Europe, principally the United Kingdom, and New Zealand (ABS, 2006b). Like many other countries, Australia has a legacy of discrimination and inequality in employment. Propelled by racist ideologies and the male breadwinner ideology, Indigenous Australians, and non-European immigrants, and women were barred from certain jobs and paid less for their work than any white male counterpart. These conditions were legally sanctioned through the industrial relations system and other laws in the nineteenth and first half of the twentieth century. Since the 1960s a dramatic change has occurred in social policy and national legislation and Australia today has an extensive array of laws which forbid employment discrimination on race, ethnicity, gender and many other characteristics, and other approaches which promote proactive organizational plans and actions to achieve equity in employment. This chapter outlines these developments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines the use of crowdfunding platforms to fund academic research. Looking specifically at the use of a Pozible campaign to raise funds for a small pilot research study into home education in Australia, the paper reports on the success and problems of using the platform. It also examines the crowdsourcing of literature searching as part of the package. The paper looks at the realities of using this type of platform to gain start–up funding for a project and argues that families and friends are likely to be the biggest supporters. The finding that family and friends are likely to be the highest supporters supports similar work in the arts communities that are traditionally served by crowdfunding platforms. The paper argues that, with exceptions, these platforms can be a source of income in times where academics are finding it increasingly difficult to source government funding for projects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phishing, a form of on-line identity theft, is a major problem worldwide, accounting for more than $7.5 Billion in losses in the US alone between 2005 and 2008. Australia was the first country to be targeted by Internet bank phishing in 2003 and continues to have a significant problem in this area. The major cyber crime groups responsible for phishing are based in Eastern Europe. They operate with a large degree of freedom due to the inherent difficulties in cross border law enforcement and the current situation in Eastern Europe, particularly in Russia and the Ukraine. They employ highly sophisticated and efficient technical tools to compromise victims and subvert bank authentication systems. However because it is difficult for them to repatriate the fraudulently obtained funds directly they employ Internet money mules in Australia to transfer the money via Western Union or Money gram. It is proposed a strategy, which firstly places more focus by Australian law enforcement upon transactions via Western Union and Money gram to detect this money laundering, would significantly impact the success of the Phishing attack model. This combined with a technical monitoring of Trojan technology and education of potential Internet money mules to avoid being duped would provide a winning strategy for the war on phishing for Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Activation of the matrix metalloproteinase 2 (MMP-2) has been shown to play a major role in the proteolysis of extracellular matrix (ECM) associated with tumor invasion. Although the precise mechanism of this activation remains elusive, levels of the membrane type 1-MMP (MT1-MMP) at the cell surface and of the tissue inhibitor of MMP-2 (TIMP-2) appear to be two important determinants. Induction of MMP-2 activation in cells cultivated on collagen type I gels indicated that the ECM is important in the regulation of this process. In this study, we show that SPARC/osteonectin, a small ECM- associated matricellular glycoprotein, can induce MMP-2 activation in two invasive breast cancer cell lines (MDA-MB-231 and BT549) but not in a noninvasive counterpart (MCF7), which lacks MT1-MMP. Using a set of peptides from different regions of SPARC, we found that peptide 1.1 (corresponding to the NH2-terminal region of the protein) contained the activity that induced NIMP-2 activation. Despite the requirement for MT1-MMP, seen in MCF-7 cells transfected with MT1-MMP, the activation of MMP-2 by SPARC peptide 1.1 was not associated with increased steady-state levels of MT1-MMP mRNA or protein in either MT1-MMP-transfected MCF-7 cells or constitutively expressing MDA- MB-231 and BT549 cells. We did, however, detect decreased levels of TIMP-2 protein in the media of cells incubated with peptide 1.1 or recombinant SPARC; thus, the induction of MMP-2 activation by SPARC might be due in part to a diminution of TIMP-2 protein. We conclude that SPARC, and specifically its NH2-terminal domain, regulates the activation of MMP-2 at the cell surface and is therefore likely to contribute to the proteolytic pathways associated with tumor invasion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bone sialoprotein (BSP), a secreted glycoprotein found in bone matrix, has been implicated in the formation of mammary microcalcifications and osteotropic metastasis of human breast cancer (HBC). BSP possesses an integrin-binding RGD (Arg-Gly-Asp) domain, which may promote interactions between HBC cells and bone extracellular matrix. Purified BSP, recombinant human BSP fragments and BSP-derived RGD peptides are shown to elicit migratory, adhesive, and proliferative responses in the MDA-MB-231 HBC cell line. Recombinant BSP fragment analysis localized a significant component of these activities to the RGD domain of the protein, and synthetic RGD peptides with BSP flanking sequences (BSPRGD) also conferred these responses. The fibronectin-derived RGD counterpart, GRGDSP (Gly-Arg-Gly-Asp-Ser-Pro), could not support these cellular responses, emphasizing specificity of the BSP configuration. Although most of the proliferative and adhesive responses could be attributed to RGD interactions, these interactions were only partly responsible for the migrational responses. Experiments with integrin-blocking antibodies demonstrated that BSP-RGD-induced migration utilizes the αvβ3 vitronectin receptor, whereas adhesion and proliferation responses were αvβ5-mediated. Using fluorescence activated cell sorting, we selected two separate subpopulations of MDA-MB-231 cells enriched for αvβ3 or αvβ5 respectively. Although some expression of the alternate αv integrin was still retained, the αvβ5-enriched MDA-MB-231 cells showed enhanced proliferative and adhesive responses, whereas the αvβ3-enriched subpopulation was suppressed for proliferation and adhesion, but showed enhanced migratory responses to BSP-RGD. In addition, similar analysis of two other HBC cell lines showed less marked, but similar RGD-dependent trends in adhesion and proliferation to the BSP fragments. Collectively, these data demonstrate BSP effects on proliferative, migratory, and adhesive functions in HBC cells and that the RGD-mediated component differentially employs αvβ3 and αvβ5 integrin receptors.