878 resultados para Protected cultivated
Resumo:
Smut fungi are important pathogens of grasses, including the cultivated crops maize, sorghum and sugarcane. Typically, smut fungi infect the inflorescence of their host plants. Three genera of smut fungi (Ustilago, Sporisorium and Macalpinomyces) form a complex with overlapping morphological characters, making species placement problematic. For example, the newly described Macalpinomyces mackinlayi possesses a combination of morphological characters such that it cannot be unambiguously accommodated in any of the three genera. Previous attempts to define Ustilago, Sporisorium and Macalpinomyces using morphology and molecular phylogenetics have highlighted the polyphyletic nature of the genera, but have failed to produce a satisfactory taxonomic resolution. A detailed systematic study of 137 smut species in the Ustilago-Sporisorium- Macalpinomyces complex was completed in the current work. Morphological and DNA sequence data from five loci were assessed with maximum likelihood and Bayesian inference to reconstruct a phylogeny of the complex. The phylogenetic hypotheses generated were used to identify morphological synapomorphies, some of which had previously been dismissed as a useful way to delimit the complex. These synapomorphic characters are the basis for a revised taxonomic classification of the Ustilago-Sporisorium-Macalpinomyces complex, which takes into account their morphological diversity and coevolution with their grass hosts. The new classification is based on a redescription of the type genus Sporisorium, and the establishment of four genera, described from newly recognised monophyletic groups, to accommodate species expelled from Sporisorium. Over 150 taxonomic combinations have been proposed as an outcome of this investigation, which makes a rigorous and objective contribution to the fungal systematics of these important plant pathogens.
Resumo:
The belief that regions play a role in determining national economic development and that advantages are found at the local and regional level has been the focus of economic geography and development studies over the last 10 years. However, this issue has historically been dominated by economic perspectives, industrial firms, and public bodies. In recent years the social economy is starting to receive greater attention in creating regional advantage as well as ameliorating regional disadvantage. The social economy includes the impact of the third sector such as social enterprises. This paper proposes that understanding the role and function of social enterprise will enable a more nuanced understanding of the socio-economic aspects of regional development. Drawing upon Oliver’s (1997) framework for sustainable competitive advantage it is argued that this established management framework provides a valuable foundation for examining the organisational resources that social enterprise need to operate effectively, as well as the socio-economic resources they produce for regional communities.
Resumo:
Throughout Australia freehold land interests are protected by statutory schemes which grant indefeasibility of title to registered interests. Queensland freehold land interests are protected by Torrens system established by the Land Title Act 1994. However, no such protection exists for Crown land interests. The extent of Queensland occupied under some form of Crown tenure, in excess of 70%, means that Queensland Crown land users are disadvantaged when compared to freehold land users. This article examines the role indefeasibility of title has in protecting interests in Crown land. A comparative analysis is undertaken between Queensland and New South Wales land management frameworks to determine whether interests in crown land are adequately protected in Queensland.
Resumo:
This article focuses on the satirical Australian show The Chaser’s War on Everything, and uses it to critically assess the potential political and social ramifications of what McNair (2006) has called ‘cultural chaos’. Drawing upon and analysing several examples from this particular program, alongside interviews with its production team and qualitative audience research, this article argues that this TV show’s engagement with politicians and political issues, in a way that departs from the conventions of traditional journalism, offers a significant opportunity for the interrogation of power. The program’s use of often bizarre and unexpected comedic confrontation allows it to present a perhaps more authentic image of political agents than is often cultivated in mainstream journalism. This suggests therefore that the shift from homogeneity to heterogeneity in the news media – which McNair (2006) sees as a key feature of cultural chaos – presents a significant challenge to those who wish to retain control over what the public sees and understands about the political world, and is a development which should be viewed in positive terms.
Resumo:
This paper focuses on the satirical Australian television show The Chaser’s War on Everything, and uses it to critically explore the potential ramifications of what McNair (2006) has called ‘cultural chaos’. Through an analysis of several examples from this particular program, alongside interviews with its production team and qualitative audience research, this paper argues that this TV show’s engagement with political issues in a creative, entertaining way that departs from the conventions of traditional journalism, allows it to present a perhaps more authentic image of political agents than is often cultivated in the mainstream news media. This paper therefore provides clear evidence that the shift from homogeneity to heterogeneity in the news media presents a significant challenge to those who wish to heavily control public opinion. It also provides further support for an optimistic re-appraisal of entertainment which emphasises its central (not merely periphery) role in political discourse.
Resumo:
Sound design for documentary is an under-researched field. The specific context of representation of emotional or mental states is particularly open to clichéd treatment. Such treatment in the media often ‘perpetuates inaccurate or negative assumptions about mental health issues in the wider community’ (Francis et al 2005: 11) by employing, for example, either jarring sound/music combinations to signify ‘madness’ or overtly saccharine music to educe sympathy. This project adopted a practice-based approach to discovering a considered aesthetic treatment designed to elicit a more empathetic audience response. A more discriminating engagement with the intentions of the film was cultivated by abandoning both the ‘representational naturalism’ and the ‘distilled, evocative realism’ of documentary sound design (Davies 2007: 18) in favour of a more lyrical or musical approach. To achieve this we manipulated perspective, tonal character and perceptions of space in the final mixing stage. The project was funded by the Film Australia National Interest Program, ABC TV and the Pacific Film and Television Commission. As a crucial contributor to the aesthetic of the project I was nominated in the funding application, and ultimately received an AFI Award for Best Sound in a Documentary in 2008. The film was honoured by The Film Critics Circle of Australia, The Slamdance Film Festival in Utah and The Sydney Film Festival. It has been favourably reviewed in national and international print media (The Age, Sydney Morning Herald, among others) as well as online film/culture zines and blogs.
Resumo:
Membranes prepared from Bombyx mori silk fibroin have shown potential as a substrate for human limbal epithelial (L-EC) and stromal cell cultivation. Here we present fibroin as a dual-layer construct containing both an epithelium and underlying stroma for corneolimbal reconstruction. We have compared the growth and phenotype of L-EC on non-porous versus porous fibroin membranes. Furthermore, we have compared the growth of limbal mesenchymal stromal cells (L-MSC) in either serum-supplemented medium or the MesenCult-XF® culture system within fibroin fibrous mats. The co-culture of L-EC and L-MSC in fibroin dual-layer constructs was also examined. L-EC on porous membranes displayed a squamous monolayer; in contrast, L-EC on non-porous fibroin appeared cuboidal and stratified. Both constructs maintained evidence of corneal phenotype (cytokeratin 3/12) and distribution of ΔNp63+ progenitor cells. L-MSC cultivated within fibroin fibrous mats in serum-supplemented medium contained less than 64% of cells expressing the characteristic MSC phenotype of CD73+CD90+CD105+ after two weeks, compared with over 81% in MesenCult-XF® medium. Dual-layer fibroin scaffolds consisting of L-EC and L-MSC maintained a similar phenotype as on the separate layers. These results support the feasibility of a 3D engineered limbus constructed from B. mori silk fibroin, and warrant further studies into the potential benefits it offers to corneolimbal tissue regeneration.
Resumo:
Fire safety of buildings has been recognised as very important by the building industry and the community at large. Gypsum plasterboards are widely used to protect light gauge steel frame (LSF) walls all over the world. Gypsum contains free and chemically bound water in its crystal structure. Plasterboard also contains gypsum (CaSO4.2H2O) and calcium carbonate (CaCO3). The dehydration of gypsum and the decomposition of calcium carbonate absorb heat, and thus are able to protect LSF walls from fires. Kolarkar and Mahendran (2008) developed an innovative composite wall panel system, where the insulation was sandwiched between two plasterboards to improve the thermal and structural performance of LSF wall panels under fire conditions. In order to understand the performance of gypsum plasterboards and LSF wall panels under standard fire conditions, many experiments were conducted in the Fire Research Laboratory of Queensland University of Technology (Kolarkar, 2010). Fire tests were conducted on single, double and triple layers of Type X gypsum plasterboards and load bearing LSF wall panels under standard fire conditions. However, suitable numerical models have not been developed to investigate the thermal performance of LSF walls using the innovative composite panels under standard fire conditions. Continued reliance on expensive and time consuming fire tests is not acceptable. Therefore this research developed suitable numerical models to investigate the thermal performance of both plasterboard assemblies and load bearing LSF wall panels. SAFIR, a finite element program, was used to investigate the thermal performance of gypsum plasterboard assemblies and LSF wall panels under standard fire conditions. Appropriate values of important thermal properties were proposed for plasterboards and insulations based on laboratory tests, literature review and comparisons of finite element analysis results of small scale plasterboard assemblies from this research and corresponding experimental results from Kolarkar (2010). The important thermal properties (thermal conductivity, specific heat capacity and density) of gypsum plasterboard and insulation materials were proposed as functions of temperature and used in the numerical models of load bearing LSF wall panels. Using these thermal properties, the developed finite element models were able to accurately predict the time temperature profiles of plasterboard assemblies while they predicted them reasonably well for load bearing LSF wall systems despite the many complexities that are present in these LSF wall systems under fires. This thesis presents the details of the finite element models of plasterboard assemblies and load bearing LSF wall panels including those with the composite panels developed by Kolarkar and Mahendran (2008). It examines and compares the thermal performance of composite panels developed based on different insulating materials of varying densities and thicknesses based on 11 small scale tests, and makes suitable recommendations for improved fire performance of stud wall panels protected by these composite panels. It also presents the thermal performance data of LSF wall systems and demonstrates the superior performance of LSF wall systems using the composite panels. Using the developed finite element of models of LSF walls, this thesis has proposed new LSF wall systems with increased fire rating. The developed finite element models are particularly useful in comparing the thermal performance of different wall panel systems without time consuming and expensive fire tests.
Resumo:
In the recent past, there are some social issues when personal sensitive data in medical database were exposed. The personal sensitive data should be protected and access must be accounted for. Protecting the sensitive information is possible by encrypting such information. The challenge is querying the encrypted information when making the decision. Encrypted query is practically somewhat tedious task. So we present the more effective method using bucket index and bloom filter technology. We find that our proposed method shows low memory and fast efficiency comparatively. Simulation approaches on data encryption techniques to improve health care decision making processes are presented in this paper as a case scenario.
Resumo:
A database will be protected under Australian law if it is a literary work; expressed in material form; meets the originality test; and has a relevant connection with Australia. Facts and data in themselves are not protected by copyright. However, a collection of data, a dataset, or a database may be protected by copyright if it is sufficiently original. Whether a work is sufficiently original to be protected by copyright depends on whether it has been produced by the application of independent intellectual effort by the author/s, which may involve the exercise of skill, judgement, or creativity in selecting, presenting, or arranging the information. This summary synthesises recent cases regarding originality in factual compilations.
Resumo:
The Agrobacterium-mediated transformation system was extended to two indica cultivars: a widely cultivated breeding line IR-64 and an elite basmati cultivar Karnal Local. Root tips and shoot tips of seedlings, and scutellar-calli derived from mature seeds showed high-efficiency Agrobacterium tumefaciens infection and stable transformation. In addition to the superbinary vector pTOK233 in Agrobacterium strain LBA4404, almost equally high levels of transformation were achieved with a relatively much smaller (13.1 kb) binary vector (pCAMBIA1301) in a supervirulent host strain AGL1. In both cases, as well as in both cultivars, while 60–90% of the infected explants produced calli resistant to the selectable agent hygromycin, 59–75% of such calli tested positive for GUS. A high level (400 μM) of acetosyringone in the preinduction medium for Agrobacterium and a higher level (500 μM) in the cocultivation medium was necessary for an enhancement in transformation frequency of the binary vector to levels comparable to a superbinary. Hygromycin-resistant calli could be produced from all the explants used. Transformants could be regenerated for both cultivars using the superbinary and binary vector, but only for calli of scutellar origin. In addition to the molecular confirmation of hpt and gus gene transfer and transcription, absence of gene sequences outside the transferred DNA (T-DNA) region confirmed absence of any long T-DNA transfer.
Resumo:
Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistringuishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the receipient in the private domain. "Non-trivial filtering" can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicaly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
This paper focuses on the importance of foregrounding an emphasis on the development of historical thinking in the implementation of the Australian Curriculum: History as a way of making the study of history meaningful for their students. In doing so, it argues that teachers need to take up the opportunity to situate the study of Asia as a significant component of the curriculum’s ‘Australia in a world history approach’. In the discussion on the significance of historical thinking, the paper specifically addresses those seven historical concepts articulated in the new history curriculum by drawing from the international scholarship in the field of history education on the ways in which children and adolescents think about historical content and concepts.
Resumo:
Ross River Virus has caused reported outbreaks of epidemic polyarthritis, a chronic debilitating disease associated with significant long-term morbidity in Australia and the Pacific region since the 1920s. To address this public health concern, a formalin- and UV-inactivated whole virus vaccine grown in animal protein-free cell culture was developed and tested in preclinical studies to evaluate immunogenicity and efficacy in animal models. After active immunizations, the vaccine dose-dependently induced antibodies and protected adult mice from viremia and interferon α/β receptor knock-out (IFN-α/βR(-/-)) mice from death and disease. In passive transfer studies, administration of human vaccinee sera followed by RRV challenge protected adult mice from viremia and young mice from development of arthritic signs similar to human RRV-induced disease. Based on the good correlation between antibody titers in human sera and protection of animals, a correlate of protection was defined. This is of particular importance for the evaluation of the vaccine because of the comparatively low annual incidence of RRV disease, which renders a classical efficacy trial impractical. Antibody-dependent enhancement of infection, did not occur in mice even at low to undetectable concentrations of vaccine-induced antibodies. Also, RRV vaccine-induced antibodies were partially cross-protective against infection with a related alphavirus, Chikungunya virus, and did not enhance infection. Based on these findings, the inactivated RRV vaccine is expected to be efficacious and protect humans from RRV disease