926 resultados para Endosperm absence


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Intercalated Archean komatiites and dacites sit above a thick footwall dacite unit in the host rock succession at the Black Swan Nickel Mine, north of Kalgoorlie in the Yilgarn Craton, Western Australia. Both lithofacies occur in units that vary in scale from laterally extensive at the scale of the mine lease to localized, thin, irregular bodies, from > 100 m thick to only centimetres thick. Some dacites are only slightly altered and deformed, and are interpreted to post-date major deformation and alteration (late porphyries). However, the majority of the dacites display evidence of deformation, especially at contacts, and metamorphism, varying from silicification and chlorite alteration at contacts to pervasive low grade regional metamorphic alteration represented by common assemblages of chlorite, sericite and albite. Texturally, the dacites vary from entirely massive and coherent to partially brecciated to totally brecciated. Strangely, some dacites are coherent at the margins and brecciated internally. Breccia textures vary from cryptically defined, to blocky, closely packed, in situ jig-saw fit textures with secondary minerals in fractures between clasts, to more apparent matrix rich textures with round clast forms, giving apparent conglomerate textures. Some clast zones have multi-coloured clasts, giving the impression of varied provenance. Strangely however, all these textural variants have gradational relationships with each other, and no bedding or depositional structures are present. This indicates that all textures have an in situ origin. The komatiites are generally altered and pervasively carbonate veined. Preservation of original textures is patchy and local, but includes coarse adcumulate, mesocumulate, orthocumulate, crescumulate-harrisite and occasionally spinifex textures. Where original contacts between komatiites and dacites are preserved intact (i.e. not sheared or overprinted by alteration), the komatiites have chilled margins, whereas the dacites do not. The margins of the dacites are commonly silicified, and inclusions of dacite occur in komatiite, even at the top contacts of komatiite units, but komatiite clasts do not occur in the dacites. The komatiites therefore were emplaced as sills into the dacites, and the intercalated relationships are interpreted as intrusive. The brecciation and alteration in the dacites are interpreted as being largely due to hydraulic fracturing and alteration induced by contact metamorphic effects and hydrothermal alteration deriving from the intrusion of komatiites into the felsic pile. The absence of autobreccia and hyaloclastite textures in the dacites suggest that they were emplaced as an earlier intrusive (sill?) complex at a high level in the crust.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports the findings of an in-depth literature review, which was designed as the first phase of a study that ultimately aims to rank the importance of key governance mechanisms on collaborative construction projects, in terms of impact on value-for-money. The absence of such information in the global knowledge base has prompted the current study. Seminal research completed recently concluded that deductive evidence with regard to the performance outcomes of collaborative procurement mechanisms is currently limited (Eriksson and Westerberg 2011). The authors aim to address this gap in current understanding. The literature review identifies key features of both formal and informal mechanisms which have been applied within collaborative contracting contexts. The literature review lays a solid foundation for designing a deductive research strategy to be implemented in the second phase of the study, which will employ a large-scale quantitative survey to shed light on the governance structures of collaborative contracts, and the ways in which they impact on realisation of VfM during project delivery in the Australian infrastructure industry. The current paper aims to identify the main categories of formal and informal governance mechanisms currently being employed globally. This will provide structure for the development of the survey in the second phase of the study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent times concerns about possible adverse effects of early separation and advocacy for individual rights have resulted in a movement away from organizational level policies about the separation of twin children as they enter school. Instead, individualized approaches that focus on the twin children’s characteristics and family perspectives have been proposed. This study, conducted in Australia where all but a few families had choice about the class placement of their twin children, questioned parents (N = 156) about their placement decisions. Results indicated that most parents opted for placement together in the early years of schooling. The choice to separate twins at school entry was associated with parent identification of risk in the twin relationship, while being kept together was associated with parent identification of absence of such risk. The findings are discussed in light of the current evidence against separation, and suggest that parent choices regarding the separation of twin children in the early years are informative to educational policy and practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cenozoic extension in western Mexico has been divided into two episodes separated by the change from convergence to oblique divergence at the plate boundary. The Gulf Extensional Province is thought to have started once subduction ended at ~12.5 Ma whereas early extension is classified as Basin and Range. Mid-Miocene volcanism of the Comondú group has been considered as a subduction-related arc, whereas post ~12.5 Ma volcanism would be extension-related. Our new integration of the continental onshore and offshore geology of the south-east Gulf region, backed by tens of Ar-Ar and U-Pb ages and geochemical studies, document an early-mid Miocene rifting and extension-related bimodal to andesitic magmatism prior to subduction termination. Between ~21 and 11 Ma a system of NNW-SSE high-angle extensional faults rifted the western side of the Sierra Madre Occidental (SMO) ignimbrite plateau. In Nayarit, rhyolitic domes and some basalts were emplaced along this extensional belt at 18-17 Ma. These rocks show strong antecrystic inheritance but an absence of Mesozoic and older xenocrysts, suggesting a genesis in the mid-upper crust triggered by extension-induced basaltic influx. In Sinaloa, large grabens were floored by huge dome complexes at ~21-17 Ma and filled by continental sediments with interlayered basalts dated at 15 Ma. Mid-Miocene volcanism, including the largely volcaniclastic Comondú strata in Baja California, was thus emplaced in rift basins and appears associated to decompression melting rather than subduction. Along the coast, flat-lying basaltic lava flows dated at 11-10 Ma are exposed just above the present sea level. Here crustal thickness is 25-20 Km, almost half that in the core of the SMO, implying significant lithosphere stretching before ~11 Ma. This mafic pulse, with relatively high Ti but still clear Nb-Ta negative spikes, may be related to the detachment of the lower part of the subducted slab, allowing asthenosphere to flow into parts of the mantle previously fluxed by subduction fluids. Very uniform OIB-like lavas appear in late Pliocene and Pleistocene, only 18 m.y. after the onset of rifting and ~9 m.y. after the end of subduction. Our study shows that rifting began much earlier than Late Miocene and progressively overwhelmed subduction in generating magmatism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – The aim of this study is to elicit accountants’ perceptions regarding corporate social and environmental accounting and reporting practices in a developing country such as Bangladesh. Design/methodology/approach – Members of the Institute of Chartered Accountants of Bangladesh (ICAB) were surveyed to determine their perceptions on issues pertaining to social and environmental accounting and reporting practices in Bangladesh. Findings – Whilst the findings show that accountants have positive attitudes toward corporate social and environmental accounting, progress is limited, with the absence of ICAB in making any noticeable effort to develop such practices. Research implications – Unlike prior studies, the implications of this study suggest that without international influence, it is less likely that institutional forces in Bangladesh (ICAB and the government) would be effective in dealing with social and environmental accounting and reporting issues. Originality/value – While prior studies advocate proactive roles of the accounting profession, this study argues that proactive roles are less likely to prevail in the context of Bangladesh without direct intervention from institutional and regulatory authorities in the international arena.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Evidence currently supports the view that intentional interpersonal coordination (IIC) is a self-organizing phenomenon facilitated by visual perception of co-actors in a coordinative coupling (Schmidt, Richardson, Arsenault, & Galantucci, 2007). The present study examines how apparent IIC is achieved in situations where visual information is limited for co-actors in a rowing boat. In paired rowing boats only one of the actors, [bow seat] gets to see the actions of the other [stroke seat]. Thus IIC appears to be facilitated despite the lack of important visual information for the control of the dyad. Adopting a mimetic approach to expert coordination, the present study qualitatively examined the experiences of expert performers (N=9) and coaches (N=4) with respect to how IIC was achieved in paired rowing boats. Themes were explored using inductive content analysis, which led to layered model of control. Rowers and coaches reported the use of multiple perceptual sources in order to achieve IIC. As expected(Kelso, 1995; Schmidt & O’Brien, 1997; Turvey, 1990), rowers in the bow of a pair boat make use of visual information provided by the partner in front of them [stroke]. However, this perceptual information is subordinate to perception Motor Learning and Control S111 of the relationship between the boat hull and water passing beside it. Stroke seat, in the absence of visual information about his/her partner, achieves coordination by picking up information about the lifting or looming of the boat’s stern along with water passage past the hull. In this case it appears that apparent or desired IIC is supported by the perception of extra-personal variables, in this case boat behavior; as this perceptual information source is used by both actors. To conclude, co-actors in two person rowing boats use multiple sources of perceptual information for apparent IIC that changes according to task constraints. Where visual information is restricted IIC is facilitated via extra-personal perceptual information and apparent IIC switches to intentional extra-personal coordination.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter outlines the most important ways in which intellectual property is protected in Australia, and also the factors which affect the rights of joint venture participants in the absence of specific agreement between such participants. It then examines particular issues which may be considered in preparing appropriate documentation for any joint venture which involves the utilisation or generation of intellectual property to ensure that the joint venture participants achieve their desired result in terms of the allocation of ownership and control of such rights. The analysis includes and explanation of the special considerations which affect co-operation in research between industry and a university or government research institution. Finally, the rights of the joint venturers to intellectual property upon termination of the joint ventures are considered.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vibrational spectroscopy has been used to assess the structure of kotoite a borate mineral of magnesium which is isostructural with jimboite. The mineral is orthorhombic with point group: 2/m 2/m 2/m. The mineral has the potential as a new memory insulator material. The mineral has been characterised by a combination of Raman and infrared spectroscopy. The Raman spectrum is dominated by a very intense band at 835 cm−1, assigned to the symmetric stretching mode of tetrahedral boron. Raman bands at 919, 985 and 1015 cm−1 are attributed to the antisymmetric stretching modes of tetrahedral boron. Kotoite is strictly an hydrous borate mineral. An intense Raman band observed at 3559 cm−1 is attributed to the stretching vibration of hydroxyl units, more likely to be associated with the borate mineral hydroxyborate. The lack of observation of water bending modes proves the absence of water in the kotoite structure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Measuring wellness among adolescents is an emerging trend among professionals and researchers endeavouring to influence youth as they establish lifestyle patterns in this critical period of life. This discussion highlights instruments used to measure wellness among adolescents, and considers the empirical data supporting their validity and reliability amongst adolescents. In summary, Adolescent wellness is an important indicator of future health and lifestyle habits. There are a number of tools available to measure wellness, each with its own focus, depending on the definition or model from which it was developed. This may cause debate regarding the appropriateness of some instruments for evaluating wellness. The majority of wellness evaluation approaches reported among adolescents have less than ideal validation. A ‘gold standard’ definition could lead to the standardisation of a theoretical model against which wellness instruments could be validated. The absence of peer reviewed studies reporting psychometric testing for wellness evaluation instruments among adolescents is concerning given their growing popularity and highlights a priority area for future research in this field.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the absence of a benchmarking mechanism specifically designed for local requirements and characteristics, a carbon dioxide footprint assessment and labelling scheme for construction materials is urgently needed to promote carbon dioxide reduction in the construction industry. This paper reports on a recent interview survey of 18 senior industry practitioners in Hong Kong to elicit their knowledge and opinions concerning the potential of such a carbon dioxide labelling scheme. The results of this research indicate the following. A well-designed carbon dioxide label could stimulate demand for low carbon dioxide construction materials. The assessment of carbon dioxide emissions should be extended to different stages of material lifecycles. The benchmarks for low carbon dioxide construction materials should be based on international standards but without sacrificing local integrity. Administration and monitoring of the carbon dioxide labelling scheme could be entrusted to an impartial and independent certification body. The implementation of any carbon dioxide labelling schemes should be on a voluntary basis. Cost, functionality, quality and durability are unlikely to be replaced by environmental considerations in the absence of any compelling incentives or penalties. There are difficulties in developing and operating a suitable scheme, particularly in view of the large data demands involved, reluctance in using low carbon dioxide materials and limited environmental awareness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Previous research on homeless adolescents has largely ignored the distinction between those who have left home on their volition (runaways) and those who have been forced to leave (throwaways). Fifty-two homeless adolescents in Brisbane, Australia, were assessed to compare male and female runaways and throwaways for social adjustment and symptomatology. Differences for social adjustment (antisocial tendencies and aggression) and symptomatology (social isolation and depression) were predicted. Results indicated that male runaways were significantly more hostile than male throwaways (p < 0,001), and significantly more socially isolated than female runaways (p < 0,025). Female throwaways, however, were significantly more hostile than male throwaways (p < 0,025) and female runaways (p < 0,025). Yet homeless males overall had a significantly stronger urge to act out hostility than homeless females (p < 0,025). In addition, female throwaways were significantly more antisocial than male throwaways (p < 0,001). There were no significant differences for depression. A theory of inner social control (Hirschi, 1969), postulating absence of bonding in earlier socialization, was supported.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The issue of carbon sequestration rights has become topical following the United Nations Convention on Climate Change (United Nations 1992 at page 1414) and the subsequent Kyoto Protocol (United Nations Climate Change Secretariat 1998) which identified emissions trading as one of the mechanisms to reduce greenhouse gas emissions. Australian states have responded by creating a legal framework for the recognition of rights to bio-sequestered carbon. There is a lack of uniformity in the approach of each state to the recognition of these rights, which vary from the creation of new and novel interests in land to the adoption of more traditional rights such as a profit a prendre. Rights to bio-sequestered carbon are likely to have an impact on the utility, marketability, value and financing of rural land holdings. Despite the creation of the legal framework for recognition of rights to sequestrated carbon, there has been a delay in the introduction of a formalised carbon trading scheme in Australia. In the absence of an established carbon market, this paper addresses the applicability of contingent valuation theory to assess the value of bio-sequestered carbon rights to a rural land holder. Limitations and potential controversies associated with this application of contingent valuation theory are also addressed in this paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Small-angle and ultra-small-angle neutron scattering (SANS and USANS) measurements were performed on samples from the Triassic Montney tight gas reservoir in Western Canada in order to determine the applicability of these techniques for characterizing the full pore size spectrum and to gain insight into the nature of the pore structure and its control on permeability. The subject tight gas reservoir consists of a finely laminated siltstone sequence; extensive cementation and moderate clay content are the primary causes of low permeability. SANS/USANS experiments run at ambient pressure and temperature conditions on lithologically-diverse sub-samples of three core plugs demonstrated that a broad pore size distribution could be interpreted from the data. Two interpretation methods were used to evaluate total porosity, pore size distribution and surface area and the results were compared to independent estimates derived from helium porosimetry (connected porosity) and low-pressure N2 and CO2 adsorption (accessible surface area and pore size distribution). The pore structure of the three samples as interpreted from SANS/USANS is fairly uniform, with small differences in the small-pore range (<2000 Å), possibly related to differences in degree of cementation, and mineralogy, in particular clay content. Total porosity interpreted from USANS/SANS is similar to (but systematically higher than) helium porosities measured on the whole core plug. Both methods were used to estimate the percentage of open porosity expressed here as a ratio of connected porosity, as established from helium adsorption, to the total porosity, as estimated from SANS/USANS techniques. Open porosity appears to control permeability (determined using pressure and pulse-decay techniques), with the highest permeability sample also having the highest percentage of open porosity. Surface area, as calculated from low-pressure N2 and CO2 adsorption, is significantly less than surface area estimates from SANS/USANS, which is due in part to limited accessibility of the gases to all pores. The similarity between N2 and CO2-accessible surface area suggests an absence of microporosity in these samples, which is in agreement with SANS analysis. A core gamma ray profile run on the same core from which the core plug samples were taken correlates to profile permeability measurements run on the slabbed core. This correlation is related to clay content, which possibly controls the percentage of open porosity. Continued study of these effects will prove useful in log-core calibration efforts for tight gas.