881 resultados para High security identity tags
Massively parallel sequencing and analysis of expressed sequence tags in a successful invasive plant
Resumo:
Background Invasive species pose a significant threat to global economies, agriculture and biodiversity. Despite progress towards understanding the ecological factors associated with plant invasions, limited genomic resources have made it difficult to elucidate the evolutionary and genetic factors responsible for invasiveness. This study presents the first expressed sequence tag (EST) collection for Senecio madagascariensis, a globally invasive plant species. Methods We used pyrosequencing of one normalized and two subtractive libraries, derived from one native and one invasive population, to generate an EST collection. ESTs were assembled into contigs, annotated by BLAST comparison with the NCBI non-redundant protein database and assigned gene ontology (GO) terms from the Plant GO Slim ontologies. Key Results Assembly of the 221 746 sequence reads resulted in 12 442 contigs. Over 50 % (6183) of 12 442 contigs showed significant homology to proteins in the NCBI database, representing approx. 4800 independent transcripts. The molecular transducer GO term was significantly over-represented in the native (South African) subtractive library compared with the invasive (Australian) library. Based on NCBI BLAST hits and literature searches, 40 % of the molecular transducer genes identified in the South African subtractive library are likely to be involved in response to biotic stimuli, such as fungal, bacterial and viral pathogens. Conclusions This EST collection is the first representation of the S. madagascariensis transcriptome and provides an important resource for the discovery of candidate genes associated with plant invasiveness. The over-representation of molecular transducer genes associated with defence responses in the native subtractive library provides preliminary support for aspects of the enemy release and evolution of increased competitive ability hypotheses in this successful invasive. This study highlights the contribution of next-generation sequencing to better understanding the molecular mechanisms underlying ecological hypotheses that are important in successful plant invasions.
Resumo:
In this paper, we describe on-going work on mobile banking customization, particularly in the Australian context. The use of user-defined tags to facilitate personalized interactions in the mobile context is explored. The aim of this research is to find ways to improve mobile banking interaction. Customization is more significant in the mobile context than online due to factors such as smaller screen sizes and limited software and hardware capabilities, placing an increased emphasis on usability. This paper explains how user-defined tags can aid different types of customization at the interaction level. A preliminary prototype has been developed to demonstrate the mechanics of the proposed approach. Potential implications, design decisions and limitations are discussed with an outline of future work.
Resumo:
Public relations educators need new solutions to prepare students to become tomorrow's practitioner today. Managers and employers in the new creative workforce (McWilliam, 2008) expect graduates to be problem solvers, critical and creative thinkers, reflective, and self reliant (Barrie, 2008; David, 2004). Enabling students to develop these attributes requires a collaborative and creative approach to pedagogy (Jeffrey & Craft, 2001, 2004). A model for the next generation of public relations education was developed to integrate industry partnerships as a way to bridge pedagogy and professional practice. The model suggests (a) that industry partnerships be embedded in learning activities, (b) that assessment items be considered on a continuum and delivered incrementally across a course of study, and (c) that connections between classroom and workplace activities are clearly signposted for students.
Resumo:
In Australia, young drivers aged 17 to 24 years, and particularly males, have the highest risk of being involved in a fatal crash. Investigation of young drivers’ beliefs allows for a greater understanding of their involvement in risky behaviours, such as speeding, as beliefs are associated with intentions, the antecedent to behaviour. The theory of planned behaviour (TPB) was used to conceptualise beliefs using a scenario based questionnaire distributed to licensed drivers (N = 398). The questionnaire measured individual’s beliefs and intentions to speed in a particular situation. Consistent with a TPB-based approach, the beliefs of those with low intentions to speed (‘low intenders’) were compared with the beliefs of those with high intentions (‘high intenders’) with such comparisons conducted separately for males and females. Overall, significant differences in the beliefs held by low and high intenders and for both females and males were found. Specifically, for females, it was found that high intenders were significantly more likely to perceive advantages of speeding, less likely to perceive disadvantages, and more likely to be encouraged to speed on familiar and inappropriately signed roads than female low intenders. Females, however, did not differ in their perceptions of support from friends, with all females reporting some level of disapproval from most friends and all females (i.e., low and high intenders) reporting approval to speed from their male friends. The results for males revealed that high intenders were significantly more likely to speed on familiar and inappropriately signed roads as well as having greater perceptions of support from all friends, except from those friends with whom they worked. Low and high intending males did not differ in their perceptions of the advantages and disadvantages of speeding, with the exception of feelings of excitement whereby high intenders reported speeding to be more exciting than low intenders. The findings are discussed in terms of how they may directly inform the content of mass media and public education campaigns aimed at encouraging young drivers to slow down.
Resumo:
In previous research (Chung et al., 2009), the potential of the continuous risk profile (CRP) to proactively detect the systematic deterioration of freeway safety levels was presented. In this paper, this potential is investigated further, and an algorithm is proposed for proactively detecting sites where the collision rate is not sufficiently high to be classified as a high collision concentration location but where a systematic deterioration of safety level is observed. The approach proposed compares the weighted CRP across different years and uses the cumulative sum (CUSUM) algorithm to detect the sites where changes in collision rate are observed. The CRPs of the detected sites are then compared for reproducibility. When high reproducibility is observed, a growth factor is used for sequential hypothesis testing to determine if the collision profiles are increasing over time. Findings from applying the proposed method using empirical data are documented in the paper together with a detailed description of the method.
Resumo:
When an artist is put in charge of a city, he will use the town as his canvas. Edi Rama became Mayor of Tirana in 2000 and since them has undertaken an unusual and colourful renewal program for the Albania capital.
Resumo:
Despite many incidents about fake online consumer reviews have been reported, very few studies have been conducted to date to examine the trustworthiness of online consumer reviews. One of the reasons is the lack of an effective computational method to separate the untruthful reviews (i.e., spam) from the legitimate ones (i.e., ham) given the fact that prominent spam features are often missing in online reviews. The main contribution of our research work is the development of a novel review spam detection method which is underpinned by an unsupervised inferential language modeling framework. Another contribution of this work is the development of a high-order concept association mining method which provides the essential term association knowledge to bootstrap the performance for untruthful review detection. Our experimental results confirm that the proposed inferential language model equipped with high-order concept association knowledge is effective in untruthful review detection when compared with other baseline methods.
Resumo:
Beam steering with high front-to-back ratio and high directivity on a small platform is proposed. Two closely spaced antenna pairs with eigenmode port decoupling are used as the basic radiating elements. Two orthogonal radiation patterns are obtained for each antenna pair. High front-to-back ratio and high directivity are achieved by combining the two orthogonal radiation patterns. With an infinite groundplane, a front-to-back ratio of 21 dB with a directivity of 9.8 dB can be achieved. Beam steering, at the expense of a slight decrease in directivity, is achieved by placing the two antenna pairs 0.5λ apart. The simulated half power beamwidth is 58°. A prototype was designed and the 2-D radiation patterns were measured. The prototype supports three directions of beam steering. The half power beamwidth was measured as 46°, 48°, and 50° for the three respective beam directions. The measured front-to-back ratio in azimuth plane is 8.5 dB, 8.0 dB and 7.6 dB, respectively.
Resumo:
We present a modification of the algorithm of Dani et al. [8] for the online linear optimization problem in the bandit setting, which with high probability has regret at most O ∗ ( √ T) against an adaptive adversary. This improves on the previous algorithm [8] whose regret is bounded in expectation against an oblivious adversary. We obtain the same dependence on the dimension (n 3/2) as that exhibited by Dani et al. The results of this paper rest firmly on those of [8] and the remarkable technique of Auer et al. [2] for obtaining high probability bounds via optimistic estimates. This paper answers an open question: it eliminates the gap between the high-probability bounds obtained in the full-information vs bandit settings.
Resumo:
All organisations, irrespective of size and type, need effective information security management (ISM) practices to protect vital organisational in- formation assets. However, little is known about the information security management practices of nonprofit organisations. Australian nonprofit organisations (NPOs) employed 889,900 people, managed 4.6 million volunteers and contributed $40,959 million to the economy during 2006-2007 (Australian Bureau of Statistics, 2009). This thesis describes the perceptions of information security management in two Australian NPOs and examines the appropriateness of the ISO 27002 information security management standard in an NPO context. The overall approach to the research is interpretive. A collective case study has been performed, consisting of two instrumental case studies with the researcher being embedded within two NPOs for extended periods of time. Data gathering and analysis was informed by grounded theory and action research, and the Technology Acceptance Model was utilised as a lens to explore the findings and provide limited generalisability to other contexts. The major findings include a distinct lack of information security management best practice in both organisations. ISM Governance and risk management was lacking and ISM policy was either outdated or non- existent. While some user focused ISM practices were evident, reference to standards, such as ISO 27002, were absent. The main factor that negatively impacted on ISM practices was the lack of resources available for ISM in the NPOs studied. Two novel aspects of information security dis- covered in this research were the importance of accuracy and consistency of information. The contribution of this research is a preliminary understanding of ISM practices and perceptions in NPOs. Recommendations for a new approach to managing information security management in nonprofit organisations have been proposed.
Resumo:
In this chapter we describe a history of collaboration between university-based literacy researchers and school-based teachers in teacher development programs and practitioner inquiries designed to improve literacy outcomes for students living in low-socioeconomic circumstances. We consider how an inquiry stance has informed teachers working for social justice through curriculum and pedagogy designed to connect children’s developing literacy repertoires with their changing material, social and linguistic contexts. We use examples from the practices of two of our long-term teacher-collaborators to show what has been possible to achieve, even in radically different policy contexts, because of teachers’ continued commitment to themes of place and belonging, and language and identity.