874 resultados para resistance against malicious auditors
Resumo:
Cut Geraldton waxflower (Chamelaucium uncinatum Schauer) flowers are often infected with Botrytis cinerea. Release of infection from quiescence can cause ethylene production by invaded host tissues and result in flower abscission. Postharvest floral organ abscission is a major problem for the commercial waxflower industry. Methyl jasmonate (MeJA) occurs naturally in plant tissue and has a signalling role in eliciting induced systemic resistance against disease. MeJA treatments have been shown to suppress B. cinerea infecting cut rose flowers. The present experiments investigated the potential of exogenous MeJA treatments for B. cinerea management on harvested waxflower. MeJA treatments of 10 and 100 L liquid MeJA/L of air applied to cv. Purple Pride and 1 L MeJA/L to cv. Mullering Brook gave reductions in disease severity for uninoculated stems. However, concentrations of 100 L MeJA/L applied to Purple Pride in addition to 1 and 10 L MeJA/L applied to Mullering Brook increased the incidence of floral organ fall. Flower abscission upon treatment with MeJA may be due to induced systemic resistance-associated upregulation of ethylene biosynthesis. MeJA treatments had no direct effect on B. cinerea hyphal elongation in vitro. Collectively, these results show that while MeJA treatment may elicit defence in waxflower against Botrytis, the chemical also causes floral organ fall. Thus, exogenous MeJA treatments do not have potential for B. cinerea management on harvested waxflower.
Resumo:
Purpose – In the UK, while fashion apparel purchasing is available to the majority of consumers, the main supermarkets seem – rather against the odds and market conventions – to have created a new, socially-acceptable and legitimate, apparel market offer for young children. This study aims to explore parental purchasing decisions on apparel for young children (below ten years old) focusing on supermarket diversification into apparel and consumer resistance against other traditional brands. Design/methodology/approach – Data collection adopted a qualitative research mode: using semi-structured interviews in two locations (Cornwall Please correct and check againand Glasgow), each with a Tesco and ASDA located outside towns. A total of 59 parents participated in the study. Interviews took place in the stores, with parents seen buying children fashion apparel. Findings – The findings suggest that decisions are based not only on functionality (e.g. convenience, value for money, refund policy), but also on intuitive factors (e.g. style, image, quality) as well as broader processes of consumption from parental boundary setting (e.g. curbing premature adultness). Positive consumer resistance is leading to a re-drawing of the cultural boundaries of fashion. In some cases, concerns are expressed regarding items that seem too adult-like or otherwise not as children's apparel should be. Practical implications – The paper highlights the increasing importance of browsing as a modern choice practice (e.g. planned impulse buying, sanctuary of social activity). Particular attention is given to explaining why consumers positively resist buying from traditional label providers and voluntarily choose supermarket clothing ranges without any concerns over their children wearing such garments. Originality/value – The paper shows that supermarket shopping for children's apparel is now firmly part of UK consumption habits and choice. The findings provide theoretical insights into the significance of challenging market conventions, parental cultural boundary setting and positive resistance behaviour.
Resumo:
During their life cycle, plants are typically confronted by simultaneous biotic and abiotic stresses. Low inorganic phosphate (Pi) is one of the most common nutrient deficiencies limiting plant growth in natural and agricultural ecosystems, while insect herbivory accounts for major losses in plant productivity and impacts ecological and evolutionary changes in plant populations. Here, we report that plants experiencing Pi deficiency induce the jasmonic acid (JA) pathway and enhance their defense against insect herbivory. Pi-deficient Arabidopsis (Arabidopsis thaliana) showed enhanced synthesis of JA and the bioactive conjugate JA-isoleucine, as well as activation of the JA signaling pathway, in both shoots and roots of wild-type plants and in shoots of the Pi-deficient mutant pho1 The kinetics of the induction of the JA signaling pathway by Pi deficiency was influenced by PHOSPHATE STARVATION RESPONSE1, the main transcription factor regulating the expression of Pi starvation-induced genes. Phenotypes of the pho1 mutant typically associated with Pi deficiency, such as high shoot anthocyanin levels and poor shoot growth, were significantly attenuated by blocking the JA biosynthesis or signaling pathway. Wounded pho1 leaves hyperaccumulated JA/JA-isoleucine in comparison with the wild type. The pho1 mutant also showed an increased resistance against the generalist herbivore Spodoptera littoralis that was attenuated in JA biosynthesis and signaling mutants. Pi deficiency also triggered increased resistance to S. littoralis in wild-type Arabidopsis as well as tomato (Solanum lycopersicum) and Nicotiana benthamiana, revealing that the link between Pi deficiency and enhanced herbivory resistance is conserved in a diversity of plants, including crops.
Resumo:
International audience
Resumo:
Asian soybean rust (ASR), caused by the fungus Phakopsora pachyrhizi, is one of the most economically important crop diseases, but is only treatable with fungicides, which are becoming less effective owing to the emergence of fungicide resistance. There are no commercial soybean cultivars with durable resistance to P. pachyrhizi, and although soybean resistance loci have been mapped, no resistance genes have been cloned. We report the cloning of a P. pachyrhizi resistance gene CcRpp1 (Cajanus cajan Resistance against Phakopsora pachyrhizi 1) from pigeonpea (Cajanus cajan) and show that CcRpp1 confers full resistance to P. pachyrhizi in soybean. Our findings show that legume species related to soybean such as pigeonpea, cowpea, common bean and others could provide a valuable and diverse pool of resistance traits for crop improvement.
Resumo:
Paraffin has been used as surface protection of wood throughout the ages but its use for impregnation to improve wood resistance to biodegradation is recent. This study determined the main improvements on wood properties with paraffin impregnation. Healthy Pinus pinaster Ait. wood was impregnated with paraffin at different levels using a hot–cold process. Weight gain, equilibrium moisture content and dimensional stability (ASE) at 35 and 65 % relative humidity, termite durability against Reticulitermes grassei (Clément), bending strength, bending stiffness (MOE) and Janka hardness were determined. Density increased from 0.57 to 0.99, ASE ranged between 38–96 % and 16–71 % for 35 and 65 % relative humidity, respectively. Equilibrium moisture content decreased from 9.9 and 12.0 % to 0.8 and 3.6 % for 35 and 65 % relative humidity. Termite durability improved from level 4 to level 3 of attack, and higher termite mortality was found in treated wood (52 % against 17 %). Bending strength (MOR) increased with paraffin weight gain, reaching a 39 % increase. MOE also increased by about 13 % for wood with a weight gain around 80 %. Janka hardness increased significantly reaching about 40 % for wood with 80 % weight gain. Paraffin impregnated wood has improved properties with regard to equilibrium moisture content, dimensional stability and density, bending strength and Janka hardness, and resistance against termites.
Resumo:
We present the first detailed application of Meadows’s cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an attacker is willing to reveal the source IP address. The first attack was identified through direct application of a cost-based modelling framework, while the second was only identified after considering coordinated attackers. Finally, we demonstrate how the inclusion of client puzzles in the protocol can improve denial of service resistance against both identified attacks.
Resumo:
Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.
Resumo:
Adult education plays an important role in global economic development and features prominently in debates about changing requirements of post-industrial knowledge societies. This dominant technical-instrumental understanding of adult education in public discourse masks the transformative function of certain types of adult education - that is, the possibilities of adult education to improve social justice issues such as workers’ rights, human rights, civic participation in governance and socially just development. Given the increasing social stratification between and within the North and South in the global era, the potential of adult education to effect social change has been rediscovered by organisations within global civil society, namely international non-governmental organisations (INGOs). The broad objective of this research was to carry out an in-depth qualitative case study of a human rights advocacy program provided by a Northern INGO predominantly operating within the global South. The study analyses how participants see this program in terms of its potential to contribute to progressive social change in their home communities across the Asia-Pacific region. The following questions guided the study: 1. To what extent does this adult education program challenge existing systems of domination and marginalisation? 2. How did completion of the program affect participants’ views of their abilities to facilitate social action within their communities? Data sources for this research were interviews with 19 participants and staff and questionnaires from 28 participants of the program from a variety of countries in the Asia-pacific region. The gap in the literature that this study addressed is that existing empirical research sidelines the analysis of the globalisation, adult education, and social change nexus from a perspective that takes the marginalised other seriously, tending instead to mirror the material subjugation of the South in discursive practices. Social change is highly context-specific and strategies to advance it depend on the way in which people understand their reality and are affected by adverse social conditions. The present study employed a postcolonial framework that provided a holistic approach to analysing adult education for social change inclusive of material, political, and social conditions and the interplay between these from the local to the global level. The program convincingly exemplified an example of adult education for counter-hegemonic resistance against the dominant neoliberal discourse. It achieved this by enabling participants, based on Freirian pedagogical principles, to locate the problem of social change and frame their strategies to address it within mutually constitutive local and global developments and the discourses that describe them. It provided the underpinning knowledge and skills for effective advocacy and created opportunities to build networks between various stakeholders. At minimum, most advocates accord their participation in the program a supporting role in enhancing their ability to examine causes for social injustices and ways to address these. Some advocates even regarded their program participation as fundamental in understanding these issues. Almost all participants reported an increased skill-set that enabled them to become more effective advocates.
Resumo:
INTRODUCTION: Currently available volar locking plates for the treatment of distal radius fractures incorporate at least two distal screw rows for fixation of the metaphyseal fragment and have a variable-angle locking mechanism which allows placement of the screws in various directions There is, however no evidence that these plates translate into better outcomes or have superior biomechanical properties to first generation plates, which had a single distal screw row and fixed-angle locking. The aim of our biomechanical study was to compare fixed-angle single-row plates with variable-angle multi-row plates to clarify the optimal number of locking screws. MATERIALS AND METHODS: Five different plate-screw combinations of three different manufacturers were tested, each group consisting of five synthetic fourth generation distal radius bones. An AO type C2 fracture was created and the fractures were plated according to each manufacturer's recommendations. The specimens then underwent cyclic and load-to-failure testing. An optical motion analysis system was used to detect displacement of fragments. RESULTS: No significant differences were detected after cyclic loading as well as after load-to-failure testing, neither in regard to axial deformation, implant rigidity or maximum displacement. The fixed-angle single-row plate showed the highest pre-test rigidity, least increase in post-testing rigidity and highest load-to-failure rigidity and least radial shortening. The radial shortening of plates with two distal screw rows was 3.1 and 4.3 times higher, respectively, than that of the fixed-angle single-row plate. CONCLUSION: The results of our study indicate that two distal screw rows do not add to construct rigidity and resistance against loss of reduction. Well conducted clinical studies based on the findings of biomechanical studies are necessary to determine the optimal number of screws necessary to achieve reproducibly good results in the treatment of distal radius fractures.
Resumo:
Banana is one of the world’s most popular fruit crops and Sukali Ndizi is the most popular dessert banana in the East African region. Like other banana cultivars, Sukali Ndizi is threatened by several constraints, of which the Fusarium wilt disease is the most destructive. Fusarium wilt is caused by a soil-borne fungus, Fusarium oxysporum f.sp. cubense (Foc). No effective control strategy currently exists for this disease and although disease resistance exists in some banana cultivars, introducing resistance into commercial cultivars by conventional breeding is difficult because of low fertility. Considering that conventional breeding generates hybrids with additional undesirable traits, transformation is the most suitable way of introducing resistance in the banana genome. The success of this strategy depends on the availability of genes for genetic transformation. Recently, a novel strategy involving the expression of anti-apoptosis genes in plants was shown to result in resistance against several necrotrophic fungi, including Foc race 1 in banana cultivar Lady Finger. This thesis explores the potential of a plant-codon optimised nematode anti-apoptosis gene (Mced9) to provide resistance against Foc race 1 in dessert banana cultivar Sukali Ndizi. Agrobacterium-mediated transformation was used to transform embryogenic cell suspension of Sukali Ndizi with plant expression vector pYC11, harbouring maize ubiquitin promoter driven Mced9 gene and nptII as a plant selection marker. A total of 42 independently transformed lines were regenerated and characterized. The transgenic lines were multiplied, infected and evaluated for resistance to Foc race 1 in a small pot bioassay. The pathogenicity of the Ugandan Foc race 1 isolate used for infection was pre-determined and the spore concentration was standardised for consistent infection and symptom development. This process involved challenging tissue culture plants of Sukali Ndizi, a Foc race 1 susceptible cultivar and Nakinyika, an East African Highland cultivar known to be resistant to Foc race 1, with Fusarium inoculum and observing external and internal disease symptom development. Rhizome discolouration symptoms were the best indicators of Fusarium wilt with yellowing being an early sign of disease. Three transgenic lines were found to show significantly less disease severities compared to the wild-type control plants after 13 weeks of infection, indicating that Mced9 has the potential to provide tolerance to Fusarium wilt in Sukali Ndizi.
Resumo:
There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.
Resumo:
There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.
Resumo:
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.
Resumo:
Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (requiring original relation to detect the watermark in watermarked relation). This model has several disadvantages over reversible and blind watermarking (requiring only watermarked relation and secret key from which the watermark is detected and original relation is restored) including inability to identify rightful owner in case of successful secondary watermarking, inability to revert the relation to original data set (required in high precision industries) and requirement to store unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store original database at a secure secondary storage.