963 resultados para Guest-host systems
Resumo:
The investigation of pathogen persistence in vector-borne diseases is important in different ecological and epidemiological contexts. In this thesis, I have developed deterministic and stochastic models to help investigating the pathogen persistence in host-vector systems by using efficient modelling paradigms. A general introduction with aims and objectives of the studies conducted in the thesis are provided in Chapter 1. The mathematical treatment of models used in the thesis is provided in Chapter 2 where the models are found locally asymptotically stable. The models used in the rest of the thesis are based on either the same or similar mathematical structure studied in this chapter. After that, there are three different experiments that are conducted in this thesis to study the pathogen persistence. In Chapter 3, I characterize pathogen persistence in terms of the Critical Community Size (CCS) and find its relationship with the model parameters. In this study, the stochastic versions of two epidemiologically different host-vector models are used for estimating CCS. I note that the model parameters and their algebraic combination, in addition to the seroprevalence level of the host population, can be used to quantify CCS. The study undertaken in Chapter 4 is used to estimate pathogen persistence using both deterministic and stochastic versions of a model with seasonal birth rate of the vectors. Through stochastic simulations we investigate the pattern of epidemics after the introduction of an infectious individual at different times of the year. The results show that the disease dynamics are altered by the seasonal variation. The higher levels of pre-existing seroprevalence reduces the probability of invasion of dengue. In Chapter 5, I considered two alternate ways to represent the dynamics of a host-vector model. Both of the approximate models are investigated for the parameter regions where the approximation fails to hold. Moreover, three metrics are used to compare them with the Full model. In addition to the computational benefits, these approximations are used to investigate to what degree the inclusion of the vector population in the dynamics of the system is important. Finally, in Chapter 6, I present the summary of studies undertaken and possible extensions for the future work.
Resumo:
283 p.
Resumo:
The interaction of 4-nerolidylcatechol (4-NRC), a potent antioxidant agent, and 2-hydroxypropyl-beta-cyclodextrin (HP-beta-CD) was investigated by the solubility method using Fourier transform infrared (FTIR) methods in addition to UV-Vis, (1)H-nuclear magnetic resonance (NMR) spectroscopy and molecular modeling. The inclusion complexes were prepared using grinding, kneading and freeze-drying methods. According to phase solubility studies in water a B(S)-type diagram was found, displaying a stoichiometry complexation of 2:1 (drug:host) and stability constant of 6494 +/- A 837 M(-1). Stoichiometry was established by the UV spectrophotometer using Job's plot method and, also confirmed by molecular modeling. Data from (1)H-NMR, and FTIR, experiments also provided formation evidence of an inclusion complex between 4-NRC and HP-beta-CD. 4-NRC complexation indeed led to higher drug solubility and stability which could probably be useful to improve its biological properties and make it available to oral administration and topical formulations.
Resumo:
Stimulated by the efficacy of copper (I) catalysed Huisgen-type 1,3-dipolar cycloaddition of terminal alkynes and organic azides to generate 1,4-disubstituted 1,2,3-triazole derivatives, the importance of ‘click’ chemistry in the synthesis of organic and biological molecular systems is ever increasing.[1] The mild reaction conditions have also led to this reaction gaining favour in the construction of interlocked molecular architectures.[2-4] In the majority of cases however, the triazole group simply serves as a covalent linkage with no function in the resulting organic molecular framework. More recently a renewed interest has been shown in the transition metal coordination chemistry of triazole ligands.[3, 5, 6] In addition novel aryl macrocyclic and acyclic triazole based oligomers have been shown to recognise halide anions via cooperative triazole C5-H….anion hydrogen bonds.[7] In light of this it is surprising the potential anion binding affinity of the positively charged triazolium motif has not, with one notable exception,[8] been investigated. With the objective of manipulating the unique topological cavities of mechanically bonded molecules for anion recognition purposes, we have developed general methods of using anions to template the formation of interpenetrated and interlocked structures.[9-13] Herein we report the first examples of exploiting the 1,2,3-triazolium group in the anion templated formation of pseudorotaxane and rotaxane assemblies. In an unprecedented discovery the bromide anion is shown to be a superior templating reagent to chloride in the synthesis of a novel triazolium axle containing [2]rotaxane. Furthermore the resulting rotaxane interlocked host system exhibits the rare selectivity preference for bromide over chloride...
Resumo:
This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level.
Resumo:
A new era of cyber warfare has appeared on the horizon with the discovery and detection of Stuxnet. Allegedly planned, designed, and created by the United States and Israel, Stuxnet is considered the first known cyber weapon to attack an adversary state. Stuxnet's discovery put a lot of attention on the outdated and obsolete security of critical infrastructure. It became very apparent that electronic devices that are used to control and operate critical infrastructure like programmable logic controllers (PLCs) or supervisory control and data acquisition (SCADA) systems lack very basic security and protection measures. Part of that is due to the fact that when these devices were designed, the idea of exposing them to the Internet was not in mind. However, now with this exposure, these devices and systems are considered easy prey to adversaries.
Resumo:
This study has provided further understanding of the pathogenesis of EV71, one of the major etiological agents associated with significant mortality in Hand, Foot and Mouth disease. Elucidating the host-pathogen interaction and the mechanism that the virus uses to bypass host defence systems to establish infection will aid in the development of potential antiviral therapeutics against EV71.
Resumo:
The Jericho kimberlite (173.1. ±. 1.3. Ma) is a small (~. 130. ×. 70. m), multi-vent system that preserves products from deep (>. 1. km?) portions of kimberlite vents. Pit mapping, drill core examination, petrographic study, image analysis of olivine crystals (grain size distributions and shape studies), and compositional and mineralogical studies, are used to reconstruct processes from near-surface magma ascent to kimberlite emplacement and alteration. The Jericho kimberlite formed by multiple eruptions through an Archean granodiorite batholith that was overlain by mid-Devonian limestones ~. 1. km in thickness. Kimberlite magma ascended through granodiorite basement by dyke propagation but ascended through limestone, at least in part, by locally brecciating the host rocks. After the first explosive breakthrough to surface, vent deepening and widening occurred by the erosive forces of the waxing phase of the eruption, by gravitationally induced failures as portions of the vent margins slid into the vent and, in the deeper portions of the vent (>. 1. km), by scaling, as thin slabs burst from the walls into the vent. At currently exposed levels, coherent kimberlite (CK) dykes (<. 40. cm thick) are found to the north and south of the vent complex and represent the earliest preserved in-situ products of Jericho magmatism. Timing of CK emplacement on the eastern side of the vent complex is unclear; some thick CK (15-20. m) may have been emplaced after the central vent was formed. Explosive eruptive products are preserved in four partially overlapping vents that are roughly aligned along strike with the coherent kimberlite dyke. The volcaniclastic kimberlite (VK) facies are massive and poorly sorted, with matrix- to clast-supported textures. The VK facies fragmented by dry, volatile-driven processes and were emplaced by eruption column collapse back into the volcanic vents. The first explosive products, poorly preserved because of partial destruction by later eruptions, are found in the central-east vent and were formed by eruption column collapse after the vent was largely cleared of country rock debris. The next active vent was either the north or south vent. Collapse of the eruption column, linked to a vent widening episode, resulted in coeval avalanching of pipe margin walls into the north vent, forming interstratified lenses of country rock-rich boulder breccias in finer-grained volcaniclastic kimberlite. South vent kimberlite has similar characteristics to kimberlite of the north vent and likely formed by similar processes. The final eruptive phase formed olivine-rich and moderately sorted deposits of the central vent. Better sorting is attributed to recycling of kimberlite debris by multiple eruptions through the unconsolidated volcaniclastic pile and associated collapse events. Post-emplacement alteration varies in intensity, but in all cases, has overprinted the primary groundmass and matrix, in CK and VK, respectively. Erosion has since removed all limestone cover.
Resumo:
Cities are the most dramatic manifestations of human activities on the surface of the earth. These human-dominated organisms—i.e., cities—degrade natural habitats, simplify species composition, disrupt hydrological systems, and modify energy flow and nutrient cycling. Today, these consequential impacts of human activities, originated from population increase, rapid urbanization, high private motor vehicle dependency, deregulated industrialization and mass livestock production, are increasing exponentially and causing great deal of environmental, social, and economic challenges both at global and local scales. In such a situation, establishment of sustainable cities, through sustainable urban development practices, is seen as a potential panacea to combat these challenges responsibly, effectively, and efficiently. This paper offers a critical review of the key literature on the issues relating to planning, development and management of sustainable cities, introduces the contributions from the Special Issue, and speculates on the prospective research directions to place necessary mechanisms to secure a sustainable urban future for all.
Resumo:
Many software applications extend their functionality by dynamically loading libraries into their allocated address space. However, shared libraries are also often of unknown provenance and quality and may contain accidental bugs or, in some cases, deliberately malicious code. Most sandboxing techniques which address these issues require recompilation of the libraries using custom tool chains, require significant modifications to the libraries, do not retain the benefits of single address-space programming, do not completely isolate guest code, or incur substantial performance overheads. In this paper we present LibVM, a sandboxing architecture for isolating libraries within a host application without requiring any modifications to the shared libraries themselves, while still retaining the benefits of a single address space and also introducing a system call inter-positioning layer that allows complete arbitration over a shared library’s functionality. We show how to utilize contemporary hardware virtualization support towards this end with reasonable performance overheads and, in the absence of such hardware support, our model can also be implemented using a software-based mechanism. We ensure that our implementation conforms as closely as possible to existing shared library manipulation functions, minimizing the amount of effort needed to apply such isolation to existing programs. Our experimental results show that it is easy to gain immediate benefits in scenarios where the goal is to guard the host application against unintentional programming errors when using shared libraries, as well as in more complex scenarios, where a shared library is suspected of being actively hostile. In both cases, no changes are required to the shared libraries themselves.
Resumo:
Dispersions of Al2O3 as well as CeO2 in CaF2 are found to enhance the conductivity of CaF2. Both these systems are biphasic and the electrical conduction in them is purely ionic in nature. At 650 K the increase in the ionic conductivity of the dispersed solid electrolyte system CaF2---Al2O3 is by about two orders of magnitude in relation to the conductivity of the host electrolyte CaF2, whereas for the CaF2---CeO2 system it is about three orders of magnitude. Some aspects of the increase in the ionic conductivities of CaF2---Al2O3 and CaF2---CeO2 electrolytes can be explained by a recent theoretical model. It is proposed that a substantial enhancement in the vacancy concentration of CaF2, brought about by the attraction of F− ions to the surface of Al2O3 (or CeO2), is responsible for the low temperature increase in the ionic conductivity of CaF2.
Resumo:
An integrated pest management (IPM) approach that relies on an array of tactics is adopted commonly in response to problems with pesticide-based production in many agricultural systems. Host plant resistance is often used as a fundamental component of an IPM system because of the generally compatible, complementary role that pest-resistant crops play with other tactics. Recent research and development in the resistance of legumes and cereals to aphids, sorghum midge resistance, and the resistance of canola varieties to mite and insect pests have shown the prospects of host plant resistance for developing IPM strategies against invertebrate pests in Australian grain crops. Furthermore, continuing advances in biotechnology provide the opportunity of using transgenic plants to enhance host plant resistance in grains.
Resumo:
While the method using specialist herbivores in managing invasive plants (classical biological control) is regarded as relatively safe and cost-effective in comparison to other methods of management, the rarity of strict monophagy among insect herbivores illustrates that, like any management option, biological control is not risk-free. The challenge for classical biological control is therefore to predict risks and benefits a priori. In this study we develop a simulation model that may aid in this process. We use this model to predict the risks and benefits of introducing the chrysomelid beetle Charidotis auroguttata to manage the invasive liana Macfadyena unguis-cati in Australia. Preliminary host-specificity testing of this herbivore indicated that there was limited feeding on a non-target plant, although the non-target was only able to sustain some transitions of the life cycle of the herbivore. The model includes herbivore, target and non-target life history and incorporates spillover dynamics of populations of this herbivore from the target to the non-target under a variety of scenarios. Data from studies of this herbivore in the native range and under quarantine were used to parameterize the model and predict the relative risks and benefits of this herbivore when the target and non-target plants co-occur. Key model outputs include population dynamics on target (apparent benefit) and non-target (apparent risk) and fitness consequences to the target (actual benefit) and non-target plant (actual risk) of herbivore damage. The model predicted that risk to the non-target became unacceptable (i.e. significant negative effects on fitness) when the ratio of target to non-target in a given patch ranged from 1:1 to 3:2. By comparing the current known distribution of the non-target and the predicted distribution of the target we were able to identify regions in Australia where the agent may be pose an unacceptable risk. By considering risk and benefit simultaneously, we highlight how such a simulation modelling approach can assist scientists and regulators in making more objective decisions a priori, on the value of releasing specialist herbivores as biological control agents.
Resumo:
Cucurbit crops host a range of serious sap-sucking insect pests, including silverleaf whitefly (SLW) and aphids, which potentially represent considerable risk to the Australian horticulture industry. These pests are extremely polyphagous with a wide host range. Chemical control is made difficult due to resistance and pollution, and other side-effects are associated with insecticide use. Consequently, there is much interest in maximising the role of biological control in the management of these sap-sucking insect pests. This study aimed to evaluate companion cropping alongside cucurbit crops in a tropical setting as a means to increase the populations of beneficial insects and spiders so as to control the major sap-sucking insect pests. The Population of beneficial and harmful insects, with a focus on SLW and aphids, and other invertebrates were sampled weekly oil four different crops which could be used for habitat manipulation: Goodbug Mix (GBM; a proprietary seed Mixture including self-sowing annual and perennial herbaceous flower species); lablab (Lablab purpureus L. Sweet); lucerne (Medicago sativa L.); and niger (Guizotia abyssinica (L.f.) Cass.). Lablab hosted the highest numbers of beneficial insects (larvae and adults of lacewing (Mallada signata (Schneider)), ladybird beetles (Coccinella transversalis Fabricius) and spiders) while GBM hosted the highest numbers of European bees (Apis mellifera Linnaeus) and spiders. Lucerne and niger showed little promise in hosting beneficial insects, but lucerne hosted significantly more spiders (double the numbers) than niger. Lucerne hosted significantly more of the harmful insect species of aphids (Aphis gossypii (Glover)) and Myzus persicae (Sulzer)) and heliothis (Heliothis armigera Hubner). Niger hosted significantly more vegetable weevils (Listroderes difficillis (Germar)) than the other three species. Therefore, lablab and GBM appear to be viable options to grow within cucurbits or as field boundary crops to attract and increase beneficial insects and spiders for the control of sap-sucking insect pests. Use of these bio-control strategies affords the opportunity to minimise pesticide usage and the risks associated with pollution.
Resumo:
Photosynthesis is a chemical process in which the energy of the light quanta is transformed into chemical energy. Chlorophyll (Chl) molecules play a key role in photosynthesis; they function in the antennae systems and in the photosynthetic reaction center where the primary charge separation (CS) takes place. Bio-inspired mimicry of the CS is an essential unit in dye-sensitized solar cells. Aim of this study was to design and develop electron donor-acceptor (EDA) pairs from Chls and fullerenes (C60) or carbon nanotubes (CNT). The supramolecular approach was chosen, as long synthetic sequences required by the covalent approach lead to long reaction schemes and low yields. Here, a π-interaction between soluble CNTs and Chl was used in EDA construction. Also, a beta-face selective two-point bound Chl-C60 EDA was introduced. In addition, the photophysical properties of the supramolecular EDA dyads were analyzed. In organic chemistry, nuclear magnetic resonance (NMR) spectroscopy is the most vital analytical technique in use. Multi-dimensional NMR experiments have enabled a structural analysis of complex natural products and proteins. However, in mixture analysis NMR is still facing difficulties. In many cases overlapping signals can t be resolved even with the help of multi-dimensional experiments. In this work, an NMR tool based on simple host-guest chemistry between analytes and macromolecules was developed. Diffusion ordered NMR spectroscopy (DOSY) measures the mobilities of compounds in an NMR sample. In a liquid state NMR sample, each of the analytes has a characteristic diffusion coefficient, which is proportional to the size of the analyte. With normal DOSY experiment, provided that the diffusion coefficients of the analytes differ enough, individual spectra of analytes can be extracted. When similar sized analytes differ chemically, an additive can be introduced into the sample. Since macromolecules in a liquid state NMR sample can be considered practically stationary, even faint supramolecular interaction can change the diffusion coefficient of the analyte sufficiently for a successful resolution in DOSY. In this thesis, polyvinylpyrrolidone and polyethyleneglycol enhanced DOSY NMR techniques, which enable mixture analysis of similar in size but chemically differing natural products, are introduced.