Structures of Seed Plants

Total Page:16

File Type:pdf, Size:1020Kb

Structures of Seed Plants Structures of Seed Plants Quick Review What are the two kinds of vascular tissue and what are their jobs? What are the four groups of plants and the example for each? Why do seeds provide a survival advantage? (2 things) Why are flowers & fruits advantageous? What is the structure on all plants that helps them avoid drying out? What lives in the pollen grain? Explain the life cycle of all plants. Plant Systems ** Just like we have body systems to different jobs (circulatory, respiratory, etc.), so do plants 1. Root System - made up of only roots 2. Shoot System - stems and leaves ** The vascular tissues of the two systems are connected so the water/food go through the whole plant Roots - Functions Mostly underground Supply plants with water and dissolved minerals from the soil (move up xylem) Hold plants securely in the soil Store extra food (sugar) made during photosynthesis (moved down the phloem) Roots - Structure Outer layer of cells - Epidermis Center of root holds vascular tissue Water diffuses from epidermis to xylem Tip of root - Root Cap Root cap produces slime to help root push through the soil as it grows longer Roots - 2 Types Taproot (found mostly in dicots) – one main root growing downward with tiny small roots that branch out – get water deep underground (carrot) Fibrous (found mostly in monocots) – several roots spread out from the base of the stem – they’re all about the same size – get water close to the surface (grass) Stems - Function Usually located above ground Connects the roots to leaves and flowers Supports the plants body Leaves get better sunlight Flowers are off the ground to be closer to animals for seed dispersal/pollination Some stems store materials (cactus) Stems - 2 Types Herbaceous Stems – soft, thin and flexible – Ex: beans, wildflowers, clovers Woody Stems – rigid stems made of wood and bark – Ex: trees and shrubs Leaves - Function Make food for the plant (sugar) Absorb Carbon Dioxide (CO2) *Photosynthesis Equation* Water + CO2 + light energy --> sugar +O2 Leaves - Structure Outer surface - covered in a cuticle to prevent water loss Epidermis - single layer of cells beneath the cuticle (light can pass through) Stomata: openings in the epidermis that let CO2 into the leaf Guard Cells: open and close the stomata Palisade Layer - one of the middle layers that has many chloroplasts (for photosynthesis!) Spongy Layer - where xylem & phloem are found Leaf Diagram Gas Exchange in Leaves CO2 enters the plant’s leaves through the stomata Stomata: holes in the leaf’s epidermis; surrounded by guard cells which open and close the stomata Water can also escape through these stomata (BAD!). This loss of water from leaves is called Transpiration. Flowers - Function Adaptations for sexual reproduction Colorful flowers attract animals for pollination Flowers produce nectar, which animals drink and thus pollinate the plant Flowers - Basic Parts 4 Basic Parts: Sepal - modified leaves that make up the outermost ring of flower to protect the bud Petal - broad, flat, thin leaf-like parts of a flower; attract animals to pollinate Stamen - male reproductive structure; made up of a filament and an anther Pistil - female reproductive structure on a flower; made up of the stigma, style and ovary Flower Diagram Pollination & Fertilization Pollination: the transfer of pollen from the male to female structure on a plant Fertilization: when a sperm fuses with an egg inside an ovule Pollination & Fertilization Flower to Fruit to Seed From Seed to Plant Seeds can be dormant (inactive) for long periods of time if the environment is not suitable. Once they are planted in a good environment (water, air, warmth), the seeds germinate (sprout).
Recommended publications
  • Advanced Encryption Standard Real-World Alternatives
    Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives CPSC 367: Cryptography and Security Michael Fischer Lecture 7 February 5, 2019 Thanks to Ewa Syta for the slides on AES CPSC 367, Lecture 7 1/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Multiple Encryption Composition Group property Birthday Attack Advanced Encryption Standard AES Real-World Issues Alternative Private Key Block Ciphers CPSC 367, Lecture 7 2/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Multiple Encryption CPSC 367, Lecture 7 3/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Composition Composition of cryptosystems Encrypting a message multiple times with the same or different ciphers and keys seems to make the cipher stronger, but that's not always the case. The security of the composition can be difficult to analyze. For example, with the one-time pad, the encryption and decryption functions Ek and Dk are the same. The composition Ek ◦ Ek is the identity function! CPSC 367, Lecture 7 4/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Composition Composition within practical cryptosystems Practical symmetric cryptosystems such as DES and AES are built as a composition of simpler systems. Each component offers little security by itself, but when composed, the layers obscure the message to the point that it is difficult for an adversary to recover. The trick is to find ciphers that successfully hide useful information from a would-be attacker when used in concert. CPSC 367, Lecture 7 5/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Composition Double Encryption Double encryption is when a cryptosystem is composed with itself.
    [Show full text]
  • Implementations of Block Cipher SEED on Smartphone Operating Systems
    SECURWARE 2011 : The Fifth International Conference on Emerging Security Information, Systems and Technologies Implementations of Block Cipher SEED on Smartphone Operating Systems HwanJin Lee, DongHoon Shin, and Hyun-Chul Jung Security R&D Team Korea Internet & Security Agency (KISA) Seoul, Korea {lhj79, dhshin, hcjung}@kisa.or.kr Abstract—As more and more people are using smartphones limited power and offers inferior performance compared to a these days, a great deal of important information, such as PC. Therefore, it is difficult to use an open cryptographic personal information and the important documents of library such as OpenSSL, which is designed for the PC corporations among other things, are being saved on environment, in a smartphone. We need to study on the way smartphones. Unlike a PC, people can access another person’s for the effective use of SEED in smartphone. smartphone without great difficulty, and there is a high This paper presents the results of implementing the block possibility of losing one’s smartphone. If smartphone is lost cipher SEED to a smartphone. The results of a comparison without encryption, important information can be exploited. In with open cryptographic libraries (OpenSSL, BouncyCastle) addition, the open cryptographic library for PCs cannot be will also be presented. The SEED is a block cipher used due to the limited performance of the smartphone. This established as an international standard ISO/IEC and the paper introduces the optimization implementation technique for the smartphone OS and the results of using that technique. Korean standard. Section 2 introduces the SEED and open In addition, the results of a speed comparison with the open cryptographic libraries; Section 3 introduces smartphone cryptographic library will be presented.
    [Show full text]
  • Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly ∗
    Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly ∗ Brian Rogers, Siddhartha Chhabra, Yan Solihin Milos Prvulovic Dept. of Electrical and Computer Engineering College of Computing North Carolina State University Georgia Institute of Technology {bmrogers, schhabr, solihin}@ncsu.edu [email protected] Abstract and feasible threat is physical or hardware attacks which involve placing a bus analyzer that snoops data communicated between the In today’s digital world, computer security issues have become processor chip and other chips [7, 8]. Although physical attacks increasingly important. In particular, researchers have proposed may be more difficult to perform than software-based attacks, they designs for secure processors which utilize hardware-based mem- are very powerful as they can bypass any software security protec- ory encryption and integrity verification to protect the privacy and tion employed in the system. The proliferation of mod-chips that integrity of computation even from sophisticated physical attacks. bypass Digital Rights Management protection in game systems has However, currently proposed schemes remain hampered by prob- demonstrated that given sufficient financial payoffs, physical attacks lems that make them impractical for use in today’s computer sys- are very realistic threats. tems: lack of virtual memory and Inter-Process Communication Recognizing these threats, computer architecture researchers support as well as excessive storage and performance overheads. have recently proposed various types of secure processor architec- In this paper, we propose 1) Address Independent Seed Encryption tures [4, 5, 13, 14, 16, 17, 18, 19, 20, 22, 23, 24, 25, 26]. Secure pro- (AISE), a counter-mode based memory encryption scheme using a cessors assume that off-chip communication is vulnerable to attack novel seed composition, and 2) Bonsai Merkle Trees (BMT), a novel and that the chip boundary provides a natural security boundary.
    [Show full text]
  • FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 7 NSS
    FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 7 NSS Cryptographic Module FIPS 140-2 Level 1 Validation Software Version: R7-4.0.0 Date: January 22nd, 2020 Document Version 2.3 © Oracle Corporation This document may be reproduced whole and intact including the Copyright notice. Title: Oracle Linux 7 NSS Cryptographic Module Security Policy Date: January 22nd, 2020 Author: Oracle Security Evaluations – Global Product Security Contributing Authors: Oracle Linux Engineering Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Worldwide Inquiries: Phone: +1.650.506.7000 Fax: +1.650.506.7200 oracle.com Copyright © 2020, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. Oracle specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may reproduced or distributed whole and intact including this copyright notice. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Oracle Linux 7 NSS Cryptographic Module Security Policy i TABLE OF CONTENTS Section Title
    [Show full text]
  • Preliminary Analysis: SEED’S First Year
    SEED Findings Summary stocktondemonstration.org Preliminary Analysis: SEED’s First Year AUTHORS: CONTRIBUTING RESEARCHERS: Dr. Stacia West, Mina Addo, Mae Carlson, Dr. Amy Castro Baker, Conway Homes Residents Council, Sukhi Samra, Pandora Crowder, Meagan Cusack, Stacy Elliott, Erin Coltrera Daniel Horn, Jenna Steckel, Tooma Zaghloul Preliminary Analysis: SEED's First Year Executive Summary “ Poverty is the biggest issue. Everything we deal with stems from that. There’s so many people working incredibly hard, and if life happens, there’s no bottom. “ —Michael D. Tubbs The Stockton Economic Empowerment Key Findings Include: Demonstration, or SEED, was the nation’s • Guaranteed income reduced income volatility, first mayor-led guaranteed income initiative. or the month-to-month income fluctuations Launched in February 2019 by former Mayor that households face. Michael D. Tubbs, SEED gave 125 Stocktonians $500 per month for 24 months. The cash was • Unconditional cash enabled recipients unconditional, with no strings attached and no to find full-time employment. work requirements. • Recipients of guaranteed income were This Randomized Control Trial (RCT) pilot is being healthier, showing less depression and anxiety evaluated by a team of independent researchers, and enhanced wellbeing. Dr. Stacia West of the University of Tennessee • The guaranteed income alleviated financial and Dr. Amy Castro Baker of the University of scarcity creating new opportunities for Pennsylvania, and funded by the Evidence for self-determination, choice, goal-setting, Action Program at the Robert Wood Johnson and risk-taking. Foundation. SEED sought to confront, address, and humanize Our primary research questions are the following: some of the most pressing and pernicious How does guaranteed income impact problems our country faces: inequality, income income volatility? How do changes in income volatility, and poverty.
    [Show full text]
  • Comparative Study of Cryptographic Encryption Algorithms
    IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 12, Issue 3, Ver. II (May - June 2017), PP 66-71 www.iosrjournals.org Comparative Study of Cryptographic Encryption Algorithms Chaitra B1, Kiran Kumar V.G.1, Shantharama Rai C2 1(Electronics & Communication Engineering, Sahyadri College of Engineering& Management, India) 1(Associate Professor Electronics & Communication Engineering, Sahyadri College of Engineering & Management, India) 2(Principal,, AJ Institute of Engineering &Technology, Mangaluru, India) Abstract: Protection of the network to enhance the safety of the information is great challenge in cryptography. With the developments in the cryptography lightweight cryptography has large space towards security by its simplicity in the implementations. For majority of applications PRESENT and TEA are excellent and preferred choices. However PRESENT is suitable for low constrained devices like RFID tags and sensor network. In this paper we describe ultra-lightweight cryptographic algorithms in detail. Both efficiency and security of information are important while designing and implementation considering security, cost and performance. The efficiency of PRESENT and TEA are higher as they have ability to resist cryptographic attacks and also due to their adequate security. In this paper the performance analysis of PRESENT and Tea are described. I. Introduction In digital era secrecy of the information plays important role in cryptography. Cryptography is the integral part of communication organization. PRESENT is newly introduced lightweight cryptographic algorithm. It is mainly designed for devices which have extremely low constrained resources in terms of area power and time. If we relate the performance analysis with other PRESENT is better block ciphers.
    [Show full text]
  • Auxins for Hardwood Cuttings: Effect of Root-Promoting Hormones
    Auxins for Hardwood Cuttings effect of root-promoting hormones in propagating fruit trees by hardwood cuttings studied during past three seasons H. T. Hartmann Hardwood cuttings of five species of fruit trees, Marianna 2624 plum, Angers quince, Stockton Morello cherry, Mal- ling-Merton 793 apple, and Mission olive, were used in propagation tests to study the effects of various root-promot- ing hormones-auxins-applied under several different conditions. Marianna 2624 plum is a commonly used rootstock for a number of the stone fruit species; the 2624 selection is a seedling of the parent Marianna plum, presumably an open-pollinated cross of Prunus cerasifera and P. munsoniana. This rootstock is propagated commer- cially by hardwood cuttings, but in heavy soils considerable difficulty is often experienced in obtaining satisfac- tory rooting. Angers quince4ydonia oblong- has long been used as a dwarfing root- stock for certain of the pear varieties. It is commercially propagated by hard- wood cuttings. Stockton Morello cherry-Prunus cer- asus-is used to a considerable extent in California as a semidwarfing rootstock for the sweet cherry and is propagated commercially by suckers arising around the base of older trees. It would be de- sirable to be able to propagate this stock by cuttings. In all the tests conducted with this variety, however, not one hard- wood cutting was induced to root. Later studies have shown that it can be easily rooted under mist humidification by softwood cuttings taken from actively growing shoots if treated with indolebu- tyric acid. The Malling-Merton 793 apple-Ma- lus sylwstris-is a newly developed clonal apple rootstock from’ England which is usually propagated by some method of layering.
    [Show full text]
  • The Effects of Different Hormones and Their Doses on Rooting of Stem Cuttings in Anatolian Sage (Salvia Fruticosa Mill.)
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Available online at www.sciencedirect.com ScienceDirect APCBEE Procedia 8 ( 2014 ) 348 – 353 2013 4th International Conference on Agriculture and Animal Science (CAAS 2013) 2013 3rd International Conference on Asia Agriculture and Animal (ICAAA 2013) The Effects of Different Hormones and Their Doses on Rooting of Stem Cuttings in Anatolian Sage (Salvia Fruticosa Mill.) A.Canan SAĞLAM a,*, Seviye YAVERa, İsmet BAŞERa, Latif CİNKILIÇb, aNamık Kemal Üniversitesi Ziraat Fakültesi Tarla Bitkileri Bölümü, Tekirdağ bNamık Kemal Üniversitesi Çorlu meslek Yüksek Okulu, Tekirdağ Abstract In this research, three different hormones and five different hormone dosages were applied on cuttings were taken from Anatolian sage plants (Salvia fruticosa Mill.) before flowering period. NAA, IBA (0, 60, 120, 180, 240 ppm) and IAA hormones (0, 100, 200, 300, 400 ppm) were prepared by dissolving in distilled water. Stem cuttings were kept in hormone solution for 24 hours and they were planted in perlit medium under greenhouse conditions. After a month, the number of rooted stem cutting, the number of root per stem cuttings, root length and root weight were determined on stem cuttings. Rooting was observed in all of the cuttings for both samples to which hormone was applied and to which hormone was not applied. According to the result of the variance analysis, the effects of the hormones and hormone doses on the examined characters were found significant as statistically. According to the results obtained, IAA application increased root number considerably. While high hormone dose applications caused the notable increase in root weight and root number in all of three hormones, low hormone applications did not affect root length.
    [Show full text]
  • Rooting Hormones
    Essential Factor: Rooting Hormones Rooting Hormones are auxins, or plant growth regulators, that are involved in cell elongation and adventitious root formation. ¡ Reasons to use rooting hormones in your facility ¡ Difficult or slow to root crops can benefit greatly from rooting hormone application. ¡ Uniformity and speed of rooting can be increased when properly utilized, even for crops that normally root easily. ¡ Overhead applications can be made after crop is in the greenhouse to improve efficiency. ¡ Any resource or tool that you can use to decrease the time the cutting spends under mist should be considered a valuable part of a propagators tool box. Rooting Hormones: Basal end applications Powder Applications Liquid Applications ¡ Powdered hormone such as ¡ IBA can be applied as a liquid Rhizopon AA Dry Powder can basal application with typical be applied to basal end of the rates of 500-1000ppm. cutting. ¡ Dip N Grow and Rhizopon AA are ¡ Use a duster to apply to the stem only. two commonly used hormones for this type of application. ¡ Avoid getting powdered hormone on the leaves. ¡ Apply to the basal end with a hand-held spray bottle. ¡ Do not dip the stem into a container of hormone….this is a ¡ Do not allow solution to get on the sanitation risk. stems or leaves of the cutting. ¡ Do not coat the stem with a ¡ Do not dip stems directly into the solid layer of powder. solution…..this is a sanitation risk. Rooting Hormone Trial: Pretreated White Lightning Osteo ¡ Osteospermum White Lightning was pre-treated at Las Limas Top row pretreated with 1,500ppm Dip-N-Grow as a Bottom row untreated basal dip.
    [Show full text]
  • Common Rooting Hormones Methods of Auxin Application Benefits of Root-Promoting Compounds
    COMMON ROOTING HORMONES METHODS OF AUXIN APPLICATION BENEFITS OF ROOT-PROMOTING COMPOUNDS In this lab, you will be introduced to common rooting hormones that we will be using throughout the plant propagation course. You will also be introduced to several methods of auxin application. There are four primary reasons for treating cuttings with root-promoting compounds. These compounds can increase the percentage of cuttings which form roots, reduce the time to root initiation, increase the number of roots produced per cutting, and increase the uniformity of rooting Compounds commonly used to promote rooting include indoleacetic acid, indolebutyric acid, napthaleneacetic acid and a number of phenoxy compounds. IAA is a naturally occurring auxin but is not widely used because it is readily metabolized into inactive forms by plant tissue. IBA is the most widely used form of auxin in propagation. NAA is a synthetic auxin and phenoxy compounds are used primarily as herbicides but can also be used as sources of auxin. Rooting compounds are available in either the pure chemical form or as commercial preparations. Pure crystals of reagent grade chemical can be purchased from a chemical supply company and must be diluted. Acid forms of pure auxin are not water soluble, so K-formulations of IBA and NAA are often preferable due to their solubility in water. Commercial preparations are either dissolved in a solvent or dispersed in talc. Some of these preparations also contain a fungicide such as thiram. There are 4 general application methods for auxins. • In the talcum powder application, the bases of cuttings are dipped directly in the talcum powder based hormone just prior to sticking the cutting.
    [Show full text]
  • Better Root Systems with Gravel Beds
    Better Root Systems with Gravel Beds Eric Kuehler Science Delivery / Technology Specialist USDA Forest Service [email protected] After natural disaster, restoring tree canopy cover is often desired. Or sustainably replacing trees in cities after older trees are removed may be the objective. Maintaining a gravel bed for tree planting stock is inexpensive and allows a city to put more trees in the ground compared to B&B or containerized trees. Tree planting can be expensive Image courtesy of Deeproot A.M. Leonard Horticultural Tool and Supply Co. • Large trees are heavy • Expensive • Need heavy equipment and labor to move them • Added costs on top of cost of tree • Can’t use volunteers for this work Planting bare-root trees is much less expensive • Tree stock is much less expensive • Smaller trees without the soil • Lighter for volunteers • No heavy equipment needed (hand dug holes) • Easier to plant trees at proper depth What is a Gravel Bed? Increase fibrous root volume for out-planting Irrigated bed of gravel 6 – 9 months of grow time for tree growth • Concept developed by Chris Starbuck at University of Missouri • Extends the bare-root tree planting window to year round How does it work? Hydroponics Gravel = Macropores It can be a raised bed or belowground Advantages • Inexpensive • Trees • Bedding materials • Reusable • Low maintenance • Extends tree planting window • Year round planting • Grows abundant fibrous roots • Reduces transplant shock • Ensures proper planting depth and root orientation • Bare-root tree stock is generally
    [Show full text]
  • An Introduction to Wetland Seed Banks Etland Seed Banks
    An Introduction to Wetland Seed Banks By Douglas A. DeBerry and James E. Perry Introduction One of the most important structural compo- ture on wetland seed banks in natural and cre- nents of wetland ecosystems is the seed bank. ated or restored systems, and defines the role Seed banks are present in nearly all ecosystems, seed banks play in created and restored wetland and can be defined as “[an] aggregation of management. ungerminated seed potentially capable of replac- ing adult plants that may be annuals, dying a natural or unnatural death, or perennials, sus- Seeds and Seed Ecology ceptible to death by disease, disturbance, or con- Regeneration of wetland plant communities oc- sumption by animals including man” (Baker curs by sexual reproduction through either the 1989). They are a critical component in the es- development of seeds, or by asexual reproduc- tablishment and development of vegetation tion through clonal propagation by rhizomes or communities in wetlands (van der Valk 1981). other vegetative organs. A plant may employ the Practical principles concerning the “behavior” of former (e.g. annuals), the latter (e.g. submerged seeds in the soil in different wetland types may aquatics), or both (e.g. herbaceous perennials) be derived from past as a principal reproduc- research. The pur- tive strategy (Fenner pose of this and tech- 1985). Much of the lit- nical report number erature on seed bank re- 00-4 is to present to search deals with the reader a general sexually produced overview of seed bank propagules in an- ecology and the role giosperms (flowering seed banks play in plants) (Leck 1989).
    [Show full text]