Sample records for flying saucer attack

  1. Flying saucer located at the basal septum.

    PubMed

    Akcay, Murat; Senkaya, Emine Bilen; Bilge, Mehmet; Bozkurt, Mehmet; Arslantas, Ugur; Karakas, Fatih

    2008-08-01

    Left ventricular thrombus formation is a frequent complication in patients with ischemic heart disease and is associated with a high risk of systemic embolization. Generally, thrombi localize at the apical segment. However, thrombus localized at the basal septum has not been reported yet. In this case, we discuss a flying saucer shaped mass located at the basal septum, which was later diagnosed as thrombus after anticoagulant therapy.

  2. Design and Fabrication of Flying Saucer Utilizing Coanda Effect

    NASA Astrophysics Data System (ADS)

    Aabid, Abdul; Khan, S. A.

    2018-05-01

    Coanda effect is used in several engineering applications with distinctive designs and structures. It is also applied in aircrafts flying at low speeds for a comfortable ride. In this paper, we have designed and modelled Coanda effect in terms of a flying saucer. The fabrication was done by means of structural and electronic components. Electrical motor was used as a propeller to take off and land vertically (VTOL) along with hovering capability. The rotor disc diameter is smaller than the bulbous body unlike a helicopter which makes to fly very stable. Control flaps were used to regulate the path by altering the flow over the streamlined body. The model was then tested with a remote control. Numerical Simulation of the tesla turbine was done using ANSYS 14.5 software and displacements were obtained by applying different forces on designed model. CATIA V5 was used to analyse the shaft of the model to get minimum value of torque at which the shaft starts to deform.

  3. [SD-OCT As screening test for hydroxychloroquine retinopathy: The «flying saucer» sign].

    PubMed

    Asensio-Sánchez, V M

    2015-07-01

    Two asymptomatic women treated with hydroxychloroquine 200mg every day for 8 and 16 years developed retinal toxicity. Patient 1 was found to have a normal fundus and autofluorescence examination. Patient 2 was found to have a completely normal fundus examination. Fluorescein angiography shows parafoveal hyperfluorescence, and autofluorescence shows a minimal decrease in signal in the same region. In both patients the SD-OCT shows disruption of the ellipsoid zone in parafoveal region («flying saucer» sign). SD-OCT findings in the retina can identify hydroxychloroquine retinopathy in asymptomatic patients. Copyright © 2013 Sociedad Española de Oftalmología. Published by Elsevier España, S.L.U. All rights reserved.

  4. Flying saucer1 is a transmembrane RING E3 ubiquitin ligase that regulates the degree of pectin methylesterification in Arabidopsis seed mucilage.

    PubMed

    Voiniciuc, Catalin; Dean, Gillian H; Griffiths, Jonathan S; Kirchsteiger, Kerstin; Hwang, Yeen Ting; Gillett, Alan; Dow, Graham; Western, Tamara L; Estelle, Mark; Haughn, George W

    2013-03-01

    Pectins are complex polysaccharides that form the gel matrix of the primary cell wall and are abundant in the middle lamella that holds plant cells together. Their degree of methylesterification (DM) impacts wall strength and cell adhesion since unesterified pectin regions can cross-link via Ca(2+) ions to form stronger gels. Here, we characterize flying saucer1 (fly1), a novel Arabidopsis thaliana seed coat mutant, which displays primary wall detachment, reduced mucilage extrusion, and increased mucilage adherence. These defects appear to result from a lower DM in mucilage and are enhanced by the addition of Ca(2+) or completely rescued using alkaline Ca(2+) chelators. FLY1 encodes a transmembrane protein with a RING-H2 domain that has in vitro E3 ubiquitin ligase activity. FLY1 is orthologous to TRANSMEMBRANE UBIQUITIN LIGASE1, a Golgi-localized E3 ligase involved in the quality control of membrane proteins in yeast. However, FLY1-yellow fluorescent protein (YFP) fusions are localized in punctae that are predominantly distinct from the Golgi and the trans-Golgi network/early endosome in the seed coat epidermis. Wortmannin treatment, which induces the fusion of late endosomes in plants, resulted in enlarged FLY1-YFP bodies. We propose that FLY1 regulates the DM of pectin in mucilage, potentially by recycling pectin methylesterase enzymes in the endomembrane system of seed coat epidermal cells.

  5. FLYING SAUCER1 Is a Transmembrane RING E3 Ubiquitin Ligase That Regulates the Degree of Pectin Methylesterification in Arabidopsis Seed Mucilage[W

    PubMed Central

    Voiniciuc, Cătălin; Dean, Gillian H.; Griffiths, Jonathan S.; Kirchsteiger, Kerstin; Hwang, Yeen Ting; Gillett, Alan; Dow, Graham; Western, Tamara L.; Estelle, Mark; Haughn, George W.

    2013-01-01

    Pectins are complex polysaccharides that form the gel matrix of the primary cell wall and are abundant in the middle lamella that holds plant cells together. Their degree of methylesterification (DM) impacts wall strength and cell adhesion since unesterified pectin regions can cross-link via Ca2+ ions to form stronger gels. Here, we characterize flying saucer1 (fly1), a novel Arabidopsis thaliana seed coat mutant, which displays primary wall detachment, reduced mucilage extrusion, and increased mucilage adherence. These defects appear to result from a lower DM in mucilage and are enhanced by the addition of Ca2+ or completely rescued using alkaline Ca2+ chelators. FLY1 encodes a transmembrane protein with a RING-H2 domain that has in vitro E3 ubiquitin ligase activity. FLY1 is orthologous to TRANSMEMBRANE UBIQUITIN LIGASE1, a Golgi-localized E3 ligase involved in the quality control of membrane proteins in yeast. However, FLY1–yellow fluorescent protein (YFP) fusions are localized in punctae that are predominantly distinct from the Golgi and the trans-Golgi network/early endosome in the seed coat epidermis. Wortmannin treatment, which induces the fusion of late endosomes in plants, resulted in enlarged FLY1-YFP bodies. We propose that FLY1 regulates the DM of pectin in mucilage, potentially by recycling pectin methylesterase enzymes in the endomembrane system of seed coat epidermal cells. PMID:23482858

  6. High angle of attack flying qualities criteria for longitudinal rate command systems

    NASA Technical Reports Server (NTRS)

    Wilson, David J.; Citurs, Kevin D.; Davidson, John B.

    1994-01-01

    This study was designed to investigate flying qualities requirements of alternate pitch command systems for fighter aircraft at high angle of attack. Flying qualities design guidelines have already been developed for angle of attack command systems at 30, 45, and 60 degrees angle of attack, so this research fills a similar need for rate command systems. Flying qualities tasks that require post-stall maneuvering were tested during piloted simulations in the McDonnell Douglas Aerospace Manned Air Combat Simulation facility. A generic fighter aircraft model was used to test angle of attack rate and pitch rate command systems for longitudinal gross acquisition and tracking tasks at high angle of attack. A wide range of longitudinal dynamic variations were tested at 30, 45, and 60 degrees angle of attack. Pilot comments, Cooper-Harper ratings, and pilot induced oscillation ratings were taken from five pilots from NASA, USN, CAF, and McDonnell Douglas Aerospace. This data was used to form longitudinal design guidelines for rate command systems at high angle of attack. These criteria provide control law design guidance for fighter aircraft at high angle of attack, low speed flight conditions. Additional time history analyses were conducted using the longitudinal gross acquisition data to look at potential agility measures of merit and correlate agility usage to flying qualities boundaries. This paper presents an overview of this research.

  7. Ceropegia sandersonii Mimics Attacked Honeybees to Attract Kleptoparasitic Flies for Pollination.

    PubMed

    Heiduk, Annemarie; Brake, Irina; von Tschirnhaus, Michael; Göhl, Matthias; Jürgens, Andreas; Johnson, Steven D; Meve, Ulrich; Dötterl, Stefan

    2016-10-24

    Four to six percent of plants, distributed over different angiosperm families, entice pollinators by deception [1]. In these systems, chemical mimicry is often used as an efficient way to exploit the olfactory preferences of animals for the purpose of attracting them as pollinators [2,3]. Here, we report a very specific type of chemical mimicry of a food source. Ceropegia sandersonii (Apocynaceae), a deceptive South African plant with pitfall flowers, mimics attacked honeybees. We identified kleptoparasitic Desmometopa flies (Milichiidae) as the main pollinators of C. sandersonii. These flies are well known to feed on honeybees that are eaten by spiders, which we thus predicted as the model chemically mimicked by the plant. Indeed, we found that the floral scent of C. sandersonii is comparable to volatiles released from honeybees when under simulated attack. Moreover, many of these shared compounds elicited physiological responses in antennae of pollinating Desmometopa flies. A mixture of four compounds-geraniol, 2-heptanone, 2-nonanol, and (E)-2-octen-1-yl acetate-was highly attractive to the flies. We conclude that C. sandersonii is specialized on kleptoparasitic fly pollinators by deploying volatiles linked to the flies' food source, i.e., attacked and/or freshly killed honeybees. The blend of compounds emitted by C. sandersonii is unusual among flowering plants and lures kleptoparasitic flies into the trap flowers. This study describes a new example of how a plant can achieve pollination through chemical mimicry of the food sources of adult carnivorous animals. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Saucer Shoal: LDSD Recovery off Kauai

    NASA Image and Video Library

    2015-06-11

    Two members of the U.S. Navy's Mobile Diving Salvage Unit (MDSU) 1 Explosive Ordnance Detachment work on recovering the test vehicle for NASA's Low-Density Supersonic Decelerator (LDSD) project. The saucer-shaped LDSD craft splashed down at 11:49 a.m. HST (2:49 PDT/5:49 p.m. EDT) Monday, June 8, 2015, in the Pacific Ocean off the west coast of the Kauai, Hawaii, after a four-hour experimental flight test that investigated new technologies for landing future robotic and human Mars missions. During the flight test, a Supersonic Inflatable Aerodynamic Decelerator (SIAD) and a supersonic parachute were deployed. The SIAD operated as expected, dramatically slowing the test vehicle's velocity. When the parachute was deployed into the supersonic slipstream, it appeared to blossom to full inflation prior to the emergence of a tear which then propagated and destroyed the parachute's canopy. As a result, the saucer's splashdown in the Pacific Ocean was hard, resulting in fracturing parts of the structure. Memory cards containing comprehensive test data -- including high-speed, high-resolution imagery recorded during the flight -- were successfully recovered. Also recovered were the test vehicle and its components, the supersonic parachute, the ballute used to deploy the parachute, and a large weather balloon that initially carried the saucer to an altitude of 120,000 feet. http://photojournal.jpl.nasa.gov/catalog/PIA19684

  9. Spectral domain optical coherence tomography as an effective screening test for hydroxychloroquine retinopathy (the "flying saucer" sign).

    PubMed

    Chen, Eric; Brown, David M; Benz, Matthew S; Fish, Richard H; Wong, Tien P; Kim, Rosa Y; Major, James C

    2010-10-21

    While the long-term incidence of hydroxychloroquine (HCQ) retinopathy is low, there remains no definitive clinical screening test to recognize HCQ toxicity before ophthalmoscopic fundus changes or visual symptoms. Patients receiving HCQ were evaluated with spectral domain optical coherence tomography (SD OCT) to assess the feasibility of identifying HCQ retinopathy at an early stage. Twenty-five patients referred for the evaluation of hydroxychloroquine toxicity underwent a comprehensive ocular examination, Humphrey visual field (HVF) perimetry, time domain OCT, and SD OCT. Some patients with screening abnormalities also underwent further diagnostic testing at the discretion of the treating providers. Five patients were found to have SD OCT findings corresponding to HCQ toxicity and retinal damage as seen by clinical exam and/or HVF perimetry. Two patients with advanced toxicity were found to have significant outer retina disruption in the macula on SD OCT. Three patients with early HCQ toxicity and HVF 10-2 perifoveal defects were found to have loss of the perifoveal photoreceptor inner segment/outer segment (IS/OS) junction with intact outer retina directly under the fovea, creating the "flying saucer" sign. While two of these three patients had early ophthalmoscopic fundus changes, one had none. Outer retinal abnormalities including perifoveal photoreceptor IS/OS junction disruption can be identified by SD OCT in early HCQ toxicity, sometimes even before ophthalmoscopic fundus changes are apparent. SD OCT may have a potential complementary role in screening for HCQ retinopathy due to its quick acquisition and because it is more objective than automated perimetry.

  10. Generation of VLF saucer emissions observed by the Viking satellite

    NASA Astrophysics Data System (ADS)

    Lonnqvist, H.; Andre, M.; Matson, L.; Bahnsen, A.; Blomberg, L. G.; Erlandson, R. E.

    1993-08-01

    Simultaneous observations by the Viking satellite of electric and magnetic fields as well as charged particles have been used to investigate V-shaped wave phenomena. The intensity of these VLF and ELF emissions is V-shaped when shown in a frequency versus time plot. Simultaneous observations of V-shaped so-called VLF saucer emissions, particles and field-aligned currents strongly suggest, for the first time, that upgoing electrons with energies less than a few hundred electron volts can generate these waves. Broadband waves observed inside the saucer generation region, from frequencies much less than the ion cyclotron frequency up to the plasma frequency, may also be generated by these electrons. Viking observations of VLF saucers at altitudes between 4000 km and 13,500 km show that these emissions occur at higher altitudes than discussed in previous reports. The generation regions seem to be more extended at these higher altitudes than what has been reported at lower altitudes by other observers.

  11. Mechanisms Of Saucer-Shaped Sill Emplacement: Insight From Experimental Modeling

    NASA Astrophysics Data System (ADS)

    Galland, O.; Planke, S.; Malthe-Sørenssen, A.; Polteau, S.; Svensen, H.; Podladchikov, Y. Y.

    2006-12-01

    It has been recently demonstrated that magma intrusions in sedimentary basins had a strong impact on petroleum systems. Most of these intrusions are sills, and especially saucer-shaped sills. These features can be observed in many sedimentary basins (i.e. the Karoo basin, South Africa; the Norwegian and North Sea; the Tunguska basin, Siberia; the Neuquén basin in Argentina). The occurrence of such features in so various settings suggests that their emplacement results from fundamental processes. However, the mechanisms that govern their formation remain poorly constrained. Experiments were conducted to simulate the emplacement of saucer-shaped magma intrusions in sedimentary basins. The model rock and magma were fine-grained silica flour and molten vegetable oil, respectively. This modeling technique allows simultaneous simulation of magma emplacement and brittle deformation at a basin scale. For our purpose, we performed our experiments without external deformation. During the experiments, the oil was injected horizontally at constant flow rate within the silica flour. Then the oil initially emplaced in a sill, whereas the surface of the model inflated into a smooth dome. Subsequently, the oil propagated upwards along inclined sheets, finally reaching the surface at the edge of the dome. The resulting geometries of the intrusions were saucer-shaped sills. Then the oil solidified, and the model was cut in serial cross-sections through which the structures of the intrusive body and of the overburden can be observed. In order to constraint the processes governing the emplacement of such features, we performed a parametric study based on a set of experiments in which we systematically varied parameters such as the depth of emplacement and the injection flow rate of the oil. Our results showed that saucer diameters are larger at deeper level of emplacement. Opposite trend was obtained with varying injection flow rates. Based on our results, we conducted a detailed

  12. Dome Structures Above Sills and Saucer-Shaped Sills: Insights From Experimental Modeling

    NASA Astrophysics Data System (ADS)

    Planke, S.; Galland, O.; Malthe-Sørenssen, A.

    2007-12-01

    Saucer-shaped magma and sand intrusions are common features in sedimentary basins. They result from fundamental processes for the emplacement of fluids in shallow sedimentary basins. Seismic data show that the overburden above saucer-shaped intrusions is usually deformed and exhibits a dome-like structure. The formation of such structures, and the associated deformation, are of primary importance in the evolution of petroleum systems. In this presentation, we report on experimental investigation of the deformation processes associated with the intrusion of saucer-shaped intrusions into sedimentary basins. The experimental setup consists of molten low-viscosity oil injected into fine-grained silica flour (see Galland et al., this session). It properly simulates the emplacement of saucer-shaped intrusions and the deformation of the country rock. During experiments, the surface of the model is digitalized through a structured light technique based on moiré projection principle. Such a tool provides topographic maps of the model and allows a periodic (every 1.5 s) monitoring of the model surface. When the model magma starts intruding, a symetrical dome rises above the inlet. As injection proceeds, the dome inflates and widens. Subsequently, the dome evolves to a plateau-like feature, with nearly flat surface and steep edges. The plateau keeps lifting up, but nearly stoppes widening. At the end of the experiments, the intruding liquid erupts at the edge of the plateau. The intrusion formed in the experiment is a typical saucer-shaped sill. The evolution of the deforming surface reflects the evolution of the intrusion. We infer that the first doming phase corresponds to the emplacement of a horizontal basal sill by open fracturing. The dome-to-plateau transition corresponds to a transition of the liquid emplacement mechanism from basal sill to inclined sheet. We suggest that the emplacement of the inclined sheets results from shear fracturing at the dome edge.

  13. Solar breeze power package and saucer ship

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Veazey, S. E.

    1985-11-12

    A solar breeze power package having versatile sail and windmast options useful both on land and sea and especially useful in the saucer ship type design. The Vertical Axis Wind Turbine (VAWT) of the several Darrieus designs in conjunction with roll-up or permanently mounted solar cells combine in a hybrid or are used separately to provide power to a battery bank or other storage device.

  14. Degradation of self-compacting concrete (SCC) due to sulfuric acid attack: Experiment investigation on the effect of high volume fly ash content

    NASA Astrophysics Data System (ADS)

    Kristiawan, S. A.; Sunarmasto; Tyas, G. P.

    2016-02-01

    Concrete is susceptible to a variety of chemical attacks. In the sulfuric acid environment, concrete is subjected to a combination of sulfuric and acid attack. This research is aimed to investigate the degradation of self-compacting concrete (SCC) due to sulfuric acid attack based on measurement of compressive strength loss and diameter change. Since the proportion of SCC contains higher cement than that of normal concrete, the vulnerability of this concrete to sulfuric acid attack could be reduced by partial replacement of cement with fly ash at high volume level. The effect of high volume fly ash at 50-70% cement replacement levels on the extent of degradation owing to sulfuric acid will be assessed in this study. It can be shown that an increase in the utilization of fly ash to partially replace cement tends to reduce the degradation as confirmed by less compressive strength loss and diameter change. The effect of fly ash to reduce the degradation of SCC is more pronounced at a later age.

  15. Vertical linear feeder to elliptical igneous saucer-shaped sills: evidences from structural observations, geochemistry and experimental modeling

    NASA Astrophysics Data System (ADS)

    Galerne, C. Y.; Galland, O.; Neumann, E. R.; Planke, S.

    2009-12-01

    The structural relationships between sills and their feeders are poorly documented because they are rarely observed in the field and difficult to image on seismic data. For instance, it is unclear whether sills are fed by pipes, dikes or other sills. Nevertheless, the geometrical relationships between sills and their feeders provide first-order constraints on magma emplacement mechanisms. Here, we investigate the structural and geochemical relationships between sills and potential feeder dikes in a remarkably well-preserved and exposed sill complex, the Golden Valley Sill Complex (GVSC), Karoo Basin, South Africa. The GVSC consists of five major saucer-shaped sills and six dikes. The Golden Valley sill itself is an elliptical saucer, with a N-S trend. A one meter thick dike (D4) crops out underneath the southern tip of the Golden Valley sill. The strike of this dike is parallel to the long axis of the Golden Valley sill. Detailed sampling and geochemical analyses of the GVSC show that each sill and dike exhibits a specific geochemical signature. The Golden Valley sill and its underlying dike D4 have identical signatures. Although there is no clear structural evidence, the consistent geometrical and geochemical relationships between the Golden Valley sill and the D4 dike suggest that this vertical linear structure is the feeder of the overlying saucer-shaped sill. In order to investigate the relationships between sills and feeders, we resorted to scaled laboratory experiments. The experiments consisted of a low-viscosity vegetable oil representing magma and a cohesive fine-grained silica flour representing brittle rocks. We placed a horizontal weak layer into the silica flour, just above the top of the inlet, to simulate strata. Such a weak layer controlled the formation of horizontal sill that subsequently turned into a transgressive sheet leading to the formation of a saucer geometry. We ran experiments with varying inlet shapes: 1) a point inlet representing a

  16. Experimental Modeling of the Formation of Saucer-Shaped sills

    NASA Astrophysics Data System (ADS)

    Galland, O.; Planke, S.; Malthe-Sorenssen, A.

    2007-12-01

    Many magma intrusions in sedimentary basins are sills, and especially saucer-shaped sills. These features are observed in many places (i.e. South Africa; the Norwegian and North Sea; Siberia; Argentina). Sand injectites exhibit similar geometries. The occurrence of such features in so various settings suggests that their emplacement results from fundamental processes in sedimentary basins. To understand such processes, we performed experimental modeling of saucer-shaped sill emplacement. The experiments consist of injecting a molten low viscosity vegetable oil (model magma) at a constant flow rate into a fine-grained Coulomb silica flour (model rock). When the oil starts intruding, the initially flat surface of the model inflates and forms a smooth dome. At the end of the experiment, the oil erupts at the edge of the dome. After the experiment, the oil cools and solidifies, the resulting solid intrusion is unburied and exposed, and its upper surface digitalized. For our purpose, we did our experiments without external deformation. We performed two series of experiments with varying depth of injection. The first series consisted of injection into a homogeneous medium. The resulting intrusions were cone-sheets and dykes. The second series consisted of heterogeneous models where the heterogeneity was a weak layer made of a flexible net. The resulting intrusions were made of (1) a horizontal basal sill emplaced along the weakness, and (2) inclined sheets nucleating at the edges of the basal sill and propagating upward and outward. The inclined sheets exhibited a convex shape, i.e. a decreasing slope outward. In addition, the deeper the sills emplaced, the larger they were. Our experimental results are consistent with saucer-shaped features in nature. We infer from our results that the transition between the basal sills and the inclined sheets results from a transition of emplacement processes. We suggest that the basal sill emplace by open (mode I) fracturing, whereas

  17. Symptomatic Bilateral Torn Discoid Medial Meniscus Treated with Saucerization and Suture

    PubMed Central

    2016-01-01

    Discoid meniscus is an anatomical congenital anomaly more often found in the lateral meniscus. A discoid medial meniscus is a very rare anomaly, and even more rare is to diagnose a bilateral discoid medial meniscus although the real prevalence of this situation is unknown because not all the discoid medial menisci are symptomatic and if the contralateral knee is not symptomatic then it is not usually studied. The standard treatment of this kind of pathology is partial meniscectomy. Currently the tendency is to be very conservative so suture and saucerization of a torn discoid meniscus when possible are gaining support. We present the case of a 13-year-old patient who was diagnosed with symptomatic torn bilateral discoid medial meniscus treated by suturing the tear and saucerization. To the best of our knowledge this is the first case reported of bilateral torn discoid medial meniscus treated in this manner in the same patient. PMID:27656305

  18. CIA’s Role in the Study of UFOs, 1947-90

    DTIC Science & Technology

    1997-01-01

    Roswell incident, in which a flying saucer supposedly crashed in New ... flying saucer crash in New Mexico in 1947, the government not only recovered debris from the crashed saucer but also four or five alien bodies...ever since.9� In September 1994, the US Air Force released a new report on the Roswell incident that concluded that the debris found in New Mexico

  19. Features of flow around the flying wing model at various attack and slip angle

    NASA Astrophysics Data System (ADS)

    Pavlenko, A. M.; Zanin, B. Yu.; Katasonov, M. M.

    2017-10-01

    Experimental study of flow features around aircraft model having "flying wing" form and belonging to the category of small-unmanned aerial vehicleswas carried out. Hot-wire anemometry and flow visualization techniques were used in the investigation to get quantitative data and streamlines pictures ofthe flow near the model surface. Evolution of vortex structures depending on the attack and slip angle was demonstrated. The possibility of flow control and reduction of flow separation zones on the wing surface by means of ledges in the form of cones was also investigated. It was shown, that the laminar-turbulent transition scenario on the flying wing model is identical to the one on a straight wing and occurs through the development of a package of unstable oscillations in the boundary layer separation.

  20. The Aerodynamics of Axisymmetric Blunt Bodies Flying at Angle of Attack

    NASA Technical Reports Server (NTRS)

    Schoenenberger, Mark; Kutty, Prasad; Queen, Eric; Karlgaard, Chris

    2014-01-01

    The Mars Science Laboratory entry capsule is used as an example to demonstrate how a blunt body of revolution must be treated as asymmetric in some respects when flying at a non-zero trim angle of attack. A brief description of the axisymmetric moment equations are provided before solving a system of equations describing the lateral-directional moment equations for a blunt body trimming at an angle of attack. Simplifying assumptions are made which allow the solution to the equations to be rearranged to relate the roll and yaw stability with sideslip angle to the frequency of oscillation of the vehicle body rates. The equations show that for a blunt body the roll and yaw rates are in phase and proportional to each other. The ratio of the rates is determined by the static stability coefficients and mass properties about those axes. A trajectory simulation is used to validate the static yaw stability parameter identification equation and a simple method of identifying the oscillation frequency from the body rates. The approach is shown to successfully extract the modeled yaw stability coefficient along a simulated Mars entry in agreement with data earlier analysis of MSL flight data.

  1. Understanding the mechanical coupling between magma emplacement and the resulting deformation: the example of saucer-shaped sills

    NASA Astrophysics Data System (ADS)

    Galland, O.; Neumann, E. R.; Planke, S.

    2009-12-01

    The mechanical coupling between magma intrusions and the surrounding rocks plays a major role in the emplacement of volcanic plumbing systems. The deformation associated with magma emplacement has been widely studied, such as caldera inflation/deflation, volcano deformation during dike intrusion, and doming above laccoliths. However, the feedback processes, i.e. the effect of deformation resulting from intruding magma on the propagation of the intrusion itself, have rarely been studied. Saucer-shaped sills are adequate geological objects to understand such processes. Indeed, observation show that saucer-shaped sills are often associated with dome-like structures affecting the overlying sediments. In addition, there is a clear geometrical relation between the sills and the domes: the dome diameters are almost identical to those of saucers, and the tips of the inclined sheets of saucers are superimposed on the edges of the domes. In this presentation, we report on experimental investigations of the emplacement mechanisms of saucer-shaped sills and associated deformation. The model materials were (1) cohesive fine-grained silica flour, representing brittle crust, and (2) molten low-viscosity oil, representing magma. A weak layer located at the top of the injection inlet simulates strata. The main variable parameter is injection depth. During experiments, the surface of the model is digitalized through a structured light technique based on the moiré projection principle. Such a tool provides topographic maps of the surface of the model and allows a periodic (every 1.5 s) monitoring of the model topography. When the model magma starts intruding, a symmetrical dome rises above the inlet. Subsequently, the dome inflates and widens, and then evolves to a plateau-like feature, with nearly flat upper surface and steep sides. At the end of the experiments, the intruding liquid erupts at the edge of the plateau. The intrusions formed in the experiments are saucer-shaped sills

  2. Passive maintenance of high angle of attack and its lift generation during flapping translation in crane fly wing.

    PubMed

    Ishihara, D; Yamashita, Y; Horie, T; Yoshida, S; Niho, T

    2009-12-01

    We have studied the passive maintenance of high angle of attack and its lift generation during the crane fly's flapping translation using a dynamically scaled model. Since the wing and the surrounding fluid interact with each other, the dynamic similarity between the model flight and actual insect flight was measured using not only the non-dimensional numbers for the fluid (the Reynolds and Strouhal numbers) but also those for the fluid-structure interaction (the mass and Cauchy numbers). A difference was observed between the mass number of the model and that of the actual insect because of the limitation of available solid materials. However, the dynamic similarity during the flapping translation was not much affected by the mass number since the inertial force during the flapping translation is not dominant because of the small acceleration. In our model flight, a high angle of attack of the wing was maintained passively during the flapping translation and the wing generated sufficient lift force to support the insect weight. The mechanism of the maintenance is the equilibrium between the elastic reaction force resulting from the wing torsion and the fluid dynamic pressure. Our model wing rotated quickly at the stroke reversal in spite of the reduced inertial effect of the wing mass compared with that of the actual insect. This result could be explained by the added mass from the surrounding fluid. Our results suggest that the pitching motion can be passive in the crane fly's flapping flight.

  3. Sulfate resistance of high calcium fly ash concrete

    NASA Astrophysics Data System (ADS)

    Dhole, Rajaram

    Sulfate attack is one of the mechanisms which can cause deterioration of concrete. In general, Class C fly ash mixtures are reported to provide poor sulfate resistance. Fly ashes, mainly those belonging to the Class C, were tested as per the ASTM C 1012 procedure to evaluate chemical sulfate resistance. Overall the Class C fly ashes showed poor resistance in the sulfate environment. Different strategies were used in this research work to improve the sulfate resistance of Class C fly ash mixes. The study revealed that some of the strategies such as use of low W/CM (water to cementing materials by mass ratio), silica fume or ultra fine fly ash, high volumes of fly ash and, ternary or quaternary mixes with suitable supplementary cementing materials, can successfully improve the sulfate resistance of the Class C fly ash mixes. Combined sulfate attack, involving physical and chemical action, was studied using sodium sulfate and calcium sulfate solutions. The specimens were subjected to wetting-drying cycles and temperature changes. These conditions were found to accelerate the rate of degradation of concrete placed in a sodium sulfate environment. W/CM was found to be the main governing factor in providing sulfate resistance to mixes. Calcium sulfate did not reveal damage as a result of mainly physical action. Characterization of the selected fly ashes was undertaken by using SEM, XRD and the Rietveld analysis techniques, to determine the relation between the composition of fly ashes and resistance to sulfate attack. The chemical composition of glass represented on the ternary diagram was the main factor which had a significant influence on the sulfate resistance of fly ash mixtures. Mixes prepared with fly ashes containing significant amounts of vulnerable crystalline phases offered poor sulfate resistance. Comparatively, fly ash mixes containing inert crystalline phases such as quartz, mullite and hematite offered good sulfate resistance. The analysis of hydrated lime-fly

  4. Pollen recovered from the exoskeleton of stable flies, Stomoxys calcitrans (L.) in Gainesville, Florida

    USDA-ARS?s Scientific Manuscript database

    Stable flies are pestiferous blood feeding flies that attack animals and humans. Besides consuming blood, these flies will also visit flowers to take nectar meals. When feeding on nectar, flies become coated with pollen which can be used to identify flowers used by the flies. Recently, flies cove...

  5. Aerodynamic characteristics of flying fish in gliding flight.

    PubMed

    Park, Hyungmin; Choi, Haecheon

    2010-10-01

    The flying fish (family Exocoetidae) is an exceptional marine flying vertebrate, utilizing the advantages of moving in two different media, i.e. swimming in water and flying in air. Despite some physical limitations by moving in both water and air, the flying fish has evolved to have good aerodynamic designs (such as the hypertrophied fins and cylindrical body with a ventrally flattened surface) for proficient gliding flight. Hence, the morphological and behavioral adaptations of flying fish to aerial locomotion have attracted great interest from various fields including biology and aerodynamics. Several aspects of the flight of flying fish have been determined or conjectured from previous field observations and measurements of morphometric parameters. However, the detailed measurement of wing performance associated with its morphometry for identifying the characteristics of flight in flying fish has not been performed yet. Therefore, in the present study, we directly measure the aerodynamic forces and moment on darkedged-wing flying fish (Cypselurus hiraii) models and correlated them with morphological characteristics of wing (fin). The model configurations considered are: (1) both the pectoral and pelvic fins spread out, (2) only the pectoral fins spread with the pelvic fins folded, and (3) both fins folded. The role of the pelvic fins was found to increase the lift force and lift-to-drag ratio, which is confirmed by the jet-like flow structure existing between the pectoral and pelvic fins. With both the pectoral and pelvic fins spread, the longitudinal static stability is also more enhanced than that with the pelvic fins folded. For cases 1 and 2, the lift-to-drag ratio was maximum at attack angles of around 0 deg, where the attack angle is the angle between the longitudinal body axis and the flying direction. The lift coefficient is largest at attack angles around 30∼35 deg, at which the flying fish is observed to emerge from the sea surface. From glide polar

  6. The importance of ecological studies in the control of tsetse flies*

    PubMed Central

    Glover, P. E.

    1967-01-01

    The author reviews recent ecological research on tsetse flies in East Africa and Northern Nigeria, particularly in connexion with the flies' sensory reactions, and stresses the importance of an accurate knowledge of their daytime and night-time resting-sites and of identifying the sources of their blood meals in order to elucidate the reservoirs of trypanosomiasis. The epidemiology of the disease is considered in the light of studies of trypanosome infections in host and fly. The control of tsetse flies must be based on the practical application of ecological knowledge by methods involving either a direct attack upon the fly (such as trapping or the use of insecticides) or an indirect attack (such as bush clearing or game destruction to eliminate the fly's habitat or food supply); these methods are dealt with in some detail. The author concludes with a discussion of modern trends in research, and a number of lines of research are suggested. PMID:4874781

  7. H33: A wheat gene providing Hessian fly resistance for the southeastern United States

    USDA-ARS?s Scientific Manuscript database

    Although more than 33 genes have been identified that confer resistance against Hessian fly attack in wheat, only five genes are currently effective against fly populations in the southeastern US. Because Hessian fly populations adapt to overcome newly deployed resistance genes within a few years of...

  8. Resistance of class C fly ash belite cement to simulated sodium sulphate radioactive liquid waste attack.

    PubMed

    Guerrero, A; Goñi, S; Allegro, V R

    2009-01-30

    The resistance of class C fly ash belite cement (FABC-2-W) to concentrated sodium sulphate salts associated with low level wastes (LLW) and medium level wastes (MLW) is discussed. This study was carried out according to the Koch and Steinegger methodology by testing the flexural strength of mortars immersed in simulated radioactive liquid waste rich in sulphate (48,000 ppm) and demineralised water (used as a reference), at 20 degrees C and 40 degrees C over a period of 180 days. The reaction mechanisms of sulphate ion with the mortar was carried out through a microstructure study, which included the use of Scanning electron microscopy (SEM), porosity and pore-size distribution and X-ray diffraction (XRD). The results showed that the FABC mortar was stable against simulated sulphate radioactive liquid waste (SSRLW) attack at the two chosen temperatures. The enhancement of mechanical properties was a result of the formation of non-expansive ettringite inside the pores and an alkaline activation of the hydraulic activity of cement promoted by the ingress of sulphate. Accordingly, the microstructure was strongly refined.

  9. Development of botanical-based biopesticides and repellents against biting flies on livestock animals

    USDA-ARS?s Scientific Manuscript database

    Biting flies are important insect pests causing millions of dollars in losses to the livestock industry. The attack by biting flies causes significant losses in animal production and potential food contamination and disease transmission. This presentation reports our recent findings on the developme...

  10. Host status of Vaccinium reticulatum (Ericaceae) to invasive tephritid fruit flies in Hawaii.

    PubMed

    Follett, Peter A; Zee, Francis T

    2011-04-01

    Ohelo (Vaccicinium reticulatum Small) (Ericaceae) is a native Hawaiian plant that has commercial potential in Hawaii as a nursery crop to be transplanted for berry production or for sale as a potted ornamental. No-choice infestation studies were conducted to determine whether ohelo fruit are hosts for four invasive tephritid fruit fly species. Ohelo berries were exposed to gravid female flies ofBactrocera dorsalis Hendel (oriental fruit fly), Ceratitis capitata (Wiedemann) (Mediterranean fruit fly), Bactrocera cucurbitae Coquillet (melon fly),or Bactrocera latifrons (Hendel) in screen cages outdoors for 24 h and then held on sand in the laboratory for 2 wk for pupal development and adult emergence. Only B. dorsalis successfully attacked and developed in ohelo berries. In total, 1570 berries produced 10 puparia, all of which emerged as adults, for a fruit infestation rate of 0.0064% and an average of 0.0053 puparia per gram of fruit. By comparison, papaya fruit used as controls produced an average of 1.44 B. dorsalis puparia per g of fruit. Ohelo berry is a marginal host for B. dorsalis and apparently a nonhost for C. capitata, B. cucurbitae, and B. latifrons. Commercial plantings of ohelo will rarely be attacked by fruit flies in Hawaii.

  11. Geology of the saucer-shaped sill near Mahad, western Deccan Traps, India, and its significance to the Flood Basalt Model

    NASA Astrophysics Data System (ADS)

    Duraiswami, Raymond A.; Shaikh, Tahira N.

    2013-07-01

    An ˜22-m-thick saucer-shaped sill occurs near Mahad and is exposed as a curvilinear, miniature ridge within the Deccan Traps. The sill has variable dips (42-55°). It has a 7.1-km long axis and 5.3 km short axis (aspect ratio of 1.4) and is larger than the MV sill of the Golden Valley sill complex, South Africa and the Panton sill, Australia. The sill has distinct glassy upper and lower chilled margins with a coarse-grained highly jointed core. The samples from the margin are invariably fractured and iron stained because of deuteric alteration. The rock from the sill is plagioclase-phyric basalt. At least three thick sill-like apophyses emanate from the base of the main sill. The apophyses change direction because of bending and thinning from a horizontal concordant sheet at the top to a discordant inclined form that bends again to pass into a lower horizontal concordant sheet. We interpret such features as `nascent saucer-shaped sills' that did not inflate to form nested sills. Geochemically, the sill consists of poorly differentiated tholeiitic basalt that has a restricted geochemical range. Critical trace element ratios and primitive mantle normalised trace and REE patterns indicate that the sills have geochemical affinities to the Poladpur chemical type and that the pahoehoe flow they intrude belongs to the Bushe Formation. Calculated magmatic overpressures during sill emplacement range from 8.4 to 11.3 MPa (for Young's modulus E = 5 GPa) and 16.7 to 22.5 MPa (for E=10 GPa) and depth to magma chamber ranges from 8.5 to 11.5 km ( E = 5 GPa) and 17.1 to 22.9 km ( E = 10 GPa), consistent with petrological and gravity modelling. The volume of the Mahad sill is approximately 276 km3 and is constant irrespective of the variations in the values of host-rock Young's modulus. In 1980, Cox (J Petrol 21:629-650, 1980) proposed a conceptual model of the crust-mantle section beneath the Karoo CFB which is considered as the fundamental model for flood basalt volcanism. Our

  12. Tests Of Avrocar Annular Jet VTOL Airplane in Ames 40x80 foot Wind Tunnel.

    NASA Image and Video Library

    1997-12-30

    Rear view of the Avrocar without the tail, with ground board and variable height struts. The air force wanted to test the design of a flying saucer with vertical takeoff and landing capability. The design proved unstable without the tail.

  13. JPL-20140817-LDSDf-0001-Flying Saucer Test Flight

    NASA Image and Video Library

    2014-08-17

    Ian Clark, Low Density Supersonic Decelerator (LDSD) Principal Investigator, narrates balloon launch, rocket firing and parachute testing on June 28, 2014. The LDSD is a concept for slowing a spacecraft entering Mars' atmosphere at supersonic speeds. For this test, the goal was to slow the test vehicle from four times the speed of sound to 2.5 times the speed of sound.

  14. Investigation of gliding flight by flying fish

    NASA Astrophysics Data System (ADS)

    Park, Hyungmin; Jeon, Woo-Pyung; Choi, Haecheon

    2006-11-01

    The most successful flight capability of fish is observed in the flying fish. Furthermore, despite the difference between two medium (air and water), the flying fish is well evolved to have an excellent gliding performance as well as fast swimming capability. In this study, flying fish's morphological adaptation to gliding flight is experimentally investigated using dry-mounted darkedged-wing flying fish, Cypselurus Hiraii. Specifically, we examine the effects of the pectoral and pelvic fins on the aerodynamic performance considering (i) both pectoral and pelvic fins, (ii) pectoral fins only, and (iii) body only with both fins folded. Varying the attack angle, we measure the lift, drag and pitching moment at the free-stream velocity of 12m/s for each case. Case (i) has higher lift-to-drag ratio (i.e. longer gliding distance) and more enhanced longitudinal static stability than case (ii). However, the lift coefficient is smaller for case (i) than for case (ii), indicating that the pelvic fins are not so beneficial for wing loading. The gliding performance of flying fish is compared with those of other fliers and is found to be similar to those of insects such as the butterfly and fruitfly.

  15. Microstructural Effects of Sulphate Attack in Sustainable Grouts for Micropiles.

    PubMed

    Ortega Álvarez, José Marcos; Esteban Pérez, María Dolores; Rodríguez Escribano, Raúl Rubén; Pastor Navarro, José Luís; Sánchez Martín, Isidro

    2016-11-08

    Nowadays, the use of micropiles has undergone a great development. In general, they are made with cement grout, reinforced with steel tubing. In Spain, these grouts are prepared using OPC, although the standards do not forbid the use of other cements, like sustainable ones. Micropiles are in contact with soils and groundwater, in which the presence of sulphates is common. Their deleterious effects firstly affect to the microstructure. Then, the aim of this research is to study the effects of sulphate attack in the microstructure of micropiles grouts, prepared with OPC, fly ash and slag commercial cements, compared to their behaviour when they are exposed to an optimum hardening condition. The microstructure evolution has been studied with the non-destructive impedance spectroscopy technique, which has never been used for detecting the effects of sulphate attack when slag and fly ash cements are used. Its results have been contrasted with mercury intrusion porosimetry and "Wenner" resistivity ones. The 28-day compressive strength of grouts has been also determined. The results of microstructure characterization techniques are in agreement, although impedance spectroscopy is the most sensitive for following the changes in the porous network of grouts. The results showed that micropiles made using fly ash and slag cements could have a good performance in contact with aggressive sodium sulphate media, even better than OPC ones.

  16. Microstructural Effects of Sulphate Attack in Sustainable Grouts for Micropiles

    PubMed Central

    Ortega Álvarez, José Marcos; Esteban Pérez, María Dolores; Rodríguez Escribano, Raúl Rubén; Pastor Navarro, José Luís; Sánchez Martín, Isidro

    2016-01-01

    Nowadays, the use of micropiles has undergone a great development. In general, they are made with cement grout, reinforced with steel tubing. In Spain, these grouts are prepared using OPC, although the standards do not forbid the use of other cements, like sustainable ones. Micropiles are in contact with soils and groundwater, in which the presence of sulphates is common. Their deleterious effects firstly affect to the microstructure. Then, the aim of this research is to study the effects of sulphate attack in the microstructure of micropiles grouts, prepared with OPC, fly ash and slag commercial cements, compared to their behaviour when they are exposed to an optimum hardening condition. The microstructure evolution has been studied with the non-destructive impedance spectroscopy technique, which has never been used for detecting the effects of sulphate attack when slag and fly ash cements are used. Its results have been contrasted with mercury intrusion porosimetry and “Wenner” resistivity ones. The 28-day compressive strength of grouts has been also determined. The results of microstructure characterization techniques are in agreement, although impedance spectroscopy is the most sensitive for following the changes in the porous network of grouts. The results showed that micropiles made using fly ash and slag cements could have a good performance in contact with aggressive sodium sulphate media, even better than OPC ones. PMID:28774026

  17. Extended analysis of the Trojan-horse attack in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Vinay, Scott E.; Kok, Pieter

    2018-04-01

    The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.

  18. Physical-durable performance of concrete incorporating high loss on ignition-fly ash

    NASA Astrophysics Data System (ADS)

    Huynh, Trong-Phuoc; Ngo, Si-Huy; Hwang, Chao-Lung

    2018-04-01

    This study investigates the feasibility of using raw fly ash with a high loss on ignition in concrete. The fly ash-free concrete samples were prepared with different water-to-binder (w/b) ratios of 0.35, 0.40, and 0.45, whereas the fly ash concrete samples were prepared with a constant w/b of 0.40 and with various fly ash contents (10%, 20%, and 30%) as a cement substitution. The physical properties and durability performance of the concretes were evaluated through fresh concrete properties, compressive strength, strength efficiency of cement, ultrasonic pulse velocity, and resistance to sulfate attack. Test results show that the w/b ratio affected the concrete properties significantly. The incorporation of fly ash increased the workability and reduced the unit weight of fresh concrete. In addition, the fly ash concrete samples containing up to 20% fly ash exhibited an improved strength at long-term ages. Further, all of the fly ash concrete samples showed a good durability performance with ultrasonic pulse velocity value of greater than 4100 m/s and a comparable sulfate resistance to the no-fly ash concrete.

  19. X-31 high angle of attack control system performance

    NASA Technical Reports Server (NTRS)

    Huber, Peter; Seamount, Patricia

    1994-01-01

    The design goals for the X-31 flight control system were: (1) level 1 handling qualities during post-stall maneuvering (30 to 70 degrees angle-of-attack); (2) thrust vectoring to enhance performance across the flight envelope; and (3) adequate pitch-down authority at high angle-of-attack. Additional performance goals are discussed. A description of the flight control system is presented, highlighting flight control system features in the pitch and roll axes and X-31 thrust vectoring characteristics. The high angle-of-attack envelope clearance approach will be described, including a brief explanation of analysis techniques and tools. Also, problems encountered during envelope expansion will be discussed. This presentation emphasizes control system solutions to problems encountered in envelope expansion. An essentially 'care free' envelope was cleared for the close-in-combat demonstrator phase. High angle-of-attack flying qualities maneuvers are currently being flown and evaluated. These results are compared with pilot opinions expressed during the close-in-combat program and with results obtained from the F-18 HARV for identical maneuvers. The status and preliminary results of these tests are discussed.

  20. The Evolution of the Advanced Attack Helicopter

    DTIC Science & Technology

    1975-06-06

    p. 18. C. V. Glines (LTC, USA), "De Bothezat’s Flying Octopus ," Airman, Vol VI, No. I (January, 1962), 43. 29Ross, p. 58. 20 in his own right, being...AIR MOBILE OPIRATIONS, A Report for the Blue Ribbon Defense Panel by COL Jay D. Vanderpool, USA, Ret. (February 1970), 29. F. IY 70A Observation...not produce significant quantitative progress. -Attack Helicopters The Key to Army Air Mobile Operations, A Report for the Blue Ribbon Defense Panel by

  1. The Roswell Report: Case Closed,

    DTIC Science & Technology

    1997-01-01

    extraterrestrial vehicle and its alien occupants near Roswell, N.M. in July 1947. Reports of flying saucers and alien bodies allegedly sighted in the...explains that what was recovered by the Army Air Forces was not the remnants of an extraterrestrial spacecraft and its alien crew, but debris from an

  2. How the Elderly Can Use Scientific Knowledge to Solve Problems While Designing Toys: A Retrospective Analysis of the Design of a Working UFO

    ERIC Educational Resources Information Center

    Chen, Mei-Yung; Hong, Jon-Chao; Hwang, Ming-Yueh; Wong, Wan-Tzu

    2013-01-01

    The venerable aphorism "an old dog cannot learn new tricks" implies that the elderly rarely learn anything new--in particular, scientific knowledge. On the basis of "learning by doing," the present study emphasized knowledge application (KA) as elderly subjects collaborated on the design of a toy flying saucer (UFO). Three…

  3. Bait formulations of attractants and phagostimulants for targeted, area-wide fruit fly control

    USDA-ARS?s Scientific Manuscript database

    Tephritid fruit flies attack hundreds of species of fruits and vegetables and are responsible for trade restrictions wherever they occur. Traps and “bait and kill stations” are important means of monitoring and control and Bob Heath made important contributions to these technologies....

  4. Transient heat stress compromises the resistance of wheat (Poales: Poaceae) seedlings to Hessian fly (Diptera: Cecidomyiidae) infestation.

    PubMed

    Currie, Yaleaka; Moch, John; Underwood, Joshua; Kharabsheh, Hamzah; Quesenberry, Amy; Miyagi, Risa; Thomas, Carolyn; Boney, Melanie; Woods, Samantha; Chen, Ming-Shun; Zhu, Lieceng

    2014-02-01

    Heat stress exerts a profound impact on the resistance of plants to parasites. In this research, we investigated the impact of an acute transient heat stress on the resistance of the wheat line 'Molly,' which contains the R gene H13, to an avirulent Hessian fly (Mayetiola destructor (Say)) population. We found that a significant portion of Molly seedlings stressed at 40 degrees C for 6 h during or after the initial Hessian fly larval attack became susceptible to otherwise avirulent insects, whereas unstressed control plants remained 100% resistant. Specifically, 77.8, 73.3, 83.3, and 46.7% of plants heat stressed at 0, 6,12, and 24 h, respectively, after the initial larval attack became susceptible. Biochemical analysis revealed that heat stress caused a transient decrease in 12-oxo-phytodienoic acid, but an increase in salicylic acid accumulation in Molly plants. The change in phytohormones after heat stress and Hessian fly infestation was not observed in 'Newton,' a near-isogenic but Hessian fly susceptible wheat line. Instead, heat stress caused a relatively prolonged reduction in palmitoleic acid. The role of phytohormones in heat-induced loss of wheat resistance was discussed.

  5. Pseudacteon decapitating flies (Diptera: Phoridae): Are they potential vectors of the fire ant pathogens Kneallhazia(=Thelohania)solenopsae (Microsporidia: Thelohaniidae)and Vairimorpha invictae (Microsporidia: Burenellidae)?

    USDA-ARS?s Scientific Manuscript database

    Fire ant decapitating flies in the genus Pseudacteon were tested for their potential as hosts or vectors of two microsporidian pathogens of the red imported fire ant, Solenopsis invicta. Decapitating flies which attacked or were reared from S. invicta workers infected by Kneallhazia (=Thelohania)...

  6. Effectiveness of a sprayable male annihilation treatment with a biopesticide against fruit flies (Diptera:Tephritidae) attacking tropical fruits

    USDA-ARS?s Scientific Manuscript database

    SPLAT-MAT Spinosad ME(aka STATIC Spinosad ME),an "attract and kill" sprayable biopesticide, was evaluated as an area wide suppression treatment against Bactrocera carambolae(Drew & Hancock),carambola fruit fly, in Brazil and Bactrocera dorsalis(Hendel),oriental fruit fly, in Hawaii. In Brazil, a sin...

  7. Flight test of the X-29A at high angle of attack: Flight dynamics and controls

    NASA Technical Reports Server (NTRS)

    Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.

    1995-01-01

    The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.

  8. Free-Flight Evaluation of Forebody Blowing for Yaw Control at High Angels of Attack

    NASA Technical Reports Server (NTRS)

    Kiddy, Jason

    1995-01-01

    Forebody blowing is a concept developed to provide yaw control for aircraft flying at high angles of attack where a conventional rudder becomes ineffective. The basic concept is fairly simple. A small jet of air is forced out of the nose of the aircraft. This jet causes a repositioning of the forebody vortices in an asymmetrical fashion. The asymmetric forebody vortex flows develop a side force on the forebody which results in substantial yawing moments at high angles of attack. The purpose of this project was to demonstrate the use of forebody blowing as a control device through free-flight evaluation. This unique type of testing was performed at the NASA-Langley 30- by 60-foot tunnel. From these tests, it could then be shown that forebody blowing is an effective method of maintaining yaw control at high angles of attack.

  9. High angle of attack control law development for a free-flight wind tunnel model using direct eigenstructure assignment

    NASA Technical Reports Server (NTRS)

    Wendel, Thomas R.; Boland, Joseph R.; Hahne, David E.

    1991-01-01

    Flight-control laws are developed for a wind-tunnel aircraft model flying at a high angle of attack by using a synthesis technique called direct eigenstructure assignment. The method employs flight guidelines and control-power constraints to develop the control laws, and gain schedules and nonlinear feedback compensation provide a framework for considering the nonlinear nature of the attack angle. Linear and nonlinear evaluations show that the control laws are effective, a conclusion that is further confirmed by a scale model used for free-flight testing.

  10. Predator versus Prey: Locust Looming-Detector Neuron and Behavioural Responses to Stimuli Representing Attacking Bird Predators

    PubMed Central

    Santer, Roger D.; Rind, F. Claire; Simmons, Peter J.

    2012-01-01

    Many arthropods possess escape-triggering neural mechanisms that help them evade predators. These mechanisms are important neuroethological models, but they are rarely investigated using predator-like stimuli because there is often insufficient information on real predator attacks. Locusts possess uniquely identifiable visual neurons (the descending contralateral movement detectors, DCMDs) that are well-studied looming motion detectors. The DCMDs trigger ‘glides’ in flying locusts, which are hypothesised to be appropriate last-ditch responses to the looms of avian predators. To date it has not been possible to study glides in response to stimuli simulating bird attacks because such attacks have not been characterised. We analyse video of wild black kites attacking flying locusts, and estimate kite attack speeds of 10.8±1.4 m/s. We estimate that the loom of a kite’s thorax towards a locust at these speeds should be characterised by a relatively low ratio of half size to speed (l/|v|) in the range 4–17 ms. Peak DCMD spike rate and gliding response occurrence are known to increase as l/|v| decreases for simple looming shapes. Using simulated looming discs, we investigate these trends and show that both DCMD and behavioural responses are strong to stimuli with kite-like l/|v| ratios. Adding wings to looming discs to produce a more realistic stimulus shape did not disrupt the overall relationships of DCMD and gliding occurrence to stimulus l/|v|. However, adding wings to looming discs did slightly reduce high frequency DCMD spike rates in the final stages of object approach, and slightly delay glide initiation. Looming discs with or without wings triggered glides closer to the time of collision as l/|v| declined, and relatively infrequently before collision at very low l/|v|. However, the performance of this system is in line with expectations for a last-ditch escape response. PMID:23209660

  11. Biomass fly ash incorporation in cement based materials =

    NASA Astrophysics Data System (ADS)

    Rajamma, Rejini

    In recent years, pressures on global environment and energy security have led to an increasing demand on renewable energy sources, and diversification of Europe's energy supply. Among these resources the biomass could exert an important role, since it is considered a renewable and CO2 neutral energy resource once the consumption rate is lower than the growth rate, and can potentially provide energy for heat, power and transports from the same installation. Currently, most of the biomass ash produced in industrial plants is either disposed of in landfill or recycled on agricultural fields or forest, and most times this goes on without any form of control. However, considering that the disposal cost of biomass ashes are raising, and that biomass ash volumes are increasing worldwide, a sustainable ash management has to be established. The main objective of the present study is the effect of biomass fly ashes in cement mortars and concretes in order to be used as a supplementary cementitious material. The wastes analyzed in the study were collected from the fluidized bed boilers and grate boilers available in the thermal power plants and paper pulp plants situated in Portugal. The physical as well as chemical characterisations of the biomass fly ashes were investigated. The cement was replaced by the biomass fly ashes in 10, 20 and 30% (weight %) in order to investigate the fresh properties as well as the hardened properties of biomass fly ash incorporated cement mortar and concrete formulations. Expansion reactions such as alkali silica reaction (ASR), sulphate attack (external and internal) were conducted in order to check the durability of the biomass fly ash incorporated cement mortars and concretes. Alternative applications such as incorporation in lime mortars and alkali activation of the biomass fly ashes were also attempted. The biomass fly ash particles were irregular in shape and fine in nature. The chemical characterization revealed that the biomass fly

  12. Establishment of the west indian fruit fly (Diptera: Tephritidae) parasitoid Doryctobracon areolatus (Hymenoptera: Braconidae)in the Dominican Republic

    USDA-ARS?s Scientific Manuscript database

    The West Indian fruit fly, Anastrepha obliqua (Macquart), infests numerous fruit species, particularly Anacardiaceae and most importantly mango (Mangifera indica L.). Widespread in the Neotropics, it was first reported in Hispaniola nearly 70 years ago. Continental populations are attacked by the op...

  13. Strong Magnetic Field Fluctuations within Filamentary Auroral Density Cavities Interpreted as VLF Saucer Sources

    NASA Technical Reports Server (NTRS)

    Knudsen, D. L.; Kabirzadeh, R.; Burchill, J. K.; Pfaff, Robert F.; Wallis, D. D.; Bounds, S. R.; Clemmons, J. H.; Pincon, J.-L.

    2012-01-01

    The Geoelectrodynamics and Electro-Optical Detection of Electron and SuprathermalIon Currents (GEODESIC) sounding rocket encountered more than 100 filamentary densitycavities associated with enhanced plasma waves at ELF (3 kHz) and VLF (310 kHz)frequencies and at altitudes of 800990 km during an auroral substorm. These cavities weresimilar in size (20 m diameter in most cases) to so-called lower-hybrid cavities (LHCs)observed by previous sounding rockets and satellites; however, in contrast, many of theGEODESIC cavities exhibited up to tenfold enhancements in magnetic wave powerthroughout the VLF band. GEODESIC also observed enhancements of ELF and VLFelectric fields both parallel and perpendicular to the geomagnetic field B0 within cavities,though the VLF E field increases were often not as large proportionally as seen in themagnetic fields. This behavior is opposite to that predicted by previously published theoriesof LHCs based on passive scattering of externally incident auroral hiss. We argue thatthe GEODESIC cavities are active wave generation sites capable of radiating VLF wavesinto the surrounding plasma and producing VLF saucers, with energy supplied by cold,upward flowing electron beams composing the auroral return current. This interpretation issupported by the observation that the most intense waves, both inside and outside cavities,occurred in regions where energetic electron precipitation was largely inhibited orabsent altogether. We suggest that the wave-enhanced cavities encountered by GEODESICwere qualitatively different from those observed by earlier spacecraft because of thefortuitous timing of the GEODESIC launch, which placed the payload at apogee within asubstorm-related return current during its most intense phase, lasting only a few minutes.

  14. Effects of the botanical compound p-anisaldehyde on horn fly, Haematobia irritans irritans (L.) (Diptera: Muscidae) repellency, mortality, and reproduction

    USDA-ARS?s Scientific Manuscript database

    The horn fly, Haematobia irritans irritans (L.), is an economically important obligate blood-feeding ectoparasite that mainly attacks cattle worldwide. As resistance to conventional insecticides increases, alternative control tactics are being investigated. p-Anisaldehyde occurs in many plants and i...

  15. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  16. The Killer Fly Hunger Games: Target Size and Speed Predict Decision to Pursuit

    PubMed Central

    Wardill, Trevor J.; Knowles, Katie; Barlow, Laura; Tapia, Gervasio; Nordström, Karin; Olberg, Robert M.; Gonzalez-Bellido, Paloma T.

    2015-01-01

    Predatory animals have evolved to optimally detect their prey using exquisite sensory systems such as vision, olfaction and hearing. It may not be so surprising that vertebrates, with large central nervous systems, excel at predatory behaviors. More striking is the fact that many tiny insects, with their miniscule brains and scaled down nerve cords, are also ferocious, highly successful predators. For predation, it is important to determine whether a prey is suitable before initiating pursuit. This is paramount since pursuing a prey that is too large to capture, subdue or dispatch will generate a substantial metabolic cost (in the form of muscle output) without any chance of metabolic gain (in the form of food). In addition, during all pursuits, the predator breaks its potential camouflage and thus runs the risk of becoming prey itself. Many insects use their eyes to initially detect and subsequently pursue prey. Dragonflies, which are extremely efficient predators, therefore have huge eyes with relatively high spatial resolution that allow efficient prey size estimation before initiating pursuit. However, much smaller insects, such as killer flies, also visualize and successfully pursue prey. This is an impressive behavior since the small size of the killer fly naturally limits the neural capacity and also the spatial resolution provided by the compound eye. Despite this, we here show that killer flies efficiently pursue natural (Drosophila melanogaster) and artificial (beads) prey. The natural pursuits are initiated at a distance of 7.9 ± 2.9 cm, which we show is too far away to allow for distance estimation using binocular disparities. Moreover, we show that rather than estimating absolute prey size prior to launching the attack, as dragonflies do, killer flies attack with high probability when the ratio of the prey's subtended retinal velocity and retinal size is 0.37. We also show that killer flies will respond to a stimulus of an angular size that is smaller

  17. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    NASA Astrophysics Data System (ADS)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  18. Corrosion-induced microstructural developments in 316 stainless steel during exposure to molten Li 2BeF 4(FLiBe) salt

    DOE PAGES

    Zheng, Guiqiu; He, Lingfeng; Carpenter, David; ...

    2016-10-12

    The microstructural evaluation and characterization of 316 stainless steel samples that were tested in molten Li 2BeF 4 (FLiBe) salt were investigated in this study for evaluating its performance in high-temperature molten fluoride salts. Recently, 316 stainless steel and FLiBe salt are being actively considered as the main structural alloy and primary coolant of fluoride salt-cooled high-temperature reactor (FHR), a leading nuclear reactor concept for the next generation nuclear plants (NGNP). In support of the materials development for the FHR, high-temperature corrosion tests of 316 stainless steel in molten FLiBe salt at 700°C have been conducted in both bare graphitemore » crucibles and 316 stainless steel-lined crucibles in an inert atmosphere for up to 3000 hours. The microstructure of the tested samples was comprehensively characterized using scanning electron microscopy (SEM) in conjunction with energy dispersive x-ray spectroscopy (EDS) and electron backscatter diffraction (EBSD), and scanning transmission electron microscopy (STEM) with EDS. In addition to the noticeable intergranular corrosion attack on surface, the corrosion in terms of the Cr depletion along high angle grain boundaries (15-180º) extended to 22µm in depth after 3000-hour exposure to molten FLiBe salt in graphite crucible. The coherent Σ3 grain boundary appeared high resistance to the Cr depletion. The substantial Cr depletion from the near-to-surface layer induced phase transformation from γ-martensite to α-ferrite phase (FeNi x) during corrosion at 700ºC. Furthermore, the presence of graphite in the molten salt doubled the corrosion attack depth and led to the formation of round Mo2C, hexagonal Cr 7C 3 and needle-like Al 4C 3 phase within the alloy as deep as 50 µm after 3000-hour corrosion testing. Based on the microstructural analysis, the corrosion mechanisms of 316 stainless steel in molten FLiBe salt in different corrosion crucibles were illuminated through schematic

  19. Corrosion-induced microstructural developments in 316 stainless steel during exposure to molten Li 2BeF 4(FLiBe) salt

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zheng, Guiqiu; He, Lingfeng; Carpenter, David

    The microstructural evaluation and characterization of 316 stainless steel samples that were tested in molten Li 2BeF 4 (FLiBe) salt were investigated in this study for evaluating its performance in high-temperature molten fluoride salts. Recently, 316 stainless steel and FLiBe salt are being actively considered as the main structural alloy and primary coolant of fluoride salt-cooled high-temperature reactor (FHR), a leading nuclear reactor concept for the next generation nuclear plants (NGNP). In support of the materials development for the FHR, high-temperature corrosion tests of 316 stainless steel in molten FLiBe salt at 700°C have been conducted in both bare graphitemore » crucibles and 316 stainless steel-lined crucibles in an inert atmosphere for up to 3000 hours. The microstructure of the tested samples was comprehensively characterized using scanning electron microscopy (SEM) in conjunction with energy dispersive x-ray spectroscopy (EDS) and electron backscatter diffraction (EBSD), and scanning transmission electron microscopy (STEM) with EDS. In addition to the noticeable intergranular corrosion attack on surface, the corrosion in terms of the Cr depletion along high angle grain boundaries (15-180º) extended to 22µm in depth after 3000-hour exposure to molten FLiBe salt in graphite crucible. The coherent Σ3 grain boundary appeared high resistance to the Cr depletion. The substantial Cr depletion from the near-to-surface layer induced phase transformation from γ-martensite to α-ferrite phase (FeNi x) during corrosion at 700ºC. Furthermore, the presence of graphite in the molten salt doubled the corrosion attack depth and led to the formation of round Mo2C, hexagonal Cr 7C 3 and needle-like Al 4C 3 phase within the alloy as deep as 50 µm after 3000-hour corrosion testing. Based on the microstructural analysis, the corrosion mechanisms of 316 stainless steel in molten FLiBe salt in different corrosion crucibles were illuminated through schematic

  20. Robust, nonlinear, high angle-of-attack control design for a supermaneuverable vehicle

    NASA Technical Reports Server (NTRS)

    Adams, Richard J.

    1993-01-01

    High angle-of-attack flight control laws are developed for a supermaneuverable fighter aircraft. The methods of dynamic inversion and structured singular value synthesis are combined into an approach which addresses both the nonlinearity and robustness problems of flight at extreme operating conditions. The primary purpose of the dynamic inversion control elements is to linearize the vehicle response across the flight envelope. Structured singular value synthesis is used to design a dynamic controller which provides robust tracking to pilot commands. The resulting control system achieves desired flying qualities and guarantees a large margin of robustness to uncertainties for high angle-of-attack flight conditions. The results of linear simulation and structured singular value stability analysis are presented to demonstrate satisfaction of the design criteria. High fidelity nonlinear simulation results show that the combined dynamics inversion/structured singular value synthesis control law achieves a high level of performance in a realistic environment.

  1. Stable fly, house fly (Diptera: Muscidae), and other nuisance fly development in poultry litter associated with horticultural crop production.

    PubMed

    Cook, D F; Dadour, I R; Keals, N J

    1999-12-01

    Poultry litter usage in horticultural crop production is a contributor to nuisance fly populations, in particular stable flies (Stomoxys calcitrans L.) and house flies (Musca domestica L.). Extrapolation of adult emergence data suggests that approximately 1.5 million house flies and 0.2 million stable flies are emerging on average from every hectare of poultry litter applied as a preplant fertilizer for vegetable production in Perth, Western Australia. To a lesser extent, sideband applications to established crops may allow for the development of 0.5 million house flies and 45,000 stable flies per hectare. However, up to 1 million house flies, 0.45 million lesser house flies, Fannia cannicularis L., and 11,000 stable flies per hectare may be produced from surface dressings of poultry litter associated with turf production. Other nuisance flies present in poultry litter included the false stable fly, Muscina stabulans (Fallén), bluebodied blowfly, Calliphora dubia Hardy, black carrion fly, Hydrotaea rostrata Robineau-Desvoidy, Australian sheep blowfly, Lucilia cuprina Wiedemann, and flesh flies (Sarcophagidae). Only house flies developed in poultry litter for the first 4 d after application in the field. Stable flies were not present in poultry litter until 4-7 d after application, and were the only fly species developing in litter > 9 d after application.

  2. About Heart Attacks

    MedlinePlus

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  3. Combat aircraft operations: Training requirements for the German Air Force tactical flying units and the noise problem

    NASA Astrophysics Data System (ADS)

    Jertz, W.

    1992-04-01

    The deterrence potential of an Air Force, and by that the capability to fulfill their mission in times of war, relies on threat oriented training in peacetime. Low level flying is a major tactical means to help aircrews reduce the anticipated threat imposed to them by enemy air defence systems to an acceptable degree. The demand for this capability applies also to air defence tasks against attacking fighter bombers. Military low level flying requires a high degree of proficiency, which can only be reached and maintained by constant training. A high performance level is then the key to air power. The possibilities for this kind of necessary training are restricted by superior demands concerning, amongst others, flying safety and environmental reasons. Too intensive restrictions might reduce the fighting capability of the wings to such an extent, that mission fulfillment could be seriously endangered.

  4. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  5. Effects of SO42- ions on the corrosion of GH3535 weld joint in FLiNaK molten salt

    NASA Astrophysics Data System (ADS)

    Zhu, Yasheng; Qiu, Jie; Hou, Juan; Liu, Wenguan; Chen, Huaican; Ai, Hua; Yu, Guojun; Wang, Jianqiang; Zhou, Xingtai

    2017-08-01

    The present work studied the impact of SO42- ions on the corrosion behaviors of GH3535 weld joint in FLiNaK molten salt. The concentration of SO42- ions in the FLiNaK molten salt was controlled by adjusting the quantity of Na2SO4 added into the salt. Results indicate that the SO42- ions in the FLiNaK salt speed up the corrosion rate remarkably by promoting the dissolution of Cr from the alloy matrix into the salt. With the concentration of SO42- ions in the FLiNaK salt increases from 100 ppm to 1000 ppm, the weight losses and the Cr depletion layer depths of the corroded specimens increase linearly. Even in the case of the heavy corrosion attack caused by the SO42- ions, the corrosion performance is similar between the base zone and fusion zone in the GH3535 weld joint. It is demonstrated that the structural diversity caused by the welding process has little impact on the corrosion performances of GH3535 alloy in FLiNaK molten salt.

  6. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  7. Microwave Lightcraft concept

    NASA Technical Reports Server (NTRS)

    2004-01-01

    Looking like an alien space ship or a flying saucer the Microwave Lightcraft is an unconventional launch vehicle approach for delivering payload to orbit using power transmitted via microwaves. Microwaves re beamed from either a ground station or an orbiting solar power satellite to the lightcraft. The energy received breaks air molecules into a plasma and a magnetohydrodynamic fanjet provides the lifting force. Only a small amount of propellant is required for circulation, attitude control and deorbit.

  8. Research Technology

    NASA Image and Video Library

    2004-04-15

    Looking like an alien space ship or a flying saucer the Microwave Lightcraft is an unconventional launch vehicle approach for delivering payload to orbit using power transmitted via microwaves. Microwaves re beamed from either a ground station or an orbiting solar power satellite to the lightcraft. The energy received breaks air molecules into a plasma and a magnetohydrodynamic fanjet provides the lifting force. Only a small amount of propellant is required for circulation, attitude control and deorbit.

  9. Heart Attack

    MedlinePlus

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  10. High-temperature corrosion of UNS N10003 in molten Li 2BeF 4 (FLiBe) salt

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zheng, Guiqiu; Kelleher, Brian; He, Lingfeng

    2015-07-30

    Here, corrosion testing of Hastelloy N in molten fluoride salt was performed in purified molten 2 7LiF-BeF 2 (66-34mol%) (FLiBe) salt at 700°C for 1000 hours, in pure nickel and graphite capsules. In the nickel capsule tests, the near-surface region of the alloy exhibited an about 200 nm porous structure, an approximately 3.5 μm chromium depleted region, and MoSi 2 precipitates. In tests performed in graphite capsules, the alloy samples gained weight due to the formation of a variety of Cr 3C 2, Cr 7C 3, Mo 2C and Cr 23C 6, carbide phases on the surface and in themore » subsurface regions of the alloy. A Cr depleted region was observed in the near-surface region where Mo thermally diffused toward either surface or grain boundary, which induced approximately 1.4 μm Ni 3Fe alloy layer in this region. The carbide containing layer extended to about 7 μm underneath the Ni 3Fe layer. The presence of graphite dramatically changes the mechanisms of corrosion attack in Hastelloy N in molten FLiBe salt. Evaluated by in terms of the depth of attack, graphite clearly accelerates corrosion, but the results appear to indicate that the formation of Cr 23C 6 phase might stabilize the Cr and mitigate its dissolution in molten FLiBe salt.« less

  11. Determinants of abundance and effects of blood-sucking flying insects in the nest of a hole-nesting bird.

    PubMed

    Tomás, Gustavo; Merino, Santiago; Martínez-de la Puente, Josué; Moreno, Juan; Morales, Judith; Lobato, Elisa

    2008-05-01

    Compared to non-flying nest-dwelling ectoparasites, the biology of most species of flying ectoparasites and its potential impact on avian hosts is poorly known and rarely, if ever, reported. In this study we explore for the first time the factors that may affect biting midge (Diptera: Ceratopogonidae) and black fly (Diptera: Simuliidae) abundances in the nest cavity of a bird, the hole-nesting blue tit Cyanistes caeruleus, and report their effects on adults and nestlings during reproduction. The abundance of biting midges was positively associated with nest mass, parental provisioning effort and abundance of blowflies and black flies, while negatively associated with nestling condition. Furthermore, a medication treatment to reduce blood parasitaemias in adult birds revealed that biting midges were more abundant in nests of females whose blood parasitaemias were experimentally reduced. This finding would be in accordance with these insect vectors attacking preferentially uninfected or less infected hosts to increase their own survival. The abundance of black flies in the population was lower than that of biting midges and increased in nests with later hatching dates. No significant effect of black fly abundance on adult or nestling condition was detected. Blood-sucking flying insects may impose specific, particular selection pressures on their hosts and more research is needed to better understand these host-parasite associations.

  12. Corrosion-induced microstructural developments in 316 stainless steel during exposure to molten Li2BeF4(FLiBe) salt

    NASA Astrophysics Data System (ADS)

    Zheng, Guiqiu; He, Lingfeng; Carpenter, David; Sridharan, Kumar

    2016-12-01

    The microstructural developments in the near-surface regions of AISI 316 stainless steel during exposure to molten Li2BeF4 (FLiBe) salt have been investigated with the goal of using this material for the construction of the fluoride salt-cooled high-temperature reactor (FHR), a leading nuclear reactor concept for the next generation nuclear plants (NGNP). Tests were conducted in molten FLiBe salt (melting point: 459 °C) at 700 °C in graphite crucibles and 316 stainless steel crucibles for exposure duration of up to 3000 h. Corrosion-induced microstructural changes in the near-surface regions of the samples were characterized using scanning electron microscopy (SEM) in conjunction with energy dispersive x-ray spectroscopy (EDS) and electron backscatter diffraction (EBSD), and scanning transmission electron microscopy (STEM) with EDS capabilities. Intergranular corrosion attack in the near-surface regions was observed with associated Cr depletion along the grain boundaries. High-angle grain boundaries (15-180°) were particularly prone to intergranular attack and Cr depletion. The depth of attack extended to the depths of 22 μm after 3000-h exposure for the samples tested in graphite crucible, while similar exposure in 316 stainless steel crucible led to the attack depths of only about 11 μm. Testing in graphite crucibles led to the formation of nanometer-scale Mo2C, Cr7C3 and Al4C3 particle phases in the near-surface regions of the material. The copious depletion of Cr in the near-surface regions induced a γ-martensite to α-ferrite phase (FeNix) transformation. Based on the microstructural analysis, a thermal diffusion controlled corrosion model was developed and experimentally validated for predicting long-term corrosion attack depth.

  13. Grapefruit as a host for the West Indian fruit fly (Diptera: Tephritidae).

    PubMed

    Mangan, Robert L; Thomas, Donald B; Moreno, Aleena Tarshis; Robacker, David

    2011-02-01

    The most common hosts for the West Indian fruit fly, Anastrepha obliqua (Macquart) (Diptera: Tephritidae) are fruit in the family Anacardiaceae (mango [Mangifera L.] and mombin [Spondias L.] species). However, similar to many of the tropical fruit flies of major economic importance, this species attacks several other families of crop fruit, including Annonaceae (cherimoya, Annona cherimola Mill.), Myrtaceae (guava, Psidium L.), Oxalidaceae (carambola, Averrhoa carambola L.), Passifloraceae (granadilla, Passiflora quadrangularis Mill.), and Sapotaceae [mamey sapote, Pouteria sapota (Jacq.) H. E. Moore & Steam]. In the family Rutaceae the economically important genus Citrus has been reported and until recently considered a host for this fruit fly. In this study, we reviewed the taxonomy of A. obliqua, tested specific chemicals that may inhibit oviposition, compared egg-to-adult survival of A. obliqua on preferred hosts and on grapefruit (Citrus X paradisi Macfad.), and measured fruit tissue-specific developmental rates of A. obliqua and the known citrus breeding Mexican fruit fly, Anastrepha ludens (Loew) (Diptera: Tephritidae), from egg to pupae. Our literature review shows much confusion concerning the taxonomy of this and related Anastrepha species, including synonymies and confusion with other species. The deterrent effect of the highest concentration of flavonoids for oviposition, although significant, was not absolute. Experiments carried out under laboratory conditions showed 15-40 times greater survival of A. ludens (whose preferred hosts include Rutaceae) on grapefruit compared with A. obliqua for both tree attached and harvested fruit. Experiments of survival of developing stages over time showed that the two species oviposit into different tissues in the fruit, and mortality is much higher for the West Indian fruit fly in the flavedo and albedo of the fruit compared with the Mexican fruit fly.

  14. Flying Cars

    NASA Technical Reports Server (NTRS)

    Crow, Steven

    1996-01-01

    Flying cars have nearly mythical appeal to nonpilots, a group that includes almost the whole human race. The appeal resides in the perceived utility of flying cars, vehicles that offer portal-to-portal transportation, yet break the bonds of road and traffic and travel freely through the sky at the drivers will. Part of the appeal is an assumption that flying cars can be as easy to fly as to drive. Flying cars have been part of the dream of aviation since the dawn of powered flight. Glenn Curtiss built, displayed, and maybe even flew a flying car in 1917, the Curtiss Autoplane. Many roadable airplanes were built in the 1930's, like the Waterman Arrowbile and the Fulton Airphibian. Two flying cars came close to production in the early 1950's. Ted Hall built a series of flying cars culminating in the Convaircar, sponsored by Consolidated Vultee, General Motors, and Hertz. Molt Taylor built and certified his Aerocar, and Ford came close to producing them. Three Aerocars are still flyable, two in museums in Seattle and Oshkosh, and the third owned and flown by Ed Sweeny. Flying cars do have problems, which so far have prevented commercial success. An obvious problem is complexity of the vehicle, the infrastructure, or both. Another is the difficulty of matching low power for normal driving with high power in flight. An automobile uses only about 20 hp at traffic speeds, while a personal airplane needs about 160 hp at speeds typical of flight. Many automobile engines can deliver 160 hp, but not for very long. A more subtle issue involves the drag of automobiles and airplanes. A good personal airplane can fly 30 miles per gallon of fuel at 200 mph. A good sports car would need 660 hp at the same speed and would travel only 3 miles per gallon. The difference is drag area, about 4.5 sq ft for the automobile and 1.4 sq ft for the airplane. A flying car better have the drag area of the airplane, not the car!

  15. Aerodynamic Characteristics of a Flying-Boat Hull Having a Length-Beam Ratio of 15, TED No. NACA 2206

    NASA Technical Reports Server (NTRS)

    Riebe, John M.; Naeseth, Rodger L.

    1951-01-01

    An investigation was made in the Langley 300 MPH 7- by 10-foot tunnel to determine the aerodynamic characteristics of a flying-boat hull of a length-beam ratio of 15 in the presence of a wing. The investigation was an extension of previous tests made on hulls of length-beam ratios of 6, 9, and 12; these hulls were designed to have approximately the same hydrodynamic performance with respect to spray and resistance characteristics. Comparison with the previous investigation at lower length-beam ratios indicated a reduction in minimum drag coefficients of 0.0006 (10 peroent)with fixed transition when the length-beam ratio was extended from 12 to 15. As with the hulls of lower length-beam ratio, the drag reduction with a length-beam ratio of 15 occurred throughout the range of angle of attack tested and the angle of attack for minimum drag was in the range from 2deg to 3deg. Increasing the length-beam ratio from 12 to 15 reduced the hull longitudinal instability by an mount corresponding to an aerodynamic-center shift of about 1/2 percent of the mean aerodynamic chord of the hypothetical flying boat. At an angle of attack of 2deg, the value of the variation of yawing-moment coefficient with angle of yaw for a length-beam ratio of 15 was 0.00144, which was 0.00007 larger than the value for a length-beam ratio of 12.

  16. Wolbachia in Parasitoids Attacking Native European and Introduced Eastern Cherry Fruit Flies in Europe.

    PubMed

    Schuler, Hannes; Kern, Peter; Arthofer, Wolfgang; Vogt, Heidrun; Fischer, Maximilian; Stauffer, Christian; Riegler, Markus

    2016-12-01

    The eastern cherry fruit fly, Rhagoletis cingulata Loew (Diptera: Tephritidae), is an economically important pest of cherries in North America. In 1983 it was first reported in Europe where it shares its ecological niche with the native European cherry fruit fly, Rhagoletis cerasi L. (Diptera: Tephritidae). Their coexistence in Europe led to the recent horizontal transmission of the Wolbachia strain wCer1 from R. cerasi to R. cingulata Horizontal Wolbachia transmission is mediated by either sharing of ecological niches or by interacting species such as parasitoids. Here we describe for the first time that two braconid wasps, Psyttalia rhagoleticola Sachtleben (Hymenoptera: Braconidae) and Utetes magnus Fischer (Hymenoptera: Braconidae), naturally parasitizing R. cerasi, use the invasive R. cingulata in Europe as a new host. In contrast, no parasitoids that parasitize R. cingulata in its native American range were detected in the introduced European range. Diagnostic Wolbachia PCR screening and sequence analyses demonstrated that all P. rhagoleticola individuals were infected with the newly described Wolbachia strain wRha while all U. magnus individuals were uninfected. wRha is different from wCer1 but had an Wolbachia surface protein (wsp) gene sequence that was identical to wCer2 of R. cerasi and wCin2 of R. cingulata. However, multi locus sequence typing revealed differences in all loci between wRha and the tephritid's strains. The horizontal transmission of wCer1 between the two tephritid species did not result in fixed heritable infections in the parasitoids. However, the parasitoids may have acted as a transient wCer1 vector. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America.

  17. Zebras and Biting Flies: Quantitative Analysis of Reflected Light from Zebra Coats in Their Natural Habitat

    PubMed Central

    Britten, Kenneth H.; Thatcher, Timothy D.; Caro, Tim

    2016-01-01

    Experimental and comparative evidence suggests that the striped coats of zebras deter biting fly attack, but the mechanisms by which flies fail to target black-and-white mammals are still opaque. Two hypotheses have been proposed: stripes might serve either to defeat polarotaxis or to obscure the form of the animal. To test these hypotheses, we systematically photographed free-living plains zebras in Africa. We found that black and white stripes both have moderate polarization signatures with a similar angle, though the degree (magnitude) of polarization in white stripes is lower. When we modeled the visibility of these signals from different distances, we found that polarization differences between stripes are invisible to flies more than 10 m away because they are averaged out by the flies’ low visual resolution. At any distance, however, a positively polarotactic insect would have a distinct signal to guide its visual approach to a zebra because we found that polarization of light reflecting from zebras is higher than from surrounding dry grasses. We also found that the stripes themselves are visible to flies at somewhat greater distances (up to 20 m) than the polarization contrast between stripes. Together, these observations support hypotheses in which zebra stripes defeat visually guided orienting behavior in flies by a mechanism independent of polarotaxis. PMID:27223616

  18. Estimation of Static Longitudinal Stability of Aircraft Configurations at High Mach Numbers and at Angles of Attack Between 0 deg and +/-180 deg

    NASA Technical Reports Server (NTRS)

    Dugan, Duane W.

    1959-01-01

    The possibility of obtaining useful estimates of the static longitudinal stability of aircraft flying at high supersonic Mach numbers at angles of attack between 0 and +/-180 deg is explored. Existing theories, empirical formulas, and graphical procedures are employed to estimate the normal-force and pitching-moment characteristics of an example airplane configuration consisting of an ogive-cylinder body, trapezoidal wing, and cruciform trapezoidal tail. Existing wind-tunnel data for this configuration at a Mach number of 6.86 provide an evaluation of the estimates up to an angle of attack of 35 deg. Evaluation at higher angles of attack is afforded by data obtained from wind-tunnel tests made with the same configuration at angles of attack between 30 and 150 deg at five Mach numbers between 2.5 and 3.55. Over the ranges of Mach numbers and angles of attack investigated, predictions of normal force and center-of-pressure locations for the configuration considered agree well with those obtained experimentally, particularly at the higher Mach numbers.

  19. FliO Regulation of FliP in the Formation of the Salmonella enterica Flagellum

    PubMed Central

    Barker, Clive S.; Meshcheryakova, Irina V.; Kostyukova, Alla S.; Samatey, Fadel A.

    2010-01-01

    The type III secretion system of the Salmonella flagellum consists of 6 integral membrane proteins: FlhA, FlhB, FliO, FliP, FliQ, and FliR. However, in some other type III secretion systems, a homologue of FliO is apparently absent, suggesting it has a specialized role. Deleting the fliO gene from the chromosome of a motile strain of Salmonella resulted in a drastic decrease of motility. Incubation of the ΔfliO mutant strain in motility agar, gave rise to pseudorevertants containing extragenic bypass mutations in FliP at positions R143H or F190L. Using membrane topology prediction programs, and alkaline phosphatase or GFPuv chimeric protein fusions into the FliO protein, we demonstrated that FliO is bitopic with its N-terminus in the periplasm and C-terminus in the cytoplasm. Truncation analysis of FliO demonstrated that overexpression of FliO43–125 or FliO1–95 was able to rescue motility of the ΔfliO mutant. Further, residue leucine 91 in the cytoplasmic domain was identified to be important for function. Based on secondary structure prediction, the cytoplasmic domain, FliO43–125, should contain beta-structure and alpha-helices. FliO43–125-Ala was purified and studied using circular dichroism spectroscopy; however, this domain was disordered, and its structure was a mixture of beta-sheet and random coil. Coexpression of full-length FliO with FliP increased expression levels of FliP, but coexpression with the cytoplasmic domain of FliO did not enhance FliP expression levels. Overexpression of the cytoplasmic domain of FliO further rescued motility of strains deleted for the fliO gene expressing bypass mutations in FliP. These results suggest FliO maintains FliP stability through transmembrane domain interaction. The results also demonstrate that the cytoplasmic domain of FliO has functionality, and it presumably becomes structured while interacting with its binding partners. PMID:20941389

  20. Wing and body kinematics of forward flight in drone-flies.

    PubMed

    Meng, Xue Guang; Sun, Mao

    2016-08-15

    Here, we present a detailed analysis of the wing and body kinematics in drone-flies in free flight over a range of speeds from hovering to about 8.5 m s(-1). The kinematics was measured by high-speed video techniques. As the speed increased, the body angle decreased and the stroke plane angle increased; the wingbeat frequency changed little; the stroke amplitude first decreased and then increased; the ratio of the downstroke duration to the upstroke duration increased; the mean positional angle increased at lower speeds but changed little at speeds above 3 m s(-1). At a speed above about 1.5 m s(-1), wing rotation at supination was delayed and that at pronation was advanced, and consequently the wing rotations were mostly performed in the upstroke. In the downstroke, the relative velocity of the wing increased and the effective angle of attack decreased with speed; in the upstroke, they both decreased with speed at lower speeds, and at higher speeds, the relative velocity became larger but the effective angle of attack became very small. As speed increased, the increasing inclination of the stroke plane ensured that the effective angle of attack in the upstroke would not become negative, and that the wing was in suitable orientations for vertical-force and thrust production.

  1. LUNA: low-flying UAV-based forest monitoring system

    NASA Astrophysics Data System (ADS)

    Keizer, Jan Jacob; Pereira, Luísa; Pinto, Glória; Alves, Artur; Barros, Antonio; Boogert, Frans-Joost; Cambra, Sílvia; de Jesus, Cláudia; Frankenbach, Silja; Mesquita, Raquel; Serôdio, João; Martins, José; Almendra, Ricardo

    2015-04-01

    The LUNA project is aiming to develop an information system for precision forestry and, in particular, the monitoring of eucalypt plantations that is first and foremost based on multi-spectral imagery acquired using low-flying uav's. The presentation will focus on the first phase of image acquisition, processing and analysis for a series of pot experiments addressing main threats for early-stage eucalypt plantations in Portugal, i.e. acute , chronic and cyclic hydric stress, nutrient stress, fungal infections and insect plague attacks. The imaging results will be compared with spectroscopic measurements as well as with eco-physiological and plant morphological measurements. Furthermore, the presentation will show initial results of the project's second phase, comprising field tests in existing eucalypt plantations in north-central Portugal.

  2. Biology and control of tabanids, stable flies and horn flies.

    PubMed

    Foil, L D; Hogsette, J A

    1994-12-01

    Tabanids are among the most free-living adult flies which play a role as livestock pests. A single blood meal is used as a source of energy for egg production (100-1,000 eggs per meal), and females of certain species can oviposit before a blood meal is obtained (autogeny). Therefore, the maintenance of annual populations requires successful oviposition by only 2% of females. Wild animal blood sources are usually available to maintain annual tabanid populations. Larval habitats are also independent of domestic livestock. Thus, the use of repellents or partial repellents is the only effective chemical strategy to reduce the incidence of tabanids on livestock. Permanent traps (and possibly treated silhouette traps) can be employed to intercept flies. Selective grazing or confinement can also reduce the impact of tabanids. Stable fly adults are dependent on vertebrate blood for survival and reproduction, but the amount of time spent in contact with the host is relatively small. Stable fly larvae develop in manure, spilled feed and decaying vegetation. Management of larval habitats by sanitation is the key to stable fly control. Treatment of animals with residual insecticides can aid in control; thorough application to the lower body parts of livestock is important. Proper use of modified traps, using either treated targets or solar-powered electrocution grids, can be effective in reducing stable fly populations. Adult horn flies spend the major part of their time on the host, and the larvae are confined to bovid manure. Therefore, almost any form of topical insecticide application for livestock is effective against horn flies, in the absence of insecticide resistance. Treatments should be applied when economic benefit is possible; economic gains are associated with increased weaning weights and weight gains of yearling and growing cattle. Oral chemical treatments (insect growth regulators or insecticides) administered at appropriate rates via bolus, water, food or

  3. Flying qualities design criteria applicable to supersonic cruise aircraft

    NASA Technical Reports Server (NTRS)

    Chalk, C. R.

    1980-01-01

    A comprehensive set of flying qualities design criteria was prepared for use in the supersonic cruise research program. The framework for stating the design criteria is established and design criteria are included which address specific failures, approach to dangerous flight conditions, flight at high angle of attack, longitudinal and lateral directional stability and control, the primary flight control system, and secondary flight controls. Examples are given of lateral directional design criteria limiting lateral accelerations at the cockpit, time to roll through 30 deg of bank, and time delay in the pilot's command path. Flight test data from the Concorde certification program are used to substantiate a number of the proposed design criteria.

  4. An annotated checklist of the horse flies, deer flies, and yellow flies (Diptera: Tabanidae) of Florida

    USDA-ARS?s Scientific Manuscript database

    The family Tabanidae includes the horse flies, deer flies, and yellow flies and is considered a significant pest of livestock throughout the United States, including Florida. Tabanids can easily become a major pest of man, especially salt marsh species which are known to readily feed on humans and o...

  5. An Overview of Controls and Flying Qualities Technology on the F/A-18 High Alpha Research Vehicle

    NASA Technical Reports Server (NTRS)

    Pahle, Joseph W.; Wichman, Keith D.; Foster, John V.; Bundick, W. Thomas

    1996-01-01

    The NASA F/A-18 High Alpha Research Vehicle (HARV) has been the flight test bed of a focused technology effort to significantly increase maneuvering capability at high angles of attack. Development and flight test of control law design methodologies, handling qualities metrics, performance guidelines, and flight evaluation maneuvers are described. The HARV has been modified to include two research control effectors, thrust vectoring, and actuated forebody strakes in order to provide increased control power at high angles of attack. A research flight control system has been used to provide a flexible, easily modified capability for high-angle-of-attack research controls. Different control law design techniques have been implemented and flight-tested, including eigenstructure assignment, variable gain output feedback, pseudo controls, and model-following. Extensive piloted simulation has been used to develop nonlinear performance guide-lines and handling qualities criteria for high angles of attack. This paper reviews the development and evaluation of technologies useful for high-angle-of-attack control. Design, development, and flight test of the research flight control system, control laws, flying qualities specifications, and flight test maneuvers are described. Flight test results are used to illustrate some of the lessons learned during flight test and handling qualities evaluations.

  6. Solar-powered electrocuting trap for controlling house flies and stable flies (Diptera: Muscidae).

    PubMed

    Pickens, L G; Mills, G D

    1993-09-01

    A portable trap was constructed that was visually attractive to house flies, Musca domestica L., and stable flies, Stomoxys calcitrans (L.), outdoors. The trap was made of a white and yellow pyramid placed on top of a white vertical base that had large cutouts in each side. Attracted flies were killed by means of solar-powered electrocuting grids. Three traps killed an average of 1,360 house flies and 1,190 stable flies per day at a manure dump and were effective in attracting flies under both cool (< 23 degrees C) and warm (> 30 degrees C) temperatures. Both species of flies were most attracted to the eastern side of the trap, but house flies preferred yellow in cool mornings and white in warm afternoons. When air temperatures were > 30 degrees C, both house flies and stable flies went into the shaded base of the trap or into tunnels. Most house flies were killed on the pyramidal top of the trap, whereas most stable flies were killed on the vertical base. Opaque fiberglass tunnels with central electrocuting grids were simpler and cheaper, although less effective, for stable flies.

  7. Managing the horn fly (Diptera: Muscidae) using an electric walk-through fly trap.

    PubMed

    Watson, D W; Stringham, S M; Denning, S S; Washburn, S P; Poore, M H; Meier, A

    2002-10-01

    An electric walk-through fly trap was evaluated for the management of the horn fly, Hematobia irritans (L.), on dairy cattle in North Carolina over 2 yr. The trap relies on black lights and electrocution grids to attract and kill flies that are brushed from the cattle passing through. During the first season, horn fly densities were reduced from >1,400 to <200 flies per animal. Horn fly density averaged 269.2 +/- 25.8 on cattle using the walk-through fly trap twice daily, and 400.2 +/- 43.5 on the control group during the first year. The second year, seasonal mean horn fly density was 177.3 +/- 10.8 on cattle using the walk-through fly trap compared with 321.1 +/- 15.8 on the control group. No insecticides were used to control horn flies during this 2-yr study.

  8. Advanced fighter technology integration (AFTI)/F-16 Automated Maneuvering Attack System final flight test results

    NASA Technical Reports Server (NTRS)

    Dowden, Donald J.; Bessette, Denis E.

    1987-01-01

    The AFTI F-16 Automated Maneuvering Attack System has undergone developmental and demonstration flight testing over a total of 347.3 flying hours in 237 sorties. The emphasis of this phase of the flight test program was on the development of automated guidance and control systems for air-to-air and air-to-ground weapons delivery, using a digital flight control system, dual avionics multiplex buses, an advanced FLIR sensor with laser ranger, integrated flight/fire-control software, advanced cockpit display and controls, and modified core Multinational Stage Improvement Program avionics.

  9. Mobilization of lipids and fortification of cell wall and cuticle are important in host defense against Hessian fly

    PubMed Central

    2013-01-01

    Background Wheat – Hessian fly interaction follows a typical gene-for-gene model. Hessian fly larvae die in wheat plants carrying an effective resistance gene, or thrive in susceptible plants that carry no effective resistance gene. Results Gene sets affected by Hessian fly attack in resistant plants were found to be very different from those in susceptible plants. Differential expression of gene sets was associated with differential accumulation of intermediates in defense pathways. Our results indicated that resources were rapidly mobilized in resistant plants for defense, including extensive membrane remodeling and release of lipids, sugar catabolism, and amino acid transport and degradation. These resources were likely rapidly converted into defense molecules such as oxylipins; toxic proteins including cysteine proteases, inhibitors of digestive enzymes, and lectins; phenolics; and cell wall components. However, toxicity alone does not cause immediate lethality to Hessian fly larvae. Toxic defenses might slow down Hessian fly development and therefore give plants more time for other types of defense to become effective. Conclusion Our gene expression and metabolic profiling results suggested that remodeling and fortification of cell wall and cuticle by increased deposition of phenolics and enhanced cross-linking were likely to be crucial for insect mortality by depriving Hessian fly larvae of nutrients from host cells. The identification of a large number of genes that were differentially expressed at different time points during compatible and incompatible interactions also provided a foundation for further research on the molecular pathways that lead to wheat resistance and susceptibility to Hessian fly infestation. PMID:23800119

  10. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  11. Forced-folding by laccolith and saucer-shaped sill intrusions on the Earth, planets and icy satellites

    NASA Astrophysics Data System (ADS)

    Michaut, Chloé

    2017-04-01

    Horizontal intrusions probably initially start as cracks, with negligible surface deformation. Once their horizontal extents become large enough compared to their depths, they make room for themselves by lifting up their overlying roofs, creating characteristic surface deformations that can be observed at the surface of planets. We present a model where magma flows below a thin elastic overlying layer characterized by a flexural wavelength Λ and study the dynamics and morphology of such a magmatic intrusion. Our results show that, depending on its size, the intrusion present different shapes and thickness-to-radius relationships. During a first phase, elastic bending of the overlying layer is the main source of driving pressure in the flow; the pressure decreases as the flow radius increases, the intrusion is bell-shaped and its thickness is close to being proportional to its radius. When the intrusion radius becomes larger than 4 times Λ, the flow enters a gravity current regime and progressively develops a pancake shape with a flat top. We study the effect of topography on flow spreading in particular in the case where the flow is constrained by a lithostatic barrier within a depression, such as an impact crater on planets or a caldera on Earth. We show that the resulting shape for the flow depends on the ratio between the flexural wavelength of the layer overlying the intrusion and the depression radius. The model is tested against terrestrial data and is shown to well explain the size and morphology of laccoliths and saucer-shaped sills on Earth. We use our results to detect and characterize shallow solidified magma reservoirs in the crust of terrestrial planets and potential shallow water reservoirs in the ice shell of icy satellites.

  12. Susceptibility of 15 mango (Sapindales: Anacardiaceae) cultivars to the attack by Anastrepha ludens and Anastrepha obliqua (Diptera:Tephritidae) and the role of underdeveloped fruit as pest reservoirs: management implications

    USDA-ARS?s Scientific Manuscript database

    We evaluated the susceptibility of 15 mango cultivars to the attack of Anastrepha ludens and A. obliqua, the main Tephritid pests of this crop in Mexico. In a field experiment, bagged, fruit-bearing branches were exposed to gravid females of both fly species. Infestation rates, developmental time,...

  13. Long-Term Behaviour of Fly Ash and Slag Cement Grouts for Micropiles Exposed to a Sulphate Aggressive Medium.

    PubMed

    Ortega, José Marcos; Esteban, María Dolores; Rodríguez, Raúl Rubén; Pastor, José Luis; Ibanco, Francisco José; Sánchez, Isidro; Climent, Miguel Ángel

    2017-05-30

    Nowadays, one of the most popular ways to get a more sustainable cement industry is using additions as cement replacement. However, there are many civil engineering applications in which the use of sustainable cements is not extended yet, such as special foundations, and particularly micropiles, even though the standards do not restrict the cement type to use. These elements are frequently exposed to the sulphates present in soils. The purpose of this research is to study the effects in the very long-term (until 600 days) of sulphate attack in the microstructure of micropiles grouts, prepared with ordinary Portland cement, fly ash and slag commercial cements, continuing a previous work, in which these effects were studied in the short-term. The microstructure changes have been analysed with the non-destructive impedance spectroscopy technique, mercury intrusion porosimetry and the "Wenner" resistivity test. The mass variation and the compressive strength have also been studied. The impedance spectroscopy has been the most sensitive technique for following the sulphate attack process. Considering the results obtained, micropiles grouts with slag and fly ash, exposed to an aggressive medium with high content of sulphates, have shown good behaviour in the very long-term (600 days) compared to grouts made with OPC.

  14. Long-Term Behaviour of Fly Ash and Slag Cement Grouts for Micropiles Exposed to a Sulphate Aggressive Medium

    PubMed Central

    Ortega, José Marcos; Esteban, María Dolores; Rodríguez, Raúl Rubén; Pastor, José Luis; Ibanco, Francisco José; Sánchez, Isidro; Climent, Miguel Ángel

    2017-01-01

    Nowadays, one of the most popular ways to get a more sustainable cement industry is using additions as cement replacement. However, there are many civil engineering applications in which the use of sustainable cements is not extended yet, such as special foundations, and particularly micropiles, even though the standards do not restrict the cement type to use. These elements are frequently exposed to the sulphates present in soils. The purpose of this research is to study the effects in the very long-term (until 600 days) of sulphate attack in the microstructure of micropiles grouts, prepared with ordinary Portland cement, fly ash and slag commercial cements, continuing a previous work, in which these effects were studied in the short-term. The microstructure changes have been analysed with the non-destructive impedance spectroscopy technique, mercury intrusion porosimetry and the “Wenner” resistivity test. The mass variation and the compressive strength have also been studied. The impedance spectroscopy has been the most sensitive technique for following the sulphate attack process. Considering the results obtained, micropiles grouts with slag and fly ash, exposed to an aggressive medium with high content of sulphates, have shown good behaviour in the very long-term (600 days) compared to grouts made with OPC. PMID:28772958

  15. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  16. Investigation of the Low-Subsonic Stability and Control Characteristics of a Free-Flying Model of a Thick 70 deg Delta Reentry Configuration

    NASA Technical Reports Server (NTRS)

    Paulson, John W.; Shanks, Robert E.

    1961-01-01

    An investigation of the low-subsonic flight characteristics of a thick 70 deg delta reentry configuration having a diamond cross section has been made in the Langley full-scale tunnel over an angle-of-attack range from 20 to 45 deg. Flight tests were also made at angles of attack near maximum lift (alpha = 40 deg) with a radio-controlled model dropped from a helicopter. Static and dynamic force tests were made over an angle-of-attack range from 0 to 90 deg. The longitudinal stability and control characteristics were considered satisfactory when the model had positive static longitudinal stability. It was possible to fly the model with a small amount of static instability, but the longitudinal characteristics were considered unsatisfactory in this condition. At angles of attack above the stall the model developed a large, constant-amplitude pitching oscillation. The lateral stability characteristics were considered to be only fair at angles of attack from about 20 to 35 deg because of a lightly damped Dutch roll oscillation. At higher angles of attack the oscillation was well damped and the lateral stability was generally satisfactory. The Dutch roll damping at the lower angles of attack was increased to satisfactory values by means of a simple rate-type roll damper. The lateral control characteristics were generally satisfactory throughout the angle- of-attack range, but there was some deterioration in aileron effectiveness in the high angle-of-attack range due mainly to a large increase in damping in roll.

  17. Fly ash carbon passivation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    La Count, Robert B; Baltrus, John P; Kern, Douglas G

    A thermal method to passivate the carbon and/or other components in fly ash significantly decreases adsorption. The passivated carbon remains in the fly ash. Heating the fly ash to about 500 and 800 degrees C. under inert gas conditions sharply decreases the amount of surfactant adsorbed by the fly ash recovered after thermal treatment despite the fact that the carbon content remains in the fly ash. Using oxygen and inert gas mixtures, the present invention shows that a thermal treatment to about 500 degrees C. also sharply decreases the surfactant adsorption of the recovered fly ash even though most ofmore » the carbon remains intact. Also, thermal treatment to about 800 degrees C. under these same oxidative conditions shows a sharp decrease in surfactant adsorption of the recovered fly ash due to the fact that the carbon has been removed. This experiment simulates the various "carbon burnout" methods and is not a claim in this method. The present invention provides a thermal method of deactivating high carbon fly ash toward adsorption of AEAs while retaining the fly ash carbon. The fly ash can be used, for example, as a partial Portland cement replacement in air-entrained concrete, in conductive and other concretes, and for other applications.« less

  18. Flying wings / flying fuselages

    NASA Technical Reports Server (NTRS)

    Wood, Richard M.; Bauer, Steven X. S.

    2001-01-01

    The present paper has documented the historical relationships between various classes of all lifting vehicles, which includes the flying wing, all wing, tailless, lifting body, and lifting fuselage. The diversity in vehicle focus was to ensure that all vehicle types that map have contributed to or been influenced by the development of the classical flying wing concept was investigated. The paper has provided context and perspective for present and future aircraft design studies that may employ the all lifting vehicle concept. The paper also demonstrated the benefit of developing an understanding of the past in order to obtain the required knowledge to create future concepts with significantly improved aerodynamic performance.

  19. The Hungry Fly: Hydrodynamics of feeding in the common house fly

    NASA Astrophysics Data System (ADS)

    Prakash, Manu; Steele, Miles

    2010-11-01

    A large number of insect species feed primarily on a fluid diet. To do so, they must overcome the numerous challenges that arise in the design of high-efficiency, miniature pumps. Although the morphology of insect feeding structures has been described for decades, their dynamics remain largely unknown even in the most well studied species (e.g. fruit fly). Here, we use invivo imaging and microsurgery to elucidate the design principles of feeding structures of the common house fly. Using high-resolution X-ray microscopy, we record invivo flow of sucrose solutions through the body over many hours during fly feeding. Borrowing from microsurgery techniques common in neurophysiology, we are able to perturb the pump to a stall position and thus evaluate function under load conditions. Furthermore, fluid viscosity-dependent feedback is observed for optimal pump performance. As the gut of the fly starts to fill up, feedback from the stretch receptors in the cuticle dictates the effective flow rate. Finally, via comparative analysis between the house fly, blow fly, fruit fly and bumble bees, we highlight the common design principles and the role of interfacial phenomena in feeding.

  20. Mercury release from fly ashes and hydrated fly ash cement pastes

    NASA Astrophysics Data System (ADS)

    Du, Wen; Zhang, Chao-yang; Kong, Xiang-ming; Zhuo, Yu-qun; Zhu, Zhen-wu

    2018-04-01

    The large-scale usage of fly ash in cement and concrete introduces mercury (Hg) into concrete structures and a risk of secondary emission of Hg from the structures during long-term service was evaluated. Three fly ashes were collected from coal-fired power plants and three blend cements were prepared by mixing Ordinary Portland cement (OPC) with the same amount of fly ash. The releasing behaviors of Hg0 from the fly ash and the powdered hydrated cement pastes (HCP) were measured by a self-developed Hg measurement system, where an air-blowing part and Hg collection part were involved. The Hg release of fly ashes at room temperature varied from 25.84 to 39.69 ng/g fly ash during 90-days period of air-blowing experiment. In contrast, the Hg release of the HCPs were in a range of 8.51-18.48 ng/g HCP. It is found that the Hg release ratios of HCPs were almost the same as those of the pure fly ashes, suggesting that the hydration products of the HCP have little immobilization effect on Hg0. Increasing temperature and moisture content markedly promote the Hg release.

  1. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    PubMed Central

    Moisan, Frédéric; Gonzalez, Cleotilde

    2017-01-01

    Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557

  2. Exogenous Salicylic Acid Enhances the Resistance of Wheat Seedlings to Hessian Fly (Diptera: Cecidomyiidae) Infestation Under Heat Stress.

    PubMed

    Underwood, Joshua; Moch, John; Chen, Ming-Shun; Zhu, Lieceng

    2014-10-01

    Heat stress exerts significant impact on plant-parasite interactions. Phytohormones, such as salicylic acid (SA), play important roles in plant defense against parasite attacks. Here, we studied the impact of a combination of heat stress and exogenous SA on the resistance of wheat (Triticum aestivum L.) plants to the Hessian fly [Mayetiola destructor (Say)]. We found that the wheat cultivar 'Molly', which contains the resistance gene H13, lost resistance to Hessian fly under heat stress (40°C for 3 and 6 h), and that exogenous application of SA on Molly seedlings right before heat stress can partially prevent the loss of resistance of Molly plants under heat conditions. Our findings have significant implications for understanding the dynamics of plant-insect interactions in the context of heat stress. © 2014 Entomological Society of America.

  3. Seven Deadliest Network Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less

  4. Heart Attack Recovery FAQs

    MedlinePlus

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  5. FlyCap: Markerless Motion Capture Using Multiple Autonomous Flying Cameras.

    PubMed

    Xu, Lan; Liu, Yebin; Cheng, Wei; Guo, Kaiwen; Zhou, Guyue; Dai, Qionghai; Fang, Lu

    2017-07-18

    Aiming at automatic, convenient and non-instrusive motion capture, this paper presents a new generation markerless motion capture technique, the FlyCap system, to capture surface motions of moving characters using multiple autonomous flying cameras (autonomous unmanned aerial vehicles(UAVs) each integrated with an RGBD video camera). During data capture, three cooperative flying cameras automatically track and follow the moving target who performs large-scale motions in a wide space. We propose a novel non-rigid surface registration method to track and fuse the depth of the three flying cameras for surface motion tracking of the moving target, and simultaneously calculate the pose of each flying camera. We leverage the using of visual-odometry information provided by the UAV platform, and formulate the surface tracking problem in a non-linear objective function that can be linearized and effectively minimized through a Gaussian-Newton method. Quantitative and qualitative experimental results demonstrate the plausible surface and motion reconstruction results.

  6. Aerodynamics of the flying snake Chrysopelea paradisi: how a bluff body cross-sectional shape contributes to gliding performance.

    PubMed

    Holden, Daniel; Socha, John J; Cardwell, Nicholas D; Vlachos, Pavlos P

    2014-02-01

    A prominent feature of gliding flight in snakes of the genus Chrysopelea is the unique cross-sectional shape of the body, which acts as the lifting surface in the absence of wings. When gliding, the flying snake Chrysopelea paradisi morphs its circular cross-section into a triangular shape by splaying its ribs and flattening its body in the dorsoventral axis, forming a geometry with fore-aft symmetry and a thick profile. Here, we aimed to understand the aerodynamic properties of the snake's cross-sectional shape to determine its contribution to gliding at low Reynolds numbers. We used a straight physical model in a water tunnel to isolate the effects of 2D shape, analogously to studying the profile of an airfoil of a more typical flyer. Force measurements and time-resolved (TR) digital particle image velocimetry (DPIV) were used to determine lift and drag coefficients, wake dynamics and vortex-shedding characteristics of the shape across a behaviorally relevant range of Reynolds numbers and angles of attack. The snake's cross-sectional shape produced a maximum lift coefficient of 1.9 and maximum lift-to-drag ratio of 2.7, maintained increases in lift up to 35 deg, and exhibited two distinctly different vortex-shedding modes. Within the measured Reynolds number regime (Re=3000-15,000), this geometry generated significantly larger maximum lift coefficients than many other shapes including bluff bodies, thick airfoils, symmetric airfoils and circular arc airfoils. In addition, the snake's shape exhibited a gentle stall region that maintained relatively high lift production even up to the highest angle of attack tested (60 deg). Overall, the cross-sectional geometry of the flying snake demonstrated robust aerodynamic behavior by maintaining significant lift production and near-maximum lift-to-drag ratios over a wide range of parameters. These aerodynamic characteristics help to explain how the snake can glide at steep angles and over a wide range of angles of attack

  7. Ommatidia of blow fly, house fly, and flesh fly: implication of their vision efficiency.

    PubMed

    Sukontason, Kabkaew L; Chaiwong, Tarinee; Piangjai, Somsak; Upakut, Sorawit; Moophayak, Kittikhun; Sukontason, Kom

    2008-06-01

    This work aims to elucidate the number of ommatidia or facets (the outwardly visible units of each ommatidium) for compound eyes in blow flies [Chrysomya megacephala (F.), Chrysomya rufifacies (Macquart), Chrysomya nigripes (Aubertin), Lucilia cuprina (Wiedemann)], house flies (Musca domestica L.), and flesh flies (Liosarcophaga dux Thomson) by manual counts of the corneal spreads. The head of the fly in each species was soaked in 20% potassium hydroxide solution at room temperature for 7 days, and the clear compound eye was dissected into six small parts, each of which was placed onto a slide and flattened using a coverslip. Images of each part were obtained using a microscope connected to a computer. The printed images of each part were magnified, and the total number of ommatidia per eye was manually counted. For males, the mean number of ommatidia was statistically different among all flies examined: L. dux (6,032) > C. rufifacies (5,356) > C. nigripes (4,798) > C. megacephala (4,376) > L. cuprina (3,665) > M. domestica (3,484). Likewise, the mean number of facets in females was statistically different: L. dux (6,086) > C. megacephala (5,641) > C. rufifacies (5,208) > C. nigripes (4,774) > L. cuprina (3,608) > M. domestica (3433). Scanning electron microscopy analysis of adult flies revealed the sexual dimorphism in the compound eye. Male C. megacephala had large ommatidia in the upper two thirds part and small ommatidia in the lower one third part, whereas only small ommatidia were detected in females. Dense postulate appearance was detected in the external surface of the corneal lens of the ommatidia of C. megacephala, C. rufifacies, and C. nigripes, while a mix of dense postulate appearance and variable groove array length was detected in L. cuprina and M. domestica. The probable functions of ommatidia are discussed with reference to other literature.

  8. A preliminary account of the fruit fly fauna of Timor-Leste (Diptera: Tephritidae: Dacinae).

    PubMed

    Bellis, Glenn A; Brito, Americo A; Jesus, Hipolito DE; Quintao, Valente; Sarmento, Joaquim C; Bere, Apolinario; Rodrigues, João; Hancock, David L

    2017-12-05

    Opportunistic monitoring using baited fruit fly traps throughout Timor-Leste revealed the presence of 16 species of Bactrocera and one species of Dacus, all of which are previously reported from the region. Sampling of a range of commercial fruit species detected an additional species, B. latifrons, and revealed that nine species are attacking commercial fruits and vegetables. A key for separating these species is provided. New host records were found for B. minuscula, B. floresiae and B. bellisi. Variation in the morphology of B. minuscula, B. floresiae and an undescribed species and within B. albistrigata confounded attempts at accurate identification of some specimens.

  9. Origin, acquisition and diversification of heritable bacterial endosymbionts in louse flies and bat flies.

    PubMed

    Duron, Olivier; Schneppat, Ulrich E; Berthomieu, Arnaud; Goodman, Steven M; Droz, Boris; Paupy, Christophe; Nkoghe, Judicaël Obame; Rahola, Nil; Tortosa, Pablo

    2014-04-01

    The γ-proteobacterium Arsenophonus and its close relatives (Arsenophonus and like organisms, ALOs) are emerging as a novel clade of endosymbionts, which are exceptionally widespread in insects. The biology of ALOs is, however, in most cases entirely unknown, and it is unclear how these endosymbionts spread across insect populations. Here, we investigate this aspect through the examination of the presence, the diversity and the evolutionary history of ALOs in 25 related species of blood-feeding flies: tsetse flies (Glossinidae), louse flies (Hippoboscidae) and bat flies (Nycteribiidae and Streblidae). While these endosymbionts were not found in tsetse flies, we identify louse flies and bat flies as harbouring the highest diversity of ALO strains reported to date, including a novel ALO clade, as well as Arsenophonus and the recently described Candidatus Aschnera chinzeii. We further show that the origin of ALO endosymbioses extends deep into the evolutionary past of louse flies and bat flies, and that it probably played a major role in the ecological specialization of their hosts. The evolutionary history of ALOs is notably complex and was shaped by both vertical transmission and horizontal transfers with frequent host turnover and apparent symbiont replacement in host lineages. In particular, ALOs have evolved repeatedly and independently close relationships with diverse groups of louse flies and bat flies, as well as phylogenetically more distant insect families, suggesting that ALO endosymbioses are exceptionally dynamic systems. © 2014 John Wiley & Sons Ltd.

  10. Feeding and attraction of non-target flies to spinosad-based fruit fly bait.

    PubMed

    Wang, Xin-Geng; Messing, Russell H

    2006-10-01

    A spinosad-based fruit fly bait, GF-120, has recently become a primary tool for area-wide suppression or eradication of pest tephritid fruit flies. The present study assessed the attraction and feeding of five non-target fly species to GF-120 in Hawaii. These non-target flies include three beneficial tephritid species [Eutreta xanthochaeta (Aldrich), Tetreuaresta obscuriventris (Loew), Ensina sonchi (L.)] introduced for weed biological control, an endemic Hawaiian tephritid [Trupanea dubautiae (Bryan)] (all Diptera: Tephritidae) and the cosmopolitan Drosophila melanogaster Meigen (Diptera: Drosophilidae). All five non-target fly species were susceptible to GF-120, as was the target pest Mediterranean fruit fly Ceratitis capitata (Wiedemann). Feeding on, or even brief tasting of, GF-120 killed all fly species within 2 h. When individual flies were provided with a choice of GF-120 or honey solution, there was no difference in the frequency of first food encounter by E. xanthochaeta, D. melanogaster or C. capitata. The other three non-target species approached honey more often than GF-120 in their first food encounter. Feeding times on GF-120 and honey were not significantly different for D. melanogaster and C. capitata, while the other four non-target species fed longer on honey than on GF-120. There was no significant difference in feeding time on honey versus GF-120 between males and females of each species. These results suggest that area-wide treatment using GF-120 for the purpose of eradication of pest fruit flies has potential negative impacts on these and other non-target fly species in Hawaii.

  11. Flying in, Flying out: Offshore Teaching in Higher Education

    ERIC Educational Resources Information Center

    Seah, Wee Tiong; Edwards, Julie

    2006-01-01

    This paper discusses the relatively new phenomenon of university education faculties offering offshore education. The analogy, "flying in, flying out" captures the intensity of such offshore experiences for visiting academics, and contrasts their professional experiences against expatriate academics. This paper reports on case studies of…

  12. Soluble components of the flagellar export apparatus, FliI, FliJ, and FliH, do not deliver flagellin, the major filament protein, from the cytosol to the export gate.

    PubMed

    Sajó, Ráchel; Liliom, Károly; Muskotál, Adél; Klein, Agnes; Závodszky, Péter; Vonderviszt, Ferenc; Dobó, József

    2014-11-01

    Flagella, the locomotion organelles of bacteria, extend from the cytoplasm to the cell exterior. External flagellar proteins are synthesized in the cytoplasm and exported by the flagellar type III secretion system. Soluble components of the flagellar export apparatus, FliI, FliH, and FliJ, have been implicated to carry late export substrates in complex with their cognate chaperones from the cytoplasm to the export gate. The importance of the soluble components in the delivery of the three minor late substrates FlgK, FlgL (hook-filament junction) and FliD (filament-cap) has been convincingly demonstrated, but their role in the transport of the major filament component flagellin (FliC) is still unclear. We have used continuous ATPase activity measurements and quartz crystal microbalance (QCM) studies to characterize interactions between the soluble export components and flagellin or the FliC:FliS substrate-chaperone complex. As controls, interactions between soluble export component pairs were characterized providing Kd values. FliC or FliC:FliS did not influence the ATPase activity of FliI alone or in complex with FliH and/or FliJ suggesting lack of interaction in solution. Immobilized FliI, FliH, or FliJ did not interact with FliC or FliC:FliS detected by QCM. The lack of interaction in the fluid phase between FliC or FliC:FliS and the soluble export components, in particular with the ATPase FliI, suggests that cells use different mechanisms for the export of late minor substrates, and the major substrate, FliC. It seems that the abundantly produced flagellin does not require the assistance of the soluble export components to efficiently reach the export gate. Copyright © 2014 Elsevier B.V. All rights reserved.

  13. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    PubMed

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented.

  14. Transient Ischemic Attack

    MedlinePlus Videos and Cool Tools

    Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood ... The only difference between a stroke and TIA is that with TIA the blockage is transient (temporary). ...

  15. High chromosomal variation in wild horn fly Haematobia irritans (Linnaeus) (Diptera, Muscidae) populations

    PubMed Central

    Forneris, Natalia S.; Otero, Gabriel; Pereyra, Ana; Repetto, Gustavo; Rabossi, Alejandro; Quesada-Allué, Luis A.; Basso, Alicia L.

    2015-01-01

    Abstract The horn fly, Haematobia irritans is an obligate haematophagous cosmopolitan insect pest. The first reports of attacks on livestock by Haematobia irritans in Argentina and Uruguay occurred in 1991, and since 1993 it is considered an economically important pest. Knowledge on the genetic characteristics of the horn fly increases our understanding of the phenotypes resistant to insecticides that repeatedly develop in these insects. The karyotype of Haematobia irritans, as previously described using flies from an inbred colony, shows a chromosome complement of 2n=10 without heterochromosomes (sex chromosomes). In this study, we analyze for the first time the chromosome structure and variation of four wild populations of Haematobia irritans recently established in the Southern Cone of South America, collected in Argentina and Uruguay. In these wild type populations, we confirmed and characterized the previously published “standard” karyotype of 2n=10 without sex chromosomes; however, surprisingly a supernumerary element, called B-chromosome, was found in about half of mitotic preparations. The existence of statistically significant karyotypic diversity was demonstrated through the application of orcein staining, C-banding and H-banding. This study represents the first discovery and characterization of horn fly karyotypes with 2n=11 (2n=10+B). All spermatocytes analyzed showed 5 chromosome bivalents, and therefore, 2n=10 without an extra chromosome. Study of mitotic divisions showed that some chromosomal rearrangements affecting karyotype structure are maintained as polymorphisms, and multiple correspondence analyses demonstrated that genetic variation was not associated with geographic distribution. Because it was never observed during male meiosis, we hypothesize that B-chromosome is preferentially transmitted by females and that it might be related to sex determination. PMID:25893073

  16. Temperature Effects on Olive Fruit Fly Infestation in the FlySim Cellular Automata Model

    NASA Astrophysics Data System (ADS)

    Bruno, Vincenzo; Baldacchini, Valerio; di Gregorio, Salvatore

    FlySim is a Cellular Automata model developed for simulating infestation of olive fruit flies (Bactrocera Oleae) on olive (Olea europaea) groves. The flies move into the groves looking for mature olives where eggs are spawn. This serious agricultural problem is mainly tackled by using chemical agents at the first signs of the infestation, but organic productions with no or few chemicals are strongly requested by the market. Oil made with infested olives is poor in quality, nor olives are suitable for selling in stores. The FlySim model simulates the diffusion of flies looking for mature olives and the growing of flies due to atmospheric conditions. Foreseeing an infestation is the best way to prevent it and to reduce the need of chemicals in agriculture. In this work we investigated the effects of temperature on olive fruit flies and resulting infestation during late spring and summer.

  17. Economic burden of gouty arthritis attacks for employees with frequent and infrequent attacks.

    PubMed

    Lynch, Wendy; Chan, Wing; Kleinman, Nathan; Andrews, L M; Yadao, Anthony M

    2013-04-01

    The objective of this study was to compare episode-related and annual costs and work absence days for employees with <3 versus ≥ 3 annual gout attacks. Human Capital Management Services data (2009-2010) from adult employees with gout (International Classification of Diseases, Ninth Revision code 274.x) and ≥ 12 months of medical and pharmacy benefits were studied. Outcomes of interest included medical and drug costs, number of emergency department and urgent care visits, number of inpatient days, short- and long-term disability, sick leave, workers' compensation costs, and work absence days. An algorithm based on diagnosis code and antigout medication use identified acute gout treatment episodes. Multivariate analysis compared annual and pre-episode vs. during-episode outcomes for employees with ≥ 3 vs. <3 gout annual attacks. Of 3361 employees with gout, 76 had ≥ 3 attacks; these employees had higher short-term disability costs ($1663 vs. $643, P=0.06) and days (11.68 versus 4.61, P<0.05), more emergency room visits (0.55 vs. 0.23, P<0.0001), and urgent care visits (0.07 vs. 0.04, P<0.01), and lower pharmacy costs ($1677 vs. $1108, P<0.0001) than those with <3 attacks. Medical costs both before ($203 higher) and during attacks ($136 higher) were significantly higher for those with ≥ 3 attacks than for those with <3 attacks. Additionally, a quadratic increasing relationship was found between number of attacks and cost. Frequency of acute gout attacks (≥ 3 episodes per year) among employees with gout was associated with greater short-term disability cost, absence days, and emergency department and urgent care visits, and trends toward higher overall costs.

  18. Selenium in fly ash

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gutenmann, W.H.; Bache, C.A.; Youngs, W.D.

    1976-03-05

    Selenium, at concentrations exceeding 200 parts per million (ppM) (dry weight), has been found in white sweet clover voluntarily growing on beds of fly ash in central New York State. Guinea pigs fed such clover concentrated selenium in their tissues. The contents of the honey stomachs of bees foraging on this seleniferous clover contained negligible selenium. Mature vegetables cultured on 10 percent (by weight) fly ash-amended soil absorbed up to 1 ppM of selenium. Fly ashes from 21 states contained total selenium contents ranging from 1.2 to 16.5 ppM. Cabbage grown on soil containing 10 percent (by weight) of thesemore » fly ashes absorbed selenium (up to 3.7 ppM) in direct proportion (correlation coefficient r = .89) to the selenium concentration in the respective fly ash. Water, aquatic weeds, algae, dragonfly nymphs, polliwogs, and tissues of bullheads and muskrats from a fly ash-contaminated pond contained concentrations of selenium markedly elevated over those of controls.« less

  19. Rapid Mobilization of Membrane Lipids in Wheat Leaf-Sheaths during Incompatible Interactions with Hessian Fly*

    PubMed Central

    Zhu, Lieceng; Liu, Xuming; Wang, Haiyan; Khajuria, Chitvan; Reese, John C.; Whitworth, R. Jeff; Welti, Ruth; Chen, Ming-Shun

    2013-01-01

    Hessian fly (HF) is a biotrophic insect that interacts with wheat on a gene-for-gene basis. We profiled changes in membrane lipids in two isogenic wheat lines: a susceptible line and its backcrossed offspring containing the resistance gene H13. Our results revealed a 32 to 45% reduction in total concentrations of 129 lipid species in resistant plants during incompatible interactions within 24 h after HF attack. A smaller and delayed response was observed in susceptible plants during compatible interactions. Microarray and real-time PCR analyses of 168 lipid-metabolism related transcripts revealed that the abundance of many of these transcripts increased rapidly in resistant plants after HF attack, but did not change in susceptible plants. In association with the rapid mobilization of membrane lipids, the concentrations of some fatty acids and 12-oxo-phytodienoic acid (OPDA) increased specifically in resistant plants. Exogenous application of OPDA increased mortality of HF larvae significantly. Collectively, our data, along with previously published results, indicate that the lipids were mobilized through lipolysis, producing free fatty acids, which were likely further converted into oxylipins and other defense molecules. Our results suggest that rapid mobilization of membrane lipids constitutes an important step for wheat to defend against HF attack. PMID:22668001

  20. Cyber-Physical Attacks With Control Objectives

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-08-18

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  1. Cyber-Physical Attacks With Control Objectives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  2. Invisible Trojan-horse attack.

    PubMed

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  3. WAYS OF ACQUIRING FLYING PHOBIA.

    PubMed

    Schindler, Bettina; Vriends, Noortje; Margraf, Jürgen; Stieglitz, Rolf-Dieter

    2016-02-01

    The few studies that have explored how flying phobia is acquired have produced contradictory results. We hypothesized that classical conditioning plays a role in acquiring flying phobia and investigated if vicarious (model) learning, informational learning through media, and experiencing stressful life events at the time of onset of phobia also play a role. Thirty patients with flying phobia and thirty healthy controls matched on age, sex, and education were interviewed with the Mini-DIPS, the short German version of the Anxiety Disorders Interview Schedule (DSM-IV diagnostic criteria) and the Fear-of-Flying History Interview. Fifty Percent of patients with flying phobia and 53% of healthy controls reported frightening events in the air. There was no significant difference between the two samples. Thus there were not more classical conditioning events for patients with flying phobia. There also was no significant difference between the two samples for vicarious (model) learning: 37% of flying phobia patients and 23% of healthy controls felt influenced by model learning. The influence of informational learning through media was significantly higher for the clinical sample (70%) than for the control group (37%). Patients with flying phobia experienced significantly more stressful life events in the period of their frightening flight experience (60%) than healthy controls (19%). Frightening experiences while flying are quite common, but not everybody develops a flying phobia. Stressful life events and other factors might enhance conditionability. Informational learning through negative media reports probably reinforces the development of flying phobia. Clinical implications are discussed. © 2015 Wiley Periodicals, Inc.

  4. Three-dimensional impact angle constrained distributed guidance law design for cooperative attacks.

    PubMed

    Wang, Xianghua; Lu, Xiao

    2018-02-01

    In this paper, a novel cooperative guidance law is proposed to make multiple missiles in the three-dimensional (3-D) space hit simultaneously the same target at pre-specified impact angles. Firstly, the normal accelerations which change the velocity direction (flight-path and heading angle) are designed such that all missiles will fly along the desired line of sight (LOS) after a given time which ensures the hit-to-kill interception at the desired impact angles; then the consensus variable is constructed using available information and can reach consensus under the proposed tangential acceleration which determines the velocity magnitude. Hence simultaneous hit-to-kill attack is achieved. Finally, some simulation studies are performed to verify the effectiveness of the proposed scheme. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  5. Correlated Attack Modeling (CAM)

    DTIC Science & Technology

    2003-10-01

    describing attack models to a scenario recognition engine, a prototype of such an engine was developed, using components of the EMERALD intrusion...content. Results – The attacker gains information enabling remote access to database (i.e., privileged login information, database layout to allow...engine that uses attack specifications written in CAML. The implementation integrates two advanced technologies devel- oped in the EMERALD program [27, 31

  6. Tracking zoonotic pathogens using blood-sucking flies as 'flying syringes'

    PubMed Central

    Bitome-Essono, Paul-Yannick; Ollomo, Benjamin; Arnathau, Céline; Durand, Patrick; Mokoudoum, Nancy Diamella; Yacka-Mouele, Lauriane; Okouga, Alain-Prince; Boundenga, Larson; Mve-Ondo, Bertrand; Obame-Nkoghe, Judicaël; Mbehang-Nguema, Philippe; Njiokou, Flobert; Makanga, Boris; Wattier, Rémi; Ayala, Diego; Ayala, Francisco J; Renaud, Francois; Rougeron, Virginie; Bretagnolle, Francois; Prugnolle, Franck; Paupy, Christophe

    2017-01-01

    About 60% of emerging infectious diseases in humans are of zoonotic origin. Their increasing number requires the development of new methods for early detection and monitoring of infectious agents in wildlife. Here, we investigated whether blood meals from hematophagous flies could be used to identify the infectious agents circulating in wild vertebrates. To this aim, 1230 blood-engorged flies were caught in the forests of Gabon. Identified blood meals (30%) were from 20 vertebrate species including mammals, birds and reptiles. Among them, 9% were infected by different extant malaria parasites among which some belonged to known parasite species, others to new parasite species or to parasite lineages for which only the vector was known. This study demonstrates that using hematophagous flies as ‘flying syringes’ constitutes an interesting approach to investigate blood-borne pathogen diversity in wild vertebrates and could be used as an early detection tool of zoonotic pathogens. DOI: http://dx.doi.org/10.7554/eLife.22069.001 PMID:28347401

  7. Susceptibility of low-chill blueberry cultivars to oriental fruit fly, mediterranean fruit fly, and melon fly (Diptera: Tephritidae)

    USDA-ARS?s Scientific Manuscript database

    Forced infestation studies were conducted to determine if fruits of southern highbush blueberries (Vaccinium corymbosum L. hybrids) are hosts for three invasive tephritid fruit flies. Fruits of 17 blueberry cultivars were exposed to gravid female flies of Bactrocera dorsalis (Hendel) (oriental frui...

  8. Blind Data Attack on BGP Routers

    DTIC Science & Technology

    2017-03-01

    implement blind attack protection, leaving long -standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This...protection measures should a discovered vulnerability reduce attack complexity. 14. SUBJECT TERMS BGP, TCP, blind attack, blind data attack 15. NUMBER OF...implementations may not properly implement blind attack protection, leaving long -standing connections, such as BorderGateway Protocol (BGP) sessions

  9. Alligator attacks in southwest Florida.

    PubMed

    Harding, Brett E; Wolf, Barbara C

    2006-05-01

    The American alligator inhabits bodies of fresh water in Florida and other southeastern states. Although attacks on pets are frequent, alligator attacks on humans are relatively rare because of the animal's natural fear of man. Because of the rarity of attacks on humans, the pathologic findings and pathophysiology of death in such cases have not been well characterized in the literature. We report three cases of fatal alligator attacks that occurred in southwest Florida, each with different pathologic findings and mechanisms of death. Although the cause of death in each case was attributed to the alligator attack, the mechanisms of death differed and included exsanguination because of amputation of an extremity, overwhelming sepsis, and drowning. These cases illustrate the varied pathophysiologies associated with deaths due to alligator attacks on humans and the features that distinguish alligator bites from those of other aquatic predators.

  10. Corrosion Behavior of Steel Reinforcement in Concrete with Recycled Aggregates, Fly Ash and Spent Cracking Catalyst.

    PubMed

    Gurdián, Hebé; García-Alcocel, Eva; Baeza-Brotons, Francisco; Garcés, Pedro; Zornoza, Emilio

    2014-04-21

    The main strategy to reduce the environmental impact of the concrete industry is to reuse the waste materials. This research has considered the combination of cement replacement by industrial by-products, and natural coarse aggregate substitution by recycled aggregate. The aim is to evaluate the behavior of concretes with a reduced impact on the environment by replacing a 50% of cement by industrial by-products (15% of spent fluid catalytic cracking catalyst and 35% of fly ash) and a 100% of natural coarse aggregate by recycled aggregate. The concretes prepared according to these considerations have been tested in terms of mechanical strengths and the protection offered against steel reinforcement corrosion under carbonation attack and chloride-contaminated environments. The proposed concrete combinations reduced the mechanical performance of concretes in terms of elastic modulus, compressive strength, and flexural strength. In addition, an increase in open porosity due to the presence of recycled aggregate was observed, which is coherent with the changes observed in mechanical tests. Regarding corrosion tests, no significant differences were observed in the case of the resistance of these types of concretes under a natural chloride attack. In the case of carbonation attack, although all concretes did not stand the highly aggressive conditions, those concretes with cement replacement behaved worse than Portland cement concretes.

  11. Pest Control on the "Fly"

    NASA Technical Reports Server (NTRS)

    2002-01-01

    FlyCracker(R), a non-toxic and environmentally safe pesticide, can be used to treat and control fly problems in closed environments such as milking sheds, cattle barns and hutches, equine stables, swine pens, poultry plants, food-packing plants, and even restaurants, as well as in some outdoor animal husbandry environments. The product can be applied safely in the presence of animals and humans, and was recently permitted for use on organic farms as livestock production aids. FlyCracker's carbohydrate technology kills fly larvae within 24 hours. By killing larvae before they reach the adult stages, FlyCracker eradicates another potential breeding population. Because the process is physical-not chemical-flies and other insects never develop resistance to the treatment, giving way to unlimited use of product, while still keeping the same powerful effect.

  12. Modeling, simulation, and flight characteristics of an aircraft designed to fly at 100,000 feet

    NASA Technical Reports Server (NTRS)

    Sim, Alex G.

    1991-01-01

    A manned real time simulation of a conceptual vehicle, the stratoplane, was developed to study the problems associated with the flight characteristics of a large, lightweight vehicle. Mathematical models of the aerodynamics, mass properties, and propulsion system were developed in support of the simulation and are presented. The simulation was at first conducted without control augmentation to determine the needs for a control system. The unaugmented flying qualities were dominated by lightly damped dutch roll oscillations. Constant pilot workloads were needed at high altitudes. Control augmentation was studied using basic feedbacks. For the longitudinal axis, flight path angle, and pitch rate feedback were sufficient to damp the phugoid mode and to provide good flying qualities. In the lateral directional axis, bank angle, roll rate, and yaw rate feedbacks were sufficient to provide a safe vehicle with acceptable handling qualities. Intentionally stalling the stratoplane to very high angles of attack (deep stall) was studied as a means of enable safe and rapid descent. It was concluded that the deep stall maneuver is viable for this class of vehicle.

  13. FliH and FliI ensure efficient energy coupling of flagellar type III protein export in Salmonella.

    PubMed

    Minamino, Tohru; Kinoshita, Miki; Inoue, Yumi; Morimoto, Yusuke V; Ihara, Kunio; Koya, Satomi; Hara, Noritaka; Nishioka, Noriko; Kojima, Seiji; Homma, Michio; Namba, Keiichi

    2016-06-01

    For construction of the bacterial flagellum, flagellar proteins are exported via its specific export apparatus from the cytoplasm to the distal end of the growing flagellar structure. The flagellar export apparatus consists of a transmembrane (TM) export gate complex and a cytoplasmic ATPase complex consisting of FliH, FliI, and FliJ. FlhA is a TM export gate protein and plays important roles in energy coupling of protein translocation. However, the energy coupling mechanism remains unknown. Here, we performed a cross-complementation assay to measure robustness of the energy transduction system of the export apparatus against genetic perturbations. Vibrio FlhA restored motility of a Salmonella ΔflhA mutant but not that of a ΔfliH-fliI flhB(P28T) ΔflhA mutant. The flgM mutations significantly increased flagellar gene expression levels, allowing Vibrio FlhA to exert its export activity in the ΔfliH-fliI flhB(P28T) ΔflhA mutant. Pull-down assays revealed that the binding affinities of Vibrio FlhA for FliJ and the FlgN-FlgK chaperone-substrate complex were much lower than those of Salmonella FlhA. These suggest that Vibrio FlhA requires the support of FliH and FliI to efficiently and properly interact with FliJ and the FlgN-FlgK complex. We propose that FliH and FliI ensure robust and efficient energy coupling of protein export during flagellar assembly. © 2016 The Authors. MicrobiologyOpen published by John Wiley & Sons Ltd.

  14. Releases of Psyttalia fletcheri (Hymenoptera: Braconidae) and sterile flies to suppress melon fly (Diptera: Tephritidae) in Hawaii.

    PubMed

    Vargas, Roger I; Long, Jay; Miller, Neil W; Delate, Kathleen; Jackson, Charles G; Uchida, Grant K; Bautista, Renato C; Harris, Ernie J

    2004-10-01

    Ivy gourd, Coccinia grandis (L.) Voigt, patches throughout Kailua-Kona, Hawaii Island, HI, were identified as persistent sources of melon fly, Bactrocera cucurbitae (Coquillett). These patches had a low incidence of Psyttalia fletcheri (Silvestri), its major braconid parasitoid natural enemy in Hawaii, and were used to evaluate augmentative releases of P. fletcheri against melon fly. In field cage studies of releases, numbers of melon flies emerging from ivy gourd fruit placed inside treatment cages were reduced up to 21-fold, and numbers of parasitoids were increased 11-fold. In open field releases of P. fletcheri into ivy gourd patches, parasitization rates were increased 4.7 times in release plots compared with those in control plots. However, there was no significant reduction in emergence of melon flies from fruit. In subsequent cage tests with sterile melon flies and P. fletcheri, combinations of sterile flies and P. fletcheri produced the greatest reduction (9-fold) in melon fly emergence from zucchini, Cucurbita pepo L. Reductions obtained with sterile flies alone or in combination with parasitoids were significantly greater than those in the control, whereas those for parasitoids alone were not. Although these results suggest that the effects of sterile flies were greater than those for parasitoids, from a multitactic melon fly management strategy, sterile flies would complement the effects of P. fletcheri. Cost and sustainability of these nonchemical approaches will be examined further in an ongoing areawide pest management program for melon fly in Hawaii.

  15. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  16. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  17. Corrosion of 316 stainless steel in high temperature molten Li2BeF4 (FLiBe) salt

    NASA Astrophysics Data System (ADS)

    Zheng, Guiqiu; Kelleher, Brian; Cao, Guoping; Anderson, Mark; Allen, Todd; Sridharan, Kumar

    2015-06-01

    In support of structural material development for the fluoride-salt-cooled high-temperature reactor (FHR), corrosion tests of 316 stainless steel were performed in the potential primary coolant, molten Li2BeF4 (FLiBe) at 700 °C for an exposure duration up to 3000 h. Tests were performed in both 316 stainless steel and graphite capsules. Corrosion in both capsule materials occurred by the dissolution of chromium from the stainless steel into the salt which led to the depletion of chromium predominantly along the grain boundaries of the test samples. The samples tested in graphite capsules showed a factor of two greater depth of corrosion attack as measured in terms of chromium depletion, compared to those tested in 316 stainless steel capsules. The samples tested in graphite capsules showed the formation of Cr7C3 particulate phases throughout the depth of the corrosion layer. Samples tested in both types of capsule materials showed the formation of MoSi2 phase due to increased activity of Mo and Si as a result of Cr depletion, and furthermore corrosion promoted the formation of a α-ferrite phase in the near-surface regions of the 316 stainless steel. Based on the corrosion tests, the corrosion attack depth in FLiBe salt was predicted as 17.1 μm/year and 31.2 μm/year for 316 stainless steel tested in 316 stainless steel and in graphite capsules respectively. It is in an acceptable range compared to the Hastelloy-N corrosion in the Molten Salt Reactor Experiment (MSRE) fuel salt.

  18. Dyke-sill relationships in Karoo dolerites as indicators of propagation and emplacement processes of mafic magmas in the shallow crust

    NASA Astrophysics Data System (ADS)

    Coetzee, A.; Kisters, A. F. M.

    2017-04-01

    This paper describes the spatial and temporal relationships between Karoo-age (ca. 180 Ma) dolerite dykes and a regional-scale saucer-sill complex from the Secunda (coal mine) Complex in the northeastern parts of the Karoo Basin of South Africa. Unlike parallel dyke swarms of regional extensional settings, mafic dykes commonly show curved geometries and highly variable orientations, short strike extents and complex cross-cutting and intersecting relationships. Importantly, the dyke networks originate from the upper contacts of the first-order dolerite sill-saucer structure and are not the feeders of the saucer complex. Cross-cutting relationships indicate the largely contemporaneous formation of dykes and the inner sill and inclined sheets of the underlying saucer. Systematic dykes form a distinct boxwork-type pattern of two high-angle, interconnected dyke sets. The formation and orientation of this dyke set is interpreted to be related to the stretching of roof strata above elongated magma lobes that facilitated the propagation of the inner sill, similar to the "cracked lid" model described for large saucer complexes in Antarctica. Dyke patterns generally reflect the saucer emplacement process and the associated deformation of wall rocks rather than far-field regional stresses.

  19. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    NASA Astrophysics Data System (ADS)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  20. Pericarditis - after heart attack

    MedlinePlus

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  1. WILD PIG ATTACKS ON HUMANS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mayer, J.

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animalsmore » were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.« less

  2. A New Human-Biting Black Fly Species of Simulium (Simulium) (Diptera: Simuliidae) From Thailand.

    PubMed

    Takaoka, Hiroyuki; Srisuka, Wichai; Saeung, Atiporn

    2017-07-01

    Simulium (Simulium) umphangense, a new human-biting species of black fly, is described based on females captured while attacking humans in western and central Thailand. The female of this new species is similar to those of S. (S.) indicum Becher, S. (S.) nigrogilvum Summers, and S. (S.) vanellum Huang et al. in the Simulium griseifrons species-group of the subgenus Simulium Latreille in having the frons densely covered with golden-yellow short hairs, a character rarely found in the subgenus Simulium. This new species is readily distinguished from the three related species by having a darkened fore tibia, a bare subcosta (or rarely with a few hairs), and an ovipositor valve not protruded posteriorly. Additional diagnostic characters of this new species are noted. This is the seventh human-biting species of black fly in Thailand. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com Version of Record, first published online April 7, 2017 with fixed content and layout in compliance with Art. 8.1.3.2 ICZN.

  3. Web Forms and Untraceable DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  4. Heart Attack - Multiple Languages

    MedlinePlus

    ... Heart Attack - العربية (Arabic) Bilingual PDF Health Information Translations Bosnian (bosanski) Expand Section Heart Attack - bosanski (Bosnian) Bilingual PDF Health Information Translations Chinese, Simplified (Mandarin dialect) (简体中文) Expand Section Heart ...

  5. Detection of fly ash in Portland cement fly ash concrete : final report.

    DOT National Transportation Integrated Search

    1991-12-01

    The chemical composition, phases present, and textural characteristics of suite of 113 fly ashes were studied. The fly ashes came from Gifford-Hill & Co., Inc. power plants in Cason, TX; Gentry, AR; Westlake, LA; Boyce, LA; Choteau, OK and Oologah, O...

  6. Suicide Bombing Attacks

    PubMed Central

    Almogy, Gidon; Belzberg, Howard; Mintz, Yoaz; Pikarsky, Alon K.; Zamir, Gideon; Rivkind, Avraham I.

    2004-01-01

    Objective: To review the experience of a large-volume trauma center in managing and treating casualties of suicide bombing attacks. Summary Background Data: The threat of suicide bombing attacks has escalated worldwide. The ability of the suicide bomber to deliver a relatively large explosive load accompanied by heavy shrapnel to the proximity of his or her victims has caused devastating effects. Methods: The authors reviewed and analyzed the experience obtained in treating victims of suicide bombings at the level I trauma center of the Hadassah University Hospital in Jerusalem, Israel from 2000 to 2003. Results: Evacuation is usually rapid due to the urban setting of these attacks. Numerous casualties are brought into the emergency department over a short period. The setting in which the device is detonated has implications on the type of injuries sustained by survivors. The injuries sustained by victims of suicide bombing attacks in semi-confined spaces are characterized by the degree and extent of widespread tissue damage and include multiple penetrating wounds of varying severity and location, blast injury, and burns. Conclusions: The approach to victims of suicide bombings is based on the guidelines for trauma management. Attention is given to the moderately injured, as these patients may harbor immediate life-threatening injuries. The concept of damage control can be modified to include rapid packing of multiple soft-tissue entry sites. Optimal utilization of manpower and resources is achieved by recruiting all available personnel, adopting a predetermined plan, and a centrally coordinated approach. Suicide bombing attacks seriously challenge the most experienced medical facilities. PMID:15075644

  7. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  8. Predicting Factors of Zone 4 Attack in Volleyball.

    PubMed

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  9. Investigation of the Flying Mock-Up of Consolidated Vultee XP-92 Airplane in the Ames 40- by 80-Foot Wind Tunnel: Pressure Distributions

    NASA Technical Reports Server (NTRS)

    Graham, David

    1948-01-01

    This report contains the results of the wind tunnel investigation of the pressure distribution on the flying mock-up of the Consolidated Vultee XP-92 airplane. Data are presented for the pressure distribution over the wing, vertical tail and the fuselage, and for the pressure loss and rate of flow through the ducted fuselage. Data are also presented for the calibration of two airspeed indicators, and for the calibration of angle-of-attack and sideslip-angle indicator vanes.

  10. Blood feeding behavior of the stable fly

    USDA-ARS?s Scientific Manuscript database

    Stable fly is a fly that looks similar to a house fly but both sexes are blood feeders. Blood is required for successful fertilization and development of eggs. Bites are painful but there is usually no pain after the fly stops feeding. The stable fly is a persistent feeder and will continue trying t...

  11. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    PubMed

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  12. A Novel Method for Tracking Individuals of Fruit Fly Swarms Flying in a Laboratory Flight Arena.

    PubMed

    Cheng, Xi En; Qian, Zhi-Ming; Wang, Shuo Hong; Jiang, Nan; Guo, Aike; Chen, Yan Qiu

    2015-01-01

    The growing interest in studying social behaviours of swarming fruit flies, Drosophila melanogaster, has heightened the need for developing tools that provide quantitative motion data. To achieve such a goal, multi-camera three-dimensional tracking technology is the key experimental gateway. We have developed a novel tracking system for tracking hundreds of fruit flies flying in a confined cubic flight arena. In addition to the proposed tracking algorithm, this work offers additional contributions in three aspects: body detection, orientation estimation, and data validation. To demonstrate the opportunities that the proposed system offers for generating high-throughput quantitative motion data, we conducted experiments on five experimental configurations. We also performed quantitative analysis on the kinematics and the spatial structure and the motion patterns of fruit fly swarms. We found that there exists an asymptotic distance between fruit flies in swarms as the population density increases. Further, we discovered the evidence for repulsive response when the distance between fruit flies approached the asymptotic distance. Overall, the proposed tracking system presents a powerful method for studying flight behaviours of fruit flies in a three-dimensional environment.

  13. Securing internet by eliminating DDOS attacks

    NASA Astrophysics Data System (ADS)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  14. Filthy Flies? Experiments to Test Flies as Vectors of Bacterial Disease

    ERIC Educational Resources Information Center

    Shaffer, Julie J.; Warner, Kasey Jo; Hoback, W. Wyatt

    2007-01-01

    For more than 75 years, flies and other insects have been known to serve as mechanical vectors of infectious disease (Hegner, 1926). Flies have been shown to harbor over 100 different species of potentially pathogenic microorganisms and are known to transmit more than 65 infectious diseases (Greenberg, 1965). This laboratory exercise is a simple…

  15. Treatment of fly ash for use in concrete

    DOEpatents

    Boxley, Chett [Park City, UT; Akash, Akash [Salt lake City, UT; Zhao, Qiang [Natick, MA

    2012-05-08

    A process for treating fly ash to render it highly usable as a concrete additive. A quantity of fly ash is obtained that contains carbon and which is considered unusable fly ash for concrete based upon foam index testing. The fly ash is mixed with an activator solution sufficient to initiate a geopolymerization reaction and for a geopolymerized fly ash. The geopolymerized fly ash is granulated. The geopolymerized fly ash is considered usable fly ash for concrete according to foam index testing. The geopolymerized fly ash may have a foam index less than 35% of the foam index of the untreated fly ash, and in some cases less than 10% of the foam index of the untreated fly ash. The activator solution may contain an alkali metal hydroxide, carbonate, silicate, aluminate, or mixtures thereof.

  16. Treatment of fly ash for use in concrete

    DOEpatents

    Boxley, Chett; Akash, Akash; Zhao, Qiang

    2013-01-08

    A process for treating fly ash to render it highly usable as a concrete additive. A quantity of fly ash is obtained that contains carbon and which is considered unusable fly ash for concrete based upon foam index testing. The fly ash is mixed with an activator solution sufficient to initiate a geopolymerization reaction and for a geopolymerized fly ash. The geopolymerized fly ash is granulated. The geopolymerized fly ash is considered usable fly ash for concrete according to foam index testing. The geopolymerized fly ash may have a foam index less than 35% of the foam index of the untreated fly ash, and in some cases less than 10% of the foam index of the untreated fly ash. The activator solution may contain an alkali metal hydroxide, carbonate, silicate, aluminate, or mixtures thereof.

  17. Corrosion Behavior of Steel Reinforcement in Concrete with Recycled Aggregates, Fly Ash and Spent Cracking Catalyst

    PubMed Central

    Gurdián, Hebé; García-Alcocel, Eva; Baeza-Brotons, Francisco; Garcés, Pedro; Zornoza, Emilio

    2014-01-01

    The main strategy to reduce the environmental impact of the concrete industry is to reuse the waste materials. This research has considered the combination of cement replacement by industrial by-products, and natural coarse aggregate substitution by recycled aggregate. The aim is to evaluate the behavior of concretes with a reduced impact on the environment by replacing a 50% of cement by industrial by-products (15% of spent fluid catalytic cracking catalyst and 35% of fly ash) and a 100% of natural coarse aggregate by recycled aggregate. The concretes prepared according to these considerations have been tested in terms of mechanical strengths and the protection offered against steel reinforcement corrosion under carbonation attack and chloride-contaminated environments. The proposed concrete combinations reduced the mechanical performance of concretes in terms of elastic modulus, compressive strength, and flexural strength. In addition, an increase in open porosity due to the presence of recycled aggregate was observed, which is coherent with the changes observed in mechanical tests. Regarding corrosion tests, no significant differences were observed in the case of the resistance of these types of concretes under a natural chloride attack. In the case of carbonation attack, although all concretes did not stand the highly aggressive conditions, those concretes with cement replacement behaved worse than Portland cement concretes. PMID:28788613

  18. Complete Description of Forces Acting on a Flying Beach Volleyball

    NASA Astrophysics Data System (ADS)

    Dumek, Jan; Šafařík, Pavel

    2018-06-01

    Complete description of all forces acting on a flying Beach Volleyball was made based on measurements in the wind tunnel. Forces (drag, lift and side force) were measured for different angle of attack β which varies from 0° to 47°. Velocity region was from 10 to 25 m/s and revolution region was from 0 to 12.5 rps. Moments (Roll, Yaw, Pitch) were detected. Results are described by means of non-dimensional numbers, such as Reynolds number Re, spin s, drag CD, lift CL and side force CS coefficients. Differences in results of CD, CL and CS were detected for various angle β and are further described in the article. Conclusions of the investigation can be utilized 1st by ball producers for practical use in development, 2nd for sport Methodist to build more exact methodology for Beach Volleyball, 3rd in basic and applied aerodynamic research.

  19. Molecular characterization and immunolocalization of the olfactory co-recepter Orco from two blood-feeding muscid flies, the stable fly (Stomoxys calcitrans, L.) and the horn fly (Haematobia irritans irritans, L.)

    PubMed Central

    Olafson, Pia Untalan

    2012-01-01

    Biting flies are economically important, blood-feeding pests of medical and veterinary significance. Chemosensory-based biting fly behaviors, such as host/nutrient source localization and ovipositional site selection, are intriguing targets for the development of supplemental control strategies. In an effort to expand our understanding of biting fly chemosensory pathways, transcripts encoding the highly conserved insect odorant co-receptor (Orco) were isolated from two representative biting fly species, the stable fly (Scal\\Orco) and the horn fly (Hirr\\Orco). Orco forms a complex with an odor-specific odorant receptor to form an odor-gated ion channel. The biting fly transcripts were predicted to encode proteins with 87% – 94% amino acid similarity to published insect Orco sequences and were detected in various immature stages as well as in adult structures associated with olfaction, i.e. antennae and maxillary palps, and gustation, i.e. proboscis. Further, the relevant proteins were immunolocalized to specific antennal sensilla using anti-serum raised against a peptide sequence conserved between the two fly species. Results from this study provide a basis for functional evaluation of repellent/attractant effects on as yet uncharacterized stable fly and horn fly conventional odorant receptors. PMID:23278866

  20. Role of insects in the transmission of bovine leukosis virus: potential for transmission by stable flies, horn flies, and tabanids.

    PubMed

    Buxton, B A; Hinkle, N C; Schultz, R D

    1985-01-01

    The ability of stable flies (Stomoxys calcitrans), horn flies (Haematobia irritans), and tabanids (Diptera: Tabanidae) to transmit bovine leukosis virus (BLV) was investigated. Stable flies and horn flies were fed on blood collected from an infected cow, and the flies' mouthparts were immediately removed, placed in RPMI-1640 medium, ground, and inoculated into sheep and calves. Infection of sheep occurred with mouthparts from as few as 25 stable flies or 25 horn flies. However, sheep were not infected when removal of stable fly mouthparts was delayed greater than or equal to 1 hour after blood feeding. Infection of calves occurred after inoculation of mouthparts removed immediately after feeding from as few as 50 stable flies or 100 horn flies. Infected blood, applied by capillary action to the mouthparts (labella) of 15 deer flies (Chrysops sp) and a single horse fly (Tabanus atratus) caused infection in each of 2 sheep. Infection did not occur in 2 calves inoculated daily for 5 days with mouthparts from 50 horn flies collected after feeding on a BLV-infected steer. Four calves receiving bites from 75 stable flies interrupted from feeding on a BLV-positive cow also were not infected. Seronegative cattle held for 1 to 4 months in a screened enclosure with positive cattle in the presence of biting flies were not infected with BLV. The feeding behavior of each insect is discussed to assess their potential as vectors of BLV.

  1. Pestiferous nature, resting sites, aggregation, and host-seeking behavior of the eye fly Siphunculina funicola (Diptera: Chloropidae) in Thailand.

    PubMed

    Mulla, Mir S; Chansang, Uruyakorn

    2007-12-01

    Species of eye flies and eye gnats (Diptera: Chloropidae) are severe and persistent pests of man, domestic and wild animals, and potential vectors of pathogens. The species prevailing in the Oriental region belong to the genus Siphunculina, while those in the Neotropic and Nearctic regions belong to Liohippelates and Hippelates. These are small insects of 1-2 mm that feed on wounds, lacerations, scratches, and mucous membranes of man and higher animals. One species, Siphunculina funicola, commonly known as the Oriental eye fly, is considered the most anthropophilic in the genus, with potential involvement in the spread and mechanical transmission of infectious agents to humans and animals. Very little is known about the biology, prevalence, host-seeking, and aggregation behavior of this species in South and Southeast Asia. We initiated studies on biological aspects of this potential vector and human pest in central Thailand. The most significant findings of our study were the aggregation behaviors of S. funicola, that both sexes attack hosts, and that males outnumbered females attacking humans, dogs, and other domestic animals. They feed on wounds, scabs, lacerations, eyes, and mucous membranes. They hover around and feed on hosts during the daylight hours when host-seeking activities are more pronounced at temperatures above 25-27 degrees C under calm conditions. We noted that large masses of males and females aggregated on a variety of hanging objects such as strings, trailings, electrical lines, decorations, ropes, twines, abandoned cob webs, clothes hangers, and other hanging substrates in open shade of structures and dwellings. This behavior of eye flies brings them closer to human and animal hosts. In these aggregations, both males and females were present, with mating pairs frequently noted. In the aggregations, about 37% of the females had fully developed eggs in the rainy season, but only <1-3.6% were gravid in the hot and dry season. The average number of

  2. [Heart-attack in pregnancy].

    PubMed

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  3. Treatment of fly ash for use in concrete

    DOEpatents

    Boxley, Chett [Park City, UT

    2012-05-15

    A process for treating fly ash to render it highly usable as a concrete additive. A quantity of fly ash is obtained that contains carbon and which is considered unusable fly ash for concrete based upon foam index testing. The fly ash is mixed with a quantity of spray dryer ash (SDA) and water to initiate a geopolymerization reaction and form a geopolymerized fly ash. The geopolymerized fly ash is granulated. The geopolymerized fly ash is considered usable fly ash for concrete according to foam index testing. The geopolymerized fly ash may have a foam index less than 40%, and in some cases less than 20%, of the foam index of the untreated fly ash. An optional alkaline activator may be mixed with the fly ash and SDA to facilitate the geopolymerization reaction. The alkaline activator may contain an alkali metal hydroxide, carbonate, silicate, aluminate, or mixtures thereof.

  4. Improving the Rainbow Attack by Reusing Colours

    NASA Astrophysics Data System (ADS)

    Ågren, Martin; Johansson, Thomas; Hell, Martin

    Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.

  5. Identifying Electromagnetic Attacks against Airports

    NASA Astrophysics Data System (ADS)

    Kreth, A.; Genender, E.; Doering, O.; Garbe, H.

    2012-05-01

    This work presents a new and sophisticated approach to detect and locate the origin of electromagnetic attacks. At the example of an airport, a normal electromagnetic environment is defined, in which electromagnetic attacks shall be identified. After a brief consideration of the capabilities of high power electromagnetic sources to produce high field strength values, this contribution finally presents the approach of a sensor network, realizing the identification of electromagnetic attacks.

  6. A Novel Method for Tracking Individuals of Fruit Fly Swarms Flying in a Laboratory Flight Arena

    PubMed Central

    Cheng, Xi En; Qian, Zhi-Ming; Wang, Shuo Hong; Jiang, Nan; Guo, Aike; Chen, Yan Qiu

    2015-01-01

    The growing interest in studying social behaviours of swarming fruit flies, Drosophila melanogaster, has heightened the need for developing tools that provide quantitative motion data. To achieve such a goal, multi-camera three-dimensional tracking technology is the key experimental gateway. We have developed a novel tracking system for tracking hundreds of fruit flies flying in a confined cubic flight arena. In addition to the proposed tracking algorithm, this work offers additional contributions in three aspects: body detection, orientation estimation, and data validation. To demonstrate the opportunities that the proposed system offers for generating high-throughput quantitative motion data, we conducted experiments on five experimental configurations. We also performed quantitative analysis on the kinematics and the spatial structure and the motion patterns of fruit fly swarms. We found that there exists an asymptotic distance between fruit flies in swarms as the population density increases. Further, we discovered the evidence for repulsive response when the distance between fruit flies approached the asymptotic distance. Overall, the proposed tracking system presents a powerful method for studying flight behaviours of fruit flies in a three-dimensional environment. PMID:26083385

  7. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  8. Hybrid attacks on model-based social recommender systems

    NASA Astrophysics Data System (ADS)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  9. Ultrasonic Vocalizations Emitted by Flying Squirrels

    PubMed Central

    Murrant, Meghan N.; Bowman, Jeff; Garroway, Colin J.; Prinzen, Brian; Mayberry, Heather; Faure, Paul A.

    2013-01-01

    Anecdotal reports of ultrasound use by flying squirrels have existed for decades, yet there has been little detailed analysis of their vocalizations. Here we demonstrate that two species of flying squirrel emit ultrasonic vocalizations. We recorded vocalizations from northern (Glaucomys sabrinus) and southern (G. volans) flying squirrels calling in both the laboratory and at a field site in central Ontario, Canada. We demonstrate that flying squirrels produce ultrasonic emissions through recorded bursts of broadband noise and time-frequency structured frequency modulated (FM) vocalizations, some of which were purely ultrasonic. Squirrels emitted three types of ultrasonic calls in laboratory recordings and one type in the field. The variety of signals that were recorded suggest that flying squirrels may use ultrasonic vocalizations to transfer information. Thus, vocalizations may be an important, although still poorly understood, aspect of flying squirrel social biology. PMID:24009728

  10. Do Unexpected Panic Attacks Occur Spontaneously?

    PubMed Central

    Meuret, Alicia E.; Rosenfield, David; Wilhelm, Frank H.; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T.

    2012-01-01

    Background Spontaneous or unexpected panic attacks, per definition, occur out-of-the blue, in absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of or during the attack, but not preceding it. To test this hypothesisweexaminedif points of significant autonomic changes preceded the onset of spontaneous panic attacks. Methods Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen naturally panic attacks were recorded during 1,960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before, and continuing to 10 minutes after, the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization, and compared to time matched control periods within the same person. Results Significant patterns of instability across a numberof autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes prior to onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt PCO2 increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in PCO2. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before and duringthe attacks. Changes in the matched control periods were largely absent. Conclusions Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction betweenuncuedand cued panic attacks. PMID:21783179

  11. Protection via parasitism: Datura odors attract parasitoid flies, which inhibit Manduca larvae from feeding and growing but may not help plants.

    PubMed

    Wilson, J K; Woods, H A

    2015-12-01

    Insect carnivores frequently use olfactory cues from plants to find prey or hosts. For plants, the benefits of attracting parasitoids have been controversial, partly because parasitoids often do not kill their host insect immediately. Furthermore, most research has focused on the effects of solitary parasitoids on growth and feeding of hosts, even though many parasitoids are gregarious (multiple siblings inhabit the same host). Here, we examine how a gregarious parasitoid, the tachinid fly Drino rhoeo, uses olfactory cues from the host plant Datura wrightii to find the sphingid herbivore Manduca sexta, and how parasitism affects growth and feeding of host larvae. In behavioral trials using a Y-olfactometer, female flies were attracted to olfactory cues emitted by attacked plants and by cues emitted from the frass produced by larval Manduca sexta. M. sexta caterpillars that were parasitized by D. rhoeo grew to lower maximum weights, grew more slowly, and ate less of their host plant. We also present an analytical model to predict how tri-trophic interactions change with varying herbivory levels, parasitization rates and plant sizes. This model predicted that smaller plants gain a relatively greater benefit compared to large plants in attracting D. rhoeo. By assessing the behavior, the effects of host performance, and the variation in ecological parameters of the system, we can better understand the complex interactions between herbivorous insects, the plants they live on and the third trophic level members that attack them.

  12. On Patarin's Attack against the lIC Scheme

    NASA Astrophysics Data System (ADS)

    Ogura, Naoki; Uchiyama, Shigenori

    In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.

  13. Attacks on public telephone networks: technologies and challenges

    NASA Astrophysics Data System (ADS)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  14. 76 FR 18419 - Movement of Hass Avocados From Areas Where Mediterranean Fruit Fly or South American Fruit Fly Exist

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... Avocados From Areas Where Mediterranean Fruit Fly or South American Fruit Fly Exist AGENCY: Animal and... Mediterranean fruit fly quarantined areas in the United States with a certificate if the fruit is safeguarded... quarantine regulations to remove trapping requirements for Mediterranean fruit fly for Hass avocados imported...

  15. Use Of Fly Iarvae In Space Agriculture

    NASA Astrophysics Data System (ADS)

    Katayama, Naomi; Mitsuhashi, Jun; Hachiya, Natumi; Miyashita, Sachiko; Hotta, Atuko

    The concept of space agriculture is full use of biological and ecological components ot drive materials recycle loop. In an ecological system, producers, consumers and decomposers are its member. At limited resources acailable for space agriculture, full use of members' function is required to avoid food shortage and catastrophe.Fly is categrized to a decomposer at its eating excreta and rotten materials. However, is it could be edible, certainly it is eaten in several food culture of the world, it functions as a converter of inedible biomass ot edible substance. This conversion enhances the efficiency of usage of resource that will be attributed to space agriculture. In this context, we examine the value of melon fly, Dacus cucurbitae, as a candidate fly species ofr human food. Nutrients in 100g of melon fly larvae were protein 12g, lipid 4.6g Fe 4.74mg, Ca 275mg, Zn 6.37mg, Mn 4.00mg. Amino acids compositon in 100g of larvae was glutamic acid 1.43g and aspartic acid 1.12g. Because of high contents of these amino acids taste of fly larva might be good. Life time of adult melon fly is one to two month, and lays more than 1,000 eggs in total during the life. Larvae hatch after one to two days, and metamorphose after 8 to 15 days to pupae. Srxual maturity is reached after 22 days the earliest from it egg. Sixteen generations could be succeeded in a year for melon fly at maximum. The rate of proliferation of fly is quite high compared to silkworm that can have 8.7 generations per year. The wide food habit of fly, compared to mulberry leaf for silkworm, is another advantage to choose fly for entomophage. Rearing technology of melon fly is well established, since large scaled production of sterile male fly has been conducted in order ot exterminate melon fly in the field. Feeding substance for melon fly larvae in production line is a mixture of wheat, bran, raw sugar, olara, beer yeast, tissue paper, and additive chemicals. A 1 kg of feed substance can be converted to

  16. A Flying Summer Camp

    ERIC Educational Resources Information Center

    Mercurio, Frank X.

    1975-01-01

    Describes a five-day summer camp which provided 12 children, ages 9-14, with a complete flying experience. The training consisted of ground school and one hour actual flying time, including the basics of aircraft control and a flight prepared and executed by the students. (MLH)

  17. 76 FR 26654 - Movement of Hass Avocados From Areas Where Mediterranean Fruit Fly or South American Fruit Fly Exist

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-09

    ... Fly or South American Fruit Fly Exist AGENCY: Animal and Plant Health Inspection Service, USDA. ACTION... Mediterranean fruit fly quarantined areas in the United States with a certificate if the fruit is safeguarded... regulations to remove trapping requirements for Mediterranean fruit fly for Hass avocados imported from the...

  18. Extract of the seeds of the plant Vitex agnus castus proven to be highly efficacious as a repellent against ticks, fleas, mosquitoes and biting flies.

    PubMed

    Mehlhorn, Heinz; Schmahl, Günter; Schmidt, Jürgen

    2005-03-01

    About 70 plant extracts were tested for their ability to repel the attacks of blood-sucking arthropods. It was found that a CO2 extract of the seeds of the Mediterranean plant Vitex agnus castus (monk's pepper) can be used as a spray to keep away especially Ixodes ricinus and Rhipicephalus sanguineus ticks from animals and humans for at least 6 h. In addition mosquitoes, biting flies and fleas are also repelled for about 6 h.

  19. Drop or fly? Negative genetic correlation between death-feigning intensity and flying ability as alternative anti-predator strategies

    PubMed Central

    Ohno, Tatsunori; Miyatake, Takahisa

    2006-01-01

    A prey animal may have the alternative of flying away or feigning death when it encounters predators. These alternatives have a genetic base as anti-predator strategies in the adzuki bean beetle, Callosobruchus chinensis. A negative genetic correlation between death-feigning intensity and flying ability was found in C. chinensis, i.e. lower flying ability is genetically connected to escaping by dropping from a perch and then feigning death, whereas higher flying ability does not correspond to death-feigning behaviour. Two bidirectional artificial selections for death-feigning duration and flying ability were conducted independently in C. chinensis. The strains selected for shorter (longer) duration of death-feigning had higher (lower) flying ability, while the strains selected for lower (higher) flying ability showed longer (shorter) duration of death-feigning. When the two traits were compared in 21 populations of C. chinensis derived from different geographical regions, a significant negative correlation was found between death-feigning intensity and flying ability. Based on these results, the choice between alternative escaping behaviours in animals is discussed from two points of view: phenotypic plasticity, an individual with two tactics; and pleiotropic genetic correlation, different individuals with opposite strategies. PMID:17476776

  20. Toxicity of insecticides to tsetse flies

    PubMed Central

    Hadaway, A. B.

    1972-01-01

    New insecticides have been evaluated for toxicity to tsetse flies and compared with organochlorine compounds currently in use. The most toxic compounds and their estimated median lethal doses in nanograms per fly by topical application in solution to teneral Glossina austeni were: resmethrin 4, fenthion 8, dieldrin 10, propoxur 12, chlorfenvinphos 12, tetrachlorvinphos 20, and dichlorvos 20. There was little variation in the susceptibility of teneral male and female flies, young fed flies, and fed stud males with all the compounds tested (dieldrin, resmethrin, tetrachlorvinphos, bromophos, and propoxur) and increased tolerance in old fed pregnant flies occurred only with dieldrin and resmethrin. There was also little variation in the susceptibility of teneral flies of the two species G. austeni and G. morsitans. In contact toxicity tests with water dispersible powder deposits on plywood, propoxur was highly active initially but lost its effectiveness after only a few weeks, whereas tetrachlorvinphos was less active initially but more persistent. PMID:4537853

  1. Activation of fly ash

    DOEpatents

    Corbin, David R.; Velenyi, Louis J.; Pepera, Marc A.; Dolhyj, Serge R.

    1986-01-01

    Fly ash is activated by heating a screened magnetic fraction of the ash in a steam atmosphere and then reducing, oxidizing and again reducing the hydrothermally treated fraction. The activated fly ash can be used as a carbon monoxide disproportionating catalyst useful in the production of hydrogen and methane.

  2. Activation of fly ash

    DOEpatents

    Corbin, D.R.; Velenyi, L.J.; Pepera, M.A.; Dolhyj, S.R.

    1986-08-19

    Fly ash is activated by heating a screened magnetic fraction of the ash in a steam atmosphere and then reducing, oxidizing and again reducing the hydrothermally treated fraction. The activated fly ash can be used as a carbon monoxide disproportionating catalyst useful in the production of hydrogen and methane.

  3. Cued Panic Attacks in Body Dysmorphic Disorder

    PubMed Central

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  4. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  5. Thrombolytic drugs for heart attack

    MedlinePlus

    ... gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... supply blood and oxygen to the heart. A heart attack can occur if a blood clot stops the ...

  6. Heart Attack Coronary Artery Disease

    MedlinePlus

    ... our e-newsletter! Aging & Health A to Z Heart Attack Coronary Artery Disease, Angina Basic Facts & Information What ... and oxygen supply; this is what causes a heart attack. If the damaged area is small, however, your ...

  7. First record of soybean stem fly Melanagromyza sojae (Diptera: Agromyzidae) in Paraguay confirmed by molecular evidence.

    PubMed

    Guedes, J V C; Arnemann, J A; Curioletti, L E; Burtet, L M; Ramírez-Paredes, M L; Noschang, D; Irala de Oliveira, F; Tay, W T

    2017-08-17

    We provided the first scientific record of Melanagromyza sojae (Zehntner, 1900), through molecular characterization of partial mtDNA COI gene, that confirms the occurrence of this pest in Paraguay. Previously reported in Brazil, an outbreak of larvae of M. sojae known as the soybean stem fly (SSF) that belongs to the family Agromyzidae, was also noted in soybean fields from the Canindeyú, Alto Paraná and Itapúa Departments in Paraguay. This pest is highly polyphagous, attacking various host plant species from the family Fabaceae, such as soybean and other beans. The implications of SSF detection in Paraguay are discussed in relation to the current soybean cultivation practices from this agriculturally important South American region, including Brazil.

  8. Panic Attack History and Smoking Topography

    PubMed Central

    Farris, Samantha G.; Brown, Lily A.; Goodwin, Renee D.; Zvolensky, Michael J.

    2016-01-01

    Background Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Method Participants (n = 124, Mage = 43.9, SD = 9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n = 35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Results Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Discussion Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. PMID:28033542

  9. Panic attack history and smoking topography.

    PubMed

    Farris, Samantha G; Brown, Lily A; Goodwin, Renee D; Zvolensky, Michael J

    2017-02-01

    Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Participants (n=124, M age =43.9, SD=9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n=35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  10. Strategies for the stabilization of longitudinal forward flapping flight revealed using a dynamically-scaled robotic fly.

    PubMed

    Elzinga, Michael J; van Breugel, Floris; Dickinson, Michael H

    2014-06-01

    The ability to regulate forward speed is an essential requirement for flying animals. Here, we use a dynamically-scaled robot to study how flapping insects adjust their wing kinematics to regulate and stabilize forward flight. The results suggest that the steady-state lift and thrust requirements at different speeds may be accomplished with quite subtle changes in hovering kinematics, and that these adjustments act primarily by altering the pitch moment. This finding is consistent with prior hypotheses regarding the relationship between body pitch and flight speed in fruit flies. Adjusting the mean stroke position of the wings is a likely mechanism for trimming the pitch moment at all speeds, whereas changes in the mean angle of attack may be required at higher speeds. To ensure stability, the flapping system requires additional pitch damping that increases in magnitude with flight speed. A compensatory reflex driven by fast feedback of pitch rate from the halteres could provide such damping, and would automatically exhibit gain scheduling with flight speed if pitch torque was regulated via changes in stroke deviation. Such a control scheme would provide an elegant solution for stabilization across a wide range of forward flight speeds.

  11. Pre-attack symptomatology and temperament as predictors of children's responses to the September 11 terrorist attacks.

    PubMed

    Lengua, Liliana J; Long, Anna C; Smith, Kimberlee I; Meltzoff, Andrew N

    2005-06-01

    The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Children's responses were assessed in a community sample of children in Seattle, Washington, participating in an ongoing study. Symptomatology and temperament assessed prior to the attacks were examined as prospective predictors of post-attack post-traumatic stress (PTS), anxiety, depression and externalizing problems. Children demonstrated PTS symptoms and worries at levels comparable to those in children directly experiencing disasters, with 77% of children reporting being worried, 68% being upset by reminders, and 39% having upsetting thoughts. The most common PTS symptom cluster was re-experiencing, and 8% of children met criteria consistent with PTSD. African-American children reported more avoidant PTS symptoms and being more upset by the attacks than European-American children. Girls reported being more upset than boys. Prior internalizing, externalizing, social competence and self-esteem were related to post-attack PTS; and child inhibitory control, assessed prior to the 9/11 attacks, demonstrated a trend towards an association with post-attack PTS symptoms controlling for prior levels of symptomatology. PTS predicted child-report anxiety and conduct problem symptoms at follow-up, approximately 6 months after 9/11. Children experiencing a major disaster at a distance or indirectly through media exposure demonstrated worries and PTS symptoms suggesting that communities need to attend to children's mental health needs in response to national or regional disasters. Pre-disaster symptomatology or low self-regulation may render children more vulnerable in response to a disaster, and immediate post-disaster responses predict subsequent symptomatology. These variables might be used in the identification of children in need of

  12. Are flying-foxes coming to town? Urbanisation of the spectacled flying-fox (Pteropus conspicillatus) in Australia.

    PubMed

    Tait, Jessica; Perotto-Baldivieso, Humberto L; McKeown, Adam; Westcott, David A

    2014-01-01

    Urbanisation of wildlife populations is a process with significant conservation and management implications. While urban areas can provide habitat for wildlife, some urbanised species eventually come into conflict with humans. Understanding the process and drivers of wildlife urbanisation is fundamental to developing effective management responses to this phenomenon. In Australia, flying-foxes (Pteropodidae) are a common feature of urban environments, sometimes roosting in groups of tens of thousands of individuals. Flying-foxes appear to be becoming increasingly urbanised and are coming into increased contact and conflict with humans. Flying-fox management is now a highly contentious issue. In this study we used monitoring data collected over a 15 year period (1998-2012) to examine the spatial and temporal patterns of association of spectacled flying-fox (Pteropus conspicillatus) roost sites (camps) with urban areas. We asked whether spectacled flying-foxes are becoming more urbanised and test the hypothesis that such changes are associated with anthropogenic changes to landscape structure. Our results indicate that spectacled flying-foxes were more likely to roost near humans than might be expected by chance, that over the period of the study the proportion of the flying-foxes in urban-associated camps increased, as did the number of urban camps. Increased urbanisation of spectacled flying-foxes was not related to changes in landscape structure or to the encroachment of urban areas on camps. Overall, camps tended to be found in areas that were more fragmented, closer to human habitation and with more urban land cover than the surrounding landscape. This suggests that urbanisation is a behavioural response rather than driven by habitat loss.

  13. Are Flying-Foxes Coming to Town? Urbanisation of the Spectacled Flying-Fox (Pteropus conspicillatus) in Australia

    PubMed Central

    Tait, Jessica; Perotto-Baldivieso, Humberto L.; McKeown, Adam; Westcott, David A.

    2014-01-01

    Urbanisation of wildlife populations is a process with significant conservation and management implications. While urban areas can provide habitat for wildlife, some urbanised species eventually come into conflict with humans. Understanding the process and drivers of wildlife urbanisation is fundamental to developing effective management responses to this phenomenon. In Australia, flying-foxes (Pteropodidae) are a common feature of urban environments, sometimes roosting in groups of tens of thousands of individuals. Flying-foxes appear to be becoming increasingly urbanised and are coming into increased contact and conflict with humans. Flying-fox management is now a highly contentious issue. In this study we used monitoring data collected over a 15 year period (1998–2012) to examine the spatial and temporal patterns of association of spectacled flying-fox (Pteropus conspicillatus) roost sites (camps) with urban areas. We asked whether spectacled flying-foxes are becoming more urbanised and test the hypothesis that such changes are associated with anthropogenic changes to landscape structure. Our results indicate that spectacled flying-foxes were more likely to roost near humans than might be expected by chance, that over the period of the study the proportion of the flying-foxes in urban-associated camps increased, as did the number of urban camps. Increased urbanisation of spectacled flying-foxes was not related to changes in landscape structure or to the encroachment of urban areas on camps. Overall, camps tended to be found in areas that were more fragmented, closer to human habitation and with more urban land cover than the surrounding landscape. This suggests that urbanisation is a behavioural response rather than driven by habitat loss. PMID:25295724

  14. CPAD: Cyber-Physical Attack Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ferragut, Erik M; Laska, Jason A

    The CPAD technology relates to anomaly detection and more specifically to cyber physical attack detection. It infers underlying physical relationships between components by analyzing the sensor measurements of a system. It then uses these measurements to detect signs of a non-physically realizable state, which is indicative of an integrity attack on the system. CPAD can be used on any highly-instrumented cyber-physical system to detect integrity attacks and identify the component or components compromised. It has applications to power transmission and distribution, nuclear and industrial plants, and complex vehicles.

  15. High-Speed Surface Reconstruction of Flying Birds Using Structured Light

    NASA Astrophysics Data System (ADS)

    Deetjen, Marc; Lentink, David

    2017-11-01

    Birds fly effectively through complex environments, and in order to understand the strategies that enable them to do so, we need to determine the shape and movement of their wings. Previous studies show that even small perturbations in wing shape have dramatic aerodynamic effects, but these shape changes have not been quantified automatically at high temporal and spatial resolutions. Hence, we developed a custom 3D surface mapping method which uses a high-speed camera to view a grid of stripes projected onto a flying bird. Because the light is binary rather than grayscale, and each frame is separately analyzed, this method can function at any frame rate with sufficient light. The method is automated, non-invasive, and able to measure a volume by simultaneously reconstructing from multiple views. We use this technique to reconstruct the 3D shape of the surface of a parrotlet during flapping flight at 3200 fps. We then analyze key dynamic parameters such as wing twist and angle of attack, and compute aerodynamic parameters such as lift and drag. While this novel system is designed to quantify bird wing shape and motion, it is adaptable for tracking other objects such as quickly deforming fish, especially those which are difficult to reconstruct using other 3D tracking methods. The presenter needs to leave by 3 pm on the final day of the conference (11/21) in order to make his flight. Please account for this in the scheduling if possible by scheduling the presentation earlier in the day or a different day.

  16. Alternative spawning strategy and temperature for larval emergence of longfin dace ( Agosia chrysogaster) in stream mesocosms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Troia, Matthew J.; Whitney, James E.; Gido, Keith B.

    2014-06-01

    To determine if the strategy of spawning in saucer-like depressions is obligate or facultative for longfin dace ( Agosia chrysogaster), we collected adults from four sites in the upper Gila River (southwestern New Mexico), stocked them in separate outdoor stream-mesocosms lined with cobble substrate, and made daily observations for the presence of saucer-nests and hatched larvae. Larvae were observed from three of the four mesocosms and emerged at temperatures ranging from 19.2 24.0 °C. Here, the absence of saucer-nests in all mesocosms throughout the study indicates that longfin dace can spawn over cobble substrate and have larvae hatch successfully, suggestingmore » that longfin dace can use an alternate spawning strategy when sand substrate is not available for construction of saucer-nests.« less

  17. Know the Warning Signs of a Heart Attack

    MedlinePlus

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  18. Autonomous Flying Controls Testbed

    NASA Technical Reports Server (NTRS)

    Motter, Mark A.

    2005-01-01

    The Flying Controls Testbed (FLiC) is a relatively small and inexpensive unmanned aerial vehicle developed specifically to test highly experimental flight control approaches. The most recent version of the FLiC is configured with 16 independent aileron segments, supports the implementation of C-coded experimental controllers, and is capable of fully autonomous flight from takeoff roll to landing, including flight test maneuvers. The test vehicle is basically a modified Army target drone, AN/FQM-117B, developed as part of a collaboration between the Aviation Applied Technology Directorate (AATD) at Fort Eustis,Virginia and NASA Langley Research Center. Several vehicles have been constructed and collectively have flown over 600 successful test flights.

  19. The importance of being top-heavy: Intrinsic stability of flapping flight

    NASA Astrophysics Data System (ADS)

    Ristroph, Leif; Liu, Bin; Zhang, Jun

    2011-11-01

    We explore the stability of flapping flight in a model system that consists of a pyramid-shaped object that freely hovers in a vertically oscillating airflow. Such a ``bug'' not only generates sufficient aerodynamic force to keep aloft but also robustly maintains balance during free-flight. Flow visualization reveals that both weight support and intrinsic stability result from the periodic shedding of dipolar vortices. Counter-intuitively, the observed pattern of vortex shedding suggests that stability requires a high center-of-mass, which we verify by comparing the performance of top- and bottom-heavy bugs. Finally, we visit a zoo of other flapping flyers, including Mary Poppins' umbrella, a flying saucer or UFO, and Da Vinci's helicopter.

  20. Bartonella spp. DNA Associated with Biting Flies from California

    PubMed Central

    Chung, Crystal Y.; Kasten, Rickie W.; Paff, Sandra M.; Van Horn, Brian A.; Vayssier-Taussat, Muriel; Boulouis, Henri-Jean

    2004-01-01

    Bartonella DNA was investigated in 104 horn flies (Haematobia spp.), 60 stable flies (Stomoxys spp.), 11 deer flies (Chrysops spp.), and 11 horse flies (Tabanus spp.) collected on cattle in California. Partial sequencing indicated B. bovis DNA in the horn fly pool and B. henselae type M DNA in one stable fly. PMID:15324557

  1. Terror attacks influence driving behavior in Israel

    PubMed Central

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  2. OpenFlyData: an exemplar data web integrating gene expression data on the fruit fly Drosophila melanogaster.

    PubMed

    Miles, Alistair; Zhao, Jun; Klyne, Graham; White-Cooper, Helen; Shotton, David

    2010-10-01

    Integrating heterogeneous data across distributed sources is a major requirement for in silico bioinformatics supporting translational research. For example, genome-scale data on patterns of gene expression in the fruit fly Drosophila melanogaster are widely used in functional genomic studies in many organisms to inform candidate gene selection and validate experimental results. However, current data integration solutions tend to be heavy weight, and require significant initial and ongoing investment of effort. Development of a common Web-based data integration infrastructure (a.k.a. data web), using Semantic Web standards, promises to alleviate these difficulties, but little is known about the feasibility, costs, risks or practical means of migrating to such an infrastructure. We describe the development of OpenFlyData, a proof-of-concept system integrating gene expression data on D. melanogaster, combining Semantic Web standards with light-weight approaches to Web programming based on Web 2.0 design patterns. To support researchers designing and validating functional genomic studies, OpenFlyData includes user-facing search applications providing intuitive access to and comparison of gene expression data from FlyAtlas, the BDGP in situ database, and FlyTED, using data from FlyBase to expand and disambiguate gene names. OpenFlyData's services are also openly accessible, and are available for reuse by other bioinformaticians and application developers. Semi-automated methods and tools were developed to support labour- and knowledge-intensive tasks involved in deploying SPARQL services. These include methods for generating ontologies and relational-to-RDF mappings for relational databases, which we illustrate using the FlyBase Chado database schema; and methods for mapping gene identifiers between databases. The advantages of using Semantic Web standards for biomedical data integration are discussed, as are open issues. In particular, although the performance of open

  3. Flies without centrioles.

    PubMed

    Basto, Renata; Lau, Joyce; Vinogradova, Tatiana; Gardiol, Alejandra; Woods, C Geoffrey; Khodjakov, Alexey; Raff, Jordan W

    2006-06-30

    Centrioles and centrosomes have an important role in animal cell organization, but it is uncertain to what extent they are essential for animal development. The Drosophila protein DSas-4 is related to the human microcephaly protein CenpJ and the C. elegans centriolar protein Sas-4. We show that DSas-4 is essential for centriole replication in flies. DSas-4 mutants start to lose centrioles during embryonic development, and, by third-instar larval stages, no centrioles or centrosomes are detectable. Mitotic spindle assembly is slow in mutant cells, and approximately 30% of the asymmetric divisions of larval neuroblasts are abnormal. Nevertheless, mutant flies develop with near normal timing into morphologically normal adults. These flies, however, have no cilia or flagella and die shortly after birth because their sensory neurons lack cilia. Thus, centrioles are essential for the formation of centrosomes, cilia, and flagella, but, remarkably, they are not essential for most aspects of Drosophila development.

  4. Endophagy of biting midges attacking cavity-nesting birds.

    PubMed

    Votýpka, J; Synek, P; Svobodová, M

    2009-09-01

    Feeding behaviour, host preferences and the spectrum of available hosts determine the role of vectors in pathogen transmission. Feeding preferences of blood-feeding Diptera depend on, among others factors, the willingness of flies to attack their hosts either in the open (exophagy) or in enclosed places (endophagy). As far as ornithophilic blood-feeding Diptera are concerned, the biting midges (Diptera: Ceratopogonidae) and blackflies (Diptera: Simuliidae) are generally considered to be strictly exophagous. We determined which blood-sucking Diptera enter nest cavities and feed on birds by placing sticky foil traps inside artificial nest boxes. A total of 667 females of eight species of biting midges of the genus Culicoides (Latreille, 1809) were captured on traps during 2006-2007, with Culicoides truncorum (Edwards, 1939) being the dominant species. DNA blood analyses of blood-engorged females proved that midges actually fed on birds nesting in the boxes. Three species were identified as endophagous: Culicoides truncorum, Culicoides pictipennis (Staeger, 1839), and Culicoides minutissimus (Zetterstedt, 1855). Our study represents the first evidence that ornithophilic biting midges are endophagous. The fact that we caught no blackflies in the bird boxes supports the exophagy of blackflies. We believe that our findings are important for surveillance programmes focusing on Diptera that transmit various bird pathogens.

  5. Proteus mirabilis interkingdom swarming signals attract blow flies

    PubMed Central

    Ma, Qun; Fonseca, Alicia; Liu, Wenqi; Fields, Andrew T; Pimsler, Meaghan L; Spindola, Aline F; Tarone, Aaron M; Crippen, Tawni L; Tomberlin, Jeffery K; Wood, Thomas K

    2012-01-01

    Flies transport specific bacteria with their larvae that provide a wider range of nutrients for those bacteria. Our hypothesis was that this symbiotic interaction may depend on interkingdom signaling. We obtained Proteus mirabilis from the salivary glands of the blow fly Lucilia sericata; this strain swarmed significantly and produced a strong odor that attracts blow flies. To identify the putative interkingdom signals for the bacterium and flies, we reasoned that as swarming is used by this bacterium to cover the food resource and requires bacterial signaling, the same bacterial signals used for swarming may be used to communicate with blow flies. Using transposon mutagenesis, we identified six novel genes for swarming (ureR, fis, hybG, zapB, fadE and PROSTU_03490), then, confirming our hypothesis, we discovered that fly attractants, lactic acid, phenol, NaOH, KOH and ammonia, restore swarming for cells with the swarming mutations. Hence, compounds produced by the bacterium that attract flies also are utilized for swarming. In addition, bacteria with the swarming mutation rfaL attracted fewer blow flies and reduced the number of eggs laid by the flies. Therefore, we have identified several interkingdom signals between P. mirabilis and blow flies. PMID:22237540

  6. Novel Method For Low-Rate Ddos Attack Detection

    NASA Astrophysics Data System (ADS)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  7. Ever Fly a Tetrahedron?

    ERIC Educational Resources Information Center

    King, Kenneth

    2004-01-01

    Few things capture the spirit of spring like flying a kite. Watching a kite dance and sail across a cloud spotted sky is not only a visually appealing experience it also provides a foundation for studies in science and mathematics. Put simply, a kite is an airfoil surface that flies when the forces of lift and thrust are greater than the forces of…

  8. Evaluation of Fly Ash Quality Control Tools

    DOT National Transportation Integrated Search

    2010-06-30

    Many entities currently use fly ash in portland cement concrete (PCC) pavements and structures. Although the body of knowledge is : great concerning the use of fly ash, several projects per year are subject to poor performance where fly ash is named ...

  9. Evaluation of fly ash quality control tools.

    DOT National Transportation Integrated Search

    2010-06-30

    Many entities currently use fly ash in portland cement concrete (PCC) pavements and structures. Although the body of knowledge is : great concerning the use of fly ash, several projects per year are subject to poor performance where fly ash is named ...

  10. High-volume fly ash concrete.

    DOT National Transportation Integrated Search

    2013-06-01

    The objective of the proposed study is to design, test, and evaluate high-volume fly ash concrete mixtures. Traditional specifications : limit the amount of fly ash to 40% or less cement replacement. This program attempts to increase the ash content ...

  11. Genetic attack on neural cryptography.

    PubMed

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  12. Genetic attack on neural cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold formore » the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.« less

  13. Genetic attack on neural cryptography

    NASA Astrophysics Data System (ADS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  14. Laboratory trials of fatty acids as repellents or antifeedants against houseflies, horn flies and stable flies (Diptera: Muscidae).

    PubMed

    Mullens, Bradley A; Reifenrath, William G; Butler, Sarah M

    2009-12-01

    Straight-chain, saturated fatty acids (particularly C8, C9 and C10) have some known behavioral effects on insects such as mosquitoes, and were tested in combination for potential repellency/antifeedant activity in bioassays against three significant muscoid flies of medical/veterinary importance: houseflies, horn flies and stable flies. Mixtures of C8, C9 and C10 (1:1:1; 15% total actives in formulation) were highly repellent to houseflies and horn flies at or below 1 mg formulation cm(-2). Repellency time varied from < 1 day for houseflies to usually at least 3 days for horn flies. Individual longer-chain-length fatty acids were tested, and C11 repelled houseflies for up to 5-8 days, while C12 lasted 2 days. Minimum statistically significant repellency levels of the C8, C9 and C10 mixture (3 h after application) against horn flies were 0.06-0.12 mg cm(-2). A liquid formulation of the 15% C8, C9 and C10 mixture in a silicone oil carrier (at 2.8 mg AI cm(-2)) was highly repellent against hungry stable flies in a blood-feeding membrane bioassay for at least 8 h. The low toxicity and reasonable activity and persistence of these carboxylic acids make them good candidates for development as protective materials against pest flies in livestock settings. (c) 2009 Society of Chemical Industry.

  15. Pilots' attitudes toward alcohol use and flying.

    PubMed

    Ross, L E; Ross, S M

    1988-10-01

    Questionnaires were sent to a national sample of licensed pilots. Respondents reported their flying experience and their drinking behavior. They also indicated the number of drinks that they believed could be safely consumed 3 hours (h) before flying or driving, and estimated the numbers of hours a person should wait, after drinking, before attempting to fly or drive. Similar questions were included regarding marijuana use. Respondents were much more conservative in their attitudes toward the use of alcohol prior to flying than prior to driving. This relationship held both for the number of drinks judged safe 3 h prior to flying or driving and for estimates of the waiting interval that would be appropriate following alcohol consumption. In addition, attitudes toward alcohol use were related to respondents' own drinking behavior, with moderate and heavy drinkers more tolerant of alcohol use in flying and driving situations than abstainers.

  16. Properties of Fly Ash Blocks Made from Adobe Mould

    NASA Astrophysics Data System (ADS)

    Chokhani, Alankrit; Divakar, B. S.; Jawalgi, Archana S.; Renukadevi, M. V.; Jagadish, K. S.

    2018-02-01

    Fly ash being one of the industrial waste products poses a serious disposal problem. This paper presents an experimental study of utilization of fly ash to produce blocks with varying proportions and mix combinations. Composition of fly ash blocks mainly consist of fly ash and sand, with cementitious product as either cement, lime or both, such as fly ash-sand-cement, fly ash-sand-lime and fly ash-sand-cement-lime are used. Four different proportions for each of the mix combinations are experimented. Compressive strength, water absorption, Initial rate of absorption, and dry density of fly ash blocks are studied. The influence of partial and complete replacement of cement by lime is examined.

  17. Properties of Fly Ash Blocks Made from Adobe Mould

    NASA Astrophysics Data System (ADS)

    Chokhani, Alankrit; Divakar, B. S.; Jawalgi, Archana S.; Renukadevi, M. V.; Jagadish, K. S.

    2018-06-01

    Fly ash being one of the industrial waste products poses a serious disposal problem. This paper presents an experimental study of utilization of fly ash to produce blocks with varying proportions and mix combinations. Composition of fly ash blocks mainly consist of fly ash and sand, with cementitious product as either cement, lime or both, such as fly ash-sand-cement, fly ash-sand-lime and fly ash-sand-cement-lime are used. Four different proportions for each of the mix combinations are experimented. Compressive strength, water absorption, Initial rate of absorption, and dry density of fly ash blocks are studied. The influence of partial and complete replacement of cement by lime is examined.

  18. Passive Baited Sequential Fly Trap

    USDA-ARS?s Scientific Manuscript database

    Sampling fly populations associated with human populations is needed to understand diel behavior and to monitor population densities before and after control operations. Population control measures are dependent on the results of monitoring efforts as they may provide insight into the fly behavior ...

  19. A first look at salience and distinctiveness of fly-over and fly-by waypoint symbology

    DOT National Transportation Integrated Search

    2000-09-01

    This report presents the findings of a short-term empirical study on human factors issues related to the : selection of symbology for fly-over and fly-by waypoints on aeronautical charts. At issue were the : international standards for the depiction ...

  20. Countermeasures for unintentional and intentional video watermarking attacks

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  1. Cougar attacks on humans: a case report.

    PubMed

    McKee, Denise

    2003-01-01

    Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.

  2. Heart Attack

    MedlinePlus

    ... it as instructed while awaiting emergency help. Take aspirin, if recommended. Taking aspirin during a heart attack could reduce heart damage by helping to keep your blood from clotting. Aspirin can interact with other medications, however, so don' ...

  3. A review on the effect of fly ash characteristics and their variations on the synthesis of fly ash based geopolymer

    NASA Astrophysics Data System (ADS)

    Wattimena, Oswyn K.; Antoni, Hardjito, Djwantoro

    2017-09-01

    There are more than four decades since the last 1970s where geopolymers concrete was first introduced and developed to use as a replacement to conventional concrete material which uses cement as a binder. And since the last two decades, geopolymers which utilized fly ash as aluminosilicate source material, i.e. fly ash based geopolymers, have been investigated. Many researchers present how to produce the best fly ash based geopolymer with a various source of constituent material as well as mixing formula to achieve exceptional concrete performance. Although there is a similar trend towards factors affecting the result of fly ash based geopolymer synthesis, there is still remain a wide range in mixture proportion. The considerable variation in fly ash characteristics as source material in the synthesis can very likely be one of the causes of this problem. This paper attempts to identify the effect of source material variation of geopolymer concrete, particularly which use fly ash as source material and focuses on the variation of its characteristics and the effects to properties of concrete. From the reviews it concluded that different sources (and even the same source, but different batch) of fly ash materials will give some different characteristics of the fly ash, where it would affect the synthesis process of the fly ash based geopolymer concretes.

  4. Cougar attacks on children: injury patterns and treatment.

    PubMed

    Kadesky, K M; Manarey, C; Blair, G K; Murphy, J J; Verchere, C; Atkinson, K

    1998-06-01

    Cougar attacks on humans appear to be on the rise. A review of all attacks on children was performed to determine the method of attack and injury patterns so that a treatment regimen as well as possible preventative measures could be determined. A review of all attacks, including attacks on children, was performed, including three recent attacks treated at our institution. Situation, adult supervision, patient age, injuries recorded, survival, and mode of attack, if known, were reviewed. There were 50 documented attacks on children with a 25% fatality rate. Most children were not alone at the time of the attack (92%), and in many instances adult supervision was present or nearby. Severe head and neck lacerations along with puncture wounds were the most common injury. Examples of typical cervical injuries include a nonfatal vertebral artery injury, phrenic nerve injury, a fatal internal carotid artery injury, and a fatal cervical spine injury. The cougar was rabid in two cases. Pasteurella resulted in late infections in two patients. Based on the pattern of injuries, the authors recommend aggressive evaluation for occult cervical injuries as well as surgical debridement. Antibiotics should cover oropharyngeal flora including Pasteurella multocida. Rabies prophylaxis is indicated. Adult supervision in wilderness areas is not necessarily protective.

  5. Fly-ear inspired acoustic sensors for gunshot localization

    NASA Astrophysics Data System (ADS)

    Liu, Haijun; Currano, Luke; Gee, Danny; Yang, Benjamin; Yu, Miao

    2009-05-01

    The supersensitive ears of the parasitoid fly Ormia ochracea have inspired researchers to develop bio-inspired directional microphone for sound localization. Although the fly ear is optimized for localizing the narrow-band calling song of crickets at 5 kHz, experiments and simulation have shown that it can amplify directional cues for a wide frequency range. In this article, a theoretical investigation is presented to study the use of fly-ear inspired directional microphones for gunshot localization. Using an equivalent 2-DOF model of the fly ear, the time responses of the fly ear structure to a typical shock wave are obtained and the associated time delay is estimated by using cross-correlation. Both near-field and far-field scenarios are considered. The simulation shows that the fly ear can greatly amplify the time delay by ~20 times, which indicates that with an interaural distance of only 1.2 mm the fly ear is able to generate a time delay comparable to that obtained by a conventional microphone pair with a separation as large as 24 mm. Since the parameters of the fly ear structure can also be tuned for muzzle blast and other impulse stimulus, fly-ear inspired acoustic sensors offers great potential for developing portable gunshot localization systems.

  6. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  7. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  8. Structure and Activity of the Flagellar Rotor Protein FliY

    PubMed Central

    Sircar, Ria; Greenswag, Anna R.; Bilwes, Alexandrine M.; Gonzalez-Bonet, Gabriela; Crane, Brian R.

    2013-01-01

    Rotating flagella propel bacteria toward favorable environments. Sense of rotation is determined by the intracellular response regulator CheY, which when phosphorylated (CheY-P) interacts directly with the flagellar motor. In many different types of bacteria, the CheC/CheX/FliY (CXY) family of phosphatases terminates the CheY-P signal. Unlike CheC and CheX, FliY is localized in the flagellar switch complex, which also contains the stator-coupling protein FliG and the target of CheY-P, FliM. The 2.5 Å resolution crystal structure of the FliY catalytic domain from Thermotoga maritima bears strong resemblance to the middle domain of FliM. Regions of FliM that mediate contacts within the rotor compose the phosphatase active sites in FliY. Despite the similarity between FliY and FliM, FliY does not bind FliG and thus is unlikely to be a substitute for FliM in the center of the switch complex. Solution studies indicate that FliY dimerizes through its C-terminal domains, which resemble the Escherichia coli switch complex component FliN. FliY differs topologically from the E. coli chemotaxis phosphatase CheZ but appears to utilize similar structural motifs for CheY dephosphorylation in close analogy to CheX. Recognition properties and phosphatase activities of site-directed mutants identify two pseudosymmetric active sites in FliY (Glu35/Asn38 and Glu132/Asn135), with the second site (Glu132/Asn135) being more active. A putative N-terminal CheY binding domain conserved with FliM is not required for binding CheY-P or phosphatase activity. PMID:23532838

  9. Anger attacks in bipolar versus recurrent depression.

    PubMed

    Grover, Sandeep; Painuly, Nitesh; Gupta, Nitin; Mattoo, Surendra K

    2011-01-01

    Research on anger attacks has been mostly limited to unipolar depression, and only a few studies have focused on anger attacks in bipolar depression. In a cross-sectional study, 22 subjects with bipolar depression were compared to 22 subjects with recurrent unipolar depression using an anger attack questionnaire, irritability, depression and anxiety scale and quality of life scale. Anger attacks were present in 62.5% subjects with recurrent depression (RDD group) compared to 54.5% in subjects with bipolar depression (BD group), but the difference between the groups was not statistically significant. Also, there was no significant difference between the RDD and BD groups on the Irritability Depression and Anxiety Scale and WHOQOL-Bref except that the BD group had a poorer quality of life (QOL) compared to the RDD group in the social relationship domain (t=-2.30, p<0.05). In the BD group, the subjects with anger attacks were older (t=2.77, p<0.05), had significantly higher scores on the Irritability-Outwards component of IDA (t=3.90, p<0.01) and shorter duration of illness (Mann Whitney Signed ranked value 20.00, p<0.01) and duration of treatment (Mann Whitney Signed ranked value 28.00, p<0.05) compared to BD group members without anger attacks. In the RDD group, the subjects with anger attacks had poor QOL in the social domain (t= -2.12, p<0.05), environmental domain (t=2.99, p=.01) and total (t=2.56, p<0.05) QOL compared to those without anger attacks. Anger attacks are equally prevalent in unipolar and bipolar depression, are not influenced by sociodemographic and clinical variables, and lead to comparable impact on the subjective QOL in both groups.

  10. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    MedlinePlus

    ... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...

  11. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  12. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  13. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  14. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  15. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  16. Using agility to combat cyber attacks.

    PubMed

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  17. Public knowledge of heart attack symptoms in Beijing residents.

    PubMed

    Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan

    2007-09-20

    Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart

  18. Can Escherichia coli fly? The role of flies as transmitters of E. coli to food in an urban slum in Bangladesh.

    PubMed

    Lindeberg, Yrja Lisa; Egedal, Karen; Hossain, Zenat Zebin; Phelps, Matthew; Tulsiani, Suhella; Farhana, Israt; Begum, Anowara; Jensen, Peter Kjaer Mackie

    2018-01-01

    To investigate the transmission of faecal bacteria by flies to food under natural settings. Over a period of 2 months, paired (exposed and non-exposed) containers with cooked rice were placed on the ground in kitchen areas in an urban slum area in Dhaka, Bangladesh, and the numbers of flies landing on the exposed rice were counted. Following exposure, the surface of the rice was microbiologically and molecularly analysed for the presence of Escherichia coli and genes of diarrhoeagenic E. coli and Shigella strains. Rice was at greater risk (P < 0·001) of being contaminated with E. coli if flies landed on the rice than if no flies landed on the rice (odds ratio 5·4 (P < 0·001, 95% CI: 2·5-11·7). Mean contamination in exposed rice samples (n = 60) was 3·1 × 103 CFU/g (95% CI: 2·2 × 103-4·0 × 103). Furthermore, for approximately half of the observed fly landings, the average CFU per fly landing was >0·6 × 103 CFU. Genes of diarrhoeagenic E. coli and Shigella species were detected in 39 of 60 (65%) of exposed rice samples. Two fly species were identified: the common housefly (Musca domestica) and the oriental latrine fly (Chrysomya megacephala). Flies may transmit large quantities of E. coli to food under field settings. The findings highlight the importance of implementing control measures to minimise exposure of food to flies to ensure food safety. Fly control measures should be considered for the prevention of diarrhoeal diseases caused by E. coli. © 2017 John Wiley & Sons Ltd.

  19. Adaptive optimisation-offline cyber attack on remote state estimator

    NASA Astrophysics Data System (ADS)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  20. ATV Fly-Under

    NASA Image and Video Library

    2014-08-08

    ISS040-E-089829 (8 Aug. 2014) --- The “Georges Lemaitre” Automated Transfer Vehicle (ATV-5), photographed by an Expedition 40 crew member, flies directly under the International Space Station at a distance of about 3.7 miles to test sensors and radar systems designed for future European spacecraft. After its “fly-under” of the station, the ATV will move in front of, above, and behind the outpost for the final days of its two-week rendezvous that will lead to an automated docking to the aft port of the Zvezda Service Module on Aug. 12.

  1. ATV Fly-Under

    NASA Image and Video Library

    2014-08-08

    ISS040-E-089793 (8 Aug. 2014) --- The “Georges Lemaitre” Automated Transfer Vehicle (ATV-5), photographed by an Expedition 40 crew member, flies directly under the International Space Station at a distance of about 3.7 miles to test sensors and radar systems designed for future European spacecraft. After its “fly-under” of the station, the ATV will move in front of, above, and behind the outpost for the final days of its two-week rendezvous that will lead to an automated docking to the aft port of the Zvezda Service Module on Aug. 12.

  2. ATV Fly-Under

    NASA Image and Video Library

    2014-08-08

    ISS040-E-089802 (8 Aug. 2014) --- The “Georges Lemaitre” Automated Transfer Vehicle (ATV-5), photographed by an Expedition 40 crew member, flies directly under the International Space Station at a distance of about 3.7 miles to test sensors and radar systems designed for future European spacecraft. After its “fly-under” of the station, the ATV will move in front of, above, and behind the outpost for the final days of its two-week rendezvous that will lead to an automated docking to the aft port of the Zvezda Service Module on Aug. 12.

  3. ATV Fly-Under

    NASA Image and Video Library

    2014-08-08

    ISS040-E-089782 (8 Aug. 2014) --- The “Georges Lemaitre” Automated Transfer Vehicle (ATV-5), photographed by an Expedition 40 crew member, flies directly under the International Space Station at a distance of about 3.7 miles to test sensors and radar systems designed for future European spacecraft. After its “fly-under” of the station, the ATV will move in front of, above, and behind the outpost for the final days of its two-week rendezvous that will lead to an automated docking to the aft port of the Zvezda Service Module on Aug. 12.

  4. ATV Fly-Under

    NASA Image and Video Library

    2014-08-08

    ISS040-E-089830 (8 Aug. 2014) --- The “Georges Lemaitre” Automated Transfer Vehicle (ATV-5), photographed by an Expedition 40 crew member, flies directly under the International Space Station at a distance of about 3.7 miles to test sensors and radar systems designed for future European spacecraft. After its “fly-under” of the station, the ATV will move in front of, above, and behind the outpost for the final days of its two-week rendezvous that will lead to an automated docking to the aft port of the Zvezda Service Module on Aug. 12.

  5. ATV Fly-Under

    NASA Image and Video Library

    2014-08-08

    ISS040-E-089820 (8 Aug. 2014) --- The “Georges Lemaitre” Automated Transfer Vehicle (ATV-5), photographed by an Expedition 40 crew member, flies directly under the International Space Station at a distance of about 3.7 miles to test sensors and radar systems designed for future European spacecraft. After its “fly-under” of the station, the ATV will move in front of, above, and behind the outpost for the final days of its two-week rendezvous that will lead to an automated docking to the aft port of the Zvezda Service Module on Aug. 12.

  6. ATV Fly-Under

    NASA Image and Video Library

    2014-08-08

    ISS040-E-089798 (8 Aug. 2014) --- The “Georges Lemaitre” Automated Transfer Vehicle (ATV-5), photographed by an Expedition 40 crew member, flies directly under the International Space Station at a distance of about 3.7 miles to test sensors and radar systems designed for future European spacecraft. After its “fly-under” of the station, the ATV will move in front of, above, and behind the outpost for the final days of its two-week rendezvous that will lead to an automated docking to the aft port of the Zvezda Service Module on Aug. 12.

  7. Lifestyle Changes for Heart Attack Prevention

    MedlinePlus

    ... Venous Thromboembolism Aortic Aneurysm More Lifestyle Changes for Heart Attack Prevention Updated:Mar 29,2018 Sounds simple doesn' ... to read. Many topics also available in Spanish . Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  8. Flying the Needles: Flight Deck Automation Erodes Fine-Motor Flying Skills Among Airline Pilots.

    PubMed

    Haslbeck, Andreas; Hoermann, Hans-Juergen

    2016-06-01

    The aim of this study was to evaluate the influence of practice and training on fine-motor flying skills during a manual instrument landing system (ILS) approach. There is an ongoing debate that manual flying skills of long-haul crews suffer from a lack of flight practice due to conducting only a few flights per month and the intensive use of automation. However, objective evidence is rare. One hundred twenty-six randomly selected airline pilots had to perform a manual flight scenario with a raw data precision approach. Pilots were assigned to four equal groups according to their level of practice and training by fleet (short-haul, long-haul) and rank (first officer, captain). Average ILS deviation scores differed significantly in relation to the group assignments. The strongest predictor variable was fleet, indicating degraded performance among long-haul pilots. Manual flying skills are subject to erosion due to a lack of practice on long-haul fleets: All results support the conclusion that recent flight practice is a significantly stronger predictor for fine-motor flying performance than the time period since flight school or even the total or type-specific flight experience. Long-haul crews have to be supported in a timely manner by adequate training tailored to address manual skills or by operational provisions like mixed-fleet flying or more frequent transitions between short-haul and long-haul operation. © 2016, Human Factors and Ergonomics Society.

  9. Baby Killers: Documentation and Evolution of Scuttle Fly (Diptera: Phoridae) Parasitism of Ant (Hymenoptera: Formicidae) Brood

    PubMed Central

    Brown, Brian V.; Hash, John M.; Porras, Wendy; Amorim, Dalton de Souza

    2017-01-01

    Abstract Background Numerous well-documented associations occur among species of scuttle flies (Diptera: Phoridae) and ants (Hymenoptera: Formicidae), but examples of brood parasitism are rare and the mechanisms of parasitism often remain unsubstantiated. New information We present two video-documented examples of ant brood (larvae and pupae) parasitism by scuttle flies. In footage from Estação Biológica de Boracéia in Brazil, adult females of Ceratoconus setipennis Borgmeier can be seen attacking workers of Linepithema humile (Mayr) species group while they are carrying brood, and ovipositing directly onto brood in the nest. In another remarkable example, footage from the Soltis Center, near Peñas Blancas in Costa Rica, shows adult females of an unidentified species of the Apocephalus grandipalpus Borgmeier group mounting Pheidole Westwood brood upside-down and ovipositing while the brood are being transported by workers. Analysis of evolutionary relationships (in preparation) among Apocephalus Coquillett species shows that this is a newly derived behavior within the genus, as the A. grandipalpus group arises within a group of adult ant parasitoids. In contrast, relationships of Ceratoconus Borgmeier have not been studied, and the lifestyles of the other species in the genus are largely unknown. PMID:28325980

  10. Learning from the Fruit Fly

    ERIC Educational Resources Information Center

    Bierema, Andrea; Schwartz, Renee

    2016-01-01

    The fruit fly ("Drosophila melanogaster") is an ideal subject for studying inheritance patterns, Mendel's laws, meiosis, Punnett squares, and other aspects of genetics. Much of what we know about genetics dates to evolutionary biologist Thomas Hunt Morgan's work with mutated fruit flies in the early 1900s. Many genetic laboratories…

  11. Heartburn or Chest Pain: When Is It Heart Attack?

    MedlinePlus

    Heartburn or heart attack: When to worry Severe heartburn and heart attack can be hard to tell apart. Understand how they typically ... flow to your heart (angina) or an actual heart attack. Heartburn, angina and heart attack may feel very ...

  12. Attack Vulnerability of Network Controllability.

    PubMed

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  13. A fatal elephant attack.

    PubMed

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  14. False Positive and False Negative Effects on Network Attacks

    NASA Astrophysics Data System (ADS)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  15. Assessment of Attractiveness of Plants as Roosting Sites for the Melon Fly, Bactrocera cucurbitae, and Oriental Fruit Fly, Bactrocera dorsalis

    PubMed Central

    McQuate, Grant T.; Vargas, Roger I.

    2007-01-01

    The use of toxic protein bait sprays to suppress melon fly, Bactrocera cucurbitae (Coquillett) (Diptera: Tephritidae), populations typically involves application to vegetation bordering agricultural host areas where the adults seek shelter (“roost”). Although bait spray applications for suppression of oriental fruit fly, Bactrocera dorsalis (Hendel), populations have traditionally been applied to the host crop, rather than to crop borders, roosting by oriental fruit flies in borders of some crop species, such as papaya, Carica papaya L. (Brassicales: Caricaceae), suggests that bait spray applications to crop borders could also help in suppression of B. dorsalis populations. In order to develop improved recommendations for application of bait sprays to border plants for suppression of melon fly and oriental fruit fly populations, the relative attractiveness of a range of plant species, in a vegetative (non-flowering) stage, was tested to wild melon fly and oriental fruit fly populations established in a papaya orchard in Hawaii. A total of 20 plant species were evaluated, divided into four categories: 1) border plants, including corn, Zea mays L. (Poales: Poaceae), windbreaks and broad-leaved ornamentals, 7 species; 2) weed plants commonly found in agricultural fields in Hawaii, 6 species; 3) host crop plants, 1 species- zucchini, Cucurbita pepo L. (Violales: Curcurbitaceae), and 4) locally grown fruit trees, 6 species. Plants were established in pots and placed in an open field, in clusters encircling protein bait traps, 20 m away from the papaya orchard. Castor bean, Ricinus communis L. (Euphorbiales: Euphorbiaceae), panax, Polyscias guilfoylei (Bull) Bailey (Apiales: Araliaceae), tiger's claw, Erythnna variegata L. (Fabales: Fabaceae), and guava, Psidium guajava L. (Myrtales: Myrtaceae) were identified as preferred roosting hosts for the melon fly, and tiger's claw, panax, castor bean, Canada cocklebur, Xanthium strumarium L. (Asterales: Asteraceae

  16. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  17. Transient ischemic attack

    MedlinePlus

    ... artery surgery - discharge Stroke - discharge Taking warfarin (Coumadin) Images Endarterectomy Transient Ischemic attack (TIA) References Biller J, Ruland S, Schneck MJ. Ischemic cerebrovascular disease. In Daroff ...

  18. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  19. Nonepileptic attack disorder among married women.

    PubMed

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  20. Effect of four commercial fungal formulations on mortality and sporulation of house flies (Musca domestica) and stable flies (Stomoxys calcitrans)

    USDA-ARS?s Scientific Manuscript database

    House flies (Musca domestica L.) and stable flies (Stomoxys calcitrans (L.)) (Diptera: Muscidae) are major pests of livestock. Biological control is an important tool in an integrated control framework. Increased mortality in filth flies has been documented with entomopathogenic fungi, and several s...

  1. An entangling-probe attack on Shor's algorithm for factorization

    NASA Astrophysics Data System (ADS)

    Azuma, Hiroo

    2018-02-01

    We investigate how to attack Shor's quantum algorithm for factorization with an entangling probe. We show that an attacker can steal an exact solution of Shor's algorithm outside an institute where the quantum computer is installed if he replaces its initialized quantum register with entangled qubits, namely the entangling probe. He can apply arbitrary local operations to his own probe. Moreover, we assume that there is an unauthorized person who helps the attacker to commit a crime inside the institute. He tells garbage data obtained from measurements of the quantum register to the attacker secretly behind a legitimate user's back. If the attacker succeeds in cracking Shor's algorithm, the legitimate user obtains a random answer and does not notice the attacker's illegal acts. We discuss how to detect the attacker. Finally, we estimate a probability that the quantum algorithm inevitably makes an error, of which the attacker can take advantage.

  2. Subclinical endophthalmitis following a rooster attack.

    PubMed

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  3. Why flies are good vectors

    USDA-ARS?s Scientific Manuscript database

    It was around 1900 when house flies were implicated in disease transmission. Flies with white powder on their feet were seen landing on food in US Army chow halls. This white powder was lime that had been sprinkled over the human excrement in open latrines not too far from the eating establishments....

  4. Experimental investigation of lift enhancement for flying wing aircraft using nanosecond DBD plasma actuators

    NASA Astrophysics Data System (ADS)

    Yao, Junkai; Zhou, Danjie; He, Haibo; He, Chengjun; Shi, Zhiwei; Du, Hai

    2017-04-01

    The effects of the arrangement position and control parameters of nanosecond dielectric barrier discharge (NS-DBD) plasma actuators on lift enhancement for flying wing aircraft were investigated through wind tunnel experiments at a flow speed of 25 m s-1. The aerodynamic forces and moments were obtained by a six-component balance at angles of attack ranging from -4° to 28°. The lift, drag and pitching moment coefficients were compared for the cases with and without plasma control. The results revealed that the maximum control effect was achieved by placing the actuator at the leading edge of the inner and middle wing, for which the maximum lift coefficient increased by 37.8% and the stall angle of attack was postponed by 8° compared with the plasma-off case. The effects of modulation frequency and discharge voltage were also investigated. The results revealed that the lift enhancement effect of the NS-DBD plasma actuators was strongly influenced by the modulation frequency. Significant control effects were obtained at f = 70 Hz, corresponding to F + ≈ 1. The result for the pitching moment coefficient demonstrated that the plasma actuator can induce the reattachment of the separation flows when it is actuated. However, the results indicated that the discharge voltage had a negligible influence on the lift enhancement effect.

  5. Robustness analysis of interdependent networks under multiple-attacking strategies

    NASA Astrophysics Data System (ADS)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  6. Localized attacks on spatially embedded networks with dependencies.

    PubMed

    Berezin, Yehiel; Bashan, Amir; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2015-03-11

    Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures-even of finite fraction-if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems.

  7. Schlieren photography on freely flying hawkmoth.

    PubMed

    Liu, Yun; Roll, Jesse; Van Kooten, Stephen; Deng, Xinyan

    2018-05-01

    The aerodynamic force on flying insects results from the vortical flow structures that vary both spatially and temporally throughout flight. Due to these complexities and the inherent difficulties in studying flying insects in a natural setting, a complete picture of the vortical flow has been difficult to obtain experimentally. In this paper, Schlieren , a widely used technique for highspeed flow visualization, was adapted to capture the vortex structures around freely flying hawkmoth ( Manduca ). Flow features such as leading-edge vortex, trailing-edge vortex, as well as the full vortex system in the wake were visualized directly. Quantification of the flow from the Schlieren images was then obtained by applying a physics-based optical flow method, extending the potential applications of the method to further studies of flying insects. © 2018 The Author(s).

  8. Insights into the sand fly saliva: Blood-feeding and immune interactions between sand flies, hosts, and Leishmania.

    PubMed

    Lestinova, Tereza; Rohousova, Iva; Sima, Michal; de Oliveira, Camila I; Volf, Petr

    2017-07-01

    Leishmaniases are parasitic diseases present worldwide that are transmitted to the vertebrate host by the bite of an infected sand fly during a blood feeding. Phlebotomine sand flies inoculate into the mammalian host Leishmania parasites embedded in promastigote secretory gel (PSG) with saliva, which is composed of a diverse group of molecules with pharmacological and immunomodulatory properties. In this review, we focus on 3 main aspects of sand fly salivary molecules: (1) structure and composition of salivary glands, including the properties of salivary molecules related to hemostasis and blood feeding, (2) immunomodulatory properties of salivary molecules and the diverse impacts of these molecules on leishmaniasis, ranging from disease exacerbation to vaccine development, and (3) use of salivary molecules for field applications, including monitoring host exposure to sand flies and the risk of Leishmania transmission. Studies showed interesting differences between salivary proteins of Phlebotomus and Lutzomyia species, however, no data were ever published on salivary proteins of Sergentomyia species. In the last 15 years, numerous studies have characterized sand fly salivary proteins and, in parallel, have addressed the impact of such molecules on the biology of the host-sand fly-parasite interaction. The results obtained shall pave the way for the development of field-application tools that could contribute to the management of leishmaniasis in endemic areas.

  9. House Fly (Musca domestica L.) Attraction to Insect Honeydew.

    PubMed

    Hung, Kim Y; Michailides, Themis J; Millar, Jocelyn G; Wayadande, Astri; Gerry, Alec C

    2015-01-01

    House flies are of major concern as vectors of food-borne pathogens to food crops. House flies are common pests on cattle feedlots and dairies, where they develop in and feed on animal waste. By contacting animal waste, house flies can acquire human pathogenic bacteria such as Escherichia coli and Salmonella spp., in addition to other bacteria, viruses, or parasites that may infect humans and animals. The subsequent dispersal of house flies from animal facilities to nearby agricultural fields containing food crops may lead to pre-harvest food contamination with these pathogens. We hypothesized that odors from honeydew, the sugary excreta produced by sucking insects feeding on crops, or molds and fungi growing on honeydew, may attract house flies, thereby increasing the risk of food crop contamination. House fly attraction to honeydew-contaminated plant material was evaluated using a laboratory bioassay. House flies were attracted to the following plant-pest-honeydew combinations: citrus mealybug on squash fruit, pea aphid on faba bean plants, whitefly on navel orange and grapefruit leaves, and combined citrus mealybug and cottony cushion scale on mandarin orange leaves. House flies were not attracted to field-collected samples of lerp psyllids on eucalyptus plants or aphids on crepe myrtle leaves. Fungi associated with field-collected honeydews were isolated and identified for further study as possible emitters of volatiles attractive to house flies. Two fungal species, Aureobasidium pullulans and Cladosporium cladosporioides, were repeatedly isolated from field-collected honeydew samples. Both fungal species were grown in potato dextrose enrichment broth and house fly attraction to volatiles from these fungal cultures was evaluated. House flies were attracted to odors from A. pullulans cultures but not to those of C. cladosporioides. Identification of specific honeydew odors that are attractive to house flies could be valuable for the development of improved house

  10. House Fly (Musca domestica L.) Attraction to Insect Honeydew

    PubMed Central

    Hung, Kim Y.; Michailides, Themis J.; Millar, Jocelyn G.; Wayadande, Astri; Gerry, Alec C.

    2015-01-01

    House flies are of major concern as vectors of food-borne pathogens to food crops. House flies are common pests on cattle feedlots and dairies, where they develop in and feed on animal waste. By contacting animal waste, house flies can acquire human pathogenic bacteria such as Escherichia coli and Salmonella spp., in addition to other bacteria, viruses, or parasites that may infect humans and animals. The subsequent dispersal of house flies from animal facilities to nearby agricultural fields containing food crops may lead to pre-harvest food contamination with these pathogens. We hypothesized that odors from honeydew, the sugary excreta produced by sucking insects feeding on crops, or molds and fungi growing on honeydew, may attract house flies, thereby increasing the risk of food crop contamination. House fly attraction to honeydew-contaminated plant material was evaluated using a laboratory bioassay. House flies were attracted to the following plant-pest-honeydew combinations: citrus mealybug on squash fruit, pea aphid on faba bean plants, whitefly on navel orange and grapefruit leaves, and combined citrus mealybug and cottony cushion scale on mandarin orange leaves. House flies were not attracted to field-collected samples of lerp psyllids on eucalyptus plants or aphids on crepe myrtle leaves. Fungi associated with field-collected honeydews were isolated and identified for further study as possible emitters of volatiles attractive to house flies. Two fungal species, Aureobasidium pullulans and Cladosporium cladosporioides, were repeatedly isolated from field-collected honeydew samples. Both fungal species were grown in potato dextrose enrichment broth and house fly attraction to volatiles from these fungal cultures was evaluated. House flies were attracted to odors from A. pullulans cultures but not to those of C. cladosporioides. Identification of specific honeydew odors that are attractive to house flies could be valuable for the development of improved house

  11. Anxiety-related somatic reactions during missile attacks.

    PubMed

    Carmeli, A; Liberman, N; Mevorach, L

    1991-01-01

    During the Persian Gulf war the Israeli civilian population was the target of missile attacks that could have carried poison gas warheads. During the attacks all civilians were ordered to wear gas masks and move into sealed rooms. Four telephone surveys studied the somatic reactions to this anxiety-arousing situation. The percent of subjects reporting the somatic reactions declined from 38% after the first attack to 20% 12 days later. Somatic reactions were more prevalent among females than males, and among those who completed elementary school only compared to those with an academic education. A complex pattern of relationships between expectancies about chemical warfare attacks and somatic reactions is discussed.

  12. Dynamics of Dark-Fly Genome Under Environmental Selections.

    PubMed

    Izutsu, Minako; Toyoda, Atsushi; Fujiyama, Asao; Agata, Kiyokazu; Fuse, Naoyuki

    2015-12-04

    Environmental adaptation is one of the most fundamental features of organisms. Modern genome science has identified some genes associated with adaptive traits of organisms, and has provided insights into environmental adaptation and evolution. However, how genes contribute to adaptive traits and how traits are selected under an environment in the course of evolution remain mostly unclear. To approach these issues, we utilize "Dark-fly", a Drosophila melanogaster line maintained in constant dark conditions for more than 60 years. Our previous analysis identified 220,000 single nucleotide polymorphisms (SNPs) in the Dark-fly genome, but did not clarify which SNPs of Dark-fly are truly adaptive for living in the dark. We found here that Dark-fly dominated over the wild-type fly in a mixed population under dark conditions, and based on this domination we designed an experiment for genome reselection to identify adaptive genes of Dark-fly. For this experiment, large mixed populations of Dark-fly and the wild-type fly were maintained in light conditions or in dark conditions, and the frequencies of Dark-fly SNPs were compared between these populations across the whole genome. We thereby detected condition-dependent selections toward approximately 6% of the genome. In addition, we observed the time-course trajectory of SNP frequency in the mixed populations through generations 0, 22, and 49, which resulted in notable categorization of the selected SNPs into three types with different combinations of positive and negative selections. Our data provided a list of about 100 strong candidate genes associated with the adaptive traits of Dark-fly. Copyright © 2016 Izutsu et al.

  13. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  14. Environmental hazard of oil shale combustion fly ash.

    PubMed

    Blinova, Irina; Bityukova, Liidia; Kasemets, Kaja; Ivask, Angela; Käkinen, Aleksandr; Kurvet, Imbi; Bondarenko, Olesja; Kanarbik, Liina; Sihtmäe, Mariliis; Aruoja, Villem; Schvede, Hedi; Kahru, Anne

    2012-08-30

    The combined chemical and ecotoxicological characterization of oil shale combustion fly ash was performed. Ash was sampled from the most distant point of the ash-separation systems of the Balti and Eesti Thermal Power Plants in North-Eastern Estonia. The fly ash proved potentially hazardous for tested aquatic organisms and high alkalinity of the leachates (pH>10) is apparently the key factor determining its toxicity. The leachates were not genotoxic in the Ames assay. Also, the analysis showed that despite long-term intensive oil-shale combustion accompanied by considerable fly ash emissions has not led to significant soil contamination by hazardous trace elements in North-Eastern Estonia. Comparative study of the fly ash originating from the 'new' circulating fluidized bed (CFB) combustion technology and the 'old' pulverized-fired (PF) one showed that CFB fly ash was less toxic than PF fly ash. Thus, complete transfer to the 'new' technology will reduce (i) atmospheric emission of hazardous trace elements and (ii) fly ash toxicity to aquatic organisms as compared with the 'old' technology. Copyright © 2012 Elsevier B.V. All rights reserved.

  15. Fly ash in landfill top covers - a review.

    PubMed

    Brännvall, E; Kumpiene, J

    2016-01-01

    Increase of energy recovery from municipal solid waste by incineration results in the increased amounts of incineration residues, such as fly ash, that have to be taken care of. Material properties should define whether fly ash is a waste or a viable resource to be used for various applications. Here, two areas of potential fly ash application are reviewed: the use of fly ash in a landfill top cover either as a liner material or as a soil amendment in vegetation layer. Fly ashes from incineration of three types of fuel are considered: refuse derived fuel (RDF), municipal solid waste incineration (MSWI) and biofuel. Based on the observations, RDF and MSWI fly ash is considered as suitable materials to be used in a landfill top cover liner. Whereas MSWI and biofuel fly ashes based on element availability for plant studies, could be considered suitable for the vegetation layer of the top cover. Responsible application of MSWI ashes is, however, warranted in order to avoid element accumulation in soil and elevation of background values over time.

  16. Execute-Only Attacks against Execute-Only Defenses

    DTIC Science & Technology

    2015-11-13

    attacks that have been widely used to bypass randomization-based memory corruption defenses. A recent technique, Readactor, provides one of the... corruption defenses with various impacts. We analyze the prevalence of opportunities for such attacks in popular code bases and build two proof-of-concept...our countermeasures introduce only a modest additional overhead. I. INTRODUCTION Memory corruption has been a primary vector of attacks against

  17. Eco-friendly fly ash utilization: potential for land application

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Malik, A.; Thapliyal, A.

    2009-07-01

    The increase in demand for power in domestic, agricultural, and industrial sectors has increased the pressure on coal combustion and aggravated the problem of fly ash generation/disposal. Consequently the research targeting effective utilization of fly ash has also gained momentum. Fly ash has proved to be an economical substitute for expensive adsorbents as well as a suitable raw material for brick manufacturing, zeolite synthesis, etc. Fly ash is a reservoir of essential minerals but is deficient in nitrogen and phosphorus. By amending fly ash with soil and/or various organic materials (sewage sludge, bioprocess materials) as well as microbial inoculants likemore » mycorrhizae, enhanced plant growth can be realized. Based on the sound results of large scale studies, fly ash utilization has grown into prominent discipline supported by various internationally renowned organizations. This paper reviews attempts directed toward various utilization of fly ash, with an emphasis on land application of organic/microbial inoculants amended fly ash.« less

  18. Fruit Flies Help Human Sleep Research

    MedlinePlus

    Skip Navigation Bar Home Current Issue Past Issues Fruit Flies Help Human Sleep Research Past Issues / Summer 2007 ... courtesy of NIGMS Neuroscientist Chiara Cirelli uses experimental fruit flies to study sleep. Although it may be tough ...

  19. The contribution of collective attack tactics in differentiating handball score efficiency.

    PubMed

    Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka

    2004-12-01

    The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.

  20. Binocular Interactions Underlying the Classic Optomotor Responses of Flying Flies

    PubMed Central

    Duistermars, Brian J.; Care, Rachel A.; Frye, Mark A.

    2012-01-01

    In response to imposed course deviations, the optomotor reactions of animals reduce motion blur and facilitate the maintenance of stable body posture. In flies, many anatomical and electrophysiological studies suggest that disparate motion cues stimulating the left and right eyes are not processed in isolation but rather are integrated in the brain to produce a cohesive panoramic percept. To investigate the strength of such inter-ocular interactions and their role in compensatory sensory–motor transformations, we utilize a virtual reality flight simulator to record wing and head optomotor reactions by tethered flying flies in response to imposed binocular rotation and monocular front-to-back and back-to-front motion. Within a narrow range of stimulus parameters that generates large contrast insensitive optomotor responses to binocular rotation, we find that responses to monocular front-to-back motion are larger than those to panoramic rotation, but are contrast sensitive. Conversely, responses to monocular back-to-front motion are slower than those to rotation and peak at the lowest tested contrast. Together our results suggest that optomotor responses to binocular rotation result from the influence of non-additive contralateral inhibitory as well as excitatory circuit interactions that serve to confer contrast insensitivity to flight behaviors influenced by rotatory optic flow. PMID:22375108

  1. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  2. Detection of complex cyber attacks

    NASA Astrophysics Data System (ADS)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  3. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of...

  4. The black flies of Maine

    Treesearch

    L.S. Bauer; J. Granett

    1979-01-01

    Black flies have been long-time residents of Maine and cause extensive nuisance problems for people, domestic animals, and wildlife. The black fly problem has no simple solution because of the multitude of species present, the diverse and ecologically sensitive habitats in which they are found, and the problems inherent in measuring the extent of the damage they cause...

  5. Panic disorder, panic attacks and panic attack symptoms across race-ethnic groups: results of the collaborative psychiatric epidemiology studies.

    PubMed

    Asnaani, Anu; Gutner, Cassidy A; Hinton, Devon E; Hofmann, Stefan G

    2009-01-01

    The current study investigates race-ethnic differences in rates of panic disorder, panic attacks and certain panic attack symptoms by jointly combining three major national epidemiological databases. The compared groups were White, African American, Latino and Asian. The White group had significantly higher rates of panic disorder, and of many panic symptoms, including palpitations, as compared to the African American, Asian and Latino groups. Several expected race-ethnic differences were not found. An explanation for these findings are adduced, and suggestions are given for future studies so that possible ethnic-racial differences in panic disorder, panic attacks and panic attack symptoms can be investigated in a more rigorous manner.

  6. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  7. The Influence of Sex and Fly Species on the Development of Trypanosomes in Tsetse Flies

    PubMed Central

    Peacock, Lori; Ferris, Vanessa; Bailey, Mick; Gibson, Wendy

    2012-01-01

    Unlike other dipteran disease vectors, tsetse flies of both sexes feed on blood and transmit pathogenic African trypanosomes. During transmission, Trypanosoma brucei undergoes a complex cycle of proliferation and development inside the tsetse vector, culminating in production of infective forms in the saliva. The insect manifests robust immune defences throughout the alimentary tract, which eliminate many trypanosome infections. Previous work has shown that fly sex influences susceptibility to trypanosome infection as males show higher rates of salivary gland (SG) infection with T. brucei than females. To investigate sex-linked differences in the progression of infection, we compared midgut (MG), proventriculus, foregut and SG infections in male and female Glossina morsitans morsitans. Initially, infections developed in the same way in both sexes: no difference was observed in numbers of MG or proventriculus infections, or in the number and type of developmental forms produced. Female flies tended to produce foregut migratory forms later than males, but this had no detectable impact on the number of SG infections. The sex difference was not apparent until the final stage of SG invasion and colonisation, showing that the SG environment differs between male and female flies. Comparison of G. m. morsitans with G. pallidipes showed a similar, though less pronounced, sex difference in susceptibility, but additionally revealed very different levels of trypanosome resistance in the MG and SG. While G. pallidipes was more refractory to MG infection, a very high proportion of MG infections led to SG infection in both sexes. It appears that the two fly species use different strategies to block trypanosome infection: G. pallidipes heavily defends against initial establishment in the MG, while G. m. morsitans has additional measures to prevent trypanosomes colonising the SG, particularly in female flies. We conclude that the tsetse-trypanosome interface works differently in G

  8. Heavy metals in MSW incineration fly ashes

    NASA Astrophysics Data System (ADS)

    Ferreira, C.; Ribeiro, A.; Ottosen, L.

    2003-05-01

    Incineration is a common solution for dealing with the increasing amount of municipal solid waste (MSW). During the process, the heavy metals initially present in the waste go through several transformations, ending up in combustion products, such as fly ash. This article deals with some issues related to the combustion of MSW and the formation of fly ash, especially in what concerns heavy metals. Treatment of the flue gas in air pollution control equipment plays an important role and the basic processes to accomplish this are explained. Fly ash from a semi-dry flue gas treatment system is characterized regarding its physical-chemical properties: pH, solubility, chemical composition, and leaching, amongst others. Results indicate a high alkalinity and the presence of large amounts of calcium, chlorides, sulfates, carbonates, sodium and potassium. Metal concentrations in fly ash are: 6,2g/kg for zinc, 2,4g/kg for lead, 1,7g/kg for iron, and 7,9g/kg for magnesium. Copper, manganese, chromium and cadmium are also present with 546, 338, 104 and 91mg/kg of fly ash, respectively. These results are extremely important in subsequent studies on the treatment of fly ash.

  9. Space shuttle flying qualities and criteria assessment

    NASA Technical Reports Server (NTRS)

    Myers, T. T.; Johnston, D. E.; Mcruer, Duane T.

    1987-01-01

    Work accomplished under a series of study tasks for the Flying Qualities and Flight Control Systems Design Criteria Experiment (OFQ) of the Shuttle Orbiter Experiments Program (OEX) is summarized. The tasks involved review of applicability of existing flying quality and flight control system specification and criteria for the Shuttle; identification of potentially crucial flying quality deficiencies; dynamic modeling of the Shuttle Orbiter pilot/vehicle system in the terminal flight phases; devising a nonintrusive experimental program for extraction and identification of vehicle dynamics, pilot control strategy, and approach and landing performance metrics, and preparation of an OEX approach to produce a data archive and optimize use of the data to develop flying qualities for future space shuttle craft in general. Analytic modeling of the Orbiter's unconventional closed-loop dynamics in landing, modeling pilot control strategies, verification of vehicle dynamics and pilot control strategy from flight data, review of various existent or proposed aircraft flying quality parameters and criteria in comparison with the unique dynamic characteristics and control aspects of the Shuttle in landing; and finally a summary of conclusions and recommendations for developing flying quality criteria and design guides for future Shuttle craft.

  10. Leishmania, microbiota and sand fly immunity.

    PubMed

    Telleria, Erich Loza; Martins-da-Silva, Andrea; Tempone, Antonio Jorge; Traub-Csekö, Yara Maria

    2018-06-20

    In this review, we explore the state-of-the-art of sand fly relationships with microbiota, viruses and Leishmania, with particular emphasis on the vector immune responses. Insect-borne diseases are a major public health problem in the world. Phlebotomine sand flies are proven vectors of several aetiological agents including viruses, bacteria and the trypanosomatid Leishmania, which are responsible for diseases such as viral encephalitis, bartonellosis and leishmaniasis, respectively. All metazoans in nature coexist intimately with a community of commensal microorganisms known as microbiota. The microbiota has a fundamental role in the induction, maturation and function of the host immune system, which can modulate host protection from pathogens and infectious diseases. We briefly review viruses of public health importance present in sand flies and revisit studies done on bacterial and fungal gut contents of these vectors. We bring this information into the context of sand fly development and immune responses. We highlight the immunity mechanisms that the insect utilizes to survive the potential threats involved in these interactions and discuss the recently discovered complex interactions among microbiota, sand fly, Leishmania and virus. Additionally, some of the alternative control strategies that could benefit from the current knowledge are considered.

  11. Construction procedures using self hardening fly ash

    NASA Astrophysics Data System (ADS)

    Thornton, S. I.; Parker, D. G.

    1980-07-01

    Fly ash produced in Arkansas from burning Wyoming low sulfur coal is self-hardening and can be effective as a soil stabilizing agent for clays and sands. The strength of soil-self hardening fly ash develops rapidly when compacted immediately after mixing. Seven day unconfined compressive strengths up to 1800 psi were obtained from 20% fly ash and 80% sand mixtures. A time delay between mixing the fly ash with the soil and compaction of the mixture reduced the strength. With two hours delay, over a third of the strength was lost and with four hours delay, the loss was over half. Gypsum and some commercial concrete retarders were effective in reducing the detrimental effect of delayed compaction. Adequate mixing of the soil and fly ash and rapid compaction of the mixtures were found to be important parameters in field construction of stabilized bases.

  12. Combating Memory Corruption Attacks On Scada Devices

    NASA Astrophysics Data System (ADS)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  13. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  14. An autonomous flying vehicle for Mars exploration

    NASA Astrophysics Data System (ADS)

    Bouras, Peter; Fox, Tim

    1990-09-01

    A remotely reprogrammable, autonomous flying craft for surveying and mapping the Martian surface environment is presented. This solar powered, modified flying wing design could cover about 2000 statute miles while maneuvering at Mach 0.3. The craft is configured to fly one km above the surface, measuring atmospheric properties, performing subsurface mapping, mapping the surface topography, and searching for the presence of water and perhaps life. A 35 kg scientific payload, plus communication and control electronics, are placed spanwise inside the flying wing, removing the requirement for a normal fuselage, and reducing structural needs. Thrust is provided by a two-bladed electrically driven propeller motorized by high-efficiency solar cells.

  15. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap

  16. Pre-Attack Symptomatology and Temperament as Predictors of Children's Responses to the September 11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Smith, Kimberlee I.; Meltzoff, Andrew N.

    2005-01-01

    Background: The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Method: Children's responses were assessed in a community sample of children in Seattle, Washington,…

  17. Stabilized phosphogypsum: class C fly ash: Portland type II cement composites for potential marine application.

    PubMed

    Guo, T; Malone, R F; Rusch, K A

    2001-10-01

    Phosphogypsum (PG, CaSO4 x H20), a byproduct of phosphoric acid manufacturing, contains low levels of Ra226. PG can be stabilized with portland type II cement and class C fly ash for use in marine environments, thus eliminating the airborne vector of transmission for radon gas. An augmented simplex centroid design with pseudocomponents was used to select 10 PG:class C fly ash:portland type II cement compositions. The 43 cm3 blocks were fabricated and subjected to a 1.5-yr field submergence test and a 28-d saltwater dynamic leaching study. All field composites survived with no signs of degradation. Dynamic leaching resulted in effective calcium diffusion coefficients ranging from 0.21 to 7.5 x 10(-14)m2 s(-1). Effective diffusion depths, calculated for t=1 and 30 yr, ranged from 0.4 to 2.2 mm and from 2.0 to 11.9 mm, respectively. Scanning electron microscopy and wavelength dispersive microprobe and X-ray diffraction analyses of the leached composites identified a 40-60-microm calcite layer that was absent in the control composites. This suggests that a reaction between the composites and the saltwater results in the precipitation of calcite onto the block surface, encapsulating the composites and protecting them from saltwater attack and dissolution.

  18. Dynamics of Dark-Fly Genome Under Environmental Selections

    PubMed Central

    Izutsu, Minako; Toyoda, Atsushi; Fujiyama, Asao; Agata, Kiyokazu; Fuse, Naoyuki

    2015-01-01

    Environmental adaptation is one of the most fundamental features of organisms. Modern genome science has identified some genes associated with adaptive traits of organisms, and has provided insights into environmental adaptation and evolution. However, how genes contribute to adaptive traits and how traits are selected under an environment in the course of evolution remain mostly unclear. To approach these issues, we utilize “Dark-fly”, a Drosophila melanogaster line maintained in constant dark conditions for more than 60 years. Our previous analysis identified 220,000 single nucleotide polymorphisms (SNPs) in the Dark-fly genome, but did not clarify which SNPs of Dark-fly are truly adaptive for living in the dark. We found here that Dark-fly dominated over the wild-type fly in a mixed population under dark conditions, and based on this domination we designed an experiment for genome reselection to identify adaptive genes of Dark-fly. For this experiment, large mixed populations of Dark-fly and the wild-type fly were maintained in light conditions or in dark conditions, and the frequencies of Dark-fly SNPs were compared between these populations across the whole genome. We thereby detected condition-dependent selections toward approximately 6% of the genome. In addition, we observed the time-course trajectory of SNP frequency in the mixed populations through generations 0, 22, and 49, which resulted in notable categorization of the selected SNPs into three types with different combinations of positive and negative selections. Our data provided a list of about 100 strong candidate genes associated with the adaptive traits of Dark-fly. PMID:26637434

  19. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less

  20. Fly ash in concrete : final report.

    DOT National Transportation Integrated Search

    1990-08-01

    This study was initiated to develop information regarding the use of fly ash in portland cement concrete for state construction projects. : Concrete mixes containing 10%, 20%, 30%, 40% and 60% fly ash were evaluated in the laboratory in combination w...

  1. Flying the fly: long-range flight behavior of Drosophila melanogaster to attractive odors.

    PubMed

    Becher, Paul G; Bengtsson, Marie; Hansson, Bill S; Witzgall, Peter

    2010-06-01

    The fruit fly, Drosophila melanogaster Meigen (Diptera: Drosophilidae), is a model for how animals sense, discriminate, and respond to chemical signals. However, with D. melanogaster our knowledge of the behavioral activity of olfactory receptor ligands has relied largely on close-range attraction, rather than on long-range orientation behavior. We developed a flight assay to relate chemosensory perception to behavior. Headspace volatiles from vinegar attracted 62% of assayed flies during a 15-min experimental period. Flies responded irrespective of age, sex, and mating state, provided they had been starved. To identify behaviorally relevant chemicals from vinegar, we compared the responses to vinegar and synthetic chemicals. Stimuli were applied by a piezoelectric sprayer at known and constant release rates. Re-vaporized methanol extracts of Super Q-trapped vinegar volatiles attracted as many flies as vinegar. The main volatile component of vinegar, acetic acid, elicited significant attraction as a single compound. Two other vinegar volatiles, 2-phenyl ethanol and acetoin, produced a synergistic effect when added to acetic acid. Geosmin, a microbiological off-flavor, diminished attraction to vinegar. This wind tunnel assay based on a conspicuous and unambiguous behavioral response provides the necessary resolution for the investigation of physiologically and ecologically relevant odors and will become an essential tool for the functional analysis of the D. melanogaster olfactory system.

  2. The blow fly, Chrysomya megacephala, and the house fly, Musca domestica, as mechanical vectors of pathogenic bacteria in Northeast Thailand.

    PubMed

    Chaiwong, T; Srivoramas, T; Sueabsamran, P; Sukontason, K; Sanford, M R; Sukontason, K L

    2014-06-01

    The Oriental latrine fly, Chrysomya megacephala (Fabricius) (Diptera: Calliphoridae) and the house fly, Musca domestica L., (Diptera: Muscidae) are synanthropic flies which are adapted to live in close association with human habitations, thereby making them likely mechanical vectors of several pathogens to humans. There were two main aims of this study. The first aim was to determine the prevalence of these two fly species from five types of human habitations including: fresh-food markets, garbage piles, restaurants, school cafeterias and paddy fields, in the Muang Ubon Ratchathani and Warinchamrap districts of Ubon Ratchathani province of Northeast Thailand. Flies collection were conducted monthly from September 2010-October 2011 using a reconstructable funnel trap, containing 1 day-tainted beef offal as bait. A total of 7 750 flies (6 401 C. megacephala and 1 349 M.domestica) were collected. The second aim was to examine the potential of these flies to carry pathogenic bacteria. Bacteria were isolated from 994 individual flies collected using a sweep net (555 C. megacephala and 439 M. domestica). A total of 15 bacterial genera were isolated from the external surfaces, comprising ten genera of gram-negative bacteria and five gram-positive bacteria. The most common bacteria isolated from both species were coagulase-negative staphylococci, followed by Streptococcus group D non-enterococci. Human pathogenic enteric bacteria isolated were Salmonella sp., Shigella sp., Escherichia coli O157:H7, Salmonella typhi, Bacillus sp., and Enterococcus sp., of which S. typhi is the first report of isolation from these fly species. Other human pathogens included Staphylococcus aureus and Pseudomonas aeruginosa. Not only were the number of C. megacephala positive for bacteria significantly higher than for M. domestica, but they were also carrying ~11-12 times greater bacterial load than M. domestica. These data suggest that both fly species should be considered potential

  3. Botanically-based repellent and insecticidal effects against horn flies, Haematobia irritans irritans (L.), and stable flies, Stomoxys calcitrans (L.) (Dipera: Muscidae)

    USDA-ARS?s Scientific Manuscript database

    Horn flies, Haematobia irritans irritans (L.) and stable flies, Stomoxys calcitrans (L.) (Diptera: Muscidae), are economically important blood-feeding ectoparasites of cattle, Bos taurus L., and other domesticated and wild animals. Conventional insecticides are used for control of biting flies on ca...

  4. Shark attack.

    PubMed

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  5. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  6. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  7. Pathologic features of fatal shark attacks.

    PubMed

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  8. Geotechnical characterization of some Indian fly ashes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Das, S.K.; Yudhbir

    2005-10-01

    This paper reports the findings of experimental studies with regard to some common engineering properties (e.g., grain size, specific gravity, compaction characteristics, and unconfined compression strength) of both low and high calcium fly ashes, to evaluate their suitability as embankment materials and reclamation fills. In addition, morphology, chemistry, and mineralogy of fly ashes are studied using scanning electron microscope, electron dispersive x-ray analyzer, x-ray diffractometer, and infrared absorption spectroscopy. In high calcium fly ash, mineralogical and chemical differences are observed for particles, {gt}75 {mu} m and the particles of {lt} 45 {mu} m size. The mode and duration of curingmore » significantly affect the strength and stress-strain behavior of fly ashes. The geotechnical properties of fly ash are governed by factors like lime content (CaO), iron content (Fe{sub 2}O{sub 3}) and loss on ignition. The distinct difference between self-hardening and pozzolanic reactivity has been emphasized.« less

  9. Semiochemical-based technologies for fly management

    USDA-ARS?s Scientific Manuscript database

    Filth flies are important insect pests that have caused over billions of dollars damage in animal production, food contamination and disease transmitting. The present presentation reports our recent findings on the development of filth fly control using semiochemical-based technologies to reduce the...

  10. Area wide management of stable flies

    USDA-ARS?s Scientific Manuscript database

    Stable flies are among the most damaging pests of livestock worldwide. Their painful bites cause both physiological and behavioral changes that reduce productivity and wellbeing of domestic animals and humans alike. Immature stable flies develop in decomposing and fermenting vegetative materials, of...

  11. Testing for Mutagens Using Fruit Flies.

    ERIC Educational Resources Information Center

    Liebl, Eric C.

    1998-01-01

    Describes a laboratory employed in undergraduate teaching that uses fruit flies to test student-selected compounds for their ability to cause mutations. Requires no prior experience with fruit flies, incorporates a student design component, and employs both rigorous controls and statistical analyses. (DDR)

  12. Possibilities of municipal solid waste incinerator fly ash utilisation.

    PubMed

    Hartmann, Silvie; Koval, Lukáš; Škrobánková, Hana; Matýsek, Dalibor; Winter, Franz; Purgar, Amon

    2015-08-01

    Properties of the waste treatment residual fly ash generated from municipal solid waste incinerator fly ash were investigated in this study. Six different mortar blends with the addition of the municipal solid waste incinerator fly ash were evaluated. The Portland cement replacement levels of the municipal solid waste incinerator fly ash used were 25%, 30% and 50%. Both, raw and washed municipal solid waste incinerator fly ash samples were examined. According to the mineralogical composition measurements, a 22.6% increase in the pozzolanic/hydraulic properties was observed for the washed municipal solid waste incinerator fly ash sample. The maximum replacement level of 25% for the washed municipal solid waste incinerator fly ash in mortar blends was established in order to preserve the compressive strength properties. Moreover, the leaching characteristics of the crushed mortar blend was analysed in order to examine the immobilisation of its hazardous contents. © The Author(s) 2015.

  13. Temporal Cyber Attack Detection.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ingram, Joey Burton; Draelos, Timothy J.; Galiardi, Meghan

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms requiremore » large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.« less

  14. Defender-Attacker Decision Tree Analysis to Combat Terrorism.

    PubMed

    Garcia, Ryan J B; von Winterfeldt, Detlof

    2016-12-01

    We propose a methodology, called defender-attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game-theoretic formulations of this problem, we assume that the defenders act rationally by maximizing their expected utility or minimizing their expected costs. However, we do not assume that attackers maximize their expected utilities. Instead, we encode the defender's limited knowledge about the attacker's motivations and capabilities as a conditional probability distribution over the attacker's decisions. We apply this methodology to the problem of defending against possible terrorist attacks on commercial airplanes, using one of three weapons: infrared-guided MANPADS (man-portable air defense systems), laser-guided MANPADS, or visually targeted RPGs (rocket propelled grenades). We also evaluate three countermeasures against these weapons: DIRCMs (directional infrared countermeasures), perimeter control around the airport, and hardening airplanes. The model includes deterrence effects, the effectiveness of the countermeasures, and the substitution of weapons and targets once a specific countermeasure is selected. It also includes a second stage of defensive decisions after an attack occurs. Key findings are: (1) due to the high cost of the countermeasures, not implementing countermeasures is the preferred defensive alternative for a large range of parameters; (2) if the probability of an attack and the associated consequences are large, a combination of DIRCMs and ground perimeter control are preferred over any single countermeasure. © 2016 Society for Risk Analysis.

  15. 30 CFR 57.14110 - Flying or falling materials.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Flying or falling materials. 57.14110 Section... and Equipment Safety Devices and Maintenance Requirements § 57.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors...

  16. 30 CFR 56.14110 - Flying or falling materials.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Flying or falling materials. 56.14110 Section... Equipment Safety Devices and Maintenance Requirements § 56.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors present a...

  17. 30 CFR 56.14110 - Flying or falling materials.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Flying or falling materials. 56.14110 Section... Equipment Safety Devices and Maintenance Requirements § 56.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors present a...

  18. 30 CFR 57.14110 - Flying or falling materials.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Flying or falling materials. 57.14110 Section... and Equipment Safety Devices and Maintenance Requirements § 57.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors...

  19. 30 CFR 57.14110 - Flying or falling materials.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Flying or falling materials. 57.14110 Section... and Equipment Safety Devices and Maintenance Requirements § 57.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors...

  20. 30 CFR 56.14110 - Flying or falling materials.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Flying or falling materials. 56.14110 Section... Equipment Safety Devices and Maintenance Requirements § 56.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors present a...

  1. 30 CFR 57.14110 - Flying or falling materials.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Flying or falling materials. 57.14110 Section... and Equipment Safety Devices and Maintenance Requirements § 57.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors...

  2. 30 CFR 56.14110 - Flying or falling materials.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Flying or falling materials. 56.14110 Section... Equipment Safety Devices and Maintenance Requirements § 56.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors present a...

  3. 30 CFR 56.14110 - Flying or falling materials.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Flying or falling materials. 56.14110 Section... Equipment Safety Devices and Maintenance Requirements § 56.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors present a...

  4. 30 CFR 57.14110 - Flying or falling materials.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Flying or falling materials. 57.14110 Section... and Equipment Safety Devices and Maintenance Requirements § 57.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors...

  5. Biological Control of Olive Fruit Fly

    USDA-ARS?s Scientific Manuscript database

    Domestication of olive fruit, Olea europaea L., produced a better host for olive fruit fly, Bactrocera oleae (Gmelin), than wild olives, but fruit domestication reduced natural enemy efficiency. Important factors for selection of natural enemies for control of olive fruit fly include climate matchi...

  6. Factors governing risk of cougar attacks on humans

    USGS Publications Warehouse

    Mattson, David; Logan, Kenneth; Sweanor, Linda

    2011-01-01

    Since the 1980s wildlife managers in the United States and Canada have expressed increasing concern about the physical threat posed by cougars (Puma concolor) to humans. We developed a conceptual framework and analyzed 386 human–cougar encounters (29 fatal attacks, 171 instances of nonfatal contact, and 186 close-threatening encounters) to provide information relevant to public safety. We conceived of human injury and death as the outcome of 4 transitions affected by different suites of factors: (1) a human encountering a cougar: (2) given an encounter, odds that the cougar would be aggressive; (3) given aggression, odds that the cougar would attack; and (4) given an attack, odds that the human would die. We developed multivariable logistic regression models to explain variation in odds at transitions three and four using variables pertaining to characteristics of involved people and cougars. Young (≤ 2.5 years) or unhealthy (by weight, condition, or disease) cougars were more likely than any others to be involved in close (typically <5 m) encounters that threatened the involved person. Of cougars in close encounters, females were more likely than males to attack, and of attacking animals, adults were more likely than juveniles to kill the victim (32% versus 9% fatality, respectively). During close encounters, victims who used a weapon killed the involved cougar in 82% of cases. Other mitigating behaviors (e.g., yelling, backing away, throwing objects, increasing stature) also substantially lessened odds of attack. People who were moving quickly or erratically when an encounter happened (running, playing, skiing, snowshoeing, biking, ATV-riding) were more likely to be attacked and killed compared to people who were less active (25% versus 8% fatality). Children (≤ 10 years) were more likely than single adults to be attacked, but intervention by people of any age reduced odds of a child’s death by 4.6×. Overall, cougar attacks on people in Canada and the

  7. Field trials of fatty acids and geraniol applied to cattle for suppression of horn flies, Haematobia irritans (Diptera: Muscidae), with observations on fly defensive behaviors.

    PubMed

    Mullens, Bradley A; Watson, D Wes; Gerry, Alec C; Sandelin, Broc A; Soto, Diane; Rawls, Diana; Denning, Steve; Guisewite, Lena; Cammack, Jonathan

    2017-10-15

    Adult horn fly populations were tracked on cattle for 2-week periods before, during and after multiple treatments (every 3-4days) with two repellents in a mineral oil carrier. Cattle were sprayed four times in a two-week period either with 2% geraniol (125ml/cow) or a 15% mixture of short chain fatty acids (C8-C9-C10)(250ml/cow), and there were untreated control cattle. Trials were conducted in California and North Carolina for 3 summers. Short-term fly counts (same day) on treated cattle were reduced by 61-99%, depending on material and trial, and the fatty acid mixture provided better control than geraniol. Horn fly counts were suppressed for 1-3 d and rebounded somewhat after both treatments. Consecutive treatments showed evidence of persistent impact in California where herds were more isolated. Rebounds to pre-treatment levels 3-4 d after treatment occurred more often in North Carolina, where other infested cattle were closer to treated herds. By 3-4 d post-treatment, horn flies were reduced by 29-61% in California and 0-83% in North Carolina, relative to pre-treatment. Background behavior frequencies were assessed from hundreds of counts on untreated, infested California cattle, where horn flies were the only abundant biting fly. Behavior averages were 16.5 tail flicks, 7.6 skin twitches, 1.2 head throws, or 0.2 leg stamps per 2min observation period. At horn fly densities from about 200 to more than 1000 flies per animal (moderate to high numbers), fly defensive behaviors on control cattle were poorly related (or unrelated) to fly numbers. Immediately after repellent application, however, flies were almost absent and behavior frequencies dropped distinctly. Cattle fly defensive behaviors therefore seem to be quite sensitive to low (less than 100 flies/animal) horn fly densities, and behaviors would be a poor quantitative tool to track fly stress at moderate densities and above. Both geraniol and the fatty acids show promise for horn fly control, especially

  8. Step to improve neural cryptography against flipping attacks.

    PubMed

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  9. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  10. Percolation of localized attack on isolated and interdependent random networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2014-03-01

    Percolation properties of isolated and interdependent random networks have been investigated extensively. The focus of these studies has been on random attacks where each node in network is attacked with the same probability or targeted attack where each node is attacked with a probability being a function of its centrality, such as degree. Here we discuss a new type of realistic attacks which we call a localized attack where a group of neighboring nodes in the networks are attacked. We attack a randomly chosen node, its neighbors, and its neighbor of neighbors and so on, until removing a fraction (1 - p) of the network. This type of attack reflects damages due to localized disasters, such as earthquakes, floods and war zones in real-world networks. We study, both analytically and by simulations the impact of localized attack on percolation properties of random networks with arbitrary degree distributions and discuss in detail random regular (RR) networks, Erdős-Rényi (ER) networks and scale-free (SF) networks. We extend and generalize our theoretical and simulation results of single isolated networks to networks formed of interdependent networks.

  11. Removal of chloride from MSWI fly ash.

    PubMed

    Chen, Wei-Sheng; Chang, Fang-Chih; Shen, Yun-Hwei; Tsai, Min-Shing; Ko, Chun-Han

    2012-10-30

    The high levels of alkali chloride and soluble metal salts present in MSWI fly ash is worth noting for their impact on the environment. In addition, the recycling or reuse of fly ash has become an issue because of limited landfill space. The chloride content in fly ash limits its application as basis for construction materials. Water-soluble chlorides such as potassium chloride (KCl), sodium chloride (NaCl), and calcium chloride hydrate (CaCl(2) · 2H(2)O) in fly ash are easily washed away. However, calcium chloride hydroxide (Ca(OH)Cl) might not be easy to leach away at room temperature. The roasting and washing-flushing processes were applied to remove chloride content in this study. Additionally, air and CO(2) were introduced into the washing process to neutralize the hazardous nature of chlorides. In comparison with the water flushing process, the roasting process is more efficient in reducing the process of solid-liquid separation and drying for the reuse of Cl-removed fly ash particles. In several roasting experiments, the removal of chloride content from fly ash at 1050°C for 3h showed the best results (83% chloride removal efficiency). At a solid to liquid ratio of 1:10 the water-flushing process can almost totally remove water-soluble chloride (97% chloride removal efficiency). Analyses of mineralogical change also prove the efficiency of the fly ash roasting and washing mechanisms for chloride removal. Copyright © 2012 Elsevier B.V. All rights reserved.

  12. Panic Attack during Elective Gastrointestinal Endoscopy.

    PubMed

    Mitsonis, Charalampos; Dimopoulos, Nikolaos; Zavrou, Marianna; Psarra, Vassiliki; Giofkos, Christos; Fiorakis, Christos; Dimitriadis, Athanasios; Valavanis, Dimitrios; Vousoura, Eleni; Zervas, Iannis; Papavassiliou, Efstathios

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y). Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, P < 0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, P < 0.05). Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  13. Multi-scale analytical investigation of fly ash in concrete

    NASA Astrophysics Data System (ADS)

    Aboustait, Mohammed B.

    Much research has been conducted to find an acceptable concrete ingredient that would act as cement replacement. One promising material is fly ash. Fly ash is a by-product from coal-fired power plants. Throughout this document work on the characterization of fly ash structure and composition will be explored. This effort was conducted through a mixture of cutting edge multi-scale analytical X-ray based techniques that use both bulk experimentation and nano/micro analytical techniques. Furtherly, this examination was coupled by performing Physical/Mechanical ASTM based testing on fly ash-enrolled-concrete to examine the effects of fly ash introduction. The most exotic of the cutting edge characterization techniques endorsed in this work uses the Nano-Computed Tomography and the Nano X-ray Fluorescence at Argonne National Laboratory to investigate single fly ash particles. Additional Work on individual fly ash particles was completed by laboratory-based Micro-Computed Tomography and Scanning Electron Microscopy. By combining the results of individual particles and bulk property tests, a compiled perspective is introduced, and accessed to try and make new insights into the reactivity of fly ash within concrete.

  14. 76 FR 43804 - Movement of Hass Avocados From Areas Where Mediterranean Fruit Fly or South American Fruit Fly Exist

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-22

    ... dorsalis), peach fruit fly (Anastrepha zonata), and sapote fruit fly (Anastrepha serpentina) in the... obliqua, Anastrepha serpentina, and Anastrepha striata (Diptera: Tephritidae) in Mexico. J. Econ. Entomol...

  15. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annarita Giani; Eilyan Bitar; Miles McQueen

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacksmore » [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.« less

  16. Flared landing approach flying qualities. Volume 2: Appendices

    NASA Technical Reports Server (NTRS)

    Weingarten, Norman C.; Berthe, Charles J., Jr.; Rynaski, Edmund G.; Sarrafian, Shahan K.

    1986-01-01

    An in-flight research study was conducted utilizing the USAF/Total In-Flight Simulator (TIFS) to investigate longitudinal flying qualities for the flared landing approach phase of flight. A consistent set of data were generated for: determining what kind of command response the pilot prefers/requires in order to flare and land an aircraft with precision, and refining a time history criterion that took into account all the necessary variables and the characteristics that would accurately predict flying qualities. Seven evaluation pilots participated representing NASA Langley, NASA Dryden, Calspan, Boeing, Lockheed, and DFVLR (Braunschweig, Germany). The results of the first part of the study provide guidelines to the flight control system designer, using MIL-F-8785-(C) as a guide, that yield the dynamic behavior pilots prefer in flared landings. The results of the second part provide the flying qualities engineer with a derived flying qualities predictive tool which appears to be highly accurate. This time-domain predictive flying qualities criterion was applied to the flight data as well as six previous flying qualities studies, and the results indicate that the criterion predicted the flying qualities level 81% of the time and the Cooper-Harper pilot rating, within + or - 1%, 60% of the time.

  17. Fly Me to the Moon

    NASA Image and Video Library

    2018-01-24

    Human spaceflight inspires humans to create art, in many forms—a collection of fiber art quilts entitled Fly Me To The Moon has been touring the country since late 2016 with more stops on the schedule. A group of those quilts was displayed at NASA’s Johnson Space Center in Houston a year ago in recognition of the 50th anniversary of the Apollo 1 fire; curator Susanne Jones comments on the artistic elements of some of the pieces as well as the educational value of the exhibit to a nation inspired by space exploration. For more on the collection: http://www.susannemjones.com/fly-me-to-the-moon/ For more on Apollo: www.nasa.gov/apollo HD Download: https://archive.org/details/jsc2017m000324_Fly_Me_to_the_Moon

  18. Public knowledge of heart attack in a Nepalese population survey.

    PubMed

    Limbu, Yuba R; Malla, Rabi; Regmi, Shyam R; Dahal, Ramesh; Nakarmi, Hari L; Yonzan, Ganesh; Gartaula, Ritu P

    2006-01-01

    Limited knowledge of heart attack symptoms may prevent patients from seeking time-dependent thrombolytic therapy, an intervention that offers impressive survival benefit. Previous studies carried out in developed countries demonstrated a deficit of knowledge about a wide range of heart attack symptoms. The aim of this study was to describe knowledge of heart attack, knowledge of heart attack symptoms, and anticipated first response to symptoms among the lay public in Nepal. A total of 1192 participants (657 men and 535 women age 16 to 88 years old) were interviewed in a cross-sectional manner. Those <16 years of age, all health professionals, and individuals with a history of heart attack were excluded. A total of 862 (72.3%) participants had heard of heart attack. Significantly more male than female participants had heard of heart attack (P <.001). Of the respondents, 91.7% with >or=10 years of education (ED-2) had heard of heart of attack, whereas only 54% respondents with <10 years of education or who were illiterate (unable to read and write) (ED-1) had heard of heart attack, and in both the male and female populations, a higher percentage of the ED-2 group had heard of heart attack than the ED-1 group (92.6% vs. 60% and 85.6% vs. 49.6%, respectively). A significantly higher number of respondents from 31 to 50 years of age (AGE-2) had heard of heart attack than those 16 to 30 years of age (AGE-1) and those >50 years of age (AGE-3) (P <.001). Among 862 respondents who had heard of heart attack, 21.3% could not name any heart attack symptoms. A total of 16 different heart attack symptoms were named. Fainting or collapsing (48%), chest pain (22.4%), shortness of breath (9%), dizziness (8.4%), palpitations (7.4%), and sweating (7.4%) were the leading symptoms named by respondents. Fainting or collapsing and chest pain and shortness of breath were named more frequently among the ED-2 group respondents and the AGE-3 group men. Only 3.7% could name >or=2 typical heart

  19. Panic attacks. Psychologic response or medical illness?

    PubMed

    Katerndahl, D A

    1984-06-01

    Panic attacks are surprisingly common in the United States, costing our economy more than $100 million per year in disability benefits and health care expenses. However, diagnosis is difficult and consequently many patients are treated for other conditions. When an underlying disorder is determined to be present, treatment of that disorder may ameliorate attacks. If none is present, panic symptoms will respond to a variety of drugs. Behavioral therapy may be necessary in severe cases or as adjunctive therapy after attacks abate.

  20. The use of fly larvae for organic waste treatment.

    PubMed

    Čičková, Helena; Newton, G Larry; Lacy, R Curt; Kozánek, Milan

    2015-01-01

    The idea of using fly larvae for processing of organic waste was proposed almost 100 years ago. Since then, numerous laboratory studies have shown that several fly species are well suited for biodegradation of organic waste, with the house fly (Musca domestica L.) and the black soldier fly (Hermetia illucens L.) being the most extensively studied insects for this purpose. House fly larvae develop well in manure of animals fed a mixed diet, while black soldier fly larvae accept a greater variety of decaying organic matter. Blow fly and flesh fly maggots are better suited for biodegradation of meat processing waste. The larvae of these insects have been successfully used to reduce mass of animal manure, fecal sludge, municipal waste, food scrapes, restaurant and market waste, as well as plant residues left after oil extraction. Higher yields of larvae are produced on nutrient-rich wastes (meat processing waste, food waste) than on manure or plant residues. Larvae may be used as animal feed or for production of secondary products (biodiesel, biologically active substances). Waste residue becomes valuable fertilizer. During biodegradation the temperature of the substrate rises, pH changes from neutral to alkaline, ammonia release increases, and moisture decreases. Microbial load of some pathogens can be substantially reduced. Both larvae and digested residue may require further treatment to eliminate pathogens. Facilities utilizing natural fly populations, as well as pilot and full-scale plants with laboratory-reared fly populations have been shown to be effective and economically feasible. The major obstacles associated with the production of fly larvae from organic waste on an industrial scale seem to be technological aspects of scaling-up the production capacity, insufficient knowledge of fly biology necessary to produce large amounts of eggs, and current legislation. Technological innovations could greatly improve performance of the biodegradation facilities and

  1. Study on Strength Behavior of Organic Soil Stabilized with Fly Ash

    PubMed Central

    Molla, Md. Keramat Ali; Sarkar, Grytan

    2017-01-01

    The aim of this study is to investigate the effect of fly ash on the consistency, compactness, acidic properties, and strength of organic soil. The presence of organic content in the soil has detrimental impacts on the physical and strength behavior of soil. To investigate the effectiveness of fly ash in the stabilization of organic soil, two types of fly ashes (Type I and Type II) at different percentages were used. It is found that fly ash significantly reduces the plasticity index of the organic soil, whereas the liquid and plastic limits increase. The dry density of the fly ash-soil mixture increases significantly, while the water requirement reduces due to the addition of fly ash. The increase of dry density compromises higher strength. The increase of qu with the increase of fly ash content is mainly due to the pozzolanic reaction of fly ash, although the reduction in water content results from the addition of dry fly ash solid. Moreover, Type I fly ash contributes a higher value of qu compared to Type II fly ash. This is attributed to the characteristics of fly ash including CaO and CaO/SiO2 ratio. PMID:29085881

  2. OPERATION COBRA. Deliberate Attack, Exploitation

    DTIC Science & Technology

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  3. Treatment of fly ash from power plants using thermal plasma.

    PubMed

    Al-Mayman, Sulaiman; AlShunaifi, Ibrahim; Albeladi, Abdullah; Ghiloufi, Imed; Binjuwair, Saud

    2017-01-01

    Fly ash from power plants is very toxic because it contains heavy metals. In this study fly ash was treated with a thermal plasma. Before their treatment, the fly ash was analyzed by many technics such as X-ray fluorescence, CHN elemental analysis, inductively coupled plasma atomic emission spectroscopy and scanning electron microscopy. With these technics, the composition, the chemical and physical proprieties of fly ash are determined. The results obtained by these analysis show that fly ash is mainly composed of carbon, and it contains also sulfur and metals such as V, Ca, Mg, Na, Fe, Ni, and Rh. The scanning electron microscopy analysis shows that fly ash particles are porous and have very irregular shapes with particle sizes of 20-50 μm. The treatment of fly ash was carried out in a plasma reactor and in two steps. In the first step, fly ash was treated in a pyrolysis/combustion plasma system to reduce the fraction of carbon. In the second step, the product obtained by the combustion of fly ash was vitrified in a plasma furnace. The leaching results show that the fly ash was detoxified by plasma vitrification and the produced slag is amorphous and glassy.

  4. Treatment of fly ash from power plants using thermal plasma

    PubMed Central

    Al-Mayman, Sulaiman; AlShunaifi, Ibrahim; Albeladi, Abdullah; Binjuwair, Saud

    2017-01-01

    Fly ash from power plants is very toxic because it contains heavy metals. In this study fly ash was treated with a thermal plasma. Before their treatment, the fly ash was analyzed by many technics such as X-ray fluorescence, CHN elemental analysis, inductively coupled plasma atomic emission spectroscopy and scanning electron microscopy. With these technics, the composition, the chemical and physical proprieties of fly ash are determined. The results obtained by these analysis show that fly ash is mainly composed of carbon, and it contains also sulfur and metals such as V, Ca, Mg, Na, Fe, Ni, and Rh. The scanning electron microscopy analysis shows that fly ash particles are porous and have very irregular shapes with particle sizes of 20–50 μm. The treatment of fly ash was carried out in a plasma reactor and in two steps. In the first step, fly ash was treated in a pyrolysis/combustion plasma system to reduce the fraction of carbon. In the second step, the product obtained by the combustion of fly ash was vitrified in a plasma furnace. The leaching results show that the fly ash was detoxified by plasma vitrification and the produced slag is amorphous and glassy. PMID:28546898

  5. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    NASA Astrophysics Data System (ADS)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  6. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    PubMed Central

    Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-01-01

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. PMID:29065461

  7. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    PubMed

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  8. Comparison of Intrinsic Rate of Different House Fly Densities in a Simulated Condition: A Prediction for House Fly Population and Control Threshold.

    PubMed

    Ong, Song-Quan; Ahmad, Hamdan; Jaal, Zairi; Rus, Adanan; Fadzlah, Fadhlina Hazwani Mohd

    2017-01-01

    Determining the control threshold for a pest is common prior to initiating a pest control program; however, previous studies related to the house fly control threshold for a poultry farm are insufficient for determining such a threshold. This study aimed to predict the population changes of house fly population by comparing the intrinsic rate of increase (r m ) for different house fly densities in a simulated system. This study first defined the knee points of a known population growth curve as a control threshold by comparing the r m of five densities of house flies in a simulated condition. Later, to understand the interactions between the larval and adult populations, the correlation between larval and adult capacity rate (r c ) was studied. The r m values of 300- and 500-fly densities were significantly higher compared with the r m values at densities of 50 and 100 flies. This result indicated their representative indices as candidates for a control threshold. The r c of larval and adult populations were negatively correlated with densities of fewer than 300 flies; this implicated adult populations with fewer than 300 flies as declining while the larval population was growing; therefore, control approaches should focus on the immature stages. The results in the present study suggest a control threshold for house fly populations. Future works should focus on calibrating the threshold indices in field conditions. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  10. Counteracting Power Analysis Attacks by Masking

    NASA Astrophysics Data System (ADS)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  11. Metrics for Assessment of Smart Grid Data Integrity Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annarita Giani; Miles McQueen; Russell Bent

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less

  12. Public Figure Attacks in the United States, 1995-2015.

    PubMed

    Meloy, J Reid; Amman, Molly

    2016-09-01

    An archival descriptive study of public figure attackers in the United States between 1995 and 2015 was undertaken. Fifty-six incidents were identified, primarily through exhaustive internet searches, composed of 58 attackers and 58 victims. A code book was developed which focused upon victims, offenders, pre-attack behaviors including direct threats, attack characteristics, post-offense and other outcomes, motivations and psychological abstracts. The average interrater agreement for coding of bivariate variables was 0.835 (intraclass correlation coefficient). The three most likely victim categories were politicians, judges, and athletes. Attackers were males, many with a psychiatric disorder, most were grandiose, and most had both a violent and nonviolent criminal history. The known motivations for the attacks were often angry and personal, the most common being dissatisfaction with a judicial or other governmental process (23%). In only one case was the primary motivation to achieve notoriety. Lethality risk during an attack was 55%. Collateral injury or death occurred in 29% of the incidents. Only 5% communicated a direct threat to the target beforehand. The term "publicly intimate figure" is introduced to describe the sociocultural blurring of public and private lives among the targets, and its possible role in some attackers' perceptions and motivations. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  13. Shark attack in Natal.

    PubMed

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  14. Flying Squirrel–associated Typhus, United States

    PubMed Central

    Krebs, John W.; Comer, James A.; Sumner, John W.; Rushton, Thomas C.; Lopez, Carlos E.; Nicholson, William L.; Rooney, Jane A.; Lance-Parker, Susan E.; McQuiston, Jennifer H.; Paddock, Christopher D.; Childs, James E.

    2003-01-01

    In March 2002, typhus fever was diagnosed in two patients residing in West Virginia and Georgia. Both patients were hospitalized with severe febrile illnesses, and both had been recently exposed to or had physical contact with flying squirrels or flying squirrel nests. Laboratory results indicated Rickettsia prowazekii infection. PMID:14609478

  15. Profile of an accident flying squad.

    PubMed

    Little, K

    1972-09-30

    An analysis of 184 accident flying squad calls and of 280 patients injured in road accidents and treated by a flying squad based on an accident department inclusive from 1967 to 1971 has shown that such a service can provide an efficient system without disrupting the routine work of the hospital.

  16. The impact of flying qualities on helicopter operational agility

    NASA Technical Reports Server (NTRS)

    Padfield, Gareth D.; Lappos, Nick; Hodgkinson, John

    1993-01-01

    Flying qualities standards are formally set to ensure safe flight and therefore reflect minimum, rather than optimum, requirements. Agility is a flying quality but relates to operations at high, if not maximum, performance. While the quality metrics and test procedures for flying, as covered for example in ADS33C, may provide an adequate structure to encompass agility, they do not currently address flight at high performance. This is also true in the fixed-wing world and a current concern in both communities is the absence of substantiated agility criteria and possible conflicts between flying qualities and high performance. AGARD is sponsoring a working group (WG19) title 'Operational Agility' that deals with these and a range of related issues. This paper is condensed from contributions by the three authors to WG19, relating to flying qualities. Novel perspectives on the subject are presented including the agility factor, that quantifies performance margins in flying qualities terms; a new parameter, based on maneuver acceleration is introduced as a potential candidate for defining upper limits to flying qualities. Finally, a probabilistic analysis of pilot handling qualities ratings is presented that suggests a powerful relationship between inherent airframe flying qualities and operational agility.

  17. Sensitivity to carbon dioxide in subjects with a single lifetime panic attack: possible clinical "bedside" predictive test for panic disorder after a first attack.

    PubMed

    Berzak, Elina; Reznik, Mila; Narsia, Oxana; Benjamin, Jonathan

    2004-01-01

    There is currently no way of knowing whether a patient who has recently had a single panic attack has incipient panic disorder. Sensitivity to carbon dioxide (CO2) is lower in healthy volunteers than in panic disorder patients. If this is also true of people who experience a single lifetime panic attack, it could be used as a prognostic test. Subjects with a single lifetime panic attack and subjects with panic disorder received an inhalation of 35% CO2. Subjects completed the panic symptoms scale (PSS), and also stated whether they considered that they had experienced an attack. None of 14 subjects with a single lifetime panic attack, compared to 7 of 17 subjects with panic disorder (P=.009), had an attack. The PSS also distinguished between the groups. The 35% CO2 challenge warrants further investigation as a predictive test after a first panic attack.

  18. Can Vitamins Help Prevent a Heart Attack?

    MedlinePlus

    ... taking vitamins help prevent heart disease or a heart attack? Answers from Rekha Mankad, M.D. It's not yet clear ... risk of developing heart disease or having a heart attack. But, what is known is that no vitamin ...

  19. Attacker-defender game from a network science perspective

    NASA Astrophysics Data System (ADS)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  20. Profile of an Accident Flying Squad

    PubMed Central

    Little, Keith

    1972-01-01

    An analysis of 184 accident flying squad calls and of 280 patients injured in road accidents and treated by a flying squad based on an accident department inclusive from 1967 to 1971 has shown that such a service can provide an efficient system without disrupting the routine work of the hospital. PMID:5076258

  1. Semiochemical-based management of biting fly management in the US

    USDA-ARS?s Scientific Manuscript database

    Stable flies (Stomoxys calcitran) and horn flies (Haematobia irritans) are two major blood-feeding pests of bovids and equids in confined and pasture settings. It has reported that just stable flies alone can cause over $2 billion annually in losses to the U.S. cattle industry. These flies can be se...

  2. Research on high power intra-channel crosstalk attack in optical networks

    NASA Astrophysics Data System (ADS)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  3. Nonlinear Flying Qualities Criteria for Large-Amplitude Maneuvers

    DTIC Science & Technology

    1984-12-01

    theory which are pertinent to the formation of a nonlinear flying qualities methodology. This report surveys nonlinear system theory and describes...the development of an applied flying qualities methodology based on a canonical system theory and using research in relative controllability...The Nonlinear Flying Qualities (NFQ) for Large-Amplitude Maneuvers Program examined promising techniques from nonlinear analysis and nonlinear system

  4. Advanced control technology and airworthiness flying qualities requirements

    NASA Technical Reports Server (NTRS)

    Snyder, C. T.

    1976-01-01

    Flying quality requirements are specified in terms of the complete pilot-airframe-systems loop, the task, and the environment. Results from a study of flying qualities are reported. A review of the treatment of failure cases in various flying quality requirements is presented along with a description of the methods used and relevant lessons learned from recent Autoland certification programs.

  5. Transient Ischemic Attack

    MedlinePlus

    A transient ischemic attack (TIA) is a stroke that lasts only a few minutes. It happens when the blood supply to part of the brain is briefly blocked. Symptoms of a TIA are like other stroke symptoms, but do not ...

  6. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.

    PubMed

    Grosshans, Frédéric; Cerf, Nicolas J

    2004-01-30

    A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.

  7. Risk factors for hypertensive attack during pheochromocytoma resection

    PubMed Central

    Kwon, Se Yun; Lee, Kyung Seop; Lee, Jun Nyung; Ha, Yun-Sok; Choi, Seock Hwan; Kim, Hyun Tae; Kim, Tae-Hwan; Yoo, Eun Sang

    2016-01-01

    Purpose We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. Materials and Methods Data from 53 patients diagnosed with pheochromocytoma at Kyungpook National Uriversity Medical Center between January 2000 and June 2012 were retrospectively analyzed. The subjects were divided into 2 groups depending on the presence or absence of hypertensive attack at the time of surgery. Patient demographic characteristics and preoperative evaluations were assessed for their prognostic relevance with respect to hypertensive attack. A univariate analysis was conducted, and a multivariate logistic regression analysis was also performed. Results In the univariate analysis, systolic blood pressure at presentation, preoperative hormonal status (including epinephrine, norepinephrine, vanillylmandelic acid, and metanephrine levels in a 24-hour urine sample), tumor size, and postoperative systolic blood pressure were significantly associated with the development of hypertensive attack. In the multivariate analysis, preoperative epinephrine level and tumor size were independent factors that predicted hypertensive attack. The highest odds ratio for tumor size (2.169) was obtained at a cutoff value of 4.25 cm and the highest odds ratio for preoperative epinephrine (1.020) was obtained at a cutoff value of 166.3 µg/d. Conclusions In this study, a large tumor size and an elevated preoperative urinary epinephrine level were risk factors for intraoperative hypertensive attack in patients with pheochromocytoma. PMID:27194549

  8. Effectiveness of the call in beach volleyball attacking play.

    PubMed

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-09

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  9. Design, aerodynamics and autonomy of the DelFly.

    PubMed

    de Croon, G C H E; Groen, M A; De Wagter, C; Remes, B; Ruijsink, R; van Oudheusden, B W

    2012-06-01

    One of the major challenges in robotics is to develop a fly-like robot that can autonomously fly around in unknown environments. In this paper, we discuss the current state of the DelFly project, in which we follow a top-down approach to ever smaller and more autonomous ornithopters. The presented findings concerning the design, aerodynamics and autonomy of the DelFly illustrate some of the properties of the top-down approach, which allows the identification and resolution of issues that also play a role at smaller scales. A parametric variation of the wing stiffener layout produced a 5% more power-efficient wing. An experimental aerodynamic investigation revealed that this could be associated with an improved stiffness of the wing, while further providing evidence of the vortex development during the flap cycle. The presented experiments resulted in an improvement in the generated lift, allowing the inclusion of a yaw rate gyro, pressure sensor and microcontroller onboard the DelFly. The autonomy of the DelFly is expanded by achieving (1) an improved turning logic to obtain better vision-based obstacle avoidance performance in environments with varying texture and (2) successful onboard height control based on the pressure sensor.

  10. A New Flying Wire System for the Tevatron

    NASA Astrophysics Data System (ADS)

    Blokland, Willem; Dey, Joseph; Vogel, Greg

    1997-05-01

    A new Flying Wires system replaces the old system to enhance the analysis of the beam emittance, improve the reliability, and handle the upcoming upgrades of the Tevatron. New VME data acquisition modules and timing modules allow for more bunches to be sampled more precisely. The programming language LabVIEW, running on a Macintosh computer, controls the VME modules and the nuLogic motion board that flies the wires. LabVIEW also analyzes and stores the data, and handles local and remote commands. The new system flies three wires and fits profiles of 72 bunches to a gaussian function within two seconds. A new console application operates the flying wires from any control console. This paper discusses the hardware and software setup, the capabilities and measurement results of the new Flying Wires system.

  11. Pore Structure Characterization in Concrete Prepared with Carbonated Fly Ash

    NASA Astrophysics Data System (ADS)

    Sahoo, Sanjukta

    2018-03-01

    Carbon dioxide capture and storage (CCS) is a technique to address the global concern of continuously rising CO2 level in the atmosphere. Fly ash is considered as a suitable medium for CCS due to presence of metal oxides. The fly ash which has already sequestered carbon dioxide is referred to as carbonated fly ash. Recent research reveals better durability of concretes using carbonated fly ash as part replacement of cement. In the present research pore structure characterization of the carbonated fly ash concrete has been carried out. Mercury Intrusion porosimetry test has been conducted on control concrete and concrete specimens using fly ash and carbonated fly ash at replacement levels of 25% and 40%. The specimens have been water cured for 28 days and 90 days. It is observed that porosity reduction rate is more pronounced in carbonated fly ash concrete compared to control concrete at higher water curing age. Correlation analysis is also carried out which indicates moderately linear relationship between porosity % and pore distribution with particle size and water curing.

  12. [Peculiarities of research of flying thinking].

    PubMed

    Kovalenko, P A; Chulaevskiĭ, A O

    2011-01-01

    New approach to the research of flying thinking is offered. This approach is based on principals of stage-by-stage approach (research of the reflection of every parameter of flight, than its aggregate in figured and conceptual framework), on the usage of the methods of registration of inner and external characteristics of activity of the air staff with the priority of research of content area and mechanisms of flying thinking, typology of content area and mechanisms of flying thinking. This approach is also based on the effectiveness of reflection by means of correlation of the detected figured and conceptual framework with time and correctness of decisions of test flight tasks and with different psychophysiological characteristics.

  13. Case report: Pig attack with successful postexposure prophylaxis management.

    PubMed

    Hall, A Brad; Smith, David; Palmer, Jillian

    2014-05-01

    The domesticated pig or boar is ubiquitous to agriculture around the world and is an important food product in most countries. The males that are able to grow tusks that can approach 5 in are the primary contributor to morbidity and mortality from boar attacks. Literature surrounding domesticated boar attacks is sparse. There are no published cases of domesticated boar attacks that describe successful bacterial postexposure prophylaxis. We present a case report of an attack on an adult female by a domesticated boar.

  14. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  15. Analysis of Navy Flight Scheduling Methods Using FlyAwake

    DTIC Science & Technology

    2009-09-01

    28 Figure 4. FlyAwake Schedule Builder Screenshot..........................................................28...Figure 5. FlyAwake Work Schedule Builder Screenshot................................................29 Figure 6. FlyAwake Graphical Output Screenshot... disqualifies crewmembers from participating in the following day’s flight operations. These rules are subject to operational requirements and deviation

  16. Control of free-flying space robot manipulator systems

    NASA Technical Reports Server (NTRS)

    Cannon, Robert H., Jr.

    1977-01-01

    To accelerate the development of multi-armed, free-flying satellite manipulators, a fixed-base cooperative manipulation facility is being developed. The work performed on multiple arm cooperation on a free-flying robot is summarized. Research is also summarized on global navigation and control of free-flying space robots. The Locomotion Enhancement via Arm Pushoff (LEAP) approach is described and progress to date is presented.

  17. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-14

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  18. MSW fly ash stabilized with coal ash for geotechnical application.

    PubMed

    Kamon, M; Katsumi, T; Sano, Y

    2000-09-15

    The solidification and stabilization of municipal solid waste (MSW) fly ash for the purpose of minimizing the geo-environmental impact caused by toxic heavy metals as well as ensuring engineering safety (strength and soaking durability) are experimentally evaluated. The mixtures of MSW fly ash stabilized with cement and fluidized bed combustion coal fly ash (FCA) were used for unconfined compressive strength tests, leachate tests, and soaking tests. The behavior of soluble salts contained in the MSW fly ash significantly affects strength development, soaking durability, and the hardening reaction of the stabilized MSW fly ash mixtures. The cement stabilization of the MSW fly ash does not have enough effect on strength development and soaking durability. The addition of cement only contributes to the containment of heavy metals due to the high level of alkalinity. When using FCA as a stabilizing agent for MSW fly ash, the mixture exhibits high strength and durability. However, the Cd leachate cannot be prevented in the early stages of curing. Using a combination of cement and FCA as a MSW fly ash stabilizer can attain high strength, high soaking durability, and the containment of heavy metals. The stabilized MSW fly ash with cement and FCA can be practically applied to embankments.

  19. Finite Energy and Bounded Attacks on Control System Sensor Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less

  20. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  1. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  2. The Saucer Ride

    NASA Image and Video Library

    2015-05-11

    Crews from the Columbia Scientific Balloon Facility prepare the balloon for flight for the 2014 NASA Low-Density Supersonic Decelerator test from the U.S. Navy Pacific Missile Range Facility on Kauai, Hawaii.

  3. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  4. Episodic radiations in the fly tree of life

    PubMed Central

    Wiegmann, Brian M.; Trautwein, Michelle D.; Winkler, Isaac S.; Barr, Norman B.; Kim, Jung-Wook; Lambkin, Christine; Bertone, Matthew A.; Cassel, Brian K.; Bayless, Keith M.; Heimberg, Alysha M.; Wheeler, Benjamin M.; Peterson, Kevin J.; Pape, Thomas; Sinclair, Bradley J.; Skevington, Jeffrey H.; Blagoderov, Vladimir; Caravas, Jason; Kutty, Sujatha Narayanan; Schmidt-Ott, Urs; Kampmeier, Gail E.; Thompson, F. Christian; Grimaldi, David A.; Beckenbach, Andrew T.; Courtney, Gregory W.; Friedrich, Markus; Meier, Rudolf; Yeates, David K.

    2011-01-01

    Flies are one of four superradiations of insects (along with beetles, wasps, and moths) that account for the majority of animal life on Earth. Diptera includes species known for their ubiquity (Musca domestica house fly), their role as pests (Anopheles gambiae malaria mosquito), and their value as model organisms across the biological sciences (Drosophila melanogaster). A resolved phylogeny for flies provides a framework for genomic, developmental, and evolutionary studies by facilitating comparisons across model organisms, yet recent research has suggested that fly relationships have been obscured by multiple episodes of rapid diversification. We provide a phylogenomic estimate of fly relationships based on molecules and morphology from 149 of 157 families, including 30 kb from 14 nuclear loci and complete mitochondrial genomes combined with 371 morphological characters. Multiple analyses show support for traditional groups (Brachycera, Cyclorrhapha, and Schizophora) and corroborate contentious findings, such as the anomalous Deuterophlebiidae as the sister group to all remaining Diptera. Our findings reveal that the closest relatives of the Drosophilidae are highly modified parasites (including the wingless Braulidae) of bees and other insects. Furthermore, we use micro-RNAs to resolve a node with implications for the evolution of embryonic development in Diptera. We demonstrate that flies experienced three episodes of rapid radiation—lower Diptera (220 Ma), lower Brachycera (180 Ma), and Schizophora (65 Ma)—and a number of life history transitions to hematophagy, phytophagy, and parasitism in the history of fly evolution over 260 million y. PMID:21402926

  5. Cognitive behavior therapy for fear of flying: sustainability of treatment gains after September 11.

    PubMed

    Anderson, Page; Jacobs, Carli H; Lindner, Gretchen K; Edwards, Shannan; Zimand, Elana; Hodges, Larry; Rothbaum, Barbara Olasov

    2006-03-01

    This study examines the long-term efficacy of cognitive-behavioral therapy (CBT) for fear of flying (FOF) after a catastrophic fear-relevant event, the September 11, 2001, terrorist attacks. Participants (N = 115) were randomly assigned to and completed treatment for FOF using 8 sessions of either virtual reality exposure therapy (VRE) or standard exposure therapy (SE) prior to September 11, 2001. Individuals were reassessed in June, 2002, an average of 2.3 years after treatment, with a response rate of 48% (n = 55). Analyses were run on the original data and, using multiple imputation procedures, on imputed data for the full sample. Individuals maintained or improved upon gains made in treatment as measured by standardized FOF questionnaires and by number of flights taken. There were no differences between VRE and SE. Thus, results suggest that individuals previously treated for FOF with cognitive-behavioral therapy can maintain treatment gains in the face of a catastrophic fear-relevant event, even years after treatment is completed.

  6. Vestergaard zerofly fabric for fly control in the US

    USDA-ARS?s Scientific Manuscript database

    Vestergaard ZeroFly pesticide-impregnated fabric has been evaluated in zero-graze swine and cattle farms in Sub-Saharan Africa for management of biting flies, particularly those capable of transmitting Nangana, i.e. tsetse. Other major blood-feeding flies encountered around these units are various s...

  7. Distinction of Fly Artifacts from Human Blood using Immunodetection.

    PubMed

    Rivers, David B; Acca, Gillian; Fink, Marc; Brogan, Rebecca; Chen, Dorothy; Schoeffield, Andrew

    2018-02-21

    Insect stains produced by necrophagous flies are indistinguishable morphologically from human bloodstains. At present, no diagnostic tests exist to overcome this deficiency. As the first step toward developing a chemical test to recognize fly artifacts, polyclonal antisera were generated in rats against three distinct antigenic sequences of fly cathepsin D-like proteinase, an enzyme that is structurally distinct in cyclorrhaphous Diptera from other animals. The resulting rat antisera bound to artifacts produced by Protophormia terraenovae and synthetic peptides used to generate the polyclonal antisera, but not with any type of mammalian blood tested in immunoassays. Among the three antisera, anti-md3 serum displayed the highest reactivity for fly stains, demonstrated cross-reactivity for all synthetic peptides representing antigenic sequences of the mature fly enzyme, and bound artifacts originating from the fly digestive tract. Further work is needed to determine whether the antisera are suitable for non-laboratory conditions. © 2018 American Academy of Forensic Sciences.

  8. Attack Helicopter Operations: Art or Science

    DTIC Science & Technology

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  9. Attack by Pyemotes johnmoseri (Acari: Pyemotidae)

    Treesearch

    Tulin Askit; Ibrahim Cakmak; John Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸it et al. 2003). This pest attacks...

  10. Improve California trap programs for detection of fruit flies

    USDA-ARS?s Scientific Manuscript database

    There are >160,000 federal and state fruit fly detection traps deployed in southern and western U.S. States and Puerto Rico. In California alone, >100,000 traps are deployed and maintained just for exotic fruit flies detection. Fruit fly detection and eradication requires deployment of large numbers...

  11. Comparison of Anastrepha ludens (Diptera: Tephritidae) Bisexual and Genetic Sexing (Tapachula-7) Strains: Effect of Hypoxia, Fly Density, Chilling Period, and Food Type on Fly Quality.

    PubMed

    Arredondo, José; Ruiz, Lía; Hernández, Emilio; Montoya, Pablo; Díaz-Fleischer, Francisco

    2016-04-01

    The use of genetic sexing strain (GSS) insects in the sterile insect technique (SIT) makes necessary the revision of quality parameters of some stressful steps used during the packing process for aerial release because of possible differences in tolerance between fly strains. Here, we determined the effect of three periods of hypoxia (12, 24, and 36 h at pupal stage), three cage densities (1.0, 1.3, and 1.5 flies/cm2), two different foods (protein/sugar (1/24) and Mubarqui), and three chilling times (20 min [control], 90, and 180 min) on the quality parameters of flies of two Anastrepha ludens (Loew) strains (bisexual and GSS Tapachula-7). In general, the response to stressful conditions of both fly strains was qualitatively equivalent but quantitatively different, as flies of both strains responded equally to the stressful factors; however, flies of Tapachula-7 exhibited lower quality parameters than the control flies. Thus, hypoxia affected the flying ability but not the emergence or longevity of flies. The food type affected the adult weight; protein/sugar produced heavier flies that also survived longer and had a greater mating propensity. Flies under the lowest density were better fliers that those at the other two densities. Increasing chilling time reduced flight ability but not longevity or mating propensity. The implications of these findings for the use of A. ludens GSS in SIT programs are discussed herein.

  12. Fruit_Flies_in_Microgravity

    NASA Image and Video Library

    2017-05-25

    Scientists study how astronauts are affected by microgravity, but with a relatively small number of human subjects available to them, they often turn to model organisms for research. Model organisms are living organisms that have a genetic makeup that is relatively well-documented and understood, and is similar to human systems. Fruit flies are reliable model organisms because their systems closely resemble that of larger organisms. They have the benefit of being small in size, well understood, and reproduce quickly so many generations can be studied in a short amount of time. Some of the things we can study using fruit flies are how microgravity affects the immune system. Will the muscle cells of the heart lose strength in microgravity? Are reproduction, lifespan and the aging process affected by microgravity? Do changes in gravity affect the basic metabolic rate and metabolism of living systems? Fruit flies offer a manageable way to study living systems in microgravity. Learn more about other model organisms and how they are being used for microgravity research, and keep up with all the science being conducted aboard your orbiting laboratory by visiting ISS Research Overview on nasa.gov http://www.twitter.com/ISS_Research

  13. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  14. Area-wide suppression of the Mediterranean fruit fly, Ceratitis capitata, and the Oriental fruit fly, Bactrocera dorsalis, in Kamuela, Hawaii.

    PubMed

    Vargas, Roger I; Piñero, Jaime C; Mau, Ronald F L; Jang, Eric B; Klungness, Lester M; McInnis, Donald O; Harris, Ernest B; McQuate, Grant T; Bautista, Renato C; Wong, Lyle

    2010-01-01

    The United States Department of Agriculture's Agricultural Research Service initiated an area-wide fruit fly management program in Hawaii in 2000. The first demonstration site was established in Kamuela, Hawaii, USA. This paper documents suppression of the Mediterranean fruit fly, Ceratitis capitata (Wiedemann), and the oriental fruit fly, Bactrocera dorsalis (Hendel) (Diptera: Tephritidae), in a 40 km2 area containing urban, rural and agricultural zones during a 6 year period. The suppression techniques included sanitation, GF-120 NF Naturalyte Fruit Fly Bait sprays, male annihilation, Biolure traps, and parasitoids against C. capitata and B. dorsalis. In addition, small numbers of sterile males were released against B. dorsalis. Substantial reductions in fruit infestation levels were achieved for both species (90.7 and 60.7% for C. capitata and B. dorsalis, respectively) throughout the treatment period. Fruit fly captures in the 40 km2 treatment area were significantly lower during the 6 year period than those recorded in three non-treated areas. The strategy of combining suppression techniques in an area-wide approach is discussed.

  15. Area-Wide Suppression of the Mediterranean Fruit Fly, Ceratitis capitata, and the Oriental Fruit Fly, Bactrocera dorsalis, in Kamuela, Hawaii

    PubMed Central

    Vargas, Roger I.; Piñero, Jaime C.; Mau, Ronald F. L.; Jang, Eric B.; Klungness, Lester M.; McInnis, Donald O.; Harris, Ernest B.; McQuate, Grant T.; Bautista, Renato C.; Wong, Lyle

    2010-01-01

    The United States Department of Agriculture's Agricultural Research Service initiated an area-wide fruit fly management program in Hawaii in 2000. The first demonstration site was established in Kamuela, Hawaii, USA. This paper documents suppression of the Mediterranean fruit fly, Ceratitis capitata (Wiedemann), and the oriental fruit fly, Bactrocera dorsalis (Hendel) (Diptera: Tephritidae), in a 40 km2 area containing urban, rural and agricultural zones during a 6 year period. The suppression techniques included sanitation, GF-120 NF Naturalyte Fruit Fly Bait sprays, male annihilation, Biolure® traps, and parasitoids against C. capitata and B. dorsalis. In addition, small numbers of sterile males were released against B. dorsalis. Substantial reductions in fruit infestation levels were achieved for both species (90.7 and 60.7% for C. capitata and B. dorsalis, respectively) throughout the treatment period. Fruit fly captures in the 40 km2 treatment area were significantly lower during the 6 year period than those recorded in three non-treated areas. The strategy of combining suppression techniques in an area-wide approach is discussed. PMID:20883128

  16. A Traceability Attack against e-Passports

    NASA Astrophysics Data System (ADS)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  17. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  18. Kinematic diversity suggests expanded roles for fly halteres

    PubMed Central

    Hall, Joshua M.; McLoughlin, Dane P.; Kathman, Nicholas D.; Yarger, Alexandra M.; Mureli, Shwetha; Fox, Jessica L.

    2015-01-01

    The halteres of flies are mechanosensory organs that provide information about body rotations during flight. We measured haltere movements in a range of fly taxa during free walking and tethered flight. We find a diversity of wing–haltere phase relationships in flight, with higher variability in more ancient families and less in more derived families. Diverse haltere movements were observed during free walking and were correlated with phylogeny. We predicted that haltere removal might decrease behavioural performance in those flies that move them during walking and provide evidence that this is the case. Our comparative approach reveals previously unknown diversity in haltere movements and opens the possibility of multiple functional roles for halteres in different fly behaviours. PMID:26601682

  19. Evaluation of the mechanical properties of class-F fly ash.

    PubMed

    Kim, Bumjoo; Prezzi, Monica

    2008-01-01

    Coal-burning power plants in the United States (US) generate more than 70 million tons of fly ash as a by-product annually. Recycling large volumes of fly ash in geotechnical applications may offer an attractive alternative to the disposal problem as most of it is currently dumped in ponds or landfills. Class-F fly ash, resulting from burning of bituminous or anthracite coals, is the most common type of fly ash in the US. In the present study, the mechanical characteristics (compaction response, compressibility, and shear strength) of class-F fly ash were investigated by performing various laboratory tests (compaction test, one-dimensional compression test, direct shear test and consolidated-drained triaxial compression test) on fly ash samples collected from three power plants in the state of Indiana (US). Test results have shown that despite some morphological differences, class-F fly ash exhibits mechanical properties that are, in general, comparable to those observed in natural sandy soils.

  20. Water holding capacities of fly ashes: Effect of size fractionation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sarkar, A.; Rano, R.

    2007-07-01

    Water holding capacities of fly ashes from different thermal power plants in Eastern India have been compared. Moreover, the effect of size fractionation (sieving) on the water holding capacities has also been determined. The desorption rate of water held by the fly ash fractions at ambient temperature (25-30{sup o}C) has been investigated. The effect of mixing various size fractions of fly ash in increasing the water holding capacities of fly ash has been studied. It is observed that the fly ash obtained from a thermal power plant working on stoker-fired combustor has the highest water holding capacity, followed by themore » one that works on pulverized fuel combustor. Fly ash collected from super thermal power plant has the least water holding capacity (40.7%). The coarser size fractions of fly ashes in general have higher water holding capacities than the finer ones. An attempt has been made to correlate the results obtained, with the potential use in agriculture.« less

  1. A Unique Fatal Moose Attack Mimicking Homicide.

    PubMed

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  2. Recovery of infrastructure networks after localised attacks

    PubMed Central

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  3. Development and oviposition preference of house flies and stable flies (Diptera: Muscidae) in six substrates from Florida equine facilities

    USDA-ARS?s Scientific Manuscript database

    House flies, Musca domestica L., and stable flies, Stomoxys calcitrans (L.), (Diptera: Muscidae), common pests on equine facilities, were studied in the laboratory to determine their oviposition preferences and larval development on six substrates commonly found on equine facilities. The substrates...

  4. Induction of panic attack by stimulation of the ventromedial hypothalamus.

    PubMed

    Wilent, W Bryan; Oh, Michael Y; Buetefisch, Cathrin M; Bailes, Julian E; Cantella, Diane; Angle, Cindy; Whiting, Donald M

    2010-06-01

    Panic attacks are sudden debilitating attacks of intense distress often accompanied by physical symptoms such as shortness of breath and heart palpitations. Numerous brain regions, hormones, and neurotransmitter systems are putatively involved, but the etiology and neurocircuitry of panic attacks is far from established. One particular brain region of interest is the ventromedial hypothalamus (VMH). In cats and rats, electrical stimulation delivered to the VMH has been shown to evoke an emotional "panic attack-like" escape behavior, and in humans, stimulation targeting nuclei just posterior or anterior to the VMH has reportedly induced panic attacks. The authors report findings obtained in an awake patient undergoing bilateral implantation of deep brain stimulation electrodes into the hypothalamus that strongly implicates the VMH as being critically involved in the genesis of panic attacks. First, as the stimulating electrode progressed deeper into the VMH, the intensity of stimulation required to evoke an attack systematically decreased; second, while stimulation of the VMH in either hemisphere evoked panic, stimulation that appeared to be in the center of the VMH was more potent. Thus, this evidence supports the role of the VMH in the induction of panic attacks purported by animal studies.

  5. Search for potent attractants of onion flies.

    PubMed

    Miller, J R; Harris, M O; Breznak, J A

    1984-10-01

    Of various chopped vegetables tested,Allium spp. high in propyl-containing alkyl sulfides (e.g.,cepa group) caught the most onion flies in trapping tests in the field. Fly catches to chopped onion increased with bait quantity. Attractancy of chopped onion changed dramatically during aging in the field; catch increased over the first few days, peaked at ca. fivefold over fresh material by 3-5 days, and then declined sharply. This age-dependent increase in attraction was not seen for garlic (known to have antimicrobial properties) nor with chopped onion mixed with chopped garlic. These data suggested that attraction of onion flies to onions was strongly influenced by microbial activity associated with decomposing onions. The bacteriumKlebsiella pneumoniae was identified as a major colonizer of onions maximally attractive to onion flies. This increased attraction is not due to the previously reported microbially produced volatiles ethyl acetate and tetramethyl pyrazine.

  6. Optimal response to attacks on the open science grids.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in themore » grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.« less

  7. Robustness of network of networks under targeted attack.

    PubMed

    Dong, Gaogao; Gao, Jianxi; Du, Ruijin; Tian, Lixin; Stanley, H Eugene; Havlin, Shlomo

    2013-05-01

    The robustness of a network of networks (NON) under random attack has been studied recently [Gao et al., Phys. Rev. Lett. 107, 195701 (2011)]. Understanding how robust a NON is to targeted attacks is a major challenge when designing resilient infrastructures. We address here the question how the robustness of a NON is affected by targeted attack on high- or low-degree nodes. We introduce a targeted attack probability function that is dependent upon node degree and study the robustness of two types of NON under targeted attack: (i) a tree of n fully interdependent Erdős-Rényi or scale-free networks and (ii) a starlike network of n partially interdependent Erdős-Rényi networks. For any tree of n fully interdependent Erdős-Rényi networks and scale-free networks under targeted attack, we find that the network becomes significantly more vulnerable when nodes of higher degree have higher probability to fail. When the probability that a node will fail is proportional to its degree, for a NON composed of Erdős-Rényi networks we find analytical solutions for the mutual giant component P(∞) as a function of p, where 1-p is the initial fraction of failed nodes in each network. We also find analytical solutions for the critical fraction p(c), which causes the fragmentation of the n interdependent networks, and for the minimum average degree k[over ¯](min) below which the NON will collapse even if only a single node fails. For a starlike NON of n partially interdependent Erdős-Rényi networks under targeted attack, we find the critical coupling strength q(c) for different n. When q>q(c), the attacked system undergoes an abrupt first order type transition. When q≤q(c), the system displays a smooth second order percolation transition. We also evaluate how the central network becomes more vulnerable as the number of networks with the same coupling strength q increases. The limit of q=0 represents no dependency, and the results are consistent with the classical

  8. The non-trusty clown attack on model-based speaker recognition systems

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2015-03-01

    Biometric detectors for speaker identification commonly employ a statistical model for a subject's voice, such as a Gaussian Mixture Model, that combines multiple means to improve detector performance. This allows a malicious insider to amend or append a component of a subject's statistical model so that a detector behaves normally except under a carefully engineered circumstance. This allows an attacker to force a misclassification of his or her voice only when desired, by smuggling data into a database far in advance of an attack. Note that the attack is possible if attacker has access to database even for a limited time to modify victim's model. We exhibit such an attack on a speaker identification, in which an attacker can force a misclassification by speaking in an unusual voice, and replacing the least weighted component of victim's model by the most weighted competent of the unusual voice of the attacker's model. The reason attacker make his or her voice unusual during the attack is because his or her normal voice model can be in database, and by attacking with unusual voice, the attacker has the option to be recognized as himself or herself when talking normally or as the victim when talking in the unusual manner. By attaching an appropriately weighted vector to a victim's model, we can impersonate all users in our simulations, while avoiding unwanted false rejections.

  9. Requirements for satisfactory flying qualities of airplanes

    NASA Technical Reports Server (NTRS)

    Gilruth, R R

    1943-01-01

    Report discusses the results of an analysis of available data to determine what measured characteristics are significant in defining satisfactory flying qualities, what characteristics are reasonable to require of an airplane, and what influence the various design features have on the observed flying qualities.

  10. Defending networks against denial-of-service attacks

    NASA Astrophysics Data System (ADS)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  11. Deterring watermark collusion attacks using signal processing techniques

    NASA Astrophysics Data System (ADS)

    Lemma, Aweke N.; van der Veen, Michiel

    2007-02-01

    Collusion attack is a malicious watermark removal attack in which the hacker has access to multiple copies of the same content with different watermarks and tries to remove the watermark using averaging. In the literature, several solutions to collusion attacks have been reported. The main stream solutions aim at designing watermark codes that are inherently resistant to collusion attacks. The other approaches propose signal processing based solutions that aim at modifying the watermarked signals in such a way that averaging multiple copies of the content leads to a significant degradation of the content quality. In this paper, we present signal processing based technique that may be deployed for deterring collusion attacks. We formulate the problem in the context of electronic music distribution where the content is generally available in the compressed domain. Thus, we first extend the collusion resistance principles to bit stream signals and secondly present experimental based analysis to estimate a bound on the maximum number of modified versions of a content that satisfy good perceptibility requirement on one hand and destructive averaging property on the other hand.

  12. Reconstructing the behavior of walking fruit flies

    NASA Astrophysics Data System (ADS)

    Berman, Gordon; Bialek, William; Shaevitz, Joshua

    2010-03-01

    Over the past century, the fruit fly Drosophila melanogaster has arisen as almost a lingua franca in the study of animal behavior, having been utilized to study questions in fields as diverse as sleep deprivation, aging, and drug abuse, amongst many others. Accordingly, much is known about what can be done to manipulate these organisms genetically, behaviorally, and physiologically. Most of the behavioral work on this system to this point has been experiments where the flies in question have been given a choice between some discrete set of pre-defined behaviors. Our aim, however, is simply to spend some time with a cadre of flies, using techniques from nonlinear dynamics, statistical physics, and machine learning in an attempt to reconstruct and gain understanding into their behavior. More specifically, we use a multi-camera set-up combined with a motion tracking stage in order to obtain long time-series of walking fruit flies moving about a glass plate. This experimental system serves as a test-bed for analytical, statistical, and computational techniques for studying animal behavior. In particular, we attempt to reconstruct the natural modes of behavior for a fruit fly through a data-driven approach in a manner inspired by recent work in C. elegans and cockroaches.

  13. Tolerance of house fly, Musca domestica L. (Diptera: Muscidae) to dichlorvos (76% EC) an insecticide used for fly control in the tsunami-hit coastal villages of southern India.

    PubMed

    Srinivasan, R; Jambulingam, P; Gunasekaran, K; Boopathidoss, P S

    2008-02-01

    The Directorate of Public Health (DPH), Tamil Nadu, in southern India employed spraying of dichlorvos (76% EC) for quick elimination of fly concentrations in the tsunami-hit coastal villages at the concentration of 304g (a.i.)/10,000m(2). However, nuisance of house flies remained high particularly in temporary shelters and centralized relief kitchens. Susceptibility of house fly, Musca domestica to dichlorvos was determined in the laboratory to provide information for an effective management of this pest. Various concentrations of dichlorvos (76% EC) viz., 0.1, 0.2, 0.4, 0.6 and 0.8microg (a.i.) per fly, were tested using topical application against F(1) progenies of house flies collected 12 months after insecticide applications from different habitats in the tsunami-hit coastal villages. Fly mortality was recorded at 24h post treatment. Parallel controls were maintained for comparison. Mortality of the house flies varied between 17.5% and 100% and increased with an increase in dosage of the insecticide. Mortality was >80% at 0.6 and 0.8microg (a.i.) per fly. The LD(50) of dichlorvos tested against flies collected from different villages varied from 0.218microg (a.i.) to 0.235microg (a.i.) per fly and the LD(90) varied from 0.574microg (a.i.) to 0.639microg (a.i.) per fly. House flies collected from a rural village, Thirukanur that had never been exposed for insecticide treatment in the past one decade, when tested, the mortality varied between 92.5% and 100% and increased with concentration of dichlorvos. Mortality was >90% from 0.2microg (a.i.) per fly and the LD(50) was 0.0399microg (a.i.)/fly, while the LD(90) was 0.1604microg (a.i.)/fly. The LD(90) values of the flies collected from the tsunami-hit villages were 3.5-3.9 times higher than that of the flies collected from Thirukanur. Fly abundance remained high in tsunami-hit villages with no marked reduction, suggesting that the flies had developed tolerance to dichlorvos. It is suggested that for an effective

  14. Ka-Band Autonomous Formation Flying Sensor

    NASA Technical Reports Server (NTRS)

    Tien, Jeffrey; Purcell, George, Jr.; Srinivasan, Jeffrey; Ciminera, Michael; Srinivasan, Meera; Meehan, Thomas; Young, Lawrence; Aung, MiMi; Amaro, Luis; Chong, Yong; hide

    2004-01-01

    Ka-band integrated range and bearing-angle formation sensor called the Autonomous Formation Flying (AFF) Sensor has been developed to enable deep-space formation flying of multiple spacecraft. The AFF Sensor concept is similar to that of the Global Positioning System (GPS), but the AFF Sensor would not use the GPS. The AFF Sensor would reside in radio transceivers and signal-processing subsystems aboard the formation-flying spacecraft. A version of the AFF Sensor has been developed for initial application to the two-spacecraft StarLight optical-interferometry mission, and several design investigations have been performed. From the prototype development, it has been concluded that the AFF Sensor can be expected to measure distances and directions with standard deviations of 2 cm and 1 arc minute, respectively, for spacecraft separations ranging up to about 1 km. It has also been concluded that it is necessary to optimize performance of the overall mission through design trade-offs among the performance of the AFF Sensor, the field of view of the AFF Sensor, the designs of the spacecraft and the scientific instruments that they will carry, the spacecraft maneuvers required for formation flying, and the design of a formation-control system.

  15. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    NASA Astrophysics Data System (ADS)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  16. Douglas-fir beetle attack and tree mortality following wildfire

    Treesearch

    Sharon M. Hood; Barbara Bentz; Kevin C. Ryan

    2003-01-01

    A major concern after wildfires is the buildup of bark beetle populations in fire injured trees, and subsequent attack and population buildup in adjacent unburned areas. To examine this concern, we documented fire injury and insect attacks in Douglas-fir (Pseudotsuga menziesii) on the 2001 Green Knoll Fire, Wyoming to determine attack preferences, brood production, and...

  17. Mass casualty response in the 2008 Mumbai terrorist attacks.

    PubMed

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  18. Predicting fruit fly's sensing rate with insect flight simulations.

    PubMed

    Chang, Song; Wang, Z Jane

    2014-08-05

    Without sensory feedback, flies cannot fly. Exactly how various feedback controls work in insects is a complex puzzle to solve. What do insects measure to stabilize their flight? How often and how fast must insects adjust their wings to remain stable? To gain insights into algorithms used by insects to control their dynamic instability, we develop a simulation tool to study free flight. To stabilize flight, we construct a control algorithm that modulates wing motion based on discrete measurements of the body-pitch orientation. Our simulations give theoretical bounds on both the sensing rate and the delay time between sensing and actuation. Interpreting our findings together with experimental results on fruit flies' reaction time and sensory motor reflexes, we conjecture that fruit flies sense their kinematic states every wing beat to stabilize their flight. We further propose a candidate for such a control involving the fly's haltere and first basalar motor neuron. Although we focus on fruit flies as a case study, the framework for our simulation and discrete control algorithms is applicable to studies of both natural and man-made fliers.

  19. Flies and their bacterial loads in greyhound dog kennels in Kansas.

    PubMed

    Urban, J E; Broce, A

    1998-03-01

    Breeders of greyhound dogs traditionally feed racing animals and nursing bitches raw meat, and that meat generally is obtained frozen from commercial renderers. Previous studies have shown that the rendered meat is frequently contaminated with enteric bacteria, including Salmonella spp., and that during thawing the rendered meat is exposed to filth flies common in dog kennels. Nursing greyhound pups tend to experience a high morbidity and mortality from intestinal infections, and we attempted to determine in this study whether enterics could be spread to pups through contaminated flies. At intervals during 1995 and 1996, flies were trapped or were net-collected from 10 dog breeding kennels in the region around Abilene, KS. Trapped flies were identified and counted to determine population numbers, and netted flies were cultured in tetrathionate broth and streaked to medium selecting for Salmonella sp. and other lactose-negative Gram (-) bacteria. The relative numbers of different fly species varied with the sampling method, but traps and sweep nets produced similar proportions of the different fly species. Blow flies were twice as likely to be contaminated with enteric bacteria as any other fly. The most common enteric bacteria found were Proteus spp., followed by Providencia spp., Pseudomonas spp., and Salmonella spp. The incidence of Salmonella and Proteus spp. seemed to correlate more with accessibility of flies to dog excrement than to rendered meat. The apparent high incidence of enteric contamination of filth flies clearly implicates them as vectors of enteric diseases in kennels.

  20. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  1. Kinematic diversity suggests expanded roles for fly halteres.

    PubMed

    Hall, Joshua M; McLoughlin, Dane P; Kathman, Nicholas D; Yarger, Alexandra M; Mureli, Shwetha; Fox, Jessica L

    2015-11-01

    The halteres of flies are mechanosensory organs that provide information about body rotations during flight. We measured haltere movements in a range of fly taxa during free walking and tethered flight. We find a diversity of wing-haltere phase relationships in flight, with higher variability in more ancient families and less in more derived families. Diverse haltere movements were observed during free walking and were correlated with phylogeny. We predicted that haltere removal might decrease behavioural performance in those flies that move them during walking and provide evidence that this is the case. Our comparative approach reveals previously unknown diversity in haltere movements and opens the possibility of multiple functional roles for halteres in different fly behaviours. © 2015 The Author(s).

  2. Hierarchical zeolites from class F coal fly ash

    NASA Astrophysics Data System (ADS)

    Chitta, Pallavi

    Fly ash, a coal combustion byproduct is classified as types class C and class F. Class C fly ash is traditionally recycled for concrete applications and Class F fly ash often disposed in landfills. Class F poses an environmental hazard due to disposal and leaching of heavy metals into ground water and is important to be recycled in order to mitigate the environmental challenges. A major recycling option is to reuse the fly ash as a low-cost raw material for the production of crystalline zeolites, which serve as catalysts, detergents and adsorbents in the chemical industry. Most of the prior literature of fly ash conversion to zeolites does not focus on creating high zeolite surface area zeolites specifically with hierarchical pore structure, which are very important properties in developing a heterogeneous catalyst for catalysis applications. This research work aids in the development of an economical process for the synthesis of high surface area hierarchical zeolites from class F coal fly ash. In this work, synthesis of zeolites from fly ash using classic hydrothermal treatment approach and fusion pretreatment approach were examined. The fusion pretreatment method led to higher extent of dissolution of silica from quartz and mullite phases, which in turn led to higher surface area and pore size of the zeolite. A qualitative kinetic model developed here attributes the difference in silica content to Si/Al ratio of the beginning fraction of fly ash. At near ambient crystallization temperatures and longer crystallization times, the zeolite formed is a hierarchical faujasite with high surface area of at least 360 m2/g. This work enables the large scale recycling of class F coal fly ash to produce zeolites and mitigate environmental concerns. Design of experiments was used to predict surface area and pore sizes of zeolites - thus obviating the need for intense experimentation. The hierarchical zeolite catalyst supports tested for CO2 conversion, yielded hydrocarbons

  3. Manned and Unmanned Aircraft Effectiveness in Fast Attack Craft / Fast Inshore Attack Craft ASUW Kill Chain Execution

    DTIC Science & Technology

    2016-09-01

    par. 4) Based on a RED projected size of 22.16 m, a sample calculation for the unadjusted single shot probability of kill for HELLFIRE missiles is...framework based on intelligent objects (SIMIO) environment to model a fast attack craft/fast inshore attack craft anti-surface warfare expanded kill chain...concept of operation efficiency. Based on the operational environment, low cost and less capable unmanned aircraft provide an alternative to the

  4. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  5. Using the Domain Name System to Thwart Automated Client-Based Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less

  6. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack or Sudden Cardiac Arrest: How Are They Different? ... and procedures related to heart disease and stroke. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  7. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  8. FlyBase portals to human disease research using Drosophila models

    PubMed Central

    Millburn, Gillian H.; Crosby, Madeline A.; Gramates, L. Sian; Tweedie, Susan

    2016-01-01

    ABSTRACT The use of Drosophila melanogaster as a model for studying human disease is well established, reflected by the steady increase in both the number and proportion of fly papers describing human disease models in recent years. In this article, we highlight recent efforts to improve the availability and accessibility of the disease model information in FlyBase (http://flybase.org), the model organism database for Drosophila. FlyBase has recently introduced Human Disease Model Reports, each of which presents background information on a specific disease, a tabulation of related disease subtypes, and summaries of experimental data and results using fruit flies. Integrated presentations of relevant data and reagents described in other sections of FlyBase are incorporated into these reports, which are specifically designed to be accessible to non-fly researchers in order to promote collaboration across model organism communities working in translational science. Another key component of disease model information in FlyBase is that data are collected in a consistent format ­­– using the evolving Disease Ontology (an open-source standardized ontology for human-disease-associated biomedical data) – to allow robust and intuitive searches. To facilitate this, FlyBase has developed a dedicated tool for querying and navigating relevant data, which include mutations that model a disease and any associated interacting modifiers. In this article, we describe how data related to fly models of human disease are presented in individual Gene Reports and in the Human Disease Model Reports. Finally, we discuss search strategies and new query tools that are available to access the disease model data in FlyBase. PMID:26935103

  9. FlyBase portals to human disease research using Drosophila models.

    PubMed

    Millburn, Gillian H; Crosby, Madeline A; Gramates, L Sian; Tweedie, Susan

    2016-03-01

    The use of Drosophila melanogaster as a model for studying human disease is well established, reflected by the steady increase in both the number and proportion of fly papers describing human disease models in recent years. In this article, we highlight recent efforts to improve the availability and accessibility of the disease model information in FlyBase (http://flybase.org), the model organism database for Drosophila. FlyBase has recently introduced Human Disease Model Reports, each of which presents background information on a specific disease, a tabulation of related disease subtypes, and summaries of experimental data and results using fruit flies. Integrated presentations of relevant data and reagents described in other sections of FlyBase are incorporated into these reports, which are specifically designed to be accessible to non-fly researchers in order to promote collaboration across model organism communities working in translational science. Another key component of disease model information in FlyBase is that data are collected in a consistent format --- using the evolving Disease Ontology (an open-source standardized ontology for human-disease-associated biomedical data) - to allow robust and intuitive searches. To facilitate this, FlyBase has developed a dedicated tool for querying and navigating relevant data, which include mutations that model a disease and any associated interacting modifiers. In this article, we describe how data related to fly models of human disease are presented in individual Gene Reports and in the Human Disease Model Reports. Finally, we discuss search strategies and new query tools that are available to access the disease model data in FlyBase. © 2016. Published by The Company of Biologists Ltd.

  10. [MSW incineration fly ash melting by DSC-DTA].

    PubMed

    Li, Rundong; Chi, Yong; Li, Shuiqing; Wang, Lei; Yan, Jianhua; Cen, Kefa

    2002-07-01

    Melting characteristics of two kinds of municipal solid waste incineration(MSWI) fly ash were studied in this paper by high temperature differential scanning calorimetry and differential temperature analysis. MSWI fly ash was considered as hazardous waste because it contains heavy metals and dioxins. The experiments were performed in either N2 or O2 atmosphere in temperature range of 20 degrees C-1450 degrees C at various heating rates. Two different MSW incineration fly ashes used in the experiments were collected from our country and France respectively. The process of fly ash melting exhibits two reactions occurring at temperature ranges of about 480 degrees C-670 degrees C and 1136 degrees C-1231 degrees C, respectively. The latent heat of polymorphic transformation and fusion were approximately 20 kJ/kg and 700 kJ/kg, while the total heat required for melting process was about 1800 kJ/kg. The paper also studied effect of CaO to melting. A heat flux thermodynamic model for fly ash melting was put forward and it agrees well with experimental data.

  11. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

  12. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  13. 7 CFR 29.3151 - Flyings (X Group).

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 2 2012-01-01 2012-01-01 false Flyings (X Group). 29.3151 Section 29.3151 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Standards Grades § 29.3151 Flyings (X Group). This group consists of leaves normally grown at the...

  14. 7 CFR 29.3151 - Flyings (X Group).

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 2 2011-01-01 2011-01-01 false Flyings (X Group). 29.3151 Section 29.3151 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Standards Grades § 29.3151 Flyings (X Group). This group consists of leaves normally grown at the...

  15. 7 CFR 29.3151 - Flyings (X Group).

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 2 2013-01-01 2013-01-01 false Flyings (X Group). 29.3151 Section 29.3151 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Standards Grades § 29.3151 Flyings (X Group). This group consists of leaves normally grown at the...

  16. 7 CFR 29.3151 - Flyings (X Group).

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Flyings (X Group). 29.3151 Section 29.3151 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Standards Grades § 29.3151 Flyings (X Group). This group consists of leaves normally grown at the...

  17. 7 CFR 29.3151 - Flyings (X Group).

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 2 2014-01-01 2014-01-01 false Flyings (X Group). 29.3151 Section 29.3151 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Standards Grades § 29.3151 Flyings (X Group). This group consists of leaves normally grown at the...

  18. Aerodynamic Characteristics of Three Deep-Stepped Planing-Tail Flying-Boat Hulls

    NASA Technical Reports Server (NTRS)

    Riebe, John M.; Naeseth, Rodger L.

    1947-01-01

    An investigation was made in the Langley 300 MPH 7- by 10-foot tunnel to determine the aerodynamic characteristics of three deep-stepped planing-tail flying-boat hulls differing only in the amount of step fairing. The hulls were derived by increasing the unfaired step depth of a planing-tail hull of a previous aerodynamic investigation to a depth about 92 percent of the hull beam. Tests were also made on a transverse-stepped hull with an extended afterbody for the purpose of comparison and in order to extend and verify the results of a previous investigation. The investigation indicated that the extended afterbody hull had a minimum drag coefficient about the same as a conventional hull, 0.0066, and an angle-of-attack range for minimum drag coefficient of 0.0057 which was 14 percent less than the transverse stepped hull with extended afterbody; the hulls with step fairing had up to 44 percent less minimum drag coefficient than the transverse-stepped hull, or slightly more drag than a streamlined body having approximately the same length and volume. Longitudinal and lateral instability varied little with step fairing and was about the same as a conventional hull.

  19. Measuring physiological stress in Australian flying-fox populations.

    PubMed

    McMichael, Lee A; Edson, Daniel; Field, Hume

    2014-09-01

    Flying-foxes (pteropid bats) are the natural host of Hendra virus, a recently emerged zoonotic virus responsible for mortality or morbidity in horses and humans in Australia since 1994. Previous studies have suggested physiological and ecological risk factors for infection in flying-foxes, including physiological stress. However, little work has been done measuring and interpreting stress hormones in flying-foxes. Over a 12-month period, we collected pooled urine samples from underneath roosting flying-foxes, and urine and blood samples from captured individuals. Urine and plasma samples were assayed for cortisol using a commercially available enzyme immunoassay. We demonstrated a typical post-capture stress response in flying-foxes, established urine specific gravity as an attractive alternative to creatinine to correct urine concentration, and established population-level urinary cortisol ranges (and geometric means) for the four Australian species: Pteropus alecto 0.5-305.1 ng/mL (20.1 ng/mL); Pteropus conspicillatus 0.3-370.9 ng/mL (18.9 ng/mL); Pteropus poliocephalus 0.3-311.3 ng/mL (10.1 ng/mL); Pteropus scapulatus 5.2-205.4 ng/mL (40.7 ng/mL). Geometric means differed significantly except for P. alecto and P. conspicillatus. Our approach is methodologically robust, and has application both as a research or clinical tool for flying-foxes, and for other free-living colonial wildlife species.

  20. An Overview of Pest Species of Bactrocera Fruit Flies (Diptera: Tephritidae) and the Integration of Biopesticides with Other Biological Approaches for Their Management with a Focus on the Pacific Region

    PubMed Central

    Vargas, Roger I.; Piñero, Jaime C.; Leblanc, Luc

    2015-01-01

    Fruit flies (Diptera: Tephritidae) are among the most economically important pest species in the world, attacking a wide range of fruits and fleshy vegetables throughout tropical and sub-tropical areas. These species are such devastating crop pests that major control and eradication programs have been developed in various parts of the world to combat them. The array of control methods includes insecticide sprays to foliage and soil, bait-sprays, male annihilation techniques, releases of sterilized flies and parasitoids, and cultural controls. During the twenty first century there has been a trend to move away from control with organophosphate insecticides (e.g., malathion, diazinon, and naled) and towards reduced risk insecticide treatments. In this article we present an overview of 73 pest species in the genus Bactrocera, examine recent developments of reduced risk technologies for their control and explore Integrated Pest Management (IPM) Programs that integrate multiple components to manage these pests in tropical and sub-tropical areas. PMID:26463186

  1. Assessment of susceptibility of olive cultivars to the Bactrocera oleae (Gmelin, 1790) and Camarosporium dalmaticum (Thüm.) Zachos & Tzav.-Klon. attacks in Calabria (Southern Italy).

    PubMed

    Iannotta, Nino; Noce, Maria E; Ripa, Vincenzo; Scalercio, Stefano; Vizzarri, Veronica

    2007-01-01

    Within the framework of research concerning the application of techniques alternative to chemical pesticides for control of parasites, the C.R.A. Experimental Institute for Olive Growing for many years has been performing a large investigation in order to detect sources of genetic resistance in olive germplasm. In the present study we observed the behavior related to the olive fly (Bactrocera oleae) infestation and Camarosporium dalmaticum infection of ten olive cultivars farmed under the same agronomic and climatic conditions in Calabria, Southern Italy. The sampling and the data collecting were carried out in three different ripening times. The drupe amount of oleuropein and cyanidine was detected by laboratory analyses in order to verify a possible correlation between these molecules and the level of infestation/infection of the above-mentioned parasites. The obtained data were submitted to analysis of variance. In relation to the fungal infection the results displayed that cvs Tonda nera dolce showed the lowest susceptibility, while the cv Giarraffa turned out to be the most susceptible. The less susceptible cultivars to the phytophagous were Tonda nera dolce and Bhardi Tirana. Since the less susceptible cultivar to olive fly attacks are the same observed in relation to the susceptibility to olive fruit rot, it is suggested a relation between the olive fly infestation and the fungal infection. It suggests the utility to achieve these results both to transfer directly to the farmers' world and to emphasize ecosystem health and biodiversity conservation.

  2. Combined disc pelletisation and thermal treatment of MSWI fly ash.

    PubMed

    Huber, Florian; Herzel, Hannes; Adam, Christian; Mallow, Ole; Blasenbauer, Dominik; Fellner, Johann

    2018-03-01

    An environmentally friendly and cost efficient way for the management of municipal solid waste incineration (MSWI) fly ash represents its thermal co-treatment together with combustible waste. However, the safe introduction and storage of MSWI fly ash in the waste bunker is challenging and associated with severe problems (e.g. dust emissions, generation of undefined lumps and heat in case of moistened MSWI fly ash). Therefore, the aim of this study is to investigate the suitability of pelletisation as a pretreatment of MSWI fly ash. In particular, MSWI fly ash was characterised after sampling, pelletisation and thermal treatment and the transfer of constituents to secondary fly ash and flue gas was investigated. For this purpose, MSWI fly ash pellets with a water content of about 0.15 kg/kg and a diameter of about 8 mm have been produced by disc pelletiser and treated in an electrically heated pilot-scale rotary kiln at different temperatures, ranging from 450 °C to 1050 °C. The total contents of selected elements in the MSWI fly ash before and after thermal treatment and in the generated secondary fly ash have been analysed in order to understand the fate of each element. Furthermore, leachable contents of selected elements and total content of persistent organic pollutants of the thermally treated MSWI fly ash were determined. Due to the low total content of Hg (0.7 mg/kg) and the low leachate content of Pb (<0.36 mg/kg), even at the lowest treatment temperature of 450 °C, thermally treated MSWI fly ash pellets can be classified as non-hazardous waste. However, temperatures of at least 650 °C are necessary to decrease the toxic equivalency of PCDD/F and DL-PCB. The removal of toxic heavy metals like Cd and Pb is significantly improved at temperatures of 850 °C, 950 °C or even 1050 °C. The observed metal removal led to relatively high contents of e.g. Cu (up to 11,000 mg/kg), Pb (up to 91,000 mg/kg) and Zn (up to 21,000 mg/kg) in

  3. Learning to Fly.

    ERIC Educational Resources Information Center

    Weil, Patricia E.

    1983-01-01

    Presents information on where to learn to fly, which aircraft is best for this purpose, and approximate costs. Includes additional information on certificates, licenses, and ratings, and a description of the two phases of the General Aviation Manufacturers Association flight training program. (JN)

  4. New record for Woldstedtius flavolineatus (Ichneumonidae: Diplazontinae), a hymenopteran parasitoid of syrphid flies in Hawaii

    USGS Publications Warehouse

    Cappadonna, Justin; Euaparadorn, Melody; Peck, Robert W.; Banko, Paul C.

    2009-01-01

    The parasitoid wasp Woldstedtius flavolineatus (Gravenhorst) (Ichneumonidae) attacks the larvae of syrphid flies (Syrphidae). Woldstedtius flavolineatus was collected in Hawaii for the first time during an extensive malaise trap-based survey of parasitoids in Hawaiian forests. Since its initial collection on Hawaii Island in January 2006, it has been collected at five additional sites on Hawaii Island and at one site each on Maui and Oahu. Malaise trap results from Hakalau Forest National Wildlife Refuge showed a strong seasonal pattern of abundance, with peak population levels reached during July–September. Rearing of its host, Allograpta obliqua (Say), collected from koa (Acacia koa Gray) at Hakalau over two days, revealed a parasitism rate of approximately 95%. Broader impacts of this alien wasp are unknown, but a reduction in host syrphid abundance could result in an increase in numbers of psyllids and aphids (Homoptera) that are preyed upon by syrphid larvae. Furthermore, a reduction in adult syrphids could impact the reproductive success of some of the plants they pollinate.

  5. Shark attack: review of 86 consecutive cases.

    PubMed

    Woolgar, J D; Cliff, G; Nair, R; Hafez, H; Robbs, J V

    2001-05-01

    On average there are approximately 50 confirmed shark attacks worldwide annually. Despite their rarity, such incidents often generate much public and media attention. The injuries of 86 consecutive victims of shark attack were reviewed from 1980 to 1999. Clinical data retrieved from the South African Shark Attack Files, maintained by the Natal Sharks Board, were retrospectively analyzed to determine the nature, treatment, and outcome of injuries. The majority of victims (n = 68 [81%]) had relatively minor injuries that required simple primary suture. Those patients (n = 16 [19%]) with more extensive limb lacerations longer than 20 cm or with soft-tissue loss of more than one myofascial compartment were associated with higher morbidity and limb loss. In 8 of the 10 fatalities, death occurred as a result of exsanguinating hemorrhage from a limb vascular injury. Victims of shark attack usually sustain only minor injuries. In more serious cases, particularly if associated with a major vascular injury, hemorrhage control and early resuscitation are of utmost importance during the initial management if these patients are to survive.

  6. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  7. Significance and survival of Enterococci during the house fly development.

    PubMed

    Ghosh, Anuradha; Akhtar, Mastura; Holderman, Chris; Zurek, Ludek

    2014-01-01

    House flies are among the most important nonbiting insect pests of medical and veterinary importance. Larvae develop in decaying organic substrates and their survival strictly depends on an active microbial community. House flies have been implicated in the ecology and transmission of enterococci, including multi-antibiotic-resistant and virulent strains of Enterococcus faecalis. In this study, eight American Type Culture Collection type strains of enterococci including Enterococcus avium, Enterococcus casseliflavus, Enterococcus durans, Enterococcus hirae, Enterococcus mundtii, Enterococcus gallinarum, Enterococcusfaecalis, and Enterococcusfaecium were evaluated for their significance in the development of house flies from eggs to adults in bacterial feeding assays. Furthermore, the bacterial colonization of the gut of teneral flies as well as the importance of several virulence traits of E. faecalis in larval mortality was assessed. Overall survival of house flies (egg to adult) was significantly higher when grown with typically nonpathogenic enterococcal species such as E. hirae (76.0% survival), E. durans (64.0%), and E. avium (64.0%) compared with that with clinically important species E. faecalis (24.0%) and E. faecium (36.0%). However, no significant differences in survival of house fly larvae were detected when grown with E. faecalis strains carrying various virulence traits, including isogenic mutants of the human clinical isolate E. faecalis V583 with in-frame deletions of gelatinase, serine protease, and capsular polysaccharide serotype C. Enterococci were commonly detected in fly puparia (range: 75-100%; concentration: 103-105 CFU/puparium);however, the prevalence of enterococci in teneral flies varied greatly: from 25.0 (E. casseliflavus) to 89.5% (E. hirae). In conclusion, depending on the species, enterococci variably support house fly larval development and colonize the gut of teneral adults. The human pathogenic species, E. faecalis and E. faecium

  8. The role of mental disorder in attacks on European politicians 1990-2004.

    PubMed

    James, D V; Mullen, P E; Meloy, J R; Pathé, M T; Farnham, F R; Preston, L; Darnley, B

    2007-11-01

    The only systematic studies of attacks on public figures come from the USA. These studies de-emphasize the role of mental illness and suggest threats are of no predictive value. This study re-examines these questions through a study of attacks on European politicians. All non-terrorist attacks on elected politicians in Western Europe between 1990 and 2004 were analysed. Twenty-four attacks were identified, including five involving fatalities, and eight serious injuries. Ten attackers were psychotic, four drunk, nine politically motivated and one unclassifiable. Eleven attackers evidenced warning behaviours. The mentally disordered, most of whom gave warnings, were responsible for most of the fatal and seriously injurious attacks. A greater awareness of the link between delusional fixations on public figures and subsequent attacks could aid prevention. Equally importantly, recognition would encourage earlier intervention in people who, irrespective of whether they eventually attack, have delusional preoccupations which ruin their lives.

  9. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  10. Muscular imbalance and shoulder pain in volleyball attackers.

    PubMed Central

    Kugler, A; Krüger-Franke, M; Reininger, S; Trouillier, H H; Rosemeyer, B

    1996-01-01

    OBJECTIVE: In overhead sports such as volleyball, baseball, or tennis shoulder problems are very common. The aim of this study was to identify features which may correlate with shoulder problems in volleyball attackers. METHODS: 30 competitive volleyball attackers (mean age 25 years) were included in the study; 15 were suffering from shoulder pain and 15 had no history of shoulder pain. The results were compared with those of a control group of 15 recreational athletes without any overhead sports activities. RESULTS: Volleyball attackers have a different muscular and capsular pattern at the playing shoulder compared to the opposite shoulder. Their playing shoulder is depressed, the scapula lateralised, and the dorsal muscles and the posterior and inferior part of the shoulder capsule shortened. These differences were of more significance in volleyball attackers with shoulder pain than in volleyball players without shoulder pain. In contrast to recreational athletes without any overhead sports activity, there were no significant difference in the comparison of the two shoulders. The histories, clinical and sonographic findings did not reveal further typical features for volleyball attackers with shoulder pain. CONCLUSIONS: Muscular balance of the shoulder girdle is very important in this sport. It is therefore imperative to include adequate stretching and muscular training programme for the prevention, as well as for therapy, of shoulder pain in volleyball attackers. Images Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 PMID:8889124

  11. Leaching of mixtures of biochar and fly ash

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Palumbo, Anthony V.; Porat, Iris; Phillips, Jana R.

    2009-06-22

    Increasing atmospheric levels of greenhouse gases, especially CO2, and their effects on global temperature have led to interest in the possibility of carbon storage in terrestrial environments. Both the residual char from biomass pyrolysis (biochar) and fly ash from coal combustion have the potential to significantly expand terrestrial sequestration options. Both biochar and fly ash also have potentially beneficial effects on soil properties. Fly ash has been shown to increase porosity, water-holding capacity, pH, conductivity, and dissolved SO42-, CO32-, Cl- and basic cations. Adding biochar to soil generally raises pH, increases total nitrogen and total phosphorous, encourages greater root development,more » improves cation exchange capacity and decreases available aluminum. A combination of these benefits likely is responsible for observed increases in yields for crops such as corn and sugarcane. In addition, it has been found that soils with added biochar emit lower amounts of other greenhouse gases (methane and nitrous oxide) than do unamended soils. Biochar and fly ash amendments may be useful in promoting terrestrial carbon sequestration on currently underutilized and degraded lands. For example, about 1% of the US surface lands consist of previously mined lands or highway rights-of-way. Poorly managed lands could count for another 15% of US area. Biochar and fly ash amendments could increase productivity of these lands and increase carbon storage in the soil. Previous results showed minimal leaching of organic carbon and metals from a variety of fly ashes. In the present study, we examined the properties of mixtures of biochar, fly ash, and soil and evaluated the leaching of organic carbon and metals from these mixtures. The carbon sorption experiments showed release of carbon from biochar, rather than sorption, except at the highest concentrations in the Biochar HW sample. Similar results were obtained by others for oxidative leaching of bituminous coal

  12. Learning from history: The Glasgow Airport terrorist attack.

    PubMed

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  13. Gait biometrics under spoofing attacks: an experimental investigation

    NASA Astrophysics Data System (ADS)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  14. Flashbulb memories of the Paris attacks.

    PubMed

    Gandolphe, Marie-Charlotte; El Haj, Mohamad

    2017-06-01

    Flashbulb memories are vivid autobiographical memories of the circumstances where an individual first learns about emotionally significant public events. Our paper assesses whether these memories were triggered by the attacks of Friday 13 November 2015 in Paris. Two hundred and ninety-one participants answered a web-based questionnaire that assessed their memory of the circumstances in which they first learned of the attacks. The questionnaire also assessed vividness, rehearsal, emotion, surprise and novelty. The results showed substantial and vivid recall of the context in which the participants first learned of the event. This recall was associated with fair rehearsal, negative emotional valence, surprise, and novelty. Regression analysis showed that the flashbulb recall was predicted by negative emotion. Negative emotion seems to play a key role in the formation of flashbulb memories, at least those associated with the Paris attacks. © 2017 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  15. Epidemics of panic during a bioterrorist attack--a mathematical model.

    PubMed

    Radosavljevic, Vladan; Radunovic, Desanka; Belojevic, Goran

    2009-09-01

    A bioterrorist attacks usually cause epidemics of panic in a targeted population. We have presented epidemiologic aspect of this phenomenon as a three-component model--host, information on an attack and social network. We have proposed a mathematical model of panic and counter-measures as the function of time in a population exposed to a bioterrorist attack. The model comprises ordinary differential equations and graphically presented combinations of the equations parameters. Clinically, we have presented a model through a sequence of psychic conditions and disorders initiated by an act of bioterrorism. This model might be helpful for an attacked community to timely and properly apply counter-measures and to minimize human mental suffering during a bioterrorist attack.

  16. FliA expression analysis and influence of the regulatory proteins RpoN, FleQ and FliA on virulence and in vivo fitness in Legionella pneumophila.

    PubMed

    Schulz, Tino; Rydzewski, Kerstin; Schunder, Eva; Holland, Gudrun; Bannert, Norbert; Heuner, Klaus

    2012-12-01

    In Legionella pneumophila, the regulation of the flagellum and the expression of virulence traits are linked. FleQ, RpoN and FliA are the major regulators of the flagellar regulon. We demonstrated here that all three regulatory proteins mentioned (FleQ, RpoN and FliA) are necessary for full in vivo fitness of L. pneumophila strains Corby and Paris. In this study, we clarified the role of FleQ for fliA expression from the level of mRNA toward protein translation. FleQ enhanced fliA expression, but FleQ and RpoN were not necessary for basal expression. In addition, we identified the initiation site of fliA in L. pneumophila and found a putative σ(70) promoter element localized upstream. The initiation site was not influenced in the ΔfleQ or ΔrpoN mutant strain. We demonstrated that there is no significant difference in the regulation of fliA between strains Corby and Paris, but the FleQ-dependent induction of fliA transcription in the exponential phase is stronger in strain Paris than in strain Corby. In addition, we showed for the first time the presence of a straight hook at the pole of the non-flagellated ΔfliA and ΔfliD mutant strains by electron microscopy, indicating the presence of an intact basal body in these strains.

  17. Non-harmful insertion of data mimicking computer network attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  18. Choice of optimal biocide combination to control flies (Diptera: Muscidae).

    PubMed

    Kavran, Mihaela; Zgomba, Marija F; Ignjatovic-Ćupina, Aleksandra M; Lazić, Sanja D; Petrić, Dušan V

    2015-01-01

    Flies - by feeding on decaying matter, human waste and food - have been implicated in the spread of numerous animal and human diseases. Excessive fly populations are generally associated with livestock units and domestic waste due to decaying organic matter. A large number of flies cause extreme disturbance in the behavior of the host, resulting in skin irritation, lesions, wounds, and secondary infections are likely to appear. The aim of this study was to evaluate the effects of combined applications of larvicide (cyromazine) and adulticides (acetamiprid in formulation with pheromone and thiamethoxam) on the suppression of fly populations. The study was conducted on a pig farm. The piglet farms are one of the most favorable places for fly breeding. Three units were used for biocide applications and a fourth unit as the control where biocides were not applied. The monitoring of pre- and post-treatment of adult fly populations was carried out by glued cardboards. The cards were hung on metal rods above piglet's cage. This monitoring method served as a parameter for the estimation of biological effectiveness. The highest degree of fly control (88.4% mortality 8 days after treatment) was achieved when a combination of cyromazine and thiamethoxam was used. A biocide based on sex pheromone (Z)-9-tricosene + acetamiprid was the most effective on flies 3 days after biocide application, with a mortality rate of 69.1 %. Thiamethoxam achieved the highest reduction of flies 6 days after treatment, with 78.19% obtained mortality. Biological efficacy of the applied biocides in combination ciromazine + thiamethoxam and thiamethoxam alone was justified.

  19. Retention of elemental mercury in fly ashes in different atmospheres

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    M.A. Lopez-Anton; M. Diaz-Somoano; M.R. Martinez-Tarazona

    2007-01-15

    Mercury is an extremely volatile element, which is emitted from coal combustion to the environment mostly in the vapor phase. To avoid the environmental problems that the toxic species of this element may cause, control technologies for the removal of mercury are necessary. Recent research has shown that certain fly ash materials have an affinity for mercury. Moreover, it has been observed that fly ashes may catalyze the oxidation of elemental mercury and facilitate its capture. However, the exact nature of Hg-fly ash interactions is still unknown, and mercury oxidation through fly ash needs to be investigated more thoroughly. Inmore » this work, the influence of a gas atmosphere on the retention of elemental mercury on fly ashes of different characteristics was evaluated. The retention capacity was estimated comparatively in inert and two gas atmospheres containing species present in coal gasification and coal combustion. Fly ashes produced in two pulverized coal combustion (PCC) plants, produced from coals of different rank (CTA and CTSR), and a fly ash (CTP) produced in a fluidized bed combustion (FBC) plant were used as raw materials. The mercury retention capacity of these fly ashes was compared to the retention obtained in different activated carbons. Although the capture of mercury is very similar in the gasification atmosphere and N{sub 2}, it is much more efficient in a coal combustion retention, being greater in fly ashes from PCC than those from FBC plants. 22 refs., 6 figs., 3 tabs.« less

  20. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  1. Vestergaard zerofly fabric for stable fly management outside of Africa

    USDA-ARS?s Scientific Manuscript database

    Vestergaard ZeroFly pesticide-impregnated fabric has been evaluated in zero-graze swine and cattle facilities in Sub-Saharan Africa for management of biting flies, particularly those capable of transmitting Nagana, i.e. tsetse. Other major blood-feeding flies encountered around these units are vario...

  2. Molecular Diversity between Salivary Proteins from New World and Old World Sand Flies with Emphasis on Bichromomyia olmeca, the Sand Fly Vector of Leishmania mexicana in Mesoamerica

    PubMed Central

    Townsend, Shannon; Pasos-Pinto, Silvia; Sanchez, Laura; Rasouli, Manoochehr; B. Guimaraes-Costa, Anderson; Aslan, Hamide; Francischetti, Ivo M. B.; Oliveira, Fabiano; Becker, Ingeborg; Kamhawi, Shaden; Ribeiro, Jose M. C.; Jochim, Ryan C.; Valenzuela, Jesus G.

    2016-01-01

    Background Sand fly saliva has been shown to have proteins with potent biological activities, salivary proteins that can be used as biomarkers of vector exposure, and salivary proteins that are candidate vaccines against different forms of leishmaniasis. Sand fly salivary gland transcriptomic approach has contributed significantly to the identification and characterization of many of these salivary proteins from important Leishmania vectors; however, sand fly vectors in some regions of the world are still neglected, as Bichromomyia olmeca (formerly known as Lutzomyia olmeca olmeca), a proven vector of Leishmania mexicana in Mexico and Central America. Despite the importance of this vector in transmitting Leishmania parasite in Mesoamerica there is no information on the repertoire of B. olmeca salivary proteins and their relationship to salivary proteins from other sand fly species. Methods and Findings A cDNA library of the salivary glands of wild-caught B. olmeca was constructed, sequenced, and analyzed. We identified transcripts encoding for novel salivary proteins from this sand fly species and performed a comparative analysis between B. olmeca salivary proteins and those from other sand fly species. With this new information we present an updated catalog of the salivary proteins specific to New World sand flies and salivary proteins common to all sand fly species. We also report in this work the anti-Factor Xa activity of Lofaxin, a salivary anticoagulant protein present in this sand fly species. Conclusions This study provides information on the first transcriptome of a sand fly from Mesoamerica and adds information to the limited repertoire of salivary transcriptomes from the Americas. This comparative analysis also shows a fast degree of evolution in salivary proteins from New World sand flies as compared with Old World sand flies. PMID:27409591

  3. 32 CFR 855.13 - Civil fly-ins.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Civil fly-ins. 855.13 Section 855.13 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE AIRCRAFT CIVIL AIRCRAFT USE OF UNITED STATES AIR FORCE AIRFIELDS Civil Aircraft Landing Permits § 855.13 Civil fly-ins. (a) Civil...

  4. 32 CFR 855.13 - Civil fly-ins.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Civil fly-ins. 855.13 Section 855.13 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE AIRCRAFT CIVIL AIRCRAFT USE OF UNITED STATES AIR FORCE AIRFIELDS Civil Aircraft Landing Permits § 855.13 Civil fly-ins. (a) Civil...

  5. Blow flies as urban wildlife sensors.

    PubMed

    Hoffmann, Constanze; Merkel, Kevin; Sachse, Andreas; Rodríguez, Pablo; Leendertz, Fabian H; Calvignac-Spencer, Sébastien

    2018-05-01

    Wildlife detection in urban areas is very challenging. Conventional monitoring techniques such as direct observation are faced with the limitation that urban wildlife is extremely elusive. It was recently shown that invertebrate-derived DNA (iDNA) can be used to assess wildlife diversity in tropical rainforests. Flies, which are ubiquitous and very abundant in most cities, may also be used to detect wildlife in urban areas. In urban ecosystems, however, overwhelming quantities of domestic mammal DNA could completely mask the presence of wild mammal DNA. To test whether urban wild mammals can be detected using fly iDNA, we performed DNA metabarcoding of pools of flies captured in Berlin, Germany, using three combinations of blocking primers. Our results show that domestic animal sequences are, as expected, very dominant in urban environments. Nevertheless, wild mammal sequences can often be retrieved, although they usually only represent a minor fraction of the sequence reads. Fly iDNA metabarcoding is therefore a viable approach for quick scans of urban wildlife diversity. Interestingly, our study also shows that blocking primers can interact with each other in ways that affect the outcome of metabarcoding. We conclude that the use of complex combinations of blocking primers, although potentially powerful, should be carefully planned when designing experiments. © 2018 John Wiley & Sons Ltd.

  6. Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy

    PubMed Central

    Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P

    2002-01-01

    Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044

  7. Noninvasive analysis of microbiome dynamics in the fruit fly Drosophila melanogaster.

    PubMed

    Fink, Christine; Staubach, Fabian; Kuenzel, Sven; Baines, John F; Roeder, Thomas

    2013-11-01

    The diversity and structure of the intestinal microbial community has a strong influence on life history. To understand how hosts and microbes interact, model organisms with comparatively simple microbial communities, such as the fruit fly (Drosophila melanogaster), offer key advantages. However, studies of the Drosophila microbiome are limited to a single point in time, because flies are typically sacrificed for DNA extraction. In order to test whether noninvasive approaches, such as sampling of fly feces, could be a means to assess fly-associated communities over time on the same cohort of flies, we compared the microbial communities of fly feces, dissected fly intestines, and whole flies across three different Drosophila strains. Bacterial species identified in either whole flies or isolated intestines were reproducibly found in feces samples. Although the bacterial communities of feces and intestinal samples were not identical, they shared similarities and obviously the same origin. In contrast to material from whole flies and intestines, feces samples were not compromised by Wolbachia spp. infections, which are widespread in laboratory and wild strains. In a proof-of-principle experiment, we showed that simple nutritional interventions, such as a high-fat diet or short-term starvation, had drastic and long-lasting effects on the micobiome. Thus, the analysis of feces can supplement the toolbox for microbiome studies in Drosophila, unleashing the full potential of such studies in time course experiments where multiple samples from single populations are obtained during aging, development, or experimental manipulations.

  8. Network overload due to massive attacks

    NASA Astrophysics Data System (ADS)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  9. Flashbulb memories of Paris attacks

    PubMed Central

    El Haj, Mohamad; Gandolphe, Marie-Charlotte; Wawrziczny, Emilie; Antoine, Pascal

    2016-01-01

    Abstract Rationale: Flashbulb memories are detailed and vivid memories of attributes of the reception context of surprising and emotionally arousing public events. Patient concerns and diagnosis: This paper offers a fine-grained view of flashbulb memories in a patient with mild Alzheimer's disease (AD). Interventions: The patient underwent a directed interview about the 13 November 2015 attacks in Paris. Outcomes: Unlike her memory about the date and month of the attacks, the patient provided accurate information about the year, time and places they occurred. The patient also provided accurate information about how she first became aware of the attacks, where she was, with whom, what she was doing, and what time it was when she learned about them. As for the affective characteristics of these memories, she tended to have high ratings of vividness and rehearsal. Negative emotional states and great surprise and novelty were also reported. Lessons: By assessing the impact of flashbulb memories in this patient with AD, this paper offers a unique view into how such memories may trigger a considerable recall of context as well much subjective reliving. PMID:27861395

  10. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    NASA Astrophysics Data System (ADS)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  11. Caribbean Fruit Fly (Diptera: Tephritidae) and Small Fruit in Florida

    USDA-ARS?s Scientific Manuscript database

    Tephritid fruit flies are among the most important pests of fruits and vegetables worldwide. The Caribbean fruit fly, Anastrepha suspensa (Loew), is a tephritid pest that became established in Florida following introduction in 1965. Populations of this fruit fly also occur in Puerto Rico and Cuba, ...

  12. Acetylcholinesterase mutations and organophosphate resistance in sand flies and mosquitoes

    USDA-ARS?s Scientific Manuscript database

    Leishmaniasis is an insect-borne disease caused by several protozoan species in the genus Leishmania, which are vectored by sand fly species in the genera Phlebotomus or Lutzomyia, depending on the sand fly species geographic range. Sand fly bites and leishmaniasis significantly impacted U.S. milita...

  13. Mercury capture by selected Bulgarian fly ashes: Influence of coal rank and fly ash carbon pore structure on capture efficiency

    USGS Publications Warehouse

    Kostova, I.J.; Hower, J.C.; Mastalerz, Maria; Vassilev, S.V.

    2011-01-01

    Mercury capture by fly ash C was investigated at five lignite- and subbituminous-coal-burning Bulgarian power plants (Republika, Bobov Dol, Maritza East 2, Maritza East 3, and Sliven). Although the C content of the ashes is low, never exceeding 1.6%, the Hg capture on a unit C basis demonstrates that the low-rank-coal-derived fly ash carbons are more efficient in capturing Hg than fly ash carbons from bituminous-fired power plants. While some low-C and low-Hg fly ashes do not reveal any trends of Hg versus C, the 2nd and, in particular, the 3rd electrostatic precipitator (ESP) rows at the Republika power plant do have sufficient fly ash C range and experience flue gas sufficiently cool to capture measurable amounts of Hg. The Republika 3rd ESP row exhibits an increase in Hg with increasing C, as observed in other power plants, for example, in Kentucky power plants burning Appalachian-sourced bituminous coals. Mercury/C decreases with an increase in fly ash C, suggesting that some of the C is isolated from the flue gas stream and does not contribute to Hg capture. Mercury capture increases with an increase in Brunauer-Emmett-Teller (BET) surface area and micropore surface area. The differences in Hg capture between the Bulgarian plants burning low-rank coal and high volatile bituminous-fed Kentucky power plants suggests that the variations in C forms resulting from the combustion of the different ranks also influence the efficiency of Hg capture. ?? 2010 Elsevier Ltd.

  14. Robustness of Controllability for Networks Based on Edge-Attack

    PubMed Central

    Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong

    2014-01-01

    We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components. PMID:24586507

  15. Robustness of controllability for networks based on edge-attack.

    PubMed

    Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong

    2014-01-01

    We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components.

  16. Leaching of Mixtures of Biochar and Fly Ash

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Palumbo, Anthony Vito; Porat, Iris; Phillips, Jana Randolph

    2009-01-01

    Increasing atmospheric levels of greenhouse gases, especially CO2, and their effects on global temperature have led to interest in the possibility of carbon storage in terrestrial environments.2, 5, 6 Both the residual char from biomass pyrolysis7-9, 12 (biochar) and fly ash from coal combustion1, 13, 14 have the potential to significantly expand terrestrial sequestration options. Both biochar and fly ash also have potentially beneficial effects on soil properties. Fly ash has been shown to increase porosity, water-holding capacity, pH, conductivity, and dissolved SO42-, CO32-, Cl- and basic cations.10, 11, 16 Adding biochar to soil generally raises pH, increases total nitrogenmore » and total phosphorous, encourages greater root development, improves cation exchange capacity and reduces available aluminum.3, 17 Combinations of these benefits likely lead to the observed increased yields for crops including corn and sugarcane.17 with biochar addition to soil. In addition, it has been found that soils with added biochar emit lower amounts of other greenhouse gases (methane and nitrous oxide) 8, 17 than do unammended soils. Biochar and fly ash amendments may be useful in promoting terrestrial carbon sequestration on currently underutilized and degraded lands. For example, about 1% of the US surface lands consist of previously mined lands or highway rights-of-way.18 Poorly managed lands could count for another 15% of US area. Biochar and fly ash amendments could increase productivity of these lands and increase carbon storage in the soil Previous results showed minimal leaching of organic carbon and metals from a variety of fly ashes.15 Here, we are examining the properties of mixtures of biochar, fly ash, and soil and evaluating leaching of organic carbon and metals from the mixtures.« less

  17. Investigation of Aerodynamic Capabilities of Flying Fish in Gliding Flight

    NASA Astrophysics Data System (ADS)

    Park, H.; Choi, H.

    In the present study, we experimentally investigate the aerodynamic capabilities of flying fish. We consider four different flying fish models, which are darkedged-wing flying fishes stuffed in actual gliding posture. Some morphological parameters of flying fish such as lateral dihedral angle of pectoral fins, incidence angles of pectoral and pelvic fins are considered to examine their effect on the aerodynamic performance. We directly measure the aerodynamic properties (lift, drag, and pitching moment) for different morphological parameters of flying fish models. For the present flying fish models, the maximum lift coefficient and lift-to-drag ratio are similar to those of medium-sized birds such as the vulture, nighthawk and petrel. The pectoral fins are found to enhance the lift-to-drag ratio and the longitudinal static stability of gliding flight. On the other hand, the lift coefficient and lift-to-drag ratio decrease with increasing lateral dihedral angle of pectoral fins.

  18. Effectiveness of fly ash for strength and durability of concrete

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ho, D.W.S.; Lewis, R.K.

    1985-09-01

    The effectiveness, K, of a fly ash can be defined as the ratio of the amount of cement replaced to the amount of fly ash added, provided the specified requirements of the concrete are maintained. It is generally assumed that the effectiveness of a fly ash can be treated as a constant. This paper presents results on concrete made with various mix proportions using three different cements and fly ash from three different sources. It was found that the K factor of each fly ash in achieving common 28-day compressive strength varies over a wide range depending on the amountmore » of fly ash used, the type of cement, the incorporation of chemical admixtures and the particular strength level chosen. Besides strength, K can also be calculated for other properties. For the materials used in this investigation, the K factors with respect to carbonation were found to be unequal to K factors for strength.« less

  19. Inescapable Stress Changes Walking Behavior in Flies - Learned Helplessness Revisited.

    PubMed

    Batsching, Sophie; Wolf, Reinhard; Heisenberg, Martin

    2016-01-01

    Like other animals flies develop a state of learned helplessness in response to unescapable aversive events. To show this, two flies, one 'master', one 'yoked', are each confined to a dark, small chamber and exposed to the same sequence of mild electric shocks. Both receive these shocks when the master fly stops walking for more than a second. Behavior in the two animals is differently affected by the shocks. Yoked flies are transiently impaired in place learning and take longer than master flies to exit from the chamber towards light. After the treatment they walk more slowly and take fewer and shorter walking bouts. The low activity is attributed to the fly's experience that its escape response, an innate behavior to terminate the electric shocks, does not help anymore. Earlier studies using heat pulses instead of electric shocks had shown similar effects. This parallel supports the interpretation that it is the uncontrollability that induces the state.

  20. Inescapable Stress Changes Walking Behavior in Flies - Learned Helplessness Revisited

    PubMed Central

    Batsching, Sophie; Wolf, Reinhard; Heisenberg, Martin

    2016-01-01

    Like other animals flies develop a state of learned helplessness in response to unescapable aversive events. To show this, two flies, one 'master', one 'yoked', are each confined to a dark, small chamber and exposed to the same sequence of mild electric shocks. Both receive these shocks when the master fly stops walking for more than a second. Behavior in the two animals is differently affected by the shocks. Yoked flies are transiently impaired in place learning and take longer than master flies to exit from the chamber towards light. After the treatment they walk more slowly and take fewer and shorter walking bouts. The low activity is attributed to the fly's experience that its escape response, an innate behavior to terminate the electric shocks, does not help anymore. Earlier studies using heat pulses instead of electric shocks had shown similar effects. This parallel supports the interpretation that it is the uncontrollability that induces the state. PMID:27875580

  1. Neuroscience: Hunger Pangs in the Fly Brain.

    PubMed

    Schoofs, Andreas; Pankratz, Michael J

    2016-08-08

    Which neurons in the brain become engaged when the body is deprived of food? A new study addresses this question using the vinegar fly Drosophila melanogaster, examining a group of neurons in the brain that show alterations in neural activity when flies are satiated or starved. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  3. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  4. Exploring FlyBase Data Using QuickSearch.

    PubMed

    Marygold, Steven J; Antonazzo, Giulia; Attrill, Helen; Costa, Marta; Crosby, Madeline A; Dos Santos, Gilberto; Goodman, Joshua L; Gramates, L Sian; Matthews, Beverley B; Rey, Alix J; Thurmond, Jim

    2016-12-08

    FlyBase (flybase.org) is the primary online database of genetic, genomic, and functional information about Drosophila species, with a major focus on the model organism Drosophila melanogaster. The long and rich history of Drosophila research, combined with recent surges in genomic-scale and high-throughput technologies, mean that FlyBase now houses a huge quantity of data. Researchers need to be able to rapidly and intuitively query these data, and the QuickSearch tool has been designed to meet these needs. This tool is conveniently located on the FlyBase homepage and is organized into a series of simple tabbed interfaces that cover the major data and annotation classes within the database. This unit describes the functionality of all aspects of the QuickSearch tool. With this knowledge, FlyBase users will be equipped to take full advantage of all QuickSearch features and thereby gain improved access to data relevant to their research. © 2016 by John Wiley & Sons, Inc. Copyright © 2016 John Wiley & Sons, Inc.

  5. Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.

    PubMed

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads

    2018-05-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p < 0.05) more frequent among men and episodic patients, compared with women and chronic patients respectively, no other differences in the prevalence of pre-attack symptoms were identified between groups. Conclusion Pre-attack symptoms are frequent in cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.

  6. Hereditary Angioedema Attacks Resolve Faster and Are Shorter after Early Icatibant Treatment

    PubMed Central

    Maurer, Marcus; Kaplan, Allen; Investigators, on behalf of I. O. S.

    2013-01-01

    Background Attacks of hereditary angioedema (HAE) are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. Objective To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. Methods The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009–February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. Results Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥1 hour (6.1 hours versus 16.8 hours [p<0.001]). Similar significant effects were observed for <2 hours versus ≥2 hours (7.2 hours versus 20.2 hours [p<0.001]) and <5 hours versus ≥5 hours (8.0 hours versus 23.5 hours [p<0.001]). Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]). Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. Conclusion Early blockade of the bradykinin B2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution. PMID:23390491

  7. Test What You Fly?

    NASA Astrophysics Data System (ADS)

    Margolies, Don

    2002-10-01

    It was the first time on any NASA project I know of that all the instruments on an observatory came off for rework or calibration after the full range of environmental tests, and then were reintegrated at the launch center without the benefit of an observatory environmental retest. Perhaps you've heard the expression, 'Test what you fly, fly what you test'? In theory, it's hard to argue with that. In this case, I was willing to take the risk of not testing what I flew. As the project manager for the Advanced Composition Explorer (ACE) mission, I was the one who ultimately decided what risks to take, just as it was my responsibility to get buy-in from the stakeholders.

  8. Test What You Fly?

    NASA Technical Reports Server (NTRS)

    Margolies, Don

    2002-01-01

    It was the first time on any NASA project I know of that all the instruments on an observatory came off for rework or calibration after the full range of environmental tests, and then were reintegrated at the launch center without the benefit of an observatory environmental retest. Perhaps you've heard the expression, 'Test what you fly, fly what you test'? In theory, it's hard to argue with that. In this case, I was willing to take the risk of not testing what I flew. As the project manager for the Advanced Composition Explorer (ACE) mission, I was the one who ultimately decided what risks to take, just as it was my responsibility to get buy-in from the stakeholders.

  9. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    ERIC Educational Resources Information Center

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes…

  10. Extraction of trace metals from fly ash

    DOEpatents

    Blander, M.; Wai, C.M.; Nagy, Z.

    1983-08-15

    A process is described for recovering silver, gallium and/or other trace metals from a fine grained industrial fly ash associated with a process for producing phosphorous. The fly ash has a silicate base and contains surface deposits of the trace metals as oxides, chlorides or the like. The process is carried out by contacting the fly ash with AlCl/sub 3/ in an alkali halide melt to react the trace metals with the AlCl/sub 3/ to form compositions soluble in the melt and a residue containing the silicate and aluminum oxide or other aluminum precipitate, and separating the desired trace metal or metals from the melt by electrolysis or other separation techniques.

  11. Extraction of trace metals from fly ash

    DOEpatents

    Blander, Milton; Wai, Chien M.; Nagy, Zoltan

    1984-01-01

    A process for recovering silver, gallium and/or other trace metals from a fine grained industrial fly ash associated with a process for producing phosphorous, the fly ash having a silicate base and containing surface deposits of the trace metals as oxides, chlorides or the like, with the process being carried out by contacting the fly ash with AlCl.sub.3 in an alkali halide melt to react the trace metals with the AlCl.sub.3 to form compositions soluble in the melt and a residue containing the silicate and aluminum oxide or other aluminum precipitate, and separating the desired trace metal or metals from the melt by electrolysis or other separation techniques.

  12. Capillarity theory for the fly-casting mechanism

    PubMed Central

    Trizac, Emmanuel; Levy, Yaakov; Wolynes, Peter G.

    2010-01-01

    Biomolecular folding and function are often coupled. During molecular recognition events, one of the binding partners may transiently or partially unfold, allowing more rapid access to a binding site. We describe a simple model for this fly-casting mechanism based on the capillarity approximation and polymer chain statistics. The model shows that fly casting is most effective when the protein unfolding barrier is small and the part of the chain which extends toward the target is relatively rigid. These features are often seen in known examples of fly casting in protein–DNA binding. Simulations of protein–DNA binding based on well-funneled native-topology models with electrostatic forces confirm the trends of the analytical theory. PMID:20133683

  13. A Novel Network Attack Audit System based on Multi-Agent Technology

    NASA Astrophysics Data System (ADS)

    Jianping, Wang; Min, Chen; Xianwen, Wu

    A network attack audit system which includes network attack audit Agent, host audit Agent and management control center audit Agent is proposed. And the improved multi-agent technology is carried out in the network attack audit Agent which has achieved satisfactory audit results. The audit system in terms of network attack is just in-depth, and with the function improvement of network attack audit Agent, different attack will be better analyzed and audit. In addition, the management control center Agent should manage and analyze audit results from AA (or HA) and audit data on time. And the history files of network packets and host log data should also be audit to find deeper violations that cannot be found in real time.

  14. The WOMBAT Attack Attribution Method: Some Results

    NASA Astrophysics Data System (ADS)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  15. Depression After Heart Attack

    MedlinePlus

    ... to use in patients with coronary heart disease. Cognitive behavior therapy is a form of psychological treatment that has ... after a heart attack and that SSRIs and cognitive behavior therapy reduce depression, it stands to reason that treating ...

  16. BFT replication resistant to MAC attacks

    NASA Astrophysics Data System (ADS)

    Zbierski, Maciej

    2016-09-01

    Over the last decade numerous Byzantine fault-tolerant (BFT) replication protocols have been proposed in the literature. However, the vast majority of these solutions reuse the same authentication scheme, which makes them susceptible to a so called MAC attack. Such vulnerability enables malicious clients to undetectably prevent the replicated service from processing incoming client requests, and consequently making it permanently unavailable. While some BFT protocols attempted to address this issue by using different authentication mechanisms, they at the same time significantly degraded the performance achieved in correct environments. This article presents a novel adaptive authentication mechanism which can be combined with practically any Byzantine fault-tolerant replication protocol. Unlike previous solutions, the proposed scheme dynamically switches between two operation modes to combine high performance in correct environments and liveness during MAC attacks. The experiment results presented in the article demonstrate that the proposed mechanism can sufficiently tolerate MAC attacks without introducing any observable overhead whenever no faults are present.

  17. Optical properties of fly ash. Volume 1, Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Self, S.A.

    1994-12-01

    Research performed under this contract was divided into four tasks under the following headings: Task 1, Characterization of fly ash; Task 2, Measurements of the optical constants of slags; Task 3, Calculations of the radiant properties of fly ash dispersions; and Task 4, Measurements of the radiant properties of fly ash dispersions. Tasks 1 and 4 constituted the Ph.D. research topic of Sarbajit Ghosal, while Tasks 2 and 3 constituted the Ph.D. research topic of Jon Ebert. Together their doctoral dissertations give a complete account of the work performed. This final report, issued in two volumes consists of an executivemore » summary of the whole program followed by the dissertation of Ghosal. Volume 1 contains the dissertation of Ghosal which covers the characterization of fly ash and the measurements of the radiant properties of fly ash dispersions. A list of publications and conference presentations resulting from the work is also included.« less

  18. Haltere removal alters responses to gravity in standing flies.

    PubMed

    Daltorio, Kathryn; Fox, Jessica

    2018-05-31

    Animals detect the force of gravity with multiple sensory organs, from subcutaneous receptors at body joints to specialized sensors like the vertebrate inner ear. The halteres of flies, specialized mechanoreceptive organs derived from hindwings, are known to detect body rotations during flight, and some groups of flies also oscillate their halteres while walking. The dynamics of halteres are such that they could act as gravity detectors for flies standing on substrates, but their utility during non-flight behaviors is not known. We observed the behaviors of intact and haltere-ablated flies during walking and during perturbations in which the acceleration due to gravity suddenly changed. We found that intact halteres are necessary for flies to maintain normal walking speeds on vertical surfaces and to respond to sudden changes in gravity. Our results suggest that halteres can serve multiple sensory purposes during different behaviors, expanding their role beyond their canonical use in flight. © 2018. Published by The Company of Biologists Ltd.

  19. Activating neurons by light in free-moving adult flies

    NASA Astrophysics Data System (ADS)

    Wu, Ming-Chin; Hsiao, Po-Yen; Chu, Li-An; Lin, Yen-Yin; Fu, Chien-Chung; Chiang, Ann-Shyn

    2015-01-01

    In this presentation, we show our preliminary results which is related to neurons activation in vivo by laser. A laser scanning system was adopted to guide laser beam to an assigned fly and an assigned position. A 473-nm laser can be a heat punishment source to restrain a wild-type fly's moving area. Furthermore, neurons in optogenetics transgene flies can be triggered by the blue laser in this system.

  20. Effective use of fly ash slurry as fill material.

    PubMed

    Horiuchi, S; Kawaguchi, M; Yasuhara, K

    2000-09-15

    A lot of effort has been put into increasing coal ash utilization; however, 50% of total amount is disposed of on land and in the sea. Several attempts have been reported recently concerning slurried coal fly ash use for civil engineering materials, such as for structural fill and backfill. The authors have studied this issue for more than 15 years and reported its potential for (1) underwater fills, (2) light weight backfills, and (3) light weight structural fills, through both laboratory tests and construction works. This paper is an overview of the results obtained for slurry, focusing on the following. (1) Coal fly ash reclaimed by slurry placement shows lower compressibility, higher ground density, and higher strength than by the other methods. This higher strength increases stability against liquefaction during earthquake. (2) Higher stability of the fly ash ground formed by slurry placement is caused by higher density and its self-hardening property. (3) Stability of fly ash reclaimed ground can be increased by increasing density and also by strength enhancement by cement addition. (4) Technical data obtained through a man-made island construction project shows the advantages of fly ash slurry in terms of mechanical properties such as higher stability against sliding failure, sufficient ground strength, and also in terms of cost saving. (5) Concentration in leachates from the placed slurry is lower than the Japanese environmental law. (6) In order to enlarge the fly ash slurry application toward a lightweight fill, mixtures of air foam, cement and fly ash were examined. Test results shows sufficient durability of this material against creep failure. This material was then used as lightweight structural fill around a high-rise building, and showed sufficient quality. From the above data, it can be concluded that coal fly ash slurry can be effectively utilized in civil engineering projects.