Science.gov

Sample records for flying saucer attack

  1. Flying Saucer? Aliens?

    NASA Technical Reports Server (NTRS)

    1961-01-01

    No, it's not a flying saucer, it is the domed top to a 70 foot long vacuum tank at the Lewis Research Center's Electric Propulsion Laboratory, Cleveland, Ohio. The three technicians shown here in protective clothing had just emerged from within the tank where they had been cleaning in the toxic mercury atmosphere, left after ion engine testing in the tank. Lewis has since been renamed the John H. Glenn Research Center.

  2. Simple Saucers

    ERIC Educational Resources Information Center

    Coy, Mary

    2008-01-01

    With standardized English Language Arts exams on the horizon, the author thought a game of Antonyms would provide not only a quick language arts activity for her sixth graders, but also a nice segue to an art lesson in contrast. In this article, she describes a project, a simple saucer on a pedestal base, which required students to demonstrate…

  3. McDowell's saucer.

    PubMed

    Gardner, D L

    2001-10-01

    The pioneer American ovariotomist McDowell studied anatomy in Edinburgh under John Bell. McDowell returned to Kentucky in 1793 with a set of porcelain. One saucer from his set was donated to the College in 1994.

  4. High angle of attack flying qualities criteria for longitudinal rate command systems

    NASA Technical Reports Server (NTRS)

    Wilson, David J.; Citurs, Kevin D.; Davidson, John B.

    1994-01-01

    This study was designed to investigate flying qualities requirements of alternate pitch command systems for fighter aircraft at high angle of attack. Flying qualities design guidelines have already been developed for angle of attack command systems at 30, 45, and 60 degrees angle of attack, so this research fills a similar need for rate command systems. Flying qualities tasks that require post-stall maneuvering were tested during piloted simulations in the McDonnell Douglas Aerospace Manned Air Combat Simulation facility. A generic fighter aircraft model was used to test angle of attack rate and pitch rate command systems for longitudinal gross acquisition and tracking tasks at high angle of attack. A wide range of longitudinal dynamic variations were tested at 30, 45, and 60 degrees angle of attack. Pilot comments, Cooper-Harper ratings, and pilot induced oscillation ratings were taken from five pilots from NASA, USN, CAF, and McDonnell Douglas Aerospace. This data was used to form longitudinal design guidelines for rate command systems at high angle of attack. These criteria provide control law design guidance for fighter aircraft at high angle of attack, low speed flight conditions. Additional time history analyses were conducted using the longitudinal gross acquisition data to look at potential agility measures of merit and correlate agility usage to flying qualities boundaries. This paper presents an overview of this research.

  5. Solar breeze power package and saucer ship

    SciTech Connect

    Veazey, S. E.

    1985-11-12

    A solar breeze power package having versatile sail and windmast options useful both on land and sea and especially useful in the saucer ship type design. The Vertical Axis Wind Turbine (VAWT) of the several Darrieus designs in conjunction with roll-up or permanently mounted solar cells combine in a hybrid or are used separately to provide power to a battery bank or other storage device.

  6. X-29 High Angle-of-Attack Flying Qualities

    DTIC Science & Technology

    1991-06-01

    TIME (SECONDS’ Figur- 4 Total Pitching Moment Coefficient Comparison 16 X-29 USAF SIN 820049 POWER OFF XCG=449 in CANARD=-57 deg SYM FLAP=21.5 dog ...STRAKE=30 dog FL T IGH -UPOR..577 ED Elt ................... ... -PREflITED’RE RD MOD :L.~ -- GH:REYqO1.QS 1UNDER -:PR~EDITE TRflA ’MODfL.-7 L3 WAEYN3LDS...USAF S/N 820049 1 G to 63 dog AOA 3. o FLIGHT DATA -- PREDICED READ U. co 2.__ * . I- 0 0 15. 25. 35. 45. 5S. 65. 75. ANGLE OF ATTACK (DEG) 1 G to 55

  7. Ceropegia sandersonii Mimics Attacked Honeybees to Attract Kleptoparasitic Flies for Pollination.

    PubMed

    Heiduk, Annemarie; Brake, Irina; von Tschirnhaus, Michael; Göhl, Matthias; Jürgens, Andreas; Johnson, Steven D; Meve, Ulrich; Dötterl, Stefan

    2016-10-24

    Four to six percent of plants, distributed over different angiosperm families, entice pollinators by deception [1]. In these systems, chemical mimicry is often used as an efficient way to exploit the olfactory preferences of animals for the purpose of attracting them as pollinators [2,3]. Here, we report a very specific type of chemical mimicry of a food source. Ceropegia sandersonii (Apocynaceae), a deceptive South African plant with pitfall flowers, mimics attacked honeybees. We identified kleptoparasitic Desmometopa flies (Milichiidae) as the main pollinators of C. sandersonii. These flies are well known to feed on honeybees that are eaten by spiders, which we thus predicted as the model chemically mimicked by the plant. Indeed, we found that the floral scent of C. sandersonii is comparable to volatiles released from honeybees when under simulated attack. Moreover, many of these shared compounds elicited physiological responses in antennae of pollinating Desmometopa flies. A mixture of four compounds-geraniol, 2-heptanone, 2-nonanol, and (E)-2-octen-1-yl acetate-was highly attractive to the flies. We conclude that C. sandersonii is specialized on kleptoparasitic fly pollinators by deploying volatiles linked to the flies' food source, i.e., attacked and/or freshly killed honeybees. The blend of compounds emitted by C. sandersonii is unusual among flowering plants and lures kleptoparasitic flies into the trap flowers. This study describes a new example of how a plant can achieve pollination through chemical mimicry of the food sources of adult carnivorous animals.

  8. The Aerodynamics of Axisymmetric Blunt Bodies Flying at Angle of Attack

    NASA Technical Reports Server (NTRS)

    Schoenenberger, Mark; Kutty, Prasad; Queen, Eric; Karlgaard, Chris

    2014-01-01

    The Mars Science Laboratory entry capsule is used as an example to demonstrate how a blunt body of revolution must be treated as asymmetric in some respects when flying at a non-zero trim angle of attack. A brief description of the axisymmetric moment equations are provided before solving a system of equations describing the lateral-directional moment equations for a blunt body trimming at an angle of attack. Simplifying assumptions are made which allow the solution to the equations to be rearranged to relate the roll and yaw stability with sideslip angle to the frequency of oscillation of the vehicle body rates. The equations show that for a blunt body the roll and yaw rates are in phase and proportional to each other. The ratio of the rates is determined by the static stability coefficients and mass properties about those axes. A trajectory simulation is used to validate the static yaw stability parameter identification equation and a simple method of identifying the oscillation frequency from the body rates. The approach is shown to successfully extract the modeled yaw stability coefficient along a simulated Mars entry in agreement with data earlier analysis of MSL flight data.

  9. Cuticular Hydrocarbon Cues Are Used for Host Acceptance by Pseudacteon spp. Phorid Flies that Attack Azteca sericeasur Ants.

    PubMed

    Mathis, Kaitlyn A; Tsutsui, Neil D

    2016-04-01

    Parasitoids often use complex cues to identify suitable hosts in their environment. Phorid fly parasitoids that develop on one or a few host species often use multiple cues, ranging from general to highly specific, to home in on an appropriate host. Here, we describe the hierarchy of cues that Pseudacteon phorid flies use to identify Azteca ant hosts. We show, through behavioral observations in the field, that phorid flies are attracted to two cryptic Azteca species, but only attack Azteca sericeasur (Hymenoptera: Formicidae: Dolichoderinae). To test whether the phorid flies use cuticular hydrocarbons (CHCs) to distinguish between the two Azteca taxa, we first documented and compared cuticular hydrocarbons of the two Azteca taxa using gas chromatography/mass spectrometry. Then, using cuticular hydrocarbon-transfer experiments with live ants, we characterized the cuticular hydrocarbons of A. sericeasur as a short-range, host location cue used by P. lasciniosus (Diptera: Phoridae) to locate the ants.

  10. Resistance of class C fly ash belite cement to simulated sodium sulphate radioactive liquid waste attack.

    PubMed

    Guerrero, A; Goñi, S; Allegro, V R

    2009-01-30

    The resistance of class C fly ash belite cement (FABC-2-W) to concentrated sodium sulphate salts associated with low level wastes (LLW) and medium level wastes (MLW) is discussed. This study was carried out according to the Koch and Steinegger methodology by testing the flexural strength of mortars immersed in simulated radioactive liquid waste rich in sulphate (48,000 ppm) and demineralised water (used as a reference), at 20 degrees C and 40 degrees C over a period of 180 days. The reaction mechanisms of sulphate ion with the mortar was carried out through a microstructure study, which included the use of Scanning electron microscopy (SEM), porosity and pore-size distribution and X-ray diffraction (XRD). The results showed that the FABC mortar was stable against simulated sulphate radioactive liquid waste (SSRLW) attack at the two chosen temperatures. The enhancement of mechanical properties was a result of the formation of non-expansive ettringite inside the pores and an alkaline activation of the hydraulic activity of cement promoted by the ingress of sulphate. Accordingly, the microstructure was strongly refined.

  11. Pseudacteon calderensis, a new fly species (Diptera:Phoridae) attacking the fire ant Solenopsis interrupta (Hymenoptera:Formicidae) in northwestern Argentina

    Technology Transfer Automated Retrieval System (TEKTRAN)

    A new species of Pseudacteon phorid fly Pseudacteon calderis (Diptera: Phoridae) is described from females attacking worker ants of Solenopsis interrupta Santschi in Salta and Jujuy provinces, northwestern Argentina. Pseudacteon calderis differs from almost all other South American Pseudacteon speci...

  12. Dengue prevention at the household level: preliminary evaluation of a mesh cover for flowerpot saucers.

    PubMed

    Schall, Virgínia Torres; Barros, Héliton da Silva; Jardim, João Bosco; Secundino, Nágila Francinete Costa; Pimenta, Paulo Filemon Paolucci

    2009-10-01

    The effectiveness of a polyester mesh cover (evidengue), aimed at preventing the access of female Aedes aegypti mosquitoes to flowerpot saucers, was evaluated in laboratory. Two saucers of flowerpot with water were individually wrapped with the cover was placed with their respective pots in two entomological cages. One identical set of flowerpot and saucer was placed in a third cage. In each cage, 20 gravid females, fed on mouse blood, were released. Results show that the cover was effective to prevent access of females. Further tests are necessary to assess cover effectiveness as a device to prevent saucer oviposition.

  13. Exploratory trial to determine the efficacy of the PYthon and the PYthon Magnum slow-release insecticide ear tags for the control of midges (Culicoides spp.), attacking sheep and cattle and flies attacking cattle.

    PubMed

    Goosen, H; de Vries, P J T; Fletcher, M G

    2012-08-01

    This study investigated the prophylactic action of the chemical combination zeta-cypermethrin and piperonyl butoxide, administered by means of slow-release insecticide-impregnated ear tags, against biting midges (Culicoides spp) attacking sheep and against midges, horn flies (Haematobia irritant), stable flies (Stomoxys calcitrans), and houseflies (Musca domestica) attacking cattle. Treated sheep and cattle were protected 100 percent against blood-feeding midges for two months and there was a clear reduction in the number of midges collected from treated animals. Three days after the ear tags were attached to cattle, the number of horn flies on the cattle was reduced to practically zero and remained at a low level until the end of the trial (day 85). There was also a strong reduction in the numbers of stable flies and houseflies counted.

  14. Formation of lenticulae on Europa by saucer-shaped sills

    NASA Astrophysics Data System (ADS)

    Manga, Michael; Michaut, Chloé

    2017-04-01

    Europa's surface contains numerous quasi-elliptical features called pits, domes, spots and small chaos. We propose that these features, collectively referred to as lenticulae, are the surface expression of saucer-shaped sills of liquid water in Europa's ice shell. In particular, the inclined sheets of water that surround a horizontal inner sill limit the lateral extent of intrusion, setting the lateral dimension of lenticulae. Furthermore, the inclined sheets disrupt the ice above the intrusion allowing the inner sill to thicken to produce the observed relief of lenticulae and to fracture the crust to form small chaos. Scaling relationships between sill depth and lateral extent imply that the hypothesized intrusions are, or were, 1-5 km below the surface. Liquid water is predicted to exist presently under pits and for a finite time under chaos and domes.

  15. Effect of the Drosophila endosymbiont Spiroplasma on parasitoid wasp development and on the reproductive fitness of wasp-attacked fly survivors

    PubMed Central

    Xie, Jialei; Tiner, Bethany; Vilchez, Igor; Mateos, Mariana

    2011-01-01

    In a previous study, we showed that Spiroplasma, a maternally transmitted endosymbiotic bacterium of Drosophila hydei, enhances larval to adult survival of its host when exposed to oviposition attack by the parasitoid wasp Leptopilina heterotoma. The mechanism by which Spiroplasma enhances host survival has not been elucidated. To better understand this mechanism, we compared the growth of wasp larvae in Spiroplasma-infected and uninfected hosts. Our results indicate that wasp embryos in Spiroplasma-infected hosts hatch and grow normally for ~2 days, after which their growth is severely impaired, compared to wasps developing in uninfected hosts. Thus, despite their reduced ability to complete development in Spiroplasma-infected hosts, developing wasps may exert fitness costs on their hosts that are manifested after host emergence. The severity of these costs will influence the degree to which this protective mechanism contributes to the long-term persistence of Spiroplasma in D. hydei. We therefore examined survival to 10-day-old adult stage and fecundity of Spiroplasma-infected flies surviving a wasp treatment. Our results suggest detrimental effects of wasp attack on longevity of Spiroplasma-infected adult flies. However, compared to Spiroplasma-free flies exposed to wasps, Spiroplasma-infected flies exposed to wasps have ~5 times greater survival from larva to 10 day-adult. The relative fecundity of wasp-attacked Spiroplasma-infected females was ~71% that of un-attacked Spiroplasma-free females. Our combined survival and female fecundity results suggest that under high wasp parasitism, the reproductive fitness of Spiroplasma-infected flies may be ~3.5 times greater than that of uninfected females, so it is potentially relevant to the persistence of Spiroplasma in natural populations of D. hydei. Interestingly, Spiroplasma-infected males surviving a wasp attack were effectively sterile during the 3-day period examined. This observation is consistent with the

  16. The 3D geometry of regional-scale dolerite saucer complexes and their feeders in the Secunda Complex, Karoo Basin

    NASA Astrophysics Data System (ADS)

    Coetzee, André; Kisters, Alexander

    2016-05-01

    Dolerites in the Karoo Basin of South Africa commonly represent kilometre-scale, interconnected saucer-shaped structures that consist of inner sills, bounded by inclined sheets connected to stratigraphically higher outer sills. Based on information from over 3000 boreholes and mining operations extending over an area of ca. 500 km2 and covering a > 3 km vertical section from Karoo strata into underlying basement rocks, this paper presents the results of a 3D modelling exercise that describes the geometry and spatial relationships of a regional-scale saucer complex, locally referred to as the number 8 sill, from the Secunda (coal mine) Complex in the northern parts of the Karoo Basin. The composite number 8 sill complex consists of three main dolerite saucers (dolerites A to C). These dolerite saucers are hosted by the Karoo Supergroup and the connectivity and geometry of the saucers support a lateral, sill-feeding-sill relationship between dolerite saucers A, B and C. The saucers are underlain and fed by a shallowly-dipping sheet (dolerite D) in the basement rocks below the Karoo sequence. The 3D geometric strata model agrees well with experimental results of saucer formation from underlying feeders in sedimentary basins, but demonstrates a more intricate relationship where a single feeder can give rise to several split level saucers in one regionally extensive saucer complex. More localised dome- or ridge-shape protrusions are common in the flat lying sill parts of the regional-scale saucers. We suggest a mode of emplacement for these kilometre-scale dome- and ridge structures having formed as a result of lobate magma flow processes. Magma lobes, propagating in different directions ahead of the main magma sheet, undergo successive episodes of lobe arrest and inflation. The inflation of lobes initiates failure of the overlying strata and the formation of curved faults. Magma exploiting these faults transgresses the stratigraphy and coalesces to form a ring

  17. Effectiveness of a sprayable male annihilation treatment with a biopesticide against fruit flies (Diptera:Tephritidae) attacking tropical fruits

    Technology Transfer Automated Retrieval System (TEKTRAN)

    SPLAT-MAT Spinosad ME(aka STATIC Spinosad ME),an "attract and kill" sprayable biopesticide, was evaluated as an area wide suppression treatment against Bactrocera carambolae(Drew & Hancock),carambola fruit fly, in Brazil and Bactrocera dorsalis(Hendel),oriental fruit fly, in Hawaii. In Brazil, a sin...

  18. Long aculeus and behavior of Anastrepha ludens render gibberellic acid ineffective as an agent to reduce 'ruby red' grapefruit susceptibility to the attack of this pestiferous fruit fly in commercial groves.

    PubMed

    Birke, Andrea; Aluja, Martín; Greany, Patrick; Bigurra, Everardo; Pérez-Staples, Diana; McDonald, Roy

    2006-08-01

    Treating Mexican grapefruit with gibberellic acid (GA3) before color break, significantly delayed peel color change and increased peel puncture resistance, but it did not reduce grapefruit susceptibility to Mexican fruit fly, Anastrepha ludens (Loew) attack under natural conditions. Despite GA3 treatments, larval infestation levels increased with higher fruit fly populations, which also increased as the season progressed. Late in the season, infestation levels were even higher in GA3-treated fruit compared with untreated fruit, possibly because treated fruit were in better condition at that stage. Egg clutch size was significantly greater in very unripe, hard, GA3-treated fruit at the beginning of the harvest season and in December, compared with control fruit. Under laboratory conditions, egg injection into different regions of the fruit suggested that A. ludens eggs are intoxicated by peel oil content in the flavedo region. However, A. ludens' long aculeus allows females to oviposit eggs deeper into the peel (i.e., albedo), avoiding toxic essential oils in the flavedo. This makes A. ludens a particularly difficult species to control compared with other citrus-infesting species such as Anastrepha suspensa (Loew), Anastrepha fraterculus (Wiedemann), and Ceratitis capitata (Wiedemann) (fly species with significantly shorter aculei), which can be effectively managed with GA3 sprays. We discuss our findings in light of their practical implications and with respect to the oviposition behavior of various fruit flies attacking citrus.

  19. Strong Magnetic Field Fluctuations within Filamentary Auroral Density Cavities Interpreted as VLF Saucer Sources

    NASA Technical Reports Server (NTRS)

    Knudsen, D. L.; Kabirzadeh, R.; Burchill, J. K.; Pfaff, Robert F.; Wallis, D. D.; Bounds, S. R.; Clemmons, J. H.; Pincon, J.-L.

    2012-01-01

    The Geoelectrodynamics and Electro-Optical Detection of Electron and SuprathermalIon Currents (GEODESIC) sounding rocket encountered more than 100 filamentary densitycavities associated with enhanced plasma waves at ELF (3 kHz) and VLF (310 kHz)frequencies and at altitudes of 800990 km during an auroral substorm. These cavities weresimilar in size (20 m diameter in most cases) to so-called lower-hybrid cavities (LHCs)observed by previous sounding rockets and satellites; however, in contrast, many of theGEODESIC cavities exhibited up to tenfold enhancements in magnetic wave powerthroughout the VLF band. GEODESIC also observed enhancements of ELF and VLFelectric fields both parallel and perpendicular to the geomagnetic field B0 within cavities,though the VLF E field increases were often not as large proportionally as seen in themagnetic fields. This behavior is opposite to that predicted by previously published theoriesof LHCs based on passive scattering of externally incident auroral hiss. We argue thatthe GEODESIC cavities are active wave generation sites capable of radiating VLF wavesinto the surrounding plasma and producing VLF saucers, with energy supplied by cold,upward flowing electron beams composing the auroral return current. This interpretation issupported by the observation that the most intense waves, both inside and outside cavities,occurred in regions where energetic electron precipitation was largely inhibited orabsent altogether. We suggest that the wave-enhanced cavities encountered by GEODESICwere qualitatively different from those observed by earlier spacecraft because of thefortuitous timing of the GEODESIC launch, which placed the payload at apogee within asubstorm-related return current during its most intense phase, lasting only a few minutes.

  20. Multi-state survey of picture-winged flies (Diptera:Ulidiidae) attacking sweet corn in the southern U.S.

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Four picture-winged fly (Diptera: Ulidiidae) species in two genera were identified as direct pests of sweet and field corn ears in Florida from surveys conducted during 2007 and 2008. Larvae emerge from eggs deposited mostly in the silk canal to damage silk, kernels and cob rendering infested sweet...

  1. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  2. Pollen recovered from the exoskeleton of stable flies, Stomoxys calcitrans (L.) in Gainesville, Florida

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Stable flies are pestiferous blood feeding flies that attack animals and humans. Besides consuming blood, these flies will also visit flowers to take nectar meals. When feeding on nectar, flies become coated with pollen which can be used to identify flowers used by the flies. Recently, flies cove...

  3. Heart Attack

    MedlinePlus

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  4. Flying wings / flying fuselages

    NASA Technical Reports Server (NTRS)

    Wood, Richard M.; Bauer, Steven X. S.

    2001-01-01

    The present paper has documented the historical relationships between various classes of all lifting vehicles, which includes the flying wing, all wing, tailless, lifting body, and lifting fuselage. The diversity in vehicle focus was to ensure that all vehicle types that map have contributed to or been influenced by the development of the classical flying wing concept was investigated. The paper has provided context and perspective for present and future aircraft design studies that may employ the all lifting vehicle concept. The paper also demonstrated the benefit of developing an understanding of the past in order to obtain the required knowledge to create future concepts with significantly improved aerodynamic performance.

  5. Geology of the saucer-shaped sill near Mahad, western Deccan Traps, India, and its significance to the Flood Basalt Model

    NASA Astrophysics Data System (ADS)

    Duraiswami, Raymond A.; Shaikh, Tahira N.

    2013-07-01

    An ˜22-m-thick saucer-shaped sill occurs near Mahad and is exposed as a curvilinear, miniature ridge within the Deccan Traps. The sill has variable dips (42-55°). It has a 7.1-km long axis and 5.3 km short axis (aspect ratio of 1.4) and is larger than the MV sill of the Golden Valley sill complex, South Africa and the Panton sill, Australia. The sill has distinct glassy upper and lower chilled margins with a coarse-grained highly jointed core. The samples from the margin are invariably fractured and iron stained because of deuteric alteration. The rock from the sill is plagioclase-phyric basalt. At least three thick sill-like apophyses emanate from the base of the main sill. The apophyses change direction because of bending and thinning from a horizontal concordant sheet at the top to a discordant inclined form that bends again to pass into a lower horizontal concordant sheet. We interpret such features as `nascent saucer-shaped sills' that did not inflate to form nested sills. Geochemically, the sill consists of poorly differentiated tholeiitic basalt that has a restricted geochemical range. Critical trace element ratios and primitive mantle normalised trace and REE patterns indicate that the sills have geochemical affinities to the Poladpur chemical type and that the pahoehoe flow they intrude belongs to the Bushe Formation. Calculated magmatic overpressures during sill emplacement range from 8.4 to 11.3 MPa (for Young's modulus E = 5 GPa) and 16.7 to 22.5 MPa (for E=10 GPa) and depth to magma chamber ranges from 8.5 to 11.5 km ( E = 5 GPa) and 17.1 to 22.9 km ( E = 10 GPa), consistent with petrological and gravity modelling. The volume of the Mahad sill is approximately 276 km3 and is constant irrespective of the variations in the values of host-rock Young's modulus. In 1980, Cox (J Petrol 21:629-650, 1980) proposed a conceptual model of the crust-mantle section beneath the Karoo CFB which is considered as the fundamental model for flood basalt volcanism. Our

  6. A numerical approach to sill emplacement in isotropic media: Do saucer-shaped sills represent 'natural' intrusive tendencies in the shallow crust?

    NASA Astrophysics Data System (ADS)

    Hansen, Jógvan

    2015-11-01

    Saucer-shaped mafic sills are of common occurrences in sedimentary settings worldwide, but have only rarely been reported for onshore igneous settings. Mafic sills, which have intruded the lava pile of the Faroe Islands Basalt Group (FIBG) of the North Atlantic Igneous Province (NAIP), are characterised by gradual and continuous upward-curving geometries from bases to rims. Some of the smaller Faroese sills gradually wedge out to near-zero thicknesses at one of their ends, but these very thin sill sections still display gradual upward-curving geometries, despite the lack of any displacements of their overburdens that can be directly measured or detected with the unaided eye. This is at odds with earlier emplacement models applying for sedimentary settings, predicting sill climbing in response to stress asymmetries at their propagating tips due to wholesale overburden uplifts. In this paper, published values of Young's modulus for wet basaltic crust are utilised in order to calculate elastic displacements of isotropic host-rocks during individual small-scale inflation sequences in embryonic sills immediately behind their propagating tips at various depths and magmatic pressures. The calculations suggest that stress asymmetries at propagating tips and associated upward-curving sill climbing may occur when proportionally larger melt volumes are emplaced above initial single extension propagation fractures than below them. Angles of sill deflection are determined by differences in melt volumes deposited on top of and below initial planes of propagation fractures respectively, in addition to lengths of individual inflation sequences and magnitudes of magmatic pressures. The results obtained in this paper seem to suggest that asymmetrical small-scale inflation sequences at advancing sill tips in relatively isotropic media have the potential to generate saucer-shaped sills.

  7. Heart Attack Recovery FAQs

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack Recovery FAQs Updated:Sep 19,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  8. Flying Cars

    NASA Technical Reports Server (NTRS)

    Crow, Steven

    1996-01-01

    Flying cars have nearly mythical appeal to nonpilots, a group that includes almost the whole human race. The appeal resides in the perceived utility of flying cars, vehicles that offer portal-to-portal transportation, yet break the bonds of road and traffic and travel freely through the sky at the drivers will. Part of the appeal is an assumption that flying cars can be as easy to fly as to drive. Flying cars have been part of the dream of aviation since the dawn of powered flight. Glenn Curtiss built, displayed, and maybe even flew a flying car in 1917, the Curtiss Autoplane. Many roadable airplanes were built in the 1930's, like the Waterman Arrowbile and the Fulton Airphibian. Two flying cars came close to production in the early 1950's. Ted Hall built a series of flying cars culminating in the Convaircar, sponsored by Consolidated Vultee, General Motors, and Hertz. Molt Taylor built and certified his Aerocar, and Ford came close to producing them. Three Aerocars are still flyable, two in museums in Seattle and Oshkosh, and the third owned and flown by Ed Sweeny. Flying cars do have problems, which so far have prevented commercial success. An obvious problem is complexity of the vehicle, the infrastructure, or both. Another is the difficulty of matching low power for normal driving with high power in flight. An automobile uses only about 20 hp at traffic speeds, while a personal airplane needs about 160 hp at speeds typical of flight. Many automobile engines can deliver 160 hp, but not for very long. A more subtle issue involves the drag of automobiles and airplanes. A good personal airplane can fly 30 miles per gallon of fuel at 200 mph. A good sports car would need 660 hp at the same speed and would travel only 3 miles per gallon. The difference is drag area, about 4.5 sq ft for the automobile and 1.4 sq ft for the airplane. A flying car better have the drag area of the airplane, not the car!

  9. Pericarditis - after heart attack

    MedlinePlus

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  10. Seven Deadliest Network Attacks

    SciTech Connect

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  11. Life After a Heart Attack

    MedlinePlus

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  12. What Is a Heart Attack?

    MedlinePlus

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  13. Traumatic tiger attack.

    PubMed

    Chum, Marvin; Ng, Wai Pui

    2011-11-01

    Attacks on humans by large cats are uncommon occurrences and thus the principles of managing such injuries are not well documented. The authors here report the case of an 11-year-old boy who was mauled by a privately owned tiger. The attack resulted in multiple cranial lacerations and fractures, dissection of the internal carotid artery, and persistent neurological deficits. This case outlines the multiple sources of injury and pathology that can result from such an attack. Discussion is focused on the pattern of injury seen in large feline attacks and the treatment approach.

  14. [Fauna attacks in French Guiana: retrospective 4-year analysis].

    PubMed

    Mimeau, E; Chesneau, P

    2006-02-01

    The rich, diversified fauna of French Guiana has an infamous reputation for its aggressiveness. A retrospective analysis of the records the SAMU emergency service in Guiana showed that less than 1% of phone calls received between 1998 and 2001 involved fauna attacks. Most of these calls involved flying hymenoptera (36.9%), snakes (15.6 %), dogs (13.8%), and scorpions (9.8%). In 69 of 666 cases, the attack was severe enough to warrant dispatching a SMUR intensive mobile care unit. These cases involved poisonous snake bites (n=35), flying hymenoptera stings (n=24) and scorpion stings (n=5). Although this study presents numerous confounding factors, its findings indicate that the risk of fauna attacks in French Guiana may be overestimated.

  15. Target-invariant aggressive display in a tephritid fly.

    PubMed

    Aguilar-Argüello, Samuel; Díaz-Fleischer, Francisco; Rao, Dinesh

    2015-12-01

    Fruit flies of the family Tephritidae (Diptera) use specialized wing displays in aggressive encounters with conspecifics and predators. These displays, called supination displays, have been thought to deter attacks from one of their main predators, spiders of the family Salticidae. However, there is no information whether the display is qualitatively or quantitatively different when the target is a conspecific or a predator. In this study, we sought to determine whether flies vary their displays depending on the display target. Using the Mexican fruit fly Anastrepha ludens, we compared the characteristics of the display that male and female flies use against conspecifics and spiders. Flies did not distinguish between spiders and conspecifics in terms of display rates and bout duration. In general, flies are more likely to retreat faster from spiders after performing a display. We suggest that supination is a generalized aggressive behavior that is independent of the target.

  16. Fly Away

    NASA Technical Reports Server (NTRS)

    Tibbitts, Scott

    2004-01-01

    Kurt was one of the lead engineers/project managers at our company, Starsys, in Boulder, Colorado. I had hired Kurt six years ago and found him to be a man of few words but huge actions. Kurt had single-handedly created two new business areas in the company and made a significant contribution to the upcoming Mars Exploration. While running in the mountains, Kurt had a fatal heart attack. An avid back country skier and climber, he was 45 years old and appeared in great health. I spoke honestly from my heart, and from my own experience as a father. That day people started to ask what they could do to help the family. Over the next couple days we set up a fund where people could contribute dollars or vacation time or comp time, and Starsya would translate that into equivalent dollars and provide a matching contribution.

  17. Sulfate resistance of high calcium fly ash concrete

    NASA Astrophysics Data System (ADS)

    Dhole, Rajaram

    Sulfate attack is one of the mechanisms which can cause deterioration of concrete. In general, Class C fly ash mixtures are reported to provide poor sulfate resistance. Fly ashes, mainly those belonging to the Class C, were tested as per the ASTM C 1012 procedure to evaluate chemical sulfate resistance. Overall the Class C fly ashes showed poor resistance in the sulfate environment. Different strategies were used in this research work to improve the sulfate resistance of Class C fly ash mixes. The study revealed that some of the strategies such as use of low W/CM (water to cementing materials by mass ratio), silica fume or ultra fine fly ash, high volumes of fly ash and, ternary or quaternary mixes with suitable supplementary cementing materials, can successfully improve the sulfate resistance of the Class C fly ash mixes. Combined sulfate attack, involving physical and chemical action, was studied using sodium sulfate and calcium sulfate solutions. The specimens were subjected to wetting-drying cycles and temperature changes. These conditions were found to accelerate the rate of degradation of concrete placed in a sodium sulfate environment. W/CM was found to be the main governing factor in providing sulfate resistance to mixes. Calcium sulfate did not reveal damage as a result of mainly physical action. Characterization of the selected fly ashes was undertaken by using SEM, XRD and the Rietveld analysis techniques, to determine the relation between the composition of fly ashes and resistance to sulfate attack. The chemical composition of glass represented on the ternary diagram was the main factor which had a significant influence on the sulfate resistance of fly ash mixtures. Mixes prepared with fly ashes containing significant amounts of vulnerable crystalline phases offered poor sulfate resistance. Comparatively, fly ash mixes containing inert crystalline phases such as quartz, mullite and hematite offered good sulfate resistance. The analysis of hydrated lime-fly

  18. Supply Chain Attack Framework and Attack Patterns

    DTIC Science & Technology

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  19. Stroke following rottweiler attack.

    PubMed

    Miller, S J; Copass, M; Johansen, K; Winn, H R

    1993-02-01

    A previously healthy 50-year-old man suffered a major right cerebral infarction shortly after receiving head and neck bites in an attack by two rottweilers. Arteriography revealed occlusion of the right middle cerebral artery, an intimal flap and pseudoaneurysm in the high right internal carotid artery just proximal to the skull base, and an obstructed right vertebral artery. The powerful jaw mechanism of rottweilers and other large mastiff-type dogs makes their bites particularly destructive. The predilection of these animals for attacking the head and upper body makes occult crush injury to the extracranial cerebral vessels an important diagnostic consideration following such attacks.

  20. Signs of a Heart Attack

    MedlinePlus

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  1. A fatal leopard attack.

    PubMed

    Hejna, Petr

    2010-05-01

    A rare case of a big cat fatal attack is presented. A male leopard that had escaped from its unlocked cage attacked a 26-year-old male zoo worker. The man sustained penetrating injuries to the neck with consequent external bleeding. The man died while being transported to the hospital as a result of the injuries sustained. The wounds discovered on the victim's body corresponded with the known methods of leopard attacks and with findings on the carcasses of animals killed by leopards in the wild. The conclusion of the medicolegal investigation was that the underlying cause of death was a bite wound to the neck which lacerated the left internal jugular vein, the two main branches of the left external carotid artery, and the cervical spine. The cause of death was massive external bleeding. Special attention is paid to the general pattern of injuries sustained from big cat attacks.

  2. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... of patients with unstable angina/non-ST-elevation myocardial infarction (updating the 2007 guideline and replacing the 2011 ...

  3. New sensitivity analysis attack

    NASA Astrophysics Data System (ADS)

    El Choubassi, Maha; Moulin, Pierre

    2005-03-01

    The sensitivity analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector. In this paper, a new attack on spread spectrum schemes is designed. We first examine one of Kalker's algorithms and prove its convergence using the law of large numbers, which gives more insight into the problem. Next, a new algorithm is presented and compared to existing ones. Various detection algorithms are considered including correlation detectors and normalized correlation detectors, as well as other, more complicated algorithms. Our algorithm is noniterative and requires at most n+1 operations, where n is the dimension of the signal. Moreover, the new approach directly estimates the watermark by exploiting the simple geometry of the detection boundary and the information leaked by the detector.

  4. Fatal big cat attacks.

    PubMed

    Cohle, S D; Harlan, C W; Harlan, G

    1990-09-01

    Two cases of fatal attacks by large cats are presented. In the first case, a 30-year-old female zoo worker was attacked by a jaguar that had escaped its cage. In the second case, a 2-year-old girl was fatally injured by her father's pet leopard. The pattern of injuries in these cases is nearly identical to those of these cats' prey in the wild.

  5. Aerodynamic characteristics of flying fish in gliding flight.

    PubMed

    Park, Hyungmin; Choi, Haecheon

    2010-10-01

    The flying fish (family Exocoetidae) is an exceptional marine flying vertebrate, utilizing the advantages of moving in two different media, i.e. swimming in water and flying in air. Despite some physical limitations by moving in both water and air, the flying fish has evolved to have good aerodynamic designs (such as the hypertrophied fins and cylindrical body with a ventrally flattened surface) for proficient gliding flight. Hence, the morphological and behavioral adaptations of flying fish to aerial locomotion have attracted great interest from various fields including biology and aerodynamics. Several aspects of the flight of flying fish have been determined or conjectured from previous field observations and measurements of morphometric parameters. However, the detailed measurement of wing performance associated with its morphometry for identifying the characteristics of flight in flying fish has not been performed yet. Therefore, in the present study, we directly measure the aerodynamic forces and moment on darkedged-wing flying fish (Cypselurus hiraii) models and correlated them with morphological characteristics of wing (fin). The model configurations considered are: (1) both the pectoral and pelvic fins spread out, (2) only the pectoral fins spread with the pelvic fins folded, and (3) both fins folded. The role of the pelvic fins was found to increase the lift force and lift-to-drag ratio, which is confirmed by the jet-like flow structure existing between the pectoral and pelvic fins. With both the pectoral and pelvic fins spread, the longitudinal static stability is also more enhanced than that with the pelvic fins folded. For cases 1 and 2, the lift-to-drag ratio was maximum at attack angles of around 0 deg, where the attack angle is the angle between the longitudinal body axis and the flying direction. The lift coefficient is largest at attack angles around 30∼35 deg, at which the flying fish is observed to emerge from the sea surface. From glide polar

  6. The importance of ecological studies in the control of tsetse flies*

    PubMed Central

    Glover, P. E.

    1967-01-01

    The author reviews recent ecological research on tsetse flies in East Africa and Northern Nigeria, particularly in connexion with the flies' sensory reactions, and stresses the importance of an accurate knowledge of their daytime and night-time resting-sites and of identifying the sources of their blood meals in order to elucidate the reservoirs of trypanosomiasis. The epidemiology of the disease is considered in the light of studies of trypanosome infections in host and fly. The control of tsetse flies must be based on the practical application of ecological knowledge by methods involving either a direct attack upon the fly (such as trapping or the use of insecticides) or an indirect attack (such as bush clearing or game destruction to eliminate the fly's habitat or food supply); these methods are dealt with in some detail. The author concludes with a discussion of modern trends in research, and a number of lines of research are suggested. PMID:4874781

  7. Bacterial communities associated with larval development of stable flies (Diptera: Muscidae).

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Background: Adult stable flies are hematophagous parasites that preferentially feed on cattle. Persistent attacks and painful bites of the adults contribute to an economic impact of ~$2 billion/yr on the US cattle industry. Although stable flies are important livestock pests, relatively little is ...

  8. Development of botanical-based biopesticides and repellents against biting flies on livestock animals

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Biting flies are important insect pests causing millions of dollars in losses to the livestock industry. The attack by biting flies causes significant losses in animal production and potential food contamination and disease transmission. This presentation reports our recent findings on the developme...

  9. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  10. Stable Fly Research

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Adult stable flies feed on the blood of humans, pets and livestock, inflicting painful bites. Stable flies need one and sometimes two bloodmeals each day to develop their eggs. Unlike mosquitoes where only the females bloodfeed, both male and female stable flies require blood to reproduce. Stable fl...

  11. Investigation of gliding flight by flying fish

    NASA Astrophysics Data System (ADS)

    Park, Hyungmin; Jeon, Woo-Pyung; Choi, Haecheon

    2006-11-01

    The most successful flight capability of fish is observed in the flying fish. Furthermore, despite the difference between two medium (air and water), the flying fish is well evolved to have an excellent gliding performance as well as fast swimming capability. In this study, flying fish's morphological adaptation to gliding flight is experimentally investigated using dry-mounted darkedged-wing flying fish, Cypselurus Hiraii. Specifically, we examine the effects of the pectoral and pelvic fins on the aerodynamic performance considering (i) both pectoral and pelvic fins, (ii) pectoral fins only, and (iii) body only with both fins folded. Varying the attack angle, we measure the lift, drag and pitching moment at the free-stream velocity of 12m/s for each case. Case (i) has higher lift-to-drag ratio (i.e. longer gliding distance) and more enhanced longitudinal static stability than case (ii). However, the lift coefficient is smaller for case (i) than for case (ii), indicating that the pelvic fins are not so beneficial for wing loading. The gliding performance of flying fish is compared with those of other fliers and is found to be similar to those of insects such as the butterfly and fruitfly.

  12. Modeling of supersonic flows near flying vehicle elements

    NASA Astrophysics Data System (ADS)

    Kovenya, V. M.; Slyunyaev, A. Yu.

    2009-03-01

    Supersonic flows near flying vehicle elements are calculated in the approximation of the full Navier-Stokes equations for a viscous compressible heat-conducting gas with different values of free-stream. Mach and Reynolds numbers and angles of attack. The main laws of the flow near the lifting surface. and in the inlet are obtained.

  13. Puncture resistance in 'Sharwil' avocado to oriental fruit fly and Mediterranean fruit fly (Diptera: Tephritidae) oviposition.

    PubMed

    Follett, Peter A

    2009-06-01

    The physiological basis for host antibiosis or nonpreference to a quarantine pest is often not understood. Studies are needed on the mechanisms that impart resistance to better understand how resistance might fail. Experiments were conducted to examine the infestability of 'Sharwil' avocados by oriental fruit fly, Bactrocera dorsalis (Hendel), and Mediterranean fruit fly, Ceratitis capitata (Wiedemann) (Diptera: Tephritidae), after harvest and to quantify the effect of avocado skin hardness on resistance to infestation by oriental fruit fly. Infestation rate increased with decreasing fruit firmness, but fruit were generally poor hosts. Fruit with a patch of skin removed produced more flies than intact fruit, suggesting that skin puncture resistance was an important deterrent to oviposition. This study showed that fruit can be infested within 1 d after harvest, suggesting that fruit should be transferred to fruit fly-proof containers as they are harvested to minimize the risk of attack. Although risk of infestation is negatively correlated with fruit firmness, even some hard fruit may become infested. Therefore, fruit firmness cannot be used alone as an indicator to ensure fruit fly-free 'Sharwil' avocados. Measuring fruit firmness may be a useful component of a multiple component systems approach as an additional safeguard to reduce risk of infestation.

  14. Fatal crocodile attack.

    PubMed

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out.

  15. Word Attack Model.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A limited analysis of alternative approaches to phonemic-level word attack instruction is provided in this document. The instruction segment begins with training in letter-sound correspondences for which mastery of certain skills is assumed. Instruction ends with the decoding of novel items having a consonant-vowel-consonant construction. Contents…

  16. The interpretation of flying qualities requirements for flight control design

    NASA Technical Reports Server (NTRS)

    Rynaski, E. G.; Weingarten, N. C.; Grantham, W.

    1986-01-01

    The flying requirements of MIL-F-8785(C) are interpreted in terms of command/response configurations, and pilot preference for flight control systems configurations of angle of attack, or pitch rate command, specified independently for the short period and phugoid dynamics, is determined using the Total-In-Flight-Simulator aircraft. The results show that for either command configuration, the short term response applies to the angle of attack response of the vehicle, and that this response must satisfy the omega(n) vs n/alpha requirement. The preference in the long term for angle of attack command indicates that the pilot wants the aircraft to fly in the direction it is pointing, and an attitude hold system is not found to be preferred unless attitude hold results in flight path angle hold.

  17. Host ranges of gregarious muscoid fly parasitoids: Muscidifurax raptorellus (Hymenoptera: Pteromalidae), Tachinaephagus zealandicus (Hymenoptera: Encyrtidae), and Trichopria nigra (Hymenoptera: Diapriidae).

    PubMed

    Geden, Christopher J; Moon, Roger D

    2009-06-01

    Attack rates, progeny production, sex ratios, and host utilization efficiency of Muscidifurax raptorellus (Kogan and Legner) (Hymenoptera: Pteromalidae), Tachinaephagus zealandicus Ashmead (Hymenoptera: Encyrtidae), and Trichopria nigra (Nees) (Hymenoptera: Diapriidae) were evaluated in laboratory bioassays with five dipteran hosts: house fly (Musca domestica L.), stable fly (Stomoxys calcitrans L.), horn fly (Hematobia irritans L.), black dump fly [Hydrotaea aenescens (Weidemann)] (Diptera: Muscidae), and a flesh fly (Sarcophaga bullata Parker) (Diptera: Sarcophagidae). M. raptorellus killed and successfully parasitized all five host species and produced an average 2.6 parasitoid progeny from each host. Host attack rates were highest on stable fly and lowest on horn fly; there were no differences among hosts in the total number of progeny produced. T. zealandicus killed larvae of all fly host species in similar numbers, but parasitism was most successful on H. aenescens and S. bullata and least successful on horn fly and house fly hosts. Significantly more parasitoid progeny emerged from S. bullata (10.2 parasitoids per host) than the other hosts; only 2.5 progeny were produced from parasitized horn fly hosts. Most of the killed puparia that produced neither adult flies nor parasitoids ("duds") contained dead parasitoids; in house fly, stable fly, and horn fly hosts, >30% of these dudded pupae contained adult wasps that failed to eclose. T. nigra successfully parasitized pupae of all host species except house fly and was most successful on stable fly. Significantly more parasitoid progeny emerged from S. bullata (30.6 parasitoids per host) than the other hosts; only 5.7 progeny were produced from horn fly hosts.

  18. Fly ash carbon passivation

    DOEpatents

    La Count, Robert B; Baltrus, John P; Kern, Douglas G

    2013-05-14

    A thermal method to passivate the carbon and/or other components in fly ash significantly decreases adsorption. The passivated carbon remains in the fly ash. Heating the fly ash to about 500 and 800 degrees C. under inert gas conditions sharply decreases the amount of surfactant adsorbed by the fly ash recovered after thermal treatment despite the fact that the carbon content remains in the fly ash. Using oxygen and inert gas mixtures, the present invention shows that a thermal treatment to about 500 degrees C. also sharply decreases the surfactant adsorption of the recovered fly ash even though most of the carbon remains intact. Also, thermal treatment to about 800 degrees C. under these same oxidative conditions shows a sharp decrease in surfactant adsorption of the recovered fly ash due to the fact that the carbon has been removed. This experiment simulates the various "carbon burnout" methods and is not a claim in this method. The present invention provides a thermal method of deactivating high carbon fly ash toward adsorption of AEAs while retaining the fly ash carbon. The fly ash can be used, for example, as a partial Portland cement replacement in air-entrained concrete, in conductive and other concretes, and for other applications.

  19. Larval defense against attack from parasitoid wasps requires nociceptive neurons.

    PubMed

    Robertson, Jessica L; Tsubouchi, Asako; Tracey, W Daniel

    2013-01-01

    Parasitoid wasps are a fierce predator of Drosophila larvae. Female Leptopilina boulardi (LB) wasps use a sharp ovipositor to inject eggs into the bodies of Drosophila melanogaster larvae. The wasp then eats the Drosophila larva alive from the inside, and an adult wasp ecloses from the Drosophila pupal case instead of a fly. However, the Drosophila larvae are not defenseless as they may resist the attack of the wasps through somatosensory-triggered behavioral responses. Here we describe the full range of behaviors performed by the larval prey in immediate response to attacks by the wasps. Our results suggest that Drosophila larvae primarily sense the wasps using their mechanosensory systems. The range of behavioral responses included both "gentle touch" like responses as well as nociceptive responses. We found that the precise larval response depended on both the somatotopic location of the attack, and whether or not the larval cuticle was successfully penetrated during the course of the attack. Interestingly, nociceptive responses are more likely to be triggered by attacks in which the cuticle had been successfully penetrated by the wasp. Finally, we found that the class IV neurons, which are necessary for mechanical nociception, were also necessary for a nociceptive response to wasp attacks. Thus, the class IV neurons allow for a nociceptive behavioral response to a naturally occurring predator of Drosophila.

  20. Heart Attack Symptoms in Women

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack Symptoms in Women Updated:Jan 10,2017 Heart Attack Signs in Women Uncomfortable pressure, squeezing, fullness or ...

  1. An Attack Surface Metric

    DTIC Science & Technology

    2005-07-01

    Introduction Measurement of security, both qualitatively and quantitatively, has been a long standing challenge to the research community , and is of...our approach to related work in Section 2. We introduce the entry point and exit point framework in Section 3. We present the definitions of...ignores the specific system configuration that gave rise to the vulnerability, and it does not capture a system’s future attackability. Our approach

  2. When women attack.

    PubMed

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  3. Federal Response to a Domestic Nuclear Attack (Counterproliferation Papers, Future Warfare Series, Number 46)

    DTIC Science & Technology

    2009-08-01

    a C-21A Learjet squadron at Scott Air Force Base, Illinois, tasked with responsibility for three geographically separated flying units. Federal...background for the four Supreme Court cases. Federal Response to a Domestic Nuclear Attack . . .15 Conditions of Necessity Though General Winfield Scott ...Response to a Domestic Nuclear Attack . . .27 Notes 1. Graham Allison , ―Preface,‖ Confronting the Specter of Nuclear Terrorism, The Annals of the

  4. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  5. Modeling Partial Attacks with Alloy

    NASA Astrophysics Data System (ADS)

    Lin, Amerson; Bond, Mike; Clulow, Jolyon

    The automated and formal analysis of cryptographic primitives, security protocols and Application Programming Interfaces (APIs) up to date has been focused on discovering attacks that completely break the security of a system. However, there are attacks that do not immediately break a system but weaken the security sufficiently for the adversary. We term these attacks partial attacks and present the first methodology for the modeling and automated analysis of this genre of attacks by describing two approaches. The first approach reasons about entropy and was used to simulate and verify an attack on the ECB|ECB|OFB triple-mode DES block-cipher. The second approach reasons about possibility sets and was used to simulate and verify an attack on the personal identification number (PIN) derivation algorithm used in the IBM 4758 Common Cryptographic Architecture.

  6. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  7. DNS Rebinding Attacks

    DTIC Science & Technology

    2009-09-01

    action [From 2] The same origin policy is also called Single Origin or Same Site Policy. It was originally released with Netscape Navigator 2.0 and...success Netscape 8.2.1 Windows XP / SP2 success Opera 9.0.2 Windows 2000 / SP4 success Table 6. Satoh’s attack results using Adobe Flash Player...dns/dns-rebinding.pdf. Retrieved May 2009. [4] D. Dean, E. W. Felten, and D. S. Wallach “Java Security: From HotJava to Netscape and Beyond

  8. How Is a Heart Attack Treated?

    MedlinePlus

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  9. How Is a Heart Attack Diagnosed?

    MedlinePlus

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  10. The Ability of selected Pupal Parasitoids (Hymenoptera: Pteromalidae) to Locate Stable Fly Hosts in a Soiled Equine Bedding Substrate

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Laboratory evaluations assessing the ability of Spalangia cameroni Perkins, Spalangia endius Walker, and Muscidifurax raptorellus Kogan and Legner to locate and attack stable fly hosts in a field-collected fly-breeding substrate suggest that Spalangia spp. are more suited to successfully locate and ...

  11. A Flying Summer Camp

    ERIC Educational Resources Information Center

    Mercurio, Frank X.

    1975-01-01

    Describes a five-day summer camp which provided 12 children, ages 9-14, with a complete flying experience. The training consisted of ground school and one hour actual flying time, including the basics of aircraft control and a flight prepared and executed by the students. (MLH)

  12. Activation of fly ash

    DOEpatents

    Corbin, D.R.; Velenyi, L.J.; Pepera, M.A.; Dolhyj, S.R.

    1986-08-19

    Fly ash is activated by heating a screened magnetic fraction of the ash in a steam atmosphere and then reducing, oxidizing and again reducing the hydrothermally treated fraction. The activated fly ash can be used as a carbon monoxide disproportionating catalyst useful in the production of hydrogen and methane.

  13. Ever Fly a Tetrahedron?

    ERIC Educational Resources Information Center

    King, Kenneth

    2004-01-01

    Few things capture the spirit of spring like flying a kite. Watching a kite dance and sail across a cloud spotted sky is not only a visually appealing experience it also provides a foundation for studies in science and mathematics. Put simply, a kite is an airfoil surface that flies when the forces of lift and thrust are greater than the forces of…

  14. Activation of fly ash

    DOEpatents

    Corbin, David R.; Velenyi, Louis J.; Pepera, Marc A.; Dolhyj, Serge R.

    1986-01-01

    Fly ash is activated by heating a screened magnetic fraction of the ash in a steam atmosphere and then reducing, oxidizing and again reducing the hydrothermally treated fraction. The activated fly ash can be used as a carbon monoxide disproportionating catalyst useful in the production of hydrogen and methane.

  15. Sulfate attack expansion mechanisms

    SciTech Connect

    Müllauer, Wolfram Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  16. Dog pack attack: hunting humans.

    PubMed

    Avis, S P

    1999-09-01

    Dog bite-related fatalities, although unusual, accounted for 304 deaths in the United States between 1979 and 1996 and 6 fatalities in Canada between 1994 and 1996. Fatal dog pack attacks and attacks involving human predation are less common. The following describes a dog pack attack on a family of four involving 2 fatalities with predation of the victims. Factors previously identified that contribute to pack attacks and predation, including prior group hunting, social feeding, territorial defense, lack of human interaction, and prey stimuli, are discussed.

  17. The effect of irradiation and mass rearing on the anti-predator behaviour of the Mexican fruit fly, Anastrepha ludens (Diptera: Tephritidae).

    PubMed

    Rao, D; Aguilar-Argüello, S; Montoya, P; Díaz-Fleischer, F

    2014-04-01

    Fruit flies (Diptera: Tephritidae) are major pests worldwide. The sterile insect technique, where millions of flies are reared, sterilized by irradiation and then released, is one of the most successful and ecologically friendly methods of controlling populations of these pests. The mating behaviour of irradiated and non-irradiated flies has been compared in earlier studies, but there has been little attention paid to the anti-predator behaviour of mass-reared flies, especially with respect to wild flies. Tephritid flies perform a supination display to their jumping spider predators in order to deter attacks. In this study, we evaluated the possibility of using this display to determine the anti-predator capabilities of mass-reared irradiated, non-irradiated flies, and wild flies. We used an arena setup and observed bouts between jumping spiders (Phidippus audax Hentz) and male Mexican fruit flies (Anastrepha ludens Loew). We show that although all flies performed a supination display to their predator, wild flies were more likely to perform a display and were significantly more successful in avoiding attack than mass-reared flies. We suggest that this interaction can be used to develop a rapid realistic method of quality control in evaluating anti-predator abilities of mass-reared fruit flies.

  18. Scenario Graphs and Attack Graphs

    DTIC Science & Technology

    2004-04-14

    46 6.1 Vulnerability Analysis of a Network . . . . . . . . . . . . . . . . . . . . . . . . . 53 6.2 Sandia Red Team Attack Graph...asymptotic bound. The test machine was a 1Ghz Pentium III with 1GB of RAM, running Red Hat Linux 7.3. Figure 4.1(a) plots running time of the implemen...host scanning tools network information vulnerability Attack Graph network Red

  19. Gout attacks and lunar cycle.

    PubMed

    Mikulecký, M; Rovenský, J

    2000-07-01

    The aim was to search for periodical fluctuations in daily occurrence of gout attacks during the synodic lunar cycle. 126 gout attacks were recorded between 1972 and 1994 at known calendar dates. The synodic plexogram, displaying the number of attacks for each day of the cycle, was processed by cosinor regression. A pronounced cycling was found, with highest peaks under the new and full moon (syzygigies). Thus, the maximal occurrence of attacks coincides with the peaking lunisolar tidal effect. Similar relation of attacks to synodic moon was seen in bronchial asthma of children, and a reciprocal one in paroxysmal tachyarrhythmia. Differing pathogenetic backgrounds of these diseases substantiate the observed differences in their putative reactions on the changing cosmogeophysical environment.

  20. Distribution and abundance of natural parasitoid (Hymenoptera: Pteromalidae) populations of house flies and stable flies (Diptera: Muscidae) at the University of Florida Dairy Research Unit.

    PubMed

    Romero, Alvaro; Hogsette, Jerome A; Coronado, Alfredo

    2010-01-01

    From September 2001 through September 2002, house fly and stable fly pupae were collected weekly from three fly habitats at the University of Florida Research dairy in northcentral Florida and evaluated for parasitism. Varying parasitism percentages were observed throughout the study but they were not affected by temperature, precipitation or fly abundance. Of the 6,222 house fly pupae and 1,660 stable fly pupae that produced either a host fly or a parasitoid, 26.9% and 26.7% were parasitized, respectively. Ten parasitoid species were recovered, with the genus Spalangia accounting for 85.7% of the total; the most common parasitoids attacking house fly and stable fly pupae were Spalangia endius Walker (33.9% and 27.3%), S. cameroni Perkins (27.9% and 40.6%), and S. nigroaenea Curtis (21.0% and 24.8%), respectively. Other parasitoids included one specimen of S. erythromera Förster and four specimens of Phygadeuon fumator Gravenhörst (Ichneumonidae). The percentage parasitism of pupae collected from bunker silos was higher than that of pupae from calf pens and open pastures. Spalangia cameroni was consistently recovered through the entire year. Spalangia nigroaenea was predominant in July, August, and September. Spalangia endius was most active from October to May with a peak of relative abundance in January.

  1. Can You Recognize a Heart Attack? Quiz

    MedlinePlus

    ... Heart Attack? Updated:Sep 16,2016 Begin the quiz Heart Attack • Home • About Heart Attacks Acute Coronary ... in Women “Can you recognize a heart attack?” Quiz • Understand Your Risks to Prevent a Heart Attack ...

  2. Initial flight test of a ground deployed system for flying qualities assessment

    NASA Technical Reports Server (NTRS)

    Shafer, Mary F.; Koehler, Ruthard; Wilson, Edward M.; Levy, David R.

    1989-01-01

    In order to provide a safe, repeatable, precise, high-gain flying qualities task a ground deployed system was developed and tested at the NASA Ames Research Center's Dryden Flight Research Facility. This system, the adaptable target lighting array system (ATLAS), is based on the German Aerospace Research Establishment's ground attack test equipment (GRATE). These systems provide a flying-qualities task, emulating the ground-attack task with ground deployed lighted targets. These targets light in an unpredictable sequence and the pilot has to aim the aircraft at whichever target is lighted. Two flight-test programs were used to assess the suitability of ATLAS. The first program used the United States Air Force (USAF) NT-33A variability stability aircraft to establish that ATLAS provided a task suitable for use in flying qualities research. A head-up display (HUD) tracking task was used for comparison. The second program used the X-29A forward-swept wing aircraft to demonstrate that the ATLAS task was suitable for assessing the flying qualities of a specific experimental aircraft. In this program, the ground-attack task was used for comparison. All pilots who used ATLAS found it be highly satisfactory and thought it to be superior to the other tasks used in flying qualities evaluations. It was recommended that ATLAS become a standard for flying qualities evaluations.

  3. X-31 high angle of attack control system performance

    NASA Technical Reports Server (NTRS)

    Huber, Peter; Seamount, Patricia

    1994-01-01

    The design goals for the X-31 flight control system were: (1) level 1 handling qualities during post-stall maneuvering (30 to 70 degrees angle-of-attack); (2) thrust vectoring to enhance performance across the flight envelope; and (3) adequate pitch-down authority at high angle-of-attack. Additional performance goals are discussed. A description of the flight control system is presented, highlighting flight control system features in the pitch and roll axes and X-31 thrust vectoring characteristics. The high angle-of-attack envelope clearance approach will be described, including a brief explanation of analysis techniques and tools. Also, problems encountered during envelope expansion will be discussed. This presentation emphasizes control system solutions to problems encountered in envelope expansion. An essentially 'care free' envelope was cleared for the close-in-combat demonstrator phase. High angle-of-attack flying qualities maneuvers are currently being flown and evaluated. These results are compared with pilot opinions expressed during the close-in-combat program and with results obtained from the F-18 HARV for identical maneuvers. The status and preliminary results of these tests are discussed.

  4. WILD PIG ATTACKS ON HUMANS

    SciTech Connect

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  5. Allergens might trigger migraine attacks.

    PubMed

    Bektas, Hesna; Karabulut, Hayriye; Doganay, Beyza; Acar, Baran

    2017-03-01

    Migraine is a common primary headache disorder. The mechanisms underlying the onset of a migraine attack are not completely understood. Environmental changes and a number of other factors could induce migraine attacks. The aim of this study was to investigate the relationship between the frequency of migraine attacks and allergens. Migraine patients without aura, and healthy individuals similar in age and gender without a history of headache and allergy were prospectively included in the study. The duration of migraine, the frequency of migraine attacks, the medication history, and the symptoms during attacks were questioned. Migraine disability assessment score (MIDAS) and visual analog scale (VAS) scores were obtained. Allergen extracts including dust, fungi, insect, animal epithelium, pollens, and food allergens were applied for allergy tests. 49 migraine patients and 49 healthy individuals were enrolled in the study. There was no significant difference in terms of age and gender. The median migraine disease duration, the number of attacks in a month, and the duration of attacks were, respectively, 5.5 years (1-44), 4 (1-10) day/month, and 24 (4-72) h. The mean MIDAS grade was 2.45 ± 0.14 (1-4), and mean VAS score was 7.89 ± 0.27 (4-10). The positivity of allergy tests was 55.1 % (27/49) in the migraine group and 32.7 % (16/49) in the control group (p < 0.05). The allergy tests were positive for house dust, red birch, hazel tree, olive tree, nettle, and wheat. The frequency of migraine attacks was higher in allergy-test-positive patients than in negative ones in the migraine group (p = 0.001). The migraine patients who had frequent attacks should be examined for allergies.

  6. High Angle of Attack Aerodynamics

    DTIC Science & Technology

    1979-01-01

    HIGH ANGLE OF ATTACK IN A VERY LOW TURBULENCE LEVEL AIR STREAM by B.L.Hunt and P.C.Dexter 17 WIND AND WATER TUNNEL INVESTIGATIONS OF THE INTERACTION OF...FIGURE 1. TYPICAL FIGffTER FOREBODY LENGTHS It baa been convincingly shown in small-scale wind tunnel and water tunnel experiments that the apfro...attack taken during a water tunnel test. jn asymmetric vor~ox pattern io clearly ubewn. LOW ANGLE OF ATTACKC HIGH ANGLE OF ATTACK (SYMMETRIC

  7. Understand Your Risk of Heart Attack

    MedlinePlus

    ... Aneurysm More Understand Your Risks to Prevent a Heart Attack Updated:Sep 16,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  8. Lifestyle Changes for Heart Attack Prevention

    MedlinePlus

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  9. The interpretation of flying qualities requirements for flight control system design

    NASA Technical Reports Server (NTRS)

    Rynaski, E. G.

    1985-01-01

    An experimental flight test program was designed for the Total In Flight Simulator (TIFS) directed toward the interface between flying qualities requirements and flight control system design criteria. The eventual goal is to provide an interpretation or translation of flying qualities requirements for use by the flight control system designer. Specifically, an angle of attack and pitch rate command system matrix involving both short term and long term dynamics are specified for evaluation. Flying qualities criteria and flight control system configuration or architecture can be independent was demonstrated. Finally, additional configurations are proposed to evaluate the efficacy of dynamic decoupling.

  10. Autonomous Flying Controls Testbed

    NASA Technical Reports Server (NTRS)

    Motter, Mark A.

    2005-01-01

    The Flying Controls Testbed (FLiC) is a relatively small and inexpensive unmanned aerial vehicle developed specifically to test highly experimental flight control approaches. The most recent version of the FLiC is configured with 16 independent aileron segments, supports the implementation of C-coded experimental controllers, and is capable of fully autonomous flight from takeoff roll to landing, including flight test maneuvers. The test vehicle is basically a modified Army target drone, AN/FQM-117B, developed as part of a collaboration between the Aviation Applied Technology Directorate (AATD) at Fort Eustis,Virginia and NASA Langley Research Center. Several vehicles have been constructed and collectively have flown over 600 successful test flights.

  11. Genetic attack on neural cryptography

    SciTech Connect

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  12. Joint Direct Attack Munition (JDAM)

    DTIC Science & Technology

    2013-12-01

    2005 FEB 2005 Selective Availability Anti- Spoofing Module (SAASM)/ GPS Anti-Jam Production Award N/A MAR 2005 SEP 2005 MAR 2005 Change Explanations...Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-503 Joint Direct Attack Munition (JDAM) As of FY 2015 President’s Budget...2013 to 00-00-2013 4. TITLE AND SUBTITLE Joint Direct Attack Munition (JDAM) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  13. Pseudacteon decapitating flies (Diptera: Phoridae): Are they potential vectors of the fire ant pathogens Kneallhazia(=Thelohania)solenopsae (Microsporidia: Thelohaniidae)and Vairimorpha invictae (Microsporidia: Burenellidae)?

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Fire ant decapitating flies in the genus Pseudacteon were tested for their potential as hosts or vectors of two microsporidian pathogens of the red imported fire ant, Solenopsis invicta. Decapitating flies which attacked or were reared from S. invicta workers infected by Kneallhazia (=Thelohania)...

  14. Complexity and Fly Swarms

    NASA Astrophysics Data System (ADS)

    Cates, Grant; Murray, Joelle

    Complexity is the study of phenomena that emerge from a collection of interacting objects and arises in many systems throughout physics, biology, finance, economics and more. Certain kinds of complex systems can be described by self-organized criticality (SOC). An SOC system is one that is internally driven towards some critical state. Recent experimental work suggests scaling behavior of fly swarms-one of the hallmarks of an SOC system. Our goal is to look for SOC behavior in computational models of fly swarms.

  15. Duloxetine-related panic attacks.

    PubMed

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-03-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients' trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who responded to duloxetine treatment administered in the initial dose of 30 mg per day with as many as three panic attacks in two days. Upon duloxetine withdrawal, these panic attacks ceased as well. The patient continued tianeptine and alprazolam treatment during which no significant side-effects had been seen, so that she gradually recovered. Some of the available literature sources have suggested the possibility of duloxetine administration to the end of generalised anxiety disorder and panic attack treatment. However, they are outnumbered by the contributions reporting about duloxetine-related anxiety, aggressiveness and panic attacks. In line with the foregoing, further monitoring of each and every duloxetine-administered patient group needs to be pursued so as to be able to evaluate treatment benefits and weigh them against risks of anxiety or panic attack onset.

  16. Economic Impact of Stable Flies

    Technology Transfer Automated Retrieval System (TEKTRAN)

    A dynamic model was created to estimate the economic impact of stable flies on livestock production. Based upon a nationwide average of 10 stable flies per animal for 3 months per year, the model estimates the impact of stable flies to be $543 million to the dairy industry, $1.34 billion to pasture ...

  17. Fly on the Wall

    ERIC Educational Resources Information Center

    Berry, Dave; Korpan, Cynthia

    2009-01-01

    This paper describes the implementation of a peer observation program at the University of Victoria called the Lecture Club. The observers are not interactive during the class--they are the proverbial flies on the wall. The paper identifies the program as self-developmental, discussing the attributes of this learning-to-teach and peer-sharing…

  18. Wisdom from the fly.

    PubMed

    Rieder, Leila E; Larschan, Erica N

    2014-11-01

    Arguably, almost all research in Drosophila can be considered basic research, yet many of the most essential and fundamental concepts of human genetics were first decoded in the fly. Although the fly genome, which is organized into only four chromosomes, is approximately one-twentieth the size of the human genome, it contains roughly the same number of genes, and up to 75% of human disease-related genes have Drosophila homologues [1]. The fly was prized for its simplicity and utility even before such compelling homology with humans was apparent. Since Thomas Hunt Morgan began his seminal experiments over a century ago (Table 1), the Drosophila system has revealed countless key mechanisms by which cells function, including the factors that maintain chromatin and the signaling pathways that control cell fate determination and organism development. More recently, the fly has emerged as a critical neurobiological tool and disease model for a range of genetic disorders. In this review, we present a brief retrospective of Drosophila as an indispensable genetic system and discuss some of the many contributions, past and present, of this facile system to human genetics.

  19. Flying High with Spring.

    ERIC Educational Resources Information Center

    Harrington, Carolyn Lang

    2000-01-01

    Presents an art activity for first grade that uses multicolor scratch paper. Explains that students make scratch-drawings of bird nests, then, as a class, discuss types of birds and bird positions (such as sitting or flying), and finally each creates a bird to add to the nest. (CMK)

  20. Pregnancy and Flying Duties

    DTIC Science & Technology

    1994-08-01

    Division U.S. Army Aeromedical Research Laboratory Joy of new life temperamentally unfit to fly and prone to panic in any calamity." In the 1930s, Amelia ...One of my greatest joys has been Earhart said, "Men do not believe us capable." delivering babies for aircrew members and In 1939, women were barred

  1. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  2. Two new bee-killing flies from Brazil (Insecta: Diptera: Phoridae: Melaloncha)

    PubMed Central

    2016-01-01

    Abstract Background The genus Melaloncha is a large group of species of parasitoid phorid flies that attack Hymenoptera, mostly stingless bees (Meliponinae, Apidae) in the Neotropical Region. New information Two new Brazilian species, Melaloncha (Melaloncha) peacockorum sp. n. and Melaloncha (Udamochiras) nielsi sp. n., are described and their identification clarified. PMID:26929720

  3. Biological control of the Mediterranean fruit fly in Israel: biological parameters of imported parasitoid wasps

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Three braconid species that parasitize the Mediterranean fruit fly (medfly), CERATITIS CAPITATA (Wiedemann) were recently imported into Israel. Several of their key biological parameters were studied. The longevities of the egg-attacking parasitoids FOPIUS ARISANUS and FOPIUS CERATITIVORUS, and t...

  4. Eyespots divert attacks by fish.

    PubMed

    Kjernsmo, Karin; Merilaita, Sami

    2013-09-07

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish' own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments.

  5. Eyespots divert attacks by fish

    PubMed Central

    Kjernsmo, Karin; Merilaita, Sami

    2013-01-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish’ own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments. PMID:23864602

  6. An annotated checklist of the horse flies, deer flies, and yellow flies (Diptera: Tabanidae) of Florida

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The family Tabanidae includes the horse flies, deer flies, and yellow flies and is considered a significant pest of livestock throughout the United States, including Florida. Tabanids can easily become a major pest of man, especially salt marsh species which are known to readily feed on humans and o...

  7. Flight test of the X-29A at high angle of attack: Flight dynamics and controls

    NASA Technical Reports Server (NTRS)

    Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.

    1995-01-01

    The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.

  8. O fly, where art thou?

    PubMed

    Grover, Dhruv; Tower, John; Tavaré, Simon

    2008-10-06

    In this paper, the design of a real-time image acquisition system for tracking the movement of Drosophila in three-dimensional space is presented. The system uses three calibrated and synchronized cameras to detect multiple flies and integrates the detected fly silhouettes to construct the three-dimensional visual hull models of each fly. We used an extended Kalman filter to estimate the state of each fly, given past positions from the reconstructed fly visual hulls. The results show that our approach constructs the three-dimensional visual hull of each fly from the detected image silhouettes and robustly tracks them at real-time rates. The system is suitable for a more detailed analysis of fly behaviour.

  9. Courtship role reversal and deceptive signals in the long-tailed dance fly, Rhamphomyia longicauda.

    PubMed

    Funk; Tallamy

    2000-02-01

    We examined the function of secondary sexual characters in the role-reversed, lekking behaviour of female long-tailed dance flies, Rhamphomyia longicauda Loew (Empididae), to test the hypothesis that the degree of abdominal distention is an honest female signal about the state of egg development. Female Rhamphomyia cannot hunt for prey and they receive all of their protein from males by exchanging copulations for nuptial prey gifts. Females compete for male gifts within leks that are organized for a brief period each evening before dark. Before hovering within leks, females swallow air, inflating expandable pouches on the pleural margins of the abdomen. The result is a large saucer-like abdomen which is further exaggerated by wrapping scaled pro-, meso- and metathoracic legs along its pleural margins. Male preference for an enlarged abdomen was confirmed by suspending plastic models of varying size from monofilament lines and recording which models attracted the most males. There was a positive relationship between egg development and abdominal distention in a related species, R. sociabilis (Williston), which lacks inflatable abdominal pouches. Multiple regression showed that in R. longicauda, abdominal inflation completely masks the state of egg development. We conclude that female R. longicauda deceive mate-seeking males with the unreliable message that eggs are nearing maturation in order to obtain a protein meal in exchange for copulation. Males that fail to identify a female bearing mature eggs risk near-certain cuckoldry and an increased probability that the female will die before oviposition. Copyright 2000 The Association for the Study of Animal Behaviour.

  10. Flies with Parkinson's disease.

    PubMed

    Vanhauwaert, Roeland; Verstreken, Patrik

    2015-12-01

    Parkinson's disease is an incurable neurodegenerative disease. Most cases of the disease are of sporadic origin, but about 10% of the cases are familial. The genes thus far identified in Parkinson's disease are well conserved. Drosophila is ideally suited to study the molecular neuronal cell biology of these genes and the pathogenic mutations in Parkinson's disease. Flies reproduce quickly, and their elaborate genetic tools in combination with their small size allow researchers to analyze identified cells and neurons in large numbers of animals. Furthermore, fruit flies recapitulate many of the cellular and molecular defects also seen in patients, and these defects often result in clear locomotor and behavioral phenotypes, facilitating genetic modifier screens. Hence, Drosophila has played a prominent role in Parkinson's disease research and has provided invaluable insight into the molecular mechanisms of this disease.

  11. Test What You Fly?

    NASA Technical Reports Server (NTRS)

    Margolies, Don

    2002-01-01

    It was the first time on any NASA project I know of that all the instruments on an observatory came off for rework or calibration after the full range of environmental tests, and then were reintegrated at the launch center without the benefit of an observatory environmental retest. Perhaps you've heard the expression, 'Test what you fly, fly what you test'? In theory, it's hard to argue with that. In this case, I was willing to take the risk of not testing what I flew. As the project manager for the Advanced Composition Explorer (ACE) mission, I was the one who ultimately decided what risks to take, just as it was my responsibility to get buy-in from the stakeholders.

  12. Test What You Fly?

    NASA Astrophysics Data System (ADS)

    Margolies, Don

    2002-10-01

    It was the first time on any NASA project I know of that all the instruments on an observatory came off for rework or calibration after the full range of environmental tests, and then were reintegrated at the launch center without the benefit of an observatory environmental retest. Perhaps you've heard the expression, 'Test what you fly, fly what you test'? In theory, it's hard to argue with that. In this case, I was willing to take the risk of not testing what I flew. As the project manager for the Advanced Composition Explorer (ACE) mission, I was the one who ultimately decided what risks to take, just as it was my responsibility to get buy-in from the stakeholders.

  13. Cost Index Flying

    DTIC Science & Technology

    2011-06-01

    continually alter applicable cost indexes . Computed KC-10 Cost Index Equation Using the dollar figures given above, our CI equation reads : CI = CT / C...COST INDEX FLYING GRADUATE RESEARCH PAPER John M. Mirtich, Major, USAF AFIT/IMO/ENS/11-11 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY...AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE: DISTRIBUTION UNLIMITED

  14. Fly-scan ptychography

    DOE PAGES

    Huang, Xiaojing; Lauer, Kenneth; Clark, Jesse N.; ...

    2015-03-13

    We report an experimental ptychography measurement performed in fly-scan mode. With a visible-light laser source, we demonstrate a 5-fold reduction of data acquisition time. By including multiple mutually incoherent modes into the incident illumination, high quality images were successfully reconstructed from blurry diffraction patterns. This approach significantly increases the throughput of ptychography, especially for three-dimensional applications and the visualization of dynamic systems.

  15. Host status of Vaccinium reticulatum (Ericaceae) to invasive tephritid fruit flies in Hawaii.

    PubMed

    Follett, Peter A; Zee, Francis T

    2011-04-01

    Ohelo (Vaccicinium reticulatum Small) (Ericaceae) is a native Hawaiian plant that has commercial potential in Hawaii as a nursery crop to be transplanted for berry production or for sale as a potted ornamental. No-choice infestation studies were conducted to determine whether ohelo fruit are hosts for four invasive tephritid fruit fly species. Ohelo berries were exposed to gravid female flies ofBactrocera dorsalis Hendel (oriental fruit fly), Ceratitis capitata (Wiedemann) (Mediterranean fruit fly), Bactrocera cucurbitae Coquillet (melon fly),or Bactrocera latifrons (Hendel) in screen cages outdoors for 24 h and then held on sand in the laboratory for 2 wk for pupal development and adult emergence. Only B. dorsalis successfully attacked and developed in ohelo berries. In total, 1570 berries produced 10 puparia, all of which emerged as adults, for a fruit infestation rate of 0.0064% and an average of 0.0053 puparia per gram of fruit. By comparison, papaya fruit used as controls produced an average of 1.44 B. dorsalis puparia per g of fruit. Ohelo berry is a marginal host for B. dorsalis and apparently a nonhost for C. capitata, B. cucurbitae, and B. latifrons. Commercial plantings of ohelo will rarely be attacked by fruit flies in Hawaii.

  16. Evaluation of Word Attack Skills.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A framework for more apt and sensitive evaluation of generalized word attack skill--the heart of oral reading skill--is presented. The paper envisions the design and development of oral reading instruction as bounded by a fully-specified evaluation scheme. (Author)

  17. Mitigating Higher Ed Cyber Attacks

    ERIC Educational Resources Information Center

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  18. Army Attack Aviation Shift of Training and Doctrine to Win the War of Tomorrow Effectively

    DTIC Science & Technology

    2009-01-01

    Parameters/96spring/wintoh.htm (accessed December 15, 2008). Zahn, Randy R. Snake Pilot: Flying the Cobra Attack Helicopter in Vietnam. Washinton, DC...that will provide security during all phases of troop air transport. Bell Helicopters gained the contract and developed the AH-1 Cobra for this mission...CCA) The history of the Army conducting close-armed support dates back to the Vietnam War with armed UH-1 Huey and the AH-1 Cobra helicopters

  19. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  20. Pest Control on the "Fly"

    NASA Technical Reports Server (NTRS)

    2002-01-01

    FlyCracker(R), a non-toxic and environmentally safe pesticide, can be used to treat and control fly problems in closed environments such as milking sheds, cattle barns and hutches, equine stables, swine pens, poultry plants, food-packing plants, and even restaurants, as well as in some outdoor animal husbandry environments. The product can be applied safely in the presence of animals and humans, and was recently permitted for use on organic farms as livestock production aids. FlyCracker's carbohydrate technology kills fly larvae within 24 hours. By killing larvae before they reach the adult stages, FlyCracker eradicates another potential breeding population. Because the process is physical-not chemical-flies and other insects never develop resistance to the treatment, giving way to unlimited use of product, while still keeping the same powerful effect.

  1. Crony Attack: Strategic Attack’s Silver Bullet

    DTIC Science & Technology

    2006-11-01

    by distributing a large amount of private goods to the selectorate—the cronies—can be termed kleptocracies . Many govern- ments do indeed resemble...where the high-private goods kleptocracy is a good model. Furthermore, while not an example of crony attack to affect policy change (as opposed to...information about those nearest to the leader. The relationships part is only the start. Kleptocracies , like orga- nized crime leaders, are clever

  2. The effect of asymmetric attack on trim angle of attack

    NASA Technical Reports Server (NTRS)

    Kruse, R. L.

    1983-01-01

    Ballistic range tests were conducted to determine the effect of an asymmetrically ablated heat shield on the trim angle of attack of an entry vehicle. The tests, which were in support of Project Galileo, were conducted in atmospheric air at Mach numbers from 0.7 to 2.0. For the results for the configuration that was tested, the deduced trim angle varied between 13 deg and 21 deg.

  3. Blood feeding behavior of the stable fly

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Stable fly is a fly that looks similar to a house fly but both sexes are blood feeders. Blood is required for successful fertilization and development of eggs. Bites are painful but there is usually no pain after the fly stops feeding. The stable fly is a persistent feeder and will continue trying t...

  4. A study of a three-dimensional self-propelled flying bird with flapping wings

    NASA Astrophysics Data System (ADS)

    Zhu, LinLin; Guan, Hui; Wu, ChuiJie

    2015-09-01

    In this paper, a study of a three-dimensional (3D) self-propelled bionic flying bird in a viscous flow is carried out. This bionic bird is propelled and lifted through flapping and rotating wings, and better flying can be achieved by adjusting the flapping and rotation motion of wings. In this study, we found that the bird can fly faster forward and upward with appropriate center of rotation and oscillation without more energy consumption and have perfect flight performance at a certain angle of attack by adjusting the center of oscillation. The study utilizes a 3D computational fluid dynamics package which constitutes combined immersed boundary method and the volume of fluid method. In addition, it includes adaptive multigrid finite volume method and control strategy of swimming and flying.

  5. Colony-level impacts of parasitoid flies on fire ants.

    PubMed Central

    Mehdiabadi, Natasha J; Gilbert, Lawrence E

    2002-01-01

    The red imported fire ant is becoming a global ecological problem, having invaded the United States, Puerto Rico, New Zealand and, most recently, Australia. In its established areas, this pest is devastating natural biodiversity. Early attempts to halt fire ant expansion with pesticides actually enhanced its spread. Phorid fly parasitoids from South America have now been introduced into the United States as potential biological control agents of the red imported fire ant, but the impact of these flies on fire ant populations is currently unknown. In the laboratory, we show that an average phorid density of as little as one attacking fly per 200 foraging ants decreased colony protein consumption nearly twofold and significantly reduced numbers of large-sized workers 50 days later. The high impact of a single phorid occurred mainly because ants decreased foraging rates in the presence of the flies. Our experiments, the first (to our knowledge) to link indirect and direct effects of phorids on fire ants, demonstrate that colonies can be stressed with surprisingly low parasitoid densities. We interpret our findings with regard to the more complex fire ant-phorid interactions in the field. PMID:12204130

  6. Vision in flying insects.

    PubMed

    Egelhaaf, Martin; Kern, Roland

    2002-12-01

    Vision guides flight behaviour in numerous insects. Despite their small brain, insects easily outperform current man-made autonomous vehicles in many respects. Examples are the virtuosic chasing manoeuvres male flies perform as part of their mating behaviour and the ability of bees to assess, on the basis of visual motion cues, the distance travelled in a novel environment. Analyses at both the behavioural and neuronal levels are beginning to unveil reasons for such extraordinary capabilities of insects. One recipe for their success is the adaptation of visual information processing to the specific requirements of the behavioural tasks and to the specific spatiotemporal properties of the natural input.

  7. Flying wires at Fermilab

    SciTech Connect

    Gannon, J.; Crawford, C.; Finley, D.; Flora, R.; Groves, T.; MacPherson, M.

    1989-03-01

    Transverse beam profile measurement systems called ''Flying Wires'' have been installed and made operational in the Fermilab Main Ring and Tevatron accelerators. These devices are used routinely to measure the emittance of both protons and antiprotons throughout the fill process, and for emittance growth measurements during stores. In the Tevatron, the individual transverse profiles of six proton and six antiproton bunches are obtained simultaneously, with a single pass of the wire through the beam. Essential features of the hardware, software, and system operation are explained in the rest of the paper. 3 refs., 4 figs.

  8. Flying by Titan

    NASA Technical Reports Server (NTRS)

    Pelletier, Frederic J.; Antreasian, Peter G.; Ardalan, Shadan M.; Criddle, Kevin E.; Ionasescu, Rodica; Jacobson, Robert A.; Jones, Jeremy B.; Parcher, Daniel W.; Roth, Duane C.; Thompson, Paul F.; Vaughan, Andrew T.

    2008-01-01

    The Cassini spacecraft encounters the massive Titan about once every month. These encounters are essential to the mission as Titan is the only satellite of Saturn that can provide enough gravity assist to shape the orbit tour and allow outstanding science for many years. From a navigation point of view, these encounters provide many challenges, in particular those that fly close enough to the surface for the atmospheric drag to perturb the orbit. This paper discusses the dynamics models developed to successfully navigate Cassini and determine its trajectory. This includes the moon's gravity pull with its second degree zonal harmonics J2, the attitude thrust control perturbations and the acceleration of drag.

  9. Flying over decades

    NASA Astrophysics Data System (ADS)

    Hoeller, Judith; Issler, Mena; Imamoglu, Atac

    Levy flights haven been extensively used in the past three decades to describe non-Brownian motion of particles. In this presentation I give an overview on how Levy flights have been used across several disciplines, ranging from biology to finance to physics. In our publication we describe how a single electron spin 'flies' when captured in quantum dot using the central spin model. At last I motivate the use of Levy flights for the description of anomalous diffusion in modern experiments, concretely to describe the lifetimes of quasi-particles in Josephson junctions. Finished PhD at ETH in Spring 2015.

  10. Zika Attacks Nerves, Muscles, Other Tissues

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  11. Beware Heart Attack Risk from Shoveling Snow

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_163566.html Beware Heart Attack Risk From Shoveling Snow Canadian study finds cases ... why men are more likely to suffer a heart attack after a heavy snowfall, researchers report. In a ...

  12. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  13. Flying in, Flying out: Offshore Teaching in Higher Education

    ERIC Educational Resources Information Center

    Seah, Wee Tiong; Edwards, Julie

    2006-01-01

    This paper discusses the relatively new phenomenon of university education faculties offering offshore education. The analogy, "flying in, flying out" captures the intensity of such offshore experiences for visiting academics, and contrasts their professional experiences against expatriate academics. This paper reports on case studies of…

  14. Deterioration of hardened cement paste under combined sulphate-chloride attack investigated by synchrotron XRD

    NASA Astrophysics Data System (ADS)

    Stroh, J.; Meng, B.; Emmerling, F.

    2016-06-01

    The exact mechanisms of the phase transitions caused by a combined sulphate-chloride attack are discussed controversially. The main points concern the mutual influences of sulphate and chloride ions during the secondary binding processes of these anions within cement hydrate phases. We simulated combined sulphate-chloride attack under laboratory conditions using solutions containing NaCl and Na2SO4 in different concentrations. Three sample compositions were used for the preparation of the specimens. In two of them, 30% of Portland cement was replaced by supplementary cementitious materials (fly ash, slag). The phase distribution in the samples was determined using synchrotron X-ray diffraction. The analysis with high spatial resolution allows the localisation of the secondary phase formation in the microstructural profile of the sample. A mechanism of the phase developments under combined sulphate-chloride attack is derived.

  15. Network Attack Reference Data Set

    DTIC Science & Technology

    2004-12-01

    services they offer. When the attacker attempts to access system services in order to determine which are available, the scan is called a “ portscan ”. Network...Scans The following portscans were crafted using simPortScan.cc (Appendix B.2). Filename: scan V TCP fast seq small.tcp Source: Crafted...Stealthy Portscans . Journal of Computer Security, 10, 105–136. 6. Yegneswaran, V., Barford, P., and Ullrich, J. (2003). Internet Intrusions: Global

  16. Biomechanics of knife stab attacks.

    PubMed

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  17. Terror attacks influence driving behavior in Israel

    PubMed Central

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  18. Fly ash quality and utilization

    SciTech Connect

    Barta, L.E.; Lachner, L.; Wenzel, G.B.; Beer, M.J.

    1995-12-01

    The quality of fly ash is of considerable importance to fly ash utilizers. The fly ash puzzolanic activity is one of the most important properties that determines the role of fly ash as a binding agent in the cementing process. The puzzolanic activity, however is a function of fly ash particle size and chemical composition. These parameters are closely related to the process of fly ash formation in pulverized coal fired furnaces. In turn, it is essential to understand the transformation of mineral matter during coal combustion. Due to the particle-to-particle variation of coal properties and the random coalescence of mineral particles, the properties of fly ash particles e.g. size, SiO{sub 2} content, viscosity can change considerably from particle to particle. These variations can be described by the use of the probability theory. Since the mean values of these randomly changing parameters are not sufficient to describe the behavior of individual fly ash particles during the formation of concrete, therefore it is necessary to investigate the distribution of these variables. Examples of these variations were examined by the Computer Controlled Scanning Electron Microscopy (CCSEM) for particle size and chemical composition for Texas lignite and Eagel Butte mineral matter and fly ash. The effect of combustion on the variations of these properties for both the fly ash and mineral matter were studied by using a laminar flow reactor. It is shown in our paper, that there are significant variations (about 40-50% around the mean values) of the above-listed properties for both coal samples. By comparing the particle size and chemical composition distributions of the mineral matter and fly ash, it was possible to conclude that for the Texas lignite mineral matter, the combustion did not effect significantly the distribution of these properties, however, for the Eagel Butte coal the combustion had a major impact on these mineral matter parameters.

  19. Flashbulb memories of Paris attacks

    PubMed Central

    El Haj, Mohamad; Gandolphe, Marie-Charlotte; Wawrziczny, Emilie; Antoine, Pascal

    2016-01-01

    Abstract Rationale: Flashbulb memories are detailed and vivid memories of attributes of the reception context of surprising and emotionally arousing public events. Patient concerns and diagnosis: This paper offers a fine-grained view of flashbulb memories in a patient with mild Alzheimer's disease (AD). Interventions: The patient underwent a directed interview about the 13 November 2015 attacks in Paris. Outcomes: Unlike her memory about the date and month of the attacks, the patient provided accurate information about the year, time and places they occurred. The patient also provided accurate information about how she first became aware of the attacks, where she was, with whom, what she was doing, and what time it was when she learned about them. As for the affective characteristics of these memories, she tended to have high ratings of vividness and rehearsal. Negative emotional states and great surprise and novelty were also reported. Lessons: By assessing the impact of flashbulb memories in this patient with AD, this paper offers a unique view into how such memories may trigger a considerable recall of context as well much subjective reliving. PMID:27861395

  20. The Reverse Statistical Disclosure Attack

    NASA Astrophysics Data System (ADS)

    Mallesh, Nayantara; Wright, Matthew

    Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on finding the receivers to whom a given targeted user sends. In this paper, we investigate the effectiveness of statistical disclosure in finding all of a users' contacts, including those from whom she receives messages. To this end, we propose a new attack called the Reverse Statistical Disclosure Attack (RSDA). RSDA uses observations of all users sending patterns to estimate both the targeted user's sending pattern and her receiving pattern. The estimated patterns are combined to find a set of the targeted user's most likely contacts. We study the performance of RSDA in simulation using different mix network configurations and also study the effectiveness of cover traffic as a countermeasure. Our results show that that RSDA outperforms the traditional SDA in finding the user's contacts, particularly as the amounts of user traffic and cover traffic rise.

  1. Flying qualities design criteria applicable to supersonic cruise aircraft

    NASA Technical Reports Server (NTRS)

    Chalk, C. R.

    1980-01-01

    A comprehensive set of flying qualities design criteria was prepared for use in the supersonic cruise research program. The framework for stating the design criteria is established and design criteria are included which address specific failures, approach to dangerous flight conditions, flight at high angle of attack, longitudinal and lateral directional stability and control, the primary flight control system, and secondary flight controls. Examples are given of lateral directional design criteria limiting lateral accelerations at the cockpit, time to roll through 30 deg of bank, and time delay in the pilot's command path. Flight test data from the Concorde certification program are used to substantiate a number of the proposed design criteria.

  2. Review of Existing Wormhole Attack Discovery Techniques

    DTIC Science & Technology

    2006-08-01

    Review of Existing Wormhole Attack Discovery Techniques Maria Alexandrovna Gorlatova The scientific or...DATES COVERED - 4. TITLE AND SUBTITLE Review of Existing Wormhole Attack Discovery Techniques 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Review of Existing Wormhole Attack

  3. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  4. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  5. Physics of flying

    NASA Astrophysics Data System (ADS)

    Vetrone, Jim

    2015-05-01

    Column editor's note: As the school year comes to a close, it is important to start thinking about next year. One area that you want to consider is field trips. Many institutions require that teachers plan for a field trip well in advance. Keeping that in mind, I asked Jim Vetrone to write an article about the fantastic field trip he takes his AP Physics students on. I had the awesome opportunity to attend a professional development day that Jim arranged at iFLY in the Chicago suburbs. The experience of "flying" in a wind tunnel was fabulous. Equally fun was watching the other physics teachers come up with experiments to have the professional "flyers" perform in the tube. I could envision my students being similarly excited about the experience and about the development of their own experiments. After I returned to school, I immediately began the process of trying to get this field trip approved for the 2015-16 school year. I suggest that you start your process as well if you hope to try a new field trip next year. The key to getting the approval, in my experience, is submitting a proposal early that includes supporting documentation from sources. Often I use NGSS or state standards as justifications for my field trips. I have also quoted College Board expectations for AP Physics 1 and 2 in my documents when requesting an unusual field trip.

  6. The Flying University

    NASA Astrophysics Data System (ADS)

    Friesen, Catherine

    The Flying University is solo theater performance framed as an academic lecture about Marie Curie and her discovery of radium, delivered to a group of women who have gathered in secret to further their education. As the lecture proceeds, the professor brings in her own research based on a study of Esther Horsch (1905-1991) who lived on a farm in central Illinois. She introduces data from Esther's journals, personal memories, and dreams about Esther's life. The professor's investigation of radium plays at the intersections of magical and mundane, decay and the transformation of life, and the place of ambition in these two women's lives. The intention of this piece is to explore these themes, which are full of mystery, through the traces of the daily lives of Mme. Curie and Esther. Their words and photos are used as roots from which to imagine the things that echo beyond their familiar work; elemental and also fantastically radiant. The Flying University was written and performed by Catherine Friesen April 27-29, 2012 in the Center for Performance Experiment at Hamilton College as part of the University of South Carolina MFA Acting Class of 2013 showcase, Pieces of Eight.

  7. Why flies are good vectors

    Technology Transfer Automated Retrieval System (TEKTRAN)

    It was around 1900 when house flies were implicated in disease transmission. Flies with white powder on their feet were seen landing on food in US Army chow halls. This white powder was lime that had been sprinkled over the human excrement in open latrines not too far from the eating establishments....

  8. Passive Baited Sequential Fly Trap

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Sampling fly populations associated with human populations is needed to understand diel behavior and to monitor population densities before and after control operations. Population control measures are dependent on the results of monitoring efforts as they may provide insight into the fly behavior ...

  9. Biology and control of tabanids, stable flies and horn flies.

    PubMed

    Foil, L D; Hogsette, J A

    1994-12-01

    Tabanids are among the most free-living adult flies which play a role as livestock pests. A single blood meal is used as a source of energy for egg production (100-1,000 eggs per meal), and females of certain species can oviposit before a blood meal is obtained (autogeny). Therefore, the maintenance of annual populations requires successful oviposition by only 2% of females. Wild animal blood sources are usually available to maintain annual tabanid populations. Larval habitats are also independent of domestic livestock. Thus, the use of repellents or partial repellents is the only effective chemical strategy to reduce the incidence of tabanids on livestock. Permanent traps (and possibly treated silhouette traps) can be employed to intercept flies. Selective grazing or confinement can also reduce the impact of tabanids. Stable fly adults are dependent on vertebrate blood for survival and reproduction, but the amount of time spent in contact with the host is relatively small. Stable fly larvae develop in manure, spilled feed and decaying vegetation. Management of larval habitats by sanitation is the key to stable fly control. Treatment of animals with residual insecticides can aid in control; thorough application to the lower body parts of livestock is important. Proper use of modified traps, using either treated targets or solar-powered electrocution grids, can be effective in reducing stable fly populations. Adult horn flies spend the major part of their time on the host, and the larvae are confined to bovid manure. Therefore, almost any form of topical insecticide application for livestock is effective against horn flies, in the absence of insecticide resistance. Treatments should be applied when economic benefit is possible; economic gains are associated with increased weaning weights and weight gains of yearling and growing cattle. Oral chemical treatments (insect growth regulators or insecticides) administered at appropriate rates via bolus, water, food or

  10. Using fly ash for construction

    SciTech Connect

    Valenti, M.

    1995-05-01

    Each year electrical utilities generate 80 million tons of fly ash, primarily from coal combustion. Typically, utilities dispose of fly ash by hauling it to landfills, but that is changing because of the increasing cost of landfilling, as well as environmental regulations. Now, the Electric Power Research Institute (EPRI), in Palo Alto, Calif., its member utilities, and manufacturers of building materials are finding ways of turning this energy byproduct into the building blocks of roads and structures by converting fly ash into construction materials. Some of these materials include concrete and autoclaved cellular concrete (ACC, also known as aerated concrete), flowable fill, and light-weight aggregate. EPRI is also exploring uses for fly ash other than in construction materials. One of the more high-end uses for the material is in metal matrix composites. In this application, fly ash is mixed with softer metals, such as aluminum and magnesium, to strengthen them, while retaining their lighter weight.

  11. Effect of Mutual Interference on the Ability of Spalangia cameroni (Hymenoptera: Pteromalidae) to Attack and Parasitize Pupae of Stomoxys calcitrans (Diptera: Muscidae).

    PubMed

    Skovgård, H; Nachman, G

    2015-08-01

    We investigated the effect of mutual interference on the attack efficiency and the rate of successful parasitism on the parasitoid Spalangia cameroni (Perkins) attacking pupae of the stable fly Stomoxys calcitrans (L.). Female parasitoids (2, 4, 8, 16, or 32) were exposed to 100 fly pupae during 24 h. The number of pupae that were attacked and the number successfully parasitized increased with the parasitoid density and reached a maximum of ∼70 and 50, respectively. Parasitoid-induced mortality (PIM) was about 20 pupae, irrespective of parasitoid density. The per capita rates of attack, successful parasitism and parasitoid-induced mortality declined monotonously with parasitoid density. Progeny sex ratio was female biased for all parasitoid densities, but declined significantly with increasing parasitoid density from ∼70% females at the lowest density to ∼60% at the highest. Mutual interference was incorporated into a functional response model to predict the attack rate and the rate of successful parasitism at different temperatures, host densities and parasitoid densities. The model explained 93.5% of the variation in the observed number of attacked pupae and 91.5% of the variation in the number of successfully parasitized pupae. The model predicts that increasing parasitoid densities will increase the percentage of killed hosts, but only up to a certain density. Above this density, a further increase in parasitoid abundance will actually lead to a decline in the percentage parasitism. These findings may have some implications for using S. cameroni in biological control against flies using inundative releases.

  12. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  13. Joint Direct Attack Munition (JDAM)

    DTIC Science & Technology

    2015-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-503 Joint Direct Attack Munition (JDAM) As of FY 2017 President’s Budget Defense Acquisition...RDT&E - Research, Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then Year...N/A Feb 2005 Feb 2005 Feb 2005 Selective Availability Anti-Spoofing Module (SAASM)/GPS Anti-Jam Production Award N/A Mar 2005 Mar 2005 Mar 2005

  14. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    MedlinePlus

    ... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...

  15. What Are the Symptoms of a Heart Attack?

    MedlinePlus

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  16. Coronary Artery Dissection: Not Just a Heart Attack

    MedlinePlus

    ... Aneurysm More Coronary Artery Dissection: Not Just a Heart Attack Updated:Oct 4,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  17. The ability of selected pupal parasitoids (Hymenoptera: Pteromalidae) to locate stable fly hosts in a soiled equine bedding substrate.

    PubMed

    Pitzer, Jimmy B; Kaufman, Phillip E; Geden, Christopher J; Hogsette, Jerome A

    2011-02-01

    The ability of Spalangia cameroni Perkins, Spalangia endius Walker, and Muscidifurax raptorellus Kogan and Legner to locate and attack stable fly hosts was evaluated under laboratory conditions. Postfeeding third-instar stable fly larvae were released and allowed to pupate in two arena types: large 4.8 liter chambers containing a field-collected, soiled equine bedding substrate; or 120-ml plastic cups containing wood chips. At the time of fly pupariation, parasitoids were released and permitted 72 h to locate and attack hosts. On average, parasitism rates of freely accessible stable fly pupae in cups were not significantly different between parasitoid species. However, parasitism rates in chambers containing either Spalangia spp. were ≈50-fold more than M. raptorellus. Additional intraspecies analysis revealed that parasitism rates both by S. cameroni and S. endius were not significantly different when pupae were freely accessible or within bedding, whereas M. raptorellus attacked significantly more pupae in cups than in the larger chambers where hosts were distributed within bedding. These results suggest that Spalangia spp. are more suited to successfully locate and attack hosts in habitats created by equine husbandry in Florida. Therefore, commercially available parasitoid mixtures containing Muscidifurax spp. may be ineffective if used as a control measure at Florida equine facilities.

  18. Establishment of the west indian fruit fly (Diptera: Tephritidae) parasitoid Doryctobracon areolatus (Hymenoptera: Braconidae)in the Dominican Republic

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The West Indian fruit fly, Anastrepha obliqua (Macquart), infests numerous fruit species, particularly Anacardiaceae and most importantly mango (Mangifera indica L.). Widespread in the Neotropics, it was first reported in Hispaniola nearly 70 years ago. Continental populations are attacked by the op...

  19. Spiroplasma Bacteria Enhance Survival of Drosophila hydei Attacked by the Parasitic Wasp Leptopilina heterotoma

    PubMed Central

    Xie, Jialei; Vilchez, Igor; Mateos, Mariana

    2010-01-01

    Background Maternally-transmitted associations between endosymbiotic bacteria and insects are ubiquitous. While many of these associations are obligate and mutually beneficial, many are facultative, and the mechanism(s) by which these microbes persist in their host lineages remain elusive. Inherited microbes with imperfect transmission are expected to be lost from their host lineages if no other mechanisms increase their persistence (i.e., host reproductive manipulation and/or fitness benefits to host). Indeed numerous facultative heritable endosymbionts are reproductive manipulators. Nevertheless, many do not manipulate reproduction, so they are expected to confer fitness benefits to their hosts, as has been shown in several studies that report defense against natural enemies, tolerance to environmental stress, and increased fecundity. Methodology/Principal Findings We examined whether larval to adult survival of Drosophila hydei against attack by a common parasitoid wasp (Leptopilina heterotoma), differed between uninfected flies and flies that were artificially infected with Spiroplasma, a heritable endosymbiont of Drosophila hydei that does not appear to manipulate host reproduction. Survival was significantly greater for Spiroplasma-infected flies, and the effect of Spiroplasma infection was most evident during the host's pupal stage. We examined whether or not increased survival of Spiroplasma-infected flies was due to reduced oviposition by the wasp (i.e., pre-oviposition mechanism). The number of wasp eggs per fly larva did not differ significantly between Spiroplasma-free and Spiroplasma-infected fly larvae, suggesting that differential fly survival is due to a post-oviposition mechanism. Conclusions/Significance Our results suggest that Spiroplasma confers protection to D. hydei against wasp parasitism. This is to our knowledge the first report of a potential defensive mutualism in the genus Spiroplasma. Whether it explains the persistence and high

  20. Migraine attacks the Basal Ganglia

    PubMed Central

    2011-01-01

    Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human) brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF) to a matched (gender, age, age of onset and type of medication) group of patients whose migraine episodes progressed (HF). Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine. PMID:21936901

  1. Shoulder injuries from attacking motion

    NASA Astrophysics Data System (ADS)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  2. Phosphate-Bonded Fly Ash.

    DTIC Science & Technology

    1994-12-09

    FCODE OC ______________ ARLINGTON VA 22217-5660 - dis~bu~i.19~ 3 B Navy Case No. 75,787 PATENTS PHOSPHATE -BONDED FLY ASH IN’NA G. TALMY DEBORAH A. HAUGHT...2 3 , CaO. MgO, etc. with which the H.PO4 reacts to form the polymer-like phosphate bonds which hold the fly ash particles together. In the second...conventional means. The moisture (water) content of the aqueous HP0 4 /fly ash mixture is preferably from about 3 to about 5 weight percent for semidry

  3. Flying qualities criteria for superaugmented aircraft

    NASA Technical Reports Server (NTRS)

    Berry, D. T.

    1984-01-01

    An overview of Dryden superaugmented aircraft flying qualities research is presented. This includes F-8 digital fly by wire flight experiments, orbiter flying qualities, shuttle improvements, AFTI/F-16, flying qualities and control system alternatives, Vertical Motion Simulator Shuttle evaluation and Total in Flight Simulator pitch rate criteria.

  4. Subtropical Fruit Fly Invasions into Temperate Fruit Fly Territory in California's San Joaquin Valley

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Subtropical fruit fly species including peach fruit fly, Bactrocera zonata (Saunders); melon fly, B. cucurbitae (Coquillett); oriental fruit fly, B. dorsalis (Hendel); and Mediterranean fruit fly, Ceratitis capitata Weidemann, have been detected in the past decade in the San Joaquin Valley of Califo...

  5. High angle of attack control law development for a free-flight wind tunnel model using direct eigenstructure assignment

    NASA Technical Reports Server (NTRS)

    Wendel, Thomas R.; Boland, Joseph R.; Hahne, David E.

    1991-01-01

    Flight-control laws are developed for a wind-tunnel aircraft model flying at a high angle of attack by using a synthesis technique called direct eigenstructure assignment. The method employs flight guidelines and control-power constraints to develop the control laws, and gain schedules and nonlinear feedback compensation provide a framework for considering the nonlinear nature of the attack angle. Linear and nonlinear evaluations show that the control laws are effective, a conclusion that is further confirmed by a scale model used for free-flight testing.

  6. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  7. Managing the Fruit Fly Experiment.

    ERIC Educational Resources Information Center

    Jeszenszky, Arleen W.

    1997-01-01

    Describes a sophisticated version of the fruit fly experiment for teaching concepts about genetics to biology students. Provides students with the opportunity to work with live animals over an extended period. (JRH)

  8. Studies of Phlebotomine Sand Flies.

    DTIC Science & Technology

    1980-08-31

    submitted for publication. iii 7. Key Words: Sand fly Lutzomyia Phlebotominae Phlebotomus Leishmaniasis 1i Note: Copies of this report are filed with...5 II. Sand Flies of the Central Amazon of Brazil. 2. De- scription of Lutzomyia (Triehophoromyia) ruii n. sp. . 28 III. A New Phlebotomine Sand...previously unknown in the Republic. These are Brvmptomyia hamata, B. galindoi, Lutzomyia odax, L. ovallesi, L. carpenteri, L. shannoni, L. texana, L

  9. Cement composition and sulfate attack

    SciTech Connect

    Shanahan, Natalya; Zayed, Abla . E-mail: zayed@eng.usf.edu

    2007-04-15

    Four cements were used to address the effect of tricalcium silicate content of cement on external sulfate attack in sodium sulfate solution. The selected cements had similar fineness and Bogue-calculated tricalcium aluminate content but variable tricalcium silicates. Durability was assessed using linear expansion and compressive strength. Phases associated with deterioration were examined using scanning electron microscopy and X-ray diffraction. Mineralogical phase content of the as-received cements was studied by X-ray diffraction using two methods: internal standard and Rietveld analysis. The results indicate that phase content of cements determined by X-ray mineralogical analysis correlates better with the mortar performance in sulfate environment than Bogue content. Additionally, it was found that in cements containing triclacium aluminate only in the cubic form, the observed deterioration is affected by tricalcium silicate content. Morphological similarities between hydration products of high tricalcium aluminate and high tricalcium silicate cements exposed to sodium sulfate environment were also observed.

  10. Detecting Denial of Service Attacks in Tor

    NASA Astrophysics Data System (ADS)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  11. Cougar attacks on humans: a case report.

    PubMed

    McKee, Denise

    2003-01-01

    Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.

  12. Trophic interactions between parasitoids and necrophagous flies in Central Argentina.

    PubMed

    Sereno, Ana P; Salvo, Adriana; Battán-Horenstein, Moira

    2016-10-01

    Larvae of necrophagous flies in the families Calliphoridae, Sarcophagidae and Muscidae are the main exploiters of decaying organic matter. Knowledge of insect species associated with each stage of decay can be used to estimate the time since death in the crime scene. Dipteran larvae are attacked by a rich community of parasitoids, including species of Braconidae, Ichneumonidae and Pteromalidae (Hymenoptera: Parasitica). This study examined the parasitic complex associated with flies of forensic and sanitary importance in the city of Córdoba (Argentina). Sampling was conducted at two sites with different urbanization levels from December 2012 to March 2013; parasitoids were collected using fly traps baited with beef liver. Rates of parasitism and of parasitized pupae were estimated and species composition was analyzed for both communities. Sarcophagidae was the most abundant family, represented by two species, followed by Calliphoridae. Nasonia vitripennis Ashmead (Hymenoptera) was the most abundant species and was collected from a wider variety of hosts. To the best of our knowledge, this is the first study providing accurate information about trophic interactions between calyptrate dipteran species and their hymenopteran parasitoids in central Argentina.

  13. Effect of Metarhizium anisopliae on the Fertility and Fecundity of Two Species of Fruit Flies and Horizontal Transmission of Mycotic Infection

    PubMed Central

    Sookar, P.; Bhagwant, S.; Allymamod, M.N.

    2014-01-01

    In Mauritius, the peach fruit fly, Bactrocera zonata Saunders (Diptera: Tephritidae), and the melon fly, Bactrocera cucurbitae (Coquillett), are the major pest of fruits and vegetables, respectively. Fruit growers make use of broad-spectrum insecticides to protect their crops from fruit fly attack. This method of fruit fly control is hazardous to the environment and is a threat to beneficial insects. The entomopathogenic fungus, Metarhizium anisopliae (Metchnikoff) Sorokin (Hypocreales: Clavicipitaceae), which was isolated from the soils of Mauritius, was used to investigate whether fungus-treated adult fruit flies could transfer conidia to non-treated flies during mating, and whether fungal infection could have an effect on mating behavior, fecundity, and fertility of the two female fruit fly species. When treated male flies were maintained together with non-treated female flies, they were able to transmit infection to untreated females, resulting in high mortalities. Similarly, fungus-infected female flies mixed with untreated males also transmitted infections to males, also resulting in high mortalities. Infection by M. anisopliae also resulted in the reduction of the number of eggs produced by females of B. cucurbitae. The results suggest that M. anisopliae may have potential for use in integrated control programs of B. zonata and B. cucurbitae using the sterile insect technique in Mauritius. PMID:25201230

  14. Pilot interface with fly by wire control systems

    NASA Technical Reports Server (NTRS)

    Melvin, W. W.

    1986-01-01

    Aircraft designers are rapidly moving toward full fly by wire control systems for transport aircraft. Aside from pilot interface considerations such as location of the control input device and its basic design such as side stick, there appears to be a desire to change the fundamental way in which a pilot applies manual control. A typical design would have the lowest order of manual control be a control wheel steering mode in which the pilot is controlling an autopilot. This deprives the pilot of the tactile sense of angle of attack which is inherent in present aircraft by virtue of certification requirements for static longitudinal stability whereby a pilot must either force the aircraft away from its trim angle of attack or trim to a new angle of attack. Whether or not an aircraft actually has positive stability, it can be made to feel to a pilot as though it does by artificial feel. Artificial feel systems which interpret pilot input as pitch rate or G rate with automatic trim have proven useful in certain military combat maneuvers, but their transposition to other more normal types of manual control may not be justified.

  15. Aerodynamic performances of cruise missile flying above local terrain

    NASA Astrophysics Data System (ADS)

    Ahmad, A.; Saad, M. R.; Che Idris, A.; Rahman, M. R. A.; Sujipto, S.

    2016-10-01

    Cruise missile can be classified as a smart bomb and also Unmanned Aerial Vehicle (UAV) due to its ability to move and manoeuvre by itself without a pilot. Cruise missile flies in constant velocity in cruising stage. Malaysia is one of the consumers of cruise missiles that are imported from other nations, which can have distinct geographic factors including their local terrains compared to Malaysia. Some of the aerodynamic performances of missile such as drag and lift coefficients can be affected by the local geographic conditions in Malaysia, which is different from the origin nation. Therefore, a detailed study must be done to get aerodynamic performance of cruise missiles that operate in Malaysia. The effect of aerodynamic angles such as angle of attack and side slip can be used to investigate the aerodynamic performances of cruise missile. Hence, subsonic wind tunnel testings were conducted to obtain the aerodynamic performances of the missile at various angle of attack and sideslip angles. Smoke visualization was also performed to visualize the behaviour of flow separation. The optimum angle of attack found was at α=21° and side slip, β=10° for optimum pitching and yawing motion of cruise missile.

  16. British used Congreve Rockets to Attack Napoleon

    NASA Technical Reports Server (NTRS)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  17. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting...

  18. Preventive attack in the 1990s

    SciTech Connect

    Prebeck, S.R.

    1993-05-28

    The decline of the Soviet Union upset the world`s balance of power and opened the door to third world proliferation since the superpowers no longer have tight control over their client-states. This increase in proliferation raised the issue of how the United States (US) should respond to a third world nation that is acquiring nuclear weapons. Should the United States depend on preventive attacks to stop the proliferation of nuclear weapons. This is not a new issue. Proliferation and preventive war have both been issues since the end of World War II. The United States considered a preventive attack against the Soviet Union in the postwar years. The Soviet Union considered preventive attacks against the People`s Republic of China in 1969. Israel conducted a preventive attack in 1981 against the Osiraq nuclear reactor in Iraq. Preventive attacks are politically untenable and are not militarily possible. Without perfect political conditions, it is unacceptable for the only remaining superpower to attack a second-rate power. It is militarily impossible for the United States to guarantee the removal of all nuclear weapons in a single preventive attack. This study concludes that the United States should not depend on preventive attacks to stop proliferation of nuclear weapons.

  19. The cost of attack in competing networks.

    PubMed

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-06

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities.

  20. The cost of attack in competing networks

    PubMed Central

    Podobnik, B.

    2015-01-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator–prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  1. Fly on the Wall

    NASA Technical Reports Server (NTRS)

    Mulenburg, Gerald

    2003-01-01

    The email was addressed not only to me, but also to all the Project Knowledge Sharing Community at Ames Research Center. We were invited to sit in on a major project review as a new experiment in knowledge sharing. This first-of-its-kind opportunity had been conceived by Claire Smith, who leads the knowledge sharing program, as well as heading up the Center's Project Leadership Development Program and serving as coordinator of the APPL-West program at Ames. The objective was to offer Ames project practitioners the opportunity to observe project-review processes as they happen. Not that I haven't participated in my share of project reviews, but this seemed like a great way for me to get up-to-date about a new project, the Kepler mission, and to experience a review from a new perspective. Typically, when you're being reviewed, it's difficult to see what's happening objectively-the same way it is on a project. Presenters are always thinking, 'Okay, what's on my slides? How much time do I have left? What are they going to ask me?' So when Claire's email pinged on my computer, I quickly responded by asking her to save a place for me. It was to be an informational review about progress on the project: what the team had done, where they were going, and what they needed to do to get there. There were people on the project team from all over the United States, and it was the first time for them to get together from all aspects of the project. For our part, as observers, we were asked to abide by a couple of rules: Don't ask any questions. and don't talk about the specifics of what we saw or heard. The idea was that we weren't supposed to be noticed. We weren't to buzz around and bother people. Hence the name for this experinient: Fly on the Wall.

  2. XMM flying beautifully

    NASA Astrophysics Data System (ADS)

    1999-12-01

    The early orbit phase came to an end on 16 December after XMM had been manoeuvred to its final orbit. This required four firings of its thrusters, on successive passages at apogee, in order to increase XMM's velocity, thus elongating its orbit and raising the perigee from 826 km to 7,365 km. One burn was then made to fine tune the apogee to around 114,000km. The spacecraft, being tracked by ground stations in Perth, Kourou and Villafranca, is now circling the Earth in this highly elliptical orbit once every 48 hours. The XMM flight operations staff have found themselves controlling a spacecraft that responds exceptionally well. During these first orbits, the satellite has been oriented several times with razor-sharp precision. On board systems have responded without incident to several thousand instructions sent by controllers. "XMM is flying so beautifully" says Dietmar Heger, XMM Spacecraft Operations Manager. "The satellite is behaving better in space than all our pre-launch simulations and we have been able to adjust our shifts to this more relaxed situation". On his return from French Guiana, Robert Lainé, XMM Project Manager immediately visited the Darmstadt Mission Control Centre, at ESOC. "The perfect behaviour of XMM at this early stage reflects the constructive cooperation of European industrial companies and top scientists. Spacecraft operations are in the hands of professionals who will endeavour to fulfill the expectations of the astronomers and astrophysicists of the world. I am very happy that ESA could provide them with such a wonderful precision tool". During the early orbit phase, controllers have activated part of XMM's science payload. The three EPIC X-ray cameras have been switched on and vented. On 17 December the telescope doors were opened allowing the spacecraft's golden X-ray Multi Mirror modules to see the sky. The Optical Monitor telescope door was opened on 18 December. During this last weekend, XMM's Radiation Monitor which records

  3. Fiber optics that fly

    NASA Astrophysics Data System (ADS)

    Wilcox, Michael J.; Thelen, Donald C., Jr.

    1996-11-01

    The need for autonomous systems to work under unanticipated conditions requires the use of smart sensors. High resolution systems develop tremendous computational loads. Inspiration from animal vision systems can guide us in developing preprocessing approaches implementable in real time with high resolution and deduced computational load. Given a high quality optical path and a 2D array of photodetectors, the resolution of a digital image is determined by the density of photodetectors sampling the image. In order to reconstruct an image, resolution is limited by the distance between adjacent detectors. However, animal eyes resolve images 10-100 times better than either the acceptance angle of a single photodetector or the center-to-center distance between neighboring photodetectors. A new model of the fly's visual system emulates this improved performance, offering a different approach to subpixel resolution. That an animal without a cortex is capable of this performance suggests that high level computation is not involved. The model takes advantage of a photoreceptor cell's internal structure for capturing light. This organelle is a waveguide. Neurocircuitry exploits the waveguide's optical nonlinearities, namely in the shoulder region of its gaussian sensitivity-profile, to extract high resolution information from the visual scene. The receptive fields of optically disparate inputs overlap in space. Photoreceptor input is continuous rather than discretely sampled. The output of the integrating module is a signal proportional to the position of the target within the detector array. For tracking a point source, resolution is 10 times better than the detector spacing. For locating absolute position and orientation of an edge, the model performs similarly. Analog processing is used throughout. Each element is an independent processor of local luminance. Information processing is in real time with continuous update. This processing principle will be reproduced in an

  4. Fundamentals and Methods of High Angle-of-Attack Flying Qualities Research

    DTIC Science & Technology

    1988-01-01

    the a-, versus oxt criterion orginally developed by Jenny of McDonnell Aircraft Company (McAir) (1971) (see Reference (115) and (2)). The more recent...equations of motion. Other forms of this criteron are also found in the literature such as the a-, versus "b der ,rture criterion ( Jenny ). The C, R criterion...Dynamics." Journal of the Aeronautical Sciences, Vol. 21, No. 11, November 1954, pp. 749-762. 122. Johnston, D.E. and Hogge , J.R., "The Effects of Non

  5. Attack of the flying snakes: formation of isolated H I clouds by fragmentation of long streams

    NASA Astrophysics Data System (ADS)

    Taylor, R.; Davies, J. I.; Jáchym, P.; Keenan, O.; Minchin, R. F.; Palouš, J.; Smith, R.; Wünsch, R.

    2016-09-01

    The existence of long (>100 kpc) H I streams and small (<20 kpc) free-floating H I clouds is well known. While the formation of the streams has been investigated extensively, and the isolated clouds are often purported to be interaction debris, little research has been done on the formation of optically dark H I clouds that are not part of a larger stream. One possibility is that such features result from the fragmentation of more extended streams, while another idea is that they are primordial, optically dark galaxies. We test the validity of the fragmentation scenario (via harassment) using numerical simulations. In order to compare our numerical models with observations, we present catalogues of both the known long H I streams (42 objects) and free-floating H I clouds suggested as dark galaxy candidates (51 objects). In particular, we investigate whether it is possible to form compact features with high velocity widths (>100 km s-1), similar to observed clouds which are otherwise intriguing dark galaxy candidates. We find that producing such features is possible but extremely unlikely, occurring no more than 0.2% of the time in our simulations. In contrast, we find that genuine dark galaxies could be extremely stable to harassment and remain detectable even after 5 Gyr in the cluster environment (with the important caveat that our simulations only explore harassment and do not yet include the intracluster medium, heating and cooling, or star formation). We also discuss the possibility that such objects could be the progenitors of recently discovered ultra diffuse galaxies.

  6. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  7. Advanced fighter technology integration (AFTI)/F-16 Automated Maneuvering Attack System final flight test results

    NASA Technical Reports Server (NTRS)

    Dowden, Donald J.; Bessette, Denis E.

    1987-01-01

    The AFTI F-16 Automated Maneuvering Attack System has undergone developmental and demonstration flight testing over a total of 347.3 flying hours in 237 sorties. The emphasis of this phase of the flight test program was on the development of automated guidance and control systems for air-to-air and air-to-ground weapons delivery, using a digital flight control system, dual avionics multiplex buses, an advanced FLIR sensor with laser ranger, integrated flight/fire-control software, advanced cockpit display and controls, and modified core Multinational Stage Improvement Program avionics.

  8. Robust, nonlinear, high angle-of-attack control design for a supermaneuverable vehicle

    NASA Technical Reports Server (NTRS)

    Adams, Richard J.

    1993-01-01

    High angle-of-attack flight control laws are developed for a supermaneuverable fighter aircraft. The methods of dynamic inversion and structured singular value synthesis are combined into an approach which addresses both the nonlinearity and robustness problems of flight at extreme operating conditions. The primary purpose of the dynamic inversion control elements is to linearize the vehicle response across the flight envelope. Structured singular value synthesis is used to design a dynamic controller which provides robust tracking to pilot commands. The resulting control system achieves desired flying qualities and guarantees a large margin of robustness to uncertainties for high angle-of-attack flight conditions. The results of linear simulation and structured singular value stability analysis are presented to demonstrate satisfaction of the design criteria. High fidelity nonlinear simulation results show that the combined dynamics inversion/structured singular value synthesis control law achieves a high level of performance in a realistic environment.

  9. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  10. Tsetse flies and their control.

    PubMed

    Rogers, D J; Hendrickx, G; Slingenbergh, J H

    1994-12-01

    The authors use a quantitative modelling framework to describe and explore the features of the biology of tsetse flies (Glossina spp.) which are important in determining the rate of transmission of the African trypanosomiases between hosts. Examples are presented of the contribution of previous research on tsetse to quantified epidemiological and epizootiological understanding, and areas of current ignorance are identified for future study. Spatial and temporal variations in risk are important (but rarely-studied) determinants of the impact of trypanosomiasis on humans, domestic animals and agricultural activities. Recent grid-based sampling surveys to Togo provide valuable data sets on tsetse, cattle and trypanosomiasis throughout the country. A combination of ground-based meterological and remotely-sensed satellite data, within linear discriminant analytical models, enables description of the observed distributions of the five species of tsetse occurring in Togo, with accuracies of between 72% (Glossina palpalis and G. tachinoides) and 98% (G. fusca). Abundance classes of the two most widespread species, G. palpalis and G. tachinoides, are described with accuracies of between 47% and 83%. This is especially remarkable given the relatively small differences between the average values of the predictor variables in areas of differing fly abundance. Similar analyses could be used to predict the occurrence and abundance of flies in other areas, which have not been surveyed to date, in order to plan tsetse control campaigns or explore development options. Finally, some recent tsetse control campaigns are briefly reviewed. The shift of emphasis from fly eradication to fly control is associated with a devolution of responsibility for control activities from central government to local areas, communities or even individuals. The future role of central governments will remain crucial, however, in determining the areas in which different control options are practised, in

  11. Susceptibility of low-chill blueberry cultivars to Mediterranean fruit fly, oriental fruit fly, and melon fly (Diptera: Tephritidae).

    PubMed

    Follett, Peter A; Zee, Francis T; Hamasaki, Randall T; Hummer, Kim; Nakamoto, Stuart T

    2011-04-01

    No-choice tests were conducted to determine whether fruit of southern highbush blueberry, Vaccinium corymbosum L., hybrids are hosts for three invasive tephritid fruit flies in Hawaii. Fruit of various blueberry cultivars was exposed to gravid female flies of Bactrocera dorsalis Hendel (oriental fruit fly), Ceratitis capitata (Wiedemann) (Mediterranean fruit fly), or Bactrocera cucurbitae Coquillet (melon fly) in screen cages outdoors for 6 h and then held on sand in the laboratory for 2 wk for pupal development and adult emergence. Each of the 15 blueberry cultivars tested were infested by oriental fruit fly and Mediterranean fruit fly, confirming that these fruit flies will oviposit on blueberry fruit and that blueberry is a suitable host for fly development. However, there was significant cultivar variation in susceptibility to fruit fly infestation. For oriental fruit fly, 'Sapphire' fruit produced an average of 1.42 puparia per g, twice as high as that of the next most susceptible cultivar 'Emerald' (0.70 puparia per g). 'Legacy', 'Biloxi', and 'Spring High' were least susceptible to infestation, producing only 0.20-0.25 oriental fruit fly puparia per g of fruit. For Mediterranean fruit fly, 'Blue Crisp' produced 0.50 puparia per g of fruit, whereas 'Sharpblue' produced only 0.03 puparia per g of fruit. Blueberry was a marginal host for melon fly. This information will aid in development of pest management recommendations for blueberry cultivars as planting of low-chill cultivars expands to areas with subtropical and tropical fruit flies. Planting of fruit fly resistant cultivars may result in lower infestation levels and less crop loss.

  12. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  13. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  14. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  15. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  16. Fruit Flies Help Human Sleep Research

    MedlinePlus

    Skip Navigation Bar Home Current Issue Past Issues Fruit Flies Help Human Sleep Research Past Issues / Summer 2007 ... courtesy of NIGMS Neuroscientist Chiara Cirelli uses experimental fruit flies to study sleep. Although it may be tough ...

  17. Rich Rogers Flying Over Greenland Icecap

    NASA Video Gallery

    Ihis is a view from the NASA P3 aircraft cockpit as it flies 1000 feet over the Greenland icecap during Operation Icebridge mission, which flies each March-May. The end of video shows an ice camp w...

  18. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack or Sudden Cardiac Arrest: How Are They Different? ... to heart disease and stroke. Start exploring today ! Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  19. Who Is at Risk for a Heart Attack?

    MedlinePlus

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  20. When You Visit Your Doctor After a Heart Attack

    MedlinePlus

    ... inbox ! When You Visit Your Doctor - After a Heart Attack After a Heart Attack Questions to Discuss with Your Doctor: Have you ... body? Did you have this pain before your heart attack? What brings it on? How frequently do you ...

  1. After Cancer, Higher Risk of Severe Heart Attack

    MedlinePlus

    ... this type of heart attack, called ST-elevation myocardial infarction (STEMI). One in 10 had a history of ... that cancer survivors had a higher rate of heart attack, not all of those attacks proved fatal. In ...

  2. Louse flies on birds of Baja California.

    PubMed

    Tella, J L; Rodríguez-Estrella, R; Blanco, G

    2000-01-01

    Louse flies were collected from 401 birds of 32 species captured in autumn of 1996 in Baja California Sur (Mexico). Only one louse fly species (Microlynchia pusilla) was found. It occurred in four of the 164 common ground doves (Columbina passerina) collected. This is a new a host species for this louse fly.

  3. Sugar feeding in adult stable flies

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Adult stable flies, (Stomoxys calcitrans (L.)), are known to feed readily on sugars in the laboratory. However, little is known concerning the extent of stable fly sugar feeding in wild populations. We examined the frequency of sugar feeding in stable flies in rural and urban environments. In additi...

  4. To Fly in the Sky.

    ERIC Educational Resources Information Center

    Brodie, Carolyn S.

    1995-01-01

    Suggests activities for students that focus on airplanes, famous pilots, and travel. Provides a list of suggested titles with the following topics: history of flight and airplanes; airplanes and flying information; paper and model airplanes; Charles Lindbergh; Amelia Earhart; the Wright Brothers; videos; and picture books. (AEF)

  5. Physics between a Fly's Ears

    ERIC Educational Resources Information Center

    Denny, Mark

    2008-01-01

    A novel method of localizing the direction of a source of sound has evolved in the auditory system of certain small parasitic flies. A mechanical model of this design has been shown to describe the system well. Here, a simplified version of this mechanical model is presented which demonstrates the key feature: direction estimates of high accuracy…

  6. The Spider and the Fly

    ERIC Educational Resources Information Center

    Mellinger, Keith E.; Viglione, Raymond

    2012-01-01

    The Spider and the Fly puzzle, originally attributed to the great puzzler Henry Ernest Dudeney, and now over 100 years old, asks for the shortest path between two points on a particular square prism. We explore a generalization, find that the original solution only holds in certain cases, and suggest how this discovery might be used in the…

  7. Flying Training at West Point.

    ERIC Educational Resources Information Center

    Cannon, M. Hamlin

    During World War Two the United States Military Academy operated a three-year program of instruction. Superimposed on this abbreviated curriculum was full-scale pilot training program. The emphasis of this study is on the problems that arose as a result. Included is a summary of responses to a questionnaire on the value of the flying training…

  8. [Psychophysiologic aspects of occupational flying].

    PubMed

    Lapa, V V

    1993-01-01

    The paper deals with advanced research on psychophysiology of flying activity to solve a triune task: to humanize the character and means of labour, to maintain a high level of working capacity and to develop professionally important psychophysiological features of flying personnel. The solution of the first task is associated with consecutive realization of the principle of actualization, an increase of psychophysiological capabilities of a man with the use of technical means in designing aeronautical engineering. Assurance of high functional reliability of flying personnel requires the development of the methods to evaluate and predict the state of psychophysiologic reserves during flying activities; the refinement of the norms of flight load on the basis of determining the quantitative interactions between a complexity level of flight assignments and a degree of decrease in reserve capabilities; the search for means and methods of correcting functional state directly in flight and accelerated recovery of performance postflight. The solution of psychophysiologic aspects of the professional reliability of pilot should be the development of a flight capabilities theory and theory-based improvement of estimation methods, development of methods and technical means for their improvements.

  9. Gyroscopic Instruments for Instrument Flying

    NASA Technical Reports Server (NTRS)

    Brombacher, W G; Trent, W C

    1938-01-01

    The gyroscopic instruments commonly used in instrument flying in the United States are the turn indicator, the directional gyro, the gyromagnetic compass, the gyroscopic horizon, and the automatic pilot. These instruments are described. Performance data and the method of testing in the laboratory are given for the turn indicator, the directional gyro, and the gyroscopic horizon. Apparatus for driving the instruments is discussed.

  10. Stable fly phenology in a mixed agricultural--wildlife ecosystem in northeast Montana.

    PubMed

    Friesen, Kristina M; Johnson, Gregory D

    2013-02-01

    The stable fly, Stomoxys calcitrans (L.), is a cosmopolitan species of blood-feeding Muscidae and an important pest of cattle. Although the cattle industry is the largest commodity in Montana, no research has been conducted on the abundance, distribution, or impact of stable flies in the state. Observations of stable flies attacking West Nile virus (family Flaviviridae, genus Flavivirus, WNV) -infected pelicans on a refuge in close proximity to pastured and confined cattle provided an opportunity to describe stable fly phenology in a mixed agricultural-wildlife ecosystem. Coroplast cards used to monitor and compare adult populations in three habitats (peninsula, pasture, confinement lot) located within 1.5-4.5 km of each other revealed that temporal dynamics differed by site. Adult abundance was generally lowest at the confinement lot, the only location where larval development was identified. Stable flies were collected on all traps placed in pasture, with traps adjacent to pastured cattle consistently collecting the most. Adults also were collected on the peninsula supporting the pelicans' nesting site, but whether the potential hosts or physical landscape served as an attractant is unclear. At all three sites, data indicated that overwintering was not successful and that a transition occurred from early season immigrating adults that used suitable local larval development substrates to subsequent autochthonous populations.

  11. Women's Heart Disease: Heart Attack Symptoms

    MedlinePlus

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  12. Evaluation of the Single Keybit Template Attack

    DTIC Science & Technology

    2011-03-01

    27 v Page 3.5 Measures of Performance...17 MOP Measures of Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 x...include en- cryption standards, leakage models, correlation, classification theory, previous tem- plate attacks and measures of performance. 2.1

  13. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  14. Identifying and Analyzing Web Server Attacks

    SciTech Connect

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  15. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-14

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  16. Recovery of infrastructure networks after localised attacks

    PubMed Central

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  17. Study Shows How Zika Attacks Infant Brain

    MedlinePlus

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  18. Diabetes - preventing heart attack and stroke

    MedlinePlus

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  19. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  20. Heart Attack - Multiple Languages: MedlinePlus

    MedlinePlus

    ... Arabic) النوبة القلبية - العربية Bilingual PDF Health Information Translations Bosnian (Bosanski) Heart Attack Srčani udar - Bosanski (Bosnian) Bilingual PDF Health Information Translations Chinese - Simplified (简体中文) Heart Attack 心脏病发作 - 简体中文 (Chinese - ...

  1. Physiologic responses of pilots flying high-performance aircraft.

    PubMed

    Comens, P; Reed, D; Mette, M

    1987-03-01

    This study deals with the physiologic responses to stress in F-4 fighter pilots and aircrew engaged in surface attack training (SAT) missions. Blood levels of HDL-cholesterol, LDH and LDH isoenzymes, CPK, and myoglobin were determined before and after each mission. Continuous EKG and transcutaneous PO2 recordings were made during briefing, preflight, and inflight. The personal history and habits of each participant were recorded. Each mission consisted of six successive bomb deliveries at 80-s intervals and at increasingly steep dive angles, each terminating in 5.5-6 +Gz during pull-up. Results revealed no apparent effect on HDL, COP isoenzymes, and LDH isoenzymes. Many myoglobin levels dropped as much as 50%. EKG recordings revealed ST elevations, ST depressions, T wave inversions, and marked sinus arrhythmias in some, while others showed increases in cardiac rate. Pilots flying these SAT missions in F-4C aircraft were found not to be significantly physiologically stressed.

  2. An overview of tropical pest species of bactrocera fruit flies (Diptera:Tephritidae) and the integration of biopesticides with other biological approaches for their management

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Fruit flies (Diptera:Tephritidae) are among the most economically important pest species in the world, attacking a wide range of fruits and fleshy vegetables throughout tropical and sub-tropical areas of the world. These species are such devastating crop pests that major control and eradication prog...

  3. Severe attacks by dogs: characteristics of the dogs, the victims, and the attack settings.

    PubMed

    Wright, J C

    1985-01-01

    Sixteen incidents involving dog bites fitting the description "severe" were identified among 5,711 dog bite incidents reported to health departments in five South Carolina counties (population 750,912 in 1980) between July 1, 1979, and June 30, 1982. A "severe" attack was defined as one in which the dog "repeatedly bit or vigorously shook its victim, and the victim or the person intervening had extreme difficulty terminating the attack." Information from health department records was clarified by interviews with animal control officers, health and police officials, and persons with firsthand knowledge of the events. Investigation disclosed that the dogs involved in the 16 severe attacks were reproductively intact males. The median age of the dogs was 3 years. A majority of the attacks were by American Staffordshire terriers, St. Bernards, and cocker spaniels. Ten of the dogs had been aggressive toward people or other dogs before the incident that was investigated. Ten of the 16 victims of severe attacks were 10 years of age or younger; the median age of all 16 victims was 8 years. Twelve of the victims either were members of the family that owned the attacking dog or had had contact with the dog before the attack. Eleven of the victims were bitten on the head, neck, or shoulders. In 88 percent of the cases, the attacks took place in the owner's yard or home, or in the adjoining yard. In 10 of the 16 incidents, members of the victims' families witnessed the attacks. The characteristics of these attacks, only one of which proved fatal, were similar in many respects to those that have been reported for other dog bite incidents that resulted in fatalities. On the basis of this study, the author estimates that a risk of 2 fatalities per 1,000 reported dog bites may exist nationwide. Suggestions made for the prevention of severe attacks focus on changing the behavior of both potential canine attackers and potential victims.

  4. Fly ash chemical classification based on lime

    SciTech Connect

    Fox, J.

    2007-07-01

    Typically, total lime content (CaO) of fly ash is shown in fly ash reports, but its significance is not addressed in US specifications. For certain applications a low lime ash is preferred. When a class C fly ash must be cementitious, lime content above 20% is required. A ternary S-A-C phase diagram pilot is given showing the location of fly ash compositions by coal rank and source in North America. Fly ashes from subbituminous coal from the Powder River Basin usually contain sufficient lime to be cementitious but blending with other coals may result in calcium being present in phases other than tricalcium aluminate. 9 refs., 1 fig.

  5. Petrographic characterization of economizer fly ash

    SciTech Connect

    Valentim, B.; Hower, J.C.; Soares, S.; Guedes, A.; Garcia, C.; Flores, D.; Oliveira, A.

    2009-11-15

    Policies for reducing NOx emissions have led power plants to restrict O{sub 2}, resulting in high-carbon fly ash production. Therefore, some potentially useful fly ash, such as the economizer fly ash, is discarded without a thorough knowledge of its composition. In order to characterize this type of fly ash, samples were collected from the economizer Portuguese power plant burning two low-sulfur bituminous coals. Characterization was also performed on economizer fly ash subsamples after wet sieving, density and magnetic separation. Analysis included atomic absorption spectroscopy, loss-on-ignition, scanning electron microscopy/energy-dispersive X-ray spectroscopy, optical microscopy, and micro-Raman spectroscopy.

  6. Utilization of coal fly ash. Master's thesis

    SciTech Connect

    Openshaw, S.C.

    1992-01-01

    Coal-fired power plants produce approximately 80 million tons of fly ash each year. Efforts to use fly ash have reached only a twenty to thirty percent reutilization rate. A literature review was performed to provide a consensus of the available information regarding fly ash. Fly ash is highly variable depending on the coal source, plant operations, and several other parameters. The various fly ash characteristics are discussed including classifications, physical characteristics, chemical properties and chemical compositions. Although extensive research has been performed on the use of fly ash, very little of this research has monitored any environmental impacts. The environmental concerns addressed include mobilization of toxic elements, biota impact, microbial impact, handling dangers, and pertinent regulations. Finally, the various disposal and reutilization options for fly ash are examined. A recommendation is provided for further research to cover deficiencies found in the literature.

  7. Escherichia coli fliAZY operon.

    PubMed Central

    Mytelka, D S; Chamberlin, M J

    1996-01-01

    We have cloned the Escherichia coli fliAZY operon, which contains the fliA gene (the alternative sigma factor sigma F) and two novel genes, fliZ and fliY. Transcriptional mapping of this operon shows two start sites, one of which is preceded by a canonical E sigma F-dependent consensus and is dependent on sigma F for expression in vivo and in vitro. We have overexpressed and purified sigma F and demonstrated that it can direct core polymerase to E sigma F-dependent promoters. FliZ and FliY are not required for motility but may regulate sigma F activity, perhaps in response to a putative cell density signal that may be detected by FliY, a member of the bacterial extracellular solute-binding protein family 3. PMID:8550423

  8. Binocular Interactions Underlying the Classic Optomotor Responses of Flying Flies

    PubMed Central

    Duistermars, Brian J.; Care, Rachel A.; Frye, Mark A.

    2012-01-01

    In response to imposed course deviations, the optomotor reactions of animals reduce motion blur and facilitate the maintenance of stable body posture. In flies, many anatomical and electrophysiological studies suggest that disparate motion cues stimulating the left and right eyes are not processed in isolation but rather are integrated in the brain to produce a cohesive panoramic percept. To investigate the strength of such inter-ocular interactions and their role in compensatory sensory–motor transformations, we utilize a virtual reality flight simulator to record wing and head optomotor reactions by tethered flying flies in response to imposed binocular rotation and monocular front-to-back and back-to-front motion. Within a narrow range of stimulus parameters that generates large contrast insensitive optomotor responses to binocular rotation, we find that responses to monocular front-to-back motion are larger than those to panoramic rotation, but are contrast sensitive. Conversely, responses to monocular back-to-front motion are slower than those to rotation and peak at the lowest tested contrast. Together our results suggest that optomotor responses to binocular rotation result from the influence of non-additive contralateral inhibitory as well as excitatory circuit interactions that serve to confer contrast insensitivity to flight behaviors influenced by rotatory optic flow. PMID:22375108

  9. Investigation of the Low-Subsonic Stability and Control Characteristics of a Free-Flying Model of a Thick 70 deg Delta Reentry Configuration

    NASA Technical Reports Server (NTRS)

    Paulson, John W.; Shanks, Robert E.

    1961-01-01

    An investigation of the low-subsonic flight characteristics of a thick 70 deg delta reentry configuration having a diamond cross section has been made in the Langley full-scale tunnel over an angle-of-attack range from 20 to 45 deg. Flight tests were also made at angles of attack near maximum lift (alpha = 40 deg) with a radio-controlled model dropped from a helicopter. Static and dynamic force tests were made over an angle-of-attack range from 0 to 90 deg. The longitudinal stability and control characteristics were considered satisfactory when the model had positive static longitudinal stability. It was possible to fly the model with a small amount of static instability, but the longitudinal characteristics were considered unsatisfactory in this condition. At angles of attack above the stall the model developed a large, constant-amplitude pitching oscillation. The lateral stability characteristics were considered to be only fair at angles of attack from about 20 to 35 deg because of a lightly damped Dutch roll oscillation. At higher angles of attack the oscillation was well damped and the lateral stability was generally satisfactory. The Dutch roll damping at the lower angles of attack was increased to satisfactory values by means of a simple rate-type roll damper. The lateral control characteristics were generally satisfactory throughout the angle- of-attack range, but there was some deterioration in aileron effectiveness in the high angle-of-attack range due mainly to a large increase in damping in roll.

  10. Automated Surveillance of Fruit Flies.

    PubMed

    Potamitis, Ilyas; Rigakis, Iraklis; Tatlas, Nicolaos-Alexandros

    2017-01-08

    Insects of the Diptera order of the Tephritidae family cause costly, annual crop losses worldwide. Monitoring traps are important components of integrated pest management programs used against fruit flies. Here we report the modification of typical, low-cost plastic traps for fruit flies by adding the necessary optoelectronic sensors to monitor the entrance of the trap in order to detect, time-stamp, GPS tag, and identify the species of incoming insects from the optoacoustic spectrum analysis of their wingbeat. We propose that the incorporation of automated streaming of insect counts, environmental parameters and GPS coordinates into informative visualization of collective behavior will finally enable better decision making across spatial and temporal scales, as well as administrative levels. The device presented is at product level of maturity as it has solved many pending issues presented in a previously reported study.

  11. Automated Surveillance of Fruit Flies

    PubMed Central

    Potamitis, Ilyas; Rigakis, Iraklis; Tatlas, Nicolaos-Alexandros

    2017-01-01

    Insects of the Diptera order of the Tephritidae family cause costly, annual crop losses worldwide. Monitoring traps are important components of integrated pest management programs used against fruit flies. Here we report the modification of typical, low-cost plastic traps for fruit flies by adding the necessary optoelectronic sensors to monitor the entrance of the trap in order to detect, time-stamp, GPS tag, and identify the species of incoming insects from the optoacoustic spectrum analysis of their wingbeat. We propose that the incorporation of automated streaming of insect counts, environmental parameters and GPS coordinates into informative visualization of collective behavior will finally enable better decision making across spatial and temporal scales, as well as administrative levels. The device presented is at product level of maturity as it has solved many pending issues presented in a previously reported study. PMID:28075346

  12. Exercise your physics when flying

    NASA Astrophysics Data System (ADS)

    Baffa, Oswaldo

    1999-10-01

    Recently, while flying, I found it difficult to sleep and started to pay attention to the television screens in the airplane. There were two types of TV to watch—a large cathode raye tube (CRT)monitor and smaller liquid crystal display (LCD) for passengers sitting near the bulkhead. In one of my glances at the large monitors I noticed that the colors were changing. I looked at the LCD monitors and the colors were fine. What could be happening?

  13. Notes on flying and dying.

    PubMed

    Meyer, B C

    1983-07-01

    Focused on selected details in the lives and creative works of Samuel Johnson, Edgar Allan Poe, and Houdini, this paper explores a seeming antinomy between claustrophobic annihilation and aviation. At first glance the latter appears as an antidote to the threat of entrapment and death. On a deeper level the distinction fades as the impression arises that in the examples cited, flying may represent an unconscious expression of a wish for death and ultimate reunion.

  14. Plasma vitrification of fly ash

    SciTech Connect

    Beudin, V.; Guihard, B.; Pineau, D.; Labrot, M.; Soler, G.; Favier, J.M.; Boudeau, A.

    1995-12-31

    This paper presents the plasma vitrification of fly-ash produced by a Municipal Waste Incinerator, as programmed by Europlasma Company in France. It describes the main assumptions, technical and economical data and regulations taken into account to build and operate the first industrial pilot plant from 1995, near Bordeaux (France), using a non transferred plasma torch of 500 kW operated with air.

  15. Know the Warning Signs of a Heart Attack

    MedlinePlus

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  16. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  17. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  18. The Role of Behavioral Responses in the Total Economic Consequences of Terrorist Attacks on U.S. Air Travel Targets.

    PubMed

    Rose, Adam; Avetisyan, Misak; Rosoff, Heather; Burns, William J; Slovic, Paul; Chan, Oswin

    2016-12-23

    U.S. airports and airliners are prime terrorist targets. Not only do the facilities and equipment represent high-value assets, but the fear and dread that is spread by such attacks can have tremendous effects on the U.S. economy. This article presents the methodology, data, and estimates of the macroeconomic impacts stemming from behavioral responses to a simulated terrorist attack on a U.S. airport and on a domestic airliner. The analysis is based on risk-perception surveys of these two scenarios. The responses relate to reduced demand for airline travel, shifts to other modes, spending on nontravel items, and savings of potential travel expenditures by U.S. resident passengers considering flying domestic routes. We translate these responses to individual spending categories and feed these direct impact results into a computable general equilibrium (CGE) model of the U.S. economy to ascertain the indirect and total impacts on both the airline industry and the economy as a whole. Overall, the estimated impacts on GDP of both types of attacks exceed $10B. We find that the behavioral economic impacts are almost an order of magnitude higher than the ordinary business interruption impacts for the airliner attack and nearly two orders of magnitude higher for the airport attack. The results are robust to sensitivity tests on the travel behavior of U.S. residents in response to terrorism.

  19. House fly oviposition inhibition by larvae ofHermetia illucens, the black soldier fly.

    PubMed

    Bradley, S W; Sheppard, D C

    1984-06-01

    Wild populations of house flies were inhibited from ovipositing into poultry manure containing larvae of the black soldier fly,Hermetia illucens (L.). A laboratory strain of house fly responded differently, readily ovipositing into manure with lower densities of soldier fly larvae, but avoiding the higher densities tested. The amount of timeH. illucens larvae occupy the manure prior to an oviposition test influences ovipositional responses of house flies. Manure conditioned byH. illucens larvae for 4-5 days did not significantly inhibit house fly oviposition. We suggest that some type of interspecific chemical communication (allomone) is present.

  20. Identifying glass compositions in fly ash

    NASA Astrophysics Data System (ADS)

    Aughenbaugh, Katherine; Stutzman, Paul; Juenger, Maria

    2016-01-01

    In this study, four Class F fly ashes were studied with a scanning electron microscope; the glassy phases were identified and their compositions quantified using point compositional analysis with k-means clustering and multispectral image analysis. The results showed that while the bulk oxide contents of the fly ashes were different, the four fly ashes had somewhat similar glassy phase compositions. Aluminosilicate glasses (AS), calcium aluminosilicate glasses (CAS), a mixed glass, and, in one case, a high iron glass were identified in the fly ashes. Quartz and iron crystalline phases were identified in each fly ash as well. The compositions of the three main glasses identified, AS, CAS, and mixed glass, were relatively similar in each ash. The amounts of each glass were varied by fly ash, with the highest calcium fly ash containing the most of calcium-containing glass. Some of the glasses were identified as intermixed in individual particles, particularly the calcium-containing glasses. Finally, the smallest particles in the fly ashes, with the most surface area available to react in alkaline solution, such as when mixed with portland cement or in alkali-activated fly ash, were not different in composition than the large particles, with each of the glasses represented. The method used in the study may be applied to a fly ash of interest for use as a cementing material in order to understand its potential for reactivity.

  1. Computational Aerodynamic Analysis of a Micro-CT Based Bio-Realistic Fruit Fly Wing

    PubMed Central

    Brandt, Joshua; Doig, Graham; Tsafnat, Naomi

    2015-01-01

    The aerodynamic features of a bio-realistic 3D fruit fly wing in steady state (snapshot) flight conditions were analyzed numerically. The wing geometry was created from high resolution micro-computed tomography (micro-CT) of the fruit fly Drosophila virilis. Computational fluid dynamics (CFD) analyses of the wing were conducted at ultra-low Reynolds numbers ranging from 71 to 200, and at angles of attack ranging from -10° to +30°. It was found that in the 3D bio-realistc model, the corrugations of the wing created localized circulation regions in the flow field, most notably at higher angles of attack near the wing tip. Analyses of a simplified flat wing geometry showed higher lift to drag performance values for any given angle of attack at these Reynolds numbers, though very similar performance is noted at -10°. Results have indicated that the simplified flat wing can successfully be used to approximate high-level properties such as aerodynamic coefficients and overall performance trends as well as large flow-field structures. However, local pressure peaks and near-wing flow features induced by the corrugations are unable to be replicated by the simple wing. We therefore recommend that accurate 3D bio-realistic geometries be used when modelling insect wings where such information is useful. PMID:25954946

  2. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    NASA Astrophysics Data System (ADS)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  3. Robustness of interdependent networks under targeted attack

    NASA Astrophysics Data System (ADS)

    Huang, Xuqing; Gao, Jianxi; Buldyrev, Sergey; Havlin, Shlomo; Stanley, H. Eugene

    2012-02-01

    When an initial failure of nodes occurs in interdependent networks, a cascade of failure between the networks occurs. Earlier studies focused on random initial failures. Here we study the robustness of interdependent networks under targeted attack on high or low degree nodes. We introduce a general technique which maps the targeted-attack problem in interdependent networks to the random-attack problem in a transformed pair of interdependent networks. We find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc=0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. The result implies that interdependent networks are difficult to defend by strategies such as protecting the high degree nodes that have been found useful to significantly improve robustness of single networks.

  4. Robustness of interdependent networks under targeted attack

    NASA Astrophysics Data System (ADS)

    Huang, Xuqing; Gao, Jianxi; Buldyrev, Sergey V.; Havlin, Shlomo; Stanley, H. Eugene

    2011-06-01

    When an initial failure of nodes occurs in interdependent networks, a cascade of failure between the networks occurs. Earlier studies focused on random initial failures. Here we study the robustness of interdependent networks under targeted attack on high or low degree nodes. We introduce a general technique which maps the targeted-attack problem in interdependent networks to the random-attack problem in a transformed pair of interdependent networks. We find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc=0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. The result implies that interdependent networks are difficult to defend by strategies such as protecting the high degree nodes that have been found useful to significantly improve robustness of single networks.

  5. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  6. Death due to attack from chow dog.

    PubMed

    Bux, R C; McDowell, J D

    1992-12-01

    It is estimated that between one and four million persons per year are bitten by dogs in the United States. While most injuries associated with the bites are minor, serious sequelae, and even death, may occur. Most victims of fatal dog attacks are children < 1 year of age or elderly women. The most frequent cause of death is hemorrhage and shock from major vessel damage. A case is reported in which an elderly woman was attacked by her pet Chow dog. The victim received multiple superficial abrasions, contusions, and lacerations from the dog attack. A large perforation of the right external pudendal vein and three perforations of the left superficial femoral vein resulted in exsanguination and death. Fractures of the left 2nd through 4th ribs with underlying pulmonary contusion were also found.

  7. Responding to chemical attack. Final report

    SciTech Connect

    Bagley, R.W.

    1991-02-11

    In view of Iraq's stated intention of using chemical weapons in the Persian Gulf War, the Coalition forces must be prepared to respond. Iraq is capable of conducting such an attack. While the use of chemical weapons may not be militarily significant, the political effect of the use and the response to it may be very significant. Responses including the use of chemical and nuclear weapons are assessed in terms of their legality, political cost, and military effectiveness and found unacceptable. Reliance on diplomatic protests and on post-war criminal sanctions are judged ineffective. A response in the form of increased conventional attack on the Iraqi chemical infrastructure is recommended because that response will preserve the present Coalition, effectively counter the chemical attack, contribute to regional stability, and enhance the reputation of the United States for lawfulness and dependability.

  8. Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks

    DTIC Science & Technology

    2006-01-01

    than preventing or deterring, collusion attacks. We show that colluding verifiers who are capable of implementing wormhole attacks can defeat even...away. We will illustrate this using (a) standard collusion and also (b) wormhole in Figure 2. A wormhole attack is one in which a fast link is set up...be- tween the victims and an attacker who is outside of the normal range. The wormhole attack may appear to be an overkill for this problem since

  9. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    NASA Astrophysics Data System (ADS)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  10. Susceptibility of 15 mango (Sapindales: Anacardiaceae) cultivars to the attack by Anastrepha ludens and Anastrepha obliqua (Diptera:Tephritidae) and the role of underdeveloped fruit as pest reservoirs: management implications

    Technology Transfer Automated Retrieval System (TEKTRAN)

    We evaluated the susceptibility of 15 mango cultivars to the attack of Anastrepha ludens and A. obliqua, the main Tephritid pests of this crop in Mexico. In a field experiment, bagged, fruit-bearing branches were exposed to gravid females of both fly species. Infestation rates, developmental time,...

  11. Chilling and Host Plant/Site-Associated Eclosion Times of Western Cherry Fruit Fly (Diptera: Tephritidae) and a Host-Specific Parasitoid.

    PubMed

    Yee, Wee L; Goughnour, Robert B; Hood, Glen R; Forbes, Andrew A; Feder, Jeffrey L

    2015-08-01

    The western cherry fruit fly, Rhagoletis indifferens Curran (Diptera: Tephritidae), is an endemic herbivore of bitter cherry, Prunus emarginata (Douglas ex Hooker) Eaton, but ∼100 years ago established on earlier-fruiting domesticated sweet cherry, Prunus avium (L.) L. Here, we determined if eclosion times of adult R. indifferens from sweet and bitter cherry differ according to the phenology of their respective host plants and if eclosion times of the host-specific parasitoid Diachasma muliebre (Muesebeck) (Hymenoptera: Braconidae) attacking bitter and sweet cherry flies differ according to the eclosion phenology of their fly hosts. Fly pupae from sweet and bitter cherry fruit were collected from sympatric and allopatric sites in Washington state, and chilled at 5°C. Because timing of eclosion in R. indifferens depends on chill duration, eclosion time in wasps could also vary with chill duration. To account for this, fly pupae were chilled for 1, 2, 2.5, 3, 4, 6, or 8 mo. Both flies and wasps eclosed earlier with longer chill durations. Eclosion times of sweet and bitter cherry flies from a sympatric site in central Washington did not differ. However, at allopatric sites in northwestern and central Washington, bitter cherry flies eclosed later than sweet and bitter cherry flies at the sympatric site. Correspondingly, D. muliebre parasitizing a more isolated bitter cherry fly population eclosed later than D. muliebre parasitizing earlier-emerging sweet and bitter cherry fly populations. These results provide evidence for D. muliebre rapidly responding to changes in host plant shifts by R. indifferens.

  12. Susceptibility of 15 mango (Sapindales: Anacardiaceae) cultivars to the attack by Anastrepha ludens and Anastrepha obliqua (Diptera: Tephritidae) and the role of underdeveloped fruit as pest reservoirs: management implications.

    PubMed

    Aluja, M; Arredondo, J; Díaz-Fleischer, F; Birke, A; Rull, J; Niogret, J; Epsky, N

    2014-02-01

    We evaluated the susceptibility of 15 mango cultivars to the attack of Anastrepha ludens (Loew) and Anastrepha obliqua (Macquart) (Diptera: Tephritidae), the main tephritid pests of this crop in Mexico. In a field experiment, bagged fruit-bearing branches were exposed to gravid females of both fly species. Infestation rates, developmental time, adult eclosion, and F1 adult longevity, fecundity, and fertility were recorded, ranking cultivars in terms of susceptibility to fly attack and development. We also compared the volatile profile in selected resistant and susceptible cultivars in search of possible correlations. In a second experiment, clutch size for A. ludens was determined in each cultivar. Infestation rates, developmental time, and F1 demographic parameters varied sharply among cultivars and between fly species for bagged fruit. Cultivars 'Vishi,' '74-82,' and 'Brooks' were most susceptible to A. ludens infestation while "Tommy,' 'Sensation,' and 'Ataulfo "niño"' (parthenocarpic fruit) were most susceptible to A. obliqua infestation. 'Edward,' 'Kent,' 'Brooks late,' 'Palmer, and 'Ataulfo' exhibited tolerance to attack of both fly species. Fruit of susceptible and resistant cultivars exhibited unique volatile profiles. Fly development and F1 adult demographic parameters varied significantly among cultivars. A. ludens females laid larger clutches in larger and harder fruit. We highlight the important role of Ataulfo "niño" as pest reservoir if fruit is left unharvested on trees. We discuss the possible use of highly resistant cultivars as trap crops or egg sinks.

  13. Predation: Prey plumage adaptation against falcon attack.

    PubMed

    Palleroni, Alberto; Miller, Cory T; Hauser, Marc; Marler, Peter

    2005-04-21

    Several plumage types are found in feral pigeons (Columba livia), but one type imparts a clear survival advantage during attacks by the swiftest of all predators--the peregrine falcon (Falco peregrinus). Here we use quantitative field observations and experiments to demonstrate both the selective nature of the falcon's choice of prey and the effect of plumage coloration on the survival of feral pigeons. This plumage colour is an independently heritable trait that is likely to be an antipredator adaptation against high-speed attacks in open air space.

  14. A treatment for the acute migraine attack.

    PubMed

    Adam, E I

    1987-01-01

    A compound analgesic/anti-emetic formulation was significantly effective in reducing the severity of acute attacks of migraine, in a double-blind, randomized, crossover trial of 34 patients referred to a migraine clinic. The preparation contained paracetamol (acetaminophen) 500 mg, codeine phosphate 8 mg, buclizine hydrochloride 6.25 mg and dioctyl sodium sulphosuccinate 10 mg. The dosage was two tablets taken as early as possible in the acute attack. No specific factors could be identified which influenced response to treatment. Patients with a long history of migraine (more than 10 years) responded as well as those with a recent onset of the condition.

  15. Identifying inference attacks against healthcare data repositories

    PubMed Central

    Vaidya, Jaideep; Shafiq, Basit; Jiang, Xiaoqian; Ohno-Machado, Lucila

    Health care data repositories play an important role in driving progress in medical research. Finding new pathways to discovery requires having adequate data and relevant analysis. However, it is critical to ensure the privacy and security of the stored data. In this paper, we identify a dangerous inference attack against naive suppression based approaches that are used to protect sensitive information. We base our attack on the querying system provided by the Healthcare Cost and Utilization Project, though it applies in general to any medical database providing a query capability. We also discuss potential solutions to this problem. PMID:24303279

  16. Ultrasonic Vocalizations Emitted by Flying Squirrels

    PubMed Central

    Murrant, Meghan N.; Bowman, Jeff; Garroway, Colin J.; Prinzen, Brian; Mayberry, Heather; Faure, Paul A.

    2013-01-01

    Anecdotal reports of ultrasound use by flying squirrels have existed for decades, yet there has been little detailed analysis of their vocalizations. Here we demonstrate that two species of flying squirrel emit ultrasonic vocalizations. We recorded vocalizations from northern (Glaucomys sabrinus) and southern (G. volans) flying squirrels calling in both the laboratory and at a field site in central Ontario, Canada. We demonstrate that flying squirrels produce ultrasonic emissions through recorded bursts of broadband noise and time-frequency structured frequency modulated (FM) vocalizations, some of which were purely ultrasonic. Squirrels emitted three types of ultrasonic calls in laboratory recordings and one type in the field. The variety of signals that were recorded suggest that flying squirrels may use ultrasonic vocalizations to transfer information. Thus, vocalizations may be an important, although still poorly understood, aspect of flying squirrel social biology. PMID:24009728

  17. Roller compacted base course construction using lime stabilized fly ash and flue gas desulfurization sludge by-product

    SciTech Connect

    Beeghly, J.J.

    1996-10-01

    Dewatered calcium sulfite and calcium sulfate sludges from flue gas desulfurization (FGD) processes at coal fired power plants can be mixed with coal fly ash and lime to cause a cementitious chemical reaction used to construct a roller compacted base course or an impermeable pond liner. Tile chemical reaction is often shown as lime reacting with alumina from the fly ash which in turn reacts with the calcium sulfite and sulfate FGD waste to form sulfo-aluminate. Better understanding is needed of the controlling factors that result in a successful application of this chemical reaction which has been linked to past construction failures due to latent hydration causing expansion damage or degradation of concrete, called sulfate attack. Factors such as optimum moisture content, fly ash to FGD ratio, and age of FGD are examined that affect strength gain and freeze-thaw durability. Several recently completed field demonstrations are discussed.

  18. Combat aircraft operations: Training requirements for the German Air Force tactical flying units and the noise problem

    NASA Astrophysics Data System (ADS)

    Jertz, W.

    1992-04-01

    The deterrence potential of an Air Force, and by that the capability to fulfill their mission in times of war, relies on threat oriented training in peacetime. Low level flying is a major tactical means to help aircrews reduce the anticipated threat imposed to them by enemy air defence systems to an acceptable degree. The demand for this capability applies also to air defence tasks against attacking fighter bombers. Military low level flying requires a high degree of proficiency, which can only be reached and maintained by constant training. A high performance level is then the key to air power. The possibilities for this kind of necessary training are restricted by superior demands concerning, amongst others, flying safety and environmental reasons. Too intensive restrictions might reduce the fighting capability of the wings to such an extent, that mission fulfillment could be seriously endangered.

  19. Revised irradiation doses to control melon fly, Mediterranean fruit fly, and oriental fruit fly (Diptera: Tephritidae) and a generic dose for tephritid fruit flies.

    PubMed

    Follett, Peter A; Armstrong, John W

    2004-08-01

    Currently approved irradiation quarantine treatment doses for Bactrocera cucurbitae (Coquillet), melon fly; Ceratitis capitata (Wiedemann), Mediterranean fruit fly; and Bactrocera dorsalis (Hendel), oriental fruit fly, infesting fruits and vegetables for export from Hawaii to the continental United States are 210, 225, and 250 Gy, respectively. Irradiation studies were initiated to determine whether these doses could be reduced to lower treatment costs, minimize any adverse effects on quality, and support a proposed generic irradiation dose of 150 Gy for fruit flies. Dose-response tests were conducted with late third instars of wild and laboratory strains of the three fruit fly species, both in diet and in fruit. After x-ray irradiation treatment, data were taken on adult emergence, and adult female fecundity and fertility. Melon fly was the most tolerant of the three species to irradiation, and oriental fruit fly was more tolerant than Mediterranean fruit fly. Laboratory and wild strains of each species were equally tolerant of irradiation, and larvae were more tolerant when irradiated in fruit compared with artificial diet. An irradiation dose of 150 Gy applied to 93,666 melon fly late third instars in papayas resulted in no survival to the adult stage, indicating that this dose is sufficient to provide quarantine security. Irradiation doses of 100 and 125 Gy applied to 31,920 Mediterranean fruit fly and 55,743 oriental fruit fly late third instars, respectively, also resulted in no survival to the adult stage. Results support a proposed generic irradiation quarantine treatment dose of 150 Gy for all tephritid fruit flies.

  20. Grapefruit as a host for the West Indian fruit fly (Diptera: Tephritidae).

    PubMed

    Mangan, Robert L; Thomas, Donald B; Moreno, Aleena Tarshis; Robacker, David

    2011-02-01

    The most common hosts for the West Indian fruit fly, Anastrepha obliqua (Macquart) (Diptera: Tephritidae) are fruit in the family Anacardiaceae (mango [Mangifera L.] and mombin [Spondias L.] species). However, similar to many of the tropical fruit flies of major economic importance, this species attacks several other families of crop fruit, including Annonaceae (cherimoya, Annona cherimola Mill.), Myrtaceae (guava, Psidium L.), Oxalidaceae (carambola, Averrhoa carambola L.), Passifloraceae (granadilla, Passiflora quadrangularis Mill.), and Sapotaceae [mamey sapote, Pouteria sapota (Jacq.) H. E. Moore & Steam]. In the family Rutaceae the economically important genus Citrus has been reported and until recently considered a host for this fruit fly. In this study, we reviewed the taxonomy of A. obliqua, tested specific chemicals that may inhibit oviposition, compared egg-to-adult survival of A. obliqua on preferred hosts and on grapefruit (Citrus X paradisi Macfad.), and measured fruit tissue-specific developmental rates of A. obliqua and the known citrus breeding Mexican fruit fly, Anastrepha ludens (Loew) (Diptera: Tephritidae), from egg to pupae. Our literature review shows much confusion concerning the taxonomy of this and related Anastrepha species, including synonymies and confusion with other species. The deterrent effect of the highest concentration of flavonoids for oviposition, although significant, was not absolute. Experiments carried out under laboratory conditions showed 15-40 times greater survival of A. ludens (whose preferred hosts include Rutaceae) on grapefruit compared with A. obliqua for both tree attached and harvested fruit. Experiments of survival of developing stages over time showed that the two species oviposit into different tissues in the fruit, and mortality is much higher for the West Indian fruit fly in the flavedo and albedo of the fruit compared with the Mexican fruit fly.

  1. Use Of Fly Iarvae In Space Agriculture

    NASA Astrophysics Data System (ADS)

    Katayama, Naomi; Mitsuhashi, Jun; Hachiya, Natumi; Miyashita, Sachiko; Hotta, Atuko

    The concept of space agriculture is full use of biological and ecological components ot drive materials recycle loop. In an ecological system, producers, consumers and decomposers are its member. At limited resources acailable for space agriculture, full use of members' function is required to avoid food shortage and catastrophe.Fly is categrized to a decomposer at its eating excreta and rotten materials. However, is it could be edible, certainly it is eaten in several food culture of the world, it functions as a converter of inedible biomass ot edible substance. This conversion enhances the efficiency of usage of resource that will be attributed to space agriculture. In this context, we examine the value of melon fly, Dacus cucurbitae, as a candidate fly species ofr human food. Nutrients in 100g of melon fly larvae were protein 12g, lipid 4.6g Fe 4.74mg, Ca 275mg, Zn 6.37mg, Mn 4.00mg. Amino acids compositon in 100g of larvae was glutamic acid 1.43g and aspartic acid 1.12g. Because of high contents of these amino acids taste of fly larva might be good. Life time of adult melon fly is one to two month, and lays more than 1,000 eggs in total during the life. Larvae hatch after one to two days, and metamorphose after 8 to 15 days to pupae. Srxual maturity is reached after 22 days the earliest from it egg. Sixteen generations could be succeeded in a year for melon fly at maximum. The rate of proliferation of fly is quite high compared to silkworm that can have 8.7 generations per year. The wide food habit of fly, compared to mulberry leaf for silkworm, is another advantage to choose fly for entomophage. Rearing technology of melon fly is well established, since large scaled production of sterile male fly has been conducted in order ot exterminate melon fly in the field. Feeding substance for melon fly larvae in production line is a mixture of wheat, bran, raw sugar, olara, beer yeast, tissue paper, and additive chemicals. A 1 kg of feed substance can be converted to

  2. Emittance growth due to Tevatron flying wires

    SciTech Connect

    Syphers, M; Eddy, Nathan

    2004-06-01

    During Tevatron injection, Flying Wires have been used to measure the transverse beam size after each transfer from the Main Injector in order to deduce the transverse emittances of the proton and antiproton beams. This amounts to 36 + 9 = 45 flies of each of 3 wire systems, with an individual wire passing through each beam bunch twice during a single ''fly''. below they estimate the emittance growth induced by the interaction of the wires with the particles during these measurements. Changes of emittance from Flying Wire measurements conducted during three recent stores are compared with the estimations.

  3. Fear of flying--a Singapore perspective.

    PubMed

    Chew, P H

    1997-01-01

    Fear of flying is a term commonly used in the Aviation Medicine community. However, heterogeneous conditions which can present with fear of flying, demand that a more stringent and systematic approach be made in one's management of the aviator with fear of flying (FOF). Cases of FOF between 1974 and 1995 presented to the Civil Aviation Medical Board and the Aeromedical Centre of the Republic of Singapore Air Force were studied for their psychopathology, psychodynamics, diagnoses, motivation for treatment, type of treatment and response to treatment, and their eventual outcome in relation of flying. 53.3% of 15 cases had Adult Situational Reaction, 26.7% had phobia of flying, 6.6% had Adjustment Disorder, 6.7% had Anxiety Depressive Disorder and 6.7% had Transient Psychosis. All cases of Adjustment Disorder were returned to flying, compared with 25% of Adult Situational Reaction, 66.7% of Phobia of Flying and none of the aircrew suffering from Transient Psychosis. Fear of flying is thus a complex phenomenon, where there is interaction of elements of mental health, neurotic roots, real and imaginary threats and life events affecting eventually the flyer's willingness to fly.

  4. Flying qualities criteria and flight control design

    NASA Technical Reports Server (NTRS)

    Berry, D. T.

    1981-01-01

    Despite the application of sophisticated design methodology, newly introduced aircraft continue to suffer from basic flying qualities deficiencies. Two recent meetings, the DOD/NASA Workshop on Highly Augmented Aircraft Criteria and the NASA Dryden Flight Research Center/Air Force Flight Test Center/AIAA Pilot Induced Oscillation Workshop, addressed this problem. An overview of these meetings is provided from the point of view of the relationship between flying qualities criteria and flight control system design. Among the items discussed are flying qualities criteria development, the role of simulation, and communication between flying qualities specialists and control system designers.

  5. What the fly's nose tells the fly's brain.

    PubMed

    Stevens, Charles F

    2015-07-28

    The fly olfactory system has a three-layer architecture: The fly's olfactory receptor neurons send odor information to the first layer (the encoder) where this information is formatted as combinatorial odor code, one which is maximally informative, with the most informative neurons firing fastest. This first layer then sends the encoded odor information to the second layer (decoder), which consists of about 2,000 neurons that receive the odor information and "break" the code. For each odor, the amplitude of the synaptic odor input to the 2,000 second-layer neurons is approximately normally distributed across the population, which means that only a very small fraction of neurons receive a large input. Each odor, however, activates its own population of large-input neurons and so a small subset of the 2,000 neurons serves as a unique tag for the odor. Strong inhibition prevents most of the second-stage neurons from firing spikes, and therefore spikes from only the small population of large-input neurons is relayed to the third stage. This selected population provides the third stage (the user) with an odor label that can be used to direct behavior based on what odor is present.

  6. A New Human-Biting Black Fly Species of Simulium (Simulium) (Diptera: Simuliidae) From Thailand.

    PubMed

    Takaoka, Hiroyuki; Srisuka, Wichai; Saeung, Atiporn

    2017-04-07

    Simulium (Simulium) umphangense, a new human-biting species of black fly, is described based on females captured while attacking humans in western and central Thailand. The female of this new species is similar to those of S. (S.) indicum Becher, S. (S.) nigrogilvum Summers, and S. (S.) vanellum Huang et al. in the Simulium griseifrons species-group of the subgenus Simulium Latreille in having the frons densely covered with golden-yellow short hairs, a character rarely found in the subgenus Simulium. This new species is readily distinguished from the three related species by having a darkened fore tibia, a bare subcosta (or rarely with a few hairs), and an ovipositor valve not protruded posteriorly. Additional diagnostic characters of this new species are noted. This is the seventh human-biting species of black fly in Thailand.

  7. Leading-edge vortex improves lift in slow-flying bats.

    PubMed

    Muijres, F T; Johansson, L C; Barfield, R; Wolf, M; Spedding, G R; Hedenström, A

    2008-02-29

    Staying aloft when hovering and flying slowly is demanding. According to quasi-steady-state aerodynamic theory, slow-flying vertebrates should not be able to generate enough lift to remain aloft. Therefore, unsteady aerodynamic mechanisms to enhance lift production have been proposed. Using digital particle image velocimetry, we showed that a small nectar-feeding bat is able to increase lift by as much as 40% using attached leading-edge vortices (LEVs) during slow forward flight, resulting in a maximum lift coefficient of 4.8. The airflow passing over the LEV reattaches behind the LEV smoothly to the wing, despite the exceptionally large local angles of attack and wing camber. Our results show that the use of unsteady aerodynamic mechanisms in flapping flight is not limited to insects but is also used by larger and heavier animals.

  8. Preventing and Profiling Malicious Insider Attacks

    DTIC Science & Technology

    2012-04-01

    personality predispositions. The aim of this report is to determine what personality factors , personality predispositions and motivators may...Butavicius, M. (2009). Human Factors and Information Security: Individual, Culture and Security Environment . Manuscript submitted for publication...previous research on malicious insiders with particular emphasis on the social and psychological factors that may have influenced the attacker and their

  9. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  10. Shark Attack! Sinking Your Teeth into Anatomy.

    ERIC Educational Resources Information Center

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  11. Triage of casualties after nuclear attack.

    PubMed

    Pledger, H G

    1986-09-20

    Casualties from a nuclear attack on the United Kingdom would overwhelm the health services, and health workers would be faced with many more people seeking help than could be offered treatment. Discussion is needed to determine which methods of medical and non-medical triage would be acceptable and feasible.

  12. Attack Classification Schema for Smart City WSNs.

    PubMed

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  13. Rhode Island School Terrorist Attack Preparedness

    ERIC Educational Resources Information Center

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  14. CASE STUDY: DIELDRIN ATTACK IN DALYAN LAGOON

    EPA Science Inventory

    During the first two weeks of December 2005, NATO sponsored an Advanced Study Institute (ASI) in Istanbul, Turkey. Part of this ASI involved a case study of a terrorist attack, where a chemical was assumed to be dumped into Sulunger Lake in Turkey. This chapter documents the re...

  15. Gas in Attack and Gas in Defense

    DTIC Science & Technology

    1919-07-01

    celluloid eye pieces and, at a somewhat later date, with an expira - tory valve c In a ga~i attack the sack was pulled over the head and tucked...the field. PROTECTION IN WAR IS RELATIVE ONLY. ‘%. Napoleon is credited with saying/In order to make an omelet, it is necessary, to break some eggs

  16. Plant defences against herbivore and insect attack

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  17. Categorizing Network Attacks Using Pattern Classification Algorithms

    DTIC Science & Technology

    2002-03-01

    attacks into predefined categories such as Flooding Denial of Service, Distributed Denial of Service, Nukers, and Portscans . Such categorization decreases...Detection of Stealthy Portscans . Tech- nical Report, Silicon Defense, 2000. [Stevens94] Stevens, W. Richard. TCP/IP Illustrated Volume 1 . Reading: Addison

  18. Responses to the September 11, 2001 Attacks.

    ERIC Educational Resources Information Center

    Anderson, Frances E.

    2001-01-01

    This editorial introduces a special section devoted to chronicling the responses of art therapists after the September 11th attacks. The section contains 10 articles from therapists in New York City, New Jersey, Long Island, Washington, DC, and California. Articles include stories of the reactions of the therapists as well as their work with…

  19. Panic attacks after treatment with zuclopenthixol decanoate.

    PubMed

    Srivastava, Anil; Soni, Jorge

    2007-01-01

    The association between neuroleptics and anxiety is unclear: neuroleptics have been used to treat anxiety though may also themselves be anxiogenic. We present the case of a man who developed new onset panic attacks after treatment with zuclopenthixol decanoate, a commonly administered depot antipsychotic. We review the literature on the association between antipsychotics and anxiety and present possible pathophysiological mechanisms.

  20. Improvement of Hungarian Joint Terminal Attack Program

    DTIC Science & Technology

    2013-06-13

    Forward Looking Infrared GLTD Ground Laser Target Designator HDF Hungarian Defense Force JFO Joint Fires Observer JTAC Joint Terminal Attack Controller......FLIR at least. Laser capability is another important material requirement for CAS aircraft. Laser systems contain two important components. A low

  1. Intrusion-Tolerant Replication under Attack

    ERIC Educational Resources Information Center

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  2. Survival of child after lion attack

    PubMed Central

    Dabdoub, Carlos F.; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named “Bang-Bang”, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of the literature. Case Description: We report the case of an 8-year-old boy who was attacked by a lion during a circus show. The patient underwent an emergent neurosurgical procedure, including parietal craniectomy, cleaning, and extensive surgical debridement of the wounds. Despite open severe head trauma with brain damage as well as thorax and abdomen trauma, the child survived, with minimal neurological sequelae. Conclusions: Human injury resulting from encounters with nondomesticated animals is increasingly rising throughout the world. This case highlights the potentially violent and aggressive nature of wild mammals held in captivity. Unusual wild animal attacks and the complex injuries that result may pose a challenge to surgeons practicing in resource-limited settings. In this sense, the best treatment in the mentioned case is the prevention of human injuries by these animals. In addition, to attend to these infrequent cases, the authors emphasize the importance of a multidisciplinary approach to achieve the best cosmetic and functional results. PMID:23869277

  3. Association between Terror Attacks and Suicide Attempts

    ERIC Educational Resources Information Center

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  4. Fly-by-Wireless Update

    NASA Technical Reports Server (NTRS)

    Studor, George

    2010-01-01

    The presentation reviews what is meant by the term 'fly-by-wireless', common problems and motivation, provides recent examples, and examines NASA's future and basis for collaboration. The vision is to minimize cables and connectors and increase functionality across the aerospace industry by providing reliable, lower cost, modular, and higher performance alternatives to wired data connectivity to benefit the entire vehicle/program life-cycle. Focus areas are system engineering and integration methods to reduce cables and connectors, vehicle provisions for modularity and accessibility, and a 'tool box' of alternatives to wired connectivity.

  5. Formation Flying and Deformable Instruments

    NASA Astrophysics Data System (ADS)

    Rio, Yvon

    2009-05-01

    Astronomers have always attempted to build very stable instruments. They fight all that can cause mechanical deformation or image motion. This has led to well established technologies (autoguide, active optics, thermal control, tip/tilt correction), as well as observing methods based on the use of controlled motion (scanning, micro scanning, shift and add, chopping and nodding). Formation flying disturbs this practice. It is neither possible to reduce the relative motion to very small amplitudes, nor to control it at will. Some impacts on Simbol-X instrument design, and operation are presented.

  6. Formation Flying and Deformable Instruments

    SciTech Connect

    Rio, Yvon

    2009-05-11

    Astronomers have always attempted to build very stable instruments. They fight all that can cause mechanical deformation or image motion. This has led to well established technologies (autoguide, active optics, thermal control, tip/tilt correction), as well as observing methods based on the use of controlled motion (scanning, micro scanning, shift and add, chopping and nodding). Formation flying disturbs this practice. It is neither possible to reduce the relative motion to very small amplitudes, nor to control it at will. Some impacts on Simbol-X instrument design, and operation are presented.

  7. Studies of Phlebotomine Sand Flies.

    DTIC Science & Technology

    1979-08-31

    Brazil. 2. Lutzomyia ( Trichophoromyia ) n. sp. Acta Amazonica (in press). 5 PERSONNEL SUPPORTED ON PROJECT D.G. Young, Ph.D., Assistant Research...Fly Lutzomyia Phlebo tominae Leishmaniasis 2. AssrN ACr (M.mA& am ree "mi N nFeey ad Identify by block number) The Technical Bulletin on the...Two other papers, based on field work near Manaus, Brazil in 1979, are in press. A proven vector of leishmania- sis, Lutzomyia wellcomei, and 39 other

  8. Error and attack vulnerability of temporal networks

    NASA Astrophysics Data System (ADS)

    Trajanovski, S.; Scellato, S.; Leontiadis, I.

    2012-06-01

    The study of real-world communication systems via complex network models has greatly expanded our understanding on how information flows, even in completely decentralized architectures such as mobile wireless networks. Nonetheless, static network models cannot capture the time-varying aspects and, therefore, various temporal metrics have been introduced. In this paper, we investigate the robustness of time-varying networks under various failures and intelligent attacks. We adopt a methodology to evaluate the impact of such events on the network connectivity by employing temporal metrics in order to select and remove nodes based on how critical they are considered for the network. We also define the temporal robustness range, a new metric that quantifies the disruption caused by an attack strategy to a given temporal network. Our results show that in real-world networks, where some nodes are more dominant than others, temporal connectivity is significantly more affected by intelligent attacks than by random failures. Moreover, different intelligent attack strategies have a similar effect on the robustness: even small subsets of highly connected nodes act as a bottleneck in the temporal information flow, becoming critical weak points of the entire system. Additionally, the same nodes are the most important across a range of different importance metrics, expressing the correlation between highly connected nodes and those that trigger most of the changes in the optimal information spreading. Contrarily, we show that in randomly generated networks, where all the nodes have similar properties, random errors and intelligent attacks exhibit similar behavior. These conclusions may help us in design of more robust systems and fault-tolerant network architectures.

  9. Susceptibility of low-chill blueberry cultivars to oriental fruit fly, mediterranean fruit fly, and melon fly (Diptera: Tephritidae)

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Forced infestation studies were conducted to determine if fruits of southern highbush blueberries (Vaccinium corymbosum L. hybrids) are hosts for three invasive tephritid fruit flies. Fruits of 17 blueberry cultivars were exposed to gravid female flies of Bactrocera dorsalis (Hendel) (oriental frui...

  10. Assembly states of FliM and FliG within the flagellar switch complex.

    PubMed

    Sircar, Ria; Borbat, Peter P; Lynch, Michael J; Bhatnagar, Jaya; Beyersdorf, Matthew S; Halkides, Christopher J; Freed, Jack H; Crane, Brian R

    2015-02-27

    At the base of the bacterial flagella, a cytoplasmic rotor (the C-ring) generates torque and reverses rotation sense in response to stimuli. The bulk of the C-ring forms from many copies of the proteins FliG, FliM, and FliN, which together constitute the switch complex. To help resolve outstanding issues regarding C-ring architecture, we have investigated interactions between FliM and FliG from Thermotoga maritima with X-ray crystallography and pulsed dipolar ESR spectroscopy (PDS). A new crystal structure of an 11-unit FliG:FliM complex produces a large arc with a curvature consistent with the dimensions of the C-ring. Previously determined structures along with this new structure provided a basis to test switch complex assembly models. PDS combined with mutational studies and targeted cross-linking reveal that FliM and FliG interact through their middle domains to form both parallel and antiparallel arrangements in solution. Residue substitutions at predicted interfaces disrupt higher-order complexes that are primarily mediated by contacts between the C-terminal domain of FliG and the middle domain of a neighboring FliG molecule. Spin separations among multi-labeled components fit a self-consistent model that agree well with electron microscopy images of the C-ring. An activated form of the response regulator CheY destabilizes the parallel arrangement of FliM molecules to perturb FliG alignment in a process that may reflect the onset of rotation switching. These data suggest a model of C-ring assembly in which intermolecular contacts among FliG domains provide a template for FliM assembly and cooperative transitions.

  11. FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks

    DTIC Science & Technology

    2011-11-23

    Constant Bit Rate (CBR), Shrew [14], and covert [15] attacks) and by comparing the FLoc results with those of other approaches (e.g., Pushback [5...Bit Rate (CBR) attack (Fig. 10 6(b)), and a Shrew attack (Fig. 6(c)) [6]. The aim of the high- population TCP attack is to reduce the bandwidth of...and are rate-limited accordingly. In the Shrew attack, each attack source sends 2.0 Mbps traffic only during 0.25RTT seconds within an interval of

  12. FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks

    DTIC Science & Technology

    2011-11-23

    Constant Bit Rate (CBR), Shrew [14], and covert [15] attacks) and by comparing the FLoc results with those of other approaches (e.g., Pushback [5...Bit Rate (CBR) attack (Fig. 10 6(b)), and a Shrew attack (Fig. 6(c)) [6]. The aim of the high- population TCP attack is to reduce the bandwidth of...MTDs and are rate-limited accordingly. In the Shrew attack, each attack source sends 2.0 Mbps traffic only during 0.25RTT seconds within an interval of

  13. FlyBase: a Drosophila database. The FlyBase consortium.

    PubMed Central

    Gelbart, W M; Crosby, M; Matthews, B; Rindone, W P; Chillemi, J; Russo Twombly, S; Emmert, D; Ashburner, M; Drysdale, R A; Whitfield, E; Millburn, G H; de Grey, A; Kaufman, T; Matthews, K; Gilbert, D; Strelets, V; Tolstoshev, C

    1997-01-01

    FlyBase is a database of genetic and molecular data concerning Drosophila. FlyBase is maintained as a relational database (in Sybase) and is made available as html documents and flat files. The scope of FlyBase includes: genes, alleles (and phenotypes), aberrations, transposons, pointers to sequence data, clones, stock lists, Drosophila workers and bibliographic references. The Encyclopedia of Drosophila is a joint effort between FlyBase and the Berkeley Drosophila Genome Project which integrates FlyBase data with those from the BDGP. PMID:9045212

  14. Vulnerability of impulse attack-free four random phase mask cryptosystems to chosen-plaintext attack

    NASA Astrophysics Data System (ADS)

    Li, Tuo; Shi, Yishi

    2016-03-01

    An attack-free four random phase mask cryptosystem is breached in the paper. The decryption key of the system can be easily accessed by the opponent by using a new type of powerful three-dimensional phase retrieval method. Our result, to the best of our knowledge, is the first work to show this security flaw in the attack-free four random phase mask cryptosystem. Meanwhile, a set of numerical simulations is provided to demonstrate the robustness of the presented method.

  15. [Emergency procedures for taking care of the victims of bomb attacks: logistical and medical aspects].

    PubMed

    Giard, R W M; Overbeke, A J P M

    2006-07-08

    In The Netherlands the threat of terrorist attacks also exist. Both doctors and hospitals alike should be prepared for such attacks both on the logistical as well as the medical level. Most terrorist attacks are carried out with explosives. This results in many victims and in cases of explosions in closed or semi-closed areas, often results in complex medical problems in many of the victims. An explosion that occurs as the result ofa bomb detonating can result in 4 patterns of injury: the primary explosion injury caused by the pressure of the blast, the secondary injuries caused by flying debris, the tertiary injuries caused by the explosion wind, and the quaternary caused by heat and fire. Common injuries seen following an explosion include: lung damage, neurological damage, abdominal injuries, bone fractures and skeletal damage and crush-syndrome. The triage occurs at the site of the explosion as well as on arrival in hospital. One especially important aspect of this is the sorting and selecting between victims who are likely to develop complex problems and who therefore need to receive aggressive treatment in a specially equipped centre and those patients for whom the nearest emergency department will suffice their needs. The triage should be repeated considering the possibility that initial estimates on these points may have been wrong. Epidemiological research should be carried out for each attack in order to make an inventory of the number of victims, the injuries incurred, the assessment of the effects of the medical help received and an assessment of the effectiveness of the total aid received.

  16. 14 CFR 121.549 - Flying equipment.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Flying equipment. 121.549 Section 121.549 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR CARRIERS..., FLAG, AND SUPPLEMENTAL OPERATIONS Flight Operations § 121.549 Flying equipment. (a) The pilot...

  17. 14 CFR 121.549 - Flying equipment.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Flying equipment. 121.549 Section 121.549 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR CARRIERS..., FLAG, AND SUPPLEMENTAL OPERATIONS Flight Operations § 121.549 Flying equipment. (a) The pilot...

  18. 14 CFR 121.549 - Flying equipment.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Flying equipment. 121.549 Section 121.549 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR CARRIERS..., FLAG, AND SUPPLEMENTAL OPERATIONS Flight Operations § 121.549 Flying equipment. (a) The pilot...

  19. 14 CFR 121.549 - Flying equipment.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Flying equipment. 121.549 Section 121.549 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR CARRIERS..., FLAG, AND SUPPLEMENTAL OPERATIONS Flight Operations § 121.549 Flying equipment. (a) The pilot...

  20. 14 CFR 121.549 - Flying equipment.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Flying equipment. 121.549 Section 121.549 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR CARRIERS..., FLAG, AND SUPPLEMENTAL OPERATIONS Flight Operations § 121.549 Flying equipment. (a) The pilot...

  1. Testing for Mutagens Using Fruit Flies.

    ERIC Educational Resources Information Center

    Liebl, Eric C.

    1998-01-01

    Describes a laboratory employed in undergraduate teaching that uses fruit flies to test student-selected compounds for their ability to cause mutations. Requires no prior experience with fruit flies, incorporates a student design component, and employs both rigorous controls and statistical analyses. (DDR)

  2. Physicochemical characterization of Spanish fly ashes

    SciTech Connect

    Querol, X.; Umana, J.C.; Alastuey, A.; Bertrana, C.; Lopez-Soler, A.; Plana, F.

    1999-12-01

    This article summarizes the results obtained from the physical, chemical, and mineralogical characterization of 14 fly ash samples. Major features that influence the utilization of each fly ash for zeolite synthesis are evidenced, and several fly ash types were selected as potential high-quality starting material for zeolite synthesis and ceramic applications. The main parameters influencing this selection were relatively small grain size; high Al and Si contents; high glass content; low CaO, S, and Fe contents; and relatively low heavy metal concentration. The Compostilla and Cou He fly ashes have high potential applications because of the low content of major impurities (such as Ca, Fe, and S) and the low content of soluble hazardous elements. The Espiel, Escucha, Los Barrios, As Pontes, Soto de Ribera, Meirama, Narcea, and Teruel fly ashes have important application potential, but this potential is slightly limited by the intermediate content of nonreactive impurities, such as Fe and Ca. The La Robla fly ash is of moderate interest, since the relatively high Ca and Fe oxide contents may reduce its potential applications. Finally, the Puertollano fly ash also has limited application because of the very high concentration of some heavy metals such as As, Cd, Ge, Hg, Pb, and Zn. From a mineralogical point of view, the Compostilla, Espiel, and Soto de Ribera fly ashes show the highest aluminum-silicate glass content and, consequently, the highest industrial application potential.

  3. Neoplasms identified in free-flying birds

    USGS Publications Warehouse

    Siegfried, L.M.

    1983-01-01

    Nine neoplasms were identified in carcasses of free-flying wild birds received at the National Wildlife Health Laboratory; gross and microscopic descriptions are reported herein. The prevalence of neoplasia in captive and free-flying birds is discussed, and lesions in the present cases are compared with those previously described in mammals and birds.

  4. Semiochemical-based technologies for fly management

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Filth flies are important insect pests that have caused over billions of dollars damage in animal production, food contamination and disease transmitting. The present presentation reports our recent findings on the development of filth fly control using semiochemical-based technologies to reduce the...

  5. Horn fly, Haematobia irritans irritans L., overwintering

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Putative diapause in the horn fly, Haematobia irritans irritans (L.), has frequently been assumed as the pest's mode for overwinter survival from the tropics to temperate regions of northern and southern hemispheres. Examination of the scientific literature indicates that putative horn fly diapause ...

  6. Biological Control of Olive Fruit Fly

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Domestication of olive fruit, Olea europaea L., produced a better host for olive fruit fly, Bactrocera oleae (Gmelin), than wild olives, but fruit domestication reduced natural enemy efficiency. Important factors for selection of natural enemies for control of olive fruit fly include climate matchi...

  7. Requirements for satisfactory flying qualities of airplanes

    NASA Technical Reports Server (NTRS)

    Gilruth, R R

    1943-01-01

    Report discusses the results of an analysis of available data to determine what measured characteristics are significant in defining satisfactory flying qualities, what characteristics are reasonable to require of an airplane, and what influence the various design features have on the observed flying qualities.

  8. Passive baited sequential filth fly trap

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Filth fly control measures may be optimized with a better understanding of fly population dynamics measured throughout the day. We describe the modification of a commercial motorized sequential mosquito trap to accept liquid odorous bait and leverage a classic inverted cone design to passively confi...

  9. Temperature Effects on Olive Fruit Fly Infestation in the FlySim Cellular Automata Model

    NASA Astrophysics Data System (ADS)

    Bruno, Vincenzo; Baldacchini, Valerio; di Gregorio, Salvatore

    FlySim is a Cellular Automata model developed for simulating infestation of olive fruit flies (Bactrocera Oleae) on olive (Olea europaea) groves. The flies move into the groves looking for mature olives where eggs are spawn. This serious agricultural problem is mainly tackled by using chemical agents at the first signs of the infestation, but organic productions with no or few chemicals are strongly requested by the market. Oil made with infested olives is poor in quality, nor olives are suitable for selling in stores. The FlySim model simulates the diffusion of flies looking for mature olives and the growing of flies due to atmospheric conditions. Foreseeing an infestation is the best way to prevent it and to reduce the need of chemicals in agriculture. In this work we investigated the effects of temperature on olive fruit flies and resulting infestation during late spring and summer.

  10. ACAA fly ash basics: quick reference card

    SciTech Connect

    2006-07-01

    Fly ash is a fine powdery material created when coal is burned to generate electricity. Before escaping into the environment via the utility stacks, the ash is collected and may be stored for beneficial uses or disposed of, if necessary. The use of fly ash provides environmental benefits, such as the conservation of natural resources, the reduction of greenhouse gas emissions and eliminating the needed for ash disposal in landfills. It is also a valuable mineral resource that is used in construction and manufacturing. Fly ash is used in the production of Portland cement, concrete, mortars and stuccos, manufactured aggregates along with various agricultural applications. As mineral filler, fly ash can be used for paints, shingles, carpet backing, plastics, metal castings and other purposes. This quick reference card is intended to provide the reader basic source, identification and composition, information specifically related to fly ash.

  11. Flightless Flies: Drosophila models of neuromuscular disease

    PubMed Central

    Lloyd, Thomas E.; Taylor, J. Paul

    2010-01-01

    The fruit fly, Drosophila melanogaster, has a long and rich history as an important model organism for biologists. In particular, study of the fruit fly has been essential to much of our fundamental understanding of the development and function of the nervous system. In recent years, studies using fruit flies have provided important insights into the pathogenesis of neurodegenerative and neuromuscular diseases. Fly models of spinal muscular atrophy, spinobulbar muscular atrophy, myotonic dystrophy, dystrophinopathies and other inherited neuromuscular diseases recapitulate many of the key pathologic features of the human disease. The ability to perform genetic screens holds promise for uncovering the molecular mechanisms of disease, and indeed, for identifying novel therapeutic targets. This review will summarize recent progress in developing fly models of neuromuscular diseases and will emphasize the contribution that Drosophila has made to our understanding of these diseases. PMID:20329357

  12. Optimal Attack Strategy in Random Scale-Free Networks Based on Incomplete Information

    NASA Astrophysics Data System (ADS)

    Li, Jun; Wu, Jun; Li, Yong; Deng, Hong-Zhong; Tan, Yue-Jin

    2011-06-01

    We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes. We investigate the optimal attack strategy in random scale-free networks both analytically and numerically. We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies. It is found that when the attack intensity is small, the attacker should attack more nodes in the “white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the “black area" in which we can not obtain attack information. Moreover, we show that there is an inflection point in the curve of optimal attack proportion. For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.

  13. High Pain Tolerance Tied to 'Silent' Heart Attack Risk

    MedlinePlus

    ... 162666.html High Pain Tolerance Tied to 'Silent' Heart Attack Risk Unusual symptoms include upper back or jaw ... be at increased risk of having a "silent" heart attack, a new study hints. Chest pain is one ...

  14. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    NASA Astrophysics Data System (ADS)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  15. How Will I Recover from My Heart Attack?

    MedlinePlus

    ... Understand Your Risk for Congenital Heart Defects Symptoms & Diagnosis of Congenital Heart Defects Care & Treatment for Congenital Heart Defects Congenital Heart Defects Tools & Resources Heart Attack About Heart Attacks Warning Signs of a Heart ...

  16. 5 Ways Women Can Cut Their Heart Attack Risk

    MedlinePlus

    ... 163609.html 5 Ways Women Can Cut Their Heart Attack Risk Heart disease is leading cause of death ... than in men. Know the symptoms of a heart attack -- which differ from those in men -- and include ...

  17. Aspirin to Prevent a First Heart Attack or Stroke

    MedlinePlus

    ... NHLBI on Twitter. Aspirin to Prevent a First Heart Attack or Stroke Also known as aspirin primary prevention. ... if I’m taking aspirin to prevent another heart attack or stroke? The information discussed in Who may ...

  18. Calcium Buildup in Young Arteries May Signal Heart Attack Risk

    MedlinePlus

    ... html Calcium Buildup in Young Arteries May Signal Heart Attack Risk Even small amount in 30s, 40s appears ... their arteries are already at risk of a heart attack, a new study finds. Among those 32 to ...

  19. Calcium Supplements: A Risk Factor for Heart Attack?

    MedlinePlus

    ... that calcium supplements may increase the risk of heart attack. Is this true? Answers from Rekha Mankad, M. ... calcium supplements may increase your risk of a heart attack. Other doctors believe that calcium supplements have little ...

  20. Trans Fat Bans May Have Cut Heart Attack, Stroke Rate

    MedlinePlus

    ... 164605.html Trans Fat Bans May Have Cut Heart Attack, Stroke Rate Pending FDA regulations should remove nearly ... Could the contents of your cupcake affect your heart attack risk? It seems so, according to a new ...

  1. Natural Parasitism in Fruit Fly (Diptera: Tephritidae) Populations in Disturbed Areas Adjacent to Commercial Mango Orchards in Chiapas and Veracruz, Mexico.

    PubMed

    Montoya, Pablo; Ayala, Amanda; López, Patricia; Cancino, Jorge; Cabrera, Héctor; Cruz, Jassmin; Martinez, Ana Mabel; Figueroa, Isaac; Liedo, Pablo

    2016-04-01

    To determine the natural parasitism in fruit fly populations in disturbed areas adjacent to commercial mango orchards in the states of Chiapas and Veracruz, Mexico, we recorded over one year the fruit fly-host associations, fly infestation, and parasitism rates in backyard orchards and patches of native vegetation. We also investigated the relationship between fruit size, level of larval infestation, and percent of parasitism, and attempted to determine the presence of superparasitism. The most recurrent species in trap catches was Anastrepha obliqua (Macquart), followed by Anastrepha ludens (Loew), in both study zones. The fruit infestation rates were higher in Chiapas than in Veracruz, with A. obliqua again being the most conspicuous species emerging from collected fruits. The diversity of parasitoids species attacking fruit fly larvae was greater in Chiapas, with a predominance of Doryctobracon areolatus (Szépligeti) in both sites, although the exotic Diachasmimorpha longicaudata (Ashmead) was well established in Chiapas. Fruit size was positively correlated with the number of larvae per fruit, but this relationship was not observed in the level of parasitism. The number of oviposition scars was not related to the number of immature parasitoids inside the pupa of D. areolatus emerging from plum fruits. Mass releases of Di. longicaudata seem not to affect the presence or prevalence of the native species. Our findings open new research scenarios on the role and impact of native parasitoid species attacking Anastrepha flies that can contribute to the development of sound strategies for using these species in projects for augmentative biological control.

  2. Making MANET secured against malicious attack

    NASA Astrophysics Data System (ADS)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  3. Two fatal tiger attacks in zoos.

    PubMed

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  4. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  5. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    NASA Astrophysics Data System (ADS)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  6. Indicators of acute pain and fly avoidance behaviors in Holstein calves following tail-docking.

    PubMed

    Eicher, S D; Dalley, J W

    2002-11-01

    Previous work showed that the banding process of docking minimally affected mature cows' behavior and physiology, but cutting off the necrotic tail increased haptoglobin. Additionally the docked cows had more flies on the rear legs and exhibited more fly avoidance behaviors. Because many producers dock young calves while they are in hutches where fly problems are more pronounced, we investigated changes in behavior and physiology of young calves following docking by banding. Twenty calves (3 to 5 wk of age) were assigned to a docked or control group, at each of two locations (Indiana and Wisconsin). After applying a band to dock the tail, calves were tested every 15 min for sensitivity to heat below the band at the Indiana location. Calf behavior was recorded for 2 h postbanding and analyzed continuously for that period. After 3 wk, tails were removed and then 1 wk later, fly counts and fly avoidance behaviors were observed at both locations. Tails were sensitive to heat below the banding site, for 60 to 120 min postbanding (mean 87 min). Banded calves were more active than control calves during the 2 h following banding. Percentage of time spent lying was greater for control calves, and the percentage of time spent walking was greater for docked than control calves. More importantly, movements of the head to touch the tail were increased for banded calves (eight-fold more movements). Fly avoidance behaviors directed toward the rear of the calf were evident at noon or in the afternoon. Ear twitches were more frequent for the docked calves and less frequent in the morning for all calves. Licking was more frequent for the docked calves at 1200 and 1600 h. Tail swings were most frequent at 1200 and more frequent for control calves. Two acute phase proteins, haptoglobin and alpha1 acid-glycoprotein, were not different at any time. In this study, calves that were banded at 3-wk-of-age showed behaviors indicative of discomfort for 2 h, were attacked by more flies, and

  7. Replication Does Survive Information Warfare Attacks

    DTIC Science & Technology

    1997-01-01

    warfare, storage jamming, unauthorized modification, Trojan horse 1 INTRODUCTION Ammann, Jajodia, McCollum, and Blaustein define information warfare as the...information warfare, and we adopt the latter term. To provide context, Amman et al. specifically do not consider Trojan horses within the database system...called internal jammers (McDermott and Goldschalg, 1996b)), but instead consider a wide range of attacks other than Trojan horses . Both groups agree that

  8. Fighting Through a Logistics Cyber Attack

    DTIC Science & Technology

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...of operations required to support the war fighter and its heavy reliance on unclassified networks. This research focuses on The Global Air...documents to investigate the policies in place that provide guidance for the strategies and tactics, techniques and procedures (TTPs) that counter

  9. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  10. Computer Network Attack: An Operational Tool?

    DTIC Science & Technology

    2007-11-02

    Spectrum of Conflict, Cyber Warfare , Preemptive Strike, Effects Based Targeting. 15. Abstract: Computer Network Attack (CNA) is defined as...great deal of attention as the world’s capabilities in cyber - warfare grow. 11 Although addressing the wide ranging legal aspects of CNA is beyond the...the notion of cyber - warfare has not yet developed to the point that international norms have been established.15 These norms will be developed in

  11. America under attack: ACHE affiliates respond.

    PubMed

    Lanser, Ellen G

    2002-01-01

    In the midst of the horror and uncertainty that swept over America on September 11, the healthcare sector helped to keep our nation firmly anchored. Within moments of the terrorist attacks, healthcare organizations in New York, Washington, D.C., and the surrounding areas responded swiftly, calmly, and effectively. Many of these hospitals are led by ACHE affiliates. Following are their accounts of that day, lessons they learned, and plans for the future.

  12. Strategic Attack of National Electrical Systems

    DTIC Science & Technology

    1994-10-01

    subsystem the step-up transformers are the most lu­ crative targets. According to a study by the Office of Technology Assessment (OTA), the step-up...the Army Air Forces, to analyze the dete­ rioration of the German economy through bombing and determine the “date when deterioration will have...German economy , and steel production essential to war production, these industries would only be slightly affected by an attack on power facilities

  13. Enhancing network robustness against malicious attacks.

    PubMed

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider et al., Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (R(n)), we propose a link-robustness index (R(l)). We show that solely enhancing R(n) cannot guarantee the improvement of R(l). Moreover, the structure of an R(l)-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the R(n) and R(l) into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  14. Enhancing network robustness against malicious attacks

    NASA Astrophysics Data System (ADS)

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider , Proc. Natl. Acad. Sci. USAPNASA60027-842410.1073/pnas.1009440108 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (Rn), we propose a link-robustness index (Rl). We show that solely enhancing Rn cannot guarantee the improvement of Rl. Moreover, the structure of an Rl-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the Rn and Rl into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  15. Security of quantum cryptography against individual attacks

    NASA Astrophysics Data System (ADS)

    Slutsky, Boris A.; Rao, Ramesh; Sun, Pang-Chen; Fainman, Y.

    1998-04-01

    An attempt to eavesdrop on a quantum cryptographic channel reveals itself through errors it inevitably introduces into the transmission. We investigate the relationship between the induced error rate and the maximum amount of information the eavesdropper can extract, in both the two-state B92 [B92 refers to the work of C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992)] and the four-state BB84 [BB84 refers to the work of C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175-179] quantum cryptographic protocols. In each case, the optimal eavesdropping method that on average yields the most information for a given error rate is explicitly constructed. Analysis is limited to eavesdropping strategies where each bit of the quantum transmission is attacked individually and independently from other bits. Subject to this restriction, however, we believe that all attacks not forbidden by physical laws are covered. Unlike previous work, the eavesdropper's advantage is measured in terms of Renyi (rather than Shannon) information, and with respect only to bits received error-free by Bob (rather than all bits). This alters both the maximum extractable information and the optimal eavesdropping attack. The result can be used directly at the privacy amplification stage of the protocol to accomplish secure communication over a noisy channel.

  16. Major dog attack injuries in children.

    PubMed

    Wiseman, N E; Chochinov, H; Fraser, V

    1983-10-01

    Children are frequently admitted to a hospital with injuries sustained as a result of being attacked by a dog. Over a 5-year period (1977 to 1981), 57 such patients have been treated at the Winnipeg Children's Hospital. Half of the dog attack victims were 5 years or younger with injuries occurring more often in boys (55%). The majority of patients (95%) sustained puncture wounds and lacerations to the face (77%) and extremities (23%). In three of the cases, the dog attack victims presented with peritonitis secondary to bowel perforation and were treated successfully. A fourth child died as a result of his injuries prior to reaching the hospital. In the past, much attention has been focused on soft tissue injuries and their cosmetic repair. It is also important to recognize that the small child is particularly vulnerable to dog maulings from which the injuries sustained may be life threatening or lethal. Prevention seems to be the only rational approach to solving this problem.

  17. Fly Photoreceptors Encode Phase Congruency

    PubMed Central

    Friederich, Uwe; Billings, Stephen A.; Hardie, Roger C.; Juusola, Mikko; Coca, Daniel

    2016-01-01

    More than five decades ago it was postulated that sensory neurons detect and selectively enhance behaviourally relevant features of natural signals. Although we now know that sensory neurons are tuned to efficiently encode natural stimuli, until now it was not clear what statistical features of the stimuli they encode and how. Here we reverse-engineer the neural code of Drosophila photoreceptors and show for the first time that photoreceptors exploit nonlinear dynamics to selectively enhance and encode phase-related features of temporal stimuli, such as local phase congruency, which are invariant to changes in illumination and contrast. We demonstrate that to mitigate for the inherent sensitivity to noise of the local phase congruency measure, the nonlinear coding mechanisms of the fly photoreceptors are tuned to suppress random phase signals, which explains why photoreceptor responses to naturalistic stimuli are significantly different from their responses to white noise stimuli. PMID:27336733

  18. Fruit Flies in Biomedical Research

    PubMed Central

    Wangler, Michael F.; Yamamoto, Shinya; Bellen, Hugo J.

    2015-01-01

    Many scientists complain that the current funding situation is dire. Indeed, there has been an overall decline in support in funding for research from the National Institutes of Health and the National Science Foundation. Within the Drosophila field, some of us question how long this funding crunch will last as it demotivates principal investigators and perhaps more importantly affects the long-term career choice of many young scientists. Yet numerous very interesting biological processes and avenues remain to be investigated in Drosophila, and probing questions can be answered fast and efficiently in flies to reveal new biological phenomena. Moreover, Drosophila is an excellent model organism for studies that have translational impact for genetic disease and for other medical implications such as vector-borne illnesses. We would like to promote a better collaboration between Drosophila geneticists/biologists and human geneticists/bioinformaticians/clinicians, as it would benefit both fields and significantly impact the research on human diseases. PMID:25624315

  19. Treatment of fly ash for use in concrete

    DOEpatents

    Boxley, Chett [Park City, UT

    2012-05-15

    A process for treating fly ash to render it highly usable as a concrete additive. A quantity of fly ash is obtained that contains carbon and which is considered unusable fly ash for concrete based upon foam index testing. The fly ash is mixed with a quantity of spray dryer ash (SDA) and water to initiate a geopolymerization reaction and form a geopolymerized fly ash. The geopolymerized fly ash is granulated. The geopolymerized fly ash is considered usable fly ash for concrete according to foam index testing. The geopolymerized fly ash may have a foam index less than 40%, and in some cases less than 20%, of the foam index of the untreated fly ash. An optional alkaline activator may be mixed with the fly ash and SDA to facilitate the geopolymerization reaction. The alkaline activator may contain an alkali metal hydroxide, carbonate, silicate, aluminate, or mixtures thereof.

  20. Treatment of fly ash for use in concrete

    DOEpatents

    Boxley, Chett [Park City, UT; Akash, Akash [Salt lake City, UT; Zhao, Qiang [Natick, MA

    2012-05-08

    A process for treating fly ash to render it highly usable as a concrete additive. A quantity of fly ash is obtained that contains carbon and which is considered unusable fly ash for concrete based upon foam index testing. The fly ash is mixed with an activator solution sufficient to initiate a geopolymerization reaction and for a geopolymerized fly ash. The geopolymerized fly ash is granulated. The geopolymerized fly ash is considered usable fly ash for concrete according to foam index testing. The geopolymerized fly ash may have a foam index less than 35% of the foam index of the untreated fly ash, and in some cases less than 10% of the foam index of the untreated fly ash. The activator solution may contain an alkali metal hydroxide, carbonate, silicate, aluminate, or mixtures thereof.

  1. Treatment of fly ash for use in concrete

    DOEpatents

    Boxley, Chett; Akash, Akash; Zhao, Qiang

    2013-01-08

    A process for treating fly ash to render it highly usable as a concrete additive. A quantity of fly ash is obtained that contains carbon and which is considered unusable fly ash for concrete based upon foam index testing. The fly ash is mixed with an activator solution sufficient to initiate a geopolymerization reaction and for a geopolymerized fly ash. The geopolymerized fly ash is granulated. The geopolymerized fly ash is considered usable fly ash for concrete according to foam index testing. The geopolymerized fly ash may have a foam index less than 35% of the foam index of the untreated fly ash, and in some cases less than 10% of the foam index of the untreated fly ash. The activator solution may contain an alkali metal hydroxide, carbonate, silicate, aluminate, or mixtures thereof.

  2. What Can We Learn?--The Algonquin Bear Attack.

    ERIC Educational Resources Information Center

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  3. Early Warning and Prediction of Interest Attacks and Exploits

    DTIC Science & Technology

    2005-09-01

    EARLY WARNING AND PREDICTION OF INTERNET ATTACKS AND EXPLOITS THESIS Brian P. Zeitz... EARLY WARNING AND PREDICTION OF INTERNET ATTACKS AND EXPLOITS THESIS Presented to the Faculty Department of Electrical and Computer...RELEASE; DISTRIBUTION UNLIMITED iv AFIT/GIA/ENG/05-06 EARLY WARNING AND PREDICTION OF INTERNET ATTACKS AND EXPLOITS

  4. FlyBase 101 – the basics of navigating FlyBase

    PubMed Central

    McQuilton, Peter; St. Pierre, Susan E.; Thurmond, Jim

    2012-01-01

    FlyBase (http://flybase.org) is the leading database and web portal for genetic and genomic information on the fruit fly Drosophila melanogaster and related fly species. Whether you use the fruit fly as an experimental system or want to apply Drosophila biological knowledge to another field of study, FlyBase can help you successfully navigate the wealth of available Drosophila data. Here, we review the FlyBase web site with novice and less-experienced users of FlyBase in mind and point out recent developments stemming from the availability of genome-wide data from the modENCODE project. The first section of this paper explains the organization of the web site and describes the report pages available on FlyBase, focusing on the most popular, the Gene Report. The next section introduces some of the search tools available on FlyBase, in particular, our heavily used and recently redesigned search tool QuickSearch, found on the FlyBase homepage. The final section concerns genomic data, including recent modENCODE (http://www.modencode.org) data, available through our Genome Browser, GBrowse. PMID:22127867

  5. A NASA study of the impact of technology on future sea based attack aircraft

    NASA Technical Reports Server (NTRS)

    Hahn, Andrew S.

    1992-01-01

    A conceptual aircraft design study was recently completed evaluating carrier-based, subsonic attack aircraft using contemporary and future technology assumptions. The study examined a configuration matrix that was made up of light and medium bomb loads, one and two man crews, internal and external weapons carriage, as well as conventional and flying wing planforms. Use of common technology assumptions, engine cycle simulation code, design mission, and consistent application of methods allow for direct comparison of the aircraft. This paper describes the design study ground rules and the aircraft designed. The aircraft descriptions include weights, dimensions, layout, design mission, design constraints, maneuver performance, and fallout mission performance. The strengths, and weaknesses of each aircraft are highlighted.

  6. Erodibility of fly ash-treated minesoils

    SciTech Connect

    Gorman, J.M.; Sencindiver, J.C.; Singh, R.N.

    1997-12-31

    Fly ash, a by-product of coal-fired power plants, has been used successfully in reclaiming adverse mine sites such as abandoned mine lands by improving minesoil chemical and physical properties. But, the fine sand-silt particle size of fly ash may make it more susceptible to detachment and transport by erosive processes. Furthermore, the high content of silt-size particles in fly ash may make it more susceptable to surface crust formation resulting in reduced infiltration and increased surface runoff and erosion. In the summer of 1989, fly ash/wood waste mixtures were surface applied on two separate mine sites, one with 10% slope and the other 20% slope, in central Preston County, West Virginia. Erosion rates were measured directly using the Linear Erosion/Elevation Measuring Instrument (LEMI). Erosion measurements were taken during the first two growing seasons on both sites. Erosion values were up to five times greater on the fly ash-treated minesoil than on the minesoil without fly ash cover. Mulching with wood chips reduced fly ash erosion to about one-half the loss of the unmulched plots. Erosion was related to both the amount and type of ground cover. Increased vegetative ground cover resulted in reduced erosion. Mosses and fungi appeared to provide better erosion protection than grass-legume cover.

  7. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  8. UFOs: What to Do?

    DTIC Science & Technology

    1968-11-01

    confronted with a perfectly new situation. Gustav Naan UFOs -- unidentified flying objects, or flying saucers as they are often called -- have been on...Nuremberg (1561) and Basel (1566), respectively. The psychologist, C. G. Jung , provides an analy- sis of the contents of the woodcuts in his interesting...Ages, Paul Thomas, Neville Spearman, London, 1966. 6. Flying Saucers - A Modern Myth, C. G. Jung , Harcourt, Brace & World New York, 1959 7. Sputnik

  9. Influence of habitat pattern on orientation during host fruit location in the tomato fruit fly, Neoceratitis cyanescens.

    PubMed

    Brévault, T; Quilici, S

    2007-12-01

    Fruit flies have evolved mechanisms using olfactory and visual signals to find and recognize suitable host plants. The objective of the present study was to determine how habitat patterns may assist fruit flies in locating host plants and fruit. The tomato fruit fly, Neoceratitis cyanescens (Bezzi), was chosen as an example of a specialized fruit fly, attacking plants of the Solanaceae family. A series of experiments was conducted in an outdoor field cage wherein flies were released and captured on sticky orange and yellow spheres displayed in pairs within or above potted host or non-host plants. Bright orange spheres mimicking host fruit were significantly more attractive than yellow spheres only when placed within the canopy of host plants and not when either within non-host plants or above both types of plants. Additional experiments combining sets of host and non-host plants in the same cage, or spraying leaf extract of host plant (bug weed) on non-host plants showed that volatile cues emitted by the foliage of host plants may influence the visual response of flies in attracting mature females engaged in a searching behaviour for a laying site and in assisting them to find the host fruit. Moreover, the response was specific to mature females with a high oviposition drive because starved mature females, immature females and males showed no significant preference for orange spheres. Olfactory signals emitted by the host foliage could be an indicator of an appropriate habitat, leading flies to engage in searching for a visual image.

  10. Attack or retreat: contrasted defensive tactics used by Cyprian honeybee colonies under attack from hornets.

    PubMed

    Papachristoforou, Alexandros; Rortais, Agnès; Sueur, Jérôme; Arnold, Gérard

    2011-02-01

    This study describes the tactics used by Cyprian honeybees (Apis mellifera cypria) to defend their colonies against hornet (Vespa orientalis orientalis) attacks. We use simulated hornet attacks and a combination of video recordings and image analysis to reveal, for the first time, contrasted intra-subspecies defensive tactics that operate at the colony level during predation. In some colonies, when attacked, the numbers of guards at the hive entrance increases rapidly to attack, engulf, and kill invading hornets. In other colonies, guards avoid conflicts with hornets by retreating gradually and by forming a defensive line of honeybees at the hive entrance. Retreater colonies have propolis walls at the hive entrances with small apertures that are too narrow to allow the hornet to access the hive and that therefore reinforces entrance protection. On the contrary, attacker colonies have propolis walls with large openings through which the hornet can pass; these bees block the hornet's access by intensively guarding the hive entrance. We experimentally destroy propolis walls to test whether colonies consistently rebuild walls with the same intrinsic characteristics and we also monitor the survival rate of each anti-predator tactic after massive natural predation by hornets.

  11. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    PubMed

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  12. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    PubMed Central

    Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature. PMID:24959606

  13. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  14. An Overview of Controls and Flying Qualities Technology on the F/A-18 High Alpha Research Vehicle

    NASA Technical Reports Server (NTRS)

    Pahle, Joseph W.; Wichman, Keith D.; Foster, John V.; Bundick, W. Thomas

    1996-01-01

    The NASA F/A-18 High Alpha Research Vehicle (HARV) has been the flight test bed of a focused technology effort to significantly increase maneuvering capability at high angles of attack. Development and flight test of control law design methodologies, handling qualities metrics, performance guidelines, and flight evaluation maneuvers are described. The HARV has been modified to include two research control effectors, thrust vectoring, and actuated forebody strakes in order to provide increased control power at high angles of attack. A research flight control system has been used to provide a flexible, easily modified capability for high-angle-of-attack research controls. Different control law design techniques have been implemented and flight-tested, including eigenstructure assignment, variable gain output feedback, pseudo controls, and model-following. Extensive piloted simulation has been used to develop nonlinear performance guide-lines and handling qualities criteria for high angles of attack. This paper reviews the development and evaluation of technologies useful for high-angle-of-attack control. Design, development, and flight test of the research flight control system, control laws, flying qualities specifications, and flight test maneuvers are described. Flight test results are used to illustrate some of the lessons learned during flight test and handling qualities evaluations.

  15. Flying Through Dust From Asteroids

    NASA Astrophysics Data System (ADS)

    Kohler, Susanna

    2016-11-01

    How can we tell what an asteroid is made of? Until now, weve relied on remote spectral observations, though NASAs recently launched OSIRIS-REx mission may soon change this by landing on an asteroid and returning with a sample.But what if we could learn more about the asteroids near Earth without needing to land on each one? It turns out that we can by flying through their dust.The aerogel dust collector of the Stardust mission. [NASA/JPL/Caltech]Ejected CluesWhen an airless body is impacted by the meteoroids prevalent throughout our solar system, ejecta from the body are flung into the space around it. In the case of small objects like asteroids, their gravitational pull is so weak that most of the ejected material escapes, forming a surrounding cloud of dust.By flying a spacecraft through this cloud, we could perform chemical analysis of the dust, thereby determining the asteroids composition. We could even capture some of the dust during a flyby (for example, by using an aerogel collector like in the Stardust mission) and bring it back home to analyze.So whats the best place to fly a dust-analyzing or -collecting spacecraft? To answer this, we need to know what the typical distribution of dust is around a near-Earth asteroid (NEA) a problem that scientists Jamey Szalay (Southwest Research Institute) and Mihly Hornyi (University of Colorado Boulder) address in a recent study.The colors show the density distribution for dust grains larger than 0.3 m around a body with a 10-km radius. The distribution is asymmetric, with higher densities on the apex side, shown here in the +y direction. [Szalay Hornyi 2016]Moon as a LaboratoryTo determine typical dust distributions around NEAs, Szalay and Hornyi first look at the distribution of dust around our own Moon, caused by the same barrage of meteorites wed expect to impact NEAs. The Moons dust cloud was measured in situ in 2013 and 2014 by the Lunar Dust Experiment (LDEX) on board the Lunar Atmosphere and Dust Environment

  16. Leaching characteristics of lead from melting furnace fly ash generated by melting of incineration fly ash.

    PubMed

    Okada, Takashi; Tomikawa, Hiroki

    2012-11-15

    This study investigated the effect of the chemical composition of incineration fly ash on the leaching characteristics of Pb from melting furnace fly ash generated by melting incineration fly ash. Melting furnace fly ash from both a real-scale melting process and lab-scale melting experiments was analyzed. In addition, the theoretical behavior of Cl that affects the leaching characteristics of Pb was simulated by a thermodynamic equilibrium calculation. Proportions of water-soluble Pb in the melting furnace fly ash were correlated with equivalent ratios of total Pb in the ash and Cl transferred to gas. The amount of Cl in the gas increased with an increase in the molar ratio of Cl to Na and K in the incineration fly ash. The thermodynamic calculation predicted that HCl generation is promoted by the increase in the molar ratio, and X-ray photoelectron spectroscopy indicated a possible presence of PbCl(2) in the melting furnace fly ash. These results implied that the formation of water-soluble PbCl(2) with HCl was affected by the relationships among the amounts of Na, K, and Cl in the incineration fly ash. This is highly significant in determining the leaching characteristics of Pb from the melting furnace fly ash.

  17. Tsetse fly microbiota: form and function

    PubMed Central

    Wang, Jingwen; Weiss, Brian L.; Aksoy, Serap

    2013-01-01

    Tsetse flies are the primary vectors of African trypanosomes, which cause Human and Animal African trypanosomiasis in 36 countries in sub-Saharan Africa. These flies have also established symbiotic associations with bacterial and viral microorganisms. Laboratory-reared tsetse flies harbor up to four vertically transmitted organisms—obligate Wigglesworthia, commensal Sodalis, parasitic Wolbachia and Salivary Gland Hypertrophy Virus (SGHV). Field-captured tsetse can harbor these symbionts as well as environmentally acquired commensal bacteria. This microbial community influences several aspects of tsetse's physiology, including nutrition, fecundity and vector competence. This review provides a detailed description of tsetse's microbiome, and describes the physiology underlying host-microbe, and microbe-microbe, interactions that occur in this fly. PMID:24195062

  18. MMS Spacecraft Transition to Tetrahedral Flying Formation

    NASA Video Gallery

    In the latter half of July 2015, the four satellites of the Magnetosphere Multi-scale (MMS) mission move into their tetrahedral formation flying configuration as part of the checkout for the scienc...

  19. NASA Is With You When You Fly

    NASA Video Gallery

    Aviation touches us. Even if you didn't fly today, something you needed did. Did you know that NASA-developed technology is on board every U.S. commercial aircraft and in every U.S. control tower? ...

  20. NASA Administrator Flies Dream Chaser Simulator

    NASA Video Gallery

    NASA Administrator Charlie Bolden had the opportunity to fly a simulated landing of the Sierra Nevada Corporation (SNC) Dream Chaser while touring the agency's Dryden Flight Research Center in Cali...

  1. X-48B: How Does it Fly?

    NASA Video Gallery

    Gary Cosentino, lead flight operations engineer at NASA's Dryden Flight Research Center, talks about what it's like to fly the remotely piloted test vehicle -- X-48B -- a new kind of aircraft that ...

  2. Fli-1 expression in malignant melanoma.

    PubMed

    Torlakovic, Emina E; Slipicevic, Ana; Flørenes, Vivi Ann; Chibbar, Richa; DeCoteau, John F; Bilalovic, Nurija

    2008-11-01

    Friend leukemia integration site 1 (Fli-1) has been reported as the first nuclear marker of endothelial differentiation; it is expressed in leukocytes and recently demonstrated in melanomas. Formalin-fixed, paraffin-embedded tissue sections from 97 melanomas including 69 cases of primary and 28 metastatic melanomas were evaluated by immunohistochemistry. Five melanoma cell lines were evaluated by Western blot and immunocytochemistry. Fli-1 expression was observed in all cell lines. Fli-1 expression was higher in metastatic than in primary tumors (r=0.208, p=0.041, Spearman correlation), it positively correlated with Ki-67 expression (r=0.233, p=0.022, Spearman correlation), and the presence of an ulcer in the primary tumor (r=0.267, p=0.030, Spearman correlation). Therefore, the expression of Fli-1 in malignant melanoma appears to be associated with biologically more aggressive tumors.

  3. Controlling roll perturbations in fruit flies

    PubMed Central

    Beatus, Tsevi; Guckenheimer, John M.; Cohen, Itai

    2015-01-01

    Owing to aerodynamic instabilities, stable flapping flight requires ever-present fast corrective actions. Here, we investigate how flies control perturbations along their body roll angle, which is unstable and their most sensitive degree of freedom. We glue a magnet to each fly and apply a short magnetic pulse that rolls it in mid-air. Fast video shows flies correct perturbations up to 100° within 30 ± 7 ms by applying a stroke-amplitude asymmetry that is well described by a linear proportional–integral controller. For more aggressive perturbations, we show evidence for nonlinear and hierarchical control mechanisms. Flies respond to roll perturbations within 5 ms, making this correction reflex one of the fastest in the animal kingdom. PMID:25762650

  4. The practical difficulties of commercial flying

    NASA Technical Reports Server (NTRS)

    Courtney, F T

    1924-01-01

    This paper relates some of the problems commercial aircraft companies have in attracting larger numbers of paying customers. The author discusses some remedies such as changing the public perception of flying as dangerous.

  5. Understanding How They Attack Your Weaknesses: CAPEC

    DTIC Science & Technology

    2011-05-01

    exploits ■ Capture the attacker’s perspective to aid software developers, acquirers and operators in improving the assurance profile of their software...development and secure operations The HS SEDI FFRDC is managed and operated by The MITRE Corporation for DHS. 5 Common Attack Pattern Enumeration and...patterns into an integrated enumeration that can be i l d ff i l l d b h icons stent y an e ect ve y everage y t e commun ty – Gives you an attacker’s

  6. Decision Support for Attack Submarine Commanders.

    DTIC Science & Technology

    1980-10-01

    AD-AO95 892 DECISION SCIENCE CONSORTIUM INC FALLS CHURCH VA F./e 12/2 DECISION SUPPORT FOR ATTACK SUBMARINE COMMANDERS. (U) OCT 80 M S COHEN, R V...BROWN N00014-80-C-0046 UNCLASSIFIED TR-8S-11 ML DECISIN IEN$CE CUIVSURTiUM, MrC. DECISION SUPPORT FOR A TTA CK SUBMARINE COMMANDERS Marvin S . Cohen and...on reverse) DDI ,o..ŕ 1473 EDITION OF I NOV 65 IS OISOLCTZ Unclassified S /N 0102-014-6601 1 SECURITY CLASIFICATION OF TNIS PAGE (10bon DW& tateo* 01

  7. Profiler-2000: Attacking the Insider Threat

    DTIC Science & Technology

    2005-09-01

    s/ JOSEPH CAMERA, Chief Information & Intelligence Exploitation Division Information Directorate REPORT...Approaches to undermining anomaly detectors………………………………9 3.3 Detection coverage of an anomaly detector………………………………….10 3.4 Deploying Exploits and Sensors...13 3.5 Where and how an attack manifests in the data……………………………...13 3.6 Manipulating the manifestation; modifying exploits

  8. Cyber Attack! Crime or Act of War?

    DTIC Science & Technology

    2011-04-13

    all of the other domains. A plans officer pointed out that if we used this scheme of defense in land warfare, an ― invasion of New Jersey would have...Tonkin (1965) or the 9/11 attacks (2001). Most do not require it as the facts on the ground make the action obvious such as Iraq‘s invasion of Kuwait...1990), Japan‘s bombing of Pearl Harbor (1941), and the North Korean invasion of South Korea (1950). Regardless if there is a formal investigation or

  9. Bobcat attack on a cottontail rabbit

    USGS Publications Warehouse

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  10. 76 FR 26654 - Movement of Hass Avocados From Areas Where Mediterranean Fruit Fly or South American Fruit Fly Exist

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-09

    ... Avocados From Areas Where Mediterranean Fruit Fly or South American Fruit Fly Exist AGENCY: Animal and... from Mediterranean fruit fly quarantined areas in the United States with a certificate if the fruit is... quarantine regulations to remove trapping requirements for Mediterranean fruit fly for Hass avocados...

  11. Fly ash beneficiation by carbon burnout

    SciTech Connect

    Cochran, J.W.; Boyd, T.J.

    1995-03-01

    The CBO process for fly ash beneficiation shows excellent potential. Values derived from avoided disposal costs, revenue from fly ash sales, environmental attributes and the ability to process 100% of the ash indicate the potential market for this process. Work has begun on the next phase of process development and commercialization and includes site specific application studies (technical and economic investigations for specific sites). Demonstration plant designs at approximately 100,000 TPY are being considered by several participating utilities.

  12. Measurement of Altitude in Blind Flying

    NASA Technical Reports Server (NTRS)

    Brombacher, W G

    1934-01-01

    In this note, instruments for measuring altitude and rate of change of altitude in blind flying and landing of aircraft and their performance are discussed. Of those indicating the altitude above ground level, the sonic altimeter is the most promising. Its present bulk, intermittent operation, and more or less unsatisfactory means of indication are serious drawbacks to its use. The sensitive type aneroid altimeter is also discussed and errors in flying at a pressure level and in landing are discussed in detail.

  13. Display Systems Dynamics Requirements for Flying Qualities

    DTIC Science & Technology

    1988-05-09

    augmentation of the aircraft dynamics by a control system has been studied extensively, with current and evolving standards in existence. Consideration of the...MOTIVATION AND OBJECTIVES Current and emerging military aircraft present a number of challenges with respect to ".." ensuring good flying qualities... current and emerging military aircraft and the often costly consequences of poor design with respect to flying qualifies, such guidelines should be

  14. High-temperature corrosion of UNS N10003 in molten Li2BeF4 (FLiBe) salt

    DOE PAGES

    Zheng, Guiqiu; Kelleher, Brian; He, Lingfeng; ...

    2015-07-30

    Here, corrosion testing of Hastelloy N in molten fluoride salt was performed in purified molten 27LiF-BeF2 (66-34mol%) (FLiBe) salt at 700°C for 1000 hours, in pure nickel and graphite capsules. In the nickel capsule tests, the near-surface region of the alloy exhibited an about 200 nm porous structure, an approximately 3.5 μm chromium depleted region, and MoSi2 precipitates. In tests performed in graphite capsules, the alloy samples gained weight due to the formation of a variety of Cr3C2, Cr7C3, Mo2C and Cr23C6, carbide phases on the surface and in the subsurface regions of the alloy. A Cr depleted region wasmore » observed in the near-surface region where Mo thermally diffused toward either surface or grain boundary, which induced approximately 1.4 μm Ni3Fe alloy layer in this region. The carbide containing layer extended to about 7 μm underneath the Ni3Fe layer. The presence of graphite dramatically changes the mechanisms of corrosion attack in Hastelloy N in molten FLiBe salt. Evaluated by in terms of the depth of attack, graphite clearly accelerates corrosion, but the results appear to indicate that the formation of Cr23C6 phase might stabilize the Cr and mitigate its dissolution in molten FLiBe salt.« less

  15. Antipredator behavior of the new mass-reared unisexual strain of the Mexican Fruit Fly.

    PubMed

    González-López, G I; Rao, D; Díaz-Fleischer, F; Orozco-Dávila, D; Pérez-Staples, D

    2016-06-01

    Tephritid pests controlled through the sterile insect technique (SIT) are mass-reared and subsequently released in affected areas. Several quality parameters are currently used to test adults, but none take into account interactions with a predator. When sterile males are released in the field, they will need to avoid predators until they reach sexual maturity and survive long enough to mate with wild females. Spiders are one of the most common predators that flies may encounter in release sites. In this study, we evaluated the antipredator behavior of a mass-reared sterile unisexual strain ('Tapachula-7') of the Mexican fruit fly Anastrepha ludens (Diptera: Tephritidae) against their spider predators. We sampled spiders in citrus trees to determine which families could be more common. We established the baseline activity rates of sterile Tapachula-7 (Tap-7) flies in comparison with wild flies. We also tested the behavior of the fertile and sterile bisexual strain and wild flies against hunting spiders (Family Salticidae) and orb building spiders (Family Tetragnathidae). We recorded 18 spider families, with Salticidae being the most dominant. Tap-7 flies diminished their activity in comparison with wild males at 1800 h but showed similar activity levels earlier in the day. When exposed to orb-web spiders (Leucauge venusta), Tap-7, fertile and sterile males from the bisexual strain had similar rates of survival, but Tap-7 males showed lower survival than wild males. Against hunting spiders (Phidippus audax), wild males had higher probability of defensive wing displays, but there was no difference in spider attack rates. In general, sterile Tap -7 males performed as well as males from the bisexual strain, although they had lower survival than wild males. This could be due to either mass-rearing and/or irradiation effects. We recommend the use of the defensive wing display behavior as a quality parameter and propose a rapid and effective method to evaluate fly

  16. Fruit flies and intellectual disability

    PubMed Central

    Bolduc, François V.; Tully, Tim

    2011-01-01

    Mental retardation—known more commonly nowadays as intellectual disability—is a severe neurological condition affecting up to 3% of the general population. As a result of the analysis of familial cases and recent advances in clinical genetic testing, great strides have been made in our understanding of the genetic etiologies of mental retardation. Nonetheless, no treatment is currently clinically available to patients suffering from intellectual disability. Several animal models have been used in the study of memory and cognition. Established paradigms in Drosophila have recently captured cognitive defects in fly mutants for orthologs of genes involved in human intellectual disability. We review here three protocols designed to understand the molecular genetic basis of learning and memory in Drosophila and the genes identified so far with relation to mental retardation. In addition, we explore the mental retardation genes for which evidence of neuronal dysfunction other than memory has been established in Drosophila. Finally, we summarize the findings in Drosophila for mental retardation genes for which no neuronal information is yet available. All in all, this review illustrates the impressive overlap between genes identified in human mental retardation and genes involved in physiological learning and memory. PMID:19182539

  17. How flies clean their eyes

    NASA Astrophysics Data System (ADS)

    Amador, Guillermo; Durand, Fabien; Mao, Wenbin; Alexeev, Alexander; Hu, David

    2013-11-01

    Flying insects face a barrage of foreign particles such as dust and pollen, which threaten to coat the insect's eyes and antennae, limiting their sensing abilities. In this study, we elucidate novel aerodynamic and elastic mechanisms by which insects keep these organs clean. The compound eye of many species of insects is covered by an array of short bristles, or setae, evenly spaced between each photoreceptor unit. Among these insect species, setae length is triple their spacing. We conduct numerical simulations and wind tunnel experiments using an insect eye mimic to show this critical setae length reduces shear rate at the eye surface by 80%. Thus, the setae create a stagnant zone in front of the eye, which diverts airflow to reduce deposition of particles. Setae can also act as springboards to catapult accumulated particles. In high speed videography of insects using their legs to clean themselves, we observe deflected setae hurling micron scale particles at accelerations over 100 times earth's gravity. The dual abilities of setae to divert airflow and catapult particles may motivate bio-inspired designs for dust-controlling lenses, sensors, and solar panels.

  18. Space shuttle flying qualities and criteria assessment

    NASA Technical Reports Server (NTRS)

    Myers, T. T.; Johnston, D. E.; Mcruer, Duane T.

    1987-01-01

    Work accomplished under a series of study tasks for the Flying Qualities and Flight Control Systems Design Criteria Experiment (OFQ) of the Shuttle Orbiter Experiments Program (OEX) is summarized. The tasks involved review of applicability of existing flying quality and flight control system specification and criteria for the Shuttle; identification of potentially crucial flying quality deficiencies; dynamic modeling of the Shuttle Orbiter pilot/vehicle system in the terminal flight phases; devising a nonintrusive experimental program for extraction and identification of vehicle dynamics, pilot control strategy, and approach and landing performance metrics, and preparation of an OEX approach to produce a data archive and optimize use of the data to develop flying qualities for future space shuttle craft in general. Analytic modeling of the Orbiter's unconventional closed-loop dynamics in landing, modeling pilot control strategies, verification of vehicle dynamics and pilot control strategy from flight data, review of various existent or proposed aircraft flying quality parameters and criteria in comparison with the unique dynamic characteristics and control aspects of the Shuttle in landing; and finally a summary of conclusions and recommendations for developing flying quality criteria and design guides for future Shuttle craft.

  19. The Killer Fly Hunger Games: Target Size and Speed Predict Decision to Pursuit.

    PubMed

    Wardill, Trevor J; Knowles, Katie; Barlow, Laura; Tapia, Gervasio; Nordström, Karin; Olberg, Robert M; Gonzalez-Bellido, Paloma T

    2015-09-01

    Predatory animals have evolved to optimally detect their prey using exquisite sensory systems such as vision, olfaction and hearing. It may not be so surprising that vertebrates, with large central nervous systems, excel at predatory behaviors. More striking is the fact that many tiny insects, with their miniscule brains and scaled down nerve cords, are also ferocious, highly successful predators. For predation, it is important to determine whether a prey is suitable before initiating pursuit. This is paramount since pursuing a prey that is too large to capture, subdue or dispatch will generate a substantial metabolic cost (in the form of muscle output) without any chance of metabolic gain (in the form of food). In addition, during all pursuits, the predator breaks its potential camouflage and thus runs the risk of becoming prey itself. Many insects use their eyes to initially detect and subsequently pursue prey. Dragonflies, which are extremely efficient predators, therefore have huge eyes with relatively high spatial resolution that allow efficient prey size estimation before initiating pursuit. However, much smaller insects, such as killer flies, also visualize and successfully pursue prey. This is an impressive behavior since the small size of the killer fly naturally limits the neural capacity and also the spatial resolution provided by the compound eye. Despite this, we here show that killer flies efficiently pursue natural (Drosophila melanogaster) and artificial (beads) prey. The natural pursuits are initiated at a distance of 7.9 ± 2.9 cm, which we show is too far away to allow for distance estimation using binocular disparities. Moreover, we show that rather than estimating absolute prey size prior to launching the attack, as dragonflies do, killer flies attack with high probability when the ratio of the prey's subtended retinal velocity and retinal size is 0.37. We also show that killer flies will respond to a stimulus of an angular size that is smaller

  20. Chemical stability of geopolymers containing municipal solid waste incinerator fly ash.

    PubMed

    Lancellotti, Isabella; Kamseu, Elie; Michelazzi, Marco; Barbieri, Luisa; Corradi, Anna; Leonelli, Cristina

    2010-04-01

    Municipal solid waste incinerators every year produce tons of fly ashes which, differently from coal fly ashes, contain large amounts of toxic substances (heavy metals, dioxins, furans). The stabilization/solidification (S/S) technology known as geopolymerization is proposed with the purpose to bond physically and chemically incinerator fly ashes (IFA) in a solid matrix, in order to reduce pollutant mobility. The chemical stability of geopolymers with Si/Al ratio of 1.8-1.9 and Na/Al ratio of 1.0, synthesized by alkali activation of metakaolin and the addition of 20wt% of two different kinds of IFA, is presented. The concentration of the alkaline solution, water to solid ratio and curing process have been optimized. The room temperature consolidation of IFA containing geopolymers has been tested for leachability in water for 1day, accordingly to EN 12457 regulation and extended to 7days to increase the water attack on solid granules. Leachable metals in the test solution, determined by ICP_AES, fall within limit values set by regulation for non-dangerous waste landfill disposal. Geopolymeric matrix evolution with leaching time has been also evaluated in terms of pH and electrical conductivity increase in solution.

  1. Gemcitabine-induced gouty arthritis attacks.

    PubMed

    Bottiglieri, Sal; Tierson, Neil; Patel, Raina; Mo, Jae-Hyun; Mehdi, Syed

    2013-09-01

    In this case report, we review the experience of a patient who presented with early stage pancreatic cancer (Stage IIb) who underwent a Whipple procedure and adjuvant chemoradiation. The patient's past medical history included early stage colon cancer in remission, post-traumatic-stress-disorder, hypertension, hyperlipidemia, osteoarthritis, gout, and pre-diabetes. Chemotherapy initially consisted of weekly gemcitabine. The patient developed acute gouty attacks after his second dose of gemcitabine, which brought him to the emergency room for emergent treatment on several occasions. Gemcitabine was held and treatment began with fluorouracil and concurrent radiation. After completion of his chemoradiation with fluorouracil, he was again treated with weekly gemcitabine alone. As soon as the patient started gemcitabine chemotherapy the patient developed gouty arthritis again, requiring discontinuation of chemotherapy. The patient received no additional treatment until his recent recurrence 8 months later where gemcitabine chemotherapy was again introduced with prophylactic medications consisting of allopurinol 100 mg by mouth daily and colchicine 0.6 mg by mouth daily throughout gemcitabine chemotherapy, and no signs of gouty arthritis occurred. To our knowledge, this is the first case report describing gout attacks associated with gemcitabine therapy. There is limited data available describing the mechanism that gouty arthritis may be precipitated from gemcitabine chemotherapy. Further monitoring and management may be required in patients receiving gemcitabine chemotherapy with underlying gout.

  2. Marine microalgae attack and feed on metazoans

    PubMed Central

    Berge, Terje; Poulsen, Louise K; Moldrup, Morten; Daugbjerg, Niels; Juel Hansen, Per

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to form massive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a density-dependent manner and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15 min) and caused by attacks of swarming cells, likely through the transfer and action of a highly potent but uncharacterised neurotoxin. The copepods grazed and reproduced on a diet of K. armiger at densities below 1000, cells ml−1, but above 3500 cells ml−1 the mixotrophic dinoflagellates immobilised, fed on and killed the copepods. Switching the trophic role of the microalgae from prey to predator of copepods couples population growth to reduced grazing pressure, promoting the persistence of blooms at high densities. K. armiger also fed on three other metazoan organisms offered, suggesting that active predation by mixotrophic dinoflagellates may be directly involved in causing mortalities at several trophic levels in the marine food web. PMID:22513533

  3. Marine microalgae attack and feed on metazoans.

    PubMed

    Berge, Terje; Poulsen, Louise K; Moldrup, Morten; Daugbjerg, Niels; Juel Hansen, Per

    2012-10-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to form massive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a density-dependent manner and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15 min) and caused by attacks of swarming cells, likely through the transfer and action of a highly potent but uncharacterised neurotoxin. The copepods grazed and reproduced on a diet of K. armiger at densities below 1000, cells ml(-1), but above 3500 cells ml(-1) the mixotrophic dinoflagellates immobilised, fed on and killed the copepods. Switching the trophic role of the microalgae from prey to predator of copepods couples population growth to reduced grazing pressure, promoting the persistence of blooms at high densities. K. armiger also fed on three other metazoan organisms offered, suggesting that active predation by mixotrophic dinoflagellates may be directly involved in causing mortalities at several trophic levels in the marine food web.

  4. Error and attack tolerance of complex networks

    NASA Astrophysics Data System (ADS)

    Albert, Réka; Jeong, Hawoong; Barabási, Albert-László

    2000-07-01

    Many complex systems display a surprising degree of tolerance against errors. For example, relatively simple organisms grow, persist and reproduce despite drastic pharmaceutical or environmental interventions, an error tolerance attributed to the robustness of the underlying metabolic network. Complex communication networks display a surprising degree of robustness: although key components regularly malfunction, local failures rarely lead to the loss of the global information-carrying ability of the network. The stability of these and other complex systems is often attributed to the redundant wiring of the functional web defined by the systems' components. Here we demonstrate that error tolerance is not shared by all redundant systems: it is displayed only by a class of inhomogeneously wired networks, called scale-free networks, which include the World-Wide Web, the Internet, social networks and cells. We find that such networks display an unexpected degree of robustness, the ability of their nodes to communicate being unaffected even by unrealistically high failure rates. However, error tolerance comes at a high price in that these networks are extremely vulnerable to attacks (that is, to the selection and removal of a few nodes that play a vital role in maintaining the network's connectivity). Such error tolerance and attack vulnerability are generic properties of communication networks.

  5. Leading edge vortex in a slow-flying passerine

    PubMed Central

    Muijres, Florian T.; Johansson, L. Christoffer; Hedenström, Anders

    2012-01-01

    Most hovering animals, such as insects and hummingbirds, enhance lift by producing leading edge vortices (LEVs) and by using both the downstroke and upstroke for lift production. By contrast, most hovering passerine birds primarily use the downstroke to generate lift. To compensate for the nearly inactive upstroke, weight support during the downstroke needs to be relatively higher in passerines when compared with, e.g. hummingbirds. Here we show, by capturing the airflow around the wing of a freely flying pied flycatcher, that passerines may use LEVs during the downstroke to increase lift. The LEV contributes up to 49 per cent to weight support, which is three times higher than in hummingbirds, suggesting that avian hoverers compensate for the nearly inactive upstroke by generating stronger LEVs. Contrary to other animals, the LEV strength in the flycatcher is lowest near the wing tip, instead of highest. This is correlated with a spanwise reduction of the wing's angle-of-attack, partly owing to upward bending of primary feathers. We suggest that this helps to delay bursting and shedding of the particularly strong LEV in passerines. PMID:22417792

  6. Investigation of the Flying Mock-Up of Consolidated Vultee XP-92 Airplane in the Ames 40- by 80-Foot Wind Tunnel: Pressure Distributions

    NASA Technical Reports Server (NTRS)

    Graham, David

    1948-01-01

    This report contains the results of the wind tunnel investigation of the pressure distribution on the flying mock-up of the Consolidated Vultee XP-92 airplane. Data are presented for the pressure distribution over the wing, vertical tail and the fuselage, and for the pressure loss and rate of flow through the ducted fuselage. Data are also presented for the calibration of two airspeed indicators, and for the calibration of angle-of-attack and sideslip-angle indicator vanes.

  7. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  8. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  9. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    SciTech Connect

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh; Halappanavar, Mahantesh

    2016-07-16

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  10. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  11. Estimation of Static Longitudinal Stability of Aircraft Configurations at High Mach Numbers and at Angles of Attack Between 0 deg and +/-180 deg

    NASA Technical Reports Server (NTRS)

    Dugan, Duane W.

    1959-01-01

    The possibility of obtaining useful estimates of the static longitudinal stability of aircraft flying at high supersonic Mach numbers at angles of attack between 0 and +/-180 deg is explored. Existing theories, empirical formulas, and graphical procedures are employed to estimate the normal-force and pitching-moment characteristics of an example airplane configuration consisting of an ogive-cylinder body, trapezoidal wing, and cruciform trapezoidal tail. Existing wind-tunnel data for this configuration at a Mach number of 6.86 provide an evaluation of the estimates up to an angle of attack of 35 deg. Evaluation at higher angles of attack is afforded by data obtained from wind-tunnel tests made with the same configuration at angles of attack between 30 and 150 deg at five Mach numbers between 2.5 and 3.55. Over the ranges of Mach numbers and angles of attack investigated, predictions of normal force and center-of-pressure locations for the configuration considered agree well with those obtained experimentally, particularly at the higher Mach numbers.

  12. Expression of defensin paralogs across house fly life history: insights into fly-microbe interactions

    Technology Transfer Automated Retrieval System (TEKTRAN)

    House flies have a life-long association with microbe-rich environments. Larvae directly ingest bacteria in decaying substrates utilizing them for nutritional purposes. Adult house flies ephemerally associate with microbes, ingesting them either by direct feeding or indirectly during grooming. The h...

  13. Attractant for vinegar fly, Drosophila busckii, and cluster fly, Pollenia rudis (Diptera: Drosophilidae et Calliphoridae).

    PubMed

    Buda, Vincas; Radziute, Sandra; Lutovinovas, Erikas

    2009-01-01

    A field test carried out in an industrial greenhouse in Lithuania revealed the attractiveness of synthetic methyl salicylate (MeSa) to two dipteran species: the vinegar fly, Drosophila busckii (Drosophilidae), and the cluster fly, Pollenia rudis (Calliphoridae). The attractant for the former fly species was especially effective, as sticky traps containing 0.25 ml of MeSa captured (814 +/- 55) D. busckii flies/trap on average compared to (12 +/- 4) flies/trap in control traps. The mean capture of P. rudis [(42 +/- 4) flies/trap] was significantly higher in MeSa-baited traps compared to the control traps [(13 +/- 4) flies/trap]. The presence of MeSa in emissions of many fruits suitable for D. busckii feeding allows to attribute this attractant to kairomones. In case of P. rudis, MeSa should be attributed to synomones (compounds beneficial for both receiver and sender), because adult flies feeding on flowers act as pollinators. This is the first report on the field-active attractant for D. busckii and the second for P. rudis.

  14. Filthy Flies? Experiments to Test Flies as Vectors of Bacterial Disease

    ERIC Educational Resources Information Center

    Shaffer, Julie J.; Warner, Kasey Jo; Hoback, W. Wyatt

    2007-01-01

    For more than 75 years, flies and other insects have been known to serve as mechanical vectors of infectious disease (Hegner, 1926). Flies have been shown to harbor over 100 different species of potentially pathogenic microorganisms and are known to transmit more than 65 infectious diseases (Greenberg, 1965). This laboratory exercise is a simple…

  15. Rapid Mobilization of Membrane Lipids in Wheat Leaf-Sheaths during Incompatible Interactions with Hessian Fly*

    PubMed Central

    Zhu, Lieceng; Liu, Xuming; Wang, Haiyan; Khajuria, Chitvan; Reese, John C.; Whitworth, R. Jeff; Welti, Ruth; Chen, Ming-Shun

    2013-01-01

    Hessian fly (HF) is a biotrophic insect that interacts with wheat on a gene-for-gene basis. We profiled changes in membrane lipids in two isogenic wheat lines: a susceptible line and its backcrossed offspring containing the resistance gene H13. Our results revealed a 32 to 45% reduction in total concentrations of 129 lipid species in resistant plants during incompatible interactions within 24 h after HF attack. A smaller and delayed response was observed in susceptible plants during compatible interactions. Microarray and real-time PCR analyses of 168 lipid-metabolism related transcripts revealed that the abundance of many of these transcripts increased rapidly in resistant plants after HF attack, but did not change in susceptible plants. In association with the rapid mobilization of membrane lipids, the concentrations of some fatty acids and 12-oxo-phytodienoic acid (OPDA) increased specifically in resistant plants. Exogenous application of OPDA increased mortality of HF larvae significantly. Collectively, our data, along with previously published results, indicate that the lipids were mobilized through lipolysis, producing free fatty acids, which were likely further converted into oxylipins and other defense molecules. Our results suggest that rapid mobilization of membrane lipids constitutes an important step for wheat to defend against HF attack. PMID:22668001

  16. Wing and body kinematics of forward flight in drone-flies.

    PubMed

    Meng, Xue Guang; Sun, Mao

    2016-08-15

    Here, we present a detailed analysis of the wing and body kinematics in drone-flies in free flight over a range of speeds from hovering to about 8.5 m s(-1). The kinematics was measured by high-speed video techniques. As the speed increased, the body angle decreased and the stroke plane angle increased; the wingbeat frequency changed little; the stroke amplitude first decreased and then increased; the ratio of the downstroke duration to the upstroke duration increased; the mean positional angle increased at lower speeds but changed little at speeds above 3 m s(-1). At a speed above about 1.5 m s(-1), wing rotation at supination was delayed and that at pronation was advanced, and consequently the wing rotations were mostly performed in the upstroke. In the downstroke, the relative velocity of the wing increased and the effective angle of attack decreased with speed; in the upstroke, they both decreased with speed at lower speeds, and at higher speeds, the relative velocity became larger but the effective angle of attack became very small. As speed increased, the increasing inclination of the stroke plane ensured that the effective angle of attack in the upstroke would not become negative, and that the wing was in suitable orientations for vertical-force and thrust production.

  17. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  18. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  19. Salt-thermal zeolitization of fly ash.

    PubMed

    Choi, C L; Park, M; Lee, D H; Kim, I E; Park, B Y; Choi, J

    2001-07-01

    The molten-salt method has been recently proposed as a new approach to zeolitization of fly ash. Unlike the hydrothermal method, this method employs salt mixtures as the reaction medium without any addition of water. In this study, systematic investigation has been conducted on zeolitization of fly ash in a NaOH-NaNO3 system in order to elucidate the mechanism of zeolite formation and to achieve its optimization. Zeolitization of fly ash was conducted by thermally treating a powder mixture of fly ash, NaOH, and NaNO3. Zeolitization of fly ash took place above 200 degrees C, a temperature lower than the melting points of salt and base in the NaOH-NaNO3 system. However, it was uncertain whether the reactions took place in a local molten state or in a solid state. Therefore, the proposed method is renamed the "salt-thermal" method rather than the "molten-salt" method. Mainly because of difficulty in mobility of components in salt mixtures, zeolitization seems to occur within a local reaction system. In situ rearrangement of activated components seems to lead to zeolite formation. Particle growth, rather than crystal growth through agglomeration, resulted in no distinct morphologies of zeolite phases. Following are the optimal zeolitization conditions of the salt-thermal method: temperature, 250-350 degrees C; time, 3-12 h; weight ratio of NaOH/NaNO3, 0.3-0.5; weight ratio of NaNO3/fly ash, 0.7-1.4. Therefore, it is clear from this work that the salt-thermal method could be applied to massive zeolitization of fly ash as a new alternative method for recycling this waste.

  20. PROBA-3: Precise formation flying demonstration mission

    NASA Astrophysics Data System (ADS)

    Llorente, J. S.; Agenjo, A.; Carrascosa, C.; de Negueruela, C.; Mestreau-Garreau, A.; Cropp, A.; Santovincenzo, A.

    2013-01-01

    Formation Flying (FF) has generated a strong interest in many space applications, most of them involving a significant complexity for building for example on-board large "virtual structures or distributed observatories". The implementation of these complex formation flying missions with critical dependency on this new, advanced and critical formation technology requires a thorough verification of the system behaviour in order to provide enough guarantees for the target mission success. A significant number of conceptual or preliminary designs, analyses, simulations, and HW on-ground testing have been performed during the last years, but still the limitations of the ground verification determine that enough confidence of the behaviour of the formation flying mission will only be possible by demonstration in flight of the concept and the associated technologies. PROBA-3 is the mission under development at ESA for in-flight formation flying demonstration, dedicated to obtain that confidence and the necessary flight maturity level in the formation flying technologies for those future target missions. PROBA-3 will demonstrate technologies such as formation metrology sensors (from very coarse to highest accuracy), formation control and GNC, system operability, safety, etc. During the last years, PROBA-3 has evolved from the initial CDF study at ESA, to two parallel phase A studies, followed by a change in the industrial configuration for the Bridging step between A and B phases. Currently the SRR consolidation has been completed, and the project is in the middle of the phase B. After the phase A study SENER and GMV were responsible for the Formation Flying System, within a mission core team completed by OHB-Sweden, QinetiQ Space and CASA Espacio. In this paper an overview of the PROBA-3 mission is provided, with a more detailed description of the formation flying preliminary design and results.

  1. The relationship between 3-D kinematics and gliding performance in the southern flying squirrel, Glaucomys volans.

    PubMed

    Bishop, Kristin L

    2006-02-01

    Gliding is the simplest form of flight, yet relatively little is known about its mechanics in animals. The goal of this study was to describe the body position and performance of a gliding mammal and to identify correlates between kinematics and aerodynamic performance. To do this, I used a pair of high-speed digital cameras to record a portion of the middle of glides by southern flying squirrels, Glaucomys volans. The squirrels launched from a height of 4 m and landed on a vertical pole. Reflective markers were applied to anatomical landmarks and the 3-D coordinates of these points were computed to describe the kinematics of the glides. From these data I estimated the lift and drag generated during the glide, and correlated these variables with gliding performance as measured by glide angle, glide speed and stability. In the majority of the glide sequences the squirrels accelerated in the downward direction and accelerated horizontally forward as they moved through the calibrated volume in the middle of the glide trajectory, rather than exhibiting a steady glide in which the body weight is balanced by the resultant aerodynamic force. Compared to human engineered airfoils, the angles of attack used by the squirrels were unexpectedly high, ranging from 35.4 degrees to 53.5 degrees , far above the angle of attack at which an aircraft wing would typically stall. As expected based on aerodynamic theory, there was a negative correlation between angle of attack and lift coefficient, indicating that the wings are stalled, and a positive correlation between angle of attack and drag coefficient. Also as expected, there was a negative correlation between lift-to-drag ratio and angle of attack, as increasing angle of attack produced both less lift and more drag. Within glides, there was a strong correlation between nose-down pitching rotations and limb movements that tended to increase the angle of attack of the wing membrane, suggesting that the animals actively control

  2. Identification of cooling tower wood attack and methods of control

    SciTech Connect

    Song, P.; Trulear, M.G.

    1986-01-01

    Biological and chemical attack can greatly accelerate the deterioration of cooling tower wood. The damage, once inflicted, is irreversible and often results in premature and costly wood replacement. Biological attack is more serious than chemical, and is difficult to detect. Control of both types is essential for good tower maintenance A review of wood structures, types of attack and methods of control are presented. Effects of alkaline cooling water operation on wood deterioration are also discussed.

  3. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  4. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  5. On Cybersecurity, Crowdsourcing, and Social Cyber-Attack

    DTIC Science & Technology

    2013-01-01

    reaching hordes of interested mischief makers who are comfortably anonymous and hard to track. Social cyber -attack as a means to bully and trick...ON CYBERSECURITY, CROWDSOURCING, AND SOCIAL CYBER -ATTACK By Rebecca Goolsby, Ph.D., Office of Naval Research Civil unrest and social media have...must take into account the growing potential for cyber -attack using social media, where hoax messages are incorporated into a stream of otherwise

  6. ATTACK WARNING: Better Management Required to Resolve NORAD Integration Deficiencies

    DTIC Science & Technology

    1989-07-01

    WAHNGO D.C.9’𔄃- 2030-710 Accession Number: 1923 Publication Date: Jul 07, 1989 Title: Attack Warning : Better Management Required to Resolve NORAD...Office, GAO, Washington, DC 20548 Report Number: GAO/IMTEC-89- 26 Descriptors, Keywords: Surveillance Warning Communication Attack Methodology Evaluation...Integrated Tactical Warning and Attack Assessment System’s data processing and communications capabilities. Our review focused on the Air Force’s

  7. Non-harmful insertion of data mimicking computer network attacks

    DOEpatents

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  8. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  9. Orthostatic panic attacks among Vietnamese refugees.

    PubMed

    Hinton, Devon E; Hinton, Ladson; Tran, Minh; Nguyen, Men; Nguyen, Lim; Hsia, Curtis; Pollack, Mark H

    2007-12-01

    Viewed historically and cross-culturally, orthostatic-induced dizziness, i.e., dizziness caused by standing up from a sitting or a lying position, forms a key aspect of many syndromes: irritable heart (American Civil War), effort syndrome (World War I and World War II), chronic fatigue syndrome (contemporary USA), Gulf War syndrome (contemporary USA), and orthostatic dysregulation (contemporary Japan). Among Vietnamese refugees attending a psychiatric clinic, this study documents a high rate of orthostatic panic (OP), as well as certain processes seemingly generating these panic attacks, viz., flashbacks and culturally specific catastrophic cognitions. Case examples are used to demonstrate OP's phenomenology and relevance to clinical care. To illustrate the mechanisms producing OP, we adduce the multiplex model of panic generation. Culturally appropriate care of Vietnamese refugees should include assessment and treatment of OP.

  10. Detecting Cyber Attacks On Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  11. Inorganic nanoparticles engineered to attack bacteria.

    PubMed

    Miller, Kristen P; Wang, Lei; Benicewicz, Brian C; Decho, Alan W

    2015-11-07

    Antibiotics were once the golden bullet to constrain infectious bacteria. However, the rapid and continuing emergence of antibiotic resistance (AR) among infectious microbial pathogens has questioned the future utility of antibiotics. This dilemma has recently fueled the marriage of the disparate fields of nanochemistry and antibiotics. Nanoparticles and other types of nanomaterials have been extensively developed for drug delivery to eukaryotic cells. However, bacteria have very different cellular architectures than eukaryotic cells. This review addresses the chemistry of nanoparticle-based antibiotic carriers, and how their technical capabilities are now being re-engineered to attack, kill, but also non-lethally manipulate the physiologies of bacteria. This review also discusses the surface functionalization of inorganic nanoparticles with small ligand molecules, polymers, and charged moieties to achieve drug loading and controllable release.

  12. Resveratrol products resulting by free radical attack

    NASA Astrophysics Data System (ADS)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  13. Emergency response to an anthrax attack

    PubMed Central

    Wein, Lawrence M.; Craft, David L.; Kaplan, Edward H.

    2003-01-01

    We developed a mathematical model to compare various emergency responses in the event of an airborne anthrax attack. The system consists of an atmospheric dispersion model, an age-dependent dose–response model, a disease progression model, and a set of spatially distributed two-stage queueing systems consisting of antibiotic distribution and hospital care. Our results underscore the need for the extremely aggressive and timely use of oral antibiotics by all asymptomatics in the exposure region, distributed either preattack or by nonprofessionals postattack, and the creation of surge capacity for supportive hospital care via expanded training of nonemergency care workers at the local level and the use of federal and military resources and nationwide medical volunteers. The use of prioritization (based on disease stage and/or age) at both queues, and the development and deployment of modestly rapid and sensitive biosensors, while helpful, produce only second-order improvements. PMID:12651951

  14. On the offensive against brain attack

    SciTech Connect

    Wheatcraft, D.

    1997-06-01

    The Center for Healthcare Technologies at Lawrence Livermore National Laboratory has undertaken a stroke initiative whose purpose is to provide the medical community with the tools that will allow doctors to diagnose and treat stroke as aggressively as they do heart attack. A multidisciplinary team of stroke-initiative researchers is collaborating with academic medical centers and private companies to move these tools from the research and development stage through clinical trials, regulatory approval, and manufacture so that they can benefit many thousands of people who have strokes each year. Tools the team has developed fall into four categories: microsensors for brain and clot characterization, a catheter-based system using laser energy to break up clots in the blood vessels of the brain, laser-tissue interaction models in support of laser {open_quotes}clot busting,{close_quotes} and microtools for treating the aneurysms that cause hemorrhagic stroke.

  15. Windows NT Attacks for the Evaluation of Intrusion Detection Systems

    DTIC Science & Technology

    2000-06-01

    Neptune and Smurf. These attacks are fully documented in [10]. In addition, two denial-of-service attacks, CrashIIS and DoSNuke, were developed to...in the Netscape browser. NetBus and NetCat use trojan programs to establish back doors on the victim system. PPMacro inserts malicious macro code...detecting the attack. 51 7.2 Netbus R-s-U Description The attacker uses a trojan program to install and run the Netbus server, version 1.7, on

  16. Feasible attack on detector-device-independent quantum key distribution.

    PubMed

    Wei, Kejin; Liu, Hongwei; Ma, Haiqiang; Yang, Xiuqing; Zhang, Yong; Sun, Yongmei; Xiao, Jinghua; Ji, Yuefeng

    2017-03-27

    Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob's BSM setup is assumed to be completely a "black box", is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack-detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.

  17. Panic attacks during sleep: a hyperventilation-probability model.

    PubMed

    Ley, R

    1988-09-01

    Panic attacks during sleep are analysed in terms of a hyperventilation theory of panic disorder. The theory assumes that panic attacks during sleep are a manifestation of severe chronic hyperventilation, a dysfunctional state in which renal compensation has led to a relatively steady state of diminished bicarbonate. Reductions in respiration during deep non-REM sleep lead to respiratory acidosis which triggers hyperventilatory hypocapnea and subsequent panic. A probability model designed to predict when during sleep panic attacks are likely to occur is supported by relevant data from studies of sleep and panic attacks. Implications for treatment are discussed.

  18. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  19. Techniques for Judging Intent Behind Network Based Cyber Attacks

    SciTech Connect

    Allen, J M

    2004-01-28

    This project developed a prototype system that can rapidly differentiate between undirected cyber attacks, and those that have a more specific and concerning intent behind them. The system responds to important cyber attacks in a tactically significant way as the attack is proceeding. It is also creates a prioritized list for the human analysts allowing them to focus on the threats mostly likely to be of interest. In the recent years the volume of attacks over the internet has increased exponentially, as they have become more and more automated. The result of this is that real threats are harder and harder to distinguish from the general threat. It is possible with our current systems to identify network packets that originated from thousands of IP addresses as probing a site like LLNL in a single day. Human analysis of these threats does not result in information that can be used for tactical response because most of the attacks are short and over before the human starts the analysis. Only a very small percentage of attacks can even be evaluated manually due to the volume. This project developed methods, and prototyped tools, that can identify attacks, slow the attack down and aid in the process of prioritizing detections. The project demonstrated that such methods exist, and that practical implementations exist for modern computers and networks. We call the tools created D.I.A.G. or Determining Internet Attackers Goals.

  20. Crack-cocaine users as victims of physical attack.

    PubMed Central

    Siegal, H. A.; Falck, R. S.; Wang, J.; Carlson, R. G.

    2000-01-01

    This study evaluates the correlates of physical attack among people who use crack cocaine in Dayton, Ohio. Using a retrospective and prospective natural history design, data from baseline and 1-year follow-up interviews were used to calculate the prevalence of physical attack and the annual rate of physical attack suffered by 440 not-in-treatment crack-cocaine users. Logistic regression was used to determine the correlates of physical attack. The lifetime prevalence of physical attack was 63.0%; the annual rate was 36.8%. At baseline, daily crack users were more likely to report a previous attack since they began using crack (odds ratio [OR], 1.81; 95% confidence interval [CI], 1.18-2.77). Longer duration of crack use was also associated with experiencing an attack (OR, 1.09; 95% CI, 1.04-1.14). Between baseline and 12-month follow-up, the odds of men being attacked were significantly less than those for women (OR, 0.48; 95% CI, 0.23-0.99). Physical attack is widespread among crack-cocaine users, and does not vary by ethnicity. Injuries often result in the need for medical care. Over the short term, women are at increased risk. Accessible and effective drug abuse treatment is needed to diminish the harm this population suffers. PMID:10800295

  1. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  2. Reconstructing the behavior of walking fruit flies

    NASA Astrophysics Data System (ADS)

    Berman, Gordon; Bialek, William; Shaevitz, Joshua

    2010-03-01

    Over the past century, the fruit fly Drosophila melanogaster has arisen as almost a lingua franca in the study of animal behavior, having been utilized to study questions in fields as diverse as sleep deprivation, aging, and drug abuse, amongst many others. Accordingly, much is known about what can be done to manipulate these organisms genetically, behaviorally, and physiologically. Most of the behavioral work on this system to this point has been experiments where the flies in question have been given a choice between some discrete set of pre-defined behaviors. Our aim, however, is simply to spend some time with a cadre of flies, using techniques from nonlinear dynamics, statistical physics, and machine learning in an attempt to reconstruct and gain understanding into their behavior. More specifically, we use a multi-camera set-up combined with a motion tracking stage in order to obtain long time-series of walking fruit flies moving about a glass plate. This experimental system serves as a test-bed for analytical, statistical, and computational techniques for studying animal behavior. In particular, we attempt to reconstruct the natural modes of behavior for a fruit fly through a data-driven approach in a manner inspired by recent work in C. elegans and cockroaches.

  3. Social attraction mediated by fruit flies' microbiome.

    PubMed

    Venu, Isvarya; Durisko, Zachary; Xu, Jianping; Dukas, Reuven

    2014-04-15

    Larval and adult fruit flies are attracted to volatiles emanating from food substrates that have been occupied by larvae. We tested whether such volatiles are emitted by the larval gut bacteria by conducting tests under bacteria-free (axenic) conditions. We also tested attraction to two bacteria species, Lactobacillus brevis, which we cultured from larvae in our lab, and L. plantarum, a common constituent of fruit flies' microbiome in other laboratory populations and in wild fruit flies. Neither larvae nor adults showed attraction to axenic food that had been occupied by axenic larvae, but both showed the previously reported attraction to standard food that had been occupied by larvae with an intact microbiome. Larvae also showed significant attraction to volatiles from axenic food and larvae to which we added only either L. brevis or L. plantarum, and volatiles from L. brevis reared on its optimal growth medium. Controlled learning experiments indicated that larvae experienced with both standard and axenic used food do not perceive either as superior, while focal larvae experienced with simulated used food, which contains burrows, perceive it as superior to unused food. Our results suggest that flies rely on microbiome-derived volatiles for long-distance attraction to suitable food patches. Under natural settings, fruits often contain harmful fungi and bacteria, and both L. brevis and L. plantarum produce compounds that suppress the growth of some antagonistic fungi and bacteria. The larval microbiome volatiles may therefore lead prospective fruit flies towards substrates with a hospitable microbial environment.

  4. High chromosomal variation in wild horn fly Haematobia irritans (Linnaeus) (Diptera, Muscidae) populations

    PubMed Central

    Forneris, Natalia S.; Otero, Gabriel; Pereyra, Ana; Repetto, Gustavo; Rabossi, Alejandro; Quesada-Allué, Luis A.; Basso, Alicia L.

    2015-01-01

    Abstract The horn fly, Haematobia irritans is an obligate haematophagous cosmopolitan insect pest. The first reports of attacks on livestock by Haematobia irritans in Argentina and Uruguay occurred in 1991, and since 1993 it is considered an economically important pest. Knowledge on the genetic characteristics of the horn fly increases our understanding of the phenotypes resistant to insecticides that repeatedly develop in these insects. The karyotype of Haematobia irritans, as previously described using flies from an inbred colony, shows a chromosome complement of 2n=10 without heterochromosomes (sex chromosomes). In this study, we analyze for the first time the chromosome structure and variation of four wild populations of Haematobia irritans recently established in the Southern Cone of South America, collected in Argentina and Uruguay. In these wild type populations, we confirmed and characterized the previously published “standard” karyotype of 2n=10 without sex chromosomes; however, surprisingly a supernumerary element, called B-chromosome, was found in about half of mitotic preparations. The existence of statistically significant karyotypic diversity was demonstrated through the application of orcein staining, C-banding and H-banding. This study represents the first discovery and characterization of horn fly karyotypes with 2n=11 (2n=10+B). All spermatocytes analyzed showed 5 chromosome bivalents, and therefore, 2n=10 without an extra chromosome. Study of mitotic divisions showed that some chromosomal rearrangements affecting karyotype structure are maintained as polymorphisms, and multiple correspondence analyses demonstrated that genetic variation was not associated with geographic distribution. Because it was never observed during male meiosis, we hypothesize that B-chromosome is preferentially transmitted by females and that it might be related to sex determination. PMID:25893073

  5. Words Mean Things: The Case for Information System Attack and Control System Attack

    DTIC Science & Technology

    2008-10-31

    databases , reservation system, documents, web pages…”ix On the other hand, infrastructure control systems interact with the physical world, and...Week and Space Technology, 4 September 2002, 3, EBSCOhost (accessed 8 September 2008). xxvii Barnes, Julian E., “Hacking Could Become Weapon in...September 2002, EBSCOhost (accessed 8 September 2008). Gibson, Tim, “What You Should Know About Attacking Computer Networks

  6. Pigments of fly agaric (Amanita muscaria).

    PubMed

    Stintzing, Florian; Schliemann, Willibald

    2007-01-01

    The complex pigment pattern of fly agaric (Amanita muscaria) cap skins has been studied by LC-DAD and mass spectrometry. Among the betaxanthins the corresponding derivatives of serine, threonine, ethanolamine, alanine, Dopa, phenylalanine and tryptophan are reported for the first time to contribute to the pigment pattern of fly agarics. Betalamic acid, the chromophoric precursor of betaxanthins and betacyanins, muscaflavin and seco-dopas were also detected. Furthermore, the red-purple muscapurpurin and the red muscarubrin were tentatively assigned while further six betacyanin-like components could not be structurally allocated. Stability studies indicated a high susceptibility of pigment extracts to degradation which led to rapid colour loss thus rendering a complete characterization of betacyanin-like compounds impossible at present. Taking into account these difficulties the presented results may be a starting point for a comprehensive characterization of the pigment composition of fly agarics.

  7. Extraction of trace metals from fly ash

    DOEpatents

    Blander, M.; Wai, C.M.; Nagy, Z.

    1983-08-15

    A process is described for recovering silver, gallium and/or other trace metals from a fine grained industrial fly ash associated with a process for producing phosphorous. The fly ash has a silicate base and contains surface deposits of the trace metals as oxides, chlorides or the like. The process is carried out by contacting the fly ash with AlCl/sub 3/ in an alkali halide melt to react the trace metals with the AlCl/sub 3/ to form compositions soluble in the melt and a residue containing the silicate and aluminum oxide or other aluminum precipitate, and separating the desired trace metal or metals from the melt by electrolysis or other separation techniques.

  8. Extraction of trace metals from fly ash

    DOEpatents

    Blander, Milton; Wai, Chien M.; Nagy, Zoltan

    1984-01-01

    A process for recovering silver, gallium and/or other trace metals from a fine grained industrial fly ash associated with a process for producing phosphorous, the fly ash having a silicate base and containing surface deposits of the trace metals as oxides, chlorides or the like, with the process being carried out by contacting the fly ash with AlCl.sub.3 in an alkali halide melt to react the trace metals with the AlCl.sub.3 to form compositions soluble in the melt and a residue containing the silicate and aluminum oxide or other aluminum precipitate, and separating the desired trace metal or metals from the melt by electrolysis or other separation techniques.

  9. FlyBase: improvements to the bibliography.

    PubMed

    Marygold, Steven J; Leyland, Paul C; Seal, Ruth L; Goodman, Joshua L; Thurmond, Jim; Strelets, Victor B; Wilson, Robert J

    2013-01-01

    An accurate, comprehensive, non-redundant and up-to-date bibliography is a crucial component of any Model Organism Database (MOD). Principally, the bibliography provides a set of references that are specific to the field served by the MOD. Moreover, it serves as a backbone to which all curated biological data can be attributed. Here, we describe the organization and main features of the bibliography in FlyBase (flybase.org), the MOD for Drosophila melanogaster. We present an overview of the current content of the bibliography, the pipeline for identifying and adding new references, the presentation of data within Reference Reports and effective methods for searching and retrieving bibliographic data. We highlight recent improvements in these areas and describe the advantages of using the FlyBase bibliography over alternative literature resources. Although this article is focused on bibliographic data, many of the features and tools described are applicable to browsing and querying other datasets in FlyBase.

  10. A Novel Method for Tracking Individuals of Fruit Fly Swarms Flying in a Laboratory Flight Arena

    PubMed Central

    Cheng, Xi En; Qian, Zhi-Ming; Wang, Shuo Hong; Jiang, Nan; Guo, Aike; Chen, Yan Qiu

    2015-01-01

    The growing interest in studying social behaviours of swarming fruit flies, Drosophila melanogaster, has heightened the need for developing tools that provide quantitative motion data. To achieve such a goal, multi-camera three-dimensional tracking technology is the key experimental gateway. We have developed a novel tracking system for tracking hundreds of fruit flies flying in a confined cubic flight arena. In addition to the proposed tracking algorithm, this work offers additional contributions in three aspects: body detection, orientation estimation, and data validation. To demonstrate the opportunities that the proposed system offers for generating high-throughput quantitative motion data, we conducted experiments on five experimental configurations. We also performed quantitative analysis on the kinematics and the spatial structure and the motion patterns of fruit fly swarms. We found that there exists an asymptotic distance between fruit flies in swarms as the population density increases. Further, we discovered the evidence for repulsive response when the distance between fruit flies approached the asymptotic distance. Overall, the proposed tracking system presents a powerful method for studying flight behaviours of fruit flies in a three-dimensional environment. PMID:26083385

  11. A Novel Method for Tracking Individuals of Fruit Fly Swarms Flying in a Laboratory Flight Arena.

    PubMed

    Cheng, Xi En; Qian, Zhi-Ming; Wang, Shuo Hong; Jiang, Nan; Guo, Aike; Chen, Yan Qiu

    2015-01-01

    The growing interest in studying social behaviours of swarming fruit flies, Drosophila melanogaster, has heightened the need for developing tools that provide quantitative motion data. To achieve such a goal, multi-camera three-dimensional tracking technology is the key experimental gateway. We have developed a novel tracking system for tracking hundreds of fruit flies flying in a confined cubic flight arena. In addition to the proposed tracking algorithm, this work offers additional contributions in three aspects: body detection, orientation estimation, and data validation. To demonstrate the opportunities that the proposed system offers for generating high-throughput quantitative motion data, we conducted experiments on five experimental configurations. We also performed quantitative analysis on the kinematics and the spatial structure and the motion patterns of fruit fly swarms. We found that there exists an asymptotic distance between fruit flies in swarms as the population density increases. Further, we discovered the evidence for repulsive response when the distance between fruit flies approached the asymptotic distance. Overall, the proposed tracking system presents a powerful method for studying flight behaviours of fruit flies in a three-dimensional environment.

  12. Seasonal abundance of stable flies and filth fly pupal parasitoids (Hymenoptera: Pteromalidae) at Florida equine facilities.

    PubMed

    Pitzer, Jimmy B; Kaufman, Phillip E; Hogsette, Jerome A; Geden, Christopher J; Tenbroeck, Saundra H

    2011-06-01

    Beginning in November 2007 and continuing until December 2009, weekly stable fly, Stomoxys calcitrans (L.), surveillance was conducted at four equine facilities near Ocala, FL, by using alsynite sticky traps for adults and by searching immature developmental sites for pupae. Adult stable fly trap captures were highly variable throughout the year, ranging from 0 to 1,400 flies per trap per farm. The greatest adult stable fly activity was observed during the spring months of March and April, with weekly three-trap means of 121 and 136 flies per farm, respectively. The importance of cultural control measures was most apparent on the only farm with no reported insecticide use and the lowest stable fly trap captures, where an intense daily sanitation and composting program was conducted. A survey of on-site filth fly pupae revealed that 99.9% of all parasitoids recovered were Spalangia spp., consisting of Spalangia cameroni Perkins (56.5%), Spalangia nigroaenea Curtis (34.0%), Spalangia endius Walker (5.8%), and Spalangia nigra Latreille (3.7%). The implications of these findings are discussed.

  13. Adsorptive properties of fly ash carbon

    SciTech Connect

    Graham, U.M.; Robl, T.L.; Rathbone, R.F.

    1996-12-31

    The driving force behind the development of this research project has been the increasing concerns about the detrimental effects of high carbon carryover into combustion ash. Without the carbon, combustion ash can be utilized in cement industry avoiding environmental implications in landfill operations. Because the carbon surfaces have been structurally altered while passing through the combustor, including the formation of a macro-porous surface, fly ash carbons, after separation from the ash, may constitute a unique precursor for the production of adsorbents. This paper discusses a novel approach for using fly ash carbons in the cleanup of organic pollutants.

  14. Fly Ash Characteristics and Carbon Sequestration Potential

    SciTech Connect

    Palumbo, Anthony V.; Amonette, James E.; Tarver, Jana R.; Fagan, Lisa A.; McNeilly, Meghan S.; Daniels, William L.

    2007-07-20

    Concerns for the effects of global warming have lead to an interest in the potential for inexpensive methods to sequester carbon dioxide (CO2). One of the proposed methods is the sequestration of carbon in soil though the growth of crops or forests.4,6 If there is an economic value placed on sequestration of carbon dioxide in soil there may be an an opportunity and funding to utilize fly ash in the reclamation of mine soils and other degraded lands. However, concerns associated with the use of fly ash must be addressed before this practice can be widely adopted. There is a vast extent of degraded lands across the world that has some degree of potential for use in carbon sequestration. Degraded lands comprise nearly 2 X 109 ha of land throughout the world.7 Although the potential is obviously smaller in the United States, there are still approximately 4 X 106 ha of degraded lands that previously resulted from mining operations14 and an additional 1.4 X 108 ha of poorly managed lands. Thus, according to Lal and others the potential is to sequester approximately 11 Pg of carbon over the next 50 years.1,10 The realization of this potential will likely be dependent on economic incentives and the use of soil amendments such as fly ash. There are many potential benefits documented for the use of fly ash as a soil amendment. For example, fly ash has been shown to increase porosity, water-holding capacity, pH, conductivity, and dissolved SO42-, CO32-, HCO3-, Cl- and basic cations, although some effects are notably decreased in high-clay soils.8,13,9 The potential is that these effects will promote increased growth of plants (either trees or grasses) and result in greater carbon accumulation in the soil than in untreated degraded soils. This paper addresses the potential for carbon sequestration in soils amended with fly ash and examines some of the issues that should be considered in planning this option. We describe retrospective studies of soil carbon accumulation on

  15. Using fly ash to mitigate explosions

    SciTech Connect

    Taulbee, D.

    2008-07-01

    In 2005 the University of Kentucky's Center for Applied Energy Research was given funding to evaluate the use of coal combustion by-products (CCBs) to reduce the explosive potential of ammonium nitrate (AN) fertilizers. Fly ash C (FAC), fly ash F (FAF) and flue gas desulfurization by-product (FGD) were evaluated. It was found that applying a CCB coating to the AN particles at concentrations of 5 wt% or greater prevented the AN explosion from propagating. The article reports on results so far and outlines further work to be done. 6 figs.

  16. Changeing of fly ash leachability after grinding

    NASA Astrophysics Data System (ADS)

    Lakatos, J.; Szabo, R.; Racz, A.; Banhidi, O.; Mucsi, G.

    2016-04-01

    Effect of grinding on the reactivity of fly ash used for geopolymer production was tested. Extraction technique using different alkaline and acidic solutions were used for detect the change of the solubility of elements due to the physical and mechano-chemical transformation of minerals in function of grinding time. Both the extraction with alkaline and acidic solution have detected improvement in solubility in function of grinding time. The enhancement in alkaline solution was approx. 100% in case of Si and Al. The acidic medium able to dissolve the fly ash higher manner than the alkaline, therefore the effect of grinding was found less pronounced.

  17. Public Figure Attacks in the United States, 1995-2015.

    PubMed

    Meloy, J Reid; Amman, Molly

    2016-09-01

    An archival descriptive study of public figure attackers in the United States between 1995 and 2015 was undertaken. Fifty-six incidents were identified, primarily through exhaustive internet searches, composed of 58 attackers and 58 victims. A code book was developed which focused upon victims, offenders, pre-attack behaviors including direct threats, attack characteristics, post-offense and other outcomes, motivations and psychological abstracts. The average interrater agreement for coding of bivariate variables was 0.835 (intraclass correlation coefficient). The three most likely victim categories were politicians, judges, and athletes. Attackers were males, many with a psychiatric disorder, most were grandiose, and most had both a violent and nonviolent criminal history. The known motivations for the attacks were often angry and personal, the most common being dissatisfaction with a judicial or other governmental process (23%). In only one case was the primary motivation to achieve notoriety. Lethality risk during an attack was 55%. Collateral injury or death occurred in 29% of the incidents. Only 5% communicated a direct threat to the target beforehand. The term "publicly intimate figure" is introduced to describe the sociocultural blurring of public and private lives among the targets, and its possible role in some attackers' perceptions and motivations. Copyright © 2016 John Wiley & Sons, Ltd.

  18. Effectiveness of the call in beach volleyball attacking play.

    PubMed

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-09

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  19. Effectiveness of the Call in Beach Volleyball Attacking Play

    PubMed Central

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-01-01

    In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2) = 4.55, p = 0.103). In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call. PMID:25713679

  20. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    ERIC Educational Resources Information Center

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  1. Cube-Type Algebraic Attacks on Wireless Encryption Protocols

    DTIC Science & Technology

    2009-09-01

    15. NUMBER OF PAGES 99 14 . SUBJECT TERMS Wireless Security, Cryptanalysis, Boolean Functions, Algebraic Attacks, Correlation Attacks, Cube...Correspondence of the Finite Field....... 12 3. Boolean Function .................................................................. 14 4. Hamming...a a a a     ; continue in that fashion up to the element where there is repetition ( 7a ). 14 3. Boolean Function Definition 2.6: A Boolean

  2. Are Risk Assessments of a Terrorist Attack Coherent?

    ERIC Educational Resources Information Center

    Mandel, David R.

    2005-01-01

    Four experiments examined 3 types of violations of coherence criteria in risk assessments of a terrorist attack. First, the requirement that extensionally equivalent descriptions be assigned the same probability (i.e., additivity) was violated. Unpacking descriptions of an attack into subtypes led to an increase in assessed risk. Second,…

  3. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  4. Is There Anybody There? A Psychodynamic View of Panic Attack.

    ERIC Educational Resources Information Center

    Rizq, Rosemary

    2002-01-01

    Presents a process analysis of a psychodynamic intervention for a client with panic attacks. Discusses how a psychodynamic understanding of the complex etiology of the client's panic attacks that ultimately produced improved coping skills and a subjective sense of improvement for her. Process analysis is used to illustrate the theoretical base,…

  5. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  6. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  7. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  8. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  9. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  10. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  11. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  12. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  13. For Heart Attack Survivors, a Risk of Suicide?

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_162414.html For Heart Attack Survivors, a Risk of Suicide? Study findings underscore ... 2016 (HealthDay News) -- People who've suffered a heart attack or unstable angina may face a higher-than- ...

  14. New Attacks on Animal Researchers Provoke Anger and Worry

    ERIC Educational Resources Information Center

    Guterman, Lila

    2008-01-01

    This article reports on firebomb attacks at the homes of two animal researchers which have provoked anger and unease. The firebomb attacks, which set the home of a neuroscientist at the University of California at Santa Cruz aflame and destroyed a car parked in the driveway of another university researcher's home, have left researchers and…

  15. [Banana tree pests attacking Heliconia latispatha Benth. (Heliconiaceae)].

    PubMed

    Watanabe, Maria A

    2007-01-01

    In mid-May 2005, the caterpillars Antichloris eriphia (Fabr.) (Lepidoptera: Arctiidae) and Calligo illioneus (Cramer) (Lepidoptera: Nymphalidae) which are banana tree pests, were found attacking six-month old stalks of Heliconia latispatha Benth., planted near a banana tree plantation in Jaguariuna, SP, Brazil. The attack by C. illioneus is observed by the first time in Brazil.

  16. Resistance of geopolymer materials to acid attack

    SciTech Connect

    Bakharev, T

    2005-04-01

    This article presents an investigation into durability of geopolymer materials manufactured using a class F fly ash (FA) and alkaline activators when exposed to 5% solutions of acetic and sulfuric acids. The main parameters studied were the evolution of weight, compressive strength, products of degradation and microstructural changes. The degradation was studied using X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FTIR) and scanning electron microscopy (SEM). The performance of geopolymer materials when exposed to acid solutions was superior to ordinary Portland cement (OPC) paste. However, significant degradation of strength was observed in some geopolymer materials prepared with sodium silicate and with a mixture of sodium hydroxide and potassium hydroxide as activators. The deterioration observed was connected to depolymerisation of the aluminosilicate polymers in acidic media and formation of zeolites, which in some cases lead to a significant loss of strength. The best performance was observed in the geopolymer material prepared with sodium hydroxide and cured at elevated temperature, which was attributed to a more stable cross-linked aluminosilicate polymer structure formed in this material.

  17. Environmental and habitat drivers of relative abundance for a suite of azteca-attacking Pseudacteon phorid flies.

    PubMed

    Reese, Katlynd M; Philpott, Stacy M

    2012-10-01

    Phoridae (Diptera) have widespread impacts on insect communities by limiting host ant behavior. However, phorid-ant interactions may vary with habitat or environmental conditions. Three Pseudacteon species parasitize Azteca instabilis Fr. Smith, a common ant in coffee agroecosystems, and limit A. instabilis foraging, indirectly benefiting other insects. However, little is known about how phorid abundance, behavior, and effects change with environmental conditions. In shaded coffee systems, coffee (Coffea arabica L.) grows under a range of shade conditions and management changes affect species interactions. For example, Pseudacteon spp. more strongly limit A. instabilis foraging in low-shade coffee habitats. We sampled relative abundance of three phorid species around A. instabilis nests in three coffee habitats varying in shade management during dry and wet seasons. We measured canopy cover, tree richness, tree density, leaf litter depth, and number of nearby trees with A. instabilis to determine whether these habitat factors correlate with phorid abundance. P. laciniosus Brown was the most abundant phorid in both seasons. Phorid relative abundance did not differ by habitat, but did differ by season. P. laciniosus accounted for a higher proportion of phorids in the wet season (91.4%) than in the dry season (78.9%), and P. planidorsalis Brown accounted for a larger percent in the dry season (21.1%) than in the wet season (7.3%). Phorid composition did not differ with habitat type, and none of the measured environmental variables correlated with changes in phorid composition. Thus, phorids in coffee agroecosystems respond to large seasonal differences, but not differences between coffee habitats.

  18. Review of parasitic wasps and flies (Hymenoptera, Diptera) attacking Limacodidae (Lepidoptera) in North America, with a key to genera

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Hymenopteran and dipteran parasitoids of slug caterpillars (Lepidoptera: Limacodidae) from North America are reviewed and an illustrated key to 17 genera is presented. Limacodid surveys and rearing were conducted by the Lill lab (JTL, SMM, TMS) during the summer months of 2004–2009 as part of their...

  19. Design of the ST 3 Formation Flying Interferometer

    NASA Technical Reports Server (NTRS)

    Lay, O.; Blackwood, G.; Dubovitsky, S.; Gorham, P.; Linfield, R.

    1999-01-01

    The interferometer will operate in both a single spacecraft mode and a formation flying mode using two spacecraft. The primary goal is to validate interferometer and formation flying technology for future missions.

  20. Eco-friendly fly ash utilization: potential for land application

    SciTech Connect

    Malik, A.; Thapliyal, A.

    2009-07-01

    The increase in demand for power in domestic, agricultural, and industrial sectors has increased the pressure on coal combustion and aggravated the problem of fly ash generation/disposal. Consequently the research targeting effective utilization of fly ash has also gained momentum. Fly ash has proved to be an economical substitute for expensive adsorbents as well as a suitable raw material for brick manufacturing, zeolite synthesis, etc. Fly ash is a reservoir of essential minerals but is deficient in nitrogen and phosphorus. By amending fly ash with soil and/or various organic materials (sewage sludge, bioprocess materials) as well as microbial inoculants like mycorrhizae, enhanced plant growth can be realized. Based on the sound results of large scale studies, fly ash utilization has grown into prominent discipline supported by various internationally renowned organizations. This paper reviews attempts directed toward various utilization of fly ash, with an emphasis on land application of organic/microbial inoculants amended fly ash.

  1. Studies on sulfate attack: Mechanisms, test methods, and modeling

    NASA Astrophysics Data System (ADS)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  2. Weak laws against acid attacks on women: an Indian perspective.

    PubMed

    Ahmad, Nehaluddin

    2012-01-01

    Acid attacks, especially on women, have seen an alarming growth in India over the last decade. While these attacks can be attributed to various factors such as the social weakness of women in a male-dominated society, the situation is exacerbated by the general neglect of the lawmakers. As acid is inexpensive and easily available, it serves as an ideal weapon for the perpetrators. Further, as this offence is bailable in certain situations, the punishment does not act as a sufficient deterrent in most cases. This paper describes the horrendous effects that acid attacks have on the victims physically, psychologically and socially. It also examines the contemporary laws governing acid attacks on victims and offenders. Ideas for a better legal approach will also be examined with special reference to acid attacks as a crime, and the validity of specific legal provisions for female victims.

  3. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  4. Expected losses, insurability, and benefits from reducing vulnerability to attacks.

    SciTech Connect

    Nozick, Linda Karen; Carlson, Rolf Erik; Turnquist, Mark Alan

    2004-03-01

    A model of malicious attacks against an infrastructure system is developed that uses a network representation of the system structure together with a Hidden Markov Model of an attack at a node of that system and a Markov Decision Process model of attacker strategy across the system as a whole. We use information systems as an illustration, but the analytic structure developed can also apply to attacks against physical facilities or other systems that provide services to customers. This structure provides an explicit mechanism to evaluate expected losses from malicious attacks, and to evaluate changes in those losses that would result from system hardening. Thus, we provide a basis for evaluating the benefits of system hardening. The model also allows investigation of the potential for the purchase of an insurance contract to cover the potential losses when safeguards are breached and the system fails.

  5. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  6. The Application of Baum-Welch Algorithm in Multistep Attack

    PubMed Central

    Zhang, Yanxue; Zhao, Dongmei; Liu, Jinxing

    2014-01-01

    The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction. PMID:24991642

  7. IVs to Skip for Immunizing WEP against FMS Attack

    NASA Astrophysics Data System (ADS)

    Kobara, Kazukuni; Imai, Hideki

    The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive skip methods reveal information on the WEP key since most of them depend on the WEP key and the patterns of the skipped IV reveal it. In order to skip IVs safely, the skip patterns must be chosen carefully. In this paper, we review the attack conditions (6) and (7), whose success probability is the highest, 0.05, amongst all known conditions to guess one key-byte from one packet. Then we identify their safe skip patterns.

  8. FlyBase: the Drosophila database. The Flybase Consortium.

    PubMed Central

    1996-01-01

    FlyBase is a database of genetic and molecular data concerning Drosophila. FlyBase is maintained as a relational database (in Sybase). The scope of FlyBase includes: genes, alleles (and phenotypes), aberrations, pointers to sequence data, clones, stock lists, Drosophila workers and bibliographic references. FlyBase is also available on CD-ROM for Macintosh systems (Encyclopaedia of Drosophila). PMID:8594600

  9. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  10. Node Survival in Networks under Correlated Attacks

    PubMed Central

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles. PMID:25932635

  11. Node Survival in Networks under Correlated Attacks.

    PubMed

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles.

  12. Assessment and treatment of nocturnal panic attacks.

    PubMed

    Craske, Michelle G; Tsao, Jennie C I

    2005-06-01

    Nocturnal panic (NP), waking from sleep in a state of panic, is a common occurrence among patients with panic disorder, with 44-71% reporting at least one such attack. NP is a non-REM event that is distinct from sleep terrors, sleep apnea, nightmares or dream-induced arousals. This review outlines recent advances in the characterization of NP, as well as current approaches to the assessment and treatment of NP. In contrast to earlier work, more recent studies suggest that patients with NP do not differ from patients without NP on sleep architecture, sleep physiology, self-reported sleep quality and severity of panic disorder. However, more precise measurement of physiological precipitants and features is warranted. Assessment of NP focuses on ruling out other explanations for NP, with differential diagnosis based on interviews, sleep polysomnography and ambulatory recording of sleep. Psychological treatment (cognitive-behavioral therapy) targets misappraisals of anxiety sensations, hyperventilatory response, and conditioned reactions to internal, physical cues. Recent evidence supports the efficacy of this approach, however, controlled studies on pharmacological agents in the treatment of NP are lacking. Research is needed to examine the effects of combined cognitive-behavioral therapy and medications, compared to medication alone in the treatment of NP.

  13. Pre-Attack Symptomatology and Temperament as Predictors of Children's Responses to the September 11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Smith, Kimberlee I.; Meltzoff, Andrew N.

    2005-01-01

    Background: The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Method: Children's responses were assessed in a community sample of children in Seattle, Washington,…

  14. 14 CFR 91.503 - Flying equipment and operating information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 2 2011-01-01 2011-01-01 false Flying equipment and operating information... Turbine-Powered Multiengine Airplanes and Fractional Ownership Program Aircraft § 91.503 Flying equipment... flying equipment and aeronautical charts and data, in current and appropriate form, are accessible...

  15. 30 CFR 56.14110 - Flying or falling materials.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Flying or falling materials. 56.14110 Section... Equipment Safety Devices and Maintenance Requirements § 56.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors present...

  16. 30 CFR 57.14110 - Flying or falling materials.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Flying or falling materials. 57.14110 Section... and Equipment Safety Devices and Maintenance Requirements § 57.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or...

  17. 7 CFR 29.3151 - Flyings (X Group).

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 2 2013-01-01 2013-01-01 false Flyings (X Group). 29.3151 Section 29.3151 Agriculture... INSPECTION Standards Grades § 29.3151 Flyings (X Group). This group consists of leaves normally grown at the... other groups on the stalk, Flyings consist of relatively thin to tissuey leaves which show the...

  18. 7 CFR 29.3151 - Flyings (X Group).

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 2 2012-01-01 2012-01-01 false Flyings (X Group). 29.3151 Section 29.3151 Agriculture... INSPECTION Standards Grades § 29.3151 Flyings (X Group). This group consists of leaves normally grown at the... other groups on the stalk, Flyings consist of relatively thin to tissuey leaves which show the...

  19. 14 CFR 61.110 - Night flying exceptions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 2 2014-01-01 2014-01-01 false Night flying exceptions. 61.110 Section 61... flying exceptions. (a) Subject to the limitations of paragraph (b) of this section, a person is not...: (1) May be issued a pilot certificate with a limitation “Night flying prohibited”; and (2)...

  20. 30 CFR 57.14110 - Flying or falling materials.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Flying or falling materials. 57.14110 Section... and Equipment Safety Devices and Maintenance Requirements § 57.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or...

  1. 30 CFR 57.14110 - Flying or falling materials.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Flying or falling materials. 57.14110 Section... and Equipment Safety Devices and Maintenance Requirements § 57.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or...

  2. 30 CFR 56.14110 - Flying or falling materials.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Flying or falling materials. 56.14110 Section... Equipment Safety Devices and Maintenance Requirements § 56.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors present...

  3. 30 CFR 56.14110 - Flying or falling materials.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Flying or falling materials. 56.14110 Section... Equipment Safety Devices and Maintenance Requirements § 56.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors present...

  4. 14 CFR 91.503 - Flying equipment and operating information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 2 2013-01-01 2013-01-01 false Flying equipment and operating information... Turbine-Powered Multiengine Airplanes and Fractional Ownership Program Aircraft § 91.503 Flying equipment... flying equipment and aeronautical charts and data, in current and appropriate form, are accessible...

  5. 14 CFR 61.110 - Night flying exceptions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 2 2011-01-01 2011-01-01 false Night flying exceptions. 61.110 Section 61... flying exceptions. (a) Subject to the limitations of paragraph (b) of this section, a person is not...: (1) May be issued a pilot certificate with a limitation “Night flying prohibited”; and (2)...

  6. 14 CFR 61.110 - Night flying exceptions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Night flying exceptions. 61.110 Section 61... flying exceptions. (a) Subject to the limitations of paragraph (b) of this section, a person is not...: (1) May be issued a pilot certificate with a limitation “Night flying prohibited”; and (2)...

  7. 14 CFR 91.503 - Flying equipment and operating information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 2 2012-01-01 2012-01-01 false Flying equipment and operating information... Turbine-Powered Multiengine Airplanes and Fractional Ownership Program Aircraft § 91.503 Flying equipment... flying equipment and aeronautical charts and data, in current and appropriate form, are accessible...

  8. 14 CFR 61.110 - Night flying exceptions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 2 2013-01-01 2013-01-01 false Night flying exceptions. 61.110 Section 61... flying exceptions. (a) Subject to the limitations of paragraph (b) of this section, a person is not...: (1) May be issued a pilot certificate with a limitation “Night flying prohibited”; and (2)...

  9. 14 CFR 61.110 - Night flying exceptions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 2 2012-01-01 2012-01-01 false Night flying exceptions. 61.110 Section 61... flying exceptions. (a) Subject to the limitations of paragraph (b) of this section, a person is not...: (1) May be issued a pilot certificate with a limitation “Night flying prohibited”; and (2)...

  10. 14 CFR 91.503 - Flying equipment and operating information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 2 2014-01-01 2014-01-01 false Flying equipment and operating information... Turbine-Powered Multiengine Airplanes and Fractional Ownership Program Aircraft § 91.503 Flying equipment... flying equipment and aeronautical charts and data, in current and appropriate form, are accessible...

  11. 7 CFR 29.3151 - Flyings (X Group).

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 2 2011-01-01 2011-01-01 false Flyings (X Group). 29.3151 Section 29.3151 Agriculture... INSPECTION Standards Grades § 29.3151 Flyings (X Group). This group consists of leaves normally grown at the... other groups on the stalk, Flyings consist of relatively thin to tissuey leaves which show the...

  12. 7 CFR 29.3151 - Flyings (X Group).

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 2 2014-01-01 2014-01-01 false Flyings (X Group). 29.3151 Section 29.3151 Agriculture... INSPECTION Standards Grades § 29.3151 Flyings (X Group). This group consists of leaves normally grown at the... other groups on the stalk, Flyings consist of relatively thin to tissuey leaves which show the...

  13. 30 CFR 56.14110 - Flying or falling materials.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Flying or falling materials. 56.14110 Section... Equipment Safety Devices and Maintenance Requirements § 56.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors present...

  14. 30 CFR 57.14110 - Flying or falling materials.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Flying or falling materials. 57.14110 Section... and Equipment Safety Devices and Maintenance Requirements § 57.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or...

  15. Pandora bullata (Entomophthorales) affecting calliphorid flies in Central Brazil

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Fungi are where one finds them, and if one seeks fungal pathogens affecting flies, then a garbage dump may be an ideal place to find both persistent, abundant fly populations and their fungal pathogens. An obvious fungal epizootic affecting blue bottle flies, Chrysomyia megacephala (Diptera: Calliph...

  16. Acetylcholinesterase mutations and organophosphate resistance in sand flies and mosquitoes

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Leishmaniasis is an insect-borne disease caused by several protozoan species in the genus Leishmania, which are vectored by sand fly species in the genera Phlebotomus or Lutzomyia, depending on the sand fly species geographic range. Sand fly bites and leishmaniasis significantly impacted U.S. milita...

  17. Vestergaard zerofly fabric for stable fly management outside of Africa

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Vestergaard ZeroFly pesticide-impregnated fabric has been evaluated in zero-graze swine and cattle facilities in Sub-Saharan Africa for management of biting flies, particularly those capable of transmitting Nagana, i.e. tsetse. Other major blood-feeding flies encountered around these units are vario...

  18. Vestergaard zerofly fabric for fly control in the US

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Vestergaard ZeroFly pesticide-impregnated fabric has been evaluated in zero-graze swine and cattle farms in Sub-Saharan Africa for management of biting flies, particularly those capable of transmitting Nangana, i.e. tsetse. Other major blood-feeding flies encountered around these units are various s...

  19. Caribbean Fruit Fly (Diptera: Tephritidae) and Small Fruit in Florida

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Tephritid fruit flies are among the most important pests of fruits and vegetables worldwide. The Caribbean fruit fly, Anastrepha suspensa (Loew), is a tephritid pest that became established in Florida following introduction in 1965. Populations of this fruit fly also occur in Puerto Rico and Cuba, ...

  20. 30 CFR 56.14110 - Flying or falling materials.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Flying or falling materials. 56.14110 Section... Equipment Safety Devices and Maintenance Requirements § 56.14110 Flying or falling materials. In areas where flying or falling materials generated from the operation of screens, crushers, or conveyors present...