Sample records for green attack damage

  1. Formation and emission of linalool in tea (Camellia sinensis) leaves infested by tea green leafhopper (Empoasca (Matsumurasca) onukii Matsuda).

    PubMed

    Mei, Xin; Liu, Xiaoyu; Zhou, Ying; Wang, Xiaoqin; Zeng, Lanting; Fu, Xiumin; Li, Jianlong; Tang, Jinchi; Dong, Fang; Yang, Ziyin

    2017-12-15

    Famous oolong tea (Oriental Beauty), which is manufactured by tea leaves (Camellia sinensis) infected with tea green leafhoppers, contains characteristic volatile monoterpenes derived from linalool. This study aimed to determine the formation mechanism of linalool in tea exposed to tea green leafhopper attack. The tea green leafhopper responsible for inducing the production of characteristic volatiles was identified as Empoasca (Matsumurasca) onukii Matsuda. E. (M.) onukii attack significantly induced the emission of linalool from tea leaves (p<0.05) as a result of the up-regulation of the linalool synthases (CsLIS1 and CsLIS2) (p<0.05). Continuous mechanical damage significantly enhanced CsLIS1 and CsLIS2 expression levels and linalool emission (p<0.05). Therefore, continuous wounding was a key factor causing the formation and emission of linalool from tea leaves exposed to E. (M.) onukii attack. This information should prove helpful for the future use of stress responses of plant secondary metabolism to improve quality components of agricultural products. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Individual-tree tests of verbenone flakes, verbenone pouches, and green-leaf volatiles to protect lodgepole pines from mountain pine beetle attack

    Treesearch

    Sandra Kegley; Ken Gibson; Nancy Gillette; Jeff Webster; Lee Pederson; Silvia. Mori

    2010-01-01

    We have long known that the bark beetle-produced pheromone, verbenone (trimethyl-bicyclo-heptenone), can limit damage to pines by scolytid bark beetles (Clarke et al. 1999, Skillen et al. 1997, Syracuse Environmental Research Associates, Inc. 2000). It has also been shown that in some cases the addition of ―green leaf volatiles‖ (GLVs) can increase the efficacy of...

  3. Plants as green phones

    PubMed Central

    Harvey, Jeffrey A; Bezemer, T Martijn; Stuefer, Josef F

    2008-01-01

    Plants can act as vertical communication channels or ‘green phones’ linking soil-dwelling insects and insects in the aboveground ecosystem. When root-feeding insects attack a plant, the direct defense system of the shoot is activated, leading to an accumulation of phytotoxins in the leaves. The protection of the plant shoot elicited by root damage can impair the survival, growth and development of aboveground insect herbivores, thereby creating plant-based functional links between soil-dwelling insects and insects that develop in the aboveground ecosystem. The interactions between spatially separated insects below- and aboveground are not restricted to root and foliar plant-feeding insects, but can be extended to higher trophic levels such as insect parasitoids. Here we discuss some implications of plants acting as communication channels or ‘green phones’ between root and foliar-feeding insects and their parasitoids, focusing on recent findings that plants attacked by root-feeding insects are significantly less attractive for the parasitoids of foliar-feeding insects. PMID:19513244

  4. Plants as green phones: Novel insights into plant-mediated communication between below- and above-ground insects.

    PubMed

    Soler, Roxina; Harvey, Jeffrey A; Bezemer, T Martijn; Stuefer, Josef F

    2008-08-01

    Plants can act as vertical communication channels or 'green phones' linking soil-dwelling insects and insects in the aboveground ecosystem. When root-feeding insects attack a plant, the direct defense system of the shoot is activated, leading to an accumulation of phytotoxins in the leaves. The protection of the plant shoot elicited by root damage can impair the survival, growth and development of aboveground insect herbivores, thereby creating plant-based functional links between soil-dwelling insects and insects that develop in the aboveground ecosystem. The interactions between spatially separated insects below- and aboveground are not restricted to root and foliar plant-feeding insects, but can be extended to higher trophic levels such as insect parasitoids. Here we discuss some implications of plants acting as communication channels or 'green phones' between root and foliar-feeding insects and their parasitoids, focusing on recent findings that plants attacked by root-feeding insects are significantly less attractive for the parasitoids of foliar-feeding insects.

  5. Nocturnal herbivore-induced plant volatiles attract the generalist predatory earwig Doru luteipes Scudder

    NASA Astrophysics Data System (ADS)

    Naranjo-Guevara, Natalia; Peñaflor, Maria Fernanda G. V.; Cabezas-Guerrero, Milton F.; Bento, José Maurício S.

    2017-10-01

    Numerous studies have demonstrated that entomophagous arthropods use herbivore-induced plant volatile (HIPV) blends to search for their prey or host. However, no study has yet focused on the response of nocturnal predators to volatile blends emitted by prey damaged plants. We investigated the olfactory behavioral responses of the night-active generalist predatory earwig Doru luteipes Scudder (Dermaptera: Forficulidae) to diurnal and nocturnal volatile blends emitted by maize plants ( Zea mays) attacked by either a stem borer ( Diatraea saccharalis) or a leaf-chewing caterpillar ( Spodoptera frugiperda), both suitable lepidopteran prey. Additionally, we examined whether the earwig preferred odors emitted from short- or long-term damaged maize. We first determined the earwig diel foraging rhythm and confirmed that D. luteipes is a nocturnal predator. Olfactometer assays showed that during the day, although the earwigs were walking actively, they did not discriminate the volatiles of undamaged maize plants from those of herbivore damaged maize plants. In contrast, at night, earwigs preferred volatiles emitted by maize plants attacked by D. saccharalis or S. frugiperda over undamaged plants and short- over long-term damaged maize. Our GC-MS analysis revealed that short-term damaged nocturnal plant volatile blends were comprised mainly of fatty acid derivatives (i.e., green leaf volatiles), while the long-term damaged plant volatile blend contained mostly terpenoids. We also observed distinct volatile blend composition emitted by maize damaged by the different caterpillars. Our results showed that D. luteipes innately uses nocturnal herbivore-induced plant volatiles to search for prey. Moreover, the attraction of the earwig to short-term damaged plants is likely mediated by fatty acid derivatives.

  6. European spruce bark beetle (Ips typographus, L.) green attack affects foliar reflectance and biochemical properties

    NASA Astrophysics Data System (ADS)

    Abdullah, Haidi; Darvishzadeh, Roshanak; Skidmore, Andrew K.; Groen, Thomas A.; Heurich, Marco

    2018-02-01

    The European spruce bark beetle Ips typographus, L. (hereafter bark beetle), causes major economic loss to the forest industry in Europe, especially in Norway Spruce (Picea abies). To minimise economic loss and preclude a mass outbreak, early detection of bark beetle infestation (so-called ;green attack; stage - a period at which trees are yet to show visual signs of infestation stress) is, therefore, a crucial step in the management of Norway spruce stands. It is expected that a bark beetle infestation at the green attack stage affects a tree's physiological and chemical status. However, the concurrent effect on key foliar biochemical such as foliar nitrogen and chlorophyll as well as spectral responses are not well documented in the literature. Therefore, in this study, the early detection of bark beetle green attacks is investigated by examining foliar biochemical and spectral properties (400-2000 nm). We also assessed whether bark beetle infestation affects the estimation accuracy of foliar biochemicals. An extensive field survey was conducted in the Bavarian Forest National Park (BFNP), Germany, in the early summer of 2015 to collect leaf samples from 120 healthy and green attacked trees. The spectra of the leaf samples were measured using an ASD FieldSpec3 equipped with an integrating sphere. Significant differences (p < 0.05) between healthy and infested needle samples were found in the mean reflectance spectra, with the most pronounced differences being observed in the NIR and SWIR regions between 730 and 1370 nm. Furthermore, significant differences (p < 0.05) were found in the biochemical compositions (chlorophyll and nitrogen concentration) of healthy versus green attacked samples. Our results further demonstrate that the estimation accuracy of foliar chlorophyll and nitrogen concentrations, utilising partial least square regression model, was lower for the infested compared to the healthy trees. We show that early stage of infestation reduces not only foliar biochemical content but also their retrieval accuracy. Our results further indicate that remote sensing measurements can be successfully used for the early detection of the bark beetle infestation. We demonstrated that bark beetle infestation at the green attack stage effects leaf spectral response as well as leaf biochemical properties and their retrievals from hyperspectral measurements.

  7. About Heart Attacks

    MedlinePlus

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  8. Douglas-fir beetle attack and tree mortality following wildfire

    Treesearch

    Sharon M. Hood; Barbara Bentz; Kevin C. Ryan

    2003-01-01

    A major concern after wildfires is the buildup of bark beetle populations in fire injured trees, and subsequent attack and population buildup in adjacent unburned areas. To examine this concern, we documented fire injury and insect attacks in Douglas-fir (Pseudotsuga menziesii) on the 2001 Green Knoll Fire, Wyoming to determine attack preferences, brood production, and...

  9. Strategic Implications of Hybrid War: A Theory of Victory

    DTIC Science & Technology

    2009-05-21

    Guiding Rules (London: Kegan Paul, Trench, Trubner and Co, Ltd, 1908), 19. A recommended modification to account for current context would be to substitute...of Amateur Strategy: As Exemplified by the Attack on the Dardanelles Fortress in 1915 (New York: Longmans, Green , and Co. Ltd., 1926...Sir Gerald. The Perils of Amateur Strategy: As Exemplified by the Attack on the Dardanelles Fortress in 1915. New York: Longmans, Green , and Co

  10. Estimating the probability of mountain pine beetle red-attack damage

    Treesearch

    Michael A Wulder; J. C. White; Barbara J Bentz; M. F. Alvarez; N. C. Coops

    2006-01-01

    Accurate spatial information on the location and extent of mountain pine beetle infestation is critical for the planning of mitigation and treatment activities. Areas of mixed forest and variable terrain present unique challenges for the detection and mapping of mountain pine beetle red-attack damage, as red-attack has a more heterogeneous distribution under these...

  11. Analytic barrage attack model. Final report, January 1986-January 1989

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    St Ledger, J.W.; Naegeli, R.E.; Dowden, N.A.

    An analytic model is developed for a nuclear barrage attack, assuming weapons with no aiming error and a cookie-cutter damage function. The model is then extended with approximations for the effects of aiming error and distance damage sigma. The final result is a fast running model which calculates probability of damage for a barrage attack. The probability of damage is accurate to within seven percent or better, for weapon reliabilities of 50 to 100 percent, distance damage sigmas of 0.5 or less, and zero to very large circular error probabilities. FORTRAN 77 coding is included in the report for themore » analytic model and for a numerical model used to check the analytic results.« less

  12. Spatial variability in oviposition damage by periodical cicadas in a fragmented landscape.

    PubMed

    Cook, William M; Holt, Robert D; Yao, Jin

    2001-03-01

    Effects of the periodical cicada (Magicicada spp.) on forest dynamics are poorly documented. A 1998 emergence of M. cassini in eastern Kansas led to colonization of a fragmented experimental landscape undergoing secondary succession. We hypothesized that per-tree rates of oviposition damage by cicadas would reflect: (1) distance from the source of the emergence, (2) patch size, and (3) local tree density. Ovipositing females displayed clear preferences for host species and damage incidence showed predictable spatial patterns. Two species (smooth sumac, Rhus glabra, and eastern red cedar, Juniperus virginiana) were rarely attacked, whereas others (rough-leaved dogwood, Cornus drummondii; slippery elm, Ulmus rubra; box elder, Acer negundo, and honey locust, Gleditsia triacanthos) were strongly attacked. The dominant early successional tree, dogwood, received on average the most attacks. As predicted, attacks per stem declined strongly with distance from the emergence source, and with local stem density (a "dilution" effect). Contrary to expectations, there were more attacks per stem on larger patches. Because ovipositing cicadas cut damaging slits in host tree branches, potentially affecting tree growth rate, competitive ability, and capacity to reproduce, cicada damage could potentially influence spatial variation in secondary succession.

  13. Early perception of stink bug damage in developing seeds of field-grown soybean induces chemical defences and reduces bug attack.

    PubMed

    Giacometti, Romina; Barneto, Jesica; Barriga, Lucia G; Sardoy, Pedro M; Balestrasse, Karina; Andrade, Andrea M; Pagano, Eduardo A; Alemano, Sergio G; Zavala, Jorge A

    2016-08-01

    Southern green stink bugs (Nezara viridula L.) invade field-grown soybean crops, where they feed on developing seeds and inject phytotoxic saliva, which causes yield reduction. Although leaf responses to herbivory are well studied, no information is available about the regulation of defences in seeds. This study demonstrated that mitogen-activated protein kinases MPK3, MPK4 and MPK6 are expressed and activated in developing seeds of field-grown soybean and regulate a defensive response after stink bug damage. Although 10-20 min after stink bug feeding on seeds induced the expression of MPK3, MPK6 and MPK4, only MPK6 was phosphorylated after damage. Herbivory induced an early peak of jasmonic acid (JA) accumulation and ethylene (ET) emission after 3 h in developing seeds, whereas salicylic acid (SA) was also induced early, and at increasing levels up to 72 h after damage. Damaged seeds upregulated defensive genes typically modulated by JA/ET or SA, which in turn reduced the activity of digestive enzymes in the gut of stink bugs. Induced seeds were less preferred by stink bugs. This study shows that stink bug damage induces seed defences, which is perceived early by MPKs that may activate defence metabolic pathways in developing seeds of field-grown soybean. © 2015 Society of Chemical Industry. © 2015 Society of Chemical Industry.

  14. Trends in Terrorism: 2006

    DTIC Science & Technology

    2006-07-21

    documented are attacks aimed at damaging tourism (e.g. Bali , Luxor) and those disrupting transportation infrastructure (Madrid, London, and plots foiled in...policy focus are (1) attacks that aim to cause economic damage such as attacks on transportation infrastructure, tourism , and oil installations, (2) the...and the allies. Building the group’s own armaments industry is cited as a revised goal as well. See “Papers Reveal Weakening Terror Group,” by Rowan

  15. Descriptive study of damage caused by the rhinoceros beetle, Oryctes agamemnon, and its influence on date palm oases of Rjim Maatoug, Tunisia.

    PubMed

    Soltani, Rasmi; Lkbel, Chaieb; Habib Ben Hamouda, Med

    2008-01-01

    Oryctes agamemnon (Burmeister 1847) (Coleoptera, Scarabaeidae) was accidentally introduced in the southwestern oases of Tunisia (Tozeur) around 1980 and spread to the Rjim Maatoug region. In these areas O. agamemnon was specific to date palm trees causing severe damage that can result in potential danger due to collapse of the tree. This study was conducted from April 2004 to March 2006 in 4 sites in the region of Rjim Maatoug. Different levels of palm tree attack were determined, ovioposition sites were identified, and pest damage was described in detail to specify their relative importance and to indicate factors governing palm tree attack. Eggs were individually oviposited in the attacked parts. Dead parts of palm trees were the main target of O. agamemnon including the respiratory roots, tough, trunk bark, dry petiole and the periphery of the crown. The crown itself was not attacked. Feeding by larvae caused significant damage. The biggest danger occurred when heavy attacks of larvae invaded the respiratory roots at the level of the soil, and secondarily on the periphery of the crown, which can result in fungal diseases. Several cases of Deglet Nour date palm tree collapse were caused by this pest in Rjim Maatoug. Attacks on other parts of the tree were without danger for the palm tree. In the absence of pest management, application of a quarantine program combined with field cultivation techniques could help farmers significantly decrease attack of O. agamemnon on palm trees.

  16. TSARINA: A computer model for assessing conventional and chemical attacks on air bases

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Emerson, D.E.; Wegner, L.H.

    This Note describes the latest version of the TSARINA (TSAR INputs using AIDA) airbase damage assessment computer program that has been developed to estimate the on-base concentration of toxic agents that would be deposited by a chemical attack and to assess losses to various on-base resources from conventional attacks, as well as the physical damage to runways, taxiways, buildings, and other facilities. Although the model may be used as a general-purpose, complex-target damage assessment model, its primary role in intended to be in support of the TSAR (Theater Simulation of Airbase Resources) aircraft sortie generation simulation program. When used withmore » TSAR, multiple trials of a multibase airbase-attack campaign can be assessed with TSARINA, and the impact of those attacks on sortie generation can be derived using the TSAR simulation model. TSARINA, as currently configured, permits damage assessments of attacks on an airbase (or other) complex that is compassed of up to 1000 individual targets (buildings, taxiways, etc,), and 2500 packets of resources. TSARINA determines the actual impact points (pattern centroids for CBUs and container burst point for chemical weapons) by Monte Carlo procedures-i.e., by random selections from the appropriate error distributions. Uncertainties in wind velocity and heading are also considered for chemical weapons. Point-impact weapons that impact within a specified distance of each target type are classed as hits, and estimates of the damage to the structures and to the various classes of support resources are assessed using cookie-cutter weapon-effects approximations.« less

  17. Susceptibility and Interactions of Drosophila suzukii and Zaprionus indianus (Diptera: Drosophilidae) in Damaging Strawberry.

    PubMed

    Bernardi, D; Andreazza, F; Botton, M; Baronio, C A; Nava, D E

    2017-02-01

    Drosophila suzukii (Matsumura) has been recently detected causing damage to strawberries in Brazil. Infestation in strawberry culture has often been observed jointly with the presence of Zaprionus indianus Gupta. This study investigated the susceptibility of strawberries at three ripening stages to infestation of D. suzukii and Z. indianus and their interaction. In the laboratory, strawberries cv. Albion at different ripening stages (green, semi-ripe and ripe) were exposed to D. suzukii and Z. indianus for 24 h in choice and no-choice bioassays. Additionally, we evaluated the effects of mechanical damage incurred artificially or by D. suzukii oviposition on Z. indianus infestation. In no-choice bioassay, there were no significant differences in fruit susceptibility to D. suzukii infestation at different ripening stages. However, in choice bioassay, D. suzukii adults preferred to oviposit on R fruit. The presence of mechanical damage did not increase susceptibility of fruit to D. suzukii oviposition. For Z. indianus, there was greater susceptibility of R fruit in relation to SR and G fruit in both the choice and no-choice bioassays. There was a significant and positive interaction of mechanical damage and damage caused by D. suzukii to R fruit and infestation by Z. indianus, which was not observed in SR and G fruit. Although infestation of Z. indianus is related to attack damaged or decaying fruit, this work shows that this species has the ability to oviposit and develop in healthy strawberry fruit with and increased infestation level when the fruit has damage to its epidermis.

  18. Damage Characterization of Bio and Green Polyethylene-Birch Composites under Creep and Cyclic Testing with Multivariable Acoustic Emissions.

    PubMed

    Bravo, Alencar; Toubal, Lotfi; Koffi, Demagna; Erchiqui, Fouad

    2015-11-02

    Despite the knowledge gained in recent years regarding the use of acoustic emissions (AEs) in ecologically friendly, natural fiber-reinforced composites (including certain composites with bio-sourced matrices), there is still a knowledge gap in the understanding of the difference in damage behavior between green and biocomposites. Thus, this article investigates the behavior of two comparable green and biocomposites with tests that better reflect real-life applications, i.e. , load-unloading and creep testing, to determine the evolution of the damage process. Comparing the mechanical results with the AE, it can be concluded that the addition of a coupling agent (CA) markedly reduced the ratio of AE damage to mechanical damage. CA had an extremely beneficial effect on green composites because the Kaiser effect was dominant during cyclic testing. During the creep tests, the use of a CA also avoided the transition to new damaging phases in both composites. The long-term applications of PE green material must be chosen carefully because bio and green composites with similar properties exhibited different damage processes in tests such as cycling and creep that could not be previously understood using only monotonic testing.

  19. Damage Characterization of Bio and Green Polyethylene–Birch Composites under Creep and Cyclic Testing with Multivariable Acoustic Emissions

    PubMed Central

    Bravo, Alencar; Toubal, Lotfi; Koffi, Demagna; Erchiqui, Fouad

    2015-01-01

    Despite the knowledge gained in recent years regarding the use of acoustic emissions (AEs) in ecologically friendly, natural fiber-reinforced composites (including certain composites with bio-sourced matrices), there is still a knowledge gap in the understanding of the difference in damage behavior between green and biocomposites. Thus, this article investigates the behavior of two comparable green and biocomposites with tests that better reflect real-life applications, i.e., load-unloading and creep testing, to determine the evolution of the damage process. Comparing the mechanical results with the AE, it can be concluded that the addition of a coupling agent (CA) markedly reduced the ratio of AE damage to mechanical damage. CA had an extremely beneficial effect on green composites because the Kaiser effect was dominant during cyclic testing. During the creep tests, the use of a CA also avoided the transition to new damaging phases in both composites. The long-term applications of PE green material must be chosen carefully because bio and green composites with similar properties exhibited different damage processes in tests such as cycling and creep that could not be previously understood using only monotonic testing. PMID:28793640

  20. Heart Diseases and Disorders

    MedlinePlus

    ... the risk of injuries from falling. Circulatory Disorders Heart Attack (Myocardial Infarction ) When arteries become so clogged that ... damage or kill the heart muscle, causing a heart attack . Knowing the symptoms of a heart attack and ...

  1. Heart Attack Coronary Artery Disease

    MedlinePlus

    ... our e-newsletter! Aging & Health A to Z Heart Attack Coronary Artery Disease, Angina Basic Facts & Information What ... and oxygen supply; this is what causes a heart attack. If the damaged area is small, however, your ...

  2. Descriptive Study of Damage Caused by the Rhinoceros Beetle, Oryctes agamemnon, and Its Influence on Date Palm Oases of Rjim Maatoug, Tunisia

    PubMed Central

    Soltani, Rasmi; lkbel, Chaieb; Habib Ben Hamouda, Med

    2008-01-01

    Oryctes agamemnon (Burmeister 1847) (Coleoptera, Scarabaeidae) was accidentally introduced in the southwestern oases of Tunisia (Tozeur) around 1980 and spread to the Rjim Maatoug region. In these areas O. agamemnon was specific to date palm trees causing severe damage that can result in potential danger due to collapse of the tree. This study was conducted from April 2004 to March 2006 in 4 sites in the region of Rjim Maatoug. Different levels of palm tree attack were determined, ovioposition sites were identified, and pest damage was described in detail to specify their relative importance and to indicate factors governing palm tree attack. Eggs were individually oviposited in the attacked parts. Dead parts of palm trees were the main target of O. agamemnon including the respiratory roots, tough, trunk bark, dry petiole and the periphery of the crown. The crown itself was not attacked. Feeding by larvae caused significant damage. The biggest danger occurred when heavy attacks of larvae invaded the respiratory roots at the level of the soil, and secondarily on the periphery of the crown, which can result in fungal diseases. Several cases of Deglet Nour date palm tree collapse were caused by this pest in Rjim Maatoug. Attacks on other parts of the tree were without danger for the palm tree. In the absence of pest management, application of a quarantine program combined with field cultivation techniques could help farmers significantly decrease attack of O. agamemnon on palm trees. PMID:20302545

  3. Effect of green light spectra on the reduction of retinal damage and stress in goldfish, Carassius auratus

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Song, Jin Ah; Kim, Na Na; Choi, Young Jae

    We investigated the effect of light spectra on retinal damage and stress in goldfish using green (530 nm) and red (620 nm) light emitting diodes (LEDs) at three intensities each (0.5, 1.0, and 1.5 W/m{sup 2}). We measured the change in the levels of plasma cortisol and H{sub 2}O{sub 2} and expression and levels of caspase-3. The apoptotic response of green and red LED spectra was assessed using the terminal transferase dUTP nick end labeling (TUNEL) assay. Stress indicator (cortisol and H{sub 2}O{sub 2}) and apoptosis-related genes (caspase-3) decreased in green light, but increased in red light with higher light intensities over time.more » The TUNEL assay revealed that more apoptotic cells were detected in outer nuclear layers after exposure to red LED over time with the increase in light intensity, than the other spectra. These results indicate that green light efficiently reduces retinal damage and stress, whereas red light induces it. Therefore, red light-induced retina damage may induce apoptosis in goldfish retina. -- Highlights: •Green light efficiently reduces retinal damage and stress. •Green spectra reduce caspase production and apoptosis. •Red light-induced retina damage may induce apoptosis in goldfish retina. •The retina of goldfish recognizes green spectra as a stable environment.« less

  4. DNA Damage by Ionizing Radiation: Tandem Double Lesions by Charged Particles

    NASA Technical Reports Server (NTRS)

    Huo, Winifred M.; Chaban, Galina M.; Wang, Dunyou; Dateo, Christopher E.

    2005-01-01

    Oxidative damages by ionizing radiation are the source of radiation-induced carcinogenesis, damage to the central nervous system, lowering of the immune response, as well as other radiation-induced damages to human health. Monte Carlo track simulations and kinetic modeling of radiation damages to the DNA employ available molecular and cellular data to simulate the biological effect of high and low LET radiation io the DNA. While the simulations predict single and double strand breaks and base damages, so far all complex lesions are the result of stochastic coincidence from independent processes. Tandem double lesions have not yet been taken into account. Unlike the standard double lesions that are produced by two separate attacks by charged particles or radicals, tandem double lesions are produced by one single attack. The standard double lesions dominate at the high dosage regime. On the other hand, tandem double lesions do not depend on stochastic coincidences and become important at the low dosage regime of particular interest to NASA. Tandem double lesions by hydroxyl radical attack of guanine in isolated DNA have been reported at a dosage of radiation as low as 10 Gy. The formation of two tandem base lesions was found to be linear with the applied doses, a characteristic of tandem lesions. However, tandem double lesions from attack by a charged particle have not been reported.

  5. Impact of heat stress on the emissions of monoterpenes, sesquiterpenes, phenolic BVOC and green leaf volatiles from several tree species

    NASA Astrophysics Data System (ADS)

    Kleist, E.; Mentel, T. F.; Andres, S.; Bohne, A.; Folkers, A.; Kiendler-Scharr, A.; Rudich, Y.; Springer, M.; Tillmann, R.; Wildt, J.

    2012-07-01

    Changes in the biogenic volatile organic compound (BVOC) emissions from European beech, Palestine oak, Scots pine, and Norway spruce exposed to heat stress were measured in a laboratory setup. In general, heat stress decreased the de novo emissions of monoterpenes, sesquiterpenes and phenolic BVOC. Decreasing emission strength with heat stress was independent of the tree species and whether the de novo emissions being constitutive or induced by biotic stress. In contrast, heat stress induced emissions of green leaf volatiles. It also amplified the release of monoterpenes stored in resin ducts of conifers probably due to heat-induced damage of these resin ducts. The increased release of monoterpenes could be strong and long lasting. But, despite of such strong monoterpene emission pulses, the net effect of heat stress on BVOC emissions from conifers can be an overall decrease. In particular during insect attack on conifers the plants showed de novo emissions of sesquiterpenes and phenolic BVOC which exceeded constitutive monoterpene emissions from pools. The heat stress induced decrease of these de novo emissions was larger than the increased release caused by damage of resin ducts. We project that global change induced heat waves may cause increased BVOC emissions only in cases where the respective areas are predominantly covered with conifers that do not emit high amounts of sesquiterpenes and phenolic BVOC. Otherwise the overall effect of heat stress will be a decrease in BVOC emissions.

  6. Localized attacks on spatially embedded networks with dependencies.

    PubMed

    Berezin, Yehiel; Bashan, Amir; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2015-03-11

    Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures-even of finite fraction-if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems.

  7. Environmental Quality Research Fish and Aufwuchs Bioassay

    DTIC Science & Technology

    1978-11-01

    Disease was controlled by applications of Malachite Green to eggs upon their transfer from spawning aquaria into hatching aquaria. MINERAL QUALITY OF WATER...for 1 hr) and Malachite Green was administered just after transfer. Exposure to Malachite Green was for a period of 1-2 min (later lengthened to 4-5...that Bank A tanks did not become infected with the fungus that attacked the eggs in Bank B tanks was that the period of treatment with Malachite Green

  8. Pathologic features of fatal shark attacks.

    PubMed

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  9. Seaport Protection Against chemical and Biological Attacks

    DTIC Science & Technology

    2009-06-01

    Breaux, MAJ, USA B.A., Bowling Green State University, Bowling Green, Ohio, 1991 M.A., Texas A& M , Commerce, Texas, 2001 Fort... Crichton . ―The Ships that Died of Shame.‖ Fairfax Digital (2003). http://www.smh.com.au/articles/2003/01/13/1041990234498.html (accessed June 21

  10. Planning guidance for emergency response to a hypothetical nuclear attack on Riyadh, Saudi Arabia

    NASA Astrophysics Data System (ADS)

    Shubayr, Nasser Ali M.

    The threat of nuclear attack will remain imminent in an ever-advancing society. Saudi Arabia is not immune to this threat. This dissertation establishes planning guidance for response to a nuclear attack on Riyadh, the capital of Saudi Arabia, based on a hypothetical scenario of a nuclear detonation. A case scenario of a one-megaton thermonuclear bomb detonated at ground level over Riyadh is used to support the thesis. Previous nuclear tests and the Hiroshima and Nagasaki bombings have been used to present possible effects on Riyadh. US planning guidance and lessons learned from the Chernobyl and Fukushima nuclear plants accidents have been used to develop the emergency response guidance. The planning guidance outlines a rapid response to the nuclear detonation. Four damage zones have been identified; severe damage zone, moderate damage zone, light damage zone and dangerous fallout zone. Actions that are recommended, and those that should be avoided, have been determined for each zone. Shelter/ evacuation evaluation for blast-affected and fallout-affected areas is the basis for the recommendation that shelter in place is the best decision for the first hours to days after the attack. Guidelines for medical care response and population monitoring and decontamination are included to reduce the early and long-term effects of the attack. Recommendations to the Saudi Arabian authorities have been made to facilitate suitable preparedness and response for such an event.

  11. Herbivory by the insect diaphorina citri induces greater change in citrus plant volatile profile than does infection by the bacterium, Candidatus Liberibacter asiaticus

    PubMed Central

    Hijaz, Faraj; El-Shesheny, Ibrahim; Killiny, Nabil

    2013-01-01

    The volatile organic compound (VOC) profile in plant leaves often changes after biotic and abiotic stresses. Monitoring changes in VOCs in plant leaves could provide valuable information about multitrophic interactions. In the current study, we investigated the effect of Asian citrus psyllid (ACP) infestation, citrus greening pathogen (Candidatus Liberibacter asiaticus [CLas]) infection, and simultaneous attack by ACP and CLas on the VOC content of citrus leaves. Leaf volatiles were extracted using hexane and analyzed with gas chromatography-mass spectrometry (GC-MS). Although ACP is a phloem-sucking insect that causes minimal damage to plant tissues, the relative amount of 21 out of the 27 VOCs increased 2- to 10-fold in ACP-infested plants. The relative amount of d-limonene, β-phelandrene, citronellal, and undecanal were increased 4- to 20- fold in CLas-infected plants. A principle component analysis (PCA) and cluster analysis (CA) showed that VOC patterns of ACP-infested and CLas-infected plants were different from each other and were also different from the controls, while the VOC pattern of double-attacked plants was more like that of the controls than that of ACP-infested or CLas-infected plants. VOC amounts from leaves were compromised when plants were attacked by ACP and CLas. The results of this study showed that a simple direct extraction of citrus leaf volatiles could be successfully used to discriminate between healthy and CLas-infected plants. Information about the effects of insect and pathogen attack on the VOC content profile of plants might contribute to a better understanding of biotic stress. PMID:23857364

  12. Herbivory by the insect diaphorina citri induces greater change in citrus plant volatile profile than does infection by the bacterium, Candidatus Liberibacter asiaticus.

    PubMed

    Hijaz, Faraj; El-Shesheny, Ibrahim; Killiny, Nabil

    2013-10-01

    The volatile organic compound (VOC) profile in plant leaves often changes after biotic and abiotic stresses. Monitoring changes in VOCs in plant leaves could provide valuable information about multitrophic interactions. In the current study, we investigated the effect of Asian citrus psyllid (ACP) infestation, citrus greening pathogen (Candidatus Liberibacter asiaticus [CLas]) infection, and simultaneous attack by ACP and CLas on the VOC content of citrus leaves. Leaf volatiles were extracted using hexane and analyzed with gas chromatography-mass spectrometry (GC-MS). Although ACP is a phloem-sucking insect that causes minimal damage to plant tissues, the relative amount of 21 out of the 27 VOCs increased 2- to 10-fold in ACP-infested plants. The relative amount of d-limonene, β-phelandrene, citronellal, and undecanal were increased 4- to 20- fold in CLas-infected plants. A principle component analysis (PCA) and cluster analysis (CA) showed that VOC patterns of ACP-infested and CLas-infected plants were different from each other and were also different from the controls, while the VOC pattern of double-attacked plants was more like that of the controls than that of ACP-infested or CLas-infected plants. VOC amounts from leaves were compromised when plants were attacked by ACP and CLas. The results of this study showed that a simple direct extraction of citrus leaf volatiles could be successfully used to discriminate between healthy and CLas-infected plants. Information about the effects of insect and pathogen attack on the VOC content profile of plants might contribute to a better understanding of biotic stress.

  13. Interactive effects of pests increase seed yield.

    PubMed

    Gagic, Vesna; Riggi, Laura Ga; Ekbom, Barbara; Malsher, Gerard; Rusch, Adrien; Bommarco, Riccardo

    2016-04-01

    Loss in seed yield and therefore decrease in plant fitness due to simultaneous attacks by multiple herbivores is not necessarily additive, as demonstrated in evolutionary studies on wild plants. However, it is not clear how this transfers to crop plants that grow in very different conditions compared to wild plants. Nevertheless, loss in crop seed yield caused by any single pest is most often studied in isolation although crop plants are attacked by many pests that can cause substantial yield losses. This is especially important for crops able to compensate and even overcompensate for the damage. We investigated the interactive impacts on crop yield of four insect pests attacking different plant parts at different times during the cropping season. In 15 oilseed rape fields in Sweden, we estimated the damage caused by seed and stem weevils, pollen beetles, and pod midges. Pest pressure varied drastically among fields with very low correlation among pests, allowing us to explore interactive impacts on yield from attacks by multiple species. The plant damage caused by each pest species individually had, as expected, either no, or a negative impact on seed yield and the strongest negative effect was caused by pollen beetles. However, seed yield increased when plant damage caused by both seed and stem weevils was high, presumably due to the joint plant compensatory reaction to insect attack leading to overcompensation. Hence, attacks by several pests can change the impact on yield of individual pest species. Economic thresholds based on single species, on which pest management decisions currently rely, may therefore result in economically suboptimal choices being made and unnecessary excessive use of insecticides.

  14. Green Leaf Volatiles: A Plant’s Multifunctional Weapon against Herbivores and Pathogens

    PubMed Central

    Scala, Alessandra; Allmann, Silke; Mirabella, Rossana; Haring, Michel A.; Schuurink, Robert C.

    2013-01-01

    Plants cannot avoid being attacked by an almost infinite number of microorganisms and insects. Consequently, they arm themselves with molecular weapons against their attackers. Plant defense responses are the result of a complex signaling network, in which the hormones jasmonic acid (JA), salicylic acid (SA) and ethylene (ET) are the usual suspects under the magnifying glass when researchers investigate host-pest interactions. However, Green Leaf Volatiles (GLVs), C6 molecules, which are very quickly produced and/or emitted upon herbivory or pathogen infection by almost every green plant, also play an important role in plant defenses. GLVs are semiochemicals used by insects to find their food or their conspecifics. They have also been reported to be fundamental in indirect defenses and to have a direct effect on pests, but these are not the only roles of GLVs. These volatiles, being probably one of the fastest weapons exploited, are also able to directly elicit or prime plant defense responses. Moreover, GLVs, via crosstalk with phytohormones, mostly JA, can influence the outcome of the plant’s defense response against pathogens. For all these reasons GLVs should be considered as co-protagonists in the play between plants and their attackers. PMID:23999587

  15. Nondestructive Evaluation of Damaged and As-Fabricated Encapsulated Ceramic Panels

    DTIC Science & Technology

    2009-05-01

    Nondestructive Evaluation of Damaged and As-Fabricated Encapsulated Ceramic Panels by William H. Green , Raymond Brennan, and Robert H. Carter...ARL-TR-4823 May 2009 Nondestructive Evaluation of Damaged and As-Fabricated Encapsulated Ceramic Panels William H. Green , Raymond Brennan...William H. Green , Raymond Brennan, and Robert H. Carter 5d. PROJECT NUMBER AH80 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION

  16. 76 FR 78228 - Notice of Request for Extension of Approval of an Information Collection; Citrus Greening and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-16

    ... asiaticus'' that attacks the vascular system of host plants. Citrus greening greatly reduces production... DEPARTMENT OF AGRICULTURE Animal and Plant Health Inspection Service [Docket No. APHIS-2011-0105... Citrus Psyllid; Quarantine and Interstate Movement Regulations AGENCY: Animal and Plant Health Inspection...

  17. Suppression of bacterial blight on mustard greens with host plant resistance and Acibenzolar-S-Methyl

    USDA-ARS?s Scientific Manuscript database

    Bacterial blight, caused by Pseudomonas cannabina pv. alisalensis, attacks the leaves of most brassica vegetables, including mustard greens (Brassica juncea). ‘Carolina Broadleaf,’ a new mustard cultivar, is resistant to bacterial blight. Acibenzolar-S-methyl (trade name Actigard) has been used to m...

  18. Terrorism in Spain: emergency medical aspects.

    PubMed

    García-Castrillo Riesgo, Luis; García Merino, Antonio

    2003-01-01

    A terrorism movement has been active in Spain during the last 20 years, with a painful number of victims. Civil Defense is in charge of the coordination of all the structures that are implicated in a terrorist incident. There are three typical patterns of attacks: (1) individual attacks; (2) group attacks; and (3) mass attacks. The individual attacks are done with guns, usually 9 mm, fired from a short distance; victims die from serious intracranial damage. Collective attacks are done using explosives under vehicles, tramp bombs, or "bomb vehicles;" victims are of different severity with wounds, burns, and blast injuries. With mass attacks with "bomb vehicles" in buildings or crowded public places, the numbers of victims are elevated and produce brutal social consequences. Emergency Medical Services integrated in to "Civil Defense" try to minimize the damage by initializing treatment on-scene and with the rapid provision of definitive care. During the last year, post-traumatic stress disorder treatment groups have been providing care to the victims and personnel. Chemical or biological weapons have not been used, although this is a great concern to the authorities.

  19. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  20. VTAC: virtual terrain assisted impact assessment for cyber attacks

    NASA Astrophysics Data System (ADS)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  1. Seed tolerance to predation: Evidence from the toxic seeds of the buckeye tree (Aesculus californica; Sapindaceae).

    PubMed

    Mendoza, Eduardo; Dirzo, Rodolfo

    2009-07-01

    Tolerance, the capacity of plants to withstand attack by animals, as opposed to resistance, has been poorly examined in the context of seed predation. We investigated the role that the seed mass of the large-seeded endemic tree Aesculus californica plays as a tolerance trait to rodent attack by comparing, under greenhouse conditions, patterns of germination, and subsequent seedling growth, of seeds with a wide range of natural damage. Germination percentage was reduced by 50% and time to germination by 64% in attacked compared to intact seeds, and germination probability was negatively correlated with damage. Seedlings that emerged from intact seeds were taller and bore more leaves than those from damaged seeds. This species' large seed mass favors tolerance to damage because heavily damaged seeds are able to germinate and produce seedlings. This finding is significant given that seeds of this species are known to contain chemical compounds toxic to vertebrates, a resistance trait. We posit that this combination of tolerance and resistance traits might be a particularly effective antipredation strategy when seeds are exposed to a variety of vertebrate predators.

  2. CPK isoenzymes test

    MedlinePlus

    Creatine phosphokinase - isoenzymes; Creatine kinase - isoenzymes; CK - isoenzymes; Heart attack - CPK; Crush - CPK ... levels rise 3 to 6 hours after a heart attack . If there is no further heart muscle damage, ...

  3. Fundamental studies of hydrogen attack in carbon-0.5molybdenum steel and weldments applied in petroelum and petrochemical industries

    NASA Astrophysics Data System (ADS)

    Liu, Peng

    High temperature hydrogen attack (HTHA) is a form of surface decarburization, internal decarburization, and/or intergranular cracking in steels exposed to high temperature (>400°F) and high hydrogen pressure. Hydrogen attack is an irreversible process which can cause permanent damage resulting in degradation of mechanical properties and failures such as leakage, bursting, fire, and/or explosion. The continuous progression of hydrogen attack in C-0.5Mo steel and weldments below the C-0.5Mo Nelson Curve has caused a significant concern for the integrity and serviceability of C-0.5Mo steel utilized for pressure vessels and piping in the petroleum refinery and petrochemical industries. A state-of-the-art literature review was implemented to provide a comprehensive overview of the published research efforts on hydrogen attack studies. The evolution of "Nelson Curves" for carbon steel, C-0.5Mo, and Cr-Mo steels was historically reviewed in regard to design applications and limitations. Testing techniques for hydrogen attack assessment were summarized under the categories of hydrogen exposure testing, mechanical evaluation, and dilatometric swelling testing. In accord with the demands of these industries, fundamental studies of hydrogen attack in C-0.5Mo steel and weldments were accomplished in terms of quantitative methodologies for hydrogen damage evaluation; hydrogen damage assessment of service exposed weldments and autoclave exposed materials; effects of carbon and alloying elements, heat treatments, hot and cold working, welding processes and postweld heat treatment (PWHT) on hydrogen attack susceptibility; development of continuous cooling transformation (CCT) diagrams for C-0.5Mo base metals and the coarse grained heat-affected zone (CGHAZ); carbide evaluation for the C-0.5Mo steel after service exposure and heat treatment; methane evolution by the reaction of hydrogen and carbides; hydrogen diffusion and methane pressure through the wall thickness of one-sided hydrogen exposure assembly; hydrogen attack mechanism and hydrogen attack limit modeling.

  4. National Counterterrorism Center: 2007 Report on Terrorism

    DTIC Science & Technology

    2008-04-30

    Approximately one half of the attacks in the NCTC database involve no loss of life. An attack that damages a pipeline and a car bomb attack that kills 100...rose by about 30 percent and 20 percent, respectively. Overall, suicide bombing attacks rose by about 50 percent and suicide car bombings about 40...January 2007, in Nukhaib, Al Anbar, Iraq, armed assailants in three cars attacked two buses transporting Shiite pilgrims back from the Hajj in Mecca to Al

  5. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  6. Heart Attack

    MedlinePlus

    ... it as instructed while awaiting emergency help. Take aspirin, if recommended. Taking aspirin during a heart attack could reduce heart damage by helping to keep your blood from clotting. Aspirin can interact with other medications, however, so don' ...

  7. Antigenotoxic and Apoptotic Activity of Green Tea Polyphenol Extracts on Hexavalent Chromium-Induced DNA Damage in Peripheral Blood of CD-1 Mice: Analysis with Differential Acridine Orange/Ethidium Bromide Staining

    PubMed Central

    García-Rodríguez, María del Carmen; Carvente-Juárez, Megumi Monserrat; Altamirano-Lozano, Mario Agustín

    2013-01-01

    This study was conducted to investigate the modulating effects of green tea polyphenols on genotoxic damage and apoptotic activity induced by hexavalent chromium [Cr (VI)] in CD-1 mice. Animals were divided into the following groups: (i) injected with vehicle; (ii) treated with green tea polyphenols (30 mg/kg) via gavage; (iii) injected with CrO3 (20 mg/kg) intraperitoneally; (iv) treated with green tea polyphenols in addition to CrO3. Genotoxic damage was evaluated by examining micronucleated polychromatic erythrocytes (MN-PCEs) obtained from peripheral blood at 0, 24, 48, and 72 h after treatment. Induction of apoptosis and cell viability were assessed by differential acridine orange/ethidium bromide (AO/EB) staining. Treatment of green tea polyphenols led to no significant changes in the MN-PCEs. However, CrO3 treatment significantly increased MN-PCEs at 24 and 48 h after injection. Green tea polyphenols treatment prior to CrO3 injection led to a decrease in MN-PCEs compared to the group treated with CrO3 only. The average of apoptotic cells was increased at 48 h after treatment compared to control mice, suggesting that apoptosis could contribute to eliminate the DNA damaged cells induced by Cr (VI). Our findings support the proposed protective effects of green tea polyphenols against the genotoxic damage induced by Cr (VI). PMID:24363823

  8. An extended diffraction tomography method for quantifying structural damage using numerical Green's functions.

    PubMed

    Chan, Eugene; Rose, L R Francis; Wang, Chun H

    2015-05-01

    Existing damage imaging algorithms for detecting and quantifying structural defects, particularly those based on diffraction tomography, assume far-field conditions for the scattered field data. This paper presents a major extension of diffraction tomography that can overcome this limitation and utilises a near-field multi-static data matrix as the input data. This new algorithm, which employs numerical solutions of the dynamic Green's functions, makes it possible to quantitatively image laminar damage even in complex structures for which the dynamic Green's functions are not available analytically. To validate this new method, the numerical Green's functions and the multi-static data matrix for laminar damage in flat and stiffened isotropic plates are first determined using finite element models. Next, these results are time-gated to remove boundary reflections, followed by discrete Fourier transform to obtain the amplitude and phase information for both the baseline (damage-free) and the scattered wave fields. Using these computationally generated results and experimental verification, it is shown that the new imaging algorithm is capable of accurately determining the damage geometry, size and severity for a variety of damage sizes and shapes, including multi-site damage. Some aspects of minimal sensors requirement pertinent to image quality and practical implementation are also briefly discussed. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. The effects PCSO-524®, a patented marine oil lipid and omega-3 PUFA blend derived from the New Zealand green lipped mussel (Perna canaliculus), on indirect markers of muscle damage and inflammation after muscle damaging exercise in untrained men: a randomized, placebo controlled trial.

    PubMed

    Mickleborough, Timothy D; Sinex, Jacob A; Platt, David; Chapman, Robert F; Hirt, Molly

    2015-01-01

    The purpose of the present study was to evaluate the effects of PCSO-524®, a marine oil lipid and n-3 LC PUFA blend, derived from New Zealand green- lipped mussel (Perna canaliculus), on markers of muscle damage and inflammation following muscle damaging exercise in untrained men. Thirty two untrained male subjects were randomly assigned to consume 1200 mg/d of PCSO- 524® (a green-lipped mussel oil blend) or placebo for 26 d prior to muscle damaging exercise (downhill running), and continued for 96 h following the muscle damaging exercise bout. Blood markers of muscle damage (skeletal muscle slow troponin I, sTnI; myoglobin, Mb; creatine kinase, CK), and inflammation (tumor necrosis factor, TNF-α), and functional measures of muscle damage (delayed onset muscle soreness, DOMS; pressure pain threshold, PPT; knee extensor joint range of motion, ROM; isometric torque, MVC) were assessed pre- supplementation (baseline), and multiple time points post-supplementation (before and after muscle damaging exercise). At baseline and 24 h following muscle damaging exercise peripheral fatigue was assessed via changes in potentiated quadriceps twitch force (∆Qtw,pot) from pre- to post-exhaustive cycling ergometer test in response to supra-maximal femoral nerve stimulation. Compared to placebo, supplementation with the green-lipped mussel oil blend significantly attenuated (p < 0.05) sTnI and TNF-α at 2, 24, 48, 72 and 96 h., Mb at 24, 48, 72, 96 h., and CK-MM at all-time points following muscle damaging exercise, significantly reduced (p < 0.05) DOMS at 72 and 96 h post-muscle damaging exercise, and resulted in significantly less strength loss (MVC) and provided a protective effect against joint ROM loss at 96 h post- muscle damaging exercise. At 24 h after muscle damaging exercise perceived pain was significantly greater (p < 0.05) compared to baseline in the placebo group only. Following muscle damaging exercise ∆Qtw,pot was significantly less (p < 0.05) on the green-lipped mussel oil blend compared to placebo. Supplementation with a marine oil lipid and n-3 LC PUFA blend (PCSO-524®), derived from the New Zealand green lipped mussel, may represent a useful therapeutic agent for attenuating muscle damage and inflammation following muscle damaging exercise.

  10. Monitoring the Attack Incidences and Damage Caused by the Almond Bark Beetle, Scolytus amygdali, in Almond Orchards

    PubMed Central

    Cuthbertson, Andrew G. S.; Braham, Mohamed

    2018-01-01

    The almond bark beetle, Scolytus amygdali Geurin-Meneville, is responsible for significant loss of fruit production in almond orchards throughout the world. Here, we studied the damage and the incidences of S. amygdali attack on two different scales: (1) at the level of a single tree; and (2) in an entire orchard. Our results revealed no differences in attack level among four orientations (east, west, south and north sides) for the whole tree. However, the bark that was facing west side in the direction of the prevailing wind was found to be the most suitable for females to initiate attack in Stratum S2. Attack distribution remains the same among different strata (strata is vertical divisions of the tree from the ground to the uppermost twigs with ~40 cm intervals). More than 50% of attack was observed in the trunk of the tree and upper strata. However, multiplication rate (number of emerged adults/maternal gallery) varies significantly between strata. In addition, we studied attack intensity (holes produced by beetle per tree) comparing it to tree morphology (flowers, leaves and circumferences) and gum deposit. Our results revealed a positive correlation between attack intensity and gum deposits, and a negative correlation between attack intensity and tree morphology. This revealed that gum on the tree was an indicator for attack intensity. A positive correlation between attack intensity and the circumference of the tree revealed that older trees were more susceptible to S. amygdali attack. These results, while preliminary, aim to help in the monitoring of S. amygdali populations before deciding to apply any control measures. PMID:29301271

  11. The effect of green, black and white tea on the level of alpha and gamma tocopherols in free radical-induced oxidative damage of human red blood cells.

    PubMed

    Gawlik, Małgorzata; Czajka, Aneta

    2007-01-01

    The present study was undertaken to investigate the effect of aqueous tea extracts on lipid peroxidation and alpha and gamma tocopherols concentration in the oxidative damage of human red blood cells (RBC). RBC was taken as the model for study of the oxidative damage was induced by cumene hydroperoxide (cumOOH). The antioxidative property of leaf green tea, leaf and granulate of black tea and white tea at levels 1, 2, 4 g/150 mL of water were evaluated. The correlation was observed between reducing power of tea extract and formation of malondialdehyde--MDA (an indicator of lipid peroxidation) in oxidative damage of RBC. All tea extracts at level of 4 g/150 mL of water significantly decreased concentration of MDA. The extract of green tea in comparison to black and white tea extracts at the same levels seems to be a better protective agent against oxidative stress. The antioxidant synergism between components extracted from leaves of green tea and endogenous alpha tocopherol in the oxidative damage of red blood cells was observed. The consumption of alpha tocopherol in oxidative damage of RBC was the lowest after treatment with the highest dose of green tea extract. All tea extracts did not protect against decrease of gamma tocopherol in human erythrocytes treated with cumOOH.

  12. Reactions of green lizards (Lacerta viridis) to major repellent compounds secreted by Graphosoma lineatum (Heteroptera: Pentatomidae).

    PubMed

    Gregorovičová, Martina; Černíková, Alena

    2015-06-01

    The chemical defence of Heteroptera is primarily based on repellent secretions which signal the potential toxicity of the bug to its predators. We tested the aversive reactions of green lizards (Lacerta viridis) towards the major compounds of the defensive secretion of Graphosoma lineatum, specifically: (i) a mixture of three aldehydes: (E)-hex-2-enal, (E)-oct-2-enal, (E)-dec-2-enal; (ii) a mixture of these three aldehydes and tridecane; (iii) oxoaldehyde: (E)-4-oxohex-2-enal; (iv) secretion extracted from metathoracic scent glands of G. lineatum adults and (v) hexane as a non-polar solvent. All chemicals were presented on a palatable food (Tenebrio molitor larvae). The aversive reactions of the green lizards towards the mealworms were evaluated by observing the approach latencies, attack latencies and approach-attack intervals. The green lizards exhibited a strong aversive reaction to the mixture of three aldehydes. Tridecane reduced the aversive reaction to the aldehyde mixture. Oxoaldehyde caused the weakest, but still significant, aversive reaction. The secretion from whole metathoracic scent glands also clearly had an aversive effect on the green lizards. Moreover, when a living specimen of G. lineatum or Pyrrhocoris apterus (another aposematic red-and-black prey) was presented to the green lizards before the trials with the aldehyde mixture, the aversive effect of the mixture was enhanced. In conclusion, the mixture of three aldehydes had the strong aversive effect and could signal the potential toxicity of G. lineatum to the green lizards. Copyright © 2015 Elsevier GmbH. All rights reserved.

  13. CLOSE AIR SUPPORT (CAS) FOR COUNTERINSURGENCY (COIN) AND THE UPWARD TRAJECTORY OF UNMANNED AIRCRAFT SYSTEMS (UAS): NAVIGATING THE UNDISCOVERED DOMAIN

    DTIC Science & Technology

    2015-10-01

    collateral damage. Further mitigating collateral damage, “…the SDB Focused Lethality Munition (FLM) variant incorporates a carbon fiber composite ...Effectiveness Modern attack helicopters execute the CAS mission with various standoff weapons. RW assets are slow moving and susceptible to MANPADS and...small arms fire, and attack helicopters used for CAS are primarily in a medium or low threat environment where enemy air defenses are weak or not

  14. Integrated approach for investigating the durability of self-consolidating concrete to sulfate attack

    NASA Astrophysics Data System (ADS)

    Bassuoni, Mohamed Tamer F.

    The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion tests, the combined sulfate attack tests captured performance risks and complex damage mechanisms associated with the SCC pore structure and constituent materials. Sodium sulfate attack with wetting-drying cycles and/or partial immersion under temperate-hot conditions synergistically caused significant damage to specimens, especially to quaternary cementitious systems having very fine pore structure, due to the build-up of salt crystals and sulfate reaction products. The deleterious effects of sulfate reaction products and salt crystallization on all cementitious systems were more severe under the combined sodium sulfate and freezing-thawing exposure, with a potential of sudden brittle failure. Laboratory experiments in the current work documented evidence for the occurrence of thaumasite sulfate attack (TSA) in cementitious systems containing limestone filler, not only under cold but also under temperate-hot conditions, which made specimens more vulnerable to damage in the combined sulfate attack tests. The field-like combined exposure of sodium sulfate, cyclic environments and flexural loading had synergistic effects on SCC specimens and caused the coexistence of multiple-complex degradation mechanisms (sulfate attack, TSA, stress-corrosion, salt crystallization, surface scaling and corrosion of surface steel fibres) depending on the mixture design variables. The current thesis demonstrates that relying only on sulfate immersion tests to evaluate the performance of cement-based materials can be risky. It also shows that linear and deterministic modeling of the performance of concrete structures under external sulfate attack is unrealistic. Fuzzy and adaptive-neuro fuzzy inference systems developed in the current thesis accurately and rationally predicted the serviceability, deterioration in engineering properties and time to failure of the SCC mixtures under the various sulfate attack exposure regimes adopted in the integrated testing approach. A durability evaluation factor from multiple performance criteria was created for the ammonium sulfate exposure. Environmental charts were developed to determine the level of aggression associated with sodium sulfate attack from temperature, RH and degree of wetting-drying expected in service. This novel modeling approach showed promising success in handling complex durability topics such as the sulfate attack of concrete, which involves non-linearity, ambiguity and interface with operator approximation. The current thesis provides needed fundamental knowledge on the durability of a wide scope of SCC mixtures to various sulfate attack exposure scenarios. It elucidates complex deterioration mechanisms and failure modes of cement-based materials under multi-mechanistic aging processes. It also proposes carefully engineered integrated sulfate attack tests that replicate various sulfate attack exposure regimes, which could be refined and standardized in the future. In addition, the current work introduced original knowledge-based smart models capable of handling uncertainty and providing reliable predictions for the behaviour of concrete under external sulfate attack. The models do not require conducting exhaustive laboratory experiments and/or making assumptions, thus facilitating the selection of optimum concrete mixtures for a specified exposure. Overall, this research should effectively contribute to the development of performance-based standards and specifications for, and improvement of durability-based design and life-cycle analysis of concrete structures subjected to external sulfate attack. Keywords. Sulfate attack, self-consolidating concrete, integrated testing, composite cements, air-entrainment, hybrid fibres, full immersion, cations, pH, wetting-drying, partial immersion, freezing-thawing, cyclic cold-hot conditions, flexural loading, thaumasite, salt crystallization, fuzzy, neuro-fuzzy, systems.

  15. 7 CFR 29.3017 - Damage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Damage. 29.3017 Section 29.3017 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... Damage. The effect of mold, must, rot, black rot, or other fungous or bacterial diseases which attack...

  16. 7 CFR 30.17 - Damage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Damage. 30.17 Section 30.17 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... Damage. The effect of mold, must, rot, black rot, or other fungous or bacterial diseases which attack...

  17. Assessing forest damage in high-elevation coniferous forests in Vermont and New Hampshire using Thematic Mapper data

    NASA Technical Reports Server (NTRS)

    Vogelmann, James E.; Rock, Barrett N.

    1988-01-01

    This study evaluates the potential of measuring/mapping forest damage in spruce-fir forests in the Green Mountains of Vermont and White Mountains of New Hampshire using Landsat Thematic Mapper (TM) data. The TM 1.65/0.83-micron (TM5/4) and 2.22/0.83-micron (TM7/4) band ratios were found to correlate well with ground-based measurements of forest damage (a measure of percentage foliar loss) at 11 spruce-fir stands located on Camels Hump, a mountain in northern Vermont. Images using 0.56 and 1.65-micron bands with 1.65/0.83-micron band ratios indicated locations of heavy conifer forest damage. Both 1.65/0.83 and 2.22/0.83-micron band ratios were used to quantify levels of conifer forest damage among individual mountains throughout many of the Green and White Mountains. Damage was found to be consistently higher for the Green than the White Mountains.

  18. Outlook for ash in your forest: results of emerald ash borer research and implications for management

    Treesearch

    Kathleen S. Knight

    2014-01-01

    Since its accidental introduction near Detroit, Michigan, in the mid-1990s, emerald ash borer (EAB) has rapidly spread through much of the U.S. and adjacent Canada, leaving millions of dead ash trees in Midwestern states (4,11). Unfortunately, EAB attacks trees as small as an inch in stem diameter and it attacks all five ash species native to the region - white, green...

  19. Cyber War: The Next Frontier for NATO

    DTIC Science & Technology

    2015-03-01

    cyber-attacks as a way to advance their agenda. Common examples of cyber- attacks include computer viruses, worms , malware, and distributed denial of...take advantage of security holes and cause damage to computer systems, steal financial data, or acquire sensitive secrets. As technology becomes

  20. Effect of green light spectra on the reduction of retinal damage and stress in goldfish, Carassius auratus.

    PubMed

    Song, Jin Ah; Kim, Na Na; Choi, Young Jae; Choi, Cheol Young

    2016-07-22

    We investigated the effect of light spectra on retinal damage and stress in goldfish using green (530 nm) and red (620 nm) light emitting diodes (LEDs) at three intensities each (0.5, 1.0, and 1.5 W/m(2)). We measured the change in the levels of plasma cortisol and H2O2 and expression and levels of caspase-3. The apoptotic response of green and red LED spectra was assessed using the terminal transferase dUTP nick end labeling (TUNEL) assay. Stress indicator (cortisol and H2O2) and apoptosis-related genes (caspase-3) decreased in green light, but increased in red light with higher light intensities over time. The TUNEL assay revealed that more apoptotic cells were detected in outer nuclear layers after exposure to red LED over time with the increase in light intensity, than the other spectra. These results indicate that green light efficiently reduces retinal damage and stress, whereas red light induces it. Therefore, red light-induced retina damage may induce apoptosis in goldfish retina. Copyright © 2016 Elsevier Inc. All rights reserved.

  1. Damage detection and isolation via autocorrelation: a step toward passive sensing

    NASA Astrophysics Data System (ADS)

    Chang, Y. S.; Yuan, F. G.

    2018-03-01

    Passive sensing technique may eliminate the need of expending power from actuators and thus provide a means of developing a compact and simple structural health monitoring system. More importantly, it may provide a solution for monitoring the aircraft subjected to environmental loading from air flow during operation. In this paper, a non-contact auto-correlation based technique is exploited as a feasibility study for passive sensing application to detect damage and isolate the damage location. Its theoretical basis bears some resemblance to reconstructing Green's function from diffusive wavefield through cross-correlation. Localized high pressure air from air compressor are randomly and continuously applied on the one side surface of the aluminum panels through the air blow gun. A laser Doppler vibrometer (LDV) was used to scan a 90 mm × 90 mm area to create a 6 × 6 2D-array signals from the opposite side of the panels. The scanned signals were auto-correlated to reconstruct a "selfimpulse response" (or Green's function). The premise for stably reconstructing the accurate Green's function requires long sensing times. For a 609.6 mm × 609.6 mm flat aluminum panel, the sensing times roughly at least four seconds is sufficient to establish converged Green's function through correlation. For the integral stiffened aluminum panel, the geometrical features of the panel expedite the formation of the diffusive wavefield and thus shorten the sensing times. The damage is simulated by gluing a magnet onto the panels. Reconstructed Green's functions (RGFs) are used for damage detection and damage isolation based on an imaging condition with mean square deviation of the RGFs from the pristine and the damaged structure and the results are shown in color maps. The auto-correlation based technique is shown to consistently detect the simulated damage, image and isolate the damage in the structure subjected to high pressure air excitation. This technique may be transformed into passive sensing applied on the aircraft during operation.

  2. Assessing the Effectiveness of Deradicalization Programs for Islamist Extremists

    DTIC Science & Technology

    2009-12-01

    attacks had a significant impact on Indonesia’s economy and greatly damaged the tourism industry . Indonesia has been slow to recognize the problem...Yemen has experienced a significant number of terrorist attacks on its soil targeting both western interests and Yemen’s economic and tourism ...conducting attacks within Indonesia against Westerners. In 2002, JI members executed bombings in the popular tourist areas in Bali killing 202 people. JI

  3. New estimates of lethality of sea lamprey (Petromyzon marinus) attacks on lake trout (Salvelinus namaycush): Implications for fisheries management

    USGS Publications Warehouse

    Madenjian, C.P.; Chipman, B.D.; Marsden, J.E.

    2008-01-01

    Sea lamprey (Petromyzon marinus) control in North America costs millions of dollars each year, and control measures are guided by assessment of lamprey-induced damage to fisheries. The favored prey of sea lamprey in freshwater ecosystems has been lake trout (Salvelinus namaycush). A key parameter in assessing sea lamprey damage, as well as managing lake trout fisheries, is the probability of an adult lake trout surviving a lamprey attack. The conventional value for this parameter has been 0.55, based on laboratory experiments. In contrast, based on catch curve analysis, mark-recapture techniques, and observed wounding rates, we estimated that adult lake trout in Lake Champlain have a 0.74 probability of surviving a lamprey attack. Although sea lamprey growth in Lake Champlain was lower than that observed in Lake Huron, application of an individual-based model to both lakes indicated that the probability of surviving an attack in Lake Champlain was only 1.1 times higher than that in Lake Huron. Thus, we estimated that lake trout survive a lamprey attack in Lake Huron with a probability of 0.66. Therefore, our results suggested that lethality of a sea lamprey attack on lake trout has been overestimated in previous model applications used in fisheries management. ?? 2008 NRC.

  4. Protective activity of green tea against free radical- and glucose-mediated protein damage.

    PubMed

    Nakagawa, Takako; Yokozawa, Takako; Terasawa, Katsutoshi; Shu, Seiji; Juneja, Lekh Raj

    2002-04-10

    Protein oxidation and glycation are posttranslational modifications that are implicated in the pathological development of many age-related disease processes. This study investigated the effects of green tea extract, and a green tea tannin mixture and its components, on protein damage induced by 2,2'-azobis(2-amidinopropane) dihydrochloride (a free radical generator) and glucose in in vitro assay systems. We found that green tea extract can effectively protect against protein damage, and showed that its action is mainly due to tannin. In addition, it was shown that the chemical structures of tannin components are also involved in this activity, suggesting that the presence of the gallate group at the 3 position plays the most important role in the protective activity against protein oxidation and glycation, and that there is also a contribution by the hydroxyl group at the 5' position in the B ring and the sterical structure. These findings demonstrate the mechanisms of the usefulness of green tea in protein oxidation- and glycation-associated diseases.

  5. Short-term effects of hurricane disturbance on food availability for migrant songbirds during autumn stopover

    USGS Publications Warehouse

    Dobbs, R.C.; Barrow, W.C.; Jeske, C.W.; Dimiceli, J.; Michot, T.C.; Beck, J.W.

    2009-01-01

    Understanding the consequences of hurricanes on the food resources available to neotropical-nearctic migrant songbirds may provide important insight into the effects of hurricanes on migratory populations. During autumn migration 2006 we investigated the foraging ecology of two species of insectivorous migrants, Blue-gray Gnatcatcher (Polioptila caerulea) and Yellow Warbler (Dendroica petechia), and the availability of their foraging substrates and arthropod food resources in two coastal forests in western Louisiana, which were impacted to different degrees by Hurricane Rita in autumn 2005. Both migrant species attacked prey on bark substrates significantly more frequently, and on live foliage less frequently, in severely damaged forest than in lightly damaged forest (??2 tests, P < 0.05). However, both species attacked prey on bark less than expected given its availability (i.e., migrants avoided bark), and attacked prey on live foliage more than expected given its availability (i.e., migrants selected live foliage), in severely damaged forest (??2 tests, P < 0.03). Branch-clipping revealed that arthropod biomass on live hackberry (Celtis laevigata) and sweet acacia (Acacia farnesiana) branches was significantly higher in severely damaged forest than in lightly damaged forest (Mann-Whitney test, P < 0.01). However, because live foliage was significantly less available in severely damaged forest, overall food availability for migrants was lower in severely damaged forest than in lightly damaged forest. Migrant use of, and arthropod biomass on, bark and live-foliage substrates were thus dependent on the availability of those substrates, which differed between sites as a result of hurricane-related habitat disturbance. These results demonstrate that severe hurricane disturbance reduces food availability for insectivorous songbirds during migratory stopover by reducing the availability of preferred foraging substrates. ?? 2009 The Society of Wetland Scientists.

  6. Shark attack.

    PubMed

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  7. Interaction of insecticide and media moisture on ambrosia beetle (Coleoptera: Curculionidae) attacks on ornamental trees

    USDA-ARS?s Scientific Manuscript database

    Exotic ambrosia beetles, particularly Xylosandrus crassiusculus (Motschulsky) and Xylosandrus germanus (Blandford), are among the most economically damaging pests of ornamental trees in nurseries. Growers have had few tactics besides insecticide applications to reduce ambrosia beetle attacks but rec...

  8. Nonlinear analysis of NPP safety against the aircraft attack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Králik, Juraj, E-mail: juraj.kralik@stuba.sk; Králik, Juraj, E-mail: kralik@fa.stuba.sk

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  9. Minimum State Awareness for Resilient Control Systems Under Cyber-Attack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kisner, Roger; Fugate, David L; McIntyre, Timothy J

    2012-01-01

    State awareness for a control system is the accurate knowledge of the internal states of the system realization. To maintain stable operation, a controller requires a certain degree of state awareness. By definition, a cyber-attacker decreases the state awareness by modifying or removing the information available to the operator and control system. By doing so, the attacker can directly cause damage to the physical system through the control system, or indirectly by causing the operator to react in a damaging manner to the false information. In a number of recent papers, detection and mitigation strategies have been proposed that assumemore » state awareness. The goal of the attacker to reduce or remove state awareness makes this assumption invalid for most situations. One of the central problems of resilient control is developing methods to retain sufficient state awareness to continue operation during a cyberattack. In this paper, we will define state awareness, discuss the consequences of loss of state awareness, and some potential research directions for maintaining state awareness.« less

  10. Host plant invests in growth rather than chemical defense when attacked by a specialist herbivore.

    PubMed

    Arab, Alberto; Trigo, José Roberto

    2011-05-01

    Plant defensive compounds may be a cost rather than a benefit when plants are attacked by specialist insects that may overcome chemical barriers by strategies such as sequestering plant compounds. Plants may respond to specialist herbivores by compensatory growth rather than chemical defense. To explore the use of defensive chemistry vs. compensatory growth we studied Brugmansia suaveolens (Solanaceae) and the specialist larvae of the ithomiine butterfly Placidina euryanassa, which sequester defensive tropane alkaloids (TAs) from this host plant. We investigated whether the concentration of TAs in B. suaveolens was changed by P. euryanassa damage, and whether plants invest in growth, when damaged by the specialist. Larvae feeding during 24 hr significantly decreased TAs in damaged plants, but they returned to control levels after 15 days without damage. Damaged and undamaged plants did not differ significantly in leaf area after 15 days, indicating compensatory growth. Our results suggest that B. suaveolens responds to herbivory by the specialist P. euryanassa by investing in growth rather than chemical defense.

  11. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination ofmore » food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.« less

  12. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    NASA Astrophysics Data System (ADS)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  13. Strategically placing green infrastructure: cost-effective land conservation in the floodplain.

    PubMed

    Kousky, Carolyn; Olmstead, Sheila M; Walls, Margaret A; Macauley, Molly

    2013-04-16

    Green infrastructure approaches have attracted increased attention from local governments as a way to lower flood risk and provide an array of other environmental services. The peer-reviewed literature, however, offers few estimates of the economic impacts of such approaches at the watershed scale. We estimate the avoided flood damages and the costs of preventing development of floodplain parcels in the East River Watershed of Wisconsin's Lower Fox River Basin. Results suggest that the costs of preventing conversion of all projected floodplain development would exceed the flood damage mitigation benefits by a substantial margin. However, targeting of investments to high-benefit, low-cost parcels can reverse this equation, generating net benefits. The analysis demonstrates how any flood-prone community can use a geographic-information-based model to estimate the flood damage reduction benefits of green infrastructure, compare them to the costs, and target investments to design cost-effective nonstructural flood damage mitigation policies.

  14. Red Pine Shoot Moth

    Treesearch

    John Hainze; David Hall

    The red pine shoot moth recently caused significant damage to red pine plantations in Minnesota, Wisconsin and Michigan. Trees of all ages have been attacked, but the most severe damage has occurred in 20-40 year old plantations growing on sandy soils.

  15. CYANOPHAGES

    EPA Science Inventory

    The cyanophages are a group of DNA viruses that attack host organisms found within the cyanobacteria or blue-green algae, a group of oxygenic photosynthetic procaryotes. A continuing dichotomy has occurred as to the nomenclature and taxonomy of these microorganisms. Many of the e...

  16. Percolation of localized attack on isolated and interdependent random networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2014-03-01

    Percolation properties of isolated and interdependent random networks have been investigated extensively. The focus of these studies has been on random attacks where each node in network is attacked with the same probability or targeted attack where each node is attacked with a probability being a function of its centrality, such as degree. Here we discuss a new type of realistic attacks which we call a localized attack where a group of neighboring nodes in the networks are attacked. We attack a randomly chosen node, its neighbors, and its neighbor of neighbors and so on, until removing a fraction (1 - p) of the network. This type of attack reflects damages due to localized disasters, such as earthquakes, floods and war zones in real-world networks. We study, both analytically and by simulations the impact of localized attack on percolation properties of random networks with arbitrary degree distributions and discuss in detail random regular (RR) networks, Erdős-Rényi (ER) networks and scale-free (SF) networks. We extend and generalize our theoretical and simulation results of single isolated networks to networks formed of interdependent networks.

  17. Fungal Microbiomes Associated with Green and Non-Green Building Materials

    PubMed Central

    Coombs, Kanistha; Vesper, Stephen; Green, Brett J.; Yermakov, Mikhail; Reponen, Tiina

    2018-01-01

    Water-damaged buildings can lead to fungal growth and occupant health problems. Green building materials, derived from renewable sources, are increasingly utilized in construction and renovations. However, the question as to what fungi will grow on these green compared to non-green materials, after they get wet, has not been adequately studied. By determining what fungi grow on each type of material, the potential health risks can be more adequately assessed. In this study, we inoculated green and non-green pieces of ceiling tile, composite board, drywall, and flooring with indoor dust containing a complex mixture of naturally occurring fungi. The materials were saturated with water and incubated for two months in a controlled environment. The resulting fungal microbiomes were evaluated using ITS amplicon sequencing. Overall, the richness and diversity of the mycobiomes on each pair of green and non-green pieces were not significantly different. However, different genera dominated on each type of material. For example, Aspergillus spp. had the highest relative abundance on green and non-green ceiling tiles and green composite boards, but Peniophora spp. dominated the non-green composite board. In contrast, Penicillium spp. dominated green and non-green flooring samples. Green gypsum board was dominated by Phialophora spp. and Stachybotrys spp., but non-green gypsum board by Myrothecium spp. These data suggest that water-damaged green and non-green building materials can result in mycobiomes that are dominated by fungal genera whose member species pose different potentials for health risks. PMID:29681691

  18. Fungal Microbiomes Associated with Green and Non-Green Building Materials.

    PubMed

    Coombs, Kanistha; Vesper, Stephen; Green, Brett J; Yermakov, Mikhail; Reponen, Tiina

    2017-01-01

    Water-damaged buildings can lead to fungal growth and occupant health problems. Green building materials, derived from renewable sources, are increasingly utilized in construction and renovations. However, the question as to what fungi will grow on these green compared to non-green materials, after they get wet, has not been adequately studied. By determining what fungi grow on each type of material, the potential health risks can be more adequately assessed. In this study, we inoculated green and non-green pieces of ceiling tile, composite board, drywall, and flooring with indoor dust containing a complex mixture of naturally occurring fungi. The materials were saturated with water and incubated for two months in a controlled environment. The resulting fungal microbiomes were evaluated using ITS amplicon sequencing. Overall, the richness and diversity of the mycobiomes on each pair of green and non-green pieces were not significantly different. However, different genera dominated on each type of material. For example, Aspergillus spp. had the highest relative abundance on green and non-green ceiling tiles and green composite boards, but Peniophora spp. dominated the non-green composite board. In contrast, Penicillium spp. dominated green and non-green flooring samples. Green gypsum board was dominated by Phialophora spp. and Stachybotrys spp., but non-green gypsum board by Myrothecium spp. These data suggest that water-damaged green and non-green building materials can result in mycobiomes that are dominated by fungal genera whose member species pose different potentials for health risks.

  19. Evolution of Army Attack Aviation: A Chaotic Coupled Pendulums Analogy

    DTIC Science & Technology

    2013-05-23

    forward of the FLOT for 36 minutes.32 Ground Campaign: 4-229 AVN Deep Attack, 26-27 February With the commencement of the ground campaign on 24......battalions worth of tanks and armored personnel carriers while receiving no damage to 4-229 AVN aircraft.34 Prior planning, training, and command

  20. In-Place Preservative Treatments for Covered Bridges

    Treesearch

    Stan Lebow; Jeff Morrell

    2014-01-01

    Covered bridges can be vulnerable to damage from fungal decay and insect attack. This paper describes procedures for selecting and applying in-place treatments to prevent or arrest biodegradation, and summarizes recent research evaluating some of these treatments. Wood moisture is the key to decay and termite attack, and the first line of defense against...

  1. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coyle, D R; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the first time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of themore » trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.« less

  2. PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure

    NASA Astrophysics Data System (ADS)

    Kaminsky, Dan; Patterson, Meredith L.; Sassaman, Len

    Research unveiled in December of 2008 [15] showed how MD5's long-known flaws could be actively exploited to attack the real-worldCertification Authority infrastructure. In this paper, we demonstrate two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the primary root certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We also draw particular attention to two possibly unrecognized vectors for implementation flaws that have been problematic in the past: the ASN.1 BER decoder required to parsePKCS#10, and the potential for SQL injection fromtext contained within its requests. Finally, we explore why the implications of these attacks are broader than some have realized - first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only intended to stop phishing attacks from names similar to trusted brands. As per the work of Adam Barth and Collin Jackson [4], EV does not prevent an attacker who can synthesize or acquire a "low assurance" certificate for a given name from acquiring the "green bar" EV experience.

  3. Spatial Pattern of Attacks of the Invasive Woodwasp Sirex noctilio, at Landscape and Stand Scales.

    PubMed

    Lantschner, M Victoria; Corley, Juan C

    2015-01-01

    Invasive insect pests are responsible for important damage to native and plantation forests, when population outbreaks occur. Understanding the spatial pattern of attacks by forest pest populations is essential to improve our understanding of insect population dynamics and for predicting attack risk by invasives or planning pest management strategies. The woodwasp Sirex noctilio is an invasive woodwasp that has become probably the most important pest of pine plantations in the Southern Hemisphere. Our aim was to study the spatial dynamics of S. noctilio populations in Southern Argentina. Specifically we describe: (1) the spatial patterns of S. noctilio outbreaks and their relation with environmental factors at a landscape scale; and (2) characterize the spatial pattern of attacked trees at the stand scale. We surveyed the spatial distribution of S. noctilio outbreaks in three pine plantation landscapes, and we assessed potential associations with topographic variables, habitat characteristics, and distance to other outbreaks. We also looked at the spatial distribution of attacked trees in 20 stands with different levels of infestation, and assessed the relationship of attacks with stand composition and management. We found that the spatial pattern of pine stands with S. noctilio outbreaks at the landscape scale is influenced mainly by the host species present, slope aspect, and distance to other outbreaks. At a stand scale, there is strong aggregation of attacked trees in stands with intermediate infestation levels, and the degree of attacks is influenced by host species and plantation management. We conclude that the pattern of S. noctilio damage at different spatial scales is influenced by a combination of both inherent population dynamics and the underlying patterns of environmental factors. Our results have important implications for the understanding and management of invasive insect outbreaks in forest systems.

  4. Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.

    Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less

  5. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    NASA Astrophysics Data System (ADS)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  6. Stuxnet, Schmitt Analysis, and the Cyber Use-of-Force Debate

    DTIC Science & Technology

    2012-01-01

    demonstration during exercise Bold Alligator 2012 U . S . N av y (J os hu a J. W ah l) 46 JFQ / issue 67, 4 th quarter 2012 ndupress .ndu.edu...language; and Article 51’ s “armed attack ” threshold for self-defense actions. 18 Schmitt, “Computer Network Attack and the Use of Force,” 920. 19...sponsored cyber coercion. More importantly, the prospect of cyber attacks causing physical damage was largely theoretical.4 Beginning Stuxnet, Schmitt

  7. Visualization of sporopollenin-containing pathogenic green micro-alga Prototheca wickerhamii by fluorescent in situ hybridization (FISH).

    PubMed

    Ueno, Ryohei

    2009-04-01

    Fluorescent in situ hybridization (FISH) using taxon-specific, rRNA-targeted oligonucleotide probes is one of the most powerful tools for the rapid identification of harmful microorganisms. However, eukaryotic algal cells do not always allow FISH probes to permeate over their cell walls. Members of the pathogenic micro-algal genus Prototheca are characterized by their distinctive cell-wall component, sporopollenin, an extremely tough biopolymer that resists acid and alkaline hydrolysis, enzyme attack, and acetolysis. To our knowledge, there has been no report of the successful permeation by the oligonucleotide probes over the cell walls of unicellular green micro-algae, which contain sporopollenin. The DNA probes passed through the cell wall of Prototheca wickerhamii after treating the algal cells with cetyltrimethylammonium bromide (CTAB). Most cells in the middle logarithmic growth phase culture fluoresced when hybridized with the rRNA-targeted universal probe for eukaryotes, though individual cells included in this culture differed in the level of cell-wall vulnerability to attack by the polysaccharide-degrading enzyme, thus reflecting the different stages of the life cycle. This is the first report regarding the visualization of sporopollenin-containing, green micro-algal cells by FISH.

  8. Inhibition property of green tea extract in relation to reserpine-induced ribosomal strips of rough endoplasmic reticulum (rER) of the rat kidney proximal tubule cells.

    PubMed

    Abdel-Majeed, Safer; Mohammad, Afzal; Shaima, Al-Bloushi; Mohammad, Rafique; Mousa, Shaker A

    2009-12-01

    The aim of this study was to evaluate the effect of green tea in inhibiting and reversing the nephrotoxicity of reserpine--a potent oxidative stress inducer--which induced cellular kidney damage. Serum biochemical parameters, antioxidant enzyme levels, thiobarbituric acid reactive substances (TBARS) and serum transaminases (glutamic oxaloacetic transaminase (GOT) and glutamic pyruvic transaminase (GPT)) values and histopathology were systematically evaluated. Reserpine exposure led to increase the oxidative stress and organ injury was significantly observed through biochemical parameters and ultrastructural evaluation. Sprague-Dawely (S.D.) rats were intraperitonealy administered reserpine to induce oxidative kidney damage. Experimental rats were given green tea extract according to the protocol given below. Sixty rats were randomly divided into six groups, with 10 rats in each group. Reserpine was found to cause kidney proximal tubule damage, such as stripping and clustering of ribosomes from the rough endoplasmic reticulum (rER) and demolishing of mitochondrial christae with elevated level of oxidative stress markers, such as TBARS. While the ultrastructural study showed a revival of kidney proximal tubule cells as a result of the administration of green tea extract to rats. We suggest that green tea might elevate antioxidant defense system, clean up free radicals, lessen oxidative damages and protect kidney against reserpine-induced toxicity and thus had a potential protective effect.

  9. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    PubMed

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  10. [Studies on photo-electron-chemical catalytic degradation of the malachite green].

    PubMed

    Li, Ming-yu; Diao, Zeng-hui; Song, Lin; Wang, Xin-le; Zhang, Yuan-ming

    2010-07-01

    A novel two-compartment photo-electro-chemical catalytic reactor was designed. The TiO2/Ti thin film electrode thermally formed was used as photo-anode, and graphite as cathode and a saturated calomel electrode (SCE) as the reference electrode in the reactor. The anode compartment and cathode compartment were connected with the ionic exchange membrane in this reactor. Effects of initial pH, initial concentration of malachite green and connective modes between the anode compartment and cathode compartment on the decolorization efficiency of malachite green were investigated. The degradation dynamics of malachite green was studied. Based on the change of UV-visible light spectrum, the degradation process of malachite green was discussed. The experimental results showed that, during the time of 120 min, the decolouring ratio of the malachite green was 97.7% when initial concentration of malachite green is 30 mg x L(-1) and initial pH is 3.0. The catalytic degradation of malachite green was a pseudo-first order reaction. In the degradation process of malachite green the azo bond cleavage and the conjugated system of malachite green were attacked by hydroxyl radical. Simultaneity, the aromatic ring was oxidized. Finally, malachite green was degraded into other small molecular compounds.

  11. 7 CFR 29.2263 - Damage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Damage. 29.2263 Section 29.2263 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing.... The effect of mold, must, rot, black rot, or other fungous or bacterial diseases which attack tobacco...

  12. Towards A Taxonomy Of Attacks Against Energy Control Systems

    NASA Astrophysics Data System (ADS)

    Fleury, Terry; Khurana, Himanshu; Welch, Von

    Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.

  13. The push–pull tactic for mitigation of mountain pine beetle (Coleoptera: Curculionidae) damage in lodgepole and whitebark pines

    Treesearch

    Nancy E. Gillette; Constance J. Mehmel; Sylvia R. Mori; Jeffrey N. Webster; David L. Wood; Nadir Erbilgin; Donald R. Owen

    2012-01-01

    In an attempt to improve semiochemical-based treatments for protecting forest stands from bark beetle attack, we compared push-pull versus push-only tactics for protecting lodgepole pine (Pinus contorta Douglas ex Loudon) and whitebark pine (Pinus albicaulis Engelm.) stands from attack by mountain pine beetle (...

  14. Formosan and native subterranean termite attack of pressure-treated SPF wood species exposed in Louisiana

    Treesearch

    Stan Lebow; Todd Shupe; Bessie Woodward; Douglas Crawford; Brian Via; Cherilyn Hatfield

    2006-01-01

    This study evaluated the relative ability of three types of wood preservatives to inhibit attack by Formosan subterranean termites (FST) (Coptotermes formosanus Shiraki) and native subterranean termites (Reticulitermes spp.). The study also evaluated the roles of preservative retention and penetration in preventing termite damage. Sections of boards from six wood...

  15. Efficient initial attacks: analysis of capacity and funding provides insights to wildfire protection planning

    Treesearch

    Jeremy Fried; Paul Meznarich

    2014-01-01

    Large wildfires in the United States pose significant challenges to fire management agencies charged with protecting lives, property, and natural resources. A vigorous initial response to a wildfire, a process referred to as "initial attack," can greatly reduce the likelihood of the fire becoming larger and causing substantial damage. Successful...

  16. Suicide Bombing Attacks

    PubMed Central

    Almogy, Gidon; Belzberg, Howard; Mintz, Yoaz; Pikarsky, Alon K.; Zamir, Gideon; Rivkind, Avraham I.

    2004-01-01

    Objective: To review the experience of a large-volume trauma center in managing and treating casualties of suicide bombing attacks. Summary Background Data: The threat of suicide bombing attacks has escalated worldwide. The ability of the suicide bomber to deliver a relatively large explosive load accompanied by heavy shrapnel to the proximity of his or her victims has caused devastating effects. Methods: The authors reviewed and analyzed the experience obtained in treating victims of suicide bombings at the level I trauma center of the Hadassah University Hospital in Jerusalem, Israel from 2000 to 2003. Results: Evacuation is usually rapid due to the urban setting of these attacks. Numerous casualties are brought into the emergency department over a short period. The setting in which the device is detonated has implications on the type of injuries sustained by survivors. The injuries sustained by victims of suicide bombing attacks in semi-confined spaces are characterized by the degree and extent of widespread tissue damage and include multiple penetrating wounds of varying severity and location, blast injury, and burns. Conclusions: The approach to victims of suicide bombings is based on the guidelines for trauma management. Attention is given to the moderately injured, as these patients may harbor immediate life-threatening injuries. The concept of damage control can be modified to include rapid packing of multiple soft-tissue entry sites. Optimal utilization of manpower and resources is achieved by recruiting all available personnel, adopting a predetermined plan, and a centrally coordinated approach. Suicide bombing attacks seriously challenge the most experienced medical facilities. PMID:15075644

  17. Suicide bombing attacks: update and modifications to the protocol.

    PubMed

    Almogy, Gidon; Belzberg, Howard; Mintz, Yoaz; Pikarsky, Alon K; Zamir, Gideon; Rivkind, Avraham I

    2004-03-01

    To review the experience of a large-volume trauma center in managing and treating casualties of suicide bombing attacks. The threat of suicide bombing attacks has escalated worldwide. The ability of the suicide bomber to deliver a relatively large explosive load accompanied by heavy shrapnel to the proximity of his or her victims has caused devastating effects. The authors reviewed and analyzed the experience obtained in treating victims of suicide bombings at the level I trauma center of the Hadassah University Hospital in Jerusalem, Israel from 2000 to 2003. Evacuation is usually rapid due to the urban setting of these attacks. Numerous casualties are brought into the emergency department over a short period. The setting in which the device is detonated has implications on the type of injuries sustained by survivors. The injuries sustained by victims of suicide bombing attacks in semi-confined spaces are characterized by the degree and extent of widespread tissue damage and include multiple penetrating wounds of varying severity and location, blast injury, and burns. The approach to victims of suicide bombings is based on the guidelines for trauma management. Attention is given to the moderately injured, as these patients may harbor immediate life-threatening injuries. The concept of damage control can be modified to include rapid packing of multiple soft-tissue entry sites. Optimal utilization of manpower and resources is achieved by recruiting all available personnel, adopting a predetermined plan, and a centrally coordinated approach. Suicide bombing attacks seriously challenge the most experienced medical facilities.

  18. Research on the fragment impact resistance of a composite mast

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Wu, Chao; Yang, Wenshan; Xu, Shanshan; Ren, Shaofei

    2011-09-01

    Due to the unique structural mode and material property of a composite sandwich plate, related research such as fragment impact resistance of a composite mast is short of publication and urgent in this field. In this paper, the commonly accepted sandwich core board theory was modified. Damage caused by a fragment attack was simulated onto a sandwich plate model built with solid and shell elements. It was shown that shear failure and vast matrix cracking are the main reasons for outer coat damage, and tension failure and partial matrix cracking are the cause for inner coat damage. Additionally, according to complexities in actual sea battles, different work conditions of missile attacks were set. Ballistic limit values of different fragment sizes were also obtained, which provides references for enhancing the fragment impact resistance of a composite mast.

  19. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    PubMed Central

    Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-01-01

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. PMID:29065461

  20. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    PubMed

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  1. Hybrid Intrusion Forecasting Framework for Early Warning System

    NASA Astrophysics Data System (ADS)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  2. Augmenting the existing survey hierarchy for mountain pine beetle red-attack damage with satellite remotely sensed data

    Treesearch

    M. A. Wulder; J. C. White; B. J. Bentz; T. Ebata

    2006-01-01

    Estimates of the location and extent of the red-attack stage of mountain pine beetle (Dendroctonus ponderosae Hopkins) infestations are critical for forest management. The degree of spatial and temporal precision required for these estimates varies according to the management objectives and the nature of the infestation. This paper outlines the range...

  3. Subterranean termites - their prevention and control in buildings

    Treesearch

    Chris Peterson; Terence L. Wagner; Joseph E. Mulrooney; Thomas G. Shelton

    2006-01-01

    Subterranean termites are the most important insect pest of wood in the United States. Living in large underground colonies, termites may attack any wood in contact with the soil and may even construct protective shelter tubes over nonwood materials to attack wood above ground. Most damage in the United States is caused by termites in the genus Reticulitermes, but an...

  4. Ocular Involvement of Behçet's Syndrome: a Comprehensive Review.

    PubMed

    Ozyazgan, Yilmaz; Ucar, Didar; Hatemi, Gulen; Yazici, Yusuf

    2015-12-01

    Behçet's syndrome (BS) is a vasculitis involving several organ systems including the eyes. Ocular involvement is one of the most disabling complications of BS, causing loss of vision that may progress to blindness if left untreated. The typical form of ocular involvement is a relapsing and remitting panuveitis and retinal vasculitis. Initial attacks may spontaneously improve and subsequently disappear in a few weeks but tend to recur if left untreated. Destructive and recurrent attacks, especially with posterior segment and retina involvement, may cause irreversible ocular structural changes and permanent damage in sensory retina, resulting in loss of vision. The risk of irreversible damage to ocular tissue which may result in loss of vision warrants early and intensive treatment especially in patients at high risk such as young men who tend to follow an aggressive disease course. The management strategy involves rapid suppression of inflammation during the attacks and prevention of recurrent attacks. Local and systemic measures including immunosuppressives, corticosteroids, and biologic agents are used for this purpose. Surgery may be required in selected cases. The prognosis of eye involvement has greatly improved over the last decades with the effective use of immunosuppressives.

  5. On effectiveness of network sensor-based defense framework

    NASA Astrophysics Data System (ADS)

    Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh

    2012-06-01

    Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.

  6. Seed-feeding insects impacting globemallow seed production

    Treesearch

    Robert Hammon; Melissa Franklin

    2012-01-01

    Weevils (Anthonomus sphaeralciae Fall [Coleoptera: Curculionidae]), which attack flowers and developing seeds, can significantly impact globemallow Sphaeralcea spp. A. St.-Hil. (Malvaceae) seed production without a grower even noticing there was insect damage. This weevil damaged almost one-quarter of the flowers in a seed production field in Delta County, Colorado,...

  7. Background of Civil Defense and Current Damage Limiting Studies.

    ERIC Educational Resources Information Center

    Romm, Joseph

    A brief history of civil defense administration precedes analysis of nuclear attack conditions and the influence of protective measures. Damage limitation procedure is explained in terms of--(1) blast effects, (2) radiation doses, (3) geographical fallout distribution patterns, and (4) national shelter needs. Major concept emphasis relates to--(1)…

  8. DNA Damage during G2 Phase Does Not Affect Cell Cycle Progression of the Green Alga Scenedesmus quadricauda

    PubMed Central

    Vítová, Milada; Bišová, Kateřina; Zachleder, Vilém

    2011-01-01

    DNA damage is a threat to genomic integrity in all living organisms. Plants and green algae are particularly susceptible to DNA damage especially that caused by UV light, due to their light dependency for photosynthesis. For survival of a plant, and other eukaryotic cells, it is essential for an organism to continuously check the integrity of its genetic material and, when damaged, to repair it immediately. Cells therefore utilize a DNA damage response pathway that is responsible for sensing, reacting to and repairing damaged DNA. We have studied the effect of 5-fluorodeoxyuridine, zeocin, caffeine and combinations of these on the cell cycle of the green alga Scenedesmus quadricauda. The cells delayed S phase and underwent a permanent G2 phase block if DNA metabolism was affected prior to S phase; the G2 phase block imposed by zeocin was partially abolished by caffeine. No cell cycle block was observed if the treatment with zeocin occurred in G2 phase and the cells divided normally. CDKA and CDKB kinases regulate mitosis in S. quadricauda; their kinase activities were inhibited by Wee1. CDKA, CDKB protein levels were stabilized in the presence of zeocin. In contrast, the protein level of Wee1 was unaffected by DNA perturbing treatments. Wee1 therefore does not appear to be involved in the DNA damage response in S. quadricauda. Our results imply a specific reaction to DNA damage in S. quadricauda, with no cell cycle arrest, after experiencing DNA damage during G2 phase. PMID:21603605

  9. Phytotoxicity, bioaccumulation and degradation of isoproturon in green algae.

    PubMed

    Bi, Yan Fang; Miao, Shan Shan; Lu, Yi Chen; Qiu, Chong Bin; Zhou, You; Yang, Hong

    2012-12-01

    Isoproturon (IPU) is a pesticide used for protection of land crops from weed or pathogen attack. Recent survey shows that IPU has been detected as a contaminant in aquatic systems and may have negative impact on aquatic organisms. To understand the phytotoxicity and potential accumulation and degradation of IPU in algae, a comprehensive study was performed with the green alga Chlamydomonas reinhardtii. Algae exposed to 5-50 μg L(-1) IPU for 3d displayed progressive inhibition of cell growth and reduced chlorophyll fluorescence. Time-course experiments with 25 μg L(-1) IPU for 6d showed similar growth responses. The 72 h EC50 value for IPU was 43.25 μg L(-1), NOEC was 5 μg L(-1) and LOEC was 15 μg L(-1). Treatment with IPU induced oxidative stress. This was validated by a group of antioxidant enzymes, whose activities were promoted by IPU exposure. The up-regulation of several genes coding for the enzymes confirmed the observation. IPU was shown to be readily accumulated by C. reinhardtii. However, the alga showed a weak ability to degrade IPU accumulated in its cells, which was best presented at the lower concentration (5 μg L(-1)) of IPU in the medium. The imbalance of accumulation and degradation of IPU may be the cause that resulted in the detrimental growth and cellular damage. Copyright © 2012 Elsevier B.V. All rights reserved.

  10. Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.

    PubMed

    Maqbool, Zahid; Makhijani, Nidhi; Pammi, V S Chandrasekhar; Dutt, Varun

    2017-05-01

    The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. In an experiment, participants were randomly assigned to three between-subjects conditions ( n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker's successful attack was 10 times the reward for analyst's successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst's successful defense was 10 times the reward for hacker's successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.

  11. Cascading failures in interconnected networks with dynamical redistribution of loads

    NASA Astrophysics Data System (ADS)

    Zhao, Zhuang; Zhang, Peng; Yang, Hujiang

    2015-09-01

    Cascading failures of loads in isolated networks and coupled networks have been studied in the past few years. In most of the corresponding results, the topologies of the networks are destroyed. Here, we present an interconnected network model considering cascading failures based on the dynamic redistribution of flow in the networks. Compared with the results of single scale-free networks, we find that interconnected scale-free networks have higher vulnerability. Additionally, the network heterogeneity plays an important role in the robustness of interconnected networks under intentional attacks. Considering the effects of various coupling preferences, the results show that there are almost no differences. Finally, the application of our model to the Beijing interconnected traffic network, which consists of a subway network and a bus network, shows that the subway network suffers more damage under the attack. Moreover, the interconnected traffic network may be more exposed to damage after initial attacks on the bus network. These discussions are important for the design and optimization of interconnected networks.

  12. Prevention of Noise Damage to Cochlear Synapses

    DTIC Science & Technology

    2015-10-01

    AWARD NUMBER: W81XWH-14-1-0494 TITLE: Prevention of Noise Damage to Cochlear Synapses PRINCIPAL INVESTIGATOR: Steven Green CONTRACTING...to Cochlear Synapses 5a. CONTRACT NUMBER 5b. GRANT NUMBER W81XWH-14-1-0494 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Steven Green 5d. PROJECT...ABSTRACT Noise-induced synaptopathy is the result of excitotoxic trauma to cochlear synapses due to glutamate released from the hair cells. Excitotoxic

  13. Twig Girdler, Oncideres Cingulata (Say), Attacks Terminals of Plantation-managed Pecans

    Treesearch

    Harvey E. Kennedy; J.D. Solomon; R.M. Krinard

    1981-01-01

    Sweet pecan, a prized species for use in fine furniture and paneling, is subject to branch and terminal damage by the pecan twig girdler that could cause deformities in the trees. In the young plantation studied, 55 percent of the trees in disked plots and 40 percent in mowed plots were damaged by the twig girdler, but only 19 percent in control plots were damaged....

  14. Evidence for Non-Opponent Coding of Colour Information in Human Visual Cortex: Selective Loss of "Green" Sensitivity in a Subject with Damaged Ventral Occipito-Temporal Cortex.

    PubMed

    Rauscher, Franziska G; Plant, Gordon T; James-Galton, Merle; Barbur, John L

    2011-01-01

    Damage to ventral occipito-temporal extrastriate visual cortex leads to the syndrome of prosopagnosia often with coexisting cerebral achromatopsia. A patient with this syndrome resulting in a left upper homonymous quadrantanopia, prosopagnosia, and incomplete achromatopsia is described. Chromatic sensitivity was assessed at a number of locations in the intact visual field using a dynamic luminance contrast masking technique that isolates the use of colour signals. In normal subjects chromatic detection thresholds form an elliptical contour when plotted in the Commission Internationale d'Eclairage, (x-y), chromaticity diagram. Because the extraction of colour signals in early visual processing involves opponent mechanisms, subjects with Daltonism (congenital red/green loss of sensitivity) show symmetric increase in thresholds towards the long wavelength ("red") and middle wavelength ("green") regions of the spectrum locus. This is also the case with acquired loss of chromatic sensitivity as a result of retinal or optic nerve disease. Our patient's results were an exception to this rule. Whilst his chromatic sensitivity in the central region of the visual field was reduced symmetrically for both "red/green" and "yellow/blue" directions in colour space, the subject's lower left quadrant showed a marked asymmetry in "red/green" thresholds with the greatest loss of sensitivity towards the "green" region of the spectrum locus. This spatially localized asymmetric loss of "green" but not "red" sensitivity has not been reported previously in human vision. Such loss is consistent with selective damage of neural substrates in the visual cortex that process colour information, but are spectrally non-opponent.

  15. Impedance based sensor technology to monitor stiffness of biological structures

    NASA Astrophysics Data System (ADS)

    Annamdas, Venu Gopal Madhav; Annamdas, Kiran Kishore Kumar

    2010-04-01

    In countries like USA or Japan it is not so uncommon to have wooden structures in their homes. However, metals and its alloys are the most widely used engineering materials in construction of any military or civil structure. Revisiting natural disasters like the recent Haiti earthquake (12 Jan 2010) or Katrina (cyclones) reminds the necessity to have better housing infrastructure with robust monitoring systems. Traditionally wood is accepted as excellent rehabilitation material, after any disaster. The recycling materials extracted from in-organic, biodegradable wastes, also can be used for rehabilitation. The key issue which dampens the life of these rehabilitated structure including green materials (like wood) is unnecessary deposits (nails, screws, bolts etc)/damages due to insect attack. Thus, a few health monitoring techniques have emerged in the recent past. Electromechanical Impedance technique is one such technique, which is simple but robust to detect variations in the integrity of structures. In this paper, impedance based piezoceramic sensor was bonded on wooden sample, which was used to study changes due to metallic (steel nails) deposits at various locations. A study of weight deposits on aluminum plate was used for comparisons.

  16. Yellow-throated and Red-eyed Vireos foraging on green anoles during migration

    USGS Publications Warehouse

    Sykes, P.W.; Atherton, L.S.; Payne, R.L.

    2007-01-01

    Yellow-throated (Vireo flavifrons) and Red-eyed vireos (V. olivaceus) were observed feeding on green anoles (Anolis carolinensis carolinensis) at two localities in Florida and one in South Carolina. Vireos are long-distance migrants that require foods high in fatty acid content, especially when engaging in migration. It is not unlikely that vireos have an opportunistic foraging strategy to obtain the necessary food requirements, including attacking and consuming prey items such as small lizards. This note provides the first published reports of lizards taken as prey by these two species.

  17. Behavior of Escherichia coli O157:H7 on damaged leaves of spinach, lettuce, cilantro, and parsley stored at abusive temperatures.

    PubMed

    Khalil, Rowaida K; Frank, Joseph F

    2010-02-01

    Recent foodborne illness outbreaks associated with the consumption of leafy green produce indicates a need for additional information on the behavior of pathogenic bacteria on these products. Previous research indicates that pathogen growth and survival is enhanced by leaf damage. The objective of this study was to compare the behavior of Escherichia coli O157:H7 on damaged leaves of baby Romaine lettuce, spinach, cilantro, and parsley stored at three abusive temperatures (8, 12, and 15 degrees C). The damaged portions of leaves were inoculated with approximately 10(5) CFU E. coli O157:H7 per leaf. The pathogen grew on damaged spinach leaves held for 3 days at 8 and 12 degrees C (P < 0.05), with the population increasing by 1.18 and 2.08 log CFU per leaf, respectively. E. coli O157:H7 did not grow on damaged Romaine leaves at 8 or 12 degrees C, but growth was observed after 8 h of storage at 15 degrees C, with an increase of less than 1.0 log. Growth of E. coli O157:H7 on Romaine lettuce held at 8 or 12 degrees C was enhanced when inocula were suspended in 0.05% ascorbic acid, indicating the possibility of inhibition by oxidation reactions associated with tissue damage. Damaged cilantro and Italian parsley leaves held at 8 degrees C for 4 days did not support the growth of E. coli O157:H7. Behavior of the pathogen in leaf extracts differed from behavior on the damaged tissue. This study provides evidence that the damaged portion of a leafy green is a distinct growth niche that elicits different microbial responses in the various types of leafy greens.

  18. Department of Defense Dictionary of Military and Associated Terms

    DTIC Science & Technology

    2005-08-31

    A committee set up to determine the priorities of passengers and cargo . air raid reporting control ship — (*) A ship ...also damage estimation. attack cargo ship — A naval ship designed or converted to transport combat-loaded cargo in an assault landing. Capabilities as...of comparable cargo ship types. Designated as LKA. attack group — (*) A subordinate task organization of the navy forces of an amphibious

  19. Worldwide Threat Assessment of the US Intelligence Community

    DTIC Science & Technology

    2014-01-29

    data-deletion and system- damaging attacks.  In early 2013, the US financial sector faced wide-scale network denial-of-service attacks that...South Sudan Nigeria Central African Republic Democratic Republic of the Congo Lord’s Resistance Army 19 19 19 19 19 20 20 21 21 East Asia...operations, financial activities, and personnel recruitment. Cyber criminal organizations are as ubiquitous as they are problematic on digital

  20. 76 FR 4609 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-26

    ... official identification, (3) verify to the consignor and consignee that the animals are healthy, (4...: APHIS will collect information from the use of official seals and animal identification; indemnity... destructive wood-boring insect that attacks ash trees (Praxinus spp., including green ash, white ash, and...

  1. Mealybugs (Hemiptera: Coccomorpha: Pseudococcidae) attacking Hibiscus rosa-sinensis L. in Malaysia, with two new country records

    NASA Astrophysics Data System (ADS)

    Sartiami, Dewi; Watson, Gillian W.; Mohamad Roff, M. N.; Idris, A. B.

    2016-11-01

    A survey of mealybugs (Hemiptera: Coccomorpha: Pseudococcidae) attacking the national flower of Malaysia, Hibiscus rosa-sisnensis L. and Hibiscus spp. (Malvaceae) was conducted in Selangor and Kuala Lumpur, Malaysia, from January to March 2016. Adult females were mounted on microscope slides in Canada balsam. The five species identified were Ferrisia dasylirii (Cockerell), Maconellicoccus hirsutus (Green), Paracoccus marginatus Williams and Granara de Willink, Phenacoccus solenopsis (Tinsley) and Pseudococcus jackbeardsleyi Gimpel & Miller. Two of these, the invasive species Ferrisia dasylirii and P. solenopsis were introduced and first recorded in Malaysia.

  2. Rays as weapons.

    PubMed

    Vogel, H

    2007-08-01

    Ionizing radiation is being regarded as life threatening. Therefore, accidents in nuclear power plants are considered equal threatening as nuclear bomb explosions, and attacks with dirty bombs are thought as dangerous as nuclear weapon explosions. However, there are differences between a nuclear bomb explosion, the largest imaginable accident in a nuclear power plant, and an attack with a dirty bomb. It is intended to point them out. The processes are described, which damage in a nuclear bomb explosion, in the largest imaginable accident in a nuclear power plant, and in an attack with a dirty bomb. Their effects are compared with each other, i.e. explosion, heat, shock wave (blast), ionizing radiation, and fallout. In the center of the explosion of a nuclear bomb, the temperature rises to 100Mio degrees C, this induces damaging heat radiation and shock wave. In the largest imaginable accident in a nuclear power plant and in the conventional explosion of a dirty bomb, the temperature may rise up to 3000 degrees C, heat radiation and blast are limited to a short distance. In nuclear power plants, explosions due to oxyhydrogen gas or steam may occur. In nuclear explosions the dispersed radioactive material (fall out) consists mainly of isotopes with short half-life, in nuclear power plants and in dirty bomb attacks with longer half-life. The amount of fall out is comparable in nuclear bomb explosions with that in the largest imaginable accident in a nuclear power plant, it is smaller in attacks with dirty bombs. An explosion in a nuclear power plant even in the largest imaginable accident is not a nuclear explosion. In Hiroshima and Nagasaki, there were 200,000 victims nearly all by heat and blast, some 300 died by ionizing radiation. In Chernobyl, there have been less than 100 victims due to ionizing radiation up till now. A dirty bomb kills possibly with the explosion of conventional explosive, the dispersed radioactive material may damage individuals. The incorporation of irradiating substances may kill and be difficult to detect (Litvinenko). A new form of (government supported) terrorism/crime appears possible. The differences are important between a nuclear weapon explosion, the largest imaginable accident in a nuclear power plant, and an attack with a dirty bomb. Nuclear weapons kill by heat and blast; in the largest imaginable accident in a nuclear power plant, they are less strong and limited to the plant; an attack with a dirty bomb is as life threatening as an ("ordinary") bomb attack, dispersed radiating material may be a risk for individuals.

  3. How Predictable Are the Behavioral Responses of Insects to Herbivore Induced Changes in Plants? Responses of Two Congeneric Thrips to Induced Cotton Plants

    PubMed Central

    Silva, Rehan; Furlong, Michael J.; Wilson, Lewis J.; Walter, Gimme H.

    2013-01-01

    Changes in plants following insect attack are referred to as induced responses. These responses are widely viewed as a form of defence against further insect attack. In the current study we explore whether it is possible to make generalizations about induced plant responses given the unpredictability and variability observed in insect-plant interactions. Experiments were conducted to test for consistency in the responses of two congeneric thrips, Frankliniella schultzei Trybom and Frankliniella occidentalis Pergrande (Thysanoptera: Thripidae) to cotton seedlings (Gossypium hirsutum Linneaus (Malvales: Malvaceae)) damaged by various insect herbivores. In dual-choice experiments that compared intact and damaged cotton seedlings, F. schultzei was attracted to seedlings damaged by Helicoverpa armigera (Hübner) (Lepidoptera: Noctuidae), Tetranychus urticae (Koch) (Trombidiforms: Tetranychidae), Tenebrio molitor Linnaeus (Coleoptera: Tenebrionidae), F. schultzei and F. occidentalis but not to mechanically damaged seedlings. In similar tests, F. occidentalis was attracted to undamaged cotton seedlings when simultaneously exposed to seedlings damaged by H. armigera, T. molitor or F. occidentalis. However, when exposed to F. schultzei or T. urticae damaged plants, F. occidentalis was more attracted towards damaged plants. A quantitative relationship was also apparent, F. schultzei showed increased attraction to damaged seedlings as the density of T. urticae or F. schultzei increased. In contrast, although F. occidentalis demonstrated increased attraction to plants damaged by higher densities of T. urticae, there was a negative relationship between attraction and the density of damaging conspecifics. Both species showed greater attraction to T. urticae damaged seedlings than to seedlings damaged by conspecifics. Results demonstrate that the responses of both species of thrips were context dependent, making generalizations difficult to formulate. PMID:23691075

  4. Low-severity fire increases tree defense against bark beetle attacks

    Treesearch

    Sharon Hood; Anna Sala; Emily K. Heyerdahl; Marion Boutin

    2015-01-01

    Induced defense is a common plant strategy in response to herbivory. Although abiotic damage, such as physical wounding, pruning, and heating, can induce plant defense, the effect of such damage by large-scale abiotic disturbances on induced defenses has not been explored and could have important consequences for plant survival facing future biotic...

  5. Reducing logging damage

    Treesearch

    Richard D. Cosens

    1952-01-01

    Reducing logging damage to reproduction and residual stands is an important part of harvesting the old-growth forests of California. Much of the over mature timber: is on areas with an acceptable stocking of advance growth. When the old trees are harvested, the advance growth is scarred, deformed, broken, or killed outright. Insects and disease attack the broken and...

  6. Contribution of insectivorous avifauna to top down control of Lindera benzoin herbivores at forest edge and interior habitats

    NASA Astrophysics Data System (ADS)

    Skoczylas, Daniel R.; Muth, Norris Z.; Niesenbaum, Richard A.

    2007-11-01

    Predation of herbivorous Lepidoptera larvae by insectivorous avifauna was estimated on Lindera benzoin in edge and interior habitats at two sites in eastern Pennsylvania (USA). Clay baits modeled after Epimecis hortaria (Geometridae) larvae, the primary herbivore of L. benzoin at our study sites, were used to estimate predation by birds. In both habitat types, models were placed on uninjured L. benzoin leaves as well as on leaves that had prior insect herbivore damage. Rates of model attack were greater, and model longevity reduced, in forest edge plots compared to interiors. Naturally occurring herbivore damage on L. benzoin was greater in forest interiors. However, model attack was not significantly greater on leaves with prior herbivory damage, suggesting that birds do not effectively use this type of leaf damage as a cue in their foraging. Our findings are consistent with a contribution of bird predation towards top-down control of herbivory in this system. We further discuss these results in a broader context considering the possible effects of habitat type on leaf quality, leaf defense, and herbivore performance.

  7. Remote damage control during the attacks on Paris: Lessons learned by the Paris Fire Brigade and evolutions in the rescue system.

    PubMed

    Lesaffre, Xavier; Tourtier, Jean-Pierre; Violin, Yann; Frattini, Benoit; Rivet, Catherine; Stibbe, Olivier; Faure, Florian; Godefroy, Anne; Gallet, Jean-Claude; Ausset, Sylvain

    2017-06-01

    On November 13, 2015, in 40 minutes, Paris suffered four suicide bombers attacks; shootings at three different restaurant terraces; and an attack on the Bataclan concert hall, resulting in 130 dead and 495 wounded. How did the Parisian rescue system respond and how did it evolve since?We proved we could deploy quickly wide prehospital and hospital resources and teams' equipment and preparedness is being further developed. To secure a swifter initial response, we need a better integration of the operators of the rescue chain with a simpler and more robust organization as well as improved communications channels. We must continue to anticipate and prepare for possible future attacks.

  8. Patterns of late spring frost leaf damage and recovery in a European beech (Fagus sylvatica L.) stand in south-eastern Germany based on repeated digital photographs

    PubMed Central

    Menzel, Annette; Helm, Raimund; Zang, Christian

    2015-01-01

    Damage by late spring frost is a risk deciduous trees have to cope with in order to optimize the length of their growing season. The timing of spring phenological development plays a crucial role, not only at the species level, but also at the population and individual level, since fresh new leaves are especially vulnerable. For the pronounced late spring frost in May 2011 in Germany, we studied the individual leaf development of 35 deciduous trees (mainly European beech Fagus sylvatica L.) at a mountainous forest site in the Bayerischer Wald National Park using repeated digital photographs. Analyses of the time series of greenness by a novel Bayesian multiple change point approach mostly revealed five change points which almost perfectly matched the expected break points in leaf development: (i) start of the first greening between day of the year (DOY) 108–119 (mean 113), (ii) end of greening, and (iii) visible frost damage after the frost on the night of May 3rd/4th (DOY 123/124), (iv) re-sprouting 19–38 days after the frost, and (v) full maturity around DOY 178 (166–184) when all beech crowns had fully recovered. Since frost damage was nearly 100%, individual susceptibility did not depend on the timing of first spring leaf unfolding. However, we could identify significant patterns in fitness linked to an earlier start of leaf unfolding. Those individuals that had an earlier start of greening during the first flushing period had a shorter period of recovery and started the second greening earlier. Thus, phenological timing triggered the speed of recovery from such an extreme event. The maximum greenness achieved, however, did not vary with leaf unfolding dates. Two mountain ashes (Sorbus aucuparia L.) were not affected by the low temperatures of -5°C. Time series analysis of webcam pictures can thus improve process-based knowledge and provide valuable insights into the link between phenological variation, late spring frost damage, and recovery within one stand. PMID:25759707

  9. Patterns of late spring frost leaf damage and recovery in a European beech (Fagus sylvatica L.) stand in south-eastern Germany based on repeated digital photographs.

    PubMed

    Menzel, Annette; Helm, Raimund; Zang, Christian

    2015-01-01

    Damage by late spring frost is a risk deciduous trees have to cope with in order to optimize the length of their growing season. The timing of spring phenological development plays a crucial role, not only at the species level, but also at the population and individual level, since fresh new leaves are especially vulnerable. For the pronounced late spring frost in May 2011 in Germany, we studied the individual leaf development of 35 deciduous trees (mainly European beech Fagus sylvatica L.) at a mountainous forest site in the Bayerischer Wald National Park using repeated digital photographs. Analyses of the time series of greenness by a novel Bayesian multiple change point approach mostly revealed five change points which almost perfectly matched the expected break points in leaf development: (i) start of the first greening between day of the year (DOY) 108-119 (mean 113), (ii) end of greening, and (iii) visible frost damage after the frost on the night of May 3rd/4th (DOY 123/124), (iv) re-sprouting 19-38 days after the frost, and (v) full maturity around DOY 178 (166-184) when all beech crowns had fully recovered. Since frost damage was nearly 100%, individual susceptibility did not depend on the timing of first spring leaf unfolding. However, we could identify significant patterns in fitness linked to an earlier start of leaf unfolding. Those individuals that had an earlier start of greening during the first flushing period had a shorter period of recovery and started the second greening earlier. Thus, phenological timing triggered the speed of recovery from such an extreme event. The maximum greenness achieved, however, did not vary with leaf unfolding dates. Two mountain ashes (Sorbus aucuparia L.) were not affected by the low temperatures of -5°C. Time series analysis of webcam pictures can thus improve process-based knowledge and provide valuable insights into the link between phenological variation, late spring frost damage, and recovery within one stand.

  10. Afghanistan: Green-on-Blue Attacks

    DTIC Science & Technology

    2013-05-02

    burnt copies of the Quran in a garbage dump at Bagram Air Base that sparked several days of anti-American riots in February 2012. An Afghan soldier...reaching a Category II or III threat. A concerted effort between the Afghan government and military and the Coalition lead to several concrete measures

  11. A new species of Histura Razowski (Lepidoptera: Tortricidae: Polyorthini) from Guatemala attacking avocados (Persea americana) Lauraceae

    USDA-ARS?s Scientific Manuscript database

    Histura perseavora Brown, new species, is described and illustrated from Guatemala. It is compared with Histura curvata (Meyrick) (from Brazil) and Histurodes costaricana Razowski (from Costa Rica). All specimens of H. perseavora were reared from either fruit, fruit pedicels, or young green branches...

  12. A Fundamental Key to Next-Generation Directed-Energy Systems

    DTIC Science & Technology

    2012-01-01

    and be inherently safe to operate. By design, they must minimize or eliminate the risk of hostile attack or collateral damage especially during...bile Construction Battalion (NMCB) 7’s convoy security element are secured following an escort mission from a forward operating base. The Cougar -type...profile, small, lightweight DE systems means: • Less vulnerability to attack • Greater mobility and maneuverability • Simplified logistics with

  13. Information System Incidents: The Development of a Damage Assessment Model

    DTIC Science & Technology

    1999-12-01

    Cyber criminals use creativity, knowledge, software, and hardware to attack and infiltrate information systems (IS) in order to copy, delete, or...the Internet led to an increase in cyber criminals and a variety or cyber crimes such as attacks, intrusions, introduction of viruses, and data theft...organizations on information systems is contributing to the increased number of cyber criminals . Additionally, the growing sophistication and availability of

  14. Analysis of System Training Impact for Major Defense Acquisition Programs

    DTIC Science & Technology

    2011-08-01

    simulation fidelity but rather were due to poor training development planning, the absence of instructional support and training features on the simulation...reduce detectability of the soldier, prevent attack if detected, prevent damage if attacked, minimize medical injury if wounded or otherwise injured, and...instance, a National Guard tank battalion that stores and maintains its tanks at a central maintenance/training facility may find it more cost

  15. Cross-Layer Damage Assessment for Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason

    Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.

  16. Hydrogen attack in Cr-Mo steels. [3Cr-1. 5Mo and 2. 25Cr-1Mo steels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruoff, S.; Stone, D.; Wanagel, J.

    Experiments conducted upon 3Cr-1.5Mo steel at elevated temperatures (600 C), and high pressure hydrogen (2000 psi), have shown a greater resistence to hydrogen attack compared with similar studies of 2.25Cr-lMo steels. Hydrogen exposure tests with and without an applied stress have been performed on both types of steels. Results of similar conditions show clear evidence of hydrogen attack in 2.25Cr-lMo steel, however, for the 3Cr-1.5Mo steel with exposure time up to 80 days without an applied stress no evidence of hydrogen attack is observed. For stress-rupture tests using stresses of 14 and 16 ksi, the 3Cr-1.5Mo steel showed no effectsmore » of hydrogen attack, and no damage was observed using a SEM.« less

  17. Reducing the Impact of Attacks against Healthcare by Curbing the Use of Explosive Weapons in Populated Areas: Developments at the Global Level.

    PubMed

    Bagshaw, Simon

    Attacks against healthcare in situations of armed conflict have emerged as an issue of increasing concern with explosive weapons - such as aircraft bombs, mortars and improvised explosive devices - accounting for more deaths, injuries and damage than any other type of weapon in attacks on healthcare facilities. While this is perhaps unsurprising, it offers some insight into a possible course of action for dealing with the problem of attacks against healthcare - by curbing the use of explosive weapons in populated areas. There has been growing recognition in recent years of the humanitarian problems caused by the use of such weapons in populated areas. Steps are now being taken at the global level to curb this use which could, in time, make an important contribution to reducing the incidence and devastating impact of attacks against healthcare.

  18. Long-Term Effects of Soldering By-Products on Nickel-Coated Copper Wire

    NASA Technical Reports Server (NTRS)

    Rolin, T. D.; Hodge, R. E.

    2008-01-01

    An analysis of thirty-year-old, down graded flight cables was conducted to determine the makeup of a green material on the surface of the shielded wire near soldered areas and to ascertain if the green material had corroded the nickel-coated copper wire. Two likely candidates were possible due to the handling and environments to which these cables were exposed. The flux used to solder the cables is known to contain abietic acid, a carboxylic acid found in many pine rosins used for the soldering process. The resulting material copper abietate is green in color and is formed during the application of heat during soldering operations. Copper (II) chloride, which is also green in color is known to contaminate flight parts and is corrosive. Data is presented that shows the material is copper abietate, not copper (II) chloride, and more importantly that the abietate does not aggressively attack nickel-plated copper wire.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Canavan, G.H.

    Attack allocation optimizations produce stability indices for unsymmetrical forces that indicate significant regions of both stability and instability and that have their minimum values roughly when the two sides have equal forces. This note derives combined stability indices for unsymmetrical offensive force configurations. The indices are based on optimal allocations of offensive missiles between vulnerable missiles and value based on the minimization of first strike cost, which is done analytically. Exchanges are modeled probabalistically and their results are converted into first and second strike costs through approximations to the damage to the value target sets held at risk. The stabilitymore » index is the product of the ratio of first to second strike costs seen by the two sides. Optimal allocations scale directly on the opponent`s vulnerable missiles, inversely on one`s own total weapons, and only logarithmically on the attacker`s damage preference, kill probability, and relative target set. The defender`s allocation scales in a similar manner on the attacker`s parameters. First and second strike magnitudes increase roughly linearly for the side with greater forces and decrease linearly for the side with fewer. Conversely, the first and second strike magnitudes decrease for the side with greater forces and increase for the side with fewer. These trends are derived and discussed analytically. The resulting stability indices exhibit a minimum where the two sides have roughly equal forces. If one side has much larger forces than the other, his costs drop to levels low enough that he is relatively insensitive to whether he strikes first or second. These calculations are performed with the analytic attack allocation appropriate for moderate forces, so some differences could be expected for the largest of the forces considered.« less

  20. THE EFFECT OF GREEN TEA ON OXIDATIVE DAMAGE AND TUMOUR FORMATION IN LOBUND-WISTAR RATS

    PubMed Central

    O'Sullivan, Jacintha; Sheridan, Juliette; Mulcahy, Hugh; Tenniswood, Martin; Morrissey, Colm

    2014-01-01

    A number of epidemiological studies suggest that the consumption of green tea reduces the incidence of prostate cancer. Since the major catechins present in green tea are potent anti-oxidants, we hypothesized that genetic and cellular damage induced by oxygen free radicals could be significantly reduced by potent anti-oxidants in green tea, thus reducing the cumulative genetic and cellular damage with age, and slowing or preventing tumour formation. Long-term administration of a decaffeinated green tea extract to Lobund-Wistar rats for periods up to 26 months almost halved the incidence of primary tumours in the genitourinary tract when compared to an aged-matched cohort receiving just water. We observed no inhibition of DNA adduct formation or lipid peroxidation in animals consuming green tea compared to animals consuming de-ionized water. The decrease in tumour formation was associated with an increase in 8-hydroxy-2’deoxyguanosine (8-OH-dG) and 4-hydroxynonenal (4-HNE) content (markers of DNA adduct formation and lipid peroxidation respectively) in the epithelium of the ventral prostate in aging animals. There was also an increase in 8-OH-dG expression, but no change in 4-HNE expression in the seminal vesicles of older animals. There was an age associated increase in expression of the anti-oxidant enzymes MnSOD and catalase in the epithelium of the ventral prostate of aging animals. There was also an increase in MnSOD expression, but no change in catalase expression in the seminal vesicles of older animals. These data demonstrate that consumption of green tea decreases the incidence of genitourinary tract tumours in the Lobund-Wistar rat, but has no effect on age associated DNA adduct formation and lipid peroxidation in the aging rat ventral prostate and seminal vesicles. PMID:18941371

  1. Brainjacking: Implant Security Issues in Invasive Neuromodulation.

    PubMed

    Pycroft, Laurie; Boccard, Sandra G; Owen, Sarah L F; Stein, John F; Fitzgerald, James J; Green, Alexander L; Aziz, Tipu Z

    2016-08-01

    The security of medical devices is critical to good patient care, especially when the devices are implanted. In light of recent developments in information security, there is reason to be concerned that medical implants are vulnerable to attack. The ability of attackers to exert malicious control over brain implants ("brainjacking") has unique challenges that we address in this review, with particular focus on deep brain stimulation implants. To illustrate the potential severity of this risk, we identify several mechanisms through which attackers could manipulate patients if unauthorized access to an implant can be achieved. These include blind attacks in which the attacker requires no patient-specific knowledge and targeted attacks that require patient-specific information. Blind attacks include cessation of stimulation, draining implant batteries, inducing tissue damage, and information theft. Targeted attacks include impairment of motor function, alteration of impulse control, modification of emotions or affect, induction of pain, and modulation of the reward system. We also discuss the limitations inherent in designing implants and the trade-offs that must be made to balance device security with battery life and practicality. We conclude that researchers, clinicians, manufacturers, and regulatory bodies should cooperate to minimize the risk posed by brainjacking. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. Step-by-Step Simulation of Radiation Chemistry Using Green Functions for Diffusion-Influenced Reactions

    NASA Technical Reports Server (NTRS)

    Plante, Ianik; Cucinotta, Francis A.

    2011-01-01

    Radiolytic species are formed approximately 1 ps after the passage of ionizing radiation through matter. After their formation, they diffuse and chemically react with other radiolytic species and neighboring biological molecules, leading to various oxidative damage. Therefore, the simulation of radiation chemistry is of considerable importance to understand how radiolytic species damage biological molecules [1]. The step-by-step simulation of chemical reactions is difficult, because the radiolytic species are distributed non-homogeneously in the medium. Consequently, computational approaches based on Green functions for diffusion-influenced reactions should be used [2]. Recently, Green functions for more complex type of reactions have been published [3-4]. We have developed exact random variate generators of these Green functions [5], which will allow us to use them in radiation chemistry codes. Moreover, simulating chemistry using the Green functions is which is computationally very demanding, because the probabilities of reactions between each pair of particles should be evaluated at each timestep [2]. This kind of problem is well adapted for General Purpose Graphic Processing Units (GPGPU), which can handle a large number of similar calculations simultaneously. These new developments will allow us to include more complex reactions in chemistry codes, and to improve the calculation time. This code should be of importance to link radiation track structure simulations and DNA damage models.

  3. Forest Health Monitoring in Connecticut, 1996-1999

    Treesearch

    Northeastern Research Station

    2002-01-01

    Connecticut has mature forests dominated by hardwoods. Most trees are healthy with full crowns (low transparency and high density), little dieback and little damage. The exception is eastern hemlock, which was in poor condition, with thin crowns, more dieback and more damage, especially broken tops. These conditions are likely the result of attack by the hemlock woolly...

  4. European Pine Shoot Moth

    Treesearch

    William E. Miller; Arthur R. Hastings; John F. Wootten

    1961-01-01

    In the United States, the European pine shoot moth has caused much damage in young, plantations of red pine. It has been responsible for reduced planting of red pine in many areas. Although attacked trees rarely if ever die, their growth is inhibited and many are, deformed. Scotch pine and Austrian pine (Pinus nigra Arnold) are usually not so badly damaged. Swiss...

  5. Degradation pathway of malachite green in a novel dual-tank photoelectrochemical catalytic reactor.

    PubMed

    Diao, Zenghui; Li, Mingyu; Zeng, Fanyin; Song, Lin; Qiu, Rongliang

    2013-09-15

    A novel dual-tank photoelectrochemical catalytic reactor was designed to investigate the degradation pathway of malachite green. A thermally formed TiO₂/Ti thin film electrode was used as photoanode, graphite was used as cathode, and a saturated calomel electrode was employed as the reference electrode in the reactor. In the reactor, the anode and cathode tanks were connected by a cation exchange membrane. Results showed that the decolorization ratio of malachite green in the anode and cathode was 98.5 and 96.5% after 120 min, respectively. Malachite green in the two anode and cathode tanks was oxidized, achieving the bipolar double effect. Malachite green in both the anode and cathode tanks exhibited similar catalytic degradation pathways. The double bond of the malachite green molecule was attacked by strong oxidative hydroxyl radicals, after which the organic compound was degraded by the two pathways into 4,4-bis(dimethylamino) benzophenone, 4-(dimethylamino) benzophenone, 4-(dimethylamino) phenol, and other intermediate products. Eventually, malachite green was degraded into oxalic acid as a small molecular organic acid, which was degraded by processes such as demethylation, deamination, nitration, substitution, addition, and other reactions. Copyright © 2013 Elsevier B.V. All rights reserved.

  6. Quantitative patterns between plant volatile emissions induced by biotic stresses and the degree of damage

    PubMed Central

    Niinemets, Ülo; Kännaste, Astrid; Copolovici, Lucian

    2013-01-01

    Plants have to cope with a plethora of biotic stresses such as herbivory and pathogen attacks throughout their life cycle. The biotic stresses typically trigger rapid emissions of volatile products of lipoxygenase (LOX) pathway (LOX products: various C6 aldehydes, alcohols, and derivatives, also called green leaf volatiles) associated with oxidative burst. Further a variety of defense pathways is activated, leading to induction of synthesis and emission of a complex blend of volatiles, often including methyl salicylate, indole, mono-, homo-, and sesquiterpenes. The airborne volatiles are involved in systemic responses leading to elicitation of emissions from non-damaged plant parts. For several abiotic stresses, it has been demonstrated that volatile emissions are quantitatively related to the stress dose. The biotic impacts under natural conditions vary in severity from mild to severe, but it is unclear whether volatile emissions also scale with the severity of biotic stresses in a dose-dependent manner. Furthermore, biotic impacts are typically recurrent, but it is poorly understood how direct stress-triggered and systemic emission responses are silenced during periods intervening sequential stress events. Here we review the information on induced emissions elicited in response to biotic attacks, and argue that biotic stress severity vs. emission rate relationships should follow principally the same dose–response relationships as previously demonstrated for different abiotic stresses. Analysis of several case studies investigating the elicitation of emissions in response to chewing herbivores, aphids, rust fungi, powdery mildew, and Botrytis, suggests that induced emissions do respond to stress severity in dose-dependent manner. Bi-phasic emission kinetics of several induced volatiles have been demonstrated in these experiments, suggesting that next to immediate stress-triggered emissions, biotic stress elicited emissions typically have a secondary induction response, possibly reflecting a systemic response. The dose–response relationships can also vary in dependence on plant genotype, herbivore feeding behavior, and plant pre-stress physiological status. Overall, the evidence suggests that there are quantitative relationships between the biotic stress severity and induced volatile emissions. These relationships constitute an encouraging platform to develop quantitative plant stress response models. PMID:23888161

  7. NASA's Research in Aircraft Vulnerability Mitigation

    NASA Technical Reports Server (NTRS)

    Allen, Cheryl L.

    2005-01-01

    Since its inception in 1958, the National Aeronautics and Space Administration s (NASA) role in civil aeronautics has been to develop high-risk, high-payoff technologies to meet critical national aviation challenges. Following the events of Sept. 11, 2001, NASA recognized that it now shared the responsibility for improving homeland security. The NASA Strategic Plan was modified to include requirements to enable a more secure air transportation system by investing in technologies and collaborating with other agencies, industry, and academia. NASA is conducting research to develop and advance innovative and commercially viable technologies that will reduce the vulnerability of aircraft to threats or hostile actions, and identify and inform users of potential vulnerabilities in a timely manner. Presented in this paper are research plans and preliminary status for mitigating the effects of damage due to direct attacks on civil transport aircraft. The NASA approach to mitigation includes: preventing loss of an aircraft due to a hit from man-portable air defense systems; developing fuel system technologies that prevent or minimize in-flight vulnerability to small arms or other projectiles; providing protection from electromagnetic energy attacks by detecting directed energy threats to aircraft and on/off-board systems; and minimizing the damage due to high-energy attacks (explosions and fire) by developing advanced lightweight, damage-resistant composites and structural concepts. An approach to preventing aircraft from being used as weapons of mass destruction will also be discussed.

  8. The internet worm

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1989-01-01

    In November 1988 a worm program invaded several thousand UNIX-operated Sun workstations and VAX computers attached to the Research Internet, seriously disrupting service for several days but damaging no files. An analysis of the work's decompiled code revealed a battery of attacks by a knowledgeable insider, and demonstrated a number of security weaknesses. The attack occurred in an open network, and little can be inferred about the vulnerabilities of closed networks used for critical operations. The attack showed that passwork protection procedures need review and strengthening. It showed that sets of mutually trusting computers need to be carefully controlled. Sharp public reaction crystalized into a demand for user awareness and accountability in a networked world.

  9. SIGAR Special Inspector General For Afghanistan Reconstruction

    DTIC Science & Technology

    2017-07-30

    soldiers. One of the worst terror attacks of the Afghan war occurred on May 31, when a truck bomb exploded in the center of Kabul’s diplomatic quarter...RISK-FREE A devastating bomb attack near Afghanistan’s presidential palace in Kabul on May 31, 2017, killed more than 150 people and wounded hundreds...truck- bomb explosion heavily damaged several embassies and injured staff from the German, Japanese, and Pakistani embassies, as well as some U.S

  10. Engaging the Nation’s Critical Infrastructure Sector to Deter Cyber Threats

    DTIC Science & Technology

    2013-03-01

    is the component of CyberOps that extends cyber power beyond the defensive boundaries of the GIG to detect, deter, deny, and defeat adversaries... economy .16 DDOS attacks are based on multiple, malware infected personal computers, organized into networks called botnets, and are directed by...not condemn the actions of those involved. Of the two attacks on Estonia and Georgia, it was Estonia that had the greatest damage to its economy

  11. China Report, Political, Sociological and Military Affairs, No. 445.

    DTIC Science & Technology

    1983-08-11

    three villages of Qarah Bagh subdivi- sion, north of Kabul. During a nine-hour fighting, 23 troops were killed and a number of others injured. The...Soviet-Karmal troops encircled four other villages in the area the following day. The guerrillas attacked them and damaged two tanks. These clashes...were followed by the Soviet bombing of the seven villages . 54 villagers were killed during the air raid. The guerrillas also attacks in Kabul during

  12. Myoglobin blood test

    MedlinePlus

    Serum myoglobin; Heart attack - myoglobin blood test; Myositis - myoglobin blood test; Rhabdomyolysis - myoglobin blood test ... too high, it can damage the kidneys. This test is ordered when your health care provider suspects ...

  13. Identification of Antipathogenic Bacterial Coral Symbionts Against Porites Ulcerative White Spots Disease

    NASA Astrophysics Data System (ADS)

    Sa'adah, Nor; Sabdono, Agus; Diah Permata Wijayanti, dan

    2018-02-01

    Coral reef ecosystems are ecosystems that are vulnerable and susceptible to damage due to the exploitation of ocean resources. One of the factors that cause coral damage is the disease that attacks the coral. Porites Ulcerative White Spots (PUWS) is a coral disease found in Indonesia and attacks the coral genera Porites allegedly caused by pathogenic microbial attacks. The purpose of this study was to identify the symbiotic bacteria on healthy coral that have antipatogenic potency against PUWS. The method used in this research was descriptive explorative. Sampling was done in Kemujan Island, Karimunjawa. Bacteria were isolated from healthy coral and coral affected by PUWS disease. Streak method was used to purify coral bacteria, while overlay and agar diffusion were used to test antipathogenic activity. Bacterial identification was carried out based on polyphasic approach. The results of this study showed that coral bacterial symbionts have antipathogenic activity against PUWS disease. The selected bacteria NM 1.2, NM 1.3 and KPSH 5. NM1.2 were closely related to Pseudoalteromonas piscicida, Pseudoalteromonas flavipulchra and Bacillus flexus, respectively.

  14. On Death Ground: Why Weak States Resist Great Powers Explaining Coercion Failure in Asymmetric Interstate Conflict

    DTIC Science & Technology

    2010-09-01

    Austin Long, Daniel Altman, Gautam Mukunda, Ben Friedman, Peter Krause , Kelly Grieco, Brendan Green, Negeen Paghadi, and Jill Hazelton. A special thanks...Times, Saxon, Wolfgang (28 December 1985) "Airport Attacks Widely Deplored" New York Times 770 Reagan did not freeze Libyan financial assets and

  15. Infusing the Chemistry Curriculum with Green Chemistry Using Real-World Examples, Web Modules, and Atom Economy in Organic Chemistry Courses

    ERIC Educational Resources Information Center

    Cann, Michael C.; Dickneider, Trudy A.

    2004-01-01

    Green chemistry is the awareness of the damaging environmental effects due to chemical research and inventions. There is emphasis on a need to include green chemistry in synthesis with atom economy in organic chemistry curriculum to ensure an environmentally conscious future generation of chemists, policy makers, health professionals and business…

  16. The Effect of Green Tea and Sour Tea (Hibiscus sabdariffa L.) Supplementation on Oxidative Stress and Muscle Damage in Athletes.

    PubMed

    Hadi, Amir; Pourmasoumi, Makan; Kafeshani, Marzieh; Karimian, Jahangir; Maracy, Mohammad Reza; Entezari, Mohammad Hasan

    2017-05-04

    Additional oxygen consumption during intense exercises may lead to oxidative stress and contribute to muscular fatigue. Green tea and sour tea (Hibiscus sabdariffa L.), which contain various flavonoids and polyphenols, have many healthful properties such as anticarcinogenic, anti-inflammatory, and heart protecting effects. The aim of the present study was to assess the effects of green tea and sour tea supplementation on oxidative stress and muscle damage in soccer athletes. This randomized, double-blind control trial was conducted on 54 male soccer players. Participants were randomly assigned to three groups to receive: 450 mg/d green tea extract (GTE) in the first group (n = 18), 450 mg/d sour tea extract (STE) in the second group (n = 18) and 450 mg/d maltodextrin in the control group (n = 18). Fasting whole blood samples were taken under resting conditions at the beginning and the end of the study to quantify the serum levels of muscle damage indices, aspartate aminotransferase (AST), creatine kinase (CK), lactate dehydrogenase (LDH), and oxidative stress biomarkers, malondialdehyde (MDA), and total antioxidant capacity (TAC). After six weeks intervention, athletes who received GTE and STE supplements compared with the placebo had a significantly decreased MDA level (P = 0.008). Furthermore, STE supplementation resulted in a significant increase in TAC level compared with GTE and placebo groups (P = 0.01). However, supplementation with GTE and STE had no significant effects on muscle damage indices. GTE and STE supplementation have beneficial effects on oxidative stress status in male athletes. However, both kinds of tea extract did not affect muscle damage status.

  17. Detection of airway ischaemic damage after lung transplantation by using autofluorescence imaging bronchoscopy.

    PubMed

    Iga, Norichika; Oto, Takahiro; Okada, Masanori; Harada, Masaaki; Nishikawa, Hitoshi; Miyoshi, Kentaroh; Otani, Shinji; Sugimoto, Seiichiro; Yamane, Masaomi; Toyooka, Shinichi; Miyoshi, Shinichiro

    2014-03-01

    Airway complications related to ischaemia are a major cause of morbidity after lung transplantation. Early detection of airway ischaemia and optimal management of the anastomotic site could reduce the risk of airway complications. Autofluorescence imaging (AFI) bronchoscopy has been increasingly recognized as an effective technique for detecting abnormal mucosal thickening. The aim of this study was to investigate whether AFI bronchoscopy can facilitate the detection of airway ischaemic damage in lung transplant patients. Twenty Landrace pigs were used to create a tracheal autotransplantation model. A four-ring length of trachea was excised and implanted orthotopically. The tracheal autograft was observed on postoperative days 0, 2, 4 and 7 with AFI bronchoscopy. The extent and origin of graft autofluorescence were examined using histology and measured according to fluorescence intensity. The lesions on the tracheal autografts appeared as bright green fluorescence on AFI bronchoscopy. On confocal fluorescence microscopy, high-intensity green fluorescence was observed in the elastin fibre layer of the submucosa. The fluorescence intensity of elastin was significantly higher in the graft showing fluorescence than the graft that did not show fluorescence and that at the control site. Bright green fluorescence was seen in an elastin fibre layer in the submucosa, which was likely a result of epithelial sloughing. There is a close relationship between the bright green fluorescence pattern observed using AFI bronchoscopy and airway ischaemic damage. We conclude that AFI bronchoscopy may detect airway ischaemic damage after lung transplantation.

  18. Kidney Diseases

    MedlinePlus

    ... until you go to the bathroom. Most kidney diseases attack the nephrons. This damage may leave kidneys ... medicines. You have a higher risk of kidney disease if you have diabetes, high blood pressure, or ...

  19. Tsunami response system for ports in Korea

    NASA Astrophysics Data System (ADS)

    Cho, H.-R.; Cho, J.-S.; Cho, Y.-S.

    2015-09-01

    The tsunamis that have occurred in many places around the world over the past decade have taken a heavy toll on human lives and property. The eastern coast of the Korean Peninsula is not safe from tsunamis, particularly the eastern coastal areas, which have long sustained tsunami damage. The eastern coast had been attacked by 1983 and 1993 tsunami events. The aim of this study was to mitigate the casualties and property damage against unexpected tsunami attacks along the eastern coast of the Korean Peninsula by developing a proper tsunami response system for important ports and harbors with high population densities and high concentrations of key national industries. The system is made based on numerical and physical modelings of 3 historical and 11 virtual tsunamis events, field surveys, and extensive interviews with related people.

  20. Contrasting expressions of aggressive behavior released by lesions of the central nucleus of the amygdala during wakefulness and rapid eye movement sleep without atonia in cats.

    PubMed

    Zagrodzka, J; Hedberg, C E; Mann, G L; Morrison, A R

    1998-06-01

    Whether damage to the central nucleus of the amygdala (Ace) contributes to the predatorylike attack sometimes observed in rapid eye movement sleep without atonia (REM-A), created in cats by bilateral pontine lesions, was examined. Such lesions eliminate REM sleep skeletal muscle atonia and release elaborate behavior. Unilateral damage to the Ace alone increased affective defensive aggressive behavior toward humans and conspecifics without altering predatory behavior in wakefulness. Pontine lesions added at loci normally not leading to aggression induced predatorylike attacks in REM-A as well as the waking affective defense. Alterations of autonomic activity, the absence of relevant environmental stimuli in REM-A, or both may explain the state-related differences.

  1. Evaluating the damage process of dynamic target by high-energy laser in ocean environment

    NASA Astrophysics Data System (ADS)

    Wang, Jing; Ye, Demao

    2013-12-01

    The high-energy laser, as one of directed energy weapon, is famous for its unique advantage of speed-of-light response which was considered as an ideal weapon against anti-ship missile. This paper commits to evaluate the damage process of missile by high-energy laser weapon. We analyze the propagation properties which are susceptible to atmospheric attenuation effects, atmospheric turbulence effects, thermal blooming effects in sky-sea atmosphere firstly. Then because laser weapons attack one target at a time and it takes several seconds at a minimum for the target engaged, a model of calculating the required t ime for damaging the attack target was built . In the end effective evaluation methods of hot-ablated and high-energy laser weapon's damaging effectiveness are made, when the body or the optical elements of the missile is irradiated by the concatenation wave laser weapon. And one of the issues just as laser power, propagation distance is changed; the model can make different evaluation. The above model can provide the theoretical basis for the high-energy laser weapon intercept anti-ship missile and tactic deraign rationality for naval ship-borne laser weapons.

  2. Tuberculosis

    MedlinePlus

    Tuberculosis (TB) is a disease caused by bacteria called Mycobacterium tuberculosis. The bacteria usually attack the lungs, but they can also damage other parts of the body. TB spreads through the air when a person with ...

  3. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  4. Does topological information matter for power grid vulnerability?

    PubMed

    Ouyang, Min; Yang, Kun

    2014-12-01

    Power grids, which are playing an important role in supporting the economy of a region as well as the life of its citizens, could be attacked by terrorists or enemies to damage the region. Depending on different levels of power grid information collected by the terrorists, their attack strategies might be different. This paper groups power grid information into four levels: no information, purely topological information (PTI), topological information with generator and load nodes (GLNI), and full information (including component physical properties and flow parameters information), and then identifies possible attack strategies for each information level. Analyzing and comparing power grid vulnerability under these attack strategies from both terrorists' and utility companies' point of view give rise to an approach to quantify the relative values of these three types of information, including PTI, GLNI, and component parameter information (CPI). This approach can provide information regarding the extent to which topological information matters for power system vulnerability decisions. Taking several test systems as examples, results show that for small attacks with p ≤ 0.1, CPI matters the most; when taking attack cost into consideration and assuming that the terrorists take the optimum cost-efficient attack intensity, then CPI has the largest cost-based information value.

  5. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    PubMed Central

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-01

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies. PMID:28098846

  6. Does topological information matter for power grid vulnerability?

    NASA Astrophysics Data System (ADS)

    Ouyang, Min; Yang, Kun

    2014-12-01

    Power grids, which are playing an important role in supporting the economy of a region as well as the life of its citizens, could be attacked by terrorists or enemies to damage the region. Depending on different levels of power grid information collected by the terrorists, their attack strategies might be different. This paper groups power grid information into four levels: no information, purely topological information (PTI), topological information with generator and load nodes (GLNI), and full information (including component physical properties and flow parameters information), and then identifies possible attack strategies for each information level. Analyzing and comparing power grid vulnerability under these attack strategies from both terrorists' and utility companies' point of view give rise to an approach to quantify the relative values of these three types of information, including PTI, GLNI, and component parameter information (CPI). This approach can provide information regarding the extent to which topological information matters for power system vulnerability decisions. Taking several test systems as examples, results show that for small attacks with p ≤ 0.1, CPI matters the most; when taking attack cost into consideration and assuming that the terrorists take the optimum cost-efficient attack intensity, then CPI has the largest cost-based information value.

  7. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.

    PubMed

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-15

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  8. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    NASA Astrophysics Data System (ADS)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  9. Interval forecasting of cyber-attacks on industrial control systems

    NASA Astrophysics Data System (ADS)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  10. Armor in Battle

    DTIC Science & Technology

    1986-03-01

    Singling 2-59 808th TD Battalion: After-Action Report 2-88 Friendly Fire 2-92 Troyes - An Armored Attack 2-96 A Tank Platoon in Tunisia 2-106 L Calculated...damage as they did. 2-95 AF TROYE - ANAARIORED ATTACK BY BRIGADIEZR GENERAL ARTHUR L. WEST, JR. COLONEL MOSBY P. MILLER ... GNPERAL WOOD came in to...23 August. CCA, 4th Armored Division, coimnanded by Colonel Bruce C. Clarke, received orders on 24 August to seize Troyes , France, and secure

  11. The War Against Trucks Aerial Interdiction in Southern Laos 1968-1972

    DTIC Science & Technology

    2005-01-01

    History and its successors.) Capt. William A. Buckingham , Jr., USAF, an intelligence specialist in Southeast Asia during the Vietnam War, unearthed a... Buckingham , Mr. Carl Berger, Mr. Van Staaveren, Dr. Wayne W. Thompson, Dr. Elizabeth H. Hartsook, Mr. Lawrence J. Paszek, Mr. Eugene P. viii The War against...attacks (top); the hard-hit Cholon area of Saigon (center); the Imperial Palace in Hue, damaged during the 1968 Tet attacks (bottom). 77 Khe Sanh

  12. Nightfall and the Cloud: Examining the Future of Unmanned Combat Aerial Vehicles and Remotely Piloted Aircraft

    DTIC Science & Technology

    2015-10-01

    likely outcomes and make decisions; however, that is a fundamentally different dy- namic than a true learning process. Preprogrammed assumptions and design ...ISR, targeting, forward air control, laser designation , weapons delivery, battle damage assessment ISR, targeting acquisition, and attack...KTAS 400 KTAS Weapons Payload N/A N/A 2 Hellfire missiles 4 Hellfire missiles 14 Hellfire or 4 Hellfire and 2x GBU -12 or 2 Joint Direct Attack

  13. Passive detection and localization of fatigue cracking in aluminum plates using Green's function reconstruction from ambient noise.

    PubMed

    Yang, Yang; Xiao, Li; Qu, Wenzhong; Lu, Ye

    2017-11-01

    Recent theoretical and experimental studies have demonstrated that a local Green's function can be retrieved from the cross-correlation of ambient noise field. This technique can be used to detect fatigue cracking in metallic structures, owing to the fact that the presence of crack can lead to a change in Green's function. This paper presents a method of structural fatigue cracking characterization method by measuring Green's function reconstruction from noise excitation and verifies the feasibility of crack detection in poor noise source distribution. Fatigue cracks usually generate nonlinear effects, in which different wave amplitudes and frequency compositions can cause different nonlinear responses. This study also undertakes analysis of the capacity of the proposed approach to identify fatigue cracking under different noise amplitudes and frequency ranges. Experimental investigations of an aluminum plate are conducted to assess the cross-correlations of received noise between sensor pairs and finally to detect the introduced fatigue crack. A damage index is proposed according to the variation between cross-correlations obtained from the pristine crack closed state and the crack opening-closure state when sufficient noise amplitude is used to generate nonlinearity. A probability distribution map of damage is calculated based on damage indices. The fatigue crack introduced in the aluminum plate is successfully identified and oriented, verifying that a fatigue crack can be detected by reconstructing Green's functions from an imperfect diffuse field in which ambient noise sources exist locally. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Coptoborus ochromactonus, n. sp. (Coleoptera: Curculionidae: Scolytinae), an emerging pest of cultivated balsa (Malvales: Malvaceae) in Ecuador.

    PubMed

    Stilwell, Abby R; Smith, Sarah M; Cognato, Anthony I; Martinez, Malena; Flowers, R Wills

    2014-04-01

    A new species of xyleborine ambrosia beetle has been found to attack balsa, Ochroma pyramidale (Cavanilles ex Lamarck) Urban, in Ecuador. Coptoborus ochromactonus Smith & Cognato is described and its biology is reported. Large-scale surveys were conducted between 2006 and 2009, and observational studies were carried out between 2010 and 2013 in Ecuadorian commercial plantations to determine life history and host preference characteristics. C. ochromactonus attacked balsa between 1.5 and 3 yr in age. Successful attacks were more prevalent in smaller diameter trees and unhealthy trees. In general, attacks and beetle-caused mortality were more prevalent during the dry summer months when trees were under more moisture and light stress. Fungal mycelia were consistently observed coating beetle galleries and are likely the true damaging agent to balsa trees.

  15. Network information attacks on the control systems of power facilities belonging to the critical infrastructure

    NASA Astrophysics Data System (ADS)

    Loginov, E. L.; Raikov, A. N.

    2015-04-01

    The most large-scale accidents occurred as a consequence of network information attacks on the control systems of power facilities belonging to the United States' critical infrastructure are analyzed in the context of possibilities available in modern decision support systems. Trends in the development of technologies for inflicting damage to smart grids are formulated. A volume matrix of parameters characterizing attacks on facilities is constructed. A model describing the performance of a critical infrastructure's control system after an attack is developed. The recently adopted measures and legislation acts aimed at achieving more efficient protection of critical infrastructure are considered. Approaches to cognitive modeling and networked expertise of intricate situations for supporting the decision-making process, and to setting up a system of indicators for anticipatory monitoring of critical infrastructure are proposed.

  16. Fasting-induced intestinal damage is mediated by oxidative and inflammatory responses.

    PubMed

    Abdeen, S; Mathew, T C; Khan, I; Dashti, H; Asfar, S

    2009-05-01

    Green tea has been shown to repair fasting-induced mucosal damage in rat intestine. The aim of this study was to elucidate the underlying mechanism. Five groups of rats were used. Group 1 had free access to chow diet and water, and those in group 2 were fasted for 3 days. Animals in group 3 were fasted for 3 days, then were allowed drinking water for a further 7 days. Groups 4 and 5 were fasted for 3 days, then given drinking water containing green tea or vitamin E respectively for 7 days. Blood was collected for estimation of total plasma antioxidants, and jejunal samples were used for immunohistochemical analysis of superoxide dismutase (SOD), catalase and glutathione peroxidase (GPx), and for estimation of myeloperoxidase (MPO) activity. Use of green tea was associated with a significant increase in total plasma antioxidants (P < 0.001), and mucosal SOD (P < 0.001), catalase (P = 0.006) and GPx (P = 0.017), but a significant decrease in MPO activity (P < 0.001). Vitamin E produced similar changes, but the effects were smaller. Green tea reverses the fasting-induced damage to the intestinal mucosa by its antioxidant and anti-inflammatory effect. 2009 British Journal of Surgery Society Ltd. Published by John Wiley & Sons, Ltd.

  17. Adalimumab Injection

    MedlinePlus

    ... causes pain, swelling, and damage) including the following: rheumatoid arthritis (a condition in which the body attacks its ... If you are using adalimumab injection to treat rheumatoid arthritis, your doctor may tell you to inject the ...

  18. Multiple Sclerosis

    MedlinePlus

    Multiple sclerosis (MS) is a nervous system disease that affects your brain and spinal cord. It damages the ... attacks healthy cells in your body by mistake. Multiple sclerosis affects women more than men. It often begins ...

  19. Anabolic Steroids: MedlinePlus Health Topic

    MedlinePlus

    ... Voice deepening and growth of facial hair in women High blood pressure Heart problems, including heart attack Liver disease, including cancer Kidney damage Aggressive behavior NIH: National Institute on Drug Abuse Diagnosis ...

  20. Abatacept Injection

    MedlinePlus

    ... with daily activities, and joint damage caused by rheumatoid arthritis (a condition in which the body attacks its ... that fight infection). People who have had severe rheumatoid arthritis for a long time may have a greater ...

  1. Golimumab Injection

    MedlinePlus

    ... body and causes pain, swelling, and damage) including: rheumatoid arthritis (condition in which the body attacks its own ... doctor.If golimumab injection is used to treat rheumatoid arthritis, it may also be injected intravenously (into a ...

  2. Green Chile Pepper Harvest Mechanization

    USDA-ARS?s Scientific Manuscript database

    Pungent green chile (genus /Capsicum/, also spelled chili) is a large, fragile fruit growing on berry shrubs. Chile is harvested by hand to maximize yields and minimize fruit damage. Labor for hand harvesting chile is increasingly costly and difficult to obtain. Harvest mechanization is viewed as...

  3. Effect of fluorescent pseudomonades and Trichoderma sp. and their combination with two chemicals on Penicillium digitatum caused agent of citrus green mold.

    PubMed

    Zamani, M; Tehrani, A Sharifi; Ahmadzadeh, M; Abadi, A Alizadeh Ali

    2006-01-01

    Citrus green mold (Penicillium digitatum) causes economic losses. Chemical fungicides such as imazalil provide the primary means for controlling green mold decay of citrus fruits. Continuous use of fungicides has faced two major obstacles- increasing public concern regarding contamination of perishables with fungicidal residues, and proliferation of resistance in the pathogen populations. The aim of this research was to determine if the attacks of green mold on orange could be reduced by usage of biocontrol agent alone or in combination with low dosage of imazalil or sodium bicarbonate. Pseudomonas fluorescens isolate PN, P. fluorescens isolate PS and Trichoderma virens isolate TE were evaluated as potential biological agents for control of green mold of oranges caused by P. digitatum. Increasing concentration of SB decreased spore germination of P. digitatum. In laboratory tests, a cell suspension (10(8) cells per ml.) of bacterial strains reduced the incidence of green mold. On fruits surface biocontrol activity of antagonistic isolates was significantly increased when combined with low dosage of imazalil (500ppm) or sodium carbonate (5%). Effect of Trichoderma virens on controlling P. digitatum was better than others with or without these chemicals.

  4. Critical Infrastructure Protection: EMP Impacts on the U.S. Electric Grid

    NASA Astrophysics Data System (ADS)

    Boston, Edwin J., Jr.

    The purpose of this research is to identify the United States electric grid infrastructure systems vulnerabilities to electromagnetic pulse attacks and the cyber-based impacts of those vulnerabilities to the electric grid. Additionally, the research identifies multiple defensive strategies designed to harden the electric grid against electromagnetic pulse attack that include prevention, mitigation and recovery postures. Research results confirm the importance of the electric grid to the United States critical infrastructures system and that an electromagnetic pulse attack against the electric grid could result in electric grid degradation, critical infrastructure(s) damage and the potential for societal collapse. The conclusions of this research indicate that while an electromagnetic pulse attack against the United States electric grid could have catastrophic impacts on American society, there are currently many defensive strategies under consideration designed to prevent, mitigate and or recover from an electromagnetic pulse attack. However, additional research is essential to further identify future target hardening opportunities, efficient implementation strategies and funding resources.

  5. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    NASA Astrophysics Data System (ADS)

    Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.

  6. Singapore's Aarden City Construction and Green Building Development

    NASA Astrophysics Data System (ADS)

    Xiong, Chenhui; Chen, Jian

    2018-05-01

    The government of Singapore has a high demand for city construction planning always adhere to the implementation of "garden city " theory. Singapore’s government has been following the "sustainable" of Singapore's requirement and fully embodies the "green building" and "environmental protection"concept. To set the ecological construction and protection of water resources as the total target, minimize damage to the environment of economic development, make Singapore a pioneer "green building". In recent years, the Chinese government is promoting green building but harvest little, in this case, for the development of "green building", China can draw lessons from Singapore's experience.

  7. The maize lipoxygenase, ZmLOX10, mediates green leaf volatile, jasmonate, and herbivore-induced plant volatile production for defense against insect attack

    USDA-ARS?s Scientific Manuscript database

    Fatty acid derivatives are of central importance for plant immunity against insect herbivores. However, major regulatory genes and the signals that modulate these defense metabolites are vastly understudied, especially in important agro-economic monocot species. Here we show that products and sign...

  8. Emerald ash borer (Agrilus planipennis): Towards a classification of tree health and early detection

    Treesearch

    Matthew P. Peters; Louis R. Iverson; T. Davis Sydnor

    2009-01-01

    Forty-five green ash (Fraxinus pennsylvanica) street trees in Toledo, Ohio were photographed, measured, and visually rated for conditions related to emerald ash borer (Agrilus planipennis) (EAB) attacks. These trees were later removed, and sections were examined from each tree to determine the length of time that growth rates had...

  9. Assessing the Associations Between Types of Green Space, Physical Activity, and Health Indicators Using GIS and Participatory Survey

    NASA Astrophysics Data System (ADS)

    Akpinar, A.

    2017-11-01

    This study explores whether specific types of green spaces (i.e. urban green spaces, forests, agricultural lands, rangelands, and wetlands) are associated with physical activity, quality of life, and cardiovascular disease prevalence. A sample of 8,976 respondents from the Behavioral Risk Factor Surveillance System, conducted in 2006 in Washington State across 291 zip-codes, was analyzed. Measures included physical activity status, quality of life, and cardiovascular disease prevalence (i.e. heart attack, angina, and stroke). Percentage of green spaces was derived from the National Land Cover Dataset and measured with Geographical Information System. Multilevel regression analyses were conducted to analyze the data while controlling for age, sex, race, weight, marital status, occupation, income, education level, and zip-code population and socio-economic situation. Regression results reveal that no green space types were associated with physical activity, quality of life, and cardiovascular disease prevalence. On the other hand, the analysis shows that physical activity was associated with general health, quality of life, and cardiovascular disease prevalence. The findings suggest that other factors such as size, structure and distribution (sprawled or concentrated, large or small), quality, and characteristics of green space might be important in general health, quality of life, and cardiovascular disease prevalence rather than green space types. Therefore, further investigations are needed.

  10. Health Benefits of Green Public Housing: Associations With Asthma Morbidity and Building-Related Symptoms.

    PubMed

    Colton, Meryl D; Laurent, Jose Guillermo Cedeno; MacNaughton, Piers; Kane, John; Bennett-Fripp, Mae; Spengler, John; Adamkiewicz, Gary

    2015-12-01

    We examined associations of several health outcomes with green and conventional low-income housing, where the prevalence of morbidities and environmental pollutants is elevated. We used questionnaires and a visual inspection to compare sick building syndrome (SBS) symptoms and asthma-related morbidity among residents in multifamily units in Boston, Massachusetts, between March 2012 and May 2013. Follow-up was approximately 1 year later. Adults living in green units reported 1.35 (95% confidence interval [CI] = 0.66, 2.05) fewer SBS symptoms than those living in conventional (control) homes (P < .001). Furthermore, asthmatic children living in green homes experienced substantially lower risk of asthma symptoms (odds ratio [OR] = 0.34; 95% CI = 0.12, 1.00), asthma attacks (OR = 0.31; 95% CI = 0.11, 0.88), hospital visits (OR = 0.24; 95% CI = 0.06, 0.88), and asthma-related school absences (OR = 0.21; 95% CI = 0.06, 0.74) than children living in conventional public housing. Participants living in green homes had improved health outcomes, which remained consistent over the study period. Green housing may provide a significant value in resource-poor settings where green construction or renovation could simultaneously reduce harmful indoor exposures, promote resident health, and reduce operational costs.

  11. Ethanol injection of ornamental trees facilitates testing insecticide efficacy against ambrosia beetles (Coleoptera: Curculionidae: Scolytinae).

    PubMed

    Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Ranger, Christopher M; Youssef, Nadeer N

    2013-02-01

    Exotic ambrosia beetles are damaging pests in ornamental tree nurseries in North America. The species Xylosandrus crassiusculus (Motshulsky) and Xylosandrus germanus (Blandford) are especially problematic. Management of these pests relies on preventive treatments of insecticides. However, field tests of recommended materials on nursery trees have been limited because of unreliable attacks by ambrosia beetles on experimental trees. Ethanol-injection of trees was used to induce colonization by ambrosia beetles to evaluate insecticides and botanical formulations for preventing attacks by ambrosia beetles. Experiments were conducted in Ohio, Tennessee, and Virginia. Experimental trees injected with ethanol had more attacks by ambrosia beetles than uninjected control trees in all but one experiment. Xylosandrus crassiusculus and X. germanus colonized trees injected with ethanol. In most experiments, attack rates declined 8 d after ethanol-injection. Ethanol-injection induced sufficient pressure from ambrosia beetles to evaluate the efficacy of insecticides for preventing attacks. Trunk sprays of permethrin suppressed cumulative total attacks by ambrosia beetles in most tests. Trunk sprays of the botanical formulations Armorex and Veggie Pharm suppressed cumulative total attacks in Ohio. Armorex, Armorex + Permethrin, and Veggie Pharm + Permethrin suppressed attacks in Tennessee. The bifenthrin product Onyx suppressed establishment of X. germanus in one Ohio experiment, and cumulative total ambrosia beetle attacks in Virginia. Substrate drenches and trunk sprays of neonicotinoids, or trunk sprays of anthranilic diamides or tolfenpyrad were not effective. Ethanol-injection is effective for inducing attacks and ensuring pressure by ambrosia beetles for testing insecticide efficacy on ornamental trees.

  12. Cyberdeterrence and Cyberwar

    DTIC Science & Technology

    2009-01-01

    introduce subtle but vehicle-damaging changes to the chemical mix in the gasoline. Battle damage prediction is critical in establishing deterrence at all...the emotional resonance of the sort engen - dered by bloody terrorist attacks. If the target system is private (which it would practically have to be...secondary deterrence are the successful dissuasion of Nazi Germany and, half a century later, Saddam’s Iraq from using chemical weapons. Strategic

  13. TiO2 photocatalysis causes DNA damage via fenton reaction-generated hydroxyl radicals during the recovery period.

    PubMed

    Gogniat, Gaëtan; Dukan, Sam

    2007-12-01

    Here, we show that resistance of Escherichia coli to TiO2 photocatalysis involves defenses against reactive oxygen species. Results support the idea that TiO2 photocatalysis generates damage which later becomes deleterious during recovery. We found this to be partly due to DNA attack via hydroxyl radicals generated by the Fenton reaction during recovery.

  14. CORROSION PROCESS IN REINFORCED CONCRETE IDENTIFIED BY ACOUSTIC EMISSION

    NASA Astrophysics Data System (ADS)

    Kawasaki, Yuma; Kitaura, Misuzu; Tomoda, Yuichi; Ohtsu, Masayasu

    Deterioration of Reinforced Concrete (RC) due to salt attack is known as one of serious problems. Thus, development of non-destructive evaluation (NDE) techniques is important to assess the corrosion process. Reinforcement in concrete normally does not corrode because of a passive film on the surface of reinforcement. When chloride concentration at reinfo rcement exceeds the threshold level, the passive film is destroyed. Thus maintenance is desirable at an early stage. In this study, to identify the onset of corrosion and the nucleation of corrosion-induced cracking in concrete due to expansion of corrosion products, continuous acoustic emission (AE) monitoring is applied. Accelerated corrosion and cyclic wet and dry tests are performed in a laboratory. The SiGMA (Simplified Green's functions for Moment tensor Analysis) proce dure is applied to AE waveforms to clarify source kinematics of micro-cracks locations, types and orientations. Results show that the onset of corrosion and the nu cleation of corrosion-induced cracking in concrete are successfully identified. Additionally, cross-sections inside the reinforcement are observed by a scanning electron microscope (SEM). From these results, a great promise for AE techniques to monitor salt damage at an early stage in RC structures is demonstrated.

  15. TSARINA: A Computer Model for Assessing Conventional and Chemical Attacks on Airbases

    DTIC Science & Technology

    1990-09-01

    IV, and has been updated to FORTRAN 77; it has been adapted to various computer systems, as was the widely used AIDA model and the previous versions of...conventional and chemical attacks on sortie generation. In the first version of TSARINA [1 2], several key additions were made to the AIDA model so that (1...various on-base resources, in addition to the estimates of hits and facility damage that are generated by the original AIDA model . The second version

  16. The Population Ecology of a Rare and Endangered Plant Species, ’Cirsium rhothophilum’ on Vandenberg AFB, California.

    DTIC Science & Technology

    1979-11-01

    always been operative--physical stress, sand burial, insect attack. The artichoke plume moth causes extensive damage to seeds and leaves, but this most...dunes. I - -. - * 24 C. rhothophilum is conspicuously susceptible to a number of insects, but the most destructive appears to be the artichoke plume... artichoke plume moth is widespread and feeds on a number of species of thistles. It attacks the leaves, buds, and flowering heads of C. rhothophilum. Adult

  17. Nuclear terrorism - Threat or not?

    NASA Astrophysics Data System (ADS)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  18. Are the unken reflex and the aposematic colouration of Red-Bellied Toads efficient against bird predation?

    PubMed Central

    Caorsi, Valentina Zaffaroni; Colombo, Patrick; Abadie, Michelle; Brack, Ismael Verrastro; Dasoler, Bibiana Terra; Borges-Martins, Márcio

    2018-01-01

    Aposematic signals as well as body behaviours may be important anti-predator defences. Species of the genus Melanophryniscus are characterised by having toxic lipophilic alkaloids in the skin and for presenting a red ventral colouration, which can be observed when they perform the behaviour called the unken reflex. Both the reflex behaviour and the colouration pattern are described as defence mechanisms. However, there are currently no studies testing their effectiveness against predators. This study aimed to test experimentally if both ventral conspicuous colouration and the unken reflex in Melanophryniscus cambaraensis function as aposematic signals against visually oriented predators (birds). We simulated the species studied using three different clay toad models as follows: (a) in a normal position with green coloured bodies, (b) in the unken reflex position with green coloured body and extremities and (c) in the unken reflex position with a green body and red extremities. Models were distributed on a known M. cambaraensis breeding site and in the adjacent forest. More than half of the attacks on the models were from birds; however, there was no preference for any model type. Thus, just the presence of the red colour associated with the motionless unken reflex position does not seem to prevent attacks from potential predators. It is possible that the effective aposematic signal in Melanophryniscus is achieved through the unken reflex movement together with the subsequent exhibition of the warning colouration and the secretion of toxins. PMID:29596437

  19. Compound mechanism of fatal neck injury: A case report of a tiger attack in a zoo.

    PubMed

    Szleszkowski, Łukasz; Thannhäuser, Agata; Jurek, Tomasz

    2017-08-01

    Fatal injuries caused by attacks by large wild cats are extremely rare in forensic medical practice in Europe. There are very few cases described in the forensic medical literature concerning incidents in zoos similar to the tiger attack on a 58-year-old male zoo employee that we present here. While preparing a runway for tigers, the man was attacked by a male Sumatran tiger. Another zoo employee was an eyewitness to the accident; in his testimony he described the sequence of events in detail. The autopsy showed the injuries typical of a tiger attack: traces of claws and canine teeth indicating that the victim of the attack was knocked down from behind, along with deep and extensive fatal wounds to the neck. The injuries were inflicted by means of a compound mechanism: tissues were penetrated by the animal's canines, crushed with great force (transfixing injury), and violently distended. The skin revealed four characteristic deep wounds caused by canines as well as bite marks resulting from the action of six incisors. The neck area revealed extensive damage, including torn muscles, the esophagus and trachea, large blood vessels of the neck, and fractures of vertebrae C2 and C5 with internal channels resulting directly from penetration by the animal's canines. The mechanism of distension, as a result of the animal jerking its head after biting the victim in the neck, produced a complete tear of the spine and the vertebral arteries, as well as an intramural rupture of the carotid arteries which has never been described before. In the interests of a detailed assessment of bone damage, the cervical spine was macerated. The applied autopsy techniques and detailed analysis of injuries enabled us to demonstrate the compound mechanism that inflicted them, combining penetration of tissues by the canines, crushing, and distension. Copyright © 2017. Published by Elsevier B.V.

  20. Strike Fast, Strike Hard: The Red-Throated Caracara Exploits Absconding Behavior of Social Wasps during Nest Predation

    PubMed Central

    McCann, Sean; Moeri, Onour; Jones, Tanya; Scott, Catherine; Khaskin, Grigori; Gries, Regine; O'Donnell, Sean; Gries, Gerhard

    2013-01-01

    Red-throated Caracaras Ibycter americanus (Falconidae) are specialist predators of social wasps in the Neotropics. It had been proposed that these caracaras possess chemical repellents that allow them to take the brood of wasp nests without being attacked by worker wasps. To determine how caracaras exploit nests of social wasps and whether chemical repellents facilitate predation, we: (1) video recorded the birds attacking wasp nests; (2) analyzed surface extracts of the birds' faces, feet, and feathers for potential chemical repellents; and (3) inflicted mechanical damage on wasp nests to determine the defensive behavior of wasps in response to varying levels of disturbance. During caracara predation events, two species of large-bodied wasps mounted stinging attacks on caracaras, whereas three smaller-bodied wasp species did not. The “hit-and-run” predation tactic of caracaras when they attacked nests of large and aggressive wasps reduced the risk of getting stung. Our data reveal that the predation strategy of caracaras is based on mechanical disturbance of, and damage to, target wasp nests. Caracara attacks and severe experimental disturbance of nests invariably caused wasps to abscond (abandon their nests). Two compounds in caracara foot extracts [sulcatone and iridodial] elicited electrophysiological responses from wasp antennae, and were also present in defensive secretions of sympatric arboreal-nesting Azteca ants. These compounds appear not to be wasp repellents but to be acquired coincidentally by caracaras when they perch on trees inhabited with Azteca ants. We conclude that caracara predation success does not depend on wasp repellents but relies on the absconding response that is typical of swarm-founding polistine wasps. Our study highlights the potential importance of vertebrate predators in the ecology and evolution of social wasps. PMID:24386338

  1. Strike fast, strike hard: the red-throated caracara exploits absconding behavior of social wasps during nest predation.

    PubMed

    McCann, Sean; Moeri, Onour; Jones, Tanya; Scott, Catherine; Khaskin, Grigori; Gries, Regine; O'Donnell, Sean; Gries, Gerhard

    2013-01-01

    Red-throated Caracaras Ibycter americanus (Falconidae) are specialist predators of social wasps in the Neotropics. It had been proposed that these caracaras possess chemical repellents that allow them to take the brood of wasp nests without being attacked by worker wasps. To determine how caracaras exploit nests of social wasps and whether chemical repellents facilitate predation, we: (1) video recorded the birds attacking wasp nests; (2) analyzed surface extracts of the birds' faces, feet, and feathers for potential chemical repellents; and (3) inflicted mechanical damage on wasp nests to determine the defensive behavior of wasps in response to varying levels of disturbance. During caracara predation events, two species of large-bodied wasps mounted stinging attacks on caracaras, whereas three smaller-bodied wasp species did not. The "hit-and-run" predation tactic of caracaras when they attacked nests of large and aggressive wasps reduced the risk of getting stung. Our data reveal that the predation strategy of caracaras is based on mechanical disturbance of, and damage to, target wasp nests. Caracara attacks and severe experimental disturbance of nests invariably caused wasps to abscond (abandon their nests). Two compounds in caracara foot extracts [sulcatone and iridodial] elicited electrophysiological responses from wasp antennae, and were also present in defensive secretions of sympatric arboreal-nesting Azteca ants. These compounds appear not to be wasp repellents but to be acquired coincidentally by caracaras when they perch on trees inhabited with Azteca ants. We conclude that caracara predation success does not depend on wasp repellents but relies on the absconding response that is typical of swarm-founding polistine wasps. Our study highlights the potential importance of vertebrate predators in the ecology and evolution of social wasps.

  2. Systematic approach to in-depth understanding of photoelectrocatalytic bacterial inactivation mechanisms by tracking the decomposed building blocks.

    PubMed

    Sun, Hongwei; Li, Guiying; Nie, Xin; Shi, Huixian; Wong, Po-Keung; Zhao, Huijun; An, Taicheng

    2014-08-19

    A systematic approach was developed to understand, in-depth, the mechanisms involved during the inactivation of bacterial cells using photoelectrocatalytic (PEC) processes with Escherichia coli K-12 as the model microorganism. The bacterial cells were found to be inactivated and decomposed primarily due to attack from photogenerated H2O2. Extracellular reactive oxygen species (ROSs), such as H2O2, may penetrate into the bacterial cell and cause dramatically elevated intracellular ROSs levels, which would overwhelm the antioxidative capacity of bacterial protective enzymes such as superoxide dismutase and catalase. The activities of these two enzymes were found to decrease due to the ROSs attacks during PEC inactivation. Bacterial cell wall damage was then observed, including loss of cell membrane integrity and increased permeability, followed by the decomposition of cell envelope (demonstrated by scanning electronic microscope images). One of the bacterial building blocks, protein, was found to be oxidatively damaged due to the ROSs attacks, as well. Leakage of cytoplasm and biomolecules (bacterial building blocks such as proteins and nucleic acids) were evident during prolonged PEC inactivation process. The leaked cytoplasmic substances and cell debris could be further degraded and, ultimately, mineralized with prolonged PEC treatment.

  3. A Radiation Chemistry Code Based on the Greens Functions of the Diffusion Equation

    NASA Technical Reports Server (NTRS)

    Plante, Ianik; Wu, Honglu

    2014-01-01

    Ionizing radiation produces several radiolytic species such as.OH, e-aq, and H. when interacting with biological matter. Following their creation, radiolytic species diffuse and chemically react with biological molecules such as DNA. Despite years of research, many questions on the DNA damage by ionizing radiation remains, notably on the indirect effect, i.e. the damage resulting from the reactions of the radiolytic species with DNA. To simulate DNA damage by ionizing radiation, we are developing a step-by-step radiation chemistry code that is based on the Green's functions of the diffusion equation (GFDE), which is able to follow the trajectories of all particles and their reactions with time. In the recent years, simulations based on the GFDE have been used extensively in biochemistry, notably to simulate biochemical networks in time and space and are often used as the "gold standard" to validate diffusion-reaction theories. The exact GFDE for partially diffusion-controlled reactions is difficult to use because of its complex form. Therefore, the radial Green's function, which is much simpler, is often used. Hence, much effort has been devoted to the sampling of the radial Green's functions, for which we have developed a sampling algorithm This algorithm only yields the inter-particle distance vector length after a time step; the sampling of the deviation angle of the inter-particle vector is not taken into consideration. In this work, we show that the radial distribution is predicted by the exact radial Green's function. We also use a technique developed by Clifford et al. to generate the inter-particle vector deviation angles, knowing the inter-particle vector length before and after a time step. The results are compared with those predicted by the exact GFDE and by the analytical angular functions for free diffusion. This first step in the creation of the radiation chemistry code should help the understanding of the contribution of the indirect effect in the formation of DNA damage and double-strand breaks.

  4. Creation of backdoors in quantum communications via laser damage

    NASA Astrophysics Data System (ADS)

    Makarov, Vadim; Bourgoin, Jean-Philippe; Chaiwongkhot, Poompong; Gagné, Mathieu; Jennewein, Thomas; Kaiser, Sarah; Kashyap, Raman; Legré, Matthieu; Minshull, Carter; Sajeed, Shihan

    2016-09-01

    Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behavior on demand. We test it on two practical QC systems for key distribution and coin tossing, and show that newly created deviations lead to side channels. This reveals that laser damage is a potential security risk to existing QC systems, and necessitates their testing to guarantee security.

  5. Normobaric hyperoxia markedly reduces brain damage and sensorimotor deficits following brief focal ischaemia.

    PubMed

    Ejaz, Sohail; Emmrich, Julius V; Sitnikov, Sergey L; Hong, Young T; Sawiak, Stephen J; Fryer, Tim D; Aigbirhio, Franklin I; Williamson, David J; Baron, Jean-Claude

    2016-03-01

    'True' transient ischaemic attacks are characterized not only clinically, but also radiologically by a lack of corresponding changes on magnetic resonance imaging. During a transient ischaemic attack it is assumed that the affected tissue is penumbral but rescued by early spontaneous reperfusion. There is, however, evidence from rodent studies that even brief focal ischaemia not resulting in tissue infarction can cause extensive selective neuronal loss associated with long-lasting sensorimotor impairment but normal magnetic resonance imaging. Selective neuronal loss might therefore contribute to the increasingly recognized cognitive impairment occurring in patients with transient ischaemic attacks. It is therefore relevant to consider treatments to reduce brain damage occurring with transient ischaemic attacks. As penumbral neurons are threatened by markedly constrained oxygen delivery, improving the latter by increasing arterial O2 content would seem logical. Despite only small increases in arterial O2 content, normobaric oxygen therapy experimentally induces significant increases in penumbral O2 pressure and by such may maintain the penumbra alive until reperfusion. Nevertheless, the effects of normobaric oxygen therapy on infarct volume in rodent models have been conflicting, although duration of occlusion appeared an important factor. Likewise, in the single randomized trial published to date, early-administered normobaric oxygen therapy had no significant effect on clinical outcome despite reduced diffusion-weighted imaging lesion growth during therapy. Here we tested the hypothesis that normobaric oxygen therapy prevents both selective neuronal loss and sensorimotor deficits in a rodent model mimicking true transient ischaemic attack. Normobaric oxygen therapy was applied from the onset and until completion of 15 min distal middle cerebral artery occlusion in spontaneously hypertensive rats, a strain representative of the transient ischaemic attack-prone population. Whereas normoxic controls showed normal magnetic resonance imaging but extensive cortical selective neuronal loss associated with microglial activation (present both at Day 14 in vivo and at Day 28 post-mortem) and marked and long-lasting sensorimotor deficits, normobaric oxygen therapy completely prevented sensorimotor deficit (P < 0.02) and near-completely Day 28 selective neuronal loss (P < 0.005). Microglial activation was substantially reduced at Day 14 and completely prevented at Day 28 (P = 0.002). Our findings document that normobaric oxygen therapy administered during ischaemia nearly completely prevents the neuronal death, microglial inflammation and sensorimotor impairment that characterize this rodent true transient ischaemic attack model. Taken together with the available literature, normobaric oxygen therapy appears a promising therapy for short-lasting ischaemia, and is attractive clinically as it could be started at home in at-risk patients or in the ambulance in subjects suspected of transient ischaemic attack/early stroke. It may also be a straightforward adjunct to reperfusion therapies, and help prevent subtle brain damage potentially contributing to long-term cognitive and sensorimotor impairment in at-risk populations. © The Author (2016). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  6. Using natural dietary sources of antioxidants to protect against ultraviolet and visible radiation-induced DNA damage: an investigation of human green tea ingestion.

    PubMed

    Malhomme de la Roche, Helena; Seagrove, Susan; Mehta, Anisha; Divekar, Preshita; Campbell, Sandra; Curnow, Alison

    2010-11-03

    Oral ingestion of green tea is a potent dietary source of antioxidant polyphenols. These compounds are of interest as they may be able to provide additional protection to the body to help prevent the deleterious effects of ultraviolet A and visible radiation (UVA/VIS) produced indirectly via reactive oxygen species (ROS) in sunlight exposed skin. A small clinical study was conducted in ten healthy adult volunteers. Samples of whole blood were obtained from each before and 30, 60 and 90 min following ingestion of three breakfast cups of green tea (540 ml in total) prepared in a standardised manner. Peripheral leucocytes were isolated from each blood sample and exposed to increasing periods of UVA/VIS irradiation in the laboratory (0, 9, 12 or 18 min). Alkaline single cell gel electrophoresis (the comet assay) was then conducted to determine the level of DNA damage in each sample from each individual. The findings support those of our previous pilot study and indicate that drinking green tea did significantly reduce the genotoxic effects observed in peripheral blood cells 60 min following ingestion when artificially exposed to 12 min of UVA/VIS irradiation in the laboratory. It is postulated that this protection is afforded by the polyphenol compounds (known to be contained within green tea) via scavenging or quenching of the damaging ROS induced by this form of light exposure. Further investigation should consider whether this dietary-induced protection could be extended to cells of the skin. Copyright © 2010 Elsevier B.V. All rights reserved.

  7. Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism.

    PubMed

    Mazicioglu, Dogucan; Merrick, Jason R W

    2018-05-01

    Attacker/defender models have primarily assumed that each decisionmaker optimizes the cost of the damage inflicted and its economic repercussions from their own perspective. Two streams of recent research have sought to extend such models. One stream suggests that it is more realistic to consider attackers with multiple objectives, but this research has not included the adaption of the terrorist with multiple objectives to defender actions. The other stream builds off experimental studies that show that decisionmakers deviate from optimal rational behavior. In this article, we extend attacker/defender models to incorporate multiple objectives that a terrorist might consider in planning an attack. This includes the tradeoffs that a terrorist might consider and their adaption to defender actions. However, we must also consider experimental evidence of deviations from the rationality assumed in the commonly used expected utility model in determining such adaption. Thus, we model the attacker's behavior using multiattribute prospect theory to account for the attacker's multiple objectives and deviations from rationality. We evaluate our approach by considering an attacker with multiple objectives who wishes to smuggle radioactive material into the United States and a defender who has the option to implement a screening process to hinder the attacker. We discuss the problems with implementing such an approach, but argue that research in this area must continue to avoid misrepresenting terrorist behavior in determining optimal defensive actions. © 2017 Society for Risk Analysis.

  8. The frequency and intensity of bark beetle infestations recorded in Romanian forests affected by windfall in 1995

    Treesearch

    V. Mihalciuc; V. Danci; M. Bujila; D. Chira

    2003-01-01

    Research has been carried out during the past six years (1996-2001), to record the occurrence of wind damage in resinous stands and to monitor the evolution of pest infestations during this period. The level of pest attack has become moderate over time and depended on different types of damaged wood material (cut, broken and fallen trees). We also reported about the...

  9. Influence of host age on critical fitness parameters of Spathius galinae (Hymenoptera: Braconidae), a new parasitoid of the emerald ash borer (Coleoptera: Buprestidae).

    PubMed

    Watt, Timothy J; Duan, Jian J

    2014-08-01

    Spathius galinae Belokobylskij and Strazenac (Hymenoptera: Braconidae) is a recently discovered gregarious idiobiont larval ectoparasitoid currently being evaluated for biological control against the invasive emerald ash borer, Agrilus planipennis Fairmaire (Coleoptera: Buprestidae) in the United States. To aid in the development of laboratory rearing protocols, we assessed the influence of various emerald ash borer stages on critical fitness parameters of S. galinae. We exposed gravid S. galinae females to emerald ash borer host larvae of various ages (3.5, 5, 7, and 10 wk post egg oviposition) that were reared naturally in tropical (evergreen) ash (Fraxinus uhdei (Wenzig) Lingelsh) logs, or to field-collected, late-stage emerald ash borers (nonfeeding J-shaped larvae termed "J-larvae," prepupae, and pupae) that were artificially inserted into green ash logs. When exposed to larvae in tropical ash logs, S. galinae attacked 5 and 7 wk hosts more frequently (68-76%) than 3.5 wk (23%) and 10 wk (12%) hosts. Subsample dissections of the these logs revealed that 3.5, 5, 7 and 10 wk host logs contained mostly second, third, fourth, and J-larvae, respectively, that had already bored into the sapwood for diapause. No J-larvae were attacked by S. galinae when naturally reared in tropical ash logs. When parasitized by S. galinae, 7 and 10 wk hosts produced the largest broods (approximately 6.7 offspring per parasitized host), and the progenies that emerged from these logs had larger anatomical measurements and more female-biased sex ratios. When exposed to emerald ash borer J-larvae, prepupae, or pupae artificially inserted into green ash logs, S. galinae attacked 53% ofJ-larvae, but did not attack any prepupae or pupae. We conclude that large (fourth instar) emerald ash borer larvae should be used to rear S. galinae.

  10. Chile stand management for mechanical green chile harvest

    USDA-ARS?s Scientific Manuscript database

    Currently the red chile crop is mechanically harvested. Because the pods will be dehydrated before consumption, breakage and bruising of red pods is not a concern. Green chile, however, is currently hand harvested because of the fragile nature of the fruit and the need to avoid pod damage. Hand h...

  11. Using Greener Gels to Explore Rheology

    ERIC Educational Resources Information Center

    Garrett, Brendan; Matharu, Avtar S.; Hurst, Glenn A.

    2017-01-01

    A laboratory experiment was developed to investigate the rheological properties of a green calcium-cross-linked alginate gel as an alternative to the traditional borax-cross-linked poly(vinyl alcohol) gel. As borax is suspected of damaging fertility and the unborn child, a safe, green alternative is necessary. The rheological properties of a…

  12. Parasitoids select plants more heavily infested with their caterpillar hosts: a new approach to aid interpretation of plant headspace volatiles

    PubMed Central

    Girling, Robbie D.; Stewart-Jones, Alex; Dherbecourt, Julie; Staley, Joanna T.; Wright, Denis J.; Poppy, Guy M.

    2011-01-01

    Plants produce volatile organic compounds (VOCs) in response to herbivore attack, and these VOCs can be used by parasitoids of the herbivore as host location cues. We investigated the behavioural responses of the parasitoid Cotesia vestalis to VOCs from a plant–herbivore complex consisting of cabbage plants (Brassica oleracea) and the parasitoids host caterpillar, Plutella xylostella. A Y-tube olfactometer was used to compare the parasitoids' responses to VOCs produced as a result of different levels of attack by the caterpillar and equivalent levels of mechanical damage. Headspace VOC production by these plant treatments was examined using gas chromatography–mass spectrometry. Cotesia vestalis were able to exploit quantitative and qualitative differences in volatile emissions, from the plant–herbivore complex, produced as a result of different numbers of herbivores feeding. Cotesia vestalis showed a preference for plants with more herbivores and herbivore damage, but did not distinguish between different levels of mechanical damage. Volatile profiles of plants with different levels of herbivores/herbivore damage could also be separated by canonical discriminant analyses. Analyses revealed a number of compounds whose emission increased significantly with herbivore load, and these VOCs may be particularly good indicators of herbivore number, as the parasitoid processes cues from its external environment. PMID:21270031

  13. Does enemy damage vary across the range of exotic plant species? Evidence from two coastal dune plant species in eastern Australia.

    PubMed

    Tabassum, Samiya; Leishman, Michelle R

    2018-02-01

    Release from natural enemies is often cited as a key factor for understanding the success of invasive plant species in novel environments. However, with time invasive species will accumulate native enemies in their invaded range, with factors such as spread distance from the site of introduction, climate and leaf-level traits potentially affecting enemy acquisition rates. However, the influence of such factors is difficult to assess without examining enemy attack across the entire species' range. We tested the significance of factors associated with range expansion (distance from source population and maximum population density), climatic variables (annual temperature and rainfall) and leaf-level traits [specific leaf area (SLA) and foliar nitrogen concentration] in explaining variation in enemy damage across multiple populations of two coastal invasive plants (Gladiolus gueinzii Kunze and Hydrocotyle bonariensis Lam.) along their entire introduced distribution in eastern Australia. We found that for H. bonariensis, amount of foliar damage increased with distance from source population. In contrast, for G. gueinzii, probability and amount of foliar damage decreased with decreasing temperature and increasing rainfall, respectively. Our results show that patterns of enemy attack across species' ranges are complex and cannot be generalised between species or even range edges.

  14. Preliminary evaluation of storax and its constituents: Fungal decay mold and termite resistance

    Treesearch

    S. Nami Kartal; Evren Terzi; Tsuyoshi Yoshimura; Rachel Arango; Carol A. Clausen; Frederick Green III

    2012-01-01

    Essential oils and their derivatives might be one of the promising preserving agents to prevent funga ldecay and termite/insect attack in wood since such compounds have a long history of safe usage as antimicrobial agents in various industries. Considerable research has focused on utilizing bioactive essential oils and wood extractives based on green technologies to...

  15. Cockacoeske, Weroansqua of the Pamunkeys, and Indian Resistance in Seventeenth-Century Virginia

    ERIC Educational Resources Information Center

    Schmidt, Ethan A.

    2012-01-01

    In August 1676 Nathaniel Bacon brought his campaign to "ruin and extirpate all Indians in general" to the Green Dragon Swamp on the upper Pamunkey River. While there, he attacked and massacred nearly fifty Pamunkey Indians, who had been at peace with the government of Virginia for thirty years. Having once formed the backbone of the…

  16. Real-time Attack of LL-37 on Single Bacillus subtilis Cells

    PubMed Central

    Barns, Kenneth J.; Weisshaar, James C.

    2013-01-01

    Time-lapse fluorescence microscopy of single, growing Bacillus subtilis cells with 2-12 s time resolution reveals the mechanisms of antimicrobial peptide (AMP) action on a Gram-positive species with unprecedented detail. For the human cathelicidin LL-37 attacking B. subtilis, the symptoms of antimicrobial stress differ dramatically depending on the bulk AMP concentration. At 2 μM LL-37, the mean single-cell growth rate decreases, but membrane permeabilization does not occur. At 4 μM LL-37, cells abruptly shrink in size at the same time that Sytox Green enters the cytoplasm and stains the nucleoids. We interpret the shrinkage event as loss of turgor pressure (and presumably the membrane potential) due to permeabilization of the membrane. Movies of Sytox Green staining at 0.5 frame/s show that nucleoid staining is initially local, more consistent with pore formation than with global permeabilization models. In a novel “growth recovery” assay, cells are incubated with LL-37 for a variable period and then rinsed with fresh growth medium lacking LL-37. The growth rate attenuation observed at 2 μM LL-37 is a recoverable symptom, while the abrupt cell shrinkage observed at 4 μM LL-37 is not. PMID:23454084

  17. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    PubMed

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. © 2015 Society for Risk Analysis.

  18. A Guide to the Insect Borers, Pruners, and Girdlers of Pecan and Hickory

    Treesearch

    J.D. Solomon; J.A. Payne

    1986-01-01

    The importance, identification, biology and indirect control of insects attacking shoots, branches, trunks, and roots of tress are presented. Damage due to and control of the yellow-bellied sapsucker is discussed.

  19. Metrics for Assessment of Smart Grid Data Integrity Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annarita Giani; Miles McQueen; Russell Bent

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less

  20. Cell Wall Structure of Coccoid Green Algae as an Important Trade-Off Between Biotic Interference Mechanisms and Multidimensional Cell Growth.

    PubMed

    Dunker, Susanne; Wilhelm, Christian

    2018-01-01

    Coccoid green algae can be divided in two groups based on their cell wall structure. One group has a highly chemical resistant cell wall (HR-cell wall) containing algaenan. The other group is more susceptible to chemicals (LR-cell wall - Low resistant cell wall). Algaenan is considered as important molecule to explain cell wall resistance. Interestingly, cell wall types (LR- and HR-cell wall) are not in accordance with the taxonomic classes Chlorophyceae and Trebouxiophyceae, which makes it even more interesting to consider the ecological function. It was already shown that algaenan helps to protect against virus, bacterial and fungal attack, but in this study we show for the first time that green algae with different cell wall properties show different sensitivity against interference competition with the cyanobacterium Microcystis aeruginosa . Based on previous work with co-cultures of M. aeruginosa and two green algae ( Acutodesmus obliquus and Oocystis marssonii ) differing in their cell wall structure, it was shown that M. aeruginosa could impair only the growth of the green algae if they belong to the LR-cell wall type. In this study it was shown that the sensitivity to biotic interference mechanism shows a more general pattern within coccoid green algae species depending on cell wall structure.

  1. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    PubMed Central

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  2. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    PubMed

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  3. Health Benefits of Green Public Housing: Associations With Asthma Morbidity and Building-Related Symptoms

    PubMed Central

    Laurent, Jose Guillermo Cedeno; MacNaughton, Piers; Kane, John; Bennett-Fripp, Mae; Spengler, John; Adamkiewicz, Gary

    2015-01-01

    Objectives. We examined associations of several health outcomes with green and conventional low-income housing, where the prevalence of morbidities and environmental pollutants is elevated. Methods. We used questionnaires and a visual inspection to compare sick building syndrome (SBS) symptoms and asthma-related morbidity among residents in multifamily units in Boston, Massachusetts, between March 2012 and May 2013. Follow-up was approximately 1 year later. Results. Adults living in green units reported 1.35 (95% confidence interval [CI] = 0.66, 2.05) fewer SBS symptoms than those living in conventional (control) homes (P < .001). Furthermore, asthmatic children living in green homes experienced substantially lower risk of asthma symptoms (odds ratio [OR] = 0.34; 95% CI = 0.12, 1.00), asthma attacks (OR = 0.31; 95% CI = 0.11, 0.88), hospital visits (OR = 0.24; 95% CI = 0.06, 0.88), and asthma-related school absences (OR = 0.21; 95% CI = 0.06, 0.74) than children living in conventional public housing. Conclusions. Participants living in green homes had improved health outcomes, which remained consistent over the study period. Green housing may provide a significant value in resource-poor settings where green construction or renovation could simultaneously reduce harmful indoor exposures, promote resident health, and reduce operational costs. PMID:26469661

  4. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.

  5. Antioxidative activity of green tea treated with radical initiator 2, 2'-azobis(2-amidinopropane) dihydrochloride.

    PubMed

    Yokozawa, T; Cho, E J; Hara, Y; Kitani, K

    2000-10-01

    This study investigated the antioxidative activity of green tea extract, and a green tea tannin mixture and its components, under conditions of radical generation using the hydrophilic azo compound, 2,2'-azobis(2-amidinopropane) dihydrochloride (AAPH) to generate peroxyl radicals at a constant and measurable rate in the cultured renal epithelial cell line, LLC-PK(1), which is susceptible to oxidative damage. Treatment with AAPH decreased cell viability and increased the formation of thiobarbituric acid-reactive substances. However, green tea extract, and the tannin mixture and its components, comprising (-)-epigallocatechin 3-O-gallate (EGCg), (-)-gallocatechin 3-O-gallate (GCg), (-)-epicatechin 3-O-gallate (ECg), (-)-epigallocatechin (EGC), (+)-gallocatechin (GC), (-)-epicatechin (EC), and (+)-catechin (C), showed protective activity against AAPH-induced cellular damage. The tannin mixture and its components exhibited higher antioxidative activity than the green tea extract. Furthermore, EGCg and GCg had higher activity than EGC and GC, respectively. In particular, EGCg exerted the most significant cellular protective activity against AAPH. These results indicate that green tea tannin may inhibit cellular loss and lipid peroxidation resulting from the peroxyl radical generated by AAPH, and that the chemical structure of tannin is also involved in the activity, suggesting that the O-dihydroxy structure in the B ring and the galloyl groups are important determinants for radical scavenging and antioxidative potential.

  6. Redox-linked effects of green tea on DNA damage and repair, and influence of microsatellite polymorphism in HMOX-1: results of a human intervention trial.

    PubMed

    Choi, Siu-Wai; Yeung, Vincent T F; Collins, Andrew R; Benzie, Iris F F

    2015-01-01

    Green tea has many reported health benefits, including genoprotective and antioxidant effects, but green tea has pro-oxidant activity in vitro. A tea-induced pro-oxidant shift that triggers cytoprotective adaptations has been postulated, but human data are lacking. We investigated effects on oxidation-induced DNA damage and redox-linked cytoprotective factors, including 8-oxoguanine glycosylase (hOGG1) and heme oxygenase 1 (HMOX-1) in lymphocytes in a randomised, placebo-controlled, cross-over supplementation trial. hOGG1 catalyses the first step in base excision repair; increased HMOX-1 is a sign of cytoprotective response to pro-oxidant change. The influence of microsatellite polymorphisms in the HMOX-1 promoter region was also explored. Higher numbers of GT repeats [GT(n)] in this region reportedly diminish response to pro-oxidant change. Green tea [2 × 150 ml of 1% w/v tea/day (or water as control)] was taken for 12 weeks by 43 Type 2 diabetes subjects {20 with short [S/S; GT(n) < 25] and 23 with long [L/L; GT(n) ≥ 25]}. Fasting venous blood was collected before and after each treatment. The formamidopyrimidine DNA glycosylase-assisted comet assay was used to measure DNA damage in lymphocytes. For measuring hOGG1 activity, we used photo-damaged HeLa cells incubated with lymphocyte extracts from test subjects, in combination with the comet assay. Lymphocyte HMOX-1 and hOGG1 protein concentrations and expression (mRNA) of redox-sensitive genes, including HMOX-1 and hOGG1, were also investigated. Results showed significantly (P < 0.01) lower (~15%) DNA damage, higher (~50%) hOGG1 activity and higher (~40%) HMOX-1 protein concentration after tea. No changes in mRNA expression were seen. Baseline HMOX-1 protein and hOGG1 activity were higher (P < 0.05) in the S/S group, but tea-associated responses were similar in both GT(n) groups. Green tea is clearly associated with lowered DNA damage, increased hOGG1 activity and higher HMOX-1 protein levels. Further study is needed to confirm a cause and effect relationship and to establish if these effects are mediated by post-translational changes in proteins or by increased gene expression. © The Author 2014. Published by Oxford University Press on behalf of the UK Environmental Mutagen Society. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  7. Southern pine beetle in loblolly pine: simulating within stand interactions using the process model SPBLOBTHIN

    Treesearch

    Brian Strom; J. R. Meeker; J. Bishir; James Roberds; X. Wan

    2016-01-01

    Pine stand density is a key determinant of damage resulting from attacks by the southern pine beetle (SPB, Dendroctonus frontalis Zimm.). High-density stands of maturing loblolly pine (Pinus taeda L.) are at high risk for losses to SPB, and reducing stand density is the primary tool available to forest managers for preventing and mitigating damage. Field studies are...

  8. Interfering with DNA Damage Signals: Radiosensitizing Prostate Cancer Using Small Peptides

    DTIC Science & Technology

    2009-05-01

    25-l sample of the supernatant was analyzed for free phosphate in the malachite green assay by dilution with 100 l of a developing solution... malachite green). After incubation for 15 min, the release of phosphate was quantified by measuring the absorbance at 650 nm in a microtiter plate reader

  9. Interfering with DNA Damage Signals: Radiosensitizing Prostate Cancer using Small Peptides

    DTIC Science & Technology

    2007-11-01

    were pelleted, and a 25-l sample of the supernatant was analyzed for free phosphate in the malachite green assay by dilution with 100 l of a...developing solution ( malachite green). After incubation for 15 min, the release of phosphate was quantified by measuring the absorbance at 650 nm in a

  10. Going "Green": Environmental Jobs for Scientists and Engineers

    ERIC Educational Resources Information Center

    Ramey, Alice

    2009-01-01

    Green is often used as a synonym for environmental or ecological, especially as it relates to products and activities aimed at minimizing damage to the planet. Scientists and engineers have long had important roles in the environmental movement. Their expertise is focused on a variety of issues, including increasing energy efficiency, improving…

  11. Risk and Ethical Concerns of Hunting Male Elephant: Behavioural and Physiological Assays of the Remaining Elephants

    PubMed Central

    Burke, Tarryne; Page, Bruce; Van Dyk, Gus; Millspaugh, Josh; Slotow, Rob

    2008-01-01

    Background Hunting of male African elephants may pose ethical and risk concerns, particularly given their status as a charismatic species of high touristic value, yet which are capable of both killing people and damaging infrastructure. Methodology/Principal Findings We quantified the effect of hunts of male elephants on (1) risk of attack or damage (11 hunts), and (2) behavioural (movement dynamics) and physiological (stress hormone metabolite concentrations) responses (4 hunts) in Pilanesberg National Park. For eleven hunts, there were no subsequent attacks on people or infrastructure, and elephants did not break out of the fenced reserve. For three focal hunts, there was an initial flight response by bulls present at the hunting site, but their movements stabilised the day after the hunt event. Animals not present at the hunt (both bulls and herds) did not show movement responses. Physiologically, hunting elephant bulls increased faecal stress hormone levels (corticosterone metabolites) in both those bulls that were present at the hunts (for up to four days post-hunt) and in the broader bull and breeding herd population (for up to one month post-hunt). Conclusions/Significance As all responses were relatively minor, hunting male elephants is ethically acceptable when considering effects on the remaining elephant population; however bulls should be hunted when alone. Hunting is feasible in relatively small enclosed reserves without major risk of attack, damage, or breakout. Physiological stress assays were more effective than behavioural responses in detecting effects of human intervention. Similar studies should evaluate intervention consequences, inform and improve best practice, and should be widely applied by management agencies. PMID:18560517

  12. Resistant starch: a functional food that prevents DNA damage and chemical carcinogenesis.

    PubMed

    Navarro, S D; Mauro, M O; Pesarini, J R; Ogo, F M; Oliveira, R J

    2015-03-06

    Resistant starch is formed from starch and its degradation products and is not digested or absorbed in the intestine; thus, it is characterized as a fiber. Because fiber intake is associated with the prevention of DNA damage and cancer, the potential antigenotoxic, antimutagenic, and anticarcinogenic capabilities of resistant starch from green banana flour were evaluated. Animals were treated with 1,2-dimethylhydrazine and their diet was supplemented with 10% green banana flour according to the following resistant starch protocols: pretreatment, simultaneous treatment, post-treatment, and pre + continuous treatment. The results demonstrated that resistant starch is not genotoxic, mutagenic, or carcinogenic. The results suggest that resistant starch acts through desmutagenesis and bio-antimutagenesis, as well as by reducing aberrant crypt foci, thereby improving disease prognosis. These findings imply that green banana flour has therapeutic properties that should be explored for human dietary applications.

  13. Stop the World from Spinning | NIH MedlinePlus the Magazine

    MedlinePlus

    ... are using a device based on the same technology found in a cochlear implant to stop a Ménière's attack by restoring a stable pattern of electrical activity in the vestibular nerve of the damaged ...

  14. Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling

    DTIC Science & Technology

    2011-03-25

    ASL Creation ............................................................... 68 3.3.4. Evidence Evaluation and EML Creation...90 4.2.3. COA Analysis and ASL Creation ............................................................... 92 4.2.4. Evidence Evaluation and EML ...Evidence Evaluation and EML Creation. .................................................... 70 18. DCBDA Forensic Analysis

  15. A phenology model for Sparganothis fruitworm in Cranberries

    USDA-ARS?s Scientific Manuscript database

    Larvae of Sparganothis sulfureana Clemens, frequently attack cranberries, often resulting in economic damage to the crop. Because temperature dictates insect growth rate, development can be accurately estimated based on daily temperature measurements. To better predict S. sulfureana development acro...

  16. Deportations: Securing America or Running in Circles

    DTIC Science & Technology

    2009-06-01

    not a result of the 9/11 terrorist attacks, but are a long-standing issue that has existed since our nation’s conception . Policies concerning who...between green card holders and nonimmigrant aliens. Nonimmigrant aliens are considered temporary residents such as students , tourists, foreign diplomats...order to accommodate the new restrictions, the number of funded asylum officers increased by 600.28 Student Visas, a major contributor to visa

  17. Do abnormal responses show utilitarian bias?

    PubMed

    Kahane, Guy; Shackel, Nicholas

    2008-03-20

    Neuroscience has recently turned to the study of utilitarian and non-utilitarian moral judgement. Koenigs et al. examine the responses of normal subjects and those with ventromedial-prefrontal-cortex (VMPC) damage to moral scenarios drawn from functional magnetic resonance imaging studies by Greene et al., and claim that patients with VMPC damage have an abnormally "utilitarian" pattern of moral judgement. It is crucial to the claims of Koenigs et al. that the scenarios of Greene et al. pose a conflict between utilitarian consequence and duty: however, many of them do not meet this condition. Because of this methodological problem, it is too early to claim that VMPC patients have a utilitarian bias.

  18. Effects of single dose and regular intake of green tea (Camellia sinensis) on DNA damage, DNA repair, and heme oxygenase-1 expression in a randomized controlled human supplementation study.

    PubMed

    Ho, Cyrus K; Choi, Siu-wai; Siu, Parco M; Benzie, Iris F F

    2014-06-01

    Regular intake of green tea (Camellia sinensis) lowers DNA damage in humans, but molecular mechanisms of genoprotection are not clear. Protection could be via direct antioxidant effects of tea catechins, but, paradoxically, catechins have pro-oxidant activity in vitro, and it is hypothesized that mechanisms relate to redox-sensitive cytoprotective adaptations. We investigated this hypothesis, focusing particularly on effects on the DNA repair enzyme human oxoguanine glycosylase 1 (hOGG1), and heme oxygenase-1, a protein that has antioxidant and anti-inflammatory effects. A randomized, placebo-controlled, human supplementation study of crossover design was performed. Subjects (n = 16) took a single dose (200 mL of 1.5%, w/v) and 7-days of (2 × 200 mL 1%, w/v per day) green tea (with water as control treatment). Lymphocytic DNA damage was ∼30% (p < 0.001) lower at 60 and 120 min after the single dose and in fasting samples collected after 7-day tea supplementation. Lymphocytic hOGG1 activity was higher (p < 0.0001) at 60 and 120 min after tea ingestion. Significant increases (p < 0.0005) were seen in hOGG1 activity and heme oxygenase-1 after 7 days. Results indicate that molecular triggering of redox-sensitive cytoprotective adaptations and posttranslational changes affecting hOGG1 occur in vivo in response to both a single dose and regular intake of green tea, and contribute to the observed genoprotective effects of green tea. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Generalized watermarking attack based on watermark estimation and perceptual remodulation

    NASA Astrophysics Data System (ADS)

    Voloshynovskiy, Sviatoslav V.; Pereira, Shelby; Herrigel, Alexander; Baumgartner, Nazanin; Pun, Thierry

    2000-05-01

    Digital image watermarking has become a popular technique for authentication and copyright protection. For verifying the security and robustness of watermarking algorithms, specific attacks have to be applied to test them. In contrast to the known Stirmark attack, which degrades the quality of the image while destroying the watermark, this paper presents a new approach which is based on the estimation of a watermark and the exploitation of the properties of Human Visual System (HVS). The new attack satisfies two important requirements. First, image quality after the attack as perceived by the HVS is not worse than the quality of the stego image. Secondly, the attack uses all available prior information about the watermark and cover image statistics to perform the best watermark removal or damage. The proposed attack is based on a stochastic formulation of the watermark removal problem, considering the embedded watermark as additive noise with some probability distribution. The attack scheme consists of two main stages: (1) watermark estimation and partial removal by a filtering based on a Maximum a Posteriori (MAP) approach; (2) watermark alteration and hiding through addition of noise to the filtered image, taking into account the statistics of the embedded watermark and exploiting HVS characteristics. Experiments on a number of real world and computer generated images show the high efficiency of the proposed attack against known academic and commercial methods: the watermark is completely destroyed in all tested images without altering the image quality. The approach can be used against watermark embedding schemes that operate either in coordinate domain, or transform domains like Fourier, DCT or wavelet.

  20. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    PubMed

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.

  1. Interaction of Insecticide and Media Moisture on Ambrosia Beetle (Coleoptera: Curculionidae) Attacks on Selected Ornamental Trees.

    PubMed

    Frank, Steven D; Anderson, Amanda L; Ranger, Christopher M

    2017-12-08

    Exotic ambrosia beetles, particularly Xylosandrus crassiusculus (Motschulsky) (Coleoptera: Curculionidae: Scolytinae) and Xylosandrus germanus (Blandford) (Coleoptera: Curculionidae: Scolytinae), are among the most damaging pests of ornamental trees in nurseries. Growers have had few tactics besides insecticide applications to reduce ambrosia beetle attacks but recent research has shown that attacks may be reduced by maintaining media moisture below a 50% threshold thereby reducing flood stress. We compared the efficacy of managing media moisture and insecticide applications for reducing ambrosia beetle attacks on three ornamental tree species in North Carolina. During trials in spring 2013 and 2015, flooded Cornus florida and Cornus kousa were heavily attacked despite sprays with permethrin, but nonflooded C. kousa or C. florida were not attacked. In spring 2015 trials, both nonflooded and flooded Styrax japonicus were heavily attacked regardless of permethrin applications. Although ethanol emissions were not measured, the apparently healthy nonflooded S. japonicus trees may have been exposed to an unknown physiological stress, such as low temperature injury, the previous winter, which predisposed them to beetle attack. However, ethanol levels within host tissues were not measured as part of the current study. X. crassiusculus (75%), Xyloborinus saxesenii Ratzburg (13%), and X. germanus (9%) were the most abundant species collected in ethanol baited traps deployed in 2015, while X. crassiusculus (63%) and X. germanus (36%) were the predominant species reared from attacked trees. Results indicate that managing media moisture levels at or below 50%, and maximizing tree health overall, may provide significant protection against Xylosandrus spp. attacks in flood intolerant tree species. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mittermayr, Florian, E-mail: f.mittermayr@tugraz.at; Baldermann, Andre; Kurta, Christoph

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted frommore » damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L{sup −1} of SO{sub 4} and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L{sup −1} of SO{sub 4} and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as {sup 2}H/H and {sup 18}O/{sup 16}O isotope ratios of H{sub 2}O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wetting–drying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite formation are discussed regarding the development of more sulfate-resistant concrete and concrete structures.« less

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Canavan, G.H.

    This note studies the impact of maximizing the stability index rather than minimizing the first strike cost in choosing offensive missile allocations. It does so in the context of a model in which exchanges between vulnerable missile forces are modeled probabilistically, converted into first and second strike costs through approximations to the value target sets at risk, and the stability index is taken to be their ratio. The value of the allocation that minimizes the first strike cost for both attack preferences are derived analytically. The former recovers results derived earlier. The latter leads to an optimum at unity allocationmore » for which the stability index is determined analytically. For values of the attack preference greater than about unity, maximizing the stability index increases the cost of striking first 10--15%. For smaller values of the attack preference, maximizing the index increases the second strike cost a similar amount. Both are stabilizing, so if both sides could be trusted to target on missiles in order to minimize damage to value and maximize stability, the stability index for vulnerable missiles could be increased by about 15%. However, that would increase the cost to the first striker by about 15%. It is unclear why--having decided to strike--he would do so in a way that would increase damage to himself.« less

  4. The role of ant-tended extrafloral nectaries in the protection and benefit of a Neotropical rainforest tree.

    PubMed

    de la Fuente, Marie Ann S; Marquis, Robert J

    1999-02-01

    One possible function of extrafloral nectaries is to attract insects, particularly ants, which defend plants from herbivores. We determined whether ants visiting saplings of the tree Stryphnodendronmicrostachyum (Leguminosae) provide protection (decreased plant damage due to ant molestation or killing of herbivores) and benefit (increased plant growth and reproduction associated with ant presence) to the plant. We compared ant and herbivore abundance, herbivore damage and growth of ant-visited plants and ant-excluded plants grown in sun and shade microhabitats of a 6-ha plantation in Costa Rica over a 7-month period. Results show that ants provided protection to plants not by reducing herbivore numbers but by molesting herbivores. Ants also reduced the incidence of pathogen attack on leaves. Protection was greater in the shade than in the sun, probably due to lower herbivore attack in the sun. Protection was also variable within sun and shade habitats, and this variability appeared to be related to variable ant visitation. Results also indicate that ant presence benefits the plant: ant-visited plants grew significantly more in height than ant-excluded plants. The cultivation of ants may serve as an important natural biological control in tropical forestry and agroforestry systems, where increased plant density can otherwise lead to increased herbivore attack.

  5. Effects of melatonin injection or green-wavelength LED light on the antioxidant system in goldfish (Carassius auratus) during thermal stress.

    PubMed

    Jung, Seo Jin; Choi, Young Jae; Kim, Na Na; Choi, Ji Yong; Kim, Bong-Seok; Choi, Cheol Young

    2016-05-01

    We tested the mitigating effects of melatonin injections or irradiation from green-wavelength light-emitting diodes (LEDs) on goldfish (Carassius auratus) exposed to thermal stress (high water temperature, 30 °C). The effects of the two treatments were assessed by measuring the expression and activity levels of the antioxidant enzymes, superoxide dismutase and catalase, plasma hydrogen peroxide, lipid hydroperoxide, and lysozyme. In addition, a comet assay was conducted to confirm that high water temperature damaged nuclear DNA. The expression and activity of the antioxidant enzymes, plasma hydrogen peroxide, and lipid hydroperoxide were significantly higher after exposure to high temperature and were significantly lower in fish that received melatonin or LED light than in those that received no mitigating treatment. Plasma lysozyme was significantly lower after exposure to high temperature and was significantly higher after exposure to melatonin or LED light. The comet assay revealed that thermal stress caused a great deal of damage to nuclear DNA; however, treatment with melatonin or green-wavelength LED light prevented a significant portion of this damage from occurring. These results indicate that, although high temperatures induce oxidative stress and reduce immune system strength in goldfish, both melatonin and green-wavelength LED light inhibit oxidative stress and boost the immune system. LED treatment increased the antioxidant and immune system activity more significantly than did melatonin treatment. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. [Incidence and damages inflicted by simuliid flies in the GDR district of Schwerin].

    PubMed

    Gräfner, G; Zimmermann, H; Karge, E; Münch, J; Ribbeck, R; Hiepe, T

    1976-03-01

    Systematic faunal studies in the district Schwerin showed at the present time there are 3 more or less damage-biotopes existing in the districts of Perleberg, Ludwigslust and Parchim; 5 river sources can be considered as potential sources, 5 are temporary and 2 are ephemeral whilst in 3 further areas environmental influences such as effluent impairs the flow of the river and the developmental stages of Simuliidae were not observed.--The following species were found: Boophthora erythrocephala, Wilhelmia salopiensis, Wilhelmia equina, Odagmia ornata, Eusimulium aureum and Eusimulium lundstroemi.--The damage statistics covering the period 1966--1971 showed in the district of Schwerin, due to Simuliid attacks, 38 cattle died, 170 were seriously ill; in 1967 5 horses were seriously ill; in 1971, 3 pigs died and 27 were seriously ill.--The symptoms were manifested by pathological petechiae, scabs and oedema, also by insufficiency of the heart and circulatory system, diminished performance and growth disturbance. In severe cases heart and circulation failure occurred, paresis, coma and death followed.--The real economic significance of the Simuliid attacks rest with its strong and prolonged distrubance in young animals, as well as in pronounced irreparable diminished performance in diseased dairy cattle.

  7. Acoustic detectability of Rhynchophorus cruentatus (Coleoptera: Dryophthoridae)

    USDA-ARS?s Scientific Manuscript database

    The palmetto weevil, Rhynchophorus cruentatus Fabricius, native to Florida, attacks palm trees. Like its economically destructive relatives, R. ferrugineus (Olivier) and R. palmarum L., it feeds internally and often is not detected until irreparable damage occurs. Acoustic methods previously used su...

  8. When Sinuses Attack! (For Kids)

    MedlinePlus

    ... and makes even more mucus. When Good Sinuses Go Bad What about that cold that won't go away? A cold virus can: damage the delicate ... So if you feel well enough, you can go to school or go outside and play. In ...

  9. Natural durability of some woods used in Hawaii...preliminary findings

    Treesearch

    Roger G. Skolmen

    1968-01-01

    Six imported and eight Hawaii-grown species are being tested for their natural resistance to decay and insect attack. Damage to the heartwood has progressed far enough in 4 years to allow comparisons among some of the species.

  10. Homeland defense: looking back, moving forward

    NASA Astrophysics Data System (ADS)

    Quine, Dennis H.

    2002-07-01

    A concern for homeland defense has been with us since the inception of the Republic. However, it has changed in focus and emphasis depending on the nature of the threat we perceived. In the earliest decades the threat was from invasion by a Britain that still did not accept the results of the Revolutionary War. Later the focus shifted to concern about possible attack by ships, and during WW I and WW II, by submarines. With the advent of the intercontinental nuclear-armed bomber in 1950, our focus changed again. When we could be attacked by ballistic missiles after 1960, our concern focused on that threat. Now that we have seen that damaging attacks can be brought to the homeland 'under the radar screen', by terrorist operations, the focus has shifted again. We are now entering an era when we must address potential homeland attacks with weapons of mass destruction (WMD) that may be delivered by a range of means, depending on the source of the attack. In response to this full spectrum of attack modes, the U.S. has implemented a three-stage defense policy that integrates overseas 'offense' and homeland 'defense'. This framework for defense analysis and planning is likely to be with us into the indefinite future.

  11. The system of technical diagnostics of the industrial safety information network

    NASA Astrophysics Data System (ADS)

    Repp, P. V.

    2017-01-01

    This research is devoted to problems of safety of the industrial information network. Basic sub-networks, ensuring reliable operation of the elements of the industrial Automatic Process Control System, were identified. The core tasks of technical diagnostics of industrial information safety were presented. The structure of the technical diagnostics system of the information safety was proposed. It includes two parts: a generator of cyber-attacks and the virtual model of the enterprise information network. The virtual model was obtained by scanning a real enterprise network. A new classification of cyber-attacks was proposed. This classification enables one to design an efficient generator of cyber-attacks sets for testing the virtual modes of the industrial information network. The numerical method of the Monte Carlo (with LPτ - sequences of Sobol), and Markov chain was considered as the design method for the cyber-attacks generation algorithm. The proposed system also includes a diagnostic analyzer, performing expert functions. As an integrative quantitative indicator of the network reliability the stability factor (Kstab) was selected. This factor is determined by the weight of sets of cyber-attacks, identifying the vulnerability of the network. The weight depends on the frequency and complexity of cyber-attacks, the degree of damage, complexity of remediation. The proposed Kstab is an effective integral quantitative measure of the information network reliability.

  12. [Occurrence of Solenopsis saevissima F Smith (Hymenoptera: Formicidae) damaging Schizolobium amazonicum].

    PubMed

    Lunz, Alexandre M; Harada, Ana Y; Aguiar, Tanice da S; Cardoso, Andreza S

    2009-01-01

    Injuries by Solenopsis saevissima F Smith in paricá (Schizolobium amazonicum) trees are described for the first time in Dom Eliseu County, Pará State, Brazil. This ant damages leaves and the shaft where holes and galleries are opened up to the plant shoot. Terminal and new shoots are attacked and destroyed, harming the development of upright and uniform trunks for commercialization. Arboreal nests constructed by this ant were also observed in some plants.

  13. Logging damage to residual trees following partial cutting in a green ash-sugarberry stand in the Mississippi Delta

    Treesearch

    James S. Meadows

    1993-01-01

    Partial cutting in bottomland hardwoods to control stand density and species composition sometimes results in logging damage to the lower bole and/or roots of residual trees. If severe, logging damage may lead to a decline in tree vigor, which may subsequently stimulate the production of epicormic branches, causing a decrease in bole quality and an eventual loss in...

  14. Logging Damage to Residual Trees Following Partial Cutting in a Green Ash-Sugarberry Stand in the Mississippi Delta

    Treesearch

    James S. Meadows

    1993-01-01

    Partial cutting in bottomland hardwoods to control stand density and species composition sometimes results in logging damage to the lower bole and/or roots of residual trees. If severe, logging damage may lead to a decline in tree vigor, which may subsequently stimulate the production of epicormic branches, causing a decrease in bole quality and an eventual loss in...

  15. A Green's Function Approach to Simulate DNA Damage by the Indirect Effect

    NASA Technical Reports Server (NTRS)

    Plante, Ianik; Cicinotta, Francis A.

    2013-01-01

    The DNA damage is of fundamental importance in the understanding of the effects of ionizing radiation. DNA is damaged by the direct effect of radiation (e.g. direct ionization) and by indirect effect (e.g. damage by.OH radicals created by the radiolysis of water). Despite years of research, many questions on the DNA damage by ionizing radiation remains. In the recent years, the Green's functions of the diffusion equation (GFDE) have been used extensively in biochemistry [1], notably to simulate biochemical networks in time and space [2]. In our future work on DNA damage, we wish to use an approach based on the GFDE to refine existing models on the indirect effect of ionizing radiation on DNA. To do so, we will use the code RITRACKS [3] developed at the NASA Johnson Space Center to simulate the radiation track structure and calculate the position of radiolytic species after irradiation. We have also recently developed an efficient Monte-Carlo sampling algorithm for the GFDE of reversible reactions with an intermediate state [4], which can be modified and adapted to simulate DNA damage by free radicals. To do so, we will use the known reaction rate constants between radicals (OH, eaq, H,...) and the DNA bases, sugars and phosphates and use the sampling algorithms to simulate the diffusion of free radicals and chemical reactions with DNA. These techniques should help the understanding of the contribution of the indirect effect in the formation of DNA damage and double-strand breaks.

  16. Subsonic Ultra Green Aircraft Research: Phase II- Volume III-Truss Braced Wing Aeroelastic Test Report

    NASA Technical Reports Server (NTRS)

    Bradley, Marty K.; Allen, Timothy J.; Droney, Christopher

    2014-01-01

    This Test Report summarizes the Truss Braced Wing (TBW) Aeroelastic Test (Task 3.1) work accomplished by the Boeing Subsonic Ultra Green Aircraft Research (SUGAR) team, which includes the time period of February 2012 through June 2014. The team consisted of Boeing Research and Technology, Boeing Commercial Airplanes, Virginia Tech, and NextGen Aeronautics. The model was fabricated by NextGen Aeronautics and designed to meet dynamically scaled requirements from the sized full scale TBW FEM. The test of the dynamically scaled SUGAR TBW half model was broken up into open loop testing in December 2013 and closed loop testing from January 2014 to April 2014. Results showed the flutter mechanism to primarily be a coalescence of 2nd bending mode and 1st torsion mode around 10 Hz, as predicted by analysis. Results also showed significant change in flutter speed as angle of attack was varied. This nonlinear behavior can be explained by including preload and large displacement changes to the structural stiffness and mass matrices in the flutter analysis. Control laws derived from both test system ID and FEM19 state space models were successful in suppressing flutter. The control laws were robust and suppressed flutter for a variety of Mach, dynamic pressures, and angle of attacks investigated.

  17. Piezo impedance sensors to monitor degradation of biological structure

    NASA Astrophysics Data System (ADS)

    Annamdas, Kiran Kishore Kumar; Annamdas, Venu Gopal Madhav

    2010-04-01

    In some countries it is common to have wooden structures in their homes, especially Japan. However, metals and its alloys are the most widely used engineering materials in construction of any military or civil structure. Re-visiting natural disasters like the recent Haiti earthquake (12 Jan 2010) or Katrina (cyclones) reminds the necessity to have better housing infrastructure with robust monitoring systems. Traditionally wood (green material) was accepted as excellent rehabilitation material, after any disaster. In recent times, the recycling materials extracted from inorganic, biodegradable wastes are converted into blocks or sheets, and are also used to assist public in rehabilitation camps. The key issue which decreases the life of these rehabilitated structure including green materials (like wood) is unnecessary degradation or deterioration over time due to insect or acid attack or rain/ice fall. The recycling material also needs monitoring to protect them against acid or rain/ice attacks. Thus, a few health monitoring techniques have emerged in the recent past. Electromechanical Impedance technique is one such technique, which is simple but robust to detect variations in the integrity of structures. In this paper, impedance based piezoceramic sensor was bonded on wooden sample, which was subjected to degradation in presence of acids. Variations in mass of plank are studied.

  18. ASCORBIC ACID IS DECREASED IN INDUCED SPUTUM OF MILD ASTHMATICS

    EPA Science Inventory

    Asthma is primarily an airways inflammatory disease, and the bronchial airways have been shown to be particularly susceptible to oxidant-induced tissue damage. The antioxidant ascorbic acid (AA) plays an essential role in defending against oxidant attack in the airways. Decreased...

  19. Temperature-mediated development thresholds of Sparganothis sulfureana (Lepidoptera: Tortricidae) in cranberries

    USDA-ARS?s Scientific Manuscript database

    Larvae of Sparganothis sulfureana Clemens, frequently attack cranberries, often resulting in economic damage to the crop. Because temperature dictates insect growth rate, development can be accurately estimated based on daily temperature measurements. To better predict S. sulfureana development acro...

  20. The Neuroprotective Effects of Brazilian Green Propolis on Neurodegenerative Damage in Human Neuronal SH-SY5Y Cells

    PubMed Central

    Ni, Junjun; Meng, Jie; Zhu, Aiqin; Zhong, Xin; Wu, Shizheng; Nakanishi, Hiroshi

    2017-01-01

    Oxidative stress and synapse dysfunction are the major neurodegenerative damage correlated to cognitive impairment in Alzheimer's disease (AD). We have found that Brazilian green propolis (propolis) improves the cognitive functions of mild cognitive impairment patients living at high altitude; however, mechanism underlying the effects of propolis is unknown. In the present study, we investigated the effects of propolis on oxidative stress, expression of brain-derived neurotrophic factor (BDNF), and activity-regulated cytoskeleton-associated protein (Arc), the critical factors of synapse efficacy, using human neuroblastoma SH-SY5Y cells. Pretreatment with propolis significantly ameliorated the hydrogen peroxide- (H2O2-) induced cytotoxicity in SH-SY5Y cells. Furthermore, propolis significantly reduced the H2O2-generated reactive oxygen species (ROS) derived from mitochondria and 8-oxo-2′-deoxyguanosine (8-oxo-dG, the DNA oxidative damage marker) but significantly reversed the fibrillar β-amyloid and IL-1β-impaired BDNF-induced Arc expression in SH-SY5Y cells. Furthermore, propolis significantly upregulated BDNF mRNA expression in time- and dose-dependent manners. In addition, propolis induced Arc mRNA and protein expression via phosphoinositide-3 kinase (PI3K). These observations strongly suggest that propolis protects from the neurodegenerative damage in neurons through the properties of various antioxidants. The present study provides a potential molecular mechanism of Brazilian green propolis in prevention of cognitive impairment in AD as well as aging. PMID:28265338

  1. The Neuroprotective Effects of Brazilian Green Propolis on Neurodegenerative Damage in Human Neuronal SH-SY5Y Cells.

    PubMed

    Ni, Junjun; Wu, Zhou; Meng, Jie; Zhu, Aiqin; Zhong, Xin; Wu, Shizheng; Nakanishi, Hiroshi

    2017-01-01

    Oxidative stress and synapse dysfunction are the major neurodegenerative damage correlated to cognitive impairment in Alzheimer's disease (AD). We have found that Brazilian green propolis (propolis) improves the cognitive functions of mild cognitive impairment patients living at high altitude; however, mechanism underlying the effects of propolis is unknown. In the present study, we investigated the effects of propolis on oxidative stress, expression of brain-derived neurotrophic factor (BDNF), and activity-regulated cytoskeleton-associated protein (Arc), the critical factors of synapse efficacy, using human neuroblastoma SH-SY5Y cells. Pretreatment with propolis significantly ameliorated the hydrogen peroxide- (H 2 O 2 -) induced cytotoxicity in SH-SY5Y cells. Furthermore, propolis significantly reduced the H 2 O 2 -generated reactive oxygen species (ROS) derived from mitochondria and 8-oxo-2'-deoxyguanosine (8-oxo-dG, the DNA oxidative damage marker) but significantly reversed the fibrillar β -amyloid and IL-1 β -impaired BDNF-induced Arc expression in SH-SY5Y cells. Furthermore, propolis significantly upregulated BDNF mRNA expression in time- and dose-dependent manners. In addition, propolis induced Arc mRNA and protein expression via phosphoinositide-3 kinase (PI3K). These observations strongly suggest that propolis protects from the neurodegenerative damage in neurons through the properties of various antioxidants. The present study provides a potential molecular mechanism of Brazilian green propolis in prevention of cognitive impairment in AD as well as aging.

  2. Evaluation of antifungal activity of carbonate and bicarbonate salts alone or in combination with biocontrol agents in control of citrus green mold.

    PubMed

    Zamani, M; Sharifi Tehrani, A; Ali Abadi, A Alizadeh

    2007-01-01

    The aim of this research was to determine if the attacks of green mold on orange could be reduced by edible salts alone or in combination with biocontrol agent. For this purpose toxicity to Pantoea digitatum and practical use of sodium carbonate (SC), sodium bicarbonate (SBC) and potassium carbonate, and potassium bicarbonate alone or in combination with antagonistic bacteria (Pseudomonas fluorescens isolate PN, Bacillus subtilis isolate VHN, Pantoea agglomerans isolate CA) to control green mold were determined. All were fungistatic. SC and SBC were equal and superior to the other salts for control of green mold on oranges inoculated 6h before treatment and were chosen for subsequent trails under cold storage conditions. The biocontrol agents were found completely tolerant to 3% sodium bicarbonate and sodium carbonate at room temperature; although their culturability was reduced by > 1000-fold after 60 min in 1% other salt solutions. Satisfactory results were also obtained with the combined treatment for control of green mold. A significant increase in biocontrol activity of all isolate was observed when combined with sodium carbonate and sodium bicarbonate. The treatments comprising CA combined with SB was as effective as fungicide treatment. Thus, use of sodium bicarbonate treatment at 3% followed by the antagonist P. agglomerans CA could be an alternative to chemical fungicides for control of green mold on oranges.

  3. Coffee Berry Borer Joins Bark Beetles in Coffee Klatch

    PubMed Central

    Jaramillo, Juliana; Torto, Baldwyn; Mwenda, Dickson; Troeger, Armin; Borgemeister, Christian; Poehling, Hans-Michael; Francke, Wittko

    2013-01-01

    Unanswered key questions in bark beetle-plant interactions concern host finding in species attacking angiosperms in tropical zones and whether management strategies based on chemical signaling used for their conifer-attacking temperate relatives may also be applied in the tropics. We hypothesized that there should be a common link in chemical signaling mediating host location by these Scolytids. Using laboratory behavioral assays and chemical analysis we demonstrate that the yellow-orange exocarp stage of coffee berries, which attracts the coffee berry borer, releases relatively high amounts of volatiles including conophthorin, chalcogran, frontalin and sulcatone that are typically associated with Scolytinae chemical ecology. The green stage of the berry produces a much less complex bouquet containing small amounts of conophthorin but no other compounds known as bark beetle semiochemicals. In behavioral assays, the coffee berry borer was attracted to the spiroacetals conophthorin and chalcogran, but avoided the monoterpenes verbenone and α-pinene, demonstrating that, as in their conifer-attacking relatives in temperate zones, the use of host and non-host volatiles is also critical in host finding by tropical species. We speculate that microorganisms formed a common basis for the establishment of crucial chemical signals comprising inter- and intraspecific communication systems in both temperate- and tropical-occurring bark beetles attacking gymnosperms and angiosperms. PMID:24073204

  4. Coffee berry borer joins bark beetles in coffee klatch.

    PubMed

    Jaramillo, Juliana; Torto, Baldwyn; Mwenda, Dickson; Troeger, Armin; Borgemeister, Christian; Poehling, Hans-Michael; Francke, Wittko

    2013-01-01

    Unanswered key questions in bark beetle-plant interactions concern host finding in species attacking angiosperms in tropical zones and whether management strategies based on chemical signaling used for their conifer-attacking temperate relatives may also be applied in the tropics. We hypothesized that there should be a common link in chemical signaling mediating host location by these Scolytids. Using laboratory behavioral assays and chemical analysis we demonstrate that the yellow-orange exocarp stage of coffee berries, which attracts the coffee berry borer, releases relatively high amounts of volatiles including conophthorin, chalcogran, frontalin and sulcatone that are typically associated with Scolytinae chemical ecology. The green stage of the berry produces a much less complex bouquet containing small amounts of conophthorin but no other compounds known as bark beetle semiochemicals. In behavioral assays, the coffee berry borer was attracted to the spiroacetals conophthorin and chalcogran, but avoided the monoterpenes verbenone and α-pinene, demonstrating that, as in their conifer-attacking relatives in temperate zones, the use of host and non-host volatiles is also critical in host finding by tropical species. We speculate that microorganisms formed a common basis for the establishment of crucial chemical signals comprising inter- and intraspecific communication systems in both temperate- and tropical-occurring bark beetles attacking gymnosperms and angiosperms.

  5. Present status of Maconellicoccus hirsutus (Hemiptera: Pseudococcidae) in the Mariana Islands and its control by two fortuitously introduced natural enemies.

    PubMed

    Reddy, G V P; Muniappan, R; Cruz, Z T; Naz, F; Bamba, J P; Tenorio, J

    2009-08-01

    The mealybug Maconellicoccus hirsutus (Green) (Hemiptera: Pseudococcidae), attacks ornamental and fruit crops in the Mariana Islands. Insecticides cannot penetrate the heavy layers of wax that protect the insect's body. We surveyed the mealybug's locally recruited natural enemies and their effects on its population on Guam, Rota, Saipan, and Tinian to assess the need for introduction of exotic natural enemies. We monitored population densities of M. hirsutus, those of its natural enemies, and parasitism rates for 3 yr, 2005-2007. Our surveys revealed the presence of two parasitoids, Anagyrus kamali Moursi (Hymenoptera: Encyrtidae) and Allotropa sp. near mecrida (Walker) (Hymenoptera: Platygastridae), fortuitously introduced to the Mariana Islands with M. hirsutus. The predator Cryptolaemus montrouzieri Mulsant (Coleoptera: Coccinellidae) also was often found feeding on M. hirsutus. Population density of M. hirsutus was below the economic threshold at all locations. Rainfall seemed to affect mean numbers of M. hirsutus and mean numbers of eggs at some locations. On all four islands, the two parasitoids, complemented by the predator, were effectively controlling the M. hirsutus population. No evidence of hyperparasitism was recorded. Currently, economic damage by M. hirsutus is not a concern in the Mariana Islands, and additional parasitoids need not be introduced to control M. hirsutus.

  6. Oxidation Microstructure Studies of Reinforced Carbon/Carbon

    NASA Technical Reports Server (NTRS)

    Jacobson, Nathan S.; Curry, Donald M.

    2006-01-01

    Laboratory oxidation studies of reinforced carbon/carbon (RCC) are discussed with particular emphasis on the resulting microstructures. This study involves laboratory furnace (500-1500 C deg) and arc-jet exposures (1538 C deg) on various forms of RCC. RCC without oxidation protection oxidized at 800 and 1100 C deg exhibits pointed and reduced diameter fibers, due to preferential attack along the fiber edges. RCC with a SiC conversion coating exhibits limited attack of the carbon substrate at 500, 700 and 1500 C deg. However samples oxidized at 900, 1100, and 1300 C deg show small oxidation cavities at the SiC/carbon interface below through-thickness cracks in the SiC coating. These cavities have rough edges with denuded fibers and can be easily distinguished from cavities created in processing. Arc-jet tests at 1538 C deg show limited oxidation attack when the SiC coating and glass sealants are intact. When the SiC/sealant protection system is damaged, attack is extensive and proceeds through matrix cracks, creating denuded fibers on the edges of the cracks. Even at 1538 C deg, where diffusion control dominates, attack is non-uniform with fiber edges oxidizing in preference to the bulk fiber and matrix.

  7. Robustness of weighted networks

    NASA Astrophysics Data System (ADS)

    Bellingeri, Michele; Cassi, Davide

    2018-01-01

    Complex network response to node loss is a central question in different fields of network science because node failure can cause the fragmentation of the network, thus compromising the system functioning. Previous studies considered binary networks where the intensity (weight) of the links is not accounted for, i.e. a link is either present or absent. However, in real-world networks the weights of connections, and thus their importance for network functioning, can be widely different. Here, we analyzed the response of real-world and model networks to node loss accounting for link intensity and the weighted structure of the network. We used both classic binary node properties and network functioning measure, introduced a weighted rank for node importance (node strength), and used a measure for network functioning that accounts for the weight of the links (weighted efficiency). We find that: (i) the efficiency of the attack strategies changed using binary or weighted network functioning measures, both for real-world or model networks; (ii) in some cases, removing nodes according to weighted rank produced the highest damage when functioning was measured by the weighted efficiency; (iii) adopting weighted measure for the network damage changed the efficacy of the attack strategy with respect the binary analyses. Our results show that if the weighted structure of complex networks is not taken into account, this may produce misleading models to forecast the system response to node failure, i.e. consider binary links may not unveil the real damage induced in the system. Last, once weighted measures are introduced, in order to discover the best attack strategy, it is important to analyze the network response to node loss using nodes rank accounting the intensity of the links to the node.

  8. Ceramic regenerator systems development program

    NASA Technical Reports Server (NTRS)

    Cook, J. A.; Fucinari, C. A.; Lingscheit, J. N.; Rahnke, C. J.; Rao, V. D.

    1978-01-01

    Ceramic regenerator cores are considered that can be used in passenger car gas turbine engines, Stirling engines, and industrial/truck gas turbine engines. Improved materials and design concepts aimed at reducing or eliminating chemical attack were placed on durability tests/in industrial gas turbine engines. A regenerator core made from aluminum silicate shows minimal evidence of chemical attack damage after 7804 hours of engine test at 800 C and another showed little distress after 4983 hours at 982 C. The results obtained in ceramic material screening tests, aerothermodynamic performance tests, stress analysis, cost studies, and material specifications are also included.

  9. Clinical features of 27 shark attack cases on La Réunion Island.

    PubMed

    Ballas, Richard; Saetta, Ghislain; Peuchot, Charline; Elkienbaum, Philippe; Poinsot, Emmanuelle

    2017-05-01

    Between January 2000 and September 2016, there have been 27 documented shark attacks on La Réunion Island. The insular nature of La Réunion has allowed us to perform an extensive survey of these attacks. The objective was to describe the clinical features of these shark attacks, as only case reports have been published up to now. This was a retrospective observational study of the 27 cases of nonprovoked shark attacks that have occurred between January 2000 and September 2016. Post-humate predation, provoked attacks, and isolated attack on devices were excluded. All bone and vascular injuries were documented in the 21 remaining cases. Prehospital tourniquet use was specifically recorded. Among the 21 victims, eight died (38%) despite rapid use of resuscitation techniques in five cases when it was feasible; these techniques were not needed in the survivors. Thirteen patients were immediately treated in the operating room. Amputation or disarticulation occurred 13 times in 10 victims, five of whom died. Twelve injuries to major vascular structures were found in 11 victims, six of which died. A prehospital tourniquet was applied in four of the five surviving victims who had injuries to major vascular structures (including one victim with major humeral and femoral artery damage) and in one victim who died (the very proximal wound was not controlled). Our study found that quickly applying a tourniquet to the injured limb(s) contributes to the victim's survival. Disarticulation is a particular feature of shark attacks. The number and severity of shark attacks at La Réunion Island are worse than in the rest of the world. Epidemiological, level V.

  10. Developing a Media Moisture Threshold for Nurseries to Reduce Tree Stress and Ambrosia Beetle Attacks.

    PubMed

    Frank, Steven D; Ranger, Christopher M

    2016-08-01

    Exotic ambrosia beetles are among the most damaging pests of trees grown in nurseries. The primary pests Xylosandrus crassiusculus Motschulsky and Xylosandrus germanus Blandford use ethanol to locate vulnerable trees. Research, primarily with X. germanus, has shown that flood-stressed trees emit ethanol and are preferentially attacked by ambrosia beetles. Our goal was to develop a media (also called potting soil) moisture threshold as an integrated pest management (IPM) tactic and assess grower practices that lead to ambrosia beetle attacks. Flooded Cornus florida L., Cornus kousa Burg., and Magnolia grandiflora L. trees incurred more attacks than unflooded trees that were not attacked. To determine optimal media moisture levels, we grew flood-tolerant Acer rubrum L. and flood-intolerant C. florida in containers with 10, 30, 50, 70, or 90% media moisture. No flooded or unflooded A. rubrum were attacked. However, C. florida grown in 70 or 90% moisture were attacked and died, whereas trees at 30 and 50% moisture were not attacked. Thus, we suggest an upper moisture threshold of 50% when growing C. florida and other flood-intolerant trees. However, during peak ambrosia beetle flight activity in spring 2013 and 2014, we found that media moisture levels in commercial nurseries were often between 50 and 90%. Implementing a media moisture threshold, as a new IPM tool, could reduce ambrosia beetle attacks and the need for insecticide applications, which is currently the only available management tactic. Future research should focus on how changes in substrates, irrigation, and other practices could help growers meet this threshold. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  11. Repair of Oxidative DNA Damage in Saccharomyces cerevisiae.

    PubMed

    Chalissery, Jisha; Jalal, Deena; Al-Natour, Zeina; Hassan, Ahmed H

    2017-03-01

    Malfunction of enzymes that detoxify reactive oxygen species leads to oxidative attack on biomolecules including DNA and consequently activates various DNA repair pathways. The nature of DNA damage and the cell cycle stage at which DNA damage occurs determine the appropriate repair pathway to rectify the damage. Oxidized DNA bases are primarily repaired by base excision repair and nucleotide incision repair. Nucleotide excision repair acts on lesions that distort DNA helix, mismatch repair on mispaired bases, and homologous recombination and non-homologous end joining on double stranded breaks. Post-replication repair that overcomes replication blocks caused by DNA damage also plays a crucial role in protecting the cell from the deleterious effects of oxidative DNA damage. Mitochondrial DNA is also prone to oxidative damage and is efficiently repaired by the cellular DNA repair machinery. In this review, we discuss the DNA repair pathways in relation to the nature of oxidative DNA damage in Saccharomyces cerevisiae. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. [Spinal cord injury due to penetrating missiles].

    PubMed

    Ohry, Avi

    2003-10-01

    Gunshot wound of the spine is a major cause of spinal cord injury among US civilian population, members of the military armed conflict personnel, or civilians injured in terrorists attacks. The bullet fragments cause damage to the spinal cord even without penetrating the spinal canal. Concussive effects, heat, fractures or vascular injury may cause the neurological damage. Unfortunately, bullet or shrapnel removal or laminectomy do not change the prognosis. In this article we review the historical background, the Israeli experience, ballistic-forensic considerations, complications, treatment and prognosis.

  13. Aircraft Battle Damage Repair for the 90’s and Beyond

    DTIC Science & Technology

    1994-03-01

    far greater than was the US system during the Viet - nam Conflict. In fact, the United States mounted a large-scale resupply effort to assirt the...8217,luded. The procedures restore suffi. ciezu strength to accomplish the required mnission while avoidilig unnecessar-y or cosmetic repairs. The ABDR...from a mission with structural damage. 4 As the war escalated in 1964, the Viet Cong began their attack on US Air Force bases and during the course of

  14. Seasonal Population Dynamics of Three Potato Pests in Washington State.

    PubMed

    D'Auria, Elizabeth M; Wohleb, Carrie H; Waters, Timothy D; Crowder, David W

    2016-08-01

    Pest phenology models allow producers to anticipate pest outbreaks and deploy integrated pest management (IPM) strategies. Phenology models are particularly useful for cropping systems with multiple economically damaging pests throughout a season. Potato (Solanum tuberosum L.) crops of Washington State, USA, are attacked by many insect pests including the potato tuberworm (Phthorimaea operculella Zeller), the beet leafhopper (Circulifer tenellus Baker), and the green peach aphid (Myzus persicae Sulzer). Each of these pests directly damages potato foliage or tubers; C. tenellus and M. persicae also transmit pathogens that can drastically reduce potato yields. We monitored the seasonal population dynamics of these pests by conducting weekly sampling on a network of commercial farms from 2007 to 2014. Using these data, we developed phenology models to characterize the seasonal population dynamics of each pest based on accumulated degree-days (DD). All three pests exhibited consistent population dynamics across seasons that were mediated by temperature. Of the three pests, C. tenellus was generally the first detected in potato crops, with 90% of adults captured by 936 DD. In contrast, populations of P. operculella and M. persicae built up more slowly over the course of the season, with 90% cumulative catch by 1,590 and 2,634 DD, respectively. Understanding these seasonal patterns could help potato producers plan their IPM strategies while allowing them to move away from calendar-based applications of insecticides. More broadly, our results show how long-term monitoring studies that explore dynamics of multiple pest species can aid in developing IPM strategies in crop systems. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  15. Herbivore-induced maize leaf volatiles affect attraction and feeding behavior of Spodoptera littoralis caterpillars

    PubMed Central

    von Mérey, Georg E.; Veyrat, Nathalie; D'Alessandro, Marco; Turlings, Ted C. J.

    2013-01-01

    Plants under herbivore attack emit volatile organic compounds (VOCs) that can serve as foraging cues for natural enemies. Adult females of Lepidoptera, when foraging for host plants to deposit eggs, are commonly repelled by herbivore-induced VOCs, probably to avoid competition and natural enemies. Their larval stages, on the other hand, have been shown to be attracted to inducible VOCs. We speculate that this contradicting behavior of lepidopteran larvae is due to a need to quickly find a new suitable host plant if they have fallen to the ground. However, once they are on a plant they might avoid the sites with fresh damage to limit competition and risk of cannibalism by conspecifics, as well as exposure to natural enemies. To test this we studied the effect of herbivore-induced VOCs on the attraction of larvae of the moth Spodoptera littoralis and on their feeding behavior. The experiments further considered the importance of previous feeding experience on the responses of the larvae. It was confirmed that herbivore-induced VOCs emitted by maize plants are attractive to the larvae, but exposure to the volatiles decreased the growth rate of caterpillars at early developmental stages. Larvae that had fed on maize previously were more attracted by VOCs of induced maize than larvae that had fed on artificial diet. At relatively high concentrations synthetic green leaf volatiles, indicative of fresh damage, also negatively affected the growth rate of caterpillars, but not at low concentrations. In all cases, feeding by the later stages of the larvae was not affected by the VOCs. The results are discussed in the context of larval foraging behavior under natural conditions, where there may be a trade-off between using available host plant signals and avoiding competitors and natural enemies. PMID:23825475

  16. Laser damage helps the eavesdropper in quantum cryptography.

    PubMed

    Bugge, Audun Nystad; Sauge, Sebastien; Ghazali, Aina Mardhiyah M; Skaar, Johannes; Lydersen, Lars; Makarov, Vadim

    2014-02-21

    We propose a class of attacks on quantum key distribution (QKD) systems where an eavesdropper actively engineers new loopholes by using damaging laser illumination to permanently change properties of system components. This can turn a perfect QKD system into a completely insecure system. A proof-of-principle experiment performed on an avalanche photodiode-based detector shows that laser damage can be used to create loopholes. After ∼1  W illumination, the detectors' dark count rate reduces 2-5 times, permanently improving single-photon counting performance. After ∼1.5  W, the detectors switch permanently into the linear photodetection mode and become completely insecure for QKD applications.

  17. Application of Green Net Metropolitan Product to Measure ...

    EPA Pesticide Factsheets

    The U.S. Environmental Protection Agency (USEPA) has been increasingly incorporating the concept of sustainability in its research programs. One facet of this research is the quantitative assessment of the sustainability of urban systems in light of several multidisciplinary sustainability metrics. In this work, we explore the estimation of economic measure of sustainability for Chicago Metropolitan Area (CMA) based on Green Net Metropolitan Product (GNMP), by adapting the economic models of sustainability at the macroeconomic level to regional sustainability. GNMP aims at amending the limitations of Net Domestic Product (NDP), a classical indicator of economic wellbeing, which fails to account for the degradation of environmental and natural resources caused by economic activities. We collect data for computing GNMP from publicly available secondary sources on variables such as gross metropolitan product, net income, emissions, solid waste, etc. In estimating GNMP for CMA, we have accounted for the damage costs associated with pollution emissions based on marginal damage values obtained from the literature using benefit transfers method. In addition, we attempt at accounting for the marginal value of depletion of natural resources in the CMA in terms of water depletion and changes in urban ecosystems such as green spaces. We account for the marginal damage cost associated with solid waste generation. It is expected the preliminary results of this exploration se

  18. Screening Sitka spruce for resistance to weevil damage in British Columbia

    Treesearch

    René I. Alfaro; John N. King

    2012-01-01

    The white pine weevil, Pissodes strobi (Coleoptera, Curculionidae), has serious impacts on Sitka (Picea sitchensis (Bong.) Carrière), Engelmann (P. engelmannii Parry ex Engelm.), and white spruce (P. glauca (Moench) Voss) plantations in British Columbia (BC), Canada. This weevil attacks...

  19. COPPER PITTING CORROSION: A CASE STUDY

    EPA Science Inventory

    Localized or pitting corrosion of copper pipes used in household drinking-water plumbing is a problem for many water utilities and their customers. Extreme attack can lead to pinhole water leaks that may result in water damage, mold growth, and costly repairs. Water quality has b...

  20. Facility Targeting, Protection and Mission Decision Making Using the VISAC Code

    NASA Technical Reports Server (NTRS)

    Morris, Robert H.; Sulfredge, C. David

    2011-01-01

    The Visual Interactive Site Analysis Code (VISAC) has been used by DTRA and several other agencies to aid in targeting facilities and to predict the associated collateral effects for the go, no go mission decision making process. VISAC integrates the three concepts of target geometric modeling, damage assessment capabilities, and an event/fault tree methodology for evaluating accident/incident consequences. It can analyze a variety of accidents/incidents at nuclear or industrial facilities, ranging from simple component sabotage to an attack with military or terrorist weapons. For nuclear facilities, VISAC predicts the facility damage, estimated downtime, amount and timing of any radionuclides released. Used in conjunction with DTRA's HPAC code, VISAC also can analyze transport and dispersion of the radionuclides, levels of contamination of the surrounding area, and the population at risk. VISAC has also been used by the NRC to aid in the development of protective measures for nuclear facilities that may be subjected to attacks by car/truck bombs.

  1. Corneal Crosslinking With Rose Bengal and Green Light: Efficacy and Safety Evaluation.

    PubMed

    Zhu, Hong; Alt, Clemens; Webb, Robert H; Melki, Samir; Kochevar, Irene E

    2016-09-01

    To evaluate crosslinking of cornea in vivo using green light activation of Rose Bengal (RGX) and assess potential damaging effects of the green light on retina and iris. Corneas of Dutch belted rabbits were de-epithelialized, then stained with Rose Bengal and exposed to green light, or not further treated. Corneal stiffness was measured by uniaxial tensiometry. Re-epithelialization was assessed by fluorescein fluorescence. Keratocytes were counted on hematoxylin and eosin (H&E)-stained sections, and iris cell damage was assessed by lactate dehydrogenase staining. Thermal effects on the blood-retinal barrier (BRB) were assessed by fluorescein angiography and those on photoreceptors, retinal pigment epithelium (RPE), and choriocapillaris by light microscopy and transmission electron microscopy. RGX (10-min irradiation; 150 J/cm) increased corneal stiffness 1.9-fold on day 1 (1.25 ± 0.21 vs. 2.38 ± 0.59 N/mm; P = 0.036) and 2.8-fold compared with controls on day 28 (1.70 ± 0.74 vs. 4.95 ± 1.86 N/mm; P = 0.003). Keratocytes decreased only in the anterior stroma on day 1 (24.0 ± 3.0 vs. 3.67 ± 4.73, P = 0.003) and recovered by day 28 (37.7 ± 8.9 vs. 34.5 ± 2.4, P = 0.51). Iris cells were not thermally damaged. No evidence of BRB breakdown was detected on days 1 or 28. Retina from RGX-treated eyes seemed normal with RPE cells showing intact nuclei shielded apically by melanosomes, morphologically intact photoreceptor outer segments, normal outer nuclear layer thickness, and choriocapillaris containing intact erythrocytes. The substantial corneal stiffening produced by RGX together with the lack of significant effects on keratocytes and no evidence for retina or iris damage suggest that RGX-initiated corneal crosslinking may be a safe, rapid, and effective treatment.

  2. Detecting Payload Attacks on Programmable Logic Controllers (PLCs)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan

    Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less

  3. Declawing the Dragon: Why the U.S. Must Counter Chinese Cyber-Warriors

    DTIC Science & Technology

    2009-06-12

    underground civilian organizations, from The Green Army to the likely state-sponsored Red Hacker Alliance (RHA), have participated in corporate and...for situational awareness… or the Sailor relying on Naval Tactical Data Systems (NTDS) for over-the-horizon targeting, Bridge to Bridge ( B2B ) for...of China, the Red Hacker Alliance , and the Chinese Red Guest Network Security Technology Alliance would seek out targets of opportunity to attack

  4. Plant pest detection using an artificial nose system: A review

    USDA-ARS?s Scientific Manuscript database

    This paper reviews artificial intelligent noses (or electronic noses) as a fast and noninvasive approach for the diagnosis of insects and diseases that attack vegetables and fruit trees. The particular focus is on bacterial, fungal, and viral infections, and insect damage. Volatile organic compounds...

  5. Symbiont diversification in ambrosia beetles: Diversity of fungi associated with exotic scolytine beetles

    USDA-ARS?s Scientific Manuscript database

    In virtually every forest habitat, ambrosia beetles (Coleoptera: Curculionidae: Scolytinae, Platypodinae) plant and maintain symbiotic fungus gardens inside dead or dying wood. Some introduced ambrosia beetles aggressively attack live trees and can damage tree crops, lumber, and native woody plant t...

  6. COPPER PITTING CORROSION AND PINHOLE LEAKS: A CASE STUDY

    EPA Science Inventory

    Localized corrosion, or "pitting", of copper drinking water pipe continues is a problem for many water utilities and their customers. Extreme attack leads to pinhole leaks that can potentially lead to water damage, mold growth, and costly repairs for the homeowners, as well as th...

  7. Rapid defense responses in maize leaves induced by Spodoptera exigua caterpillar feeding

    USDA-ARS?s Scientific Manuscript database

    Insects such as beet armyworm caterpillars (Spodoptera exigua) cause extensive damage to maize (Zea mays) by consuming foliar tissue. Maize plants respond to insect attack by triggering defense mechanisms that involve massive changes in gene expression, biosynthesis of specialized metabolites and de...

  8. Robustness and structure of complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai

    This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks are much more vulnerable to localized attack compared with random attack. In the second part, we extend the tree-like generating function method to incorporating clustering structure in complex networks. We study the robustness of a complex network system, especially a network of networks (NON) with clustering structure in each network. We find that the system becomes less robust as we increase the clustering coefficient of each network. For a partially dependent network system, we also find that the influence of the clustering coefficient on network robustness decreases as we decrease the coupling strength, and the critical coupling strength qc, at which the first-order phase transition changes to second-order, increases as we increase the clustering coefficient.

  9. 7 CFR 457.128 - Guaranteed production plan of fresh market tomato crop insurance provisions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... before any damage occurs. Potential production. The number of cartons per acre of mature green or ripe... Basic Provisions (§ 457.8), practical to replant is defined as our determination, after loss or damage... all other types. (b) The production guarantees per acre are progressive by stages and increase at...

  10. 7 CFR 457.128 - Guaranteed production plan of fresh market tomato crop insurance provisions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... before any damage occurs. Potential production. The number of cartons per acre of mature green or ripe... Basic Provisions (§ 457.8), practical to replant is defined as our determination, after loss or damage... all other types. (b) The production guarantees per acre are progressive by stages and increase at...

  11. 7 CFR 457.128 - Guaranteed production plan of fresh market tomato crop insurance provisions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... before any damage occurs. Potential production. The number of cartons per acre of mature green or ripe... Basic Provisions (§ 457.8), practical to replant is defined as our determination, after loss or damage... all other types. (b) The production guarantees per acre are progressive by stages and increase at...

  12. Pre-Conditioning with Low-Level Laser (Light) Therapy: Light Before the Storm

    PubMed Central

    Agrawal, Tanupriya; Gupta, Gaurav K.; Rai, Vikrant; Carroll, James D.; Hamblin, Michael R.

    2014-01-01

    Pre-conditioning by ischemia, hyperthermia, hypothermia, hyperbaric oxygen (and numerous other modalities) is a rapidly growing area of investigation that is used in pathological conditions where tissue damage may be expected. The damage caused by surgery, heart attack, or stroke can be mitigated by pre-treating the local or distant tissue with low levels of a stress-inducing stimulus, that can induce a protective response against subsequent major damage. Low-level laser (light) therapy (LLLT) has been used for nearly 50 years to enhance tissue healing and to relieve pain, inflammation and swelling. The photons are absorbed in cytochrome(c) oxidase (unit four in the mitochondrial respiratory chain), and this enzyme activation increases electron transport, respiration, oxygen consumption and ATP production. A complex signaling cascade is initiated leading to activation of transcription factors and up- and down-regulation of numerous genes. Recently it has become apparent that LLLT can also be effective if delivered to normal cells or tissue before the actual insult or trauma, in a pre-conditioning mode. Muscles are protected, nerves feel less pain, and LLLT can protect against a subsequent heart attack. These examples point the way to wider use of LLLT as a pre-conditioning modality to prevent pain and increase healing after surgical/medical procedures and possibly to increase athletic performance. PMID:25552961

  13. Aerosol exposure to Zaire ebolavirus in three nonhuman primate species: differences in disease course and clinical pathology.

    PubMed

    Reed, Douglas S; Lackemeyer, Matthew G; Garza, Nicole L; Sullivan, Lawrence J; Nichols, Donald K

    2011-10-01

    There is little known concerning the disease caused by Zaire ebolavirus (ZEBOV) when inhaled, the likely route of exposure in a biological attack. Cynomolgus macaques, rhesus macaques, and African green monkeys were exposed to aerosolized ZEBOV to determine which species might be the most relevant model of the human disease. A petechial rash was noted on cynomolgus and rhesus macaques after fever onset but not on African green monkeys. Fever duration was shortest in rhesus macaques (62.7 ± 16.3 h) and longest in cynomolgus macaques (82.7 ± 22.3h) and African green monkeys (88.4 ± 16.7h). Virus was first detectable in the blood 3 days after challenge; the level of viremia was comparable among all three species. Hematological changes were noted in all three species, including decreases in lymphocyte and platelet counts. Increased blood coagulation times were most pronounced in African green monkeys. Clinical signs and time to death in all three species were comparable to what has been reported previously for each species after parenteral inoculation with ZEBOV. These data will be useful in selection of an animal model for efficacy studies. Published by Elsevier Masson SAS.

  14. The effects of metal ions on the DNA damage induced by hydrogen peroxide.

    PubMed

    Kobayashi, S; Ueda, K; Komano, T

    1990-01-01

    The effects of metal ions on DNA damage induced by hydrogen peroxide were investigated using two methods, agarose-gel electrophoretic analysis of supercoiled DNA and sequencing-gel analysis of single end-labeled DNA fragments of defined sequences. Hydrogen peroxide induced DNA damage when iron or copper ion was present. At least two classes of DNA damage were induced, one being direct DNA-strand cleavage, and the other being base modification labile to hot piperidine. The investigation of the damaged sites and the inhibitory effects of radical scavengers revealed that hydroxyl radical was the species which attacked DNA in the reaction of H2O2/Fe(II). On the other hand, two types of DNA damage were induced by H2O2/Cu(II). Type I damage was predominant and inhibited by potassium iodide, but type II was not. The sites of the base-modification induced by type I damage were similar to those by lipid peroxidation products and by ascorbate in the presence of Cu(II), suggesting the involvement of radical species other than free hydroxyl radical in the damaging reactions.

  15. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  16. Modelling multi-hazard hurricane damages on an urbanized coast with a Bayesian Network approach

    USGS Publications Warehouse

    van Verseveld, H.C.W.; Van Dongeren, A. R.; Plant, Nathaniel G.; Jäger, W.S.; den Heijer, C.

    2015-01-01

    Hurricane flood impacts to residential buildings in coastal zones are caused by a number of hazards, such as inundation, overflow currents, erosion, and wave attack. However, traditional hurricane damage models typically make use of stage-damage functions, where the stage is related to flooding depth only. Moreover, these models are deterministic and do not consider the large amount of uncertainty associated with both the processes themselves and with the predictions. This uncertainty becomes increasingly important when multiple hazards (flooding, wave attack, erosion, etc.) are considered simultaneously. This paper focusses on establishing relationships between observed damage and multiple hazard indicators in order to make better probabilistic predictions. The concept consists of (1) determining Local Hazard Indicators (LHIs) from a hindcasted storm with use of a nearshore morphodynamic model, XBeach, and (2) coupling these LHIs and building characteristics to the observed damages. We chose a Bayesian Network approach in order to make this coupling and used the LHIs ‘Inundation depth’, ‘Flow velocity’, ‘Wave attack’, and ‘Scour depth’ to represent flooding, current, wave impacts, and erosion related hazards.The coupled hazard model was tested against four thousand damage observations from a case site at the Rockaway Peninsula, NY, that was impacted by Hurricane Sandy in late October, 2012. The model was able to accurately distinguish ‘Minor damage’ from all other outcomes 95% of the time and could distinguish areas that were affected by the storm, but not severely damaged, 68% of the time. For the most heavily damaged buildings (‘Major Damage’ and ‘Destroyed’), projections of the expected damage underestimated the observed damage. The model demonstrated that including multiple hazards doubled the prediction skill, with Log-Likelihood Ratio test (a measure of improved accuracy and reduction in uncertainty) scores between 0.02 and 0.17 when only one hazard is considered and a score of 0.37 when multiple hazards are considered simultaneously. The LHIs with the most predictive skill were ‘Inundation depth’ and ‘Wave attack’. The Bayesian Network approach has several advantages over the market-standard stage-damage functions: the predictive capacity of multiple indicators can be combined; probabilistic predictions can be obtained, which include uncertainty; and quantitative as well as descriptive information can be used simultaneously.

  17. New Insights into the Explosion Source from SPE

    NASA Astrophysics Data System (ADS)

    Patton, H. J.

    2015-12-01

    Phase I of the Source Physics Experiments (SPE) is a series of chemical explosions at varying depths and yields detonated in the same emplacement hole on Climax stock, a granitic pluton located on the Nevada National Security Site. To date, four of the seven planned tests have been conducted, the last in May 2015, called SPE-4P, with a scaled depth of burial of 1549 m/kt1/3 in order to localize the source in time and space. Surface ground motions validated that the source medium did not undergo spallation, and a key experimental objective was achieved where SPE-4P is the closest of all tests in the series to a pure monopole source and will serve as an empirical Green's function for analysis against other SPE tests. A scientific objective of SPE is to understand mechanisms of rock damage for generating seismic waves, particularly surface and S waves, including prompt damage under compressive stresses and "late-time" damage under tensile stresses. Studies have shown that prompt damage can explain ~75% of the seismic moment for some SPE tests. Spallation is a form of late-time damage and a facilitator of damage mechanisms under tensile stresses including inelastic brittle deformation and shear dilatancy on pre-existing faults or joints. As an empirical Green's function, SPE-4P allows the study of late-time damage mechanisms on other SPE tests that induce spallation and late-time damage, and I'll discuss these studies. The importance for nuclear monitoring cannot be overstated because new research shows that damage mechanisms can affect surface wave magnitude Ms more than tectonic release, and are a likely factor related to anomalous mb-Ms behavior for North Korean tests.

  18. Loss-tolerant measurement-device-independent quantum private queries

    NASA Astrophysics Data System (ADS)

    Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2017-01-01

    Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.

  19. Loss-tolerant measurement-device-independent quantum private queries.

    PubMed

    Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2017-01-04

    Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user's and database's privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user's imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.

  20. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    NASA Astrophysics Data System (ADS)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  1. Bioterrorism for the respiratory physician.

    PubMed

    Waterer, Grant W; Robertson, Hannah

    2009-01-01

    Terrorist attacks by definition are designed to cause fear and panic. There is no question that a terrorist attack using biological agents would present a grave threat to stability of the society in which they were released. Early recognition of such a bioterrorist attack is crucial to containing the damage they could cause. As many of the most likely bioterrorism agents present with pulmonary disease, respiratory physicians may be crucial in the initial recognition and diagnosis phase, and certainly would be drawn into treatment of affected individuals. This review focuses on the biological agents thought most likely to be used by terrorists that have predominantly respiratory presentations. The primary focus of this review is on anthrax, plague, tularaemia, ricin, and Staphylococcal enterotoxin B. The pathogenesis, clinical manifestations and treatment of these agents will be discussed as well as historical examples of their use. Other potential bioterrorism agents with respiratory manifestations will also be discussed briefly.

  2. Pitting Corrosion of Copper in Waters with High pH and Low Alkalinity

    EPA Science Inventory

    Localized or pitting corrosion of copper pipes used in household drinking-water plumbing is a problem for many water utilities and their customers. Extreme attack can lead to pinhole water leaks that may result in water damage, mold growth, and costly repairs. Water quality has b...

  3. Cotton defense induction patterns under spatially, temporally and quantitatively varying herbivory levels

    USDA-ARS?s Scientific Manuscript database

    The optimal defense theory (ODT) predicts that plants allocate defense compounds to their tissues depending on its value and the likelihood of herbivore attack. Whereas ODT has been confirmed for static damage levels it remains poorly understood if ODT holds true for defense organization of inducibl...

  4. Field Susceptibility of Quince Hybrids to Fire Blight in Bulgaria

    USDA-ARS?s Scientific Manuscript database

    Spread of fire blight in Bulgaria during the last 20 years has nearly eliminated commercial production of pear and quince. Damage has increased in both nurseries and orchards, yet susceptible cultivars continue to be planted. Quince is the host most frequently attacked by Erwinia amylovora in Bulgar...

  5. Restraint in Urban Warfare: The Canadian Attack on Groningen, Netherlands, 13-16 April 1945

    DTIC Science & Technology

    2013-06-13

    Netherlands under orders to limit civilian casualties and collateral damage. Their reasons for imposing these limitations and their experiences in...firepower were offset by information on enemy locations. The key to success turned out to be the closest possible cooperation between armour and...

  6. The Computer Virus Threat and What You Can Do about It.

    ERIC Educational Resources Information Center

    Lateulere, John

    1992-01-01

    Discussion of computer viruses describes two types of viruses and how they work; suggests ways to prevent or minimize virus risk; and explains how to recognize a virus and limit damage once a virus attacks. A sidebar lists several antivirus software products. (two references) (NRP)

  7. MYCOFLORA OF WORKS OF GRAPHIC AND APPLIED ART,

    DTIC Science & Technology

    Damage to works of art as a result of contamination by mold fungi is discussed. Results of an inspection of fifteen museums in the Russian Soviet...Federated Socialist Republic conducted in 1962-63 are presented. Data indicate the species of fungi which attack various forms of art work. (Author)

  8. Developing a media moisture threshold for nurseries to reduce tree stress and ambrosia beetle attacks

    USDA-ARS?s Scientific Manuscript database

    Exotic ambrosia beetles are among the most damaging pests of trees grown in nurseries. The primary pests Xylosandrus crassiusculus Motschulsky and Xylosandrus germanus Blandford use ethanol to locate vulnerable trees. Research, primarily with X. germanus, has shown that flood-stressed trees emit eth...

  9. Insectos de cones y semillas de las coniferas de Mexico

    Treesearch

    David Cibrián-Tovar; Bernard H. Ebel; Harry O. Yates; José Tulio Mhdez-Montiel

    1986-01-01

    The hosts, description, damage, life cycle, habits, and importance of 54 known cone and seed destroying insects attacking Mexican conifer trees are discussed. Distribution maps and color photos are provided. New species described are three species of Cydia (seedworm), four species of Dioryctria (coneworm), and four species of cone...

  10. RFID identity theft and countermeasures

    NASA Astrophysics Data System (ADS)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  11. Analyses of battle casualties by weapon type aboard U.S. Navy warships.

    PubMed

    Blood, C G

    1992-03-01

    The number of casualties was determined for 513 incidents involving U.S. Navy warships sunk or damaged during World War II. Ship type and weapon were significant factors in determining the numbers of wounded and killed. Multiple weapon attacks and kamikazes yielded more wounded in action than other weapon types. Multiple weapons and torpedos resulted in a higher incidence of killed in action than other weapons. Penetrating wounds and burns were the most prominent injury types. Kamikaze attacks yielded significantly more burns than incidents involving bombs, gunfire, torpedos, mines, and multiple weapons. Mine explosions were responsible for more strains, sprains, and dislocations than the other weapon types.

  12. Hospital mergers and acquisitions: does market consolidation harm patients?

    PubMed

    Ho, V; Hamilton, B H

    2000-09-01

    Debate continues on whether consolidation in health care markets enhances efficiency or instead facilitates market power, possibly damaging quality. We compare the quality of hospital care before and after mergers and acquisitions in California between 1992 and 1995. We analyze inpatient mortality for heart attack and stroke patients, 90-day readmission for heart attack patients, and discharge within 48 h for normal newborn babies. Recent mergers and acquisitions have not had a measurable impact on inpatient mortality, although the associated standard errors are large. Readmission rates and early discharge increased in some cases. The adverse consequences of increased market power on the quality of care require further substantiation.

  13. Compensatory responses in plant-herbivore interactions: Impacts of insects on leaf water relations

    NASA Astrophysics Data System (ADS)

    Peschiutta, María L.; Bucci, Sandra J.; Scholz, Fabián G.; Goldstein, Guillermo

    2016-05-01

    Herbivore damage to leaves has been typically evaluated in terms of fractions of area removed; however morpho-physiological changes in the remaining tissues can occur in response to removal. We assessed the effects of partial removal of the leaf mesophyll by Caliroa cerasi (Hymenoptera) on leaf hydraulic conductance (Kleaf), vascular architecture, water relations and leaf size of three Prunus avium cultivars. The insect feeds on the leaf mesophyll leaving the vein network intact (skeletonization). Within each cultivar there were trees without infestations and trees chronically infested, at least over the last three years. Leaf size of intact leaves tended to be similar during leaf expansion before herbivore attack occurs across infested and non-infested trees. However, after herbivore attack and when the leaves were fully expanded, damaged leaves were smaller than leaves from non-infested trees. Damaged area varied between 21 and 31% depending on cultivar. The non-disruption of the vascular system together with either vein density or capacitance increased in damaged leaves resulted in similar Kleaf and stomatal conductance in infested and non-infested trees. Non-stomatal water loss from repeated leaf damage led to lower leaf water potentials in two of the infested cultivars. Lower leaf osmotic potentials and vulnerability to loss of Kleaf were observed in infested plants. Our results show that skeletonization resulted in compensatory changes in terms of water relations and hydraulics traits and in cultivar-specific physiological changes in phylogenetic related P. avium. Our findings indicate that detrimental effects of herbivory on the photosynthetic surface are counterbalanced by changes providing higher drought resistance, which has adaptive significance in ecosystems where water availability is low and furthermore where global climate changes would decrease soil water availability in the future even further.

  14. Fire severity and tree regeneration following bark beetle outbreaks: the role of outbreak stage and burning conditions.

    PubMed

    Harvey, Brian J; Donato, Daniel C; Romme, William H; Turner, Monica G

    The degree to which recent bark beetle (Dendroctonus ponderosae) outbreaks may influence fire severity and postfire tree regeneration is of heightened interest to resource managers throughout western North America, but empirical data on actual fire effects are lacking. Outcomes may depend on burning conditions (i.e., weather during fire), outbreak severity, or intervals between outbreaks and subsequent fire. We studied recent fires that burned through green-attack/red-stage (outbreaks <3 years before fire) and gray-stage (outbreaks 3–15 years before fire) subalpine forests dominated by lodgepole pine (Pinus contorta var. latifolia) in Greater Yellowstone, Wyoming, USA, to determine if fire severity was linked to prefire beetle outbreak severity and whether these two disturbances produced compound ecological effects on postfire tree regeneration. With field data from 143 postfire plots that burned under different conditions, we assessed canopy and surface fire severity, and postfire tree seedling density against prefire outbreak severity. In the green-attack/red stage, several canopy fire-severity measures increased with prefire outbreak severity under moderate burning conditions. Under extreme conditions, few fire-severity measures were related to prefire outbreak severity, and effect sizes were of marginal biological significance. The percentage of tree stems and basal area killed by fire increased with more green-attack vs. red-stage trees (i.e., the earliest stages of outbreak). In the gray stage, by contrast, most fire-severity measures declined with increasing outbreak severity under moderate conditions, and fire severity was unrelated to outbreak severity under extreme burning conditions. Postfire lodgepole pine seedling regeneration was unrelated to prefire outbreak severity in either post-outbreak stage, but increased with prefire serotiny. Results suggest bark beetle outbreaks can affect fire severity in subalpine forests under moderate burning conditions, but have little effect on fire severity under extreme burning conditions when most large wildfires occur in this system. Thus, beetle outbreak severity was moderately linked to fire severity, but the strength and direction of the linkage depended on both endogenous (outbreak stage) and exogenous (fire weather) factors. Closely timed beetle outbreak and fire did not impart compound effects on tree regeneration, suggesting the presence of a canopy seedbank may enhance resilience to their combined effects.

  15. Damage-tolerance strategies for nacre tablets.

    PubMed

    Wang, Shengnan; Zhu, Xinqiao; Li, Qiyang; Wang, Rizhi; Wang, Xiaoxiang

    2016-05-01

    Nacre, a natural armor, exhibits prominent penetration resistance against predatory attacks. Unraveling its hierarchical toughening mechanisms and damage-tolerance design strategies may provide significant inspiration for the pursuit of high-performance artificial armors. In this work, relationships between the structure and mechanical performance of nacre were investigated. The results show that other than their brick-and-mortar structure, individual nacre tablets significantly contribute to the damage localization of nacre. Affected by intracrystalline organics, the tablets exhibit a unique fracture behavior. The synergistic action of the nanoscale deformation mechanisms increases the energy dissipation efficiency of the tablets and contributes to the preservation of the structural and functional integrity of the shell. Copyright © 2016 Elsevier Inc. All rights reserved.

  16. Complete nucleotide sequences and construction of full-length infectious cDNA clones of Cucumber green mottle virus (CGMMV) in a versatile newly developed binary vector including both 35S and T7 promoters

    USDA-ARS?s Scientific Manuscript database

    Seed-transmitted viruses have caused significant damage to watermelon crops in Korea in recent years, with Cucumber green mottle mosaic virus (CGMMV) infection widespread as a result of infected seed lots. To determine the likely origin of CGMMV infection, we collected CGMMV isolates from watermelon...

  17. Value Assessment Study for Air quality in Regulation Services of Ecosystems Services target on NO2 using Remote sensing data

    NASA Astrophysics Data System (ADS)

    Jeon, S. W.; Ryu, J.; Choi, Y.; Jung, H. I.; Jang, R.; Lee, J.

    2017-12-01

    The purpose of this study is to evaluate the value of green space that regulates the air quality in the regulatory service classification of ecosystem services. In this study, statistical data and satellite images (GOME) were used to construct data and evaluate the control functions of the whole country. In order to evaluate the value, national economic activities are evaluated and typified based on national GDP. This is because the amount of No2 emissions and the damage caused by them are different depending on the speed and characteristics of national development. After that, regression models were made using land cover, change in urban green area ratio, NDVI (Normalised Difference Vegetation Index), increase or decrease in population, increase in urban area, altitude and slope, cardiovascular due to NO2 and respiratory population. After that, the value of green space was evaluated by applying the scenario of NO2 increase or decrease for each type. The value of green space was converted into economic value by increasing or decreasing the number of affected people and the damage amount when NO2 increased. The results of this study are expected to provide a basis for conservation of forests by assessing the value of greenery to control air quality globally.

  18. Cause-specific temporal and spatial trends in green sea turtle strandings in the Hawaiian Archipelago (1982-2003)

    USGS Publications Warehouse

    Chaloupka, Milani; Work, Thierry M.; Balazs, George H.; Murakawa, Shawn K. K.; Morris, Robert

    2008-01-01

    We investigated cause-specific temporal and spatial trends in sea turtle strandings in the Hawaiian Archipelago. Five species of sea turtle were recorded in 3,861 strandings over a 22-year period (1982–2003). Green turtles comprised 97% of these strandings with size and gender composition reflecting the demographic structure of the resident green turtle population and relative green turtle abundance in Hawaiian waters. The cause of strandings was determined by necropsy based on a complete gross external and internal examination. Totally 75% of the 3,732 green turtle strandings were from Oahu where strandings occur year-round. The most common known cause of the green turtle strandings was the tumour-forming disease, fibropapillomatosis (28%) followed by hook-and-line fishing gear-induced trauma (7%), gillnet fishing gear-induced trauma (5%), boat strike (2.5%), and shark attack (2.7%). Miscellaneous causes comprised 5.4% of strandings whereas 49% of green turtle strandings could not be attributed to any known cause. Green turtle strandings attributable to boat strike were more likely from Kauai and Oahu while fibropapilloma strandings were more likely from Oahu and Maui. Hook-and-line gear strandings were more likely from Oahu due to higher per capita inshore fishing effort. The specific mortality rate (conditional probability) for fibropapillomatosis was 88%, 69% for gillnet gear and 52% for hook-and-line gear. The probability of a dead green turtle stranding increased from 1982 but levelled off by the mid-1990s. The declining mortality risk was because the prevalence and severity of fibropapillomatosis has decreased recently and so has the mortality risk attributable to gillnet gear. Despite exposure to disease and inshore fishing gears, the Hawaiian green turtle stock continues to recover following protection since the late 1970s. Nevertheless, measures to reduce incidental capture of sea turtles in coastal Hawaiian fisheries would be prudent, especially since strandings attributable to hook-and-line fishing gear have increased steadily since 1982.

  19. Plant lesions promote the rapid multiplication of Escherichia coli O157:H7 on post-harvest lettuce

    USDA-ARS?s Scientific Manuscript database

    Several outbreaks of Escherichia coli O157:H7 (EcO157) infections have been associated with minimally processed leafy vegetables in the U.S. Harvesting and processing cause plant tissue damage. In order to assess the role of plant tissue damage in the contamination of leafy greens with EcO157, the e...

  20. Special Forces Recruiting: The Operational Need for Targeted Recruitment of First and Second Generation Americans

    DTIC Science & Technology

    2008-12-01

    after the September 11, 2001 attacks and a number of Special Forces operational detachments trained and advised the Afghan Northern Alliance troops... Cara Wong, “Citizenship for Service: Substitution, Commutation, and “Green Card Troops,” Paper presented at the University of California, Berkeley...law.cornell.edu/uscode/8/1440.html (accessed December 2008). 49 James B. Jacobs, and Leslie Anne Hayes, Aliens in the U.S. Armed Forces (New York: Oxford

  1. No Green-On-Blue Against the Reds?: Organizational Strategies Behind Insider Attacks in Afghanistan

    DTIC Science & Technology

    2013-06-01

    Oaks, Calif: Sage Publications, 2003 ), 1. 46 Alexander L. George, Case Studies and Theory Development in the Social Sciences, BCSIA Studies in...the actions we take.2 For example, Kiras notes that the US missed opportunities to address the root causes of violence in Iraq during 2003 -2004...Warfare,” 230. 4 Merriam-Webster, Inc, Merriam-Webster’s Collegiate Dictionary, 11th ed (Springfield, Mass: Merriam-Webster, Inc, 2003 ), 649. 5

  2. Effects of various LED light spectra on antioxidant and immune response in juvenile rock bream, Oplegnathus fasciatus exposed to bisphenol A.

    PubMed

    Choi, Ji Yong; Kim, Tae Hwan; Choi, Young Jae; Kim, Na Na; Oh, Sung-Yong; Choi, Cheol Young

    2016-07-01

    Bisphenol A (BPA) is a monomer used in plastics and plasticizers. As an environmental toxin included in industrial wastewater, it contaminates the aquatic environment and is known to cause endocrine disruption in fish. Particular wavelengths of light-emitting diodes (LEDs) are known to affect the endocrine regulation of fish. The present study aimed to investigate the effects of green and red LED light on the antioxidant and immune systems in juvenile rock bream (Oplegnathus fasciatus) exposed to BPA. We used green and red LED exposure at two intensities (0.3 and 0.5W/m(2)) for 1, 3, and 5 days. We measured liver mRNA expression and plasma levels of antioxidant enzyme superoxide dismutase (SOD) and caspase-3. Furthermore, we measured plasma levels of hydrogen peroxide (H2O2), lipid peroxidation (LPO), melatonin, and immunoglobulin M (IgM). DNA damage and apoptotic activity were measured using comet and terminal transferase dUTP nick end labeling (TUNEL) assays, respectively. We found that SOD, H2O2, and LPO increased significantly, whereas melatonin and IgM decreased significantly, suggesting that BPA induces oxidative stress and reduces immune function. Likewise, both DNA damage and apoptotic activity increased following BPA exposure. However, we found that exposure to green LED light effectively reduced the detrimental effects induced by BPA, including decreasing DNA damage, apoptotic activity, SOD mRNA expression, and plasma levels of SOD, H2O2, and LPO. Likewise, the plasma levels of melatonin and IgM increased. Thus, our results indicate that green light conditions effectively reduces oxidative stress and promotes the immune function in juvenile rock bream. Copyright © 2016 Elsevier B.V. All rights reserved.

  3. Socioeconomic Inequalities in Green Space Quality and Accessibility-Evidence from a Southern European City.

    PubMed

    Hoffimann, Elaine; Barros, Henrique; Ribeiro, Ana Isabel

    2017-08-15

    Background : The provision of green spaces is an important health promotion strategy to encourage physical activity and to improve population health. Green space provision has to be based on the principle of equity. This study investigated the presence of socioeconomic inequalities in geographic accessibility and quality of green spaces across Porto neighbourhoods (Portugal). Methods : Accessibility was evaluated using a Geographic Information System and all the green spaces were audited using the Public Open Space Tool. Kendall's tau-b correlation coefficients and ordinal regression were used to test whether socioeconomic differences in green space quality and accessibility were statistically significant. Results : Although the majority of the neighbourhoods had an accessible green space, mean distance to green space increased with neighbourhood deprivation. Additionally, green spaces in the more deprived neighbourhoods presented significantly more safety concerns, signs of damage, lack of equipment to engage in active leisure activities, and had significantly less amenities such as seating, toilets, cafés, etc. Conclusions : Residents from low socioeconomic positions seem to suffer from a double jeopardy; they lack both individual and community resources. Our results have important planning implications and might contribute to understanding why deprived communities have lower physical activity levels and poorer health.

  4. Influence of Titanium Dioxide Nanoparticles on the Sulfate Attack upon Ordinary Portland Cement and Slag-Blended Mortars

    PubMed Central

    Atta-ur-Rehman; Qudoos, Abdul; Kim, Hong Gi

    2018-01-01

    In this study, the effects of titanium dioxide (TiO2) nanoparticles on the sulfate attack resistance of ordinary Portland cement (OPC) and slag-blended mortars were investigated. OPC and slag-blended mortars (OPC:Slag = 50:50) were made with water to binder ratio of 0.4 and a binder to sand ratio of 1:3. TiO2 was added as an admixture as 0%, 3%, 6%, 9% and 12% of the binder weight. Mortar specimens were exposed to an accelerated sulfate attack environment. Expansion, changes in mass and surface microhardness were measured. Scanning Electron Microscopy (SEM), Energy Dispersive Spectroscopy (EDS), X-ray Diffraction (XRD), Thermogravimetry Analysis (TGA) and Differential Scanning Calorimetry (DSC) tests were conducted. The formation of ettringite and gypsum crystals after the sulfate attack were detected. Both these products had caused crystallization pressure in the microstructure of mortars and deteriorated the mortars. Our results show that the addition of nano-TiO2 accelerated expansion, variation in mass, loss of surface microhardness and widened cracks in OPC and slag-blended mortars. Nano-TiO2 containing slag-blended mortars were more resistant to sulfate attack than nano-TiO2 containing OPC mortars. Because nano-TiO2 reduced the size of coarse pores, so it increased crystallization pressure due to the formation of ettringite and gypsum thus led to more damage under sulfate attack. PMID:29495616

  5. Mountain Pine Beetle Dynamics and Reproductive Success in Post-Fire Lodgepole and Ponderosa Pine Forests in Northeastern Utah

    PubMed Central

    Lerch, Andrew P.; Pfammatter, Jesse A.

    2016-01-01

    Fire injury can increase tree susceptibility to some bark beetles (Curculionidae, Scolytinae), but whether wildfires can trigger outbreaks of species such as mountain pine beetle (Dendroctonus ponderosae Hopkins) is not well understood. We monitored 1173 lodgepole (Pinus contorta var. latifolia Doug.) and 599 ponderosa (Pinus ponderosa Doug. ex Law) pines for three years post-wildfire in the Uinta Mountains of northeastern Utah in an area with locally endemic mountain pine beetle. We examined how the degree and type of fire injury influenced beetle attacks, brood production, and subsequent tree mortality, and related these to beetle population changes over time. Mountain pine beetle population levels were high the first two post-fire years in lodgepole pine, and then declined. In ponderosa pine, populations declined each year after initial post-fire sampling. Compared to trees with strip or failed attacks, mass attacks occurred on trees with greater fire injury, in both species. Overall, a higher degree of damage to crowns and boles was associated with higher attack rates in ponderosa pines, but additional injury was more likely to decrease attack rates in lodgepole pines. In lodgepole pine, attacks were initially concentrated on fire-injured trees, but during subsequent years beetles attacked substantial numbers of uninjured trees. In ponderosa pine, attacks were primarily on injured trees each year, although these stands were more heavily burned and had few uninjured trees. In total, 46% of all lodgepole and 56% of ponderosa pines underwent some degree of attack. Adult brood emergence within caged bole sections decreased with increasing bole char in lodgepole pine but increased in ponderosa pine, however these relationships did not scale to whole trees. Mountain pine beetle populations in both tree species four years post-fire were substantially lower than the year after fire, and wildfire did not result in population outbreaks. PMID:27783632

  6. Mountain Pine Beetle Dynamics and Reproductive Success in Post-Fire Lodgepole and Ponderosa Pine Forests in Northeastern Utah.

    PubMed

    Lerch, Andrew P; Pfammatter, Jesse A; Bentz, Barbara J; Raffa, Kenneth F

    2016-01-01

    Fire injury can increase tree susceptibility to some bark beetles (Curculionidae, Scolytinae), but whether wildfires can trigger outbreaks of species such as mountain pine beetle (Dendroctonus ponderosae Hopkins) is not well understood. We monitored 1173 lodgepole (Pinus contorta var. latifolia Doug.) and 599 ponderosa (Pinus ponderosa Doug. ex Law) pines for three years post-wildfire in the Uinta Mountains of northeastern Utah in an area with locally endemic mountain pine beetle. We examined how the degree and type of fire injury influenced beetle attacks, brood production, and subsequent tree mortality, and related these to beetle population changes over time. Mountain pine beetle population levels were high the first two post-fire years in lodgepole pine, and then declined. In ponderosa pine, populations declined each year after initial post-fire sampling. Compared to trees with strip or failed attacks, mass attacks occurred on trees with greater fire injury, in both species. Overall, a higher degree of damage to crowns and boles was associated with higher attack rates in ponderosa pines, but additional injury was more likely to decrease attack rates in lodgepole pines. In lodgepole pine, attacks were initially concentrated on fire-injured trees, but during subsequent years beetles attacked substantial numbers of uninjured trees. In ponderosa pine, attacks were primarily on injured trees each year, although these stands were more heavily burned and had few uninjured trees. In total, 46% of all lodgepole and 56% of ponderosa pines underwent some degree of attack. Adult brood emergence within caged bole sections decreased with increasing bole char in lodgepole pine but increased in ponderosa pine, however these relationships did not scale to whole trees. Mountain pine beetle populations in both tree species four years post-fire were substantially lower than the year after fire, and wildfire did not result in population outbreaks.

  7. Alcoholism in cockchafers: orientation of male Melolontha melolontha towards green leaf alcohols

    NASA Astrophysics Data System (ADS)

    Reinecke, Andreas; Ruther, Joachim; Tolasch, Till; Francke, Wittko; Hilker, Monika

    2002-03-01

    Chemical orientation of the European cockchafer, Melolontha melolontha L., a serious pest in agriculture and horticulture, was investigated by field tests and electrophysiological experiments using plant volatiles. In total, 16 typical plant volatiles were shown to elicit electrophysiological responses in male cockchafers. Funnel trap field bioassays revealed that green leaf alcohols (i.e. (Z)-3-hexen-1-ol, (E)-2-hexen-1-ol and 1-hexanol) attracted males, whereas the corresponding aldehydes and acetates were behaviourally inactive. Furthermore, male cockchafers were attracted by volatiles from mechanically damaged leaves of Fagus sylvatica L., Quercus robur L. and Carpinus betulus L. However, volatiles emitted by damaged leaves of F. sylvatica attracted significantly more males than those from the other host plants. Odour from intact F. sylvatica leaves was not attractive to M. melolontha males. Females were not attracted by any of the tested volatile sources. The results suggest that plant volatiles play a similar role as a sexual kairomone in mate finding of M. melolontha, as has been shown for the forest cockchafer, Melolontha hippocastani F. Nevertheless, both species show remarkable differences in their reaction to green leaf alcohols.

  8. Insects and Related Pests of Trees, Shrubs, and Lawns. MP-25R.

    ERIC Educational Resources Information Center

    Spackman, Everett W.; Lawson, Fred A.

    This document discusses identification and control of the pests of trees and shrubs. The insects are grouped according to feeding habits and the type of damage caused to plants. Categories include the sucking insects and mites, leaf eating insects, pests attacking trunks and branches, and gall causing insects. (CS)

  9. Contact toxicity of 38 insecticides to pales weevil adults

    Treesearch

    Jacqueline L. Robertson; Robert L. Lyon; Nancy L. Gillette

    1975-01-01

    The pales weevil, Hylobius pales (Herbst), attacks all pine species in Eastern North America and is considered the most destructive pest of pine reproduction in the Eastern United States (Speers and Rauchenberger 1971). Large numbers of seedlings are damaged or killed by the adult weevils, which feed on the inner bark.

  10. School Security after 9/11

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2011-01-01

    More than 3,000 people died in the Sept. 11, 2001, terrorist attacks on the United States, but the damage extended far beyond the physical casualties of that horrific day. The shock of the cold-blooded brutality and the devastation that resulted led to a grim realization that everyone was vulnerable to violence and tragedy. Although other…

  11. Getting HBCUs in the Disaster-Response Loop

    ERIC Educational Resources Information Center

    Colston, Ladd G.

    2005-01-01

    Natural and man-made disasters represent an ominous threat to the research, instructional and public service missions of colleges and universities. From the bombings in Oklahoma City to the terrorist attacks of Sept. 11 to last year's Hurricane Frances, the potential damage to campus buildings, human life and irreplaceable archival resources is a…

  12. Black twig borer...a tree killer in Hawaii

    Treesearch

    Robert E. Nelson; Clifton J. Davis

    1972-01-01

    The black twig borer (Xylosandrus compactus Eichhoff), first discovered in Hawaii in 1961, has become widespread on many host plants throughout the islands. Beetle infestations have caused heavy damage to trees but only recently have attacks been associated with death of apparently vigourous trees in forest stands. The beetle and its associated micro...

  13. Emergency Notification in an Instant

    ERIC Educational Resources Information Center

    Galuszka, Peter

    2008-01-01

    In the past year, adding new security has "become like a religion." The business of electronic notification hadn't really gained much attention until the terrorist attacks that destroyed the World Trade Center and damaged the Pentagon in 2001, killing more than 3,000 people. Critical attention on alerts got a huge boost after the Virginia Tech…

  14. MONITORING TOXIC ORGANIC GASES AND PARTICLES NEAR THE WORLD TRADE CENTER AFTER SEPTEMBER 11, 2001

    EPA Science Inventory

    The September 11, 2001 attack on the World Trade Center (WTC) resulted in an intense fire and the subsequent, complete collapse of the two main structures and adjacent buildings, as well as significant damage to many surrounding buildings within and around the WTC complex. Thi...

  15. A newly identified tomato peptide induces cytosolic calcium and may correspond to pathogen defense-related endogenous peptides in Arabidopsis

    USDA-ARS?s Scientific Manuscript database

    Plants recognize a variety of stimuli that invoke defenses against attacking pathogens and herbivores. This recognition primes the plant to mount defenses against herbivory and disease. These stimuli include molecules called damage-associated molecular patterns or DAMPs, among them signaling peptide...

  16. A guide for salvaging white pine injured by forest fires

    Treesearch

    Thomas W. McConkey; Donald R. Gedney

    1951-01-01

    White pine forests are severely damaged by forest fires. Generally a fire kills all trees less than 20 feet high immediately. Larger trees may die later, depending on the degree of injury. Salvage operations must be started soon after a fire, because insects and fungi quickly attack trees that are killed.

  17. Herbivore derived fatty acid-amides elicit reactive oxygen species burst in plants

    USDA-ARS?s Scientific Manuscript database

    The formation of a reactive oxygen species (ROS) burst is a central response of plants to many forms of stress including pathogen attack, several abiotic stresses, damage and insect infestation. These ROS act as a direct defense as well as signaling and regulatory molecules. Perception of microbe or...

  18. Hygienic and grooming behaviors in African and European honeybees-New damage categories in Varroa destructor

    USDA-ARS?s Scientific Manuscript database

    Varroa destructor is an ectoparasitic pest of honeybees, and a threat to the survival of the apiculture industry. Several studies have shown that unlike European honeybees, African honeybee populations appear to be minimally affected when attacked by this mite. However, little is known about the und...

  19. Fungal symbionts in three exotic ambrosia beetles, Xylosandrus amputatus, Xyleborinus andrewesi, and Dryoxylon onoharaense (Coleoptera: Curculionidae: Scolytinae: Xyleborini) in Florida

    USDA-ARS?s Scientific Manuscript database

    Abstract In nearly every forest habitat, ambrosia beetles (Coleoptera: Curculionidae: Scolytinae, Platypodinae) plant and maintain symbiotic fungus gardens inside dead or dying trees. Some non-native ambrosia beetles aggressively attack live trees and damage tree crops, lumber, and native woody pla...

  20. An analytically-based method for predicting the noise generated by the interaction between turbulence and a serrated leading edge

    NASA Astrophysics Data System (ADS)

    Mathews, J. R.; Peake, N.

    2018-05-01

    This paper considers the interaction of turbulence with a serrated leading edge. We investigate the noise produced by an aerofoil moving through a turbulent perturbation to uniform flow by considering the scattered pressure from the leading edge. We model the aerofoil as an infinite half plane with a leading edge serration, and develop an analytical model using a Green's function based upon the work of Howe. This allows us to consider both deterministic eddies and synthetic turbulence interacting with the leading edge. We show that it is possible to reduce the noise by using a serrated leading edge compared with a straight edge, but the optimal noise-reducing choice of serration is hard to predict due to the complex interaction. We also consider the effect of angle of attack, and find that in general the serrations are less effective at higher angles of attack.

  1. Acquired auditory neuropathy spectrum disorder after an attack of chikungunya: case study.

    PubMed

    Prabhu, Prashanth

    2016-01-01

    Auditory neuropathy spectrum disorder (ANSD) is a retrocochlear disorder in which the cochlear functioning is normal but the transmission in the auditory neural pathway is affected. The present study reports of a 14-year-old teenager with acquired ANSD after an attack of chikungunya. He reported symptoms of difficulty in understanding speech, tinnitus and vertigo when exposed to loud sounds. The audiological characteristics suggested auditory neuropathy spectrum disorder with raising audiogram configuration. The results of tinnitus evaluation showed low-pitched tinnitus and it was persistent causing significant handicap to him based on self report tinnitus handicap questionnaire results. The results of depression, anxiety and stress scale also suggested symptoms of mild depression and anxiety. Chikungunya virus is suspected to be neurotropic in nature which can damage auditory nerve cells and may have caused ANSD. The result also shows presence of tullio's phenomenon and absence of cervical vestibular evoked myogenic potentials suggesting damage to the vestibular neuronal system. The possible pathophysiology of chikungunya virus causing ANSD and vestibular symptoms needs to be explored further in future studies.

  2. Electrochemical aspects of copper atmospheric corrosion in the presence of sodium chloride

    DOE PAGES

    Schindelholz, Eric John; Cong, Hongbo; Jove-Colon, Carlos F.; ...

    2018-04-26

    Here, this study describes the evolving state of electrolyte and corrosion processes associated with sodium chloride on copper at the initial stage of corrosion and the critical implications of this behavior on controlling kinetics and damage distributions. Sodium chloride droplets were placed on copper in humid conditions and the resulting electrolyte properties, corrosion products and damage were characterized over time using time-lapse imaging, micro Raman spectroscopy, TOF-SIMS and optical profilometry. Within minutes of NaCl droplet placement, NaOH-rich films resultant from oxygen reduction advanced stepwise from the droplets, leaving behind concentric trenching attack patterns suggestive of moving anode-cathode pairs at themore » alkaline film front. Corrosion attack under these spreading alkaline films was up to 10x greater than under the original NaCl drops. Furthermore, solid Cu 2Cl(OH) 3 shells formed over the surface of the NaCl drops within hours of exposure. Thermodynamic modeling along with immersed electrochemical experiments in simulated droplet and films electrolytes were used to rationalize this behavior and build a description of the rapidly evolving corroding system.« less

  3. Myocardial infarction increases progressive visual field defects in well treated early primary open angle glaucoma--a prospective case control study.

    PubMed

    Mondal, Lakshmikanta; Baidya, Krishnapada; Choudhury, Himadri; Roy, Rupam

    2013-06-01

    The purpose of the study was to evaluate the progression of glaucomatous field damage in patients with stable primary open angle glaucoma after an attack of myocardial infarction. In this case control study, 62 open angle glaucoma patients were selected and regularly followed up. Among 62 patients, 9 had an attack of myocardial infarction. The intra-ocular pressure and visual field progression of both the groups (myocardial infarction versus no myocardial infarction) were analysed. Three (33.3%) out of 9 patients who had suffered from myocardial infarction showed progressive visual field loss whereas only 9 (16.9%) out of 53 patients who did not suffer from myocardial infarction, showed progressive field changes. Both the groups had stable target intra-ocular pressure between 14 and 16 mm Hg. Myocardial infarction may adversely influence the progression of primary open angle glaucoma which is suspected to result from ischaemia induced neuronal loss and only control of intraocular pressure is not the only solution. We have to look for other drugs that prevents ischaemia induced neuronal damage.

  4. Electrochemical aspects of copper atmospheric corrosion in the presence of sodium chloride

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schindelholz, Eric John; Cong, Hongbo; Jove-Colon, Carlos F.

    Here, this study describes the evolving state of electrolyte and corrosion processes associated with sodium chloride on copper at the initial stage of corrosion and the critical implications of this behavior on controlling kinetics and damage distributions. Sodium chloride droplets were placed on copper in humid conditions and the resulting electrolyte properties, corrosion products and damage were characterized over time using time-lapse imaging, micro Raman spectroscopy, TOF-SIMS and optical profilometry. Within minutes of NaCl droplet placement, NaOH-rich films resultant from oxygen reduction advanced stepwise from the droplets, leaving behind concentric trenching attack patterns suggestive of moving anode-cathode pairs at themore » alkaline film front. Corrosion attack under these spreading alkaline films was up to 10x greater than under the original NaCl drops. Furthermore, solid Cu 2Cl(OH) 3 shells formed over the surface of the NaCl drops within hours of exposure. Thermodynamic modeling along with immersed electrochemical experiments in simulated droplet and films electrolytes were used to rationalize this behavior and build a description of the rapidly evolving corroding system.« less

  5. Interspecific correlation between red blood cell mitochondrial ROS production, cardiolipin content and longevity in birds.

    PubMed

    Delhaye, Jessica; Salamin, Nicolas; Roulin, Alexandre; Criscuolo, François; Bize, Pierre; Christe, Philippe

    2016-12-01

    Mitochondrial respiration releases reactive oxygen species (ROS) as by-products that can damage the soma and may in turn accelerate ageing. Hence, according to "the oxidative stress theory of ageing", longer-lived organisms may have evolved mechanisms that improve mitochondrial function, reduce ROS production and/or increase cell resistance to oxidative damage. Cardiolipin, an important mitochondrial inner-membrane phospholipid, has these properties by binding and stabilizing mitochondrial inner-membrane proteins. Here, we investigated whether ROS production, cardiolipin content and cell membrane resistance to oxidative attack in freshly collected red blood cells (RBCs) are associated with longevity (range 5-35 years) in 21 bird species belonging to seven Orders. After controlling for phylogeny, body size and oxygen consumption, variation in maximum longevity was significantly explained by mitochondrial ROS production and cardiolipin content, but not by membrane resistance to oxidative attack. RBCs of longer-lived species produced less ROS and contained more cardiolipin than RBCs of shorter-lived species did. These results support the oxidative stress theory of ageing and shed light on mitochondrial cardiolipin as an important factor linking ROS production to longevity.

  6. Matcha, a powdered green tea, ameliorates the progression of renal and hepatic damage in type 2 diabetic OLETF rats.

    PubMed

    Yamabe, Noriko; Kang, Ki Sung; Hur, Jong Moon; Yokozawa, Takako

    2009-08-01

    Matcha, a powdered green tea produced by grinding with a stone mill, has been popularly used in the traditional tea ceremony and foods in Japan. Matcha is well known to be richer in some nutritional elements and epigallocatechin 3-O-gallate than other green teas. In our previous study, epigallocatechin 3-O-gallate exhibited protective effects against renal damage in a rat model of diabetic nephropathy. In the present study, we investigated the preventive effects of Matcha (50, 100, or 200 mg/kg/day) on the progression of hepatic and renal damage in type 2 diabetic Otsuka Long-Evans Tokushima Fatty (OLETF) rats. OLETF rats were orally administered Matcha for 16 weeks, and we assessed biochemical parameters in the serum, liver, and kidney and expression levels of major products of advanced glycation end products (AGEs), N(6)-(carboxylmethyl)lysine (CML) and N(6)-(carboxylethyl)lysine (CEL), receptor for AGE (RAGE), and sterol regulatory element binding proteins (SREBPs)-1 and -2. Serum total protein levels were significantly increased by Matcha administration, whereas the serum albumin and glycosylated protein levels as well as the renal glucose and triglyceride levels were only slightly or not at all affected. However, Matcha treatment significantly lowered the glucose, triglyceride, and total cholesterol levels in the serum and liver, renal AGE levels, and the serum thiobarbituric acid-reactive substances levels. In addition, Matcha supplementation resulted in decreases in the renal CML, CEL, and RAGE expressions as well as an increase in hepatic SREBP-2 expression, but not that of SREBP-1. These results suggest that Matcha protects against hepatic and renal damage through the suppression of renal AGE accumulation, by decreases in hepatic glucose, triglyceride, and total cholesterol levels, and by its antioxidant activities.

  7. Diphenylmethyl selenocyanate attenuates malachite green induced oxidative injury through antioxidation & inhibition of DNA damage in mice

    PubMed Central

    Das, Jayanta Kumar; Sarkar, Sibani; Hossain, Sk Ugir; Chakraborty, Pramita; Das, Rajat Kumar; Bhattacharya, Sudin

    2013-01-01

    Background & objectives: Malachite green (MG), an environmentally hazardous material, is used as a non permitted food colouring agent, especially in India. Selenium (Se) is an essential nutritional trace element required for animals and humans to guard against oxidative stress induced by xenobiotic compounds of diverse nature. In the present study, the role of the selenium compound diphenylmethyl selenocyanate (DMSE) was assessed on the oxidative stress (OS) induced by a food colouring agent, malachite green (MG) in vivo in mice. Methods: Swiss albino mice (Mus musculus) were intraperitoneally injected with MG at a standardized dose of 100 μg/ mouse for 30 days. DMSE was given orally at an optimum dose of 3 mg/kg b.w. in pre (15 days) and concomitant treatment schedule throughout the experimental period. The parameters viz. ALT, AST, LPO, GSH, GST, SOD, CAT, GPx, TrxR, CA, MN, MI and DNA damage have been evaluated. Results: The DMSE showed its potential to protect against MG induced hepatotoxicity by controlling the serum alanine aminotransferase and aspartate amino transferase (ALT and AST) levels and also ameliorated oxidative stress by modulating hepatic lipid peroxidation and different detoxifying and antioxidative enzymes such as glutathione-S-transferase (GST), superoxide dismutase (SOD), catalase (CAT), and also the selenoenzymes such as glutathione peroxidase (GPx) and thioredoxin reductase (TrxR) and reduced glutathione level which in turn reduced DNA damage. Interpretation & conclusions: The organo-selenium compound DMSE showed significant protection against MG induced heptotoxicity and DNA damage in murine model. Better protection was observed in pretreatment group than in the concomitant group. Further studies need to be done to understand the mechanism of action. PMID:23852297

  8. Specificity of induced defenses, growth, and reproduction in lima bean (Phaseolus lunatus) in response to multispecies herbivory.

    PubMed

    Moreira, Xoaquín; Abdala-Roberts, Luis; Hernández-Cumplido, Johnattan; Cuny, Maximilien A C; Glauser, Gaetan; Benrey, Betty

    2015-08-01

    • Following herbivore attack, plants can either reduce damage by inducing defenses or mitigate herbivory effects through compensatory growth and reproduction. It is increasingly recognized that such induced defenses in plants are herbivore-specific, but less is known about the specificity of compensatory responses. Damage by multiple herbivores may also lead to synergistic effects on induction and plant fitness that differ from those caused by a single herbivore species. Although largely unstudied, the order of arrival and damage by different herbivore species might also play an important role in the impacts of herbivory on plants.• We investigated the specificity of defense induction (phenolics) and effects on growth (number of stems and leaves) and reproduction (number of seeds, seed mass, and germination rate) from feeding by two generalist leaf-chewing herbivores (Spodoptera eridania and Diabrotica balteata) on Phaseolus lunatus plants and evaluated whether simultaneous attack by both herbivores and their order of arrival influenced such dynamics.• Herbivory increased levels of leaf phenolics, but such effects were not herbivore-specific. In contrast, herbivory enhanced seed germination in an herbivore-specific manner. For all variables measured, the combined effects of both herbivore species did not differ from their individual effects. Finally, the order of herbivore arrival did not influence defense induction, plant growth, or seed number but did influence seed mass and germination.• Overall, this study highlights novel aspects of the specificity of plant responses induced by damage from multiple species of herbivores and uniquely associates such effects with plant lifetime fitness. © 2015 Botanical Society of America, Inc.

  9. Time course of oxidative stress, inflammation and muscle damage markers for five days after a soccer match: effects of sex and playing position.

    PubMed

    Souglis, Athanasios; Bogdanis, Gregory C; Chryssanthopoulos, Costas; Apostolidis, Nikolaos; Geladas, Nikos D

    2018-01-03

    This study examined the influence of sex and playing position on the time-course of selected oxidative stress, inflammation and muscle damage markers following an official soccer match. Sixty professional soccer players (30 male and 30 female) were divided into three groups, according to their playing position: defenders, midfielders and attackers. Each group consisted of 10 male and 10 female players. Sixty healthy volunteers (30 males and 30 females) served as control. Blood samples were taken before and after the match and daily for five days after the match. Analysis of variance revealed different responses over time between sex and playing positions, as shown by the 3-way interaction, for creatine kinase (CK), protein carbonyls (PC), catalase, fibrinogen (FIB), uric acid (UA), lactate dehydrogenase (LDH), reduced glutathione, C-reactive protein and interleukin-6 (IL-6) (p < 0.01).Male players had higher values compared with females of the same playing position, for all oxidative, inflammatory and muscle damage indices (p<0.01). Also, in both sexes, midfielders had higher peaks in all indices compared with defenders (p < 0.05). Five days after the game CK and UA concentrations had not returned to pre-game levels in any exercise group, whereas PC were still elevated in male midfielders and attackers (p < 0.05).These results show that sex and playing position influence the time-course of selected oxidative stress, inflammation and muscle damage markers following an official soccer game. This information should be taken into account by practitioners for the design of training programs following match play.

  10. Detection of macroalgae blooms by complex SAR imagery.

    PubMed

    Shen, Hui; Perrie, William; Liu, Qingrong; He, Yijun

    2014-01-15

    Increased frequency and enhanced damage to the marine environment and to human society caused by green macroalgae blooms demand improved high-resolution early detection methods. Conventional satellite remote sensing methods via spectra radiometers do not work in cloud-covered areas, and therefore cannot meet these demands for operational applications. We present a methodology for green macroalgae bloom detection based on RADARSAT-2 synthetic aperture radar (SAR) images. Green macroalgae patches exhibit different polarimetric characteristics compared to the open ocean surface, in both the amplitude and phase domains of SAR-measured complex radar backscatter returns. In this study, new index factors are defined which have opposite signs in green macroalgae-covered areas, compared to the open water surface. These index factors enable unsupervised detection from SAR images, providing a high-resolution new tool for detection of green macroalgae blooms, which can potentially contribute to a better understanding of the mechanisms related to outbreaks of green macroalgae blooms in coastal areas throughout the world ocean. Crown Copyright © 2013. Published by Elsevier Ltd. All rights reserved.

  11. Risk of herbivore attack and heritability of ontogenetic trajectories in plant defense.

    PubMed

    Ochoa-López, Sofía; Rebollo, Roberto; Barton, Kasey E; Fornoni, Juan; Boege, Karina

    2018-06-01

    Ontogeny has been identified as a main source of variation in the expression of plant phenotypes. However, there is limited information on the mechanisms behind the evolution of ontogenetic trajectories in plant defense. We explored if risk of attack, herbivore damage, heritability, and phenotypic plasticity can promote or constrain the evolutionary potential of ontogenetic trajectories in three defensive traits. We exposed 20 genotypes of Turnera velutina to contrasting environments (shadehouse and field plots), and measured the cyanogenic potential, trichome density, and sugar content in extrafloral nectar in seedlings, juveniles and reproductive plants. We also assessed risk of attack through oviposition preferences, and quantified herbivore damage in the field. We estimated genetic variance, broad sense heritability, and evolvability of the defensive traits at each ontogenetic stage, and of the ontogenetic trajectories themselves. For plants growing in the shadehouse, we found genetic variation and broad sense heritability for cyanogenic potential in seedlings, and for trichome density at all ontogenetic stages. Genetic variation and heritability of ontogenetic trajectories was detected for trichome density only. These genetic pre-requisites for evolution, however, were not detected in the field, suggesting that environmental variation and phenotypic plastic responses mask any heritable variation. Finally, ontogenetic trajectories were found to be plastic, differing between shadehouse and field conditions for the same genetic families. Overall, we provide support for the idea that changes in herbivore pressure can be a mechanism behind the evolution of ontogenetic trajectories. This evolutionary potential, however, can be constrained by phenotypic plasticity expressed in heterogeneous environments.

  12. Carambola Cultivar, Fruit Ripeness, and Damage by Conspecific Larvae Influence the Host-Related Behaviors of Anastrepha obliqua (Diptera: Tephritidae).

    PubMed

    López-Ley, Jorge Ulises; Toledo, Jorge; Malo, Edi A; Gomez, Jaime; Santiesteban, Antonio; Rojas, Julio C

    2016-02-01

    In this study, we investigated the influence of cultivar type, fruit ripeness, and damage by conspecific larvae on the attraction of Anastrepha obliqua (Macquart) (Diptera: Tephritidae) to and oviposition on carambola fruit (Averroha carambola L.). The attraction of both sexes of A. obliqua to fruit of different quality was evaluated through cage experiments in the field, and the oviposition preferences of mated females were examined in laboratory tests. Both sexes, mated or virgin, were more attracted to the "Maha" fruit than to the "Golden Star" fruit, and the females oviposited more frequently on the Maha cultivar than the Golden Star cultivar. Both sexes were more attracted to ripe and half-ripe Maha fruits than to mature green fruit, and although females did not show a preference for ovipositing on half-ripe or ripe fruits, they did not oviposit on mature green fruits. Males did not show a preference for the volatiles from uninfested, artificially damaged, or infested Maha fruits, but females were more attracted to uninfested fruits than to artificially damaged and infested Maha fruits. Furthermore, females preferred to oviposit on uninfested fruits compared with artificially damaged fruit, and they did not oviposit on infested fruits. © The Authors 2015. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Eccentric localization of catalase to protect chromosomes from oxidative damages during meiotic maturation in mouse oocytes.

    PubMed

    Park, Yong Seok; You, Seung Yeop; Cho, Sungrae; Jeon, Hyuk-Joon; Lee, Sukchan; Cho, Dong-Hyung; Kim, Jae-Sung; Oh, Jeong Su

    2016-09-01

    The maintenance of genomic integrity and stability is essential for the survival of every organism. Unfortunately, DNA is vulnerable to attack by a variety of damaging agents. Oxidative stress is a major cause of DNA damage because reactive oxygen species (ROS) are produced as by-products of normal cellular metabolism. Cells have developed eloquent antioxidant defense systems to protect themselves from oxidative damage along with aerobic metabolism. Here, we show that catalase (CAT) is present in mouse oocytes to protect the genome from oxidative damage during meiotic maturation. CAT was expressed in the nucleus to form unique vesicular structures. However, after nuclear envelope breakdown, CAT was redistributed in the cytoplasm with particular focus at the chromosomes. Inhibition of CAT activity increased endogenous ROS levels, but did not perturb meiotic maturation. In addition, CAT inhibition produced chromosomal defects, including chromosome misalignment and DNA damage. Therefore, our data suggest that CAT is required not only to scavenge ROS, but also to protect DNA from oxidative damage during meiotic maturation in mouse oocytes.

  14. Interwar Period Leavenworth Student Papers: Perceptions of Airpower and Implications Regarding Effectiveness of the Leavenworth Schools

    DTIC Science & Technology

    2014-06-13

    of War (London: Kegan Paul, Trench, Trubner and Co., 1925); William C. Sherman, Air Warfare (2002; repr., Honolulu: University Press of the Pacific...and 107. 47Rawlinson, 205. 48Edward Ashmore, Air Defence (London: Longmans, Green and Co., 1929), 144- 155. 49See Appendix C. 50Giulio Douhet, The...attack. 73Ibid., 110. 74Ibid., 112-113. 75Ibid., 114-116. 76Basil H. Liddell Hart, Paris: Or, The Future of War (London: Kegan Paul, Trench

  15. Oxide glass used as inorganic template for fluorescent fluoride nanoparticles synthesis

    NASA Astrophysics Data System (ADS)

    Mortier, Michel; Patriarche, Gilles

    2006-09-01

    We report an original way to synthesise single-crystal PbF 2 nanoparticles by selective chemical attack of a bulk nanocomposite oxyfluoride glass-ceramic. Free of impurities and homogeneously doped with Er 3+ ions, the particles are of narrow size dispersion around 15 nm and weakly aggregated. The nanocrystallites emit a very intense green and blue up conversion fluorescence after infrared excitation. The doping level and the size of the particles is finely driven through the precursor glass-ceramic synthesis and composition.

  16. Adverse effects of concentrated green tea extracts.

    PubMed

    Schönthal, Axel H

    2011-06-01

    A myriad of health claims are being made in favor of the consumption of green tea. However, mostly due to the easy availability and greater than ever popularity of highly concentrated green tea extracts, sometimes combined with an attitude of more-is-better, certain health risks of green tea consumption have begun to emerge. Among such risks are the possibility of liver damage, the potential to interact with prescription drugs to alter their therapeutic efficacy, and the chance to cause harm when combined with other highly popular herbal remedies. This review will summarize documented examples of adverse effects of green tea in humans, and will discuss risks of copious consumption of highly concentrated green tea extracts as indicated by studies in animals. While there is no intention to minimize any of the scientifically established benefits of the use of green tea, the purpose of this review is to focus primarily on the potential for adverse effects and raise awareness of the rare, yet under-appreciated risks. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  17. Irreversible impacts of heat on the emissions of monoterpenes, sesquiterpenes, phenolic BVOC and green leaf volatiles from several tree species

    NASA Astrophysics Data System (ADS)

    Kleist, E.; Mentel, T. F.; Andres, S.; Bohne, A.; Folkers, A.; Kiendler-Scharr, A.; Rudich, Y.; Springer, M.; Tillmann, R.; Wildt, J.

    2012-12-01

    Climate change will induce extended heat waves to parts of the vegetation more frequently. High temperatures may act as stress (thermal stress) on plants changing emissions of biogenic volatile organic compounds (BVOCs). As BVOCs impact the atmospheric oxidation cycle and aerosol formation, it is important to explore possible alterations of BVOC emissions under high temperature conditions. Applying heat to European beech, Palestine oak, Scots pine, and Norway spruce in a laboratory setup either caused the well-known exponential increases of BVOC emissions or induced irreversible changes of BVOC emissions. Considering only irreversible changes of BVOC emissions as stress impacts, we found that high temperatures decreased the de novo emissions of monoterpenes, sesquiterpenes and phenolic BVOC. This behaviour was independent of the tree species and whether the de novo emissions were constitutive or induced by biotic stress. In contrast, application of thermal stress to conifers amplified the release of monoterpenes stored in resin ducts of conifers and induced emissions of green leaf volatiles. In particular during insect attack on conifers, the plants showed de novo emissions of sesquiterpenes and phenolic BVOCs, which exceeded constitutive monoterpene emissions from pools. The heat-induced decrease of de novo emissions was larger than the increased monoterpene release caused by damage of resin ducts. For insect-infested conifers the net effect of thermal stress on BVOC emissions could be an overall decrease. Global change-induced heat waves may put hard thermal stress on plants. If so, we project that BVOC emissions increase is more than predicted by models only in areas predominantly covered with conifers that do not emit high amounts of sesquiterpenes and phenolic BVOCs. Otherwise overall effects of high temperature stress will be lower increases of BVOC emissions than predicted by algorithms that do not consider stress impacts.

  18. Defense Priming and Jasmonates: A Role for Free Fatty Acids in Insect Elicitor-Induced Long Distance Signaling

    PubMed Central

    Li, Ting; Cofer, Tristan; Engelberth, Marie; Engelberth, Jurgen

    2016-01-01

    Green leaf volatiles (GLV) prime plants against insect herbivore attack resulting in stronger and faster signaling by jasmonic acid (JA). In maize this response is specifically linked to insect elicitor (IE)-induced signaling processes, which cause JA accumulation not only around the damage site, but also in distant tissues, presumably through the activation of electrical signals. Here, we present additional data further characterizing these distal signaling events in maize. Also, we describe how exposure to GLV increases free fatty acid (fFA) levels in maize seedlings, but also in other plants, and how increased fFA levels affect IE-induced JA accumulation. Increased fFA, in particular α-linolenic acid (LnA), caused a significant increase in JA accumulation after IE treatment, while JA induced by mechanical wounding (MW) alone was not affected. We also identified treatments that significantly decreased certain fFA level including simulated wind and rain. In such treated plants, IE-induced JA accumulation was significantly reduced when compared to un-moved control plants, while MW-induced JA accumulation was not significantly affected. Since only IE-induced JA accumulation was altered by changes in the fFA composition, we conclude that changing levels of fFA affect primarily IE-induced signaling processes rather than serving as a substrate for JA. PMID:27135225

  19. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingsley, Mark T.

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysismore » of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, and analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: 1) to assess the potential terrorist threat to U.S. agricultural crops, 2) to determine whether suitable assays exist to monitor that threat, and 3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.« less

  20. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingsley, Mark T

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysismore » of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, an d analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: (1) to assess the potential terrorist threat to U.S. agricultural crops, (2) to determine whether suitable assays exist to monitor that threat, and (3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.« less

  1. On the presence of five species of naupactini (Coleoptera: Curculionidae) damaging soybean in Brazil.

    PubMed

    Lanteri, A A; Bigolin, M; del Río, M G; Guedes, J V C

    2013-06-01

    We report five broad-nosed weevils of the tribe Naupactini, Naupactus leucoloma Boheman, Naupactus minor (Buchanan), Naupactus peregrinus (Buchanan), Naupactus tremolerasi Hustache and Pantomorus viridisquamosus (Boheman) (Coleoptera: Curculionidae) damaging soybean plants in the state of Rio Grande do Sul, Brazil. Some of these species are recorded for the first time in Brazil, and they all belong to species groups naturally distributed in the prairies of southern Brazil, Uruguay, Central Argentina and Paraguay. Three of them have been introduced, established and expanded in other countries outside South America. The five species in conjunction with other native species of Naupactini could cause severe damages to soybean crops if the root-feeding larvae attack young growing plants.

  2. A Study on the Rural Residence in the Northern Area of Zhejiang Province from the Perspective of Green Living Environment

    NASA Astrophysics Data System (ADS)

    Wang, J.; Gao, W. J.; Wang, C.

    2018-05-01

    At present, owing to the rapid development of rural construction, it lacks corresponding theories and practices and damages to the features of rural area, ignoring the geography, suitability and green living environment factors. The research selects rural residence as the object, defining “courtyard” as the basic unit for rural residence. It utilizes the principle of topology as the expanding media, by the method of principle of cellular structure and green living environment design strategy. The essay establishes the design and construction system of “rural basic unit”, combining functions and structures, prototype menu, chamber space and compound interface, from the perspective of green living environment. It aims to guide rural construction and protect the ruralliving environment.

  3. Green commercial building insurance in Malaysia

    NASA Astrophysics Data System (ADS)

    Yang, Yu Xin Ou; Chew, Boon Cheong; Loo, Heoy Shin; Tan, Lay Hong

    2017-03-01

    Green building construction is growing tremendously globally even in Malaysia. Currently, there are approximate 636 buildings have registered and to be certified with Green Building Index. Among these buildings, 45 buildings have already fulfilled the requirements and fully certified. The other buildings still under provisional certification stage. Malaysia had adopted Green Building Index in 2009 to support a move to promote green building concept. Malaysia starts to move towards green building because Malaysian construction and building industry realizes that both energy consumed and waste produced are reduced without irreversible impacts to ecosystems. Consequently, insurance companies such as Fireman's Fund from America has started the green building insurance policies for their green building in the year of 2006, while Malaysia still remain the coverage for green buildings using conventional property insurance. There are lacks of efforts to be seen from insurance companies to propose green building insurance for these green buildings. There are a few factors which can take into consideration for insurance companies to start the very first green building insurance in Malaysia. Although there are challenges, some efficient strategies have been identified to overcome the problems. The methods used in this research topic is qualitative research. The results obtained shows that green commercial building insurance has a huge business opportunity in Malaysia because the number of green commercial buildings are increasing tremendously in Malaysia. It is a favor to implement green building insurance in Malaysia. Furthermore, insurance companies can consider to add in extra coverage in standard building policy to provide extra protection for non-certified green buildings which have the intention to rebuilt in green when damage happens. Generally, it is very important to introduce green commercial buildings insurance into Malaysia so that all of the green commercial buildings can be fully covered.

  4. Acid violence: a burning issue of Bangladesh--its medicolegal aspects.

    PubMed

    Begum, Anowar Ara

    2004-12-01

    Throwing acid on others' face and body to cause grievous injuries is a barbaric act of vengeance. For the last few years, it has been on the rise in both urban and rural areas of Bangladesh. The perpetrators are mostly men and adolescent boys. The victims are girls and young females. The reasons for attacks are sexual advances from man, refusal of marriage proposal, and vengeance. Cheap and easy availability of acids makes it the most effective weapon for man to use against girls' or young women's faces to prove that they have no right to deny a man's proposal and is one of the extreme forms of repression and violation of women's right. The consequence of acid attacks on survivors brings dramatic change in their lifestyle. Most of them have to give up their education or work. Social isolation, fear of further attacks, and insecurity damage their self-esteem and confidence. Illiteracy, poverty, threats to further retribution, and ignorance about legal support increase their miseries. Gradual increase of acid attacks suggests that legal provisions and their enforcement are not adequate and effective. Social awareness, economic and psychologic support, rehabilitation, and strict enforcement of laws are key to combat acid violence in Bangladesh.

  5. Network traffic anomaly prediction using Artificial Neural Network

    NASA Astrophysics Data System (ADS)

    Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea

    2017-03-01

    As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.

  6. Effects of green tea tannin on cisplatin-induced nephropathy in LLC-PK1 cells and rats.

    PubMed

    Yokozawa, T; Nakagawa, T; Lee, K I; Cho, E J; Terasawa, K; Takeuchi, S

    1999-11-01

    A study was conducted to clarify whether green tea tannin ameliorated cisplatin-induced renal injury in terms of lactate dehydrogenase and malondialdehyde leakage from a renal epithelial cell line, swine-derived LLC-PK1 cells in culture. Green tea tannin was shown to suppress the cytotoxicity of cisplatin, the suppressive effect increasing with the dose of green tea tannin. The effect of cisplatin was then investigated in rats given green tea tannin for 40 days before cisplatin administration and in control rats given no green tea tannin. In control rats, blood, urinary and renal parameters and the activities of antioxidative enzymes in renal tissue deviated from the normal range, indicating dysfunction of the kidneys. In contrast, rats given green tea tannin showed decreased blood levels of urea nitrogen and creatinine, and decreased urinary levels of protein and glucose, reflecting less damage to the kidney. In this group, the activity of catalase in the renal tissue was increased, while the level of malondialdehyde was decreased, suggesting the involvement of radicals in the normalizing of kidney function. Based on the evidence available it appeared that green tea tannin eliminated oxidative stress and was beneficial to renal function.

  7. [Role of green tea in oxidative stress prevention].

    PubMed

    Metro, D; Muraca, U; Manasseri, L

    2006-01-01

    Oxidative stress is a condition caused by an increase of Reactive Oxygen Species (ROS) or by a shortage of the mechanisms of cellular protection and antioxidant defence. ROS have a potential oxidative effect towards various cellular macromolecules: proteins, nucleic acids, proteoglycans, lipids, with consequent damages in several cellular districts and promotion of the ageing process of the organism. However, some substances are able to prevent and/or reduce the damages caused by ROS; therefore, they are defined antioxidant. The present research studied, in a group of subjects, the antioxidant effects of the green tea, that was administered with fruit and vegetables in a strictly controlled diet. 50 subjects were selected and requested to daily consume 2-3 fruit portions (especially pineapple), 3-5 portions of vegetables (especially tomato) and 2-3 glasses of green tea for about 2 months to integrate the controlled basic diet. Some indicators of the oxidative stress were measured in the plasma before and after the integration period. The integration of a basic diet with supplements of fruit, vegetables and green tea turned out to be able in increasing both plasmatic total antioxidant capacity and endogenous antioxidant levels and to reduce the lipid peroxidation of the membranes, suggesting a reduction of the oxidative stress. These data suggest that an adequate supplement of antioxidants can prevent oxidative stress and correlated pathologies.

  8. Salvaging and Conserving Water Damaged Photographic Materials

    NASA Astrophysics Data System (ADS)

    Suzuki, Ryuji

    Degradation of water damaged photographic materials is discussed; the most vulnerable elements are gelatin layers and silver image. A simple and inexpensive chemical treatment is proposed, consisting of a bath containing a gelatin-protecting biocide and a silver image protecting agent. These ingredients were selected among those used in manufacturing of silver halide photographic emulsions or processing chemicals. Experiments confirmed that this treatment significantly reduced oxidative attacks to silver image and bacterial degradation of gelatin layers. The treated material was also stable under intense light fading test. Method of hardening gelatin to suppress swelling is also discussed.

  9. Adaptation of the Levee Erosional Equivalence Method for the Hurricane Storm Damage Risk Reduction System (HSDRRS)

    DTIC Science & Technology

    2011-05-01

    ER D C/ CH L TR -1 1- 3 Flood and Coastal Storm Damage Reduction R& D Program Adaptation of the Levee Erosional Equivalence Method for the...of vertical wall [-] γw Specific weight of water [kN/m3] γβ Reduction factor for influence of angle of wave attack [-] θ Landward-side levee ...stress multiplied by the flow velocity. Thus, from Equation (4) stream power has the form ERDC/CHL TR-11-3 9 S o D D dW P τ u ρ f u u ρ f u dt

  10. 7 CFR 51.3209 - Damage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... allowed on smaller or larger onions; (d) Sunburn when dark green in color and affecting an area equivalent... in a white lot are appreciably stained. Onions with adhering dirt or other foreign matter shall be...

  11. 7 CFR 51.3209 - Damage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... allowed on smaller or larger onions; (d) Sunburn when dark green in color and affecting an area equivalent... in a white lot are appreciably stained. Onions with adhering dirt or other foreign matter shall be...

  12. Cationic Organochalcogen with Monomer/Excimer Emissions for Dual-Color Live Cell Imaging and Cell Damage Diagnosis.

    PubMed

    Chao, Xi-Juan; Wang, Kang-Nan; Sun, Li-Li; Cao, Qian; Ke, Zhuo-Feng; Cao, Du-Xia; Mao, Zong-Wan

    2018-04-25

    Studies on the development of fluorescent organic molecules with different emission colors for imaging of organelles and their biomedical application are gaining lots of focus recently. Here, we report two cationic organochalcogens 1 and 2, both of which exhibit very weak green emission (Φ 1 = 0.12%; Φ 2 = 0.09%) in dilute solution as monomers, but remarkably enhanced green emission upon interaction with nucleic acids and large red-shifted emission in aggregate state by the formation of excimers at high concentration. More interestingly, the monomer emission and excimer-like emission can be used for dual color imaging of different organelles. Upon passively diffusing into cells, both probes selectively stain nucleoli with strong green emission upon 488 nm excitation, whereas upon 405 nm excitation, a completely different stain pattern by staining lysosomes (for 1) or mitochondria (for 2) with distinct red emission is observed because of the highly concentrated accumulation in these organelles. Studies on the mechanism of the accumulation in lysosomes (for 1) or mitochondria (for 2) found that the accumulations of the probes are dependent on the membrane permeabilization, which make the probes have great potential in diagnosing cell damage by sensing lysosomal or mitochondrial membrane permeabilization. The study is demonstrative, for the first time, of two cationic molecules for dual-color imaging nucleoli and lysosomes (1)/mitochondria (2) simultaneously in live cell based on monomer and excimer-like emission, respectively, and more importantly, for diagnosing cell damage.

  13. Assessment of damage in 'green' composites

    NASA Astrophysics Data System (ADS)

    Malinowski, Paweł H.; Ostachowicz, Wiesław M.; Touchard, Fabienne; Boustie, Michel; Chocinski-Arnault, Laurence; Pascual Gonzalez, Pedro; Berthe, Laurent; de Vasconcellos, Davi; Sorrentino, Luigi

    2017-04-01

    The behaviour of eco-composites, when subjected to laser or mechanical impact loadings, is not well known yet. A research was proposed looking at the behaviour of `green' and synthetic composites under impact loading. The study was focused on composites reinforced with short, medium and long fibres. Short fibre composites were made of spruce fibres and ABS. The fibres were used both as received and after a thermal treatment. Another set of samples was made of 60 mm-long flax fibres. Two types of thermoplastic polymers were used as matrices: polypropylene and polylactide. Also a woven eco-composite was investigated. It was made of plain woven hemp fabric impregnated with epoxy resin. A fully synthetic woven composite, used as reference laminate for comparison with `green' composites, was prepared by using a plain weave woven glass fabric impregnated with epoxy resin. Mechanical impacts were performed by means of a falling dart impact testing machine. The specimens were tested at different impact energy levels (from 1J to 5J) by keeping constant the mass of the impactor and varying the drop height. Laser impact tests were performed by means of a high power laser shock facility. All the samples were tested at six different laser shock intensities, keeping constant the shock diameter and the pulse duration. Six assessment techniques were employed in order to analyse and compare impact damages: eye observation, back face relief, terahertz spectroscopy, laser vibrometry, X-ray micro-tomography and microscopic observations. Different damage detection thresholds for each material and technique were obtained.

  14. Maple River Subbasin, Red River of the North Reconnaissance Report.

    DTIC Science & Technology

    1980-12-01

    slopes are steepest, sheet and gully erosion occurs. This sometimes causes drainage fills and, in some cases, covering of crops . Damages from...which covers all natural disasters including floods. However, actual crop damages could be reduced only to the extent that intensive farming practices...within the subbasin. 8. The potentiality for land treatment measures (e.g., erosion control measures such as cover crops , green belts, reduction in

  15. Inhibition of termite damage by N`N-napthaloylhydroxyamine (NHA) : Reticulotermes flavipes (Kollar) vs. Coptotermes formosanus Shiraki

    Treesearch

    Frederick Green; Stan Lebow; Tsuyoshi Yoshimura

    2000-01-01

    The calcium precipitating agent NHA has been shown to protect southern yellow pine (SYP) from wood decay and termite damage comparable to CCA in field tests (Gulfport, MS) for two years (Crawford and Green, 1999). In a collaborative study, SYP wood blocks were vacuum treated with three concentrations of aqueous NHA and exposed in a no-choice test to Eastern...

  16. Indocyanine green video angiography predicts outcome of extravasation injuries.

    PubMed

    Haslik, Werner; Pluschnig, Ursula; Steger, Günther G; Zielinski, Christoph C; Schrögendorfer, K F; Nedomansky, Jakob; Bartsch, Rupert; Mader, Robert M

    2014-01-01

    Extravasation of cytotoxic drugs is a serious complication of systemic cancer treatment. Still, a reliable method for early assessment of tissue damage and outcome prediction is missing. Here, we demonstrate that the evaluation of blood flow by indocyanine green (ICG) angiography in the extravasation area predicts for the need of surgical intervention. Twenty-nine patients were evaluated by ICG angiography after extravasation of vesicant or highly irritant cytotoxic drugs administered by peripheral i.v. infusion. Tissue perfusion as assessed by this standardized method was correlated with clinical outcome. The perfusion index at the site of extravasation differed significantly between patients with reversible tissue damage and thus healing under conservative management (N = 22) versus those who needed surgical intervention due to the development of necrosis (N = 7; P = 0.0001). Furthermore, in patients benefiting from conservative management, the perfusion index was significantly higher in the central extravasation area denoting hyperemia, when compared with the peripheral area (P = 0.0001). In this patient cohort, ICG angiography as indicator of local perfusion within the extravasation area was of prognostic value for tissue damage. ICG angiography could thus be used for the early identification of patients at risk for irreversible tissue damage after extravasation of cytotoxic drugs.

  17. Genoprotective effects of green tea (Camellia sinensis) in human subjects: results of a controlled supplementation trial.

    PubMed

    Han, K C; Wong, W C; Benzie, Iris F F

    2011-01-01

    Green tea is rich in polyphenolic antioxidants and has widely reported but largely unsubstantiated health benefits. In the present study, genoprotective effects of two types of green tea were studied both in an in vitro and in a human supplementation trial. For the in vitro study, human lymphocytes were pre-incubated in tea (0·005-0·1 %, w/v), washed and subjected to oxidant challenge induced by H2O2. In a placebo-controlled, cross-over supplementation study, eighteen healthy volunteers took 2 x 150 ml/d of 1% (w/v) green tea ('Longjing' green tea or 'screw-shaped' green tea) or water (control) for 4 weeks (n 6). Subjects took all the three treatments in a random order, with 6 weeks' washout between each treatment. Fasting blood and urine were collected before and after each treatment. The comet assay was used to measure the resistance of lymphocytic DNA to H2O2-induced challenge. Basal oxidation-induced DNA damage was measured using the formamidopyrimidine glycosylase (Fpg) enzyme-assisted comet assay. Urine 7,8-dihydro-2-deoxyguanosine (8-oxodG, mol/mmol creatinine), a biomarker of whole-body oxidative stress, was measured by liquid chromatography with tandem MS. In vitro testing results of tea-treated cells showed increased (P < 0·05) resistance of DNA to the challenge. In the supplementation trial, a significant (P < 0·05) increase in resistance was also observed. Furthermore, the FPg comet data showed .20% decrease in DNA damage with tea supplementation: mean and standard deviation changes in %DNA in comet tail in the Fpg-assisted comet assay were: -5·96 (SD 3·83) % after Longjing tea; -6·22 (SD 3·34) % after screw-shaped tea; +0·91 (SD 5·79) % after water (P < 0·05). No significant changes in urine 8-oxodG were seen. The results indicate that green tea has significant genoprotective effects and provide evidence for green tea as a 'functional food'.

  18. Socioeconomic Inequalities in Green Space Quality and Accessibility—Evidence from a Southern European City

    PubMed Central

    Hoffimann, Elaine; Barros, Henrique; Ribeiro, Ana Isabel

    2017-01-01

    Background: The provision of green spaces is an important health promotion strategy to encourage physical activity and to improve population health. Green space provision has to be based on the principle of equity. This study investigated the presence of socioeconomic inequalities in geographic accessibility and quality of green spaces across Porto neighbourhoods (Portugal). Methods: Accessibility was evaluated using a Geographic Information System and all the green spaces were audited using the Public Open Space Tool. Kendall’s tau-b correlation coefficients and ordinal regression were used to test whether socioeconomic differences in green space quality and accessibility were statistically significant. Results: Although the majority of the neighbourhoods had an accessible green space, mean distance to green space increased with neighbourhood deprivation. Additionally, green spaces in the more deprived neighbourhoods presented significantly more safety concerns, signs of damage, lack of equipment to engage in active leisure activities, and had significantly less amenities such as seating, toilets, cafés, etc. Conclusions: Residents from low socioeconomic positions seem to suffer from a double jeopardy; they lack both individual and community resources. Our results have important planning implications and might contribute to understanding why deprived communities have lower physical activity levels and poorer health. PMID:28809798

  19. A comprehensive Network Security Risk Model for process control networks.

    PubMed

    Henry, Matthew H; Haimes, Yacov Y

    2009-02-01

    The risk of cyber attacks on process control networks (PCN) is receiving significant attention due to the potentially catastrophic extent to which PCN failures can damage the infrastructures and commodity flows that they support. Risk management addresses the coupled problems of (1) reducing the likelihood that cyber attacks would succeed in disrupting PCN operation and (2) reducing the severity of consequences in the event of PCN failure or manipulation. The Network Security Risk Model (NSRM) developed in this article provides a means of evaluating the efficacy of candidate risk management policies by modeling the baseline risk and assessing expectations of risk after the implementation of candidate measures. Where existing risk models fall short of providing adequate insight into the efficacy of candidate risk management policies due to shortcomings in their structure or formulation, the NSRM provides model structure and an associated modeling methodology that captures the relevant dynamics of cyber attacks on PCN for risk analysis. This article develops the NSRM in detail in the context of an illustrative example.

  20. Loss-tolerant measurement-device-independent quantum private queries

    PubMed Central

    Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2017-01-01

    Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors. PMID:28051101

  1. The United States should forego a damage-limitation capability against China

    NASA Astrophysics Data System (ADS)

    Glaser, Charles L.

    2017-11-01

    Bottom Lines • THE KEY STRATEGIC NUCLEAR CHOICE. Whether to attempt to preserve its damage-limitation capability against China is the key strategic nuclear choice facing the United States. The answer is much less clear-cut than when the United States faced the Soviet Union during the Cold War. • FEASIBILITY OF DAMAGE LIMITATION. Although technology has advanced significantly over the past three decades, future military competition between the U.S. and Chinese forces will favor large-scale nuclear retaliation over significant damage limitation. • BENEFITS AND RISKS OF A DAMAGE-LIMITATION CAPABILITY. The benefits provided by a modest damage-limitation capability would be small, because the United States can meet its most important regional deterrent requirements without one. In comparison, the risks, which include an increased probability of accidental and unauthorized Chinese attacks, as well as strained U.S.—China relations, would be large. • FOREGO DAMAGE LIMITATION. These twin findings—the poor prospects for prevailing in the military competition, and the small benefits and likely overall decrease in U.S. security—call for a U.S. policy that foregoes efforts to preserve or enhance its damage-limitation capability.

  2. Biochemical and pharmacological characterization of Trimersurus malabaricus snake venom.

    PubMed

    Gowda, Raghavendra; Rajaiah, Rajesh; Angaswamy, Nataraj; Krishna, Sharath; Bannikuppe Sannanayak, Vishwanath

    2018-07-01

    Trimeresurus malabaricus is a venomous pit viper species endemic to southwestern part of India. In earlier reports, we have shown that envenomation by T. malabaricus venom leading to strong local tissue damage but the mechanism of action is not clearly revealed. Local tissue damage affected by T. malabaricus venom is of great importance since the poison has serious systemic effects including death in the case of multiple attacks. The present study details the major manifestations of T. malabaricus venom and the induction of local tissue damage, which suggests that most toxins are present in the form of hydrolytic enzymes. Hydrolytic activity of the enzymes was measured and the data indicated that protease and phospholipase A 2 activity was high which is responsible for local tissue damage. Furthermore, the role of hydrolytic enzymes in the induction of pathological events such as hemorrhage, edema, myotoxicity, and blood coagulation examination were assessed through animal models. © 2018 Wiley Periodicals, Inc.

  3. Concepts for Future Large Fire Modeling

    Treesearch

    A. P. Dimitrakopoulos; R. E. Martin

    1987-01-01

    A small number of fires escape initial attack suppression efforts and become large, but their effects are significant and disproportionate. In 1983, of 200,000 wildland fires in the United States, only 4,000 exceeded 100 acres. However, these escaped fires accounted for roughly 95 percent of wildfire-related costs and damages (Pyne, 1984). Thus, future research efforts...

  4. The Port Moresby-Solomons Operation and the Allied Reaction, 27 Apr - 11 May 1942

    DTIC Science & Technology

    2012-01-01

    started their attack, giving most of their attention to Lexington. Yorktown received one bomb hit, but Lexington was struck by two tor- pedoes and two...bombers, and thirty tor- pedo bombers) and 1,074 men; the Allies lost sixty-six aircraft and 543 men.235 One Japanese large carrier was heavily damaged

  5. Harvesting systems for western stand health improvement cuttings

    Treesearch

    Bruce R. Hartsough; Bryce J. Stokes; Joseph F. McNeel; William F. Watson

    1995-01-01

    A significant percentage of the forested area in the western United States is comprised of stands that have been altered over time by human activities, especially fire suppression, and are now being damaged by droughts, insect attacks, and wildfires. These stands should be returned to a condition where "biotic and abiotic influences do not threaten resource...

  6. How To: Protect against a Zero-Hour Attack

    ERIC Educational Resources Information Center

    McCarthy, Rob

    2005-01-01

    In the last year, a series of viruses and worms that caused damage across the Internet in record time has made very clear how vulnerable computer systems are. The MS Blaster, Slammer, Sasser, and Korgo.W worms have shown that signature-based antivirus software and traditional firewalls are not enough to protect networks. Everyone is worried about…

  7. The Consequences of the Trojan Horse Affair and a Possible Way Forward for Birmingham

    ERIC Educational Resources Information Center

    Barton, Sarah; Hatcher, Richard

    2014-01-01

    The UK government seized the opportunity of the Trojan Horse affair to launch a damaging Islamophobic attack, eagerly relayed by a racist press, on the Muslim community in Birmingham and beyond, abusing Ofsted and the Prevent strategy as blatant instruments of ideologically-driven policy. The various reports found no evidence of radicalisation or…

  8. Insects attacking black walnut in the midwestern United States

    Treesearch

    Steven Katovich

    2004-01-01

    Black walnut has only a handful of insects that would be considered significant pests. Of the leaf feeders, the walnut caterpillar is the most likely to cause significant defoliation and damage to trees. However, severe infestations are infrequent and tend to be restricted to small geographic areas. Two other commonly encountered defoliators are the yellow necked...

  9. Lawsuits by Victims of Terrorism Imperil Archaeological Studies

    ERIC Educational Resources Information Center

    Schmidt, Peter

    2011-01-01

    In lawsuits pending in federal courts in Boston and Chicago, Americans harmed by terrorist attacks linked to the Islamic Republic of Iran are asserting claim to artifacts they believe belong to that nation, in their quest to win more than $4-billion in damages. The institutions that hold the artifacts, which include Harvard University and the…

  10. The Insider Threat Security Architecture: An Integrated, Inseparable, and Uninterrupted Self-Protection Autonomic Framework

    ERIC Educational Resources Information Center

    Jabbour, Ghassan

    2010-01-01

    The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…

  11. Sleep bruxism possibly triggered by multiple sclerosis attacks and treated successfully with botulinum toxin: Report of three cases.

    PubMed

    Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit

    2015-09-01

    Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. ICS logging solution for network-based attacks using Gumistix technology

    NASA Astrophysics Data System (ADS)

    Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan

    2013-05-01

    Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.

  13. Mobile applications to enhance self-management of gout.

    PubMed

    Nguyen, Amy D; Baysari, Melissa T; Kannangara, Diluk R W; Tariq, Amina; Lau, Annie Y S; Westbrook, Johanna I; Day, Richard O

    2016-10-01

    Gout is an arthritic condition that is characterised by extremely painful, debilitating acute attacks and eventual joint and organ damage if not controlled. Despite the availability of very effective therapies that, if adhered to, will prevent acute attacks and long-term damage, the disorder is increasingly prevalent. There is an urgent need to improve self-management of gout. Mobile health (mHealth) applications ('apps'), designed to facilitate management of chronic conditions, present novel opportunities for supporting patient self-management of gout. The aim of this review was to assess features of available gout management apps designed to assist consumers in managing their gout and their consistency with guidelines for gout management. English-language, smart-device apps designed to assist self-management of gout were identified using search term "gout" and downloaded from Apple and Google Play app stores. To be included in the review, apps had to allow users to monitor their gout disease (e.g. serum uric acid (sUA) tracking, record acute attacks) and/or educate patients about gout. Investigators derived patient-focused recommendations for gout management from contemporary guidelines. Features of reviewed apps were independently assessed by two reviewers for their facilitation of these recommendations. The search identified 57 apps possibly relevant to gout management, of which six met the inclusion criteria. One app incorporated all recommendations for patient-focused gout management from guidelines including monitoring sUA, recording attacks and lifestyle advice. However, the majority of these elements were not functional within the app, and instead required users to manually complete printouts. Currently, only one app exists that includes all recommendations to facilitate patient self-management of gout, however some features can only be actioned manually. Given the lack of progress in achieving better patient outcomes and the promise of mHealth interventions to deliver significant gains, new or updated gout management apps are required to promote successful self-management of this chronic disease. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. [Chemical and biological terrorism: psychological aspects, and guidelines for psychiatric preparedness].

    PubMed

    Bleich, Avi; Kutz, Ilan

    2002-05-01

    Chemical or biological terror may cause mass casualties, but the major damage of such a threat is related mainly to psychological terror. Anxiety and panic that accompany chemical or biological threat, may affect mass populations, disrupt their lives, and enormously increase the demands from the medical systems. In the case of real attack, such an increased demands may be critical, especially to the functional ability of hospitals. The Israeli experience, during the Persian Gulf war, concerning preparations to chemical attacks at the national level, was unique in its nature. In addition, the Scud missiles attacks, accompanied with non-conventional threat, supplied valuable information on the populations behavior, and on the needed preparations for similar threats. In the case of chemical or biological threat or attack, the main task of the psychiatrist is to treat stress and anxiety casualties. At the same time, he should be aware of the possibility that the psychological & behavioral symptoms may reflect organic brain damage due to the pathogenic agent, and that such a differential diagnosis may be life saving for the patient. Stress casualties will be referred from the ER, and treated by the mental health team, at a specifically designed "center for stress casualties". In addition, the psychiatrist will consult the medical teams, or sometimes directly intervene, with combined casualties, at other locations of the hospital. At the regional or community level, one should plane and exercise deployment and activation of multi-professional teams, including mental health, in existing installations designed for screening, treatment, and temporary containment of casualties. It is recommended that the head of the local authority, will be responsible for the preparations and activation of this formation. A planned and rational usage of the media may have a critical influence on the ability of the authorities to manage the crisis situation and on shaping the behavior of the population. In certain scenarios, the media may even serve as the main tool for calming and instructing the people being isolated at their homes.

  15. Comparative efficacy of storage bags, storability and damage potential of bruchid beetle.

    PubMed

    Harish, G; Nataraja, M V; Ajay, B C; Holajjer, Prasanna; Savaliya, S D; Gedia, M V

    2014-12-01

    Groundnut during storage is attacked by number of stored grain pests and management of these insect pests particularly bruchid beetle, Caryedon serratus (Oliver) is of prime importance as they directly damage the pod and kernels. In this regard different storage bags that could be used and duration up to which we can store groundnut has been studied. Super grain bag recorded minimum number of eggs laid and less damage and minimum weight loss in pods and kernels in comparison to other storage bags. Analysis of variance for multiple regression models were found to be significant in all bags for variables viz, number of eggs laid, damage in pods and kernels, weight loss in pods and kernels throughout the season. Multiple comparison results showed that there was a high probability of eggs laid and pod damage in lino bag, fertilizer bag and gunny bag, whereas super grain bag was found to be more effective in managing the C. serratus owing to very low air circulation.

  16. Optimal Resource Allocation in Electrical Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yao, Y; Edmunds, T; Papageorgiou, D

    2004-01-15

    Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasuresmore » when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or links to minimize the loss. The loss can be measured in costs, including the costs of using more expensive generators and the economic losses that can be attributed to loss of load. The defender's goal is to minimize the loss while the attacker wants to maximize it. Assuming some level of budget constraint, each side can only defend or attack a limited number of network elements. When an element is attacked, it is assumed that it will be totally disabled. It is assumed that when an element is defended it cannot be disabled, which may mean that it will be restored in a very short time after being attacked. The rest of the paper is organized as follows. Section 2 will briefly review literature related to multilevel programming and network defense. Section 3 presents a mathematical formulation of the electrical network defense problem. Section 4 describes the solution algorithms. Section 5 discusses computational results. Finally, Sec. 6 explores future research directions.« less

  17. 7 CFR 51.3209 - Damage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... larger onions; (d) Sunburn when dark green in color and affecting an area equivalent to that of a circle... appreciably stained. Onions with adhering dirt or other foreign matter shall be judged on the same basis as...

  18. 7 CFR 51.3209 - Damage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... larger onions; (d) Sunburn when dark green in color and affecting an area equivalent to that of a circle... appreciably stained. Onions with adhering dirt or other foreign matter shall be judged on the same basis as...

  19. GREEN CHEMISTRY THROUGH CATALYSIS, ALTERNATIVE SOLVENTS AND NANOTECHNOLOGY

    EPA Science Inventory

    Researchers at the National Risk Management Research Laboratory, Sustainable Technology Division have been working on new scientific approaches to persistent technological problems: how to synthesize commercially important chemicals without depleting or damaging the environment. ...

  20. 7 CFR 51.3209 - Damage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... larger onions; (d) Sunburn when dark green in color and affecting an area equivalent to that of a circle... appreciably stained. Onions with adhering dirt or other foreign matter shall be judged on the same basis as...

  1. Sesquiterpene lactone stereochemistry influences herbivore resistance and plant fitness in the field

    PubMed Central

    Ahern, Jeffrey R.; Whitney, Kenneth D.

    2014-01-01

    Background and Aims Stereochemical variation is widely known to influence the bioactivity of compounds in the context of pharmacology and pesticide science, but our understanding of its importance in mediating plant–herbivore interactions is limited, particularly in field settings. Similarly, sesquiterpene lactones are a broadly distributed class of putative defensive compounds, but little is known about their activities in the field. Methods Natural variation in sesquiterpene lactones of the common cocklebur, Xanthium strumarium (Asteraceae), was used in conjunction with a series of common garden experiments to examine relationships between stereochemical variation, herbivore damage and plant fitness. Key Results The stereochemistry of sesquiterpene lactone ring junctions helped to explain variation in plant herbivore resistance. Plants producing cis-fused sesquiterpene lactones experienced significantly higher damage than plants producing trans-fused sesquiterpene lactones. Experiments manipulating herbivore damage above and below ambient levels found that herbivore damage was negatively correlated with plant fitness. This pattern translated into significant fitness differences between chemotypes under ambient levels of herbivore attack, but not when attack was experimentally reduced via pesticide. Conclusions To our knowledge, this work represents only the second study to examine sesquiterpene lactones as defensive compounds in the field, the first to document herbivore-mediated natural selection on sesquiterpene lactone variation and the first to investigate the ecological significance of the stereochemistry of the lactone ring junction. The results indicate that subtle differences in stereochemistry may be a major determinant of the protective role of secondary metabolites and thus of plant fitness. As stereochemical variation is widespread in many groups of secondary metabolites, these findings suggest the possibility of dynamic evolutionary histories within the Asteraceae and other plant families showing extensive stereochemical variation. PMID:24380844

  2. Sesquiterpene lactone stereochemistry influences herbivore resistance and plant fitness in the field.

    PubMed

    Ahern, Jeffrey R; Whitney, Kenneth D

    2014-03-01

    Stereochemical variation is widely known to influence the bioactivity of compounds in the context of pharmacology and pesticide science, but our understanding of its importance in mediating plant-herbivore interactions is limited, particularly in field settings. Similarly, sesquiterpene lactones are a broadly distributed class of putative defensive compounds, but little is known about their activities in the field. Natural variation in sesquiterpene lactones of the common cocklebur, Xanthium strumarium (Asteraceae), was used in conjunction with a series of common garden experiments to examine relationships between stereochemical variation, herbivore damage and plant fitness. The stereochemistry of sesquiterpene lactone ring junctions helped to explain variation in plant herbivore resistance. Plants producing cis-fused sesquiterpene lactones experienced significantly higher damage than plants producing trans-fused sesquiterpene lactones. Experiments manipulating herbivore damage above and below ambient levels found that herbivore damage was negatively correlated with plant fitness. This pattern translated into significant fitness differences between chemotypes under ambient levels of herbivore attack, but not when attack was experimentally reduced via pesticide. To our knowledge, this work represents only the second study to examine sesquiterpene lactones as defensive compounds in the field, the first to document herbivore-mediated natural selection on sesquiterpene lactone variation and the first to investigate the ecological significance of the stereochemistry of the lactone ring junction. The results indicate that subtle differences in stereochemistry may be a major determinant of the protective role of secondary metabolites and thus of plant fitness. As stereochemical variation is widespread in many groups of secondary metabolites, these findings suggest the possibility of dynamic evolutionary histories within the Asteraceae and other plant families showing extensive stereochemical variation.

  3. Hypothenemus hampei (Coleoptera: Curculionidae) and its interactions with Azteca instabilis and Pheidole synanthropica (Hymenoptera: Formicidae) in a shade coffee agroecosystem.

    PubMed

    Jiménez-Soto, Estelí; Cruz-Rodríguez, Juan A; Vandermeer, John; Perfecto, Ivette

    2013-10-01

    The coffee berry borer is currently the most important insect pest of coffee worldwide. In shaded coffee farms such as Finca Irlanda in Chiapas, Mexico, natural enemies limit coffee berry borer and potentially prevent outbreaks. This research aimed to determine the effect of ants on coffee berry borer damage and to describe behaviors of Azteca instabilis F. Smith and Pheidole synanthropica (Longino 2009) when encountering the coffee berry borer. To these ends, an ant survey was conducted in a 2,500-m(2) plot within the farm. A 4- by 4-m coordinate system was established, and the coffee plant or shade tree closest to the coordinate point was sampled using tuna fish for a total of 168 coffee plants and 46 shade trees sampled. In addition, up to 100 berries were harvested from 138 coffee plants to measure damage and verify the presence of the coffee berry borer. Behavior was determined in the field by placing live coffee berry borer adults on berries and video recording all attacks. Results showed that plants with ants had less percentage of damaged berries and shorter coffee berry borer galleries than plants without ants. However, the length of galleries in plants with A. instabilis showed no significant differences from plants without ants. P. synanthropica was observed carrying coffee berry borer to the nest in 50% of the cases, whereas A. instabilis threw coffee berry borer off of the coffee plant in 79% of the cases. Results indicate that the presence of these species of ants reduce coffee berry borer damage and suggest that different behaviors could explain the pattern of coffee berry borer attack in this agroecosystem.

  4. Parasite Removal, but Not Herbivory, Deters Future Parasite Attachment on Tomato

    PubMed Central

    Tjiurutue, Muvari Connie; Palmer-Young, Evan C.; Adler, Lynn S.

    2016-01-01

    Plants face many antagonistic interactions that occur sequentially. Often, plants employ defense strategies in response to the initial damage that are highly specific and can affect interactions with subsequent antagonists. In addition to herbivores and pathogens, plants face attacks by parasitic plants, but we know little about how prior herbivory compared to prior parasite attachment affects subsequent host interactions. If host plants can respond adaptively to these different damage types, we predict that prior parasitism would have a greater deterrent effect on subsequent parasites than would prior herbivory. To test the effects of prior parasitism and prior herbivory on subsequent parasitic dodder (Cuscuta spp.) preference, we conducted two separate greenhouse studies with tomato hosts (Solanum lycopersicum). In the first experiment, we tested the effects of previous dodder attachment on subsequent dodder preference on tomato hosts using three treatments: control plants that had no previous dodder attachment; dodder-removed plants that had an initial dodder seedling attached, removed and left in the same pot to simulate parasite death; and dodder-continuous plants with an initial dodder seedling that remained attached. In the second experiment, we tested the effects of previous caterpillar damage (Spodoptera exigua) and mechanical damage on future dodder attachment on tomato hosts. Dodder attached most slowly to tomato hosts that had dodder plants previously attached and then removed, compared to control plants or plants with continuous dodder attachment. In contrast, herbivory did not affect subsequent dodder attachment rate. These results indicate that dodder preference depended on the identity and the outcome of the initial attack, suggesting that early-season interactions have the potential for profound impacts on subsequent community dynamics. PMID:27529694

  5. Epithelial architectural destruction is necessary for bone marrow derived cell contribution to regenerating prostate epithelium.

    PubMed

    Palapattu, Ganesh S; Meeker, Alan; Harris, Timothy; Collector, Michael I; Sharkis, Saul J; DeMarzo, Angelo M; Warlick, Christopher; Drake, Charles G; Nelson, William G

    2006-08-01

    Using various nonphysiological tissue injury/repair models numerous studies have demonstrated the capacity of bone marrow derived cells to contribute to the repopulation of epithelial tissues following damage. To investigate whether this phenomenon might also occur during periods of physiological tissue degeneration/regeneration we compared the ability of bone marrow derived cells to rejuvenate the prostate gland in mice that were castrated and then later treated with dihydrotestosterone vs mice with prostate epithelium that had been damaged by lytic virus infection. Using allogenic bone marrow grafts from female donor transgenic mice expressing green fluorescent protein transplanted into lethally irradiated males we were able to assess the contributions of bone marrow derived cells to recovery of the prostatic epithelium in 2 distinct systems, including 1) surgical castration followed 1 week later by dihydrotestosterone replacement and 2) intraprostatic viral injection. Eight to 10-week-old male C57/Bl6 mice were distributed among bone marrow donor-->recipient/prostate injury groups, including 5 with C57/Bl6-->C57/Bl6/no injury, 3 with green fluorescent protein-->C57/Bl6/no injury, 3 with green fluorescent protein-->C57/Bl6/vehicle injection, 4 with green fluorescent protein-->C57/Bl6/virus injection and 3 each with green fluorescent protein-->C57/Bl6/castration without and with dihydrotestosterone, respectively. Prostate tissues were harvested 3 weeks after dihydrotestosterone replacement or 14 days following intraprostatic viral injection. Prostate tissue immunofluorescence was performed with antibodies against the epithelial marker cytokeratin 5/8, the hematopoietic marker CD45 and green fluorescent protein. Mice that sustained prostate injury from vaccinia virus infection with concomitant severe inflammation and glandular disruption showed evidence of bone marrow derived cell reconstitution of prostate epithelium, that is approximately 4% of all green fluorescent protein positive cells in the epithelial compartment 14 days after injury expressed cytokeratin 5/8, similar to the proportion of green fluorescent protein positive cells in the prostate that no longer expressed the hematopoietic marker CD45. When prostatic degeneration/regeneration was triggered by androgen deprivation and reintroduction, no green fluorescent protein positive prostate epithelial cells were detected. These findings are consistent with a requirement for inflammation associated architectural destruction for the bone marrow derived cell contribution to the regeneration of prostate epithelium.

  6. Topical application of green and white tea extracts provides protection from solar-simulated ultraviolet light in human skin.

    PubMed

    Camouse, Melissa M; Domingo, Diana Santo; Swain, Freddie R; Conrad, Edward P; Matsui, Mary S; Maes, Daniel; Declercq, Lieve; Cooper, Kevin D; Stevens, Seth R; Baron, Elma D

    2009-06-01

    Tea polyphenols have been found to exert beneficial effects on the skin via their antioxidant properties. We sought to determine whether topical application of green tea or white tea extracts would prevent simulated solar radiation-induced oxidative damages to DNA and Langerhans cells that may lead to immune suppression and carcinogenesis. Skin samples were analysed from volunteers or skin explants treated with white tea or green tea after UV irradiation. In another group of patients, the in vivo immune protective effects of green and white tea were evaluated using contact hypersensitivity to dinitrochlorobenzene. Topical application of green and white tea offered protection against detrimental effects of UV on cutaneous immunity. Such protection is not because of direct UV absorption or sunscreen effects as both products showed a sun protection factor of 1. There was no significant difference in the levels of protection afforded by the two agents. Hence, both green tea and white tea are potential photoprotective agents that may be used in conjunction with established methods of sun protection.

  7. Loss of eelgrass in Casco Bay, Maine, linked to Green Crab disturbance

    USGS Publications Warehouse

    Neckles, Hilary A.

    2015-01-01

    Over half of the Zostera marina (Eelgrass) cover disappeared from Casco Bay, ME, largely between 2012 and 2013. Eelgrass decline coincided with a population explosion of the invasive crab Carcinus maenas (European Green Crab). Green Crabs have been found to damage Eelgrass in Atlantic Canada through foraging activity, but destruction of established beds had not been documented in Maine. My objective was to determine whether loss of Eelgrass from Casco Bay was related to Green Crab disturbance. In September 2013, I transplanted Eelgrass shoots inside and outside of replicate Green Crab exclosures in a formerly vegetated area of upper Casco Bay. Following 26 d, mean survival of Eelgrass inside the exclosures was 82% and outside the exclosures was 24%. The mean plastochrone interval (time between formation of 2 successive leaves) of undamaged shoots was the same inside and outside the exclosures, and was comparable to published values from healthy Eelgrass beds in New England. Results implicate Green Crab bioturbation as a leading cause of Eelgrass loss from this system.

  8. Surgical support during the terrorist attacks in Paris, November 13, 2015: Experience at Bégin Military Teaching Hospital.

    PubMed

    Barbier, Olivier; Malgras, Brice; Choufani, Camille; Bouchard, Antoine; Ollat, Didier; Versier, Gilbert

    2017-06-01

    Recent conflicts have allowed the French Army Health Service to improve management quality for wartime-injured people during military operations. On November 13, 2015, it was in Paris that France was directly attacked and Bégin Military Teaching Hospital, like several hospitals in Paris, had to face a large number of gunshot victims. Thanks to our operational experience, injured people hospitalized in military hospitals benefited from a management based on triage and damage control (DC) principles. Forty-five patients were taken care of in our hospital with an average age of 32 years. During triage, eight patients were categorized T1 (with four extreme emergencies) and 10 were classified T2 and 27 as T3. Twenty-two patients underwent emergency surgery, 15 for soft tissue lesions of limbs, 8 for ballistic fractures (one of which was a cervical wound), and 5 for abdominal wounds. Two patients classified T1 died early. In total, more than 50 operations were performed including iterative debridements, bone fixation, three amputations, and two flaps. After 9 months, all of the patients had healed. One woman with limb stiffness required an arthrolysis. This event showed that terrorist attacks and mass casualties with war wounds can occur in France. Acquired experience regarding war wounds by the French Army Health Service is precious. Everyone must understand the importance of triage and the principles of damage control. Every hospital must be ready to face this type of massive influx of injured people (white plan). Epidemiological study, level V.

  9. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.

    PubMed

    Kroshl, William M; Sarkani, Shahram; Mazzuchi, Thomas A

    2015-09-01

    This article presents ongoing research that focuses on efficient allocation of defense resources to minimize the damage inflicted on a spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural disasters such as hurricanes, earthquakes, or even accidental systems failures and the problem of allocating resources to defend against an opponent who is aware of, and anticipating, the defender's efforts to mitigate the threat. Our approach is to utilize a combination of integer programming and agent-based modeling to allocate the defensive resources. We conceptualize the problem as a Stackelberg "leader follower" game where the defender first places his assets to defend key areas of the network, and the attacker then seeks to inflict the maximum damage possible within the constraints of resources and network structure. The criticality of arcs in the network is estimated by a deterministic network interdiction formulation, which then informs an evolutionary agent-based simulation. The evolutionary agent-based simulation is used to determine the allocation of resources for attackers and defenders that results in evolutionary stable strategies, where actions by either side alone cannot increase its share of victories. We demonstrate these techniques on an example network, comparing the evolutionary agent-based results to a more traditional, probabilistic risk analysis (PRA) approach. Our results show that the agent-based approach results in a greater percentage of defender victories than does the PRA-based approach. © 2015 Society for Risk Analysis.

  10. Preventive Role of Specific Dietary Factors and Natural Compounds Against DNA Damage and Oxidative Stress.

    DTIC Science & Technology

    1998-08-01

    vitamins (C and E) and natural compounds (caffeic acid phenethyl ester [CAPE] and epigallocatechin gallate [ EGCG ] may be protective against mammary...caffeic acid phenethyl ester (CAPE), and epigallocatechin gallate ( EGCG ) in inhibiting DNA damage. These antioxidants are found in natural products such...as fruits and vegetables (vitamins C and E), the popular medicine honeybee propolis (CAPE), or green tea ( EGCG ). Studies carried out to date suggest

  11. Uncertainty and Risk Management in Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Li, Jason; Ou, Xinming; Rajagopalan, Raj

    Handling cyber threats unavoidably needs to deal with both uncertain and imprecise information. What we can observe as potential malicious activities can seldom give us 100% confidence on important questions we care about, e.g. what machines are compromised and what damage has been incurred. In security planning, we need information on how likely a vulnerability can lead to a successful compromise to better balance security and functionality, performance, and ease of use. These information are at best qualitative and are often vague and imprecise. In cyber situational awareness, we have to rely on such imperfect information to detect real attacks and to prevent an attack from happening through appropriate risk management. This chapter surveys existing technologies in handling uncertainty and risk management in cyber situational awareness.

  12. Green Bonds and climate change: State of the art or artful dodge?

    NASA Astrophysics Data System (ADS)

    Queen, Irene T.

    Debt-finance is a growing opportunity to fund environmental solutions. Green Bonds are being used by investors wishing to improve their Corporate Social Responsibility positions while maintaining valid returns on their investments. Based on the well-established bond-finance model, Green Bonds put money into diverse environmental projects addressing impacts from climate changes, depletion of natural resources, biodiversity loss, and pollution control. “Green” is a voluntary designation, based on a set of guidelines known as the Green Bond Principles. With varying degrees of clarity regarding their use and environmental impact and whether they are a viable solution to climate damages or merely a “greenwashed” ploy used by some issuers to appear more sustainable were questions examined as part of this research. A concise summary briefing (Appendix A), case study draft, and targeted public engagements were completed. Adaptability and responsiveness, sustainability, credibility, legitimacy, and opportunity for social transformation through the use of Green Bonds were reviewed using a case study analysis method. A unique pool of investment capital being mobilized by Green Bonds is emerging through motivated environmental investment coalitions. A review of the integrated impacts of Green Bonds as well as practical knowledge for their issuance is described here.

  13. Protective effect of red-stemmed type of Ipomoea aquatica Forsk against CCl4-induced oxidative damage in mice.

    PubMed

    Hirai, Shizuka; Ishibuchi, Toyohito; Watabe, Shinpei; Makita, Miki; Kishida, Chiaki; Takagaki, Michiko; Kurauchi, Nobuyuki; Egashira, Yukari

    2011-01-01

    Water spinach (Ipomoea aquatica Forsk; I. aquatica) of the green-stemmed type (green type) is widely consumed, but there also exists a red-stemmed variety (red type). In the present study, the antioxidant capacity of the red type was compared to that of the green type in carbon tetrachloride (CCl(4))-treated mice. CCl(4)-induced thiobarbituric acid reactive substrate (TBARS) formation in the liver was significantly suppressed in mice fed 5% red-type I. aquatica, while the green type showed no effect. Hydrophobic oxygen radical absorbance capacity (H-ORAC(FL)) in the red type showed a lower level than that in the green type; however, lipophilic ORAC (L-ORAC(FL)) and total-ORAC(FL) levels were significantly higher in the red type than in the green type. α-Tocopherol, anthocyanidin/proanthocyanidin, and β-carotene contents were all significantly higher in the red type than in the green type. These results suggest that the wild red-type I. aquatica contains certain lipophilic components that exert antioxidant capacities not only in vitro but also in vivo. Such effective components in the red type would be beneficial phytochemicals for suppressing several diseases related to oxidative stress.

  14. Frost induced damages within porous materials - from concrete technology to fuel cells technique

    NASA Astrophysics Data System (ADS)

    Palecki, Susanne; Gorelkov, Stanislav; Wartmann, Jens; Heinzel, Angelika

    2017-12-01

    Porous media like concrete or layers of membrane electrode assemblies (MEA) within fuel cells are affected by a cyclic frost exposure due to different damage mechanisms which could lead to essential degradation of the material. In general, frost damages can only occur in case of a specific material moisture content. In fuel cells, residual water is generally available after shut down inside the membrane i.e. the gas diffusion layer (GDL). During subsequent freezing, this could cause various damage phenomena such as frost heaves and delamination effects of the membrane electrode assembly, which depends on the location of pore water and on the pore structure itself. Porous materials possess a pore structure that could range over several orders of magnitudes with different properties and freezing behaviour of the pore water. Latter can be divided into macroscopic, structured and pre-structured water, influenced by surface interactions. Therefore below 0 °C different water modifications can coexist in a wide temperature range, so that during frost exposure a high amount of unfrozen and moveable water inside the pore system is still available. This induces transport mechanisms and shrinkage effects. The physical basics are similar for porous media. While the freezing behaviour of concrete has been studied over decades of years, in order to enhance the durability, the know-how about the influence of a frost attack on fuel cell systems is not fully understood to date. On the basis of frost damage models for concrete structures, an approach to describe the impact of cyclic freezing and thawing on membrane electrode assemblies has been developed within this research work. Major aim is beyond a better understanding of the frost induced mechanisms, the standardization of a suitable test procedure for the assessment of different MEA materials under such kind of attack. Within this contribution first results will be introduced.

  15. Extraction and removal of caffeine from green tea by ultrasonic-enhanced supercritical fluid.

    PubMed

    Tang, Wei-Qiang; Li, Di-Cai; Lv, Yang-Xiao; Jiang, Jian-Guo

    2010-05-01

    Low-caffeine or caffeine-removed tea and its products are widely welcomed on market in recent years. In the present study, we adopt ultrasonic-enhanced supercritical fluid extraction process to remove caffeine from green tea. An orthogonal experiment (L16 (4(5))) was applied to optimize the best removal conditions. Extraction pressure, extraction time, power of ultrasound, moisture content, and temperature were the main factors to influence the removal rate of caffeine from green tea. The 5 factors chosen for the present investigation were based on the results of a single-factor test. The optimum removal conditions were determined as follows: extraction pressure of 30 MPa, temperature at 55 degrees C, time of 4 h, 30% moisture content, and ultrasound power of 100 W. Chromatogram and ultraviolet analysis of raw material and decaffeinates suggests that under optimized conditions, the caffeine of green tea was effectively removed and minished without damaging the structure of active ingredients in green tea.

  16. Green and Red Fluorescent Dyes for Translational Applications in Imaging and Sensing Analytes: A Dual‐Color Flag

    PubMed Central

    Oliveira, Elisabete; Bértolo, Emilia; Núñez, Cristina; Pilla, Viviane; Santos, Hugo M.; Fernández‐Lodeiro, Javier; Fernández‐Lodeiro, Adrian; Djafari, Jamila; Capelo, José Luis

    2017-01-01

    Abstract Red and green are two of the most‐preferred colors from the entire chromatic spectrum, and red and green dyes are widely used in biochemistry, immunohistochemistry, immune‐staining, and nanochemistry applications. Selective dyes with green and red excitable chromophores can be used in biological environments, such as tissues and cells, and can be irradiated with visible light without cell damage. This critical review, covering a period of five years, provides an overview of the most‐relevant results on the use of red and green fluorescent dyes in the fields of bio‐, chemo‐ and nanoscience. The review focuses on fluorescent dyes containing chromophores such as fluorescein, rhodamine, cyanine, boron–dipyrromethene (BODIPY), 7‐nitobenz‐2‐oxa‐1,3‐diazole‐4‐yl, naphthalimide, acridine orange, perylene diimides, coumarins, rosamine, Nile red, naphthalene diimide, distyrylpyridinium, benzophosphole P‐oxide, benzoresorufins, and tetrapyrrolic macrocycles. Metal complexes and nanomaterials with these dyes are also discussed. PMID:29318095

  17. Photodynamic therapy of hamster Greene melanoma in vitro and in vivo using bacteriochlorin-a as photosensitizer

    NASA Astrophysics Data System (ADS)

    Schuitmaker, J. J.; Van Best, Jaap A.; van Delft, J. L.; Jannink, J. E.; Oosterhuis, J. A.; Vrensen, Gijs F.; Ms Wolff-Rouendaal, Didi; Dubbelman, T. M.

    1996-01-01

    Efficient photodynamic therapy (PDT) of malignant melanoma may be possible with photosensitizers having absorption maxima in the far-red region e.g., above 700 nm. Bacteriochlorin a (BCA), a non toxic derivative of bacteriochlorphyllin a, has a high molecular absorption coefficient (32.000 M-1.cm-1) at 760 nm. At this wavelength tissue penetration of light is almost optimal and melanin absorption is relatively low. In several series of experiments BCA was proven to be a very effective photosensitizer, in vitro and in vivo. It is preferentially retained in experimental hamster Greene melanoma, rhabdomyosarcoma, RIF- and mamma tumors. Its fluorescence can be detected in vivo, thus enabling early tumor detection and it is rapidly cleared from the tissues which promises no, or minor skin photosensitivity. The effects of BCA-PDT were studied in vitro and in vivo using the heavily pigmented Hamster Greene Melanoma (HGM) cell line as a model. In vitro it was found that the uptake of BCA was time, concentration and temperature dependant. Upon illumination (10 Mw/cm2, 756 nm) after incubation with 2.5 (mu) g/ml BCA for 1 h, almost complete cell kill was obtained within seconds. Hamster Greene Melanoma implanted in the anterior eye chamber of rabbits is an accepted in vivo model for ocular melanoma. The effects of BCA-PDT using this model were studied by light- and electron microscopy. Immediately after PDT intracellular spaces were enlarged and blood vessels were clotted with swollen erythrocytes. Electron microscopy showed fused inner and outer membranes and affected cristae mitchondriales of some mitochondria. With time, the severity of tissue and cell damage increased. One day after irradiation tumor growth had stopped; fluorescein angiography showed non perfusion of the tumor. Histopathology showed almost complete tumor necrosis with occasionally viable cells at the tumor periphery. It is concluded that the direct mitochondrial damage and the vascular damage both contribute to BCA-PDT induced tumor necrosis.

  18. Damage Assessment of Two-Way Bending RC Slabs Subjected to Blast Loadings

    PubMed Central

    Jia, Haokai; Wu, Guiying

    2014-01-01

    Terrorist attacks on vulnerable structures and their individual structural members may cause considerable damage and loss of life. However, the research work on response and damage analysis of single structural components, for example, a slab to blast loadings, is limited in the literature and this is necessary for assessing its vulnerability. This study investigates the blast response and damage assessment of a two-way bending reinforced concrete (RC) slab subjected to blast loadings. Numerical modeling and analysis are carried out using the commercial finite element code LS-DYNA 971. A damage assessment criterion for the two-way bending RC slab is defined based on the original and residual uniformly distributed load-carrying capacity. Parametric studies are carried out to investigate the effects of explosive weight and explosive position on the damage mode of the two-way RC slab. Some design parameters, such as the boundary conditions and the negative reinforcement steel bar length, are also discussed. The illustrated results show that the proposed criterion can apply to all failure modes. The damage assessment results are more accurate than the ones due to the conventional deformation criterion. PMID:25121134

  19. DAMPs, MAMPs, and NAMPs in plant innate immunity.

    PubMed

    Choi, Hyong Woo; Klessig, Daniel F

    2016-10-26

    Multicellular organisms have evolved systems/mechanisms to detect various forms of danger, including attack by microbial pathogens and a variety of pests, as well as tissue and cellular damage. Detection via cell-surface receptors activates an ancient and evolutionarily conserved innate immune system. Potentially harmful microorganisms are recognized by the presence of molecules or parts of molecules that have structures or chemical patterns unique to microbes and thus are perceived as non-self/foreign. They are referred to as Microbe-Associated Molecular Patterns (MAMPs). Recently, a class of small molecules that is made only by nematodes, and that functions as pheromones in these organisms, was shown to be recognized by a wide range of plants. In the presence of these molecules, termed Nematode-Associated Molecular Patterns (NAMPs), plants activate innate immune responses and display enhanced resistance to a broad spectrum of microbial and nematode pathogens. In addition to pathogen attack, the relocation of various endogenous molecules or parts of molecules, generally to the extracellular milieu, as a result of tissue or cellular damage is perceived as a danger signal, and it leads to the induction of innate immune responses. These relocated endogenous inducers are called Damage-Associated Molecular Patterns (DAMPs). This mini-review is focused on plant DAMPs, including the recently discovered Arabidopsis HMGB3, which is the counterpart of the prototypic animal DAMP HMGB1. The plant DAMPs will be presented in the context of plant MAMPs and NAMPs, as well as animal DAMPs.

  20. Evaluation of a portable MOS electronic nose to detect root rots in shade tree species

    Treesearch

    Manuela Baietto; Letizia Pozzi; Alphus Dan Wilson; Daniele Bassi

    2013-01-01

    The early detection of wood decays in high-value standing trees is very important in urban areas because mitigating control measures must be implemented long before tree failures result in property damage or injuries to citizens. Adverse urban environments increase physiological stresses in trees, causing greater susceptibility to attacks by pathogenic decay fungi. The...

  1. Allocating resources to large wildland fires: a model with stochastic production rates

    Treesearch

    Romain Mees; David Strauss

    1992-01-01

    Wildland fires that grow out of the initial attack phase are responsible for most of the damage and burned area. We model the allocation of fire suppression resources (ground crews, engines, bulldozers, and airdrops) to these large fires. The fireline at a given future time is partitioned into homogeneous segments on the basis of fuel type, available resources, risk,...

  2. Diplodia Tip Blight and Canker of Pines (Pest Alert)

    Treesearch

    USDA Forest Service

    The fungus Diplodia pinea can cause serious damage to Austrian, ponderosa, red, Scots, mugo, jack, and white pine. Although it is considered a weak pathogen, it may successfully attack and kill trees. It may be more serious on trees growing out of their natural range or stressed by adverse climatic conditions or air pollution. Infection can occur as a result of hail...

  3. Optimal Level of Expenditure to Control the Southern Pine Beetle

    Treesearch

    Joseph E. de Steiguer; Roy L. Hedden; John M. Pye

    1987-01-01

    Optimal level of expenditure to control damage to commercial timber stands by the southern pine beetle was determined by models that simulated and analyzed beetle attacks during a typical season for 11 Southern States. At a real discount rate of 4 percent, maximized net benefits for the Southern region are estimated at about $50 million; at 10 percent, more than $30...

  4. What Matter Mind: A Theory about the Practice of Women's Studies.

    ERIC Educational Resources Information Center

    Stimpson, Catharine R.

    The area of women's studies has come under attack from many quarters, but the most damaging criticism has come from those who are women themselves. Spoken criticism and lack of participation are equally as harmful in an area such as women's studies, where total sacrifice and participation is necessary for survival. The people who resist women's…

  5. Orientation behavior of predaceous ground beetle species in response to volatile emissions from yellow starthistle damaged by an invasive slug

    USDA-ARS?s Scientific Manuscript database

    The up-regulation or emission of plant volatiles in response to herbivory may signal to the natural predators and parasitoids that a plant is under attack from herbivores. This is known as an indirect defense within a tritrophic system - where herbivore number is reduced through predation that is st...

  6. Emerald ash borer in Russia: 2009 situation update

    Treesearch

    Y. Baranchikov; Y. Gninenko; G. Yurchenko

    2011-01-01

    The emerald ash borer (EAB), Agrilus planipennis Fairmaire, is a beetle native to East Asia and the Russian Far East where it is considered a minor pest, attacking weakened or dying ash trees. In 2006, EAB was found to be responsible for enormous damage of ash species in Moscow, which causes serious concern for Europe. Recently we reviewed the EAB...

  7. Strategic Bombing and the Thermonuclear Breakthrough: An Example of Disconnected Defense Planning,

    DTIC Science & Technology

    1981-04-01

    30 March 1944 attack against Nuremburg that saw the loss of 94 of about 800 aircraft (with serious damage to 72 others). However, while the British...tested a very powerful fission bomb, with the code name KING, that had an explosive yield of 500 kilotons. Its purpose was to provide the U.S. with an ex

  8. The Evolution of Air-Sea Battle: How Army Attack/Reconnaissance Aviation Fits into the Joint Concept for Access and Maneuver in the Global Commons

    DTIC Science & Technology

    2016-05-13

    Storm. 35 Allied planners determined that TLAMs would be ineffective because they could not provide Battle Damage Assessment ( BDA ) and confirm...that the Apache’s armament, capability of flying low enough to evade radar, and ability to confirm BDA provided the best option to destroy the radar

  9. Insect herbivory stimulates allelopathic exudation by an invasive plant and the suppression of natives

    Treesearch

    Giles C. Thelen; Jorge M. Vivanco; Beth Newingham; William Good; Harsh P. Bais; Peter Landres; Anthony Caesar; Ragan M. Callaway

    2005-01-01

    Exotic invasive plants are often subjected to attack from imported insects as a method of biological control. A fundamental, but rarely explicitly tested, assumption of biological control is that damaged plants are less fit and compete poorly. In contrast, we find that one of the most destructive invasive plants in North America, Centaurea maculosa,...

  10. Guide to insect borers in North American broadleaf trees and shrubs

    Treesearch

    J.D. Solomon

    1995-01-01

    This book is an illustrated guide to 300 species of inset borers that attack hardwood trees, shrubs, and other woody angiosperms in North America. The major purposes of this guide are to identify insect borers and theri damage to provide information for controlling them. Readers most likely to find this guide useful are practiving foresters, entomologists, and others...

  11. Visual Effects in the High Performance Aircraft Cockpit

    DTIC Science & Technology

    1988-04-01

    The RPE acts in a supportive metabolic role to the photoreceptors and if damaged or artificially aged this...unlimited. 2. Lenses cannot mist and provide minor protection against 4. Provide greater protection against splatter from the firing of MDC and impact...almost opposite requirements: the air combat role and the ground attack role . For the air combat role , the aircraft is used against

  12. Modeling Gypsy Moth-Related Tree Mortality Under Different Outbreak Scenarios in Interior Highlands Forests

    Treesearch

    Kurt W. Gottschalk; James M. Guldin; Jimmie J. Colbert

    2004-01-01

    A simulation was conducted to determine how growth of forests in the Interior Highlands would change under attack by the gypsy moth (Lymantria dispar L.). Simulations were conducted for three different outbreak intensities using the Gypsy Moth Stand-Damage Model. Forest Inventory and Analysis (FIA) inventory data were used as input for the simulation...

  13. Evaluation of corn germplasm lines for multiple ear-colonizing insect and disease resistance.

    PubMed

    Ni, Xinzhi; Xu, Wenwei; Blanco, Michael H; Wilson, Jeffrey P

    2012-08-01

    Ear-colonizing insects and diseases that reduce yield and impose health threats by mycotoxin contaminations in the grain, are critical impediments for corn (Zea mays L.) production in the southern United States. Ten germplasm lines from the Germplasm Enhancement of Maize (GEM) Program in Ames, IA, and Raleigh, NC, and 10 lines (derived from GEM germplasm) from the Texas Agricultural Experiment Station in Lubbock, TX, were examined in 2007 and 2008 with local resistant and susceptible controls. Four types of insect damage and smut disease (Ustilago maydis) infection, as well as gene X environment (G X E) interaction, was assessed on corn ears under field conditions. Insect damage on corn ears was further separated as cob and kernel damage. Cob penetration rating was used to assess corn earworm [Helicoverpa zea (Boddie)] and fall armyworm [Spodoptera frugiperda (J.E. Smith)] feeding on corn cobs, whereas kernel damage was assessed using three parameters: 1) percentage of kernels discolored by stink bugs (i.e., brown stink bug [Euschistus serous (Say)], southern green stink bug [Nezara viridula (L.)], and green stink bug [Chinavia (Acrosternum) hilare (Say)]; 2) percentage of maize weevil (Sitophilus zeamais Motschulsky)-damaged kernels; and 3) percentage of kernels damaged by sap beetle (Carpophilus spp.), "chocolate milkworm" (Moodna spp.), and pink scavenger caterpillar [Pyroderces (Anatrachyntis) rileyi (Walsingham)]. The smut infection rates on ears, tassels, and nodes also were assessed. Ear protection traits (i.e., husk tightness and extension) in relation to insect damage and smut infection also were examined. Significant differences in insect damage, smut infection, and husk protection traits were detected among the germplasm lines. Three of the 20 germplasm lines were identified as being multiple insect and smut resistant. Of the three lines, entries 5 and 7 were derived from DKXL370, which was developed using corn germplasm from Brazil, whereas entry 14 was derived from CUBA117.

  14. Survival of child after lion attack

    PubMed Central

    Dabdoub, Carlos F.; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named “Bang-Bang”, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of the literature. Case Description: We report the case of an 8-year-old boy who was attacked by a lion during a circus show. The patient underwent an emergent neurosurgical procedure, including parietal craniectomy, cleaning, and extensive surgical debridement of the wounds. Despite open severe head trauma with brain damage as well as thorax and abdomen trauma, the child survived, with minimal neurological sequelae. Conclusions: Human injury resulting from encounters with nondomesticated animals is increasingly rising throughout the world. This case highlights the potentially violent and aggressive nature of wild mammals held in captivity. Unusual wild animal attacks and the complex injuries that result may pose a challenge to surgeons practicing in resource-limited settings. In this sense, the best treatment in the mentioned case is the prevention of human injuries by these animals. In addition, to attend to these infrequent cases, the authors emphasize the importance of a multidisciplinary approach to achieve the best cosmetic and functional results. PMID:23869277

  15. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.

    PubMed

    Sittig, Dean F; Singh, Hardeep

    2016-01-01

    Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.

  16. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks

    PubMed Central

    Singh, Hardeep

    2016-01-01

    Summary Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user’s computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users. PMID:27437066

  17. Injury-mediated decrease in locomotor performance increases predation risk in schooling fish.

    PubMed

    Krause, J; Herbert-Read, J E; Seebacher, F; Domenici, P; Wilson, A D M; Marras, S; Svendsen, M B S; Strömbom, D; Steffensen, J F; Krause, S; Viblanc, P E; Couillaud, P; Bach, P; Sabarros, P S; Zaslansky, P; Kurvers, R H J M

    2017-08-19

    The costs and benefits of group living often depend on the spatial position of individuals within groups and the ability of individuals to occupy preferred positions. For example, models of predation events for moving prey groups predict higher mortality risk for individuals at the periphery and front of groups. We investigated these predictions in sardine ( Sardinella aurita ) schools under attack from group hunting sailfish ( Istiophorus platypterus ) in the open ocean. Sailfish approached sardine schools about equally often from the front and rear, but prior to attack there was a chasing period in which sardines attempted to swim away from the predator. Consequently, all sailfish attacks were directed at the rear and peripheral positions of the school, resulting in higher predation risk for individuals at these positions. During attacks, sailfish slash at sardines with their bill causing prey injury including scale removal and tissue damage. Sardines injured in previous attacks were more often found in the rear half of the school than in the front half. Moreover, injured fish had lower tail-beat frequencies and lagged behind uninjured fish. Injuries inflicted by sailfish bills may, therefore, hinder prey swimming speed and drive spatial sorting in prey schools through passive self-assortment. We found only partial support for the theoretical predictions from current predator-prey models, highlighting the importance of incorporating more realistic predator-prey dynamics into these models.This article is part of the themed issue 'Physiological determinants of social behaviour in animals'. © 2017 The Author(s).

  18. Damage of photoreceptor-derived cells in culture induced by light emitting diode-derived blue light

    PubMed Central

    Kuse, Yoshiki; Ogawa, Kenjiro; Tsuruma, Kazuhiro; Shimazawa, Masamitsu; Hara, Hideaki

    2014-01-01

    Our eyes are increasingly exposed to light from the emitting diode (LED) light of video display terminals (VDT) which contain much blue light. VDTs are equipped with televisions, personal computers, and smart phones. The present study aims to clarify the mechanism underlying blue LED light-induced photoreceptor cell damage. Murine cone photoreceptor-derived cells (661 W) were exposed to blue, white, or green LED light (0.38 mW/cm2). In the present study, blue LED light increased reactive oxygen species (ROS) production, altered the protein expression level, induced the aggregation of short-wavelength opsins (S-opsin), resulting in severe cell damage. While, blue LED light damaged the primary retinal cells and the damage was photoreceptor specific. N-Acetylcysteine (NAC), an antioxidant, protected against the cellular damage induced by blue LED light. Overall, the LED light induced cell damage was wavelength-, but not energy-dependent and may cause more severe retinal photoreceptor cell damage than the other LED light. PMID:24909301

  19. Multi-criteria analysis of the mechanism of degradation of Portland cement based mortars exposed to external sulphate attack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    El-Hachem, R.; Roziere, E.; Grondin, F.

    2012-10-15

    This work aims to contribute to the design of durable concrete structures exposed to external sulphate attacks (ESA). Following a preliminary study aimed at designing a representative test, the present paper suggests a study on the effect of the water-to-cement (w/c) ratio and the cement composition in order to understand the degradation mechanisms. Length and mass measurements were registered continuously, leached calcium and hydroxide ions were also quantified. In parallel, scanning electron microscopy observations as well as X-ray microtomography were realised at different times to identify the formed products and the crack morphology. Test results provide information on the basicmore » aspects of the degradation mechanism, such as the main role of leaching and diffusion in the sulphate attack process. The mortar composition with a low w/c ratio leads to a better resistance to sulphate attack because the microstructure is less permeable. Reducing the C{sub 3}A content results in a macro-cracking decrease but it does not prevent expansion, which suggests the contribution of other expansive products, such as gypsum, in damage due to ESA. The observation of the cracks network in the microstructure helps to understand the micro-mechanisms of the degradation process.« less

  20. Cyber threat impact assessment and analysis for space vehicle architectures

    NASA Astrophysics Data System (ADS)

    McGraw, Robert M.; Fowler, Mark J.; Umphress, David; MacDonald, Richard A.

    2014-06-01

    This paper covers research into an assessment of potential impacts and techniques to detect and mitigate cyber attacks that affect the networks and control systems of space vehicles. Such systems, if subverted by malicious insiders, external hackers and/or supply chain threats, can be controlled in a manner to cause physical damage to the space platforms. Similar attacks on Earth-borne cyber physical systems include the Shamoon, Duqu, Flame and Stuxnet exploits. These have been used to bring down foreign power generation and refining systems. This paper discusses the potential impacts of similar cyber attacks on space-based platforms through the use of simulation models, including custom models developed in Python using SimPy and commercial SATCOM analysis tools, as an example STK/SOLIS. The paper discusses the architecture and fidelity of the simulation model that has been developed for performing the impact assessment. The paper walks through the application of an attack vector at the subsystem level and how it affects the control and orientation of the space vehicle. SimPy is used to model and extract raw impact data at the bus level, while STK/SOLIS is used to extract raw impact data at the subsystem level and to visually display the effect on the physical plant of the space vehicle.

  1. Worldwide Dissemination of Radopholus similis and Its Importance in Crop Production

    PubMed Central

    O'Bannon, J. H.

    1977-01-01

    The burrowing nematode, Radopholus similis, attacks agronomic and horticultural crops and many weeds, and is reported to reproduce on more than 250 plant species. Two races of R. similis are recognized. Although one race attacks citrus and the other race does not, they are morphologically similar. At present, the citrus race is found attacking citrus only in Florida, U.S.A., but it is known to infect more than 250 species and varieties of noncitrus plants. Although it has many hosts, R. similis is probably most widely distributed on banana and is found worldwide. Although best known as a pest of Piper nigrum, Musa spp., and Citrus spp., it also attacks many crops that are important in world commerce and in subsistence-type agriculture, a factor which makes it a significant agricultural pest. Worldwide dissemination occurs primarily when parasitized plants are moved into areas where the pest could adapt. Yield losses of 12.5 tons/ha in bananas have been reported from R. similis infection. Infections suppress orange and grapefruit yields as much as 70-80%. Because of the severity of R. similis damage (particularly to banana and citrus), extensive control programs have been developed. Prevention, cultural practices, resistant varieties, and chemical pesticides interact to reduce losses. PMID:19305565

  2. Stem parasitic plant Cuscuta australis (dodder) transfers herbivory-induced signals among plants.

    PubMed

    Hettenhausen, Christian; Li, Juan; Zhuang, Huifu; Sun, Huanhuan; Xu, Yuxing; Qi, Jinfeng; Zhang, Jingxiong; Lei, Yunting; Qin, Yan; Sun, Guiling; Wang, Lei; Baldwin, Ian T; Wu, Jianqiang

    2017-08-08

    Cuscuta spp. (i.e., dodders) are stem parasites that naturally graft to their host plants to extract water and nutrients; multiple adjacent hosts are often parasitized by one or more Cuscuta plants simultaneously, forming connected plant clusters. Metabolites, proteins, and mRNAs are known to be transferred from hosts to Cuscuta , and Cuscuta bridges even facilitate host-to-host virus movement. Whether Cuscuta bridges transmit ecologically meaningful signals remains unknown. Here we show that, when host plants are connected by Cuscuta bridges, systemic herbivory signals are transmitted from attacked plants to unattacked plants, as revealed by the large transcriptomic changes in the attacked local leaves, undamaged systemic leaves of the attacked plants, and leaves of unattacked but connected hosts. The interplant signaling is largely dependent on the jasmonic acid pathway of the damaged local plants, and can be found among conspecific or heterospecific hosts of different families. Importantly, herbivore attack of one host plant elevates defensive metabolites in the other systemic Cuscuta bridge-connected hosts, resulting in enhanced resistance against insects even in several consecutively Cuscuta -connected host plants over long distances (> 100 cm). By facilitating plant-to-plant signaling, Cuscuta provides an information-based means of countering the resource-based fitness costs to their hosts.

  3. Stem parasitic plant Cuscuta australis (dodder) transfers herbivory-induced signals among plants

    PubMed Central

    Hettenhausen, Christian; Li, Juan; Zhuang, Huifu; Sun, Huanhuan; Xu, Yuxing; Qi, Jinfeng; Zhang, Jingxiong; Lei, Yunting; Qin, Yan; Sun, Guiling; Wang, Lei; Baldwin, Ian T.

    2017-01-01

    Cuscuta spp. (i.e., dodders) are stem parasites that naturally graft to their host plants to extract water and nutrients; multiple adjacent hosts are often parasitized by one or more Cuscuta plants simultaneously, forming connected plant clusters. Metabolites, proteins, and mRNAs are known to be transferred from hosts to Cuscuta, and Cuscuta bridges even facilitate host-to-host virus movement. Whether Cuscuta bridges transmit ecologically meaningful signals remains unknown. Here we show that, when host plants are connected by Cuscuta bridges, systemic herbivory signals are transmitted from attacked plants to unattacked plants, as revealed by the large transcriptomic changes in the attacked local leaves, undamaged systemic leaves of the attacked plants, and leaves of unattacked but connected hosts. The interplant signaling is largely dependent on the jasmonic acid pathway of the damaged local plants, and can be found among conspecific or heterospecific hosts of different families. Importantly, herbivore attack of one host plant elevates defensive metabolites in the other systemic Cuscuta bridge-connected hosts, resulting in enhanced resistance against insects even in several consecutively Cuscuta-connected host plants over long distances (> 100 cm). By facilitating plant-to-plant signaling, Cuscuta provides an information-based means of countering the resource-based fitness costs to their hosts. PMID:28739895

  4. Unraveling the contribution of pancreatic beta-cell suicide in autoimmune type 1 diabetes✩

    PubMed Central

    Jaberi-Douraki, Majid; Schnell, Santiago; Pietropaolo, Massimo; Khadra, Anmar

    2014-01-01

    In type 1 diabetes, an autoimmune disease mediated by autoreactive T-cells that attack insulin-secreting pancreatic beta-cells, it has been suggested that disease progression may additionally require protective mechanisms in the target tissue to impede such auto-destructive mechanisms. We hypothesize that the autoimmune attack against beta-cells causes endoplasmic reticulum stress by forcing the remaining beta-cells to synthesize and secrete defective insulin. To rescue beta-cell from the endoplasmic reticulum stress, beta-cells activate the unfolded protein response to restore protein homeostasis and normal insulin synthesis. Here we investigate the compensatory role of unfolded protein response by developing a multi-state model of type 1 diabetes that takes into account beta-cell destruction caused by pathogenic autoreactive T-cells and apoptosis triggered by endoplasmic reticulum stress. We discuss the mechanism of unfolded protein response activation and how it counters beta-cell extinction caused by an autoimmune attack and/or irreversible damage by endoplasmic reticulum stress. Our results reveal important insights about the balance between beta-cell destruction by autoimmune attack (beta-cell homicide) and beta-cell apoptosis by endoplasmic reticulum stress (beta-cell suicide). It also provides an explanation as to why the unfolded protein response may not be a successful therapeutic target to treat type 1 diabetes. PMID:24831415

  5. The Klamath Falls, Oregon, earthquakes on September 20, 1993

    USGS Publications Warehouse

    Brantley, S.R.

    1993-01-01

    The mainshocks caused light moderate damage at Klamath Falls, a town of about 18,000 residents located only about 20 km east of the epicentral area. Damage included toppled chimneys, cracked masonry, and fallen parapets. Power outages occurred after the strongest shocks. In addition, strong shaking broke water mains, and landslides temporarily blocked highways. the earthquakes also caused two fatalities. A rockfall crushed an automobile, killing a motorist, and an elderly lady had a heart attack. the low population density in the epicentral area- less than five people per sq km- kept the toatl dollar loss to about 7.5 million dollars. 

  6. Green Synthesized Zinc Oxide (ZnO) Nanoparticles Induce Oxidative Stress and DNA Damage in Lathyrus sativus L. Root Bioassay System.

    PubMed

    Panda, Kamal K; Golari, Dambaru; Venugopal, A; Achary, V Mohan M; Phaomei, Ganngam; Parinandi, Narasimham L; Sahu, Hrushi K; Panda, Brahma B

    2017-05-18

    Zinc oxide nanoparticles (ZnONP-GS) were synthesised from the precursor zinc acetate (Zn(CH₃COO)₂) through the green route using the milky latex from milk weed ( Calotropis gigantea L. R. Br) by alkaline precipitation. Formation of the ZnONP-GS was monitored by UV-visible spectroscopy followed by characterization and confirmation by energy-dispersive X-ray spectroscopy (EDX), transmission electron microscopy (TEM), and X-ray diffraction (XRD). Both the ZnONP-GS and the commercially available ZnONP-S (Sigma-Aldrich) and cationic Zn 2+ from Zn(CH₃COO)₂ were tested in a dose range of 0-100 mg·L -1 for their potency (i) to induce oxidative stress as measured by the generation reactive oxygen species (ROS: O₂ •- , H₂O₂ and • OH), cell death, and lipid peroxidation; (ii) to modulate the activities of antioxidant enzymes: catalase (CAT), superoxide dismutase (SOD), guaiacol peroxidase (GPX), and ascorbate peroxidase (APX); and (iii) to cause DNA damage as determined by Comet assay in Lathyrus sativus L. root bioassay system. Antioxidants such as Tiron and dimethylthiourea significantly attenuated the ZnONP-induced oxidative and DNA damage, suggesting the involvement of ROS therein. Our study demonstrated that both ZnONP-GS and ZnONP-S induced oxidative stress and DNA damage to a similar extent but were significantly less potent than Zn 2+ alone.

  7. Hydrodynamic effect of a satellite transmitter on a juvenile green turtle (Chelonia mydas)

    PubMed

    Watson; Granger

    1998-09-01

    Wind tunnel tests were performed to measure the effect of a satellite transmitter on a juvenile green turtle (Chelonia mydas). A full-scale turtle model was constructed from an 11.5 kg specimen with a 48 cm carapace length, and a transmitter model was constructed from a Telonics ST-6. The turtle model was tested in a wind tunnel with and without the transmitter, which was mounted on the forward, topmost part of the carapace. Drag, lift and pitch moment were measured for several speeds and flow angles, and the data were scaled for application to the marine environment. At small flow angles representative of straight-line swimming, the transmitter increased drag by 27-30 %, reduced lift by less than 10 % and increased the pitch moment by 11-42 %. On the basis of the drag data at zero angle of attack, it is estimated that the backpack will reduce swimming speed by 11 %, assuming that the turtle produces the same thrust with the unit attached. The drag data are also used to estimate the effect of a transmitter on the swimming energetics of an adult green turtle. Design guidelines are included to minimize the adverse forces and moments caused by the transmitter.

  8. Electrospinning of Biodegradable and Biocompatible Nanofiber Patches from Solutions of ``Green'' Materials for Plant Protection against Fungi Attack

    NASA Astrophysics Data System (ADS)

    Sett, Soumyadip; Lee, Minwook; Yarin, Alexander; Moghadam, S. M. Alavi; Meinke, Matthias; Schroeder, Wolfgang

    2015-11-01

    Biodegradable and biocompatible soy protein/petroleum-derived polymer monolithic fibers containing adhesives were electrospun on commercial rayon pads. The polymers used, PVA and PCL, are widely used in the biomedical industry, including such applications as drug delivery and scaffold manufacturing. Soy protein is an abundant waste of SoyDiesel production, and is widely used as a nutrient. The soy content in our fibers was as high as 40% w/w. Four different adhesives, including ordinary wood glue, repositionable glue and FDA-approved pressure-sensitive glue were used for electrospinning and electrospraying. The normal and shear adhesive strengths of the patches developed in this work were measured and compared. The adhesive strength was sufficient enough to withstand normal atmospheric conditions. These biodegradable and biocompatible nano-textured patches are ready to be used on prune locations without being carried away by wind and will protect plants against fungi attack at these locations, preventing diseases like Vine Decline.

  9. Safety assessment of green tea based beverages and dried green tea extracts as nutritional supplements.

    PubMed

    Dekant, Wolfgang; Fujii, Kenkichi; Shibata, Eiichiro; Morita, Osamu; Shimotoyodome, Akira

    2017-08-05

    The safety of green tea infusions and green tea extract (GTE)-based products is reviewed regarding catechins. Epigallocatechin 3-gallate (EGCG), the major catechin present in green tea, is suspected of being responsible for liver toxicity reported in humans consuming food supplements. Intake of EGCG with green tea infusions and GTE-based beverages is up to about 450mg EGCG/person/day in Europe and higher in Asia. Consumption of green tea is not associated with liver damage in humans, and green tea infusion and GTE-based beverages are considered safe in the range of historical uses. In animal studies, EGCG's potency for liver effects is highly dependent on conditions of administration. Use of NOAELs from bolus administration to derive a tolerable upper intake level applying the margin of safety concept results in acceptable EGCG-doses lower than those from one cup of green tea. NOAELs from toxicity studies applying EGCG with diet/split of the daily dose are a better point of departure for risk characterization. In clinical intervention studies, liver effects were not observed after intakes below 600mg EGCG/person/day. Thus, a tolerable upper intake level of 300mg EGCG/person/day is proposed for food supplements; this gives a twofold safety margin to clinical studies that did not report liver effects and a margin of safety of 100 to the NOAELs in animal studies with dietary administration of green tea catechins. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. Protective effect of 3,4-dihydroxybenzoic acid isolated from Cladophora wrightiana Harvey against ultraviolet B radiation-induced cell damage in human HaCaT keratinocytes.

    PubMed

    Cha, Ji Won; Piao, Mei Jing; Kim, Ki Cheon; Zheng, Jian; Yao, Cheng Wen; Hyun, Chang Lim; Kang, Hee Kyoung; Yoo, Eun Sook; Koh, Young Sang; Lee, Nam Ho; Ko, Mi Hee; Hyun, Jin Won

    2014-03-01

    The aim of the present study was to elucidate the protective properties of 3,4-dihydroxybenzoic acid (DBA) isolated from Cladophora wrightiana Harvey (a green alga) against ultraviolet B (UVB)-induced damage to human HaCaT keratinocytes. DBA exhibited scavenging actions against the 1,1-diphenyl-2-picrylhydrazyl radical, the superoxide anion, and the hydroxyl radical. Furthermore, DBA decreased the levels of intracellular reactive oxygen species generated by hydrogen peroxide or UVB treatment of the cells. DBA also decreased the UVB-augmented levels of phospho-histone H2A.X and the extent of comet tail formation, which are both indications of DNA damage. In addition, the compound safeguarded keratinocytes from UVB-induced injury by reversing the production of apoptotic bodies, overturning the disruption of mitochondrial membrane potential, increasing the expression of the anti-apoptotic protein, B-cell lymphoma 2, and decreasing the expression of the pro-apoptotic proteins, Bcl-2-associated X and cleaved caspase-3. Taken together, these results demonstrate that DBA isolated from a green alga protects human keratinocytes against UVB-induced oxidative stress and apoptosis.

  11. Damage tolerant light absorbing material

    DOEpatents

    Lauf, Robert J.; Hamby, Jr., Clyde; Akerman, M. Alfred; Seals, Roland D.

    1993-01-01

    A light absorbing article comprised of a composite of carbon-bonded carbon fibers, prepared by: blending carbon fibers with a carbonizable organic powder to form a mixture; dispersing the mixture into an aqueous slurry; vacuum molding the aqueous slurry to form a green article; drying and curing the green article to form a cured article; and, carbonizing the cured article at a temperature of at least about 1000.degree. C. to form a carbon-bonded carbon fiber light absorbing composite article having a bulk density less than 1 g/cm.sup.3.

  12. Damage tolerant light absorbing material

    DOEpatents

    Lauf, R.J.; Hamby, C. Jr.; Akerman, M.A.; Seals, R.D.

    1993-09-07

    A light absorbing article comprised of a composite of carbon-bonded carbon fibers, is prepared by: blending carbon fibers with a carbonizable organic powder to form a mixture; dispersing the mixture into an aqueous slurry; vacuum molding the aqueous slurry to form a green article; drying and curing the green article to form a cured article; and, carbonizing the cured article at a temperature of at least about 1000 C to form a carbon-bonded carbon fiber light absorbing composite article having a bulk density less than 1 g/cm[sup 3]. 9 figures.

  13. Ordered Conformational Changes in Damaged DNA Induced by Nucleotide Excision Repair Factors*

    PubMed Central

    Tapias, Angels; Auriol, Jerome; Forget, Diane; Enzlin, Jacqueline H.; Schärer, Orlando D; Coin, Frederic; Coulombe, Benoit; Egly, Jean-Marc

    2015-01-01

    In response to genotoxic attacks, cells activate sophisticated DNA repair pathways such as nucleotide excision repair (NER), which consists of damage removal via dual incision and DNA resynthesis. Using permanganate footprinting as well as highly purified factors, we show that NER is a dynamic process that takes place in a number of successive steps during which the DNA is remodeled around the lesion in response to the various NER factors. XPC/HR23B first recognizes the damaged structure and initiates the opening of the helix from position −3 to +6. TFIIH is then recruited and, in the presence of ATP, extends the opening from position −6 to +6; it also displaces XPC downstream from the lesion, thereby providing the topological structure for recruiting XPA and RPA, which will enlarge the opening. Once targeted by XPG, the damaged DNA is further melted from position −19 to +8. XPG and XPF/ERCC1 endo-nucleases then cut the damaged DNA at the limit of the opened structure that was previously “labeled” by the positioning of XPC/HR23B and TFIIH. PMID:14981083

  14. Disrupting mating behavior of Diaphorina citri (Liviidae)

    USDA-ARS?s Scientific Manuscript database

    Severe economic damage from citrus greening disease, caused by ‘Candidatus Liberibacter asiaticus’ bacteria, has stimulated development of methods to reduce mating and reproduction in populations of its insect vector, Diaphorina citri (Hemiptera: Liviidae). Male D. citri find mating partners by walk...

  15. Autonomous Military Robotics: Risk, Ethics, and Design

    DTIC Science & Technology

    2008-12-20

    civilians, such as most biological or chemical weapons —and perhaps even many modes of ‘cyberattacks’ on computer networks [Rowe, 2008]. ▌51...disproportionately—similar in effect to landmines as well as nuclear, biological , and chemical weapons —are hence immoral to deploy. Whether or not...little cover from attacks, to clearing roads and seas of improvised explosive devices (IEDs), to surveying damage from biochemical weapons , to

  16. Cyber Gray Space Deterrence

    DTIC Science & Technology

    2017-12-21

    the South China Sea or Eastern Ukraine, but they may cause more damage to U.S. economic and national security interests. Administration officials...cyberattacks to undermine U.S. economic and military security. Reports and strategies have been worried over but then ignored, and draft legislation...would not, for instance, be a great innovation for the United States to threaten economic sanctions against a state attacking through cyberspace. Thus

  17. Autonomous Underwater Vehicle Architecture Synthesis for Shipwreck Interior Exploration

    DTIC Science & Technology

    2015-12-01

    silt-out, strong and unpredictable currents, abrasion puncture and shock damage, temperature and pressure variations, toxic substances, corrosion...smooth to resist snagging on debris, and sufficiently lightweight to be portable by two men. 2. The vehicle shall be capable of autonomous...1989, the Komsomolets (K-278), a Russian nuclear attack submarine operating in the Norwegian Sea, went down after unsuccessfully fighting a fire in

  18. New clinical trial uses targeted cancer drug for lymphatic system disease | Center for Cancer Research

    Cancer.gov

    Nivolumab is a targeted cancer drug that blocks the action of a protein called PD-1 and activates T cells to attack cancer cells without damaging normal cells. Mark Roschewski, M.D., of the Lymphoid Malignancies Branch is leading a study to determine if nivolumab is effective in treating patients with certain diseases of the lymphatic system.

  19. Microprocessor Front-End Terminal Study.

    DTIC Science & Technology

    1981-06-01

    Engineer APPROVED: .HN MARCINIAK, Colonel, USAF hief, Information Sciences Division FOR THE COMANDER: JOHN P. HUSS Acting Chief, Plans Office If your...friendly forces. The files are maintained by this branch acting independently or in coordination with lateral services or national agencies. 24 MFT Final...and reconnaissance mission results are analyzed to determine the degree of success of the attack. Target damage assessments are made, and targets are

  20. A Strategic Capability Review of the Georgian Armed Forces

    DTIC Science & Technology

    2012-12-14

    Personnel Carrier AT Anti-Tank ATK Attack BCS Battle Command System BDA Battle Damage Assessment BDE Brigade BLOS Beyond Line of Site BN...and Azerbaijan to Turkey and further to the Europe. Informational Friendly There are several media agencies, both press and television, that can...provide relatively accurate information to the population. There are cases of accusations of government influencing media , by NGOs and journalists

  1. Vis- and NIR-based instruments for detection of black-tip damaged wheat kernels: A comparative study

    USDA-ARS?s Scientific Manuscript database

    Black-tip (BT) present in wheat kernels is a non-mycotoxic fungus that attacks the kernels wherein any of a number of molds forms a dark brown or black sooty mold at the tip of the wheat kernel. Three spectrometers covering the spectral ranges 950-1636nm (Spec1), 600-1045nm (Spec2), and 380-780nm (S...

  2. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    DTIC Science & Technology

    2012-03-01

    Functionality Description Persistence mechanism Mimicry technique Camouflage malware image: • renaming its image • appending its image to victim...particular industrial plant . Exactly which one was targeted still remains unknown, however a majority of the attacks took place in Iran [24]. Due... plant to unstable phase and eventually physical damage. It is interesting to note that a particular block of code - block DB8061 is automatically

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lewis, G.N.; Postol, T.A.

    Long-range nuclear-armed cruise missiles are highly accurate and are capable of reaching most targets within the United States and the Commonwealth of Independent States (CIS) from launch points beyond their borders. Neither the United States nor the CIS has air surveillance systems capable of providing reliable warning against cruise missiles. Thus it is possible that a small-scale cruise missile attack could go entirely undetected until the nuclear weapons arrived over their targets. Such an attack could destroy the other country's entire strategic bomber force on the ground and severely damage its strategic command and control system, perhaps to the pointmore » of endangering the ability of its ICBM force to be launched on warning. This capability makes long-range nuclear cruise missiles potentially one of the most destabilizing of all nuclear weapons.« less

  4. Damage assessment of mission essential buildings based on simulation studies of low yield explosives

    NASA Astrophysics Data System (ADS)

    Allen, Thomas G. L.

    2006-04-01

    There has been a lack of investigations related to low yield explosives instigated by terrorist on small but high occupancy buildings. Also, mitigating the threat of terrorist attacks against high occupancy buildings with network equipment essential to the mission of an organization is a challenging task. At the same time, it is difficult to predict how, why, and when terrorists may attack theses assets. Many factors must be considered in creating a safe building environment. Although it is possible that the dominant threat mode may change in the future, bombings have historically been a favorite tactic of terrorists. Ingredients for homemade bombs are easily obtained on the open market, as are the techniques for making bombs. Bombings are easy and quick to execute. This paper discusses the problems with and provides insights of experience gained in analyzing small scale explosions on older military base buildings. In this study, we examine the placement of various bombs on buildings using the shock wave simulation code CTH and examine the damage effects on the interior of the building, particularly the damage that is incurred on a computer center. These simulation experiments provide data on the effectiveness of a building's security and an understanding of the phenomenology of shocks as they propagate through rooms and corridors. It's purpose is to motivate researchers to take the seriousness of small yield explosives on moderately sized buildings. Visualizations from this analysis are used to understand the complex flow of the air blasts around corridors and hallways. Finally, we make suggestions for improving the mitigation of such terrorist attacks. The intent of this study is not to provide breakthrough technology, but to provide a tool and a means for analyzing the material hardness of a building and to eventually provide the incentive for more security. The information mentioned in this paper is public domain information and easily available via the internet as well as in any public library or bookstore. Therefore, the information discussed in this paper is unclassified and in no way reveals any new methodology or new technology.

  5. Salt attack in parking garage in block of flats

    NASA Astrophysics Data System (ADS)

    Beran, Pavel; Frankeová, Dita; Pavlík, Zbyšek

    2017-07-01

    In recent years many new block of flats with parking garages placed inside the buildings were constructed. This tendency brings beyond question benefits for residents and also for city planning, but it requires new design and structural approaches and advanced material and construction solutions. The analysis of plaster damage on partition wall in parking garage in one of these buildings is presented in the paper. The damage of studied plaster is caused by the salts which are transported together with snow on cars undercarriage into garage area during winter. The snow melts and water with dissolved salts is transported by the capillary suction from concrete floor into the rendered partition wall. Based on the interior temperature, adsorbed water with dissolved chlorides evaporates and from the over saturated pore solution are formed salt crystals that damages the surface plaster layers. This damage would not occur if the partition wall was correctly isolated from the floor finish layer in the parking garage.

  6. X-ray microtomography study of the spallation response in Ta-W

    NASA Astrophysics Data System (ADS)

    McDonald, Samuel; Cotton, Matthew; Millett, Jeremy; Bourne, Neil; Withers, Philip

    2013-06-01

    The response of metallic materials to high strain-rate (impact) loading is of interest to a number of communities. Traditionally, the largest driver has been the military, in its need to understand armour and resistance to ballistic attack. More recently, industries such as aerospace (foreign object damage, bird strike, etc.), automotive (crash-worthiness) and satellite protection (orbital debris) have all appreciated the necessity of such information. It is therefore important to understand the dynamic tensile or spallation response, and in particular to be able to observe in three-dimensions, and in a non-invasive manner, the physical damage present in the spalled region post-impact. The current study presents plate impact experiments investigating the spallation damage response of recovered targets of the tantalum alloy Ta-2.5%W. Using X-ray microtomography the damage resulting from differing impact conditions (impact velocity/stress, pulse duration) is compared and characterised in 3-D. Combined with free surface velocity measurements, the tensile failure mechanisms during dynamic loading have been identified.

  7. Thermal damage control of dye-assisted laser tissue welding: effect of dye concentration

    NASA Astrophysics Data System (ADS)

    Xie, Hua; Buckley, Lisa A.; Prahl, Scott A.; Shaffer, Brian S.; Gregory, Kenton W.

    2001-05-01

    Successful laser-assisted tissue welding was implemented to provide proper weld strength with minimized tissue thermal injury. We investigated and compared the weld strengths and morphologic changes in porcine small intestinal submucose (SIS) and porcine ureteral tissues with various concentration of indocyanine green (ICG) and with a solid albumin sheet. The study showed that the tissues were welded at lower ICG concentration (0.05 mM) with minimized tissue thermal damage using an 800-nm wavelength diode laser.

  8. Polyphenols and Sunburn.

    PubMed

    Saric, Suzana; Sivamani, Raja K

    2016-09-09

    Polyphenols are antioxidant molecules found in many foods such as green tea, chocolate, grape seeds, and wine. Polyphenols have antioxidant, anti-inflammatory, and antineoplastic properties. Growing evidence suggests that polyphenols may be used for the prevention of sunburns as polyphenols decrease the damaging effects of ultraviolet A (UVA) and ultraviolet B (UVB) radiation on the skin. This review was conducted to examine the evidence for use of topically and orally ingested polyphenols in prevention of sunburns. The PubMed database was searched for studies that examined polyphenols and its effects on sunburns. Of the 27 studies found, 15 met the inclusion criteria. Seven studies were conducted on human subjects and eight on animals (mice and rats). Eleven studies evaluated the effects of topical polyphenols, two studies examined ingested polyphenols, and two studies examined both topical and ingested polyphenols. Polyphenol sources included the following plant origins: green tea, white tea, cocoa, Romanian propolis (RP), Calluna vulgaris (Cv), grape seeds, honeybush, and Lepidium meyenii (maca). Eight studies examined green tea. Overall, based on the studies, there is evidence that polyphenols in both oral and topical form may provide protection from UV damage and sunburn, and thus are beneficial to skin health. However, current studies are limited and further research is necessary to evaluate the efficacy, mechanism of action, and potential side effects of various forms and concentrations of polyphenols.

  9. Mapping and detecting bark beetle-caused tree mortality in the western United States

    NASA Astrophysics Data System (ADS)

    Meddens, Arjan J. H.

    Recently, insect outbreaks across North America have dramatically increased and the forest area affected by bark beetles is similar to that affected by fire. Remote sensing offers the potential to detect insect outbreaks with high accuracy. Chapter one involved detection of insect-caused tree mortality on the tree level for a 90km2 area in northcentral Colorado. Classes of interest included green trees, multiple stages of post-insect attack tree mortality including dead trees with red needles ("red-attack") and dead trees without needles ("gray-attack"), and non-forest. The results illustrated that classification of an image with a spatial resolution similar to the area of a tree crown outperformed that from finer and coarser resolution imagery for mapping tree mortality and non-forest classes. I also demonstrated that multispectral imagery could be used to separate multiple postoutbreak attack stages (i.e., red-attack and gray-attack) from other classes in the image. In Chapter 2, I compared and improved methods for detecting bark beetle-caused tree mortality using medium-resolution satellite data. I found that overall classification accuracy was similar between single-date and multi-date classification methods. I developed regression models to predict percent red attack within a 30-m grid cell and these models explained >75% of the variance using three Landsat spectral explanatory variables. Results of the final product showed that approximately 24% of the forest within the Landsat scene was comprised of tree mortality caused by bark beetles. In Chapter 3, I developed a gridded data set with 1-km2 resolution using aerial survey data and improved estimates of tree mortality across the western US and British Columbia. In the US, I also produced an upper estimate by forcing the mortality area to match that from high-resolution imagery in Idaho, Colorado, and New Mexico. Cumulative mortality area from all bark beetles was 5.46 Mha in British Columbia in 2001-2010 and 0.47-5.37 Mha (lower and upper estimate) in the western conterminous US during 1997-2010. Improved methods for detection and mapping of insect outbreak areas will lead to improved assessments of the effects of these forest disturbances on the economy, carbon cycle (and feedback to climate change), fuel loads, hydrology and forest ecology.

  10. Second-Guessing Scientists and Engineers: Post Hoc Criticism and the Reform of Practice in Green Chemistry and Engineering.

    PubMed

    Lynch, William T

    2015-10-01

    The article examines and extends work bringing together engineering ethics and Science and Technology Studies, which had built upon Diane Vaughan's analysis of the Challenger shuttle accident as a test case. Reconsidering the use of her term "normalization of deviance," the article argues for a middle path between moralizing against and excusing away engineering practices contributing to engineering disaster. To explore an illustrative pedagogical case and to suggest avenues for constructive research developing this middle path, it examines the emergence of green chemistry and green engineering. Green chemistry began when Paul Anastas and John Warner developed a set of new rules for chemical synthesis that sought to learn from missed opportunities to avoid environmental damage in the twentieth century, an approach that was soon extended to engineering as well. Examination of tacit assumptions about historical counterfactuals in recent, interdisciplinary discussions of green chemistry illuminate competing views about the field's prospects. An integrated perspective is sought, addressing how both technical practice within chemistry and engineering and the influence of a wider "social movement" can play a role in remedying environmental problems.

  11. Parasitoid-specific induction of plant responses to parasitized herbivores affects colonization by subsequent herbivores.

    PubMed

    Poelman, Erik H; Zheng, Si-Jun; Zhang, Zhao; Heemskerk, Nanda M; Cortesero, Anne-Marie; Dicke, Marcel

    2011-12-06

    Plants are exposed to a suite of herbivorous attackers that often arrive sequentially. Herbivory affects interactions between the host plants and subsequently attacking herbivores. Moreover, plants may respond to herbivory by emitting volatile organic compounds (VOCs) that attract carnivorous natural enemies of the herbivores. However, information borne by VOCs is ubiquitous and may attract carnivores, such as parasitoids, that differ in their effectiveness at releasing the plant from its herbivorous attackers. Furthermore, the development of parasitoids within their herbivorous hosts, attacking a given host plant, may influence the elicitation of defensive reactions in the host plant. This may, in turn, affect the behavior of subsequent herbivores attacking the host plant. Here, we show that the species identity of a parasitoid had a more significant effect on defense responses of Brassica oleracea plants than the species identity of the herbivorous hosts of the parasitoids. Consequently, B. oleracea plants that were damaged by caterpillars (Pieris spp.) parasitized by different parasitoid species varied in the degree to which diamondback moths (Plutella xylostella) selected the plants for oviposition. Attracting parasitoids in general benefitted the plants by reducing diamondback moth colonization. However, the species of parasitoid that parasitized the herbivore significantly affected the magnitude of this benefit by its species-specific effect on herbivore-plant interactions mediated by caterpillar regurgitant. Our findings show that information-mediated indirect defense may lead to unpredictable consequences for plants when considering trait-mediated effects of parasitized caterpillars on the host plant and their consequences because of community-wide responses to induced plants.

  12. Role of Bacillus subtilis Error Prevention Oxidized Guanine System in Counteracting Hexavalent Chromium-Promoted Oxidative DNA Damage

    PubMed Central

    Santos-Escobar, Fernando; Gutiérrez-Corona, J. Félix

    2014-01-01

    Chromium pollution is potentially detrimental to bacterial soil communities, compromising carbon and nitrogen cycles that are essential for life on earth. It has been proposed that intracellular reduction of hexavalent chromium [Cr(VI)] to trivalent chromium [Cr(III)] may cause bacterial death by a mechanism that involves reactive oxygen species (ROS)-induced DNA damage; the molecular basis of the phenomenon was investigated in this work. Here, we report that Bacillus subtilis cells lacking a functional error prevention oxidized guanine (GO) system were significantly more sensitive to Cr(VI) treatment than cells of the wild-type (WT) strain, suggesting that oxidative damage to DNA is involved in the deleterious effects of the oxyanion. In agreement with this suggestion, Cr(VI) dramatically increased the ROS concentration and induced mutagenesis in a GO-deficient B. subtilis strain. Alkaline gel electrophoresis (AGE) analysis of chromosomal DNA of WT and ΔGO mutant strains subjected to Cr(VI) treatment revealed that the DNA of the ΔGO strain was more susceptible to DNA glycosylase Fpg attack, suggesting that chromium genotoxicity is associated with 7,8-dihydro-8-oxodeoxyguanosine (8-oxo-G) lesions. In support of this notion, specific monoclonal antibodies detected the accumulation of 8-oxo-G lesions in the chromosomes of B. subtilis cells subjected to Cr(VI) treatment. We conclude that Cr(VI) promotes mutagenesis and cell death in B. subtilis by a mechanism that involves radical oxygen attack of DNA, generating 8-oxo-G, and that such effects are counteracted by the prevention and repair GO system. PMID:24973075

  13. Bactericidal catechins damage the lipid bilayer.

    PubMed

    Ikigai, H; Nakae, T; Hara, Y; Shimamura, T

    1993-04-08

    The mode of antibacterial action of, the green tea (Camellia sinensis) extracts, (-)-epigallocatechin gallate (EGCg) and (-)-epicatechin (EC) was investigated. Strong bactericidal EGCg caused leakage of 5,6-carboxyfluorescein from phosphatidylcholine liposomes (PC), but EC with very weak bactericidal activity caused little damage to the membrane. Phosphatidylserine and dicetyl phosphate partially protected the membrane from EGCg-mediated damage when reconstituted into the liposome membrane with PC. EGCg, but not EC, caused strong aggregation and NPN-fluorescence quenching of PC-liposomes and these actions were markedly lowered in the presence of negatively charged lipids. These results show that bactericidal catechins primarily act on and damage bacterial membranes. The observation that Gram-negative bacteria are more resistant to bactericidal catechins than Gram-positive bacteria can be explained to some extent by the presence of negatively charged lipopolysaccharide.

  14. Enhancing the cyber-security of smart grids with applications to synchrophasor data

    NASA Astrophysics Data System (ADS)

    Pal, Seemita

    In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of packet-drops and finally detect attacks, if any. In the case of PMU data manipulation attacks, the attacker may modify the data in the PMU packets in order to bias the system states and influence the control center into taking wrong decisions. The proposed detection technique is based on evaluating the equivalent impedances of the transmission lines and classifying the observed anomalies to determine the presence of attack and its location. The scheme for detecting data integrity attacks on SCADA systems is based on utilizing synchrophasor measurements from available PMUs in the grid. The proposed method uses a difference measure, developed in this thesis, to determine the relative divergence and mis-correlation between the datasets. Based on the estimated difference measure, tampered and genuine data can be distinguished. The proposed detection mechanisms have demonstrated high accuracy in real-time detection of attacks of various magnitudes, simulated on real PMU data obtained from the NY grid. By performing alarm clustering, the occurrence of false alarms has been reduced to almost zero. The solutions are computationally inexpensive, low on cost, do not add any overhead, and do not require any feedback from the network.

  15. Development of a Near Real-Time Hail Damage Swath Identification Algorithm for Vegetation

    NASA Technical Reports Server (NTRS)

    Bell, Jordan R.; Molthan, Andrew L.; Schultz, Kori A.; McGrath, Kevin M.; Burks, Jason E.

    2015-01-01

    Every year in the Midwest and Great Plains, widespread greenness forms in conjunction with the latter part of the spring-summer growing season. This prevalent greenness forms as a result of the high concentration of agricultural areas having their crops reach their maturity before the fall harvest. This time of year also coincides with an enhanced hail frequency for the Great Plains (Cintineo et al. 2012). These severe thunderstorms can bring damaging winds and large hail that can result in damage to the surface vegetation. The spatial extent of the damage can relatively small concentrated area or be a vast swath of damage that is visible from space. These large areas of damage have been well documented over the years. In the late 1960s aerial photography was used to evaluate crop damage caused by hail. As satellite remote sensing technology has evolved, the identification of these hail damage streaks has increased. Satellites have made it possible to view these streaks in additional spectrums. Parker et al. (2005) documented two streaks using the Moderate Resolution Imaging Spectroradiometer (MODIS) that occurred in South Dakota. He noted the potential impact that these streaks had on the surface temperature and associated surface fluxes that are impacted by a change in temperature. Gallo et al. (2012) examined at the correlation between radar signatures and ground observations from storms that produced a hail damage swath in Central Iowa also using MODIS. Finally, Molthan et al. (2013) identified hail damage streaks through MODIS, Landsat-7, and SPOT observations of different resolutions for the development of a potential near-real time applications. The manual analysis of hail damage streaks in satellite imagery is both tedious and time consuming, and may be inconsistent from event to event. This study focuses on development of an objective and automatic algorithm to detect these areas of damage in a more efficient and timely manner. This study utilizes the MODIS sensor aboard the NASA Aqua satellite. Aqua was chosen due to an afternoon orbit over the United States when land surface temperatures are relatively warm and improve the contrast between damaged and undamaged areas. This orbit is also similar to the orbit of the Suomi-National Polar-orbiting Partnership (NPP) satellite. The Suomi NPP satellite hosts the Visible Infrared Imaging Radiometer Suite (VIIRS) instrument, which is the next generation of a MODIS-like sensor in polar orbit.

  16. Green Synthesized Zinc Oxide (ZnO) Nanoparticles Induce Oxidative Stress and DNA Damage in Lathyrus sativus L. Root Bioassay System

    PubMed Central

    Panda, Kamal K.; Golari, Dambaru; Venugopal, A.; Achary, V. Mohan M.; Phaomei, Ganngam; Parinandi, Narasimham L.; Sahu, Hrushi K.; Panda, Brahma B.

    2017-01-01

    Zinc oxide nanoparticles (ZnONP-GS) were synthesised from the precursor zinc acetate (Zn(CH3COO)2) through the green route using the milky latex from milk weed (Calotropis gigantea L. R. Br) by alkaline precipitation. Formation of the ZnONP-GS was monitored by UV-visible spectroscopy followed by characterization and confirmation by energy-dispersive X-ray spectroscopy (EDX), transmission electron microscopy (TEM), and X-ray diffraction (XRD). Both the ZnONP-GS and the commercially available ZnONP-S (Sigma-Aldrich) and cationic Zn2+ from Zn(CH3COO)2 were tested in a dose range of 0–100 mg·L−1 for their potency (i) to induce oxidative stress as measured by the generation reactive oxygen species (ROS: O2•−, H2O2 and •OH), cell death, and lipid peroxidation; (ii) to modulate the activities of antioxidant enzymes: catalase (CAT), superoxide dismutase (SOD), guaiacol peroxidase (GPX), and ascorbate peroxidase (APX); and (iii) to cause DNA damage as determined by Comet assay in Lathyrus sativus L. root bioassay system. Antioxidants such as Tiron and dimethylthiourea significantly attenuated the ZnONP-induced oxidative and DNA damage, suggesting the involvement of ROS therein. Our study demonstrated that both ZnONP-GS and ZnONP-S induced oxidative stress and DNA damage to a similar extent but were significantly less potent than Zn2+ alone. PMID:28524089

  17. How is NATO Meeting the Challenge of Cyberspace

    DTIC Science & Technology

    2017-12-21

    surveillance cameras. We also saw the first attacks driven by artificial intelligence , and increasing evidence of collusion between state... intelligence services and organized crime networks. Yet it is not the much discussed theme of the economic damage inflicted by cyber crime in the past year that...structural sabotage. Although companies in other countries were also affected by NotPetya, 80 percent of the impact was in Ukraine.1 Intelligence

  18. Multinational Experiment 7: Situation Awareness Technologies Used in Locked Shield 2012

    DTIC Science & Technology

    2013-07-08

    Teams in coordinating efforts to repel the attacks and to have a clear overall situational awareness at all times. Different kinds of visualisation ...experts Video/ Audio records labourious to follow and analyze Capture information in textual form Domain experts are too busy mitigating the damages to...Centers to tag information to produce more meaningful visualisations and to provide feedback to reporters Workflows, terminology, requirements for Cyber

  19. Trap Type, Chirality of a-Pinene, and Geographic Region Affect Sampling Efficiency of Root and Lower Stem Insects in Pine

    Treesearch

    Nadir Erbilgin; Alex Szele; Kier Dean Klepzig; Kenneth Francis Raffa

    2001-01-01

    Root and lower stem insects cause significant damage to conifers, vector phytopathogenic fungi, and can predispose trees to bark beetle attacks. The development of effective sampling techniques is an important component in managing these cryptic insects. We tested the effects of trap type and stereochemistry of a-pinene, in combination with ethanol, on catches of the...

  20. Repair, Evaluation, Maintenance, and Rehabilitation Research Program. Inspection of the Engineering Condition of Underwater Concrete Structures.

    DTIC Science & Technology

    1989-04-01

    corrosion of rebar Spalling of concrete surface IIl Detect hidden and beginning Location of rebar damage Beginning corrosion of rebar ...honeycombs MD Moderate defects: spalling of concrete minor corrosion of exposed rebar rust stains along rebar with or without visible cracking softening of...velocity. . Replenishment of the attacking chemical hgents. h. Higher temperatures. i. Corrosion of reinforcing steel. 46. Note that concrete which

  1. UAV Swarm Attack: Protection System Alternatives for Destroyers

    DTIC Science & Technology

    2012-12-01

    Tactical Rocket-Propelled Grenade Airbag Protection System TRL - Technology Readiness Level UAV - Unmanned Aerial Vehicle USN - United States...com- posed of 62 DDGs is $2.014 billion dollars for the 12 year life cycle. J. REACTIVE ARMOR The Tactical Rocket-Propelled Grenade (RPG) Airbag ...Protection System (TRAPS) system involves ‘close-in’ protection using airbags located around a vehicle to minimize the damage from RPGs. This system was

  2. Lock Wall Expedient Repair Demonstration Monitoring, John T. Myers Locks and Dam, Ohio River

    DTIC Science & Technology

    2011-10-01

    original condition. Complete confinement of the concrete within the armor appears to provide good resistance to impact and abrasion (Figure 29). ERDC... resistance to impact and abrasion . Synopsis General classifications of observed damage were described and, where repairs are considered necessary or...against abrasion , fire , and environmental attacks and to improve the adhesion to other construc- tion materials. For high-weatherproof performance

  3. Special Observance Planning Guide

    DTIC Science & Technology

    2015-11-01

    Finding the right speaker for an event can be a challenge. Many speakers are recommended based on word-of-mouth or through a group connected to...An unprepared, rambling speaker or one who intentionally or unintentionally attacks a group or its members can be extremely damaging to a program...Don’t assume that an organizational senior leader is an adequate speaker based on position, rank, and/or affiliation with a reference group

  4. Combat Power Analysis is Combat Power Density

    DTIC Science & Technology

    2012-05-17

    Fires battalion of 16x - Partisan employment of lEOs determine the outcome of any engagement 155mm - 81mm and 60mm Mortars where collateral damage...Cutting the enemy LOC to support their - 4x Forward support - Relatively light sustainment conventional forces will be relatively ineffective so...Neutralization of the partisan company as well Weakness: Weakness: as attacking the LOCs will isolate the enemy. Logistical assets require roads - LOCs

  5. Resistance of Rice Varieties to the Stored-Product Insect, Sitophilus zeamais (Coleoptera: Curculionidae).

    PubMed

    Antunes, Catarina; Mendes, Raquel; Lima, Arlindo; Barros, Graça; Fields, Paul; Da Costa, Luísa Beirão; Rodrigues, José Carlos; Silva, Maria José; Correia, Augusto Manuel; Carvalho, Maria Otilia

    2016-02-01

    Four common Portuguese rice varieties--Thaibonnet, Gladio, Albatros, and Eurosis--were tested for their relative susceptibility to Sitophilus zeamais Motschulsky, a common pest of stored rice in Portugal and in tropical countries. Physical (moisture content, hardness, length, and width) and chemical (by attenuated total reflection-Fourier transform infrared spectroscopy) properties of rice kernels were measured. Insect bioassays measured median developmental time, Dobie's index of susceptibility, percentage of damaged grains and weight loss, and progeny developed. This was done for paddy, brown rice, and polished rice for each variety. There were small, but significant, differences in insect resistance among the varieties. However, it was different for paddy and polished rice. In paddy, these differences were correlated with hull damage, and Eurosis was the most susceptible variety. In polished rice, resistance was correlated with hardness, and Thaibonnet was the most susceptible variety. In general, paddy rice was more resistant to insect attack, followed by polished rice and then brown rice. Paddy kernels selected with undamaged hull were completely resistant to attack. Implications for IPM and breeding for resistant varieties are discussed. © The Authors 2015. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  6. Is lipid signaling through cannabinoid 2 receptors part of a protective system?

    PubMed Central

    Pacher, P.; Mechoulam, R.

    2011-01-01

    The mammalian body has a highly developed immune system which guards against continuous invading protein attacks and aims at preventing, attenuating or repairing the inflicted damage. It is conceivable that through evolution analogous biological protective systems have been evolved against non-protein attacks. There is emerging evidence that lipid endocannabinoid signaling through cannabinoid 2 (CB2) receptors may represent an example/part of such a protective system/armamentarium. Inflammation/tissue injury triggers rapid elevations in local endocannabinoid levels, which in turn regulate signaling responses in immune and other cells modulating their critical functions. Changes in endocannabinoid levels and/or CB2 receptor expressions have been reported in almost all diseases affecting humans, ranging from cardiovascular, gastrointestinal, liver, kidney, neurodegenerative, psychiatric, bone, skin, auto-immune, lung disorders to pain and cancer, and modulating CB2 receptor activity holds tremendous therapeutic potential in these pathologies. While CB2 receptor activation in general mediates immunosuppressive effects, which limit inflammation and associated tissue injury in large number of pathological conditions, in some disease states activation of the CB2 receptor may enhance or even trigger tissue damage, which will also be discussed alongside the protective actions of the CB2 receptor stimulation with endocannabinoids or synthetic agonists, and the possible biological mechanisms involved in these effects. PMID:21295074

  7. Is lipid signaling through cannabinoid 2 receptors part of a protective system?

    PubMed

    Pacher, P; Mechoulam, R

    2011-04-01

    The mammalian body has a highly developed immune system which guards against continuous invading protein attacks and aims at preventing, attenuating or repairing the inflicted damage. It is conceivable that through evolution analogous biological protective systems have been evolved against non-protein attacks. There is emerging evidence that lipid endocannabinoid signaling through cannabinoid 2 (CB₂) receptors may represent an example/part of such a protective system/armamentarium. Inflammation/tissue injury triggers rapid elevations in local endocannabinoid levels, which in turn regulate signaling responses in immune and other cells modulating their critical functions. Changes in endocannabinoid levels and/or CB₂ receptor expressions have been reported in almost all diseases affecting humans, ranging from cardiovascular, gastrointestinal, liver, kidney, neurodegenerative, psychiatric, bone, skin, autoimmune, lung disorders to pain and cancer, and modulating CB₂ receptor activity holds tremendous therapeutic potential in these pathologies. While CB₂ receptor activation in general mediates immunosuppressive effects, which limit inflammation and associated tissue injury in large number of pathological conditions, in some disease states activation of the CB₂ receptor may enhance or even trigger tissue damage, which will also be discussed alongside the protective actions of the CB₂ receptor stimulation with endocannabinoids or synthetic agonists, and the possible biological mechanisms involved in these effects. Published by Elsevier Ltd.

  8. Genetic doping and health damages.

    PubMed

    Fallahi, Aa; Ravasi, Aa; Farhud, Dd

    2011-01-01

    Use of genetic doping or gene transfer technology will be the newest and the lethal method of doping in future and have some unpleasant consequences for sports, athletes, and outcomes of competitions. The World Anti-Doping Agency (WADA) defines genetic doping as "the non-therapeutic use of genes, genetic elements, and/or cells that have the capacity to enhance athletic performance ". The purpose of this review is to consider genetic doping, health damages and risks of new genes if delivered in athletes. This review, which is carried out by reviewing relevant publications, is primarily based on the journals available in GOOGLE, ELSEVIER, PUBMED in fields of genetic technology, and health using a combination of keywords (e.g., genetic doping, genes, exercise, performance, athletes) until July 2010. There are several genes related to sport performance and if they are used, they will have health risks and sever damages such as cancer, autoimmunization, and heart attack.

  9. Genetic Doping and Health Damages

    PubMed Central

    Fallahi, AA; Ravasi, AA; Farhud, DD

    2011-01-01

    Background: Use of genetic doping or gene transfer technology will be the newest and the lethal method of doping in future and have some unpleasant consequences for sports, athletes, and outcomes of competitions. The World Anti-Doping Agency (WADA) defines genetic doping as “the non-therapeutic use of genes, genetic elements, and/or cells that have the capacity to enhance athletic performance ”. The purpose of this review is to consider genetic doping, health damages and risks of new genes if delivered in athletes. Methods: This review, which is carried out by reviewing relevant publications, is primarily based on the journals available in GOOGLE, ELSEVIER, PUBMED in fields of genetic technology, and health using a combination of keywords (e.g., genetic doping, genes, exercise, performance, athletes) until July 2010. Conclusion: There are several genes related to sport performance and if they are used, they will have health risks and sever damages such as cancer, autoimmunization, and heart attack. PMID:23113049

  10. A Radiation Chemistry Code Based on the Green's Function of the Diffusion Equation

    NASA Technical Reports Server (NTRS)

    Plante, Ianik; Wu, Honglu

    2014-01-01

    Stochastic radiation track structure codes are of great interest for space radiation studies and hadron therapy in medicine. These codes are used for a many purposes, notably for microdosimetry and DNA damage studies. In the last two decades, they were also used with the Independent Reaction Times (IRT) method in the simulation of chemical reactions, to calculate the yield of various radiolytic species produced during the radiolysis of water and in chemical dosimeters. Recently, we have developed a Green's function based code to simulate reversible chemical reactions with an intermediate state, which yielded results in excellent agreement with those obtained by using the IRT method. This code was also used to simulate and the interaction of particles with membrane receptors. We are in the process of including this program for use with the Monte-Carlo track structure code Relativistic Ion Tracks (RITRACKS). This recent addition should greatly expand the capabilities of RITRACKS, notably to simulate DNA damage by both the direct and indirect effect.

  11. Pulsed laser-induced damage of metals at 492 nm.

    PubMed

    Marrs, C D; Faith, W N; Dancy, J H; Porteus, J O

    1982-11-15

    A triaxial flashlamp-pumped dye laser has been used to perform laser damage testing of metal surfaces in the blue-green spectral region. Using LD490 laser dye, the laser produces 0.18-J, 0.5-microsec pulses at 492 nm. The spatial profile of the focused beam is measured in orthogonal directions in the plane of the sample surface. The orthogonal profiles are flat-topped Gaussians with 1/e(2) widths of 270 microm. Multithreshold laser damage test results are presented for polished Mo, diamond-turned high-purity Al alloy, diamond-turned bulk Cu, and diamond-turned electrodeposits of Ag and Au on Cu. Comparisons are made between calculated and experimentally measured slip and melt thresholds.

  12. Infestation of Broad Bean (Vicia faba) by the Green Stink Bug (Nezara viridula) Decreases Shoot Abscisic Acid Contents under Well-Watered and Drought Conditions.

    PubMed

    Ederli, Luisa; Brunetti, Cecilia; Centritto, Mauro; Colazza, Stefano; Frati, Francesca; Loreto, Francesco; Marino, Giovanni; Salerno, Gianandrea; Pasqualini, Stefania

    2017-01-01

    The response of broad bean ( Vicia faba ) plants to water stress alone and in combination with green stink bug ( Nezara viridula ) infestation was investigated through measurement of: (1) leaf gas exchange; (2) plant hormone titres of abscisic acid (ABA) and its metabolites, and of salicylic acid (SA); and (3) hydrogen peroxide (H 2 O 2 ) content. Furthermore, we evaluated the effects of experimentally water-stressed broad-bean plants on N. viridula performance in terms of adult host-plant preference, and nymph growth and survival. Water stress significantly reduced both photosynthesis ( A ) and stomatal conductance ( g s ), while infestation by the green stink bug had no effects on photosynthesis but significantly altered partitioning of ABA between roots and shoots. Leaf ABA was decreased and root ABA increased as a result of herbivore attack, under both well-watered and water-deprived conditions. Water stress significantly impacted on SA content in leaves, but not on H 2 O 2 . However, infestation of N. viridula greatly increased both SA and H 2 O 2 contents in leaves and roots, which suggests that endogenous SA and H 2 O 2 have roles in plant responses to herbivore infestation. No significant differences were seen for green stink bug choice between well-watered and water-stressed plants. However, for green stink bug nymphs, plant water stress promoted significantly lower weight increases and significantly higher mortality, which indicates that highly water-stressed host plants are less suitable for N. viridula infestation. In conclusion two important findings emerged: (i) association of water stress with herbivore infestation largely changes plant response in terms of phytohormone contents; but (ii) water stress does not affect the preference of the infesting insects, although their performance was impaired.

  13. Infestation of Broad Bean (Vicia faba) by the Green Stink Bug (Nezara viridula) Decreases Shoot Abscisic Acid Contents under Well-Watered and Drought Conditions

    PubMed Central

    Ederli, Luisa; Brunetti, Cecilia; Centritto, Mauro; Colazza, Stefano; Frati, Francesca; Loreto, Francesco; Marino, Giovanni; Salerno, Gianandrea; Pasqualini, Stefania

    2017-01-01

    The response of broad bean (Vicia faba) plants to water stress alone and in combination with green stink bug (Nezara viridula) infestation was investigated through measurement of: (1) leaf gas exchange; (2) plant hormone titres of abscisic acid (ABA) and its metabolites, and of salicylic acid (SA); and (3) hydrogen peroxide (H2O2) content. Furthermore, we evaluated the effects of experimentally water-stressed broad-bean plants on N. viridula performance in terms of adult host–plant preference, and nymph growth and survival. Water stress significantly reduced both photosynthesis (A) and stomatal conductance (gs), while infestation by the green stink bug had no effects on photosynthesis but significantly altered partitioning of ABA between roots and shoots. Leaf ABA was decreased and root ABA increased as a result of herbivore attack, under both well-watered and water-deprived conditions. Water stress significantly impacted on SA content in leaves, but not on H2O2. However, infestation of N. viridula greatly increased both SA and H2O2 contents in leaves and roots, which suggests that endogenous SA and H2O2 have roles in plant responses to herbivore infestation. No significant differences were seen for green stink bug choice between well-watered and water-stressed plants. However, for green stink bug nymphs, plant water stress promoted significantly lower weight increases and significantly higher mortality, which indicates that highly water-stressed host plants are less suitable for N. viridula infestation. In conclusion two important findings emerged: (i) association of water stress with herbivore infestation largely changes plant response in terms of phytohormone contents; but (ii) water stress does not affect the preference of the infesting insects, although their performance was impaired. PMID:28642773

  14. Ceramic regenerator systems development program. [for automobile gas turbine engines

    NASA Technical Reports Server (NTRS)

    Cook, J. A.; Fucinari, C. A.; Lingscheit, J. N.; Rahnke, C. J.

    1977-01-01

    Ceramic regenerator cores are considered that can be used in passenger car gas turbine engines, Stirling engines, and industrial/truck gas turbine engines. Improved materials and design concepts aimed at reducing or eliminating chemical attack were placed on durability test in Ford 707 industrial gas turbine engines. The results of 19,600 hours of turbine engine durability testing are described. Two materials, aluminum silicate and magnesium aluminum silicate, continue to show promise toward achieving the durability objectives of this program. A regenerator core made from aluminum silicate showed minimal evidence of chemical attack damage after 6935 hours of engine test at 800 C and another showed little distress after 3510 hours at 982 C. Results obtained in ceramic material screening tests, aerothermodynamic performance tests, stress analysis, cost studies, and material specifications are also included.

  15. Optical Thin Film Coating Having High Damage Resistance in Near-Stoichiometric MgO-Doped LiTaO3

    NASA Astrophysics Data System (ADS)

    Tateno, Ryo; Kashiwagi, Kunihiro

    2008-08-01

    Currently, High power and compact red, green, and blue (RGB) lasers are being considered for use in large screen laser televisions and reception-lobby projectors. Among these three laser sources, green semiconductor lasers are expensive and exhibit inferior performance in terms of the semiconductor material used, making it difficult to achieve a high output. In this study, we examined the use of our coating on MgO-doped LiTaO3, using a mirror coated with a multilayer film. Over a substrate, a Ta2O5 film was used to coat a high-refractive-index film layer, and a SiO2 film was used to coat a low-refractive-index film layer. To improve reflectivity, we designed the peak of the electric field intensity to be in the film layer with the low refractive index. As a result, the film endurance of 100 J/cm2 was obtained by one-on-one testing. With the nonlinear crystal material, the mirror without our coating exhibited a damage threshold of 33 J/cm2; however, after coating, this mirror demonstrated a higher damage threshold of 47 J/cm2. Thus, the film we fabricated using this technique is useful for improving the strength and durability of laser mirrors.

  16. Simulation of the radiolysis of water using Green's functions of the diffusion equation.

    PubMed

    Plante, I; Cucinotta, F A

    2015-09-01

    Radiation chemistry is of fundamental importance in the understanding of the effects of ionising radiation, notably with regard to DNA damage by indirect effect (e.g. damage by ·OH radicals created by the radiolysis of water). In the recent years, Green's functions of the diffusion equation (GFDEs) have been used extensively in biochemistry, notably to simulate biochemical networks in time and space. In the present work, an approach based on the GFDE will be used to refine existing models on the indirect effect of ionising radiation on DNA. As a starting point, the code RITRACKS (relativistic ion tracks) will be used to simulate the radiation track structure and calculate the position of all radiolytic species formed during irradiation. The chemical reactions between these radiolytic species and with DNA will be done by using an efficient Monte Carlo sampling algorithm for the GFDE of reversible reactions with an intermediate state that has been developed recently. These simulations should help the understanding of the contribution of the indirect effect in the formation of DNA damage, particularly with regards to the formation of double-strand breaks. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  17. Specificity of herbivore-induced hormonal signaling and defensive traits in five closely related milkweeds (Asclepias spp.).

    PubMed

    Agrawal, Anurag A; Hastings, Amy P; Patrick, Eamonn T; Knight, Anna C

    2014-07-01

    Despite the recognition that phytohormonal signaling mediates induced responses to herbivory, we still have little understanding of how such signaling varies among closely related species and may generate herbivore-specific induced responses. We studied closely related milkweeds (Asclepias) to link: 1) plant damage by two specialist chewing herbivores (milkweed leaf beetles Labidomera clivicolis and monarch caterpillars Danaus plexippus); 2) production of the phytohormones jasmonic acid (JA), salicylic acid (SA), and abscisic acid (ABA); 3) induction of defensive cardenolides and latex; and 4) impacts on Danaus caterpillars. We first show that A. syriaca exhibits induced resistance following monarch herbivory (i.e., reduced monarch growth on previously damaged plants), while the defensively dissimilar A. tuberosa does not. We next worked with a broader group of five Asclepias, including these two species, that are highly divergent in defensive traits yet from the same clade. Three of the five species showed herbivore-induced changes in cardenolides, while induced latex was found in four species. Among the phytohormones, JA and ABA showed specific responses (although they generally increased) to insect species and among the plant species. In contrast, SA responses were consistent among plant and herbivore species, showing a decline following herbivore attack. Jasmonic acid showed a positive quantitative relationship only with latex, and this was strongest in plants damaged by D. plexippus. Although phytohormones showed qualitative tradeoffs (i.e., treatments that enhanced JA reduced SA), the few significant individual plant-level correlations among hormones were positive, and these were strongest between JA and ABA in monarch damaged plants. We conclude that: 1) latex exudation is positively associated with endogenous JA levels, even among low-latex species; 2) correlations among milkweed hormones are generally positive, although herbivore damage induces a divergence (tradeoff) between JA and SA; 3) induction of cardenolides and latex are not necessarily physiologically linked; and 4) even very closely related species show highly divergent induction, with some species showing strong defenses, hormonally-mediated induction, and impacts on herbivores, while other milkweed species apparently use alternative strategies to cope with insect attack.

  18. The impact of ecolabel knowledge to purchase decision of green producton biology students

    NASA Astrophysics Data System (ADS)

    Sigit, Diana Vivanti; Fauziah, Rizky; Heryanti, Erna

    2017-08-01

    The world needs real solutions to reduce the impact of environmental damages. Students as agents of changes have a role to overcome these problems. One of the important solution is to be a critical consumer who has purchase decisions in a green product. To show the quality of an environmental friendly product, it is then required an ecolabel on the green product which indicates that the product has been through the production processed and come from environmental friendly substances. The research aimed at finding out whether there was an impact of ecolabel knowledge with purchase decision of green product on biology students. This research was conducted in Biology Department. This research used a survey descriptive method. The population used was biology students of Universitas Negeri Jakarta while the sampling technique was done through simple random sampling technique with 147 respondents. Instrument used were ecolabel knowledge test and a questionnaire of green product purchase decision. The result of prerequisite test showed that the data was normally distributed and homogenous variance. The regression model obtained was Ŷ=77.083+ 0.370X. Meanwhile, the determinant coefficient (r2) obtained was 0.047 or 4.7% that mean ecolabel knowledge just contributed 4,71% to the green product purchase decision. These implied that many factors contributed in the purchase decision of green product instead of ecolabel knowledge.

  19. Optimised synthesis of ZnO-nano-fertiliser through green chemistry: boosted growth dynamics of economically important L. esculentum.

    PubMed

    Jabeen, Nyla; Maqbool, Qaisar; Bibi, Tahira; Nazar, Mudassar; Hussain, Syed Z; Hussain, Talib; Jan, Tariq; Ahmad, Ishaq; Maaza, Malik; Anwaar, Sadaf

    2018-06-01

    Mounting-up economic losses to annual crops yield due to micronutrient deficiency, fertiliser inefficiency and increasing microbial invasions (e.g. Xanthomonas cempestri attack on tomatoes) are needed to be solved via nano-biotechnology. So keeping this in view, the authors' current study presents the new horizon in the field of nano-fertiliser with highly nutritive and preservative effect of green fabricated zinc oxide-nanostructures (ZnO-NSs) during Lycopersicum esculentum (tomato) growth dynamics. ZnO-NS prepared via green chemistry possesses highly homogenous crystalline structures well-characterised through ultraviolet and visible spectroscopy, Fourier transform infrared spectroscopy, X-ray diffraction and scanning electron microscope. The ZnO-NS average size was found as small as 18 nm having a crystallite size of 5 nm. L. esculentum were grown in different concentrations of ZnO-NS to examine the different morphological parameters includes time of seed germination, germination percentage, the number of plant leaves, the height of the plant, average number of branches, days count for flowering and fruiting time period along with fruit quantity. Promising results clearly predict that bio-fabricated ZnO-NS at optimum concentration resulted as growth booster and dramatically triggered the plant yield.

  20. Molecular recognition of malachite green by hemoglobin and their specific interactions: insights from in silico docking and molecular spectroscopy.

    PubMed

    Peng, Wei; Ding, Fei; Peng, Yu-Kui; Sun, Ying

    2014-01-01

    Malachite green is an organic compound that can be widely used as a dyestuff for various materials; it has also emerged as a controversial agent in aquaculture. Since malachite green is proven to be carcinogenic and mutagenic, it may become a hazard to public health. For this reason, it is urgently required to analyze this controversial dye in more detail. In our current research, the interaction between malachite green and hemoglobin under physiological conditions was investigated by the methods of molecular modeling, fluorescence spectroscopy, circular dichroism (CD) as well as hydrophobic ANS displacement experiments. From the molecular docking, the central cavity of hemoglobin was assigned to possess high-affinity for malachite green, this result was corroborated by time-resolved fluorescence and hydrophobic ANS probe results. The recognition mechanism was found to be of static type, or rather the hemoglobin-malachite green complex formation occurred via noncovalent interactions such as π-π interactions, hydrogen bonds and hydrophobic interactions with an association constant of 10(4) M(-1). Moreover, the results also show that the spatial structure of the biopolymer was changed in the presence of malachite green with a decrease of the α-helix and increase of the β-sheet, turn and random coil suggesting protein damage, as derived from far-UV CD and three-dimensional fluorescence. Results of this work will help to further comprehend the molecular recognition of malachite green by the receptor protein and the possible toxicological profiles of other compounds, which are the metabolites and ramifications of malachite green.

Top