Optimal response to attacks on the open science grids.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Altunay, M.; Leyffer, S.; Linderoth, J. T.
2011-01-01
Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in themore » grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.« less
Critical Infrastructure Protection: EMP Impacts on the U.S. Electric Grid
NASA Astrophysics Data System (ADS)
Boston, Edwin J., Jr.
The purpose of this research is to identify the United States electric grid infrastructure systems vulnerabilities to electromagnetic pulse attacks and the cyber-based impacts of those vulnerabilities to the electric grid. Additionally, the research identifies multiple defensive strategies designed to harden the electric grid against electromagnetic pulse attack that include prevention, mitigation and recovery postures. Research results confirm the importance of the electric grid to the United States critical infrastructures system and that an electromagnetic pulse attack against the electric grid could result in electric grid degradation, critical infrastructure(s) damage and the potential for societal collapse. The conclusions of this research indicate that while an electromagnetic pulse attack against the United States electric grid could have catastrophic impacts on American society, there are currently many defensive strategies under consideration designed to prevent, mitigate and or recover from an electromagnetic pulse attack. However, additional research is essential to further identify future target hardening opportunities, efficient implementation strategies and funding resources.
NASA Astrophysics Data System (ADS)
Liu, Xuan
Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.
Method and apparatus for detecting cyber attacks on an alternating current power grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
McEachern, Alexander; Hofmann, Ronald
A method and apparatus for detecting cyber attacks on remotely-operable elements of an alternating current distribution grid. Two state estimates of the distribution grid are prepared, one of which uses micro-synchrophasors. A difference between the two state estimates indicates a possible cyber attack.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an RF mesh based architecture, under cyber attacks. We analyze the resiliency of the communication architecture by studying the performance of high-level smart grid functions such as metering, and demand response which depend on communication. Disrupting the operation of these functions impacts the operational resiliency of the smart grid. Our analysis shows that it takes an attacker only a small fraction of meters to compromisemore » the communication resiliency of the smart grid. We discuss the implications of our result to critical smart grid functions and to the overall security of the smart grid.« less
Analyzing Resiliency of the Smart Grid Communication Architectures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anas AlMajali, Anas; Viswanathan, Arun; Neuman, Clifford
Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an RF mesh based architecture, under cyber attacks. We analyze the resiliency of the communication architecture by studying the performance of high-level smart grid functions such as metering, and demand response which depend on communication. Disrupting the operation of these functions impacts the operational resiliency of the smart grid. Our analysis shows that it takes an attacker only a small fraction of meters to compromisemore » the communication resiliency of the smart grid. We discuss the implications of our result to critical smart grid functions and to the overall security of the smart grid.« less
Does topological information matter for power grid vulnerability?
Ouyang, Min; Yang, Kun
2014-12-01
Power grids, which are playing an important role in supporting the economy of a region as well as the life of its citizens, could be attacked by terrorists or enemies to damage the region. Depending on different levels of power grid information collected by the terrorists, their attack strategies might be different. This paper groups power grid information into four levels: no information, purely topological information (PTI), topological information with generator and load nodes (GLNI), and full information (including component physical properties and flow parameters information), and then identifies possible attack strategies for each information level. Analyzing and comparing power grid vulnerability under these attack strategies from both terrorists' and utility companies' point of view give rise to an approach to quantify the relative values of these three types of information, including PTI, GLNI, and component parameter information (CPI). This approach can provide information regarding the extent to which topological information matters for power system vulnerability decisions. Taking several test systems as examples, results show that for small attacks with p ≤ 0.1, CPI matters the most; when taking attack cost into consideration and assuming that the terrorists take the optimum cost-efficient attack intensity, then CPI has the largest cost-based information value.
Does topological information matter for power grid vulnerability?
NASA Astrophysics Data System (ADS)
Ouyang, Min; Yang, Kun
2014-12-01
Power grids, which are playing an important role in supporting the economy of a region as well as the life of its citizens, could be attacked by terrorists or enemies to damage the region. Depending on different levels of power grid information collected by the terrorists, their attack strategies might be different. This paper groups power grid information into four levels: no information, purely topological information (PTI), topological information with generator and load nodes (GLNI), and full information (including component physical properties and flow parameters information), and then identifies possible attack strategies for each information level. Analyzing and comparing power grid vulnerability under these attack strategies from both terrorists' and utility companies' point of view give rise to an approach to quantify the relative values of these three types of information, including PTI, GLNI, and component parameter information (CPI). This approach can provide information regarding the extent to which topological information matters for power system vulnerability decisions. Taking several test systems as examples, results show that for small attacks with p ≤ 0.1, CPI matters the most; when taking attack cost into consideration and assuming that the terrorists take the optimum cost-efficient attack intensity, then CPI has the largest cost-based information value.
AVQS: attack route-based vulnerability quantification scheme for smart grid.
Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.
A Robust and Resilient Network Design Paradigm for Region-Based Faults Inflicted by WMD Attack
2016-04-01
MEASUREMENTS FOR GRID MONITORING AND CONTROL AGAINST POSSIBLE WMD ATTACKS We investigated big data processing of PMU measurements for grid monitoring and...control against possible WMD attacks. Big data processing and analytics of synchrophasor measurements, collected from multiple locations of power grids...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources
Metrics for Assessment of Smart Grid Data Integrity Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Miles McQueen; Russell Bent
2012-07-01
There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification. PMID:25152923
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment
Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
2013-01-01
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.
Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
2014-07-01
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.
On a simulation study for reliable and secured smart grid communications
NASA Astrophysics Data System (ADS)
Mallapuram, Sriharsha; Moulema, Paul; Yu, Wei
2015-05-01
Demand response is one of key smart grid applications that aims to reduce power generation at peak hours and maintain a balance between supply and demand. With the support of communication networks, energy consumers can become active actors in the energy management process by adjusting or rescheduling their electricity usage during peak hours based on utilities pricing incentives. Nonetheless, the integration of communication networks expose the smart grid to cyber-attacks. In this paper, we developed a smart grid simulation test-bed and designed evaluation scenarios. By leveraging the capabilities of Matlab and ns-3 simulation tools, we conducted a simulation study to evaluate the impact of cyber-attacks on demand response application. Our data shows that cyber-attacks could seriously disrupt smart grid operations, thus confirming the need of secure and resilient communication networks for supporting smart grid operations.
The Effects of Denial-of-Service Attacks on Secure Time-Critical Communications in the Smart Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Fengli; Li, QInghua; Mantooth, Homer Alan
2016-04-02
According to IEC 61850, many smart grid communications require messages to be delivered in a very short time. –Trip messages and sample values applied to the transmission level: 3 ms –Interlocking messages applied to the distribution level: 10 ms •Time-critical communications are vulnerable to denial-of-service (DoS) attacks –Flooding attack: Attacker floods many messages to the target network/machine. We conducted systematic, experimental study about how DoS attacks affect message delivery delays.
Avian Mobbing of the Puerto Rican Boa (Epicrates inornatus)
JAVIER E. MERCADO; ESTEBAN TERRANOVA; JR. WUNDERLE
2002-01-01
Mobbing, defined as an intense collective behavior in which birds of one or more species scold or even physically attack a predator, is known from a variety of bird species (Campbell and Lack, 1985; Gill, 1995). Targets commonly include hawks, owls, and snakes. In the West Indies, observations have documented avian mobbing towards various hawk species (e.g., Jeffrey-...
Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui
Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less
Enhancing the cyber-security of smart grids with applications to synchrophasor data
NASA Astrophysics Data System (ADS)
Pal, Seemita
In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of packet-drops and finally detect attacks, if any. In the case of PMU data manipulation attacks, the attacker may modify the data in the PMU packets in order to bias the system states and influence the control center into taking wrong decisions. The proposed detection technique is based on evaluating the equivalent impedances of the transmission lines and classifying the observed anomalies to determine the presence of attack and its location. The scheme for detecting data integrity attacks on SCADA systems is based on utilizing synchrophasor measurements from available PMUs in the grid. The proposed method uses a difference measure, developed in this thesis, to determine the relative divergence and mis-correlation between the datasets. Based on the estimated difference measure, tampered and genuine data can be distinguished. The proposed detection mechanisms have demonstrated high accuracy in real-time detection of attacks of various magnitudes, simulated on real PMU data obtained from the NY grid. By performing alarm clustering, the occurrence of false alarms has been reduced to almost zero. The solutions are computationally inexpensive, low on cost, do not add any overhead, and do not require any feedback from the network.
GPS Spoofing Attack Characterization and Detection in Smart Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Blum, Rick S.; Pradhan, Parth; Nagananda, Kyatsandra
The problem of global positioning system (GPS) spoofing attacks on smart grids endowed with phasor measurement units (PMUs) is addressed, taking into account the dynamical behavior of the states of the system. First, it is shown how GPS spoofing introduces a timing synchronization error in the phasor readings recorded by the PMUs and alters the measurement matrix of the dynamical model. Then, a generalized likelihood ratio-based hypotheses testing procedure is devised to detect changes in the measurement matrix when the system is subjected to a spoofing attack. Monte Carlo simulations are performed on the 9-bus, 3-machine test grid to demonstratemore » the implication of the spoofing attack on dynamic state estimation and to analyze the performance of the proposed hypotheses test.« less
A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hodge, Brian S; Wu, Yifu; Wei, Jin
Distributed Energy Resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. As most of these generators are geographically dispersed, dedicated communications investments for every generator are capital cost prohibitive. Real-time distributed communications middleware, which supervises, organizes and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs, allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the Quality of Experience (QoE) measures to complement the conventional Quality of Service (QoS)more » information to detect and mitigate the congestion attacks effectively. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids: Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Yifu; Wei, Jin; Hodge, Bri-Mathias
Distributed energy resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. Because most of these generators are geographically dispersed, dedicated communications investments for every generator are capital-cost prohibitive. Real-time distributed communications middleware - which supervises, organizes, and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs - allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the quality of experience measures to complement the conventional quality of service informationmore » to effectively detect and mitigate congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
Machine Learning Methods for Attack Detection in the Smart Grid.
Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent
2016-08-01
Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.
Numerical simulation of three dimensional transonic flows
NASA Technical Reports Server (NTRS)
Sahu, Jubaraj; Steger, Joseph L.
1987-01-01
The three-dimensional flow over a projectile has been computed using an implicit, approximately factored, partially flux-split algorithm. A simple composite grid scheme has been developed in which a single grid is partitioned into a series of smaller grids for applications which require an external large memory device such as the SSD of the CRAY X-MP/48, or multitasking. The accuracy and stability of the composite grid scheme has been tested by numerically simulating the flow over an ellipsoid at angle of attack and comparing the solution with a single grid solution. The flowfield over a projectile at M = 0.96 and 4 deg angle-of-attack has been computed using a fine grid, and compared with experiment.
Cybersecurity for distributed energy resources and smart inverters
Qi, Junjian; Hahn, Adam; Lu, Xiaonan; ...
2016-12-01
The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less
Cybersecurity for distributed energy resources and smart inverters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Qi, Junjian; Hahn, Adam; Lu, Xiaonan
The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less
Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford
2015-04-01
While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implementedmore » a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.« less
NASA Astrophysics Data System (ADS)
JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu
2017-05-01
Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.
Security attack detection algorithm for electric power gis system based on mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan
2017-05-01
Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.
Identification and Ranking of Critical Assets within an Electrical Grid under Threat of Cyber Attack
NASA Astrophysics Data System (ADS)
Boyer, Blake R.
This paper examines the ranking of critical assets within an electrical grid under threat of cyber attack.1 Critical to this analysis is the assumption of zero hour exploits namely, the threat of an immediate attack as soon as a vulnerability is discovered. Modeling shows that over time load fluctuations as well as other system variations will change the importance of each asset in the delivery of bulk power. As opposed to classic stability studies where risk can be shown to be greatest during high load periods, the zero hour exploit-cyber-risk assumes that vulnerabilities will be attacked as soon as they are discovered. The probability of attacks is made uniform over time to include any and all possible attacks. Examining the impact of an attack and how the grid reacts immediately following an attack will identify and determine the criticality of each asset. This work endeavors to fulfill the NERC Critical Infrastructure Protection Requirements CIP-001-1 through CIP-009-2, cyber security requirements for the reliable supply of bulk power to customers throughout North America. 1Critical assets will here refer to facilities, systems, and equipment, which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the Bulk Electric System, NERC Glossary of Terms Used in Reliability Standards, 2009
A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mousavian, Seyedamirabbas; Valenzuela, Jorge; Wang, Jianhui
The power grid is becoming more dependent on information and communication technologies. Complex networks of advanced sensors such as phasor measurement units (PMUs) are used to collect real time data to improve the observability of the power system. Recent studies have shown that the power grid has significant cyber vulnerabilities which could increase when PMUs are used extensively. Therefore, recognizing and responding to vulnerabilities are critical to the security of the power grid. This paper proposes a risk mitigation model for optimal response to cyber-attacks to PMU networks. We model the optimal response action as a mixed integer linear programmingmore » (MILP) problem to prevent propagation of the cyber-attacks and maintain the observability of the power system.« less
Hiding Critical Targets in Smart Grid Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bao, Wei; Li, Qinghua
With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future power systems. However, since most electrical devices in power grid substations are connected via communication networks, cyber security of these communication networks becomes a critical issue. Real-World incidents such as Stuxnet have shown the feasibility of compromising a device in the power grid network to further launch more sophisticated attacks. To deal with security attacks of this spirit, this paper aims to hide critical targets from compromised internal nodes and hence protect them from further attacks launched by those compromisedmore » nodes. In particular, we consider substation networks and propose to add carefully-controlled dummy traffic to a substation network to make critical target nodes indistinguishable from other nodes in network traffic patterns. This paper describes the design and evaluation of such a scheme. Evaluations show that the scheme can effectively protect critical nodes with acceptable communication cost.« less
Increasing the resilience and security of the United States' power infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
2015-08-01
The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-worldmore » conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.« less
Thundercloud: Domain specific information security training for the smart grid
NASA Astrophysics Data System (ADS)
Stites, Joseph
In this paper, we describe a cloud-based virtual smart grid test bed: ThunderCloud, which is intended to be used for domain-specific security training applicable to the smart grid environment. The test bed consists of virtual machines connected using a virtual internal network. ThunderCloud is remotely accessible, allowing students to undergo educational exercises online. We also describe a series of practical exercises that we have developed for providing the domain-specific training using ThunderCloud. The training exercises and attacks are designed to be realistic and to reflect known vulnerabilities and attacks reported in the smart grid environment. We were able to use ThunderCloud to offer practical domain-specific security training for smart grid environment to computer science students at little or no cost to the department and no risk to any real networks or systems.
Reliability analysis in interdependent smart grid systems
NASA Astrophysics Data System (ADS)
Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin; Lu, Jianfeng; Hu, Zhaolong
2018-06-01
Complex network theory is a useful way to study many real complex systems. In this paper, a reliability analysis model based on complex network theory is introduced in interdependent smart grid systems. In this paper, we focus on understanding the structure of smart grid systems and studying the underlying network model, their interactions, and relationships and how cascading failures occur in the interdependent smart grid systems. We propose a practical model for interdependent smart grid systems using complex theory. Besides, based on percolation theory, we also study the effect of cascading failures effect and reveal detailed mathematical analysis of failure propagation in such systems. We analyze the reliability of our proposed model caused by random attacks or failures by calculating the size of giant functioning components in interdependent smart grid systems. Our simulation results also show that there exists a threshold for the proportion of faulty nodes, beyond which the smart grid systems collapse. Also we determine the critical values for different system parameters. In this way, the reliability analysis model based on complex network theory can be effectively utilized for anti-attack and protection purposes in interdependent smart grid systems.
Summary of Data from the Sixth AIAA CFD Drag Prediction Workshop: CRM Cases 2 to 5
NASA Technical Reports Server (NTRS)
Tinoco, Edward N.; Brodersen, Olaf P.; Keye, Stefan; Laflin, Kelly R.; Feltrop, Edward; Vassberg, John C.; Mani, Mori; Rider, Ben; Wahls, Richard A.; Morrison, Joseph H.;
2017-01-01
Results from the Sixth AIAA CFD Drag Prediction Workshop Common Research Model Cases 2 to 5 are presented. As with past workshops, numerical calculations are performed using industry-relevant geometry, methodology, and test cases. Cases 2 to 5 focused on force/moment and pressure predictions for the NASA Common Research Model wing-body and wing-body-nacelle-pylon configurations, including Case 2 - a grid refinement study and nacelle-pylon drag increment prediction study; Case 3 - an angle-of-attack buffet study; Case 4 - an optional wing-body grid adaption study; and Case 5 - an optional wing-body coupled aero-structural simulation. The Common Research Model geometry differed from previous workshops in that it was deformed to the appropriate static aeroelastic twist and deflection at each specified angle-of-attack. The grid refinement study used a common set of overset and unstructured grids, as well as user created Multiblock structured, unstructured, and Cartesian based grids. For the supplied common grids, six levels of refinement were created resulting in grids ranging from 7x10(exp 6) to 208x10(exp 6) cells. This study (Case 2) showed further reduced scatter from previous workshops, and very good prediction of the nacelle-pylon drag increment. Case 3 studied buffet onset at M=0.85 using the Medium grid (20 to 40x10(exp 6) nodes) from the above described sequence. The prescribed alpha sweep used finely spaced intervals through the zone where wing separation was expected to begin. Although the use of the prescribed aeroelastic twist and deflection at each angle-of-attack greatly improved the wing pressure distribution agreement with test data, many solutions still exhibited premature flow separation. The remaining solutions exhibited a significant spread of lift and pitching moment at each angle-of-attack, much of which can be attributed to excessive aft pressure loading and shock location variation. Four Case 4 grid adaption solutions were submitted. Starting with grids less than 2x10(exp 6) grid points, two solutions showed a rapid convergence to an acceptable solution. Four Case 5 coupled aerostructural solutions were submitted. Both showed good agreement with experimental data. Results from this workshop highlight the continuing need for CFD improvement, particularly for conditions with significant flow separation. These comparisons also suggest the need for improved experimental diagnostics to guide future CFD development.
Business Case Analysis Of Small Modular Reactors (SMR) For DOD Assured Power
2017-12-01
Smith Second Reader: Thomas L. Albright THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public...SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89...attack (EMP) represents one of the most devastating forms of attack on the power grid. Because the North American grid is made up of three major
NASA Astrophysics Data System (ADS)
Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.
2016-03-01
Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.
Network topology and resilience analysis of South Korean power grid
NASA Astrophysics Data System (ADS)
Kim, Dong Hwan; Eisenberg, Daniel A.; Chun, Yeong Han; Park, Jeryang
2017-01-01
In this work, we present topological and resilience analyses of the South Korean power grid (KPG) with a broad voltage level. While topological analysis of KPG only with high-voltage infrastructure shows an exponential degree distribution, providing another empirical evidence of power grid topology, the inclusion of low voltage components generates a distribution with a larger variance and a smaller average degree. This result suggests that the topology of a power grid may converge to a highly skewed degree distribution if more low-voltage data is considered. Moreover, when compared to ER random and BA scale-free networks, the KPG has a lower efficiency and a higher clustering coefficient, implying that highly clustered structure does not necessarily guarantee a functional efficiency of a network. Error and attack tolerance analysis, evaluated with efficiency, indicate that the KPG is more vulnerable to random or degree-based attacks than betweenness-based intentional attack. Cascading failure analysis with recovery mechanism demonstrates that resilience of the network depends on both tolerance capacity and recovery initiation time. Also, when the two factors are fixed, the KPG is most vulnerable among the three networks. Based on our analysis, we propose that the topology of power grids should be designed so the loads are homogeneously distributed, or functional hubs and their neighbors have high tolerance capacity to enhance resilience.
The Challenges of Defense Support of Civil Authorities and Homeland Defense in the Cyber Domain
2013-05-20
Information Grid ( GIG ) against a cyber attack has taken the forefront in national level discussions. The U.S. homeland’s assumed sanctuary against...other U.S. government agencies and key operators within the private sector to detect, deter, prevent, and thwart exploitation of CIKR and the GIG ...CIKR) and the Global Information Grid ( GIG ) against a cyber attack has taken the forefront in national level discussions. The U.S. homeland’s
A Testbed Environment for Buildings-to-Grid Cyber Resilience Research and Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sridhar, Siddharth; Ashok, Aditya; Mylrea, Michael E.
The Smart Grid is characterized by the proliferation of advanced digital controllers at all levels of its operational hierarchy from generation to end consumption. Such controllers within modern residential and commercial buildings enable grid operators to exercise fine-grained control over energy consumption through several emerging Buildings-to-Grid (B2G) applications. Though this capability promises significant benefits in terms of operational economics and improved reliability, cybersecurity weaknesses in the supporting infrastructure could be exploited to cause a detrimental effect and this necessitates focused research efforts on two fronts. First, the understanding of how cyber attacks in the B2G space could impact grid reliabilitymore » and to what extent. Second, the development and validation of cyber-physical application-specific countermeasures that are complementary to traditional infrastructure cybersecurity mechanisms for enhanced cyber attack detection and mitigation. The PNNL B2G testbed is currently being developed to address these core research needs. Specifically, the B2G testbed combines high-fidelity buildings+grid simulators, industry-grade building automation and Supervisory Control and Data Acquisition (SCADA) systems in an integrated, realistic, and reconfigurable environment capable of supporting attack-impact-detection-mitigation experimentation. In this paper, we articulate the need for research testbeds to model various B2G applications broadly by looking at the end-to-end operational hierarchy of the Smart Grid. Finally, the paper not only describes the architecture of the B2G testbed in detail, but also addresses the broad spectrum of B2G resilience research it is capable of supporting based on the smart grid operational hierarchy identified earlier.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Almajali, Anas; Rice, Eric; Viswanathan, Arun
This paper presents a systems analysis approach to characterizing the risk of a Smart Grid to a load-drop attack. A characterization of the risk is necessary for the design of detection and remediation strategies to address the consequences of such attacks. Using concepts from systems health management and system engineering, this work (a) first identifies metrics that can be used to generate constraints for security features, and (b) lays out an end-to-end integrated methodology using separate network and power simulations to assess system risk. We demonstrate our approach by performing a systems-style analysis of a load-drop attack implemented over themore » AMI subsystem and targeted at destabilizing the underlying power grid.« less
Cybersecurity Awareness in the Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scholtz, Jean; Franklin, Lyndsey; Le Blanc, Katya L.
2016-07-10
We report on a series of interviews and observations conducted with control room dispatchers in a bulk electrical system. These dispatchers must react quickly to incidents as they happen in order to ensure the reliability and safe operation of the power grid. They do not have the time to evaluate incidents for signs of cyber-attack as part of their initial response. Cyber-attack detection involves multiple personnel from a variety of roles at both local and regional levels. Smart grid technology will improve detection and defense capabilities of the future grid, however, the current infrastructure remains a mixture of old andmore » new equipment which will continue to operate for some time. Thus, research still needs to focus on strategies for the detection of malicious activity on current infrastructure as well as protection and remediation.« less
Computational Aeroelastic Analysis of Ares Crew Launch Vehicle Bi-Modal Loading
NASA Technical Reports Server (NTRS)
Massey, Steven J.; Chwalowski, Pawel
2010-01-01
A Reynolds averaged Navier-Stokes analysis, with and without dynamic aeroelastic effects, is presented for the Ares I-X launch vehicle at transonic Mach numbers and flight Reynolds numbers for two grid resolutions and two angles of attack. The purpose of the study is to quantify the force and moment increment imparted by the sudden transition from fully separated flow around the crew module - service module junction to that of the bi-modal flow state in which only part of the flow reattaches. The bi-modal flow phenomenon is of interest to the guidance, navigation and control community because it causes a discontinuous jump in forces and moments. Computations with a rigid structure at zero zero angle of attack indicate significant increases in normal force and pitching moment. Dynamic aeroelastic computations indicate the bi-modal flow state is insensitive to vehicle flexibility due to the resulting deflections imparting only very small changes in local angle of attack. At an angle of attack of 2.5deg, the magnitude of the pitching moment increment resulting from the bi-modal state nearly triples, while occurring at a slightly lower Mach number. Significant grid induced variations between the solutions indicate that further grid refinement is warranted.
Outbreak patterns of the novel avian influenza (H7N9)
NASA Astrophysics Data System (ADS)
Pan, Ya-Nan; Lou, Jing-Jing; Han, Xiao-Pu
2014-05-01
The attack of novel avian influenza (H7N9) in East China caused a serious health crisis and public panic. In this paper, we empirically analyze the onset patterns of human cases of the novel avian influenza and observe several spatial and temporal properties that are similar to other infectious diseases. More specifically, using the empirical analysis and modeling studies, we find that the spatio-temporal network that connects the cities with human cases along the order of outbreak timing emerges two-regime-power-law edge-length distribution, indicating the picture that several islands with higher and heterogeneous risk straggle in East China. The proposed method is applicable to the analysis of the spreading situation in the early stage of disease outbreak using quite limited dataset.
An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
NASA Astrophysics Data System (ADS)
Cui, Yongrui; Li, Mingchu; Ren, Yizhi; Sakurai, Kouichi
A novel adaptive reputation-based virtual organization formation is proposed. It restrains the bad performers effectively based on the consideration of the global experience of the evaluator and evaluates the direct trust relation between two grid nodes accurately by consulting the previous trust value rationally. It also consults and improves the reputation evaluation process in PathTrust model by taking account of the inter-organizational trust relationship and combines it with direct and recommended trust in a weighted way, which makes the algorithm more robust against collusion attacks. Additionally, the proposed algorithm considers the perspective of the VO creator and takes required VO services as one of the most important fine-grained evaluation criterion, which makes the algorithm more suitable for constructing VOs in grid environments that include autonomous organizations. Simulation results show that our algorithm restrains the bad performers and resists against fake transaction attacks and badmouth attacks effectively. It provides a clear advantage in the design of a VO infrastructure.
Data privacy considerations in Intensive Care Grids.
Luna, Jesus; Dikaiakos, Marios D; Kyprianou, Theodoros; Bilas, Angelos; Marazakis, Manolis
2008-01-01
Novel eHealth systems are being designed to provide a citizen-centered health system, however the even demanding need for computing and data resources has required the adoption of Grid technologies. In most of the cases, this novel Health Grid requires not only conveying patient's personal data through public networks, but also storing it into shared resources out of the hospital premises. These features introduce new security concerns, in particular related with privacy. In this paper we survey current legal and technological approaches that have been taken to protect a patient's personal data into eHealth systems, with a particular focus in Intensive Care Grids. However, thanks to a security analysis applied over the Intensive Care Grid system (ICGrid) we show that these security mechanisms are not enough to provide a comprehensive solution, mainly because the data-at-rest is still vulnerable to attacks coming from untrusted Storage Elements where an attacker may directly access them. To cope with these issues, we propose a new privacy-oriented protocol which uses a combination of encryption and fragmentation to improve data's assurance while keeping compatibility with current legislations and Health Grid security mechanisms.
Intrusion Prevention and Detection in Grid Computing - The ALICE Case
NASA Astrophysics Data System (ADS)
Gomez, Andres; Lara, Camilo; Kebschull, Udo
2015-12-01
Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware.
Computer Network Operations Methodology
2004-03-01
means of their computer information systems. Disrupt - This type of attack focuses on disrupting as “attackers might surreptitiously reprogram enemy...by reprogramming the computers that control distribution within the power grid. A disruption attack introduces disorder and inhibits the effective...between commanders. The use of methodologies is widespread and done subconsciously to assist individuals in decision making. The processes that
Co-Simulation Platform For Characterizing Cyber Attacks in Cyber Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sadi, Mohammad A. H.; Ali, Mohammad Hassan; Dasgupta, Dipankar
Smart grid is a complex cyber physical system containing a numerous and variety of sources, devices, controllers and loads. Communication/Information infrastructure is the backbone of the smart grid system where different grid components are connected with each other through this structure. Therefore, the drawbacks of the information technology related issues are also becoming a part of the smart grid. Further, smart grid is also vulnerable to the grid related disturbances. For such a dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and OPNET based co-simulated test bed to carry out a cyber-intrusion inmore » a cyber-network for modern power systems and smart grid. The effect of the cyber intrusion on the physical power system is also presented. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack in the cyber network. Different disturbance situations in the proposed test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less
McGrath, Laura J.; van Riper, Charles
2005-01-01
Executive Summary Neotropical migrant birds make choices about which habitats are most likely to provide successful foraging locations during migration, but little is known about how these birds recognize and process environmental clues that indicate the presence of prey species. Aspects of tree phenology, notably flowering of trees along the lower Colorado River corridor, coincide with the migratory stopovers of leaf-gleaning insectivorous songbirds and may be an important indicator of arthropod prey species availability. Shifting tree flowering and leaf flush during the spring migration period presents avian insectivores with an assortment of foraging opportunities. During two field seasons at Cibola National Wildlife Refuge in southwestern Arizona, we examined riparian tree species to test whether leaf-gleaning insectivorous birds are attracted to the flowering condition of trees in choosing foraging sites. We predicted that flowering trees would host more insect prey resources, would thus show increased visit rates, length of stays and attack ratios of migrant avian insectivores, and that those arthropods would be found in the stomach contents of the birds. Paired trees of honey mesquite (Prosopis glandulosa), displaying heavy and light degrees of flowering were observed to test these predictions. To test whether birds are tracking arthropods directly or are using flowers as a proximate cue, we removed flowers from selected trees and paired these treated trees with neighboring high flowering trees, which served as controls. Avian foraging behavior, avian diets, arthropods, and phenology data were collected at the same time to control for temporal differences in insect availability, plant phenology, and differences in stopover arrivals of birds. We documented five patterns from this study: 1) Higher abundance and richness of arthropods were found on honey mesquite trees with greater numbers of flowers. 2) Arthropod abundance and richness increased as flowering level increased. 3) The subset of migrant avian insectivores selected for study disproportionately foraged among honey mesquite trees with significantly greater amounts of flower coverage than they did on trees with less than average flower coverage. 4) Paired field experiments demonstrated that migrant avian insectivores more often visited, stayed longer, and had higher attack rates on insect prey in honey mesquite trees with greater numbers of flowers. 5) Diet analyses of selected avian insectivores showed over half of their diet consisted of prey significantly associated with honey mesquite flowering. Combined, these results suggest that honey mesquite flowering condition is an important cue used by avian insectivores that enables birds to quickly find arthropod prey at stop-over locations, while in transit during spring migration.
Testbeds for Assessing Critical Scenarios in Power Control Systems
NASA Astrophysics Data System (ADS)
Dondossola, Giovanna; Deconinck, Geert; Garrone, Fabrizio; Beitollahi, Hakem
The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility InfrastructurAL Resilience. The selected scenarios refer to power control systems encompassing information and communication security of SCADA systems for grid teleoperation, impact of attacks on inter-operator communications in power emergency conditions, impact of intentional faults on the secondary and tertiary control in power grids with distributed generators. Two testbeds have been developed for assessing the effect of the attacks and prototyping resilient architectures.
Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glenn, Colleen; Sterbentz, Dane; Wright, Aaron
With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best practices for prevention and response to cyber threats, and utility suggestions about how the federal government can aid utilities in combating and mitigating risks.« less
An Experimental Investigation of Unsteady Surface Pressure on an Airfoil in Turbulence
NASA Technical Reports Server (NTRS)
Mish, Patrick F.; Devenport, William J.
2003-01-01
Measurements of fluctuating surface pressure were made on a NACA 0015 airfoil immersed in grid generated turbulence. The airfoil model has a 2 ft chord and spans the 6 ft Virginia Tech Stability Wind Tunnel test section. Two grids were used to investigate the effects of turbulence length scale on the surface pressure response. A large grid which produced turbulence with an integral scale 13% of the chord and a smaller grid which produced turbulence with an integral scale 1.3% of the chord. Measurements were performed at angles of attack, alpha from 0 to 20 . An array of microphones mounted subsurface was used to measure the unsteady surface pressure. The goal of this measurement was to characterize the effects of angle of attack on the inviscid response. Lift spectra calculated from pressure measurements at each angle of attack revealed two distinct interaction regions; for omega(sub r) = omega b / U(sub infinity) is less than 10 a reduction in unsteady lift of up to 7 decibels (dB) occurs while an increase occurs for omega(sub r) is greater than 10 as the angle of attack is increased. The reduction in unsteady lift at low omega(sub r) with increasing angle of attack is a result that has never before been shown either experimentally or theoretically. The source of the reduction in lift spectral level appears to be closely related to the distortion of inflow turbulence based on analysis of surface pressure spanwise correlation length scales. Furthermore, while the distortion of the inflow appears to be critical in this experiment, this effect does not seem to be significant in larger integral scale (relative to the chord) flows based on the previous experimental work of McKeough suggesting the airfoils size relative to the inflow integral scale is critical in defining how the airfoil will respond under variation of angle of attack. A prediction scheme is developed that correctly accounts for the effects of distortion when the inflow integral scale is small relative to the airfoil chord. This scheme utilizes Rapid Distortion Theory to account for the distortion of the inflow with the distortion field modeled using a circular cylinder.
Legislation Seeks to Protect Power Grid From Space Weather
NASA Astrophysics Data System (ADS)
Tretkoff, Ernie
2010-05-01
Proposed legislation would help protect the U.S. power grid against space weather and other threats. The Grid Reliability and Infrastructure Defense Act (GRID Act) would give the Federal Energy Regulatory Commission (FERC) authority to develop and enforce standards for power companies to protect the electric grid from geomagnetic storms and threats such as a terrorist attack using electromagnetic pulse (EMP) weapons. The act unanimously passed the U.S. House Committee on Energy and Commerce in April and will proceed to a vote in the full House of Representatives.
2012-04-01
attack), the spread of waterborne pathogens (e.g. typhoid fever ) and airborne pathogens (e.g. avian flu, Severe Acute Respiratory Syndromes, and...hemorrhagic fever with fatality in humans ranging from 50-89% (Biosafety level 4) (Brion and Silverstein, 1999). If one aggregate of ebola viruses
Smart Grid Integrity Attacks: Characterizations and Countermeasures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Eilyan Bitar; Miles McQueen
2011-10-01
Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacksmore » [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.« less
Resilient Core Networks for Energy Distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kuntze, Nicolai; Rudolph, Carsten; Leivesley, Sally
2014-07-28
Abstract—Substations and their control are crucial for the availability of electricity in today’s energy distribution. Ad- vanced energy grids with Distributed Energy Resources require higher complexity in substations, distributed functionality and communication between devices inside substations and between substations. Also, substations include more and more intelligent devices and ICT based systems. All these devices are connected to other systems by different types of communication links or are situated in uncontrolled environments. Therefore, the risk of ICT based attacks on energy grids is growing. Consequently, security measures to counter these risks need to be an intrinsic part of energy grids. Thismore » paper introduces the concept of a Resilient Core Network to interconnected substations. This core network provides essen- tial security features, enables fast detection of attacks and allows for a distributed and autonomous mitigation of ICT based risks.« less
Scenarios that describe cyber attacks on the electric grid consistently predict significant disruptions to the economy and citizens quality of life...phenomena that deserve further investigation, such as the importance of some individual power plants in influencing the adversarys probability of
Numerical simulation of incidence and sweep effects on delta wing vortex breakdown
NASA Technical Reports Server (NTRS)
Ekaterinaris, J. A.; Schiff, Lewis B.
1994-01-01
The structure of the vortical flowfield over delta wings at high angles of attack was investigated. Three-dimensional Navier-Stokes numerical simulations were carried out to predict the complex leeward-side flowfield characteristics, including leading-edge separation, secondary separation, and vortex breakdown. Flows over a 75- and a 63-deg sweep delta wing with sharp leading edges were investigated and compared with available experimental data. The effect of variation of circumferential grid resolution grid resolution in the vicinity of the wing leading edge on the accuracy of the solutions was addressed. Furthermore, the effect of turbulence modeling on the solutions was investigated. The effects of variation of angle of attack on the computed vortical flow structure for the 75-deg sweep delta wing were examined. At moderate angles of attack no vortex breakdown was observed. When a critical angle of attack was reached, bubble-type vortex breakdown was found. With further increase in angle of attack, a change from bubble-type breakdown to spiral-type vortex breakdown was predicted by the numerical solution. The effects of variation of sweep angle and freestream Mach number were addressed with the solutions on a 63-deg sweep delta wing.
Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack.
Kang, WenJie; Hu, Gang; Zhu, PeiDong; Liu, Qiang; Hang, Zhi; Liu, Xin
2018-05-24
Many previous works only focused on the cascading failure of global coupling of one-to-one structures in interdependent networks, but the local coupling of dual coupling structures has rarely been studied due to its complex structure. This will result in a serious consequence that many conclusions of the one-to-one structure may be incorrect in the dual coupling network and do not apply to the smart grid. Therefore, it is very necessary to subdivide the dual coupling link into a top-down coupling link and a bottom-up coupling link in order to study their influence on network robustness by combining with different coupling modes. Additionally, the power flow of the power grid can cause the load of a failed node to be allocated to its neighboring nodes and trigger a new round of load distribution when the load of these nodes exceeds their capacity. This means that the robustness of smart grids may be affected by four factors, i.e., load redistribution, local coupling, dual coupling link and coupling mode; however, the research on the influence of those factors on the network robustness is missing. In this paper, firstly, we construct the smart grid as a two-layer network with a dual coupling link and divide the power grid and communication network into many subnets based on the geographical location of their nodes. Secondly, we define node importance ( N I ) as an evaluation index to access the impact of nodes on the cyber or physical network and propose three types of coupling modes based on N I of nodes in the cyber and physical subnets, i.e., Assortative Coupling in Subnets (ACIS), Disassortative Coupling in Subnets (DCIS), and Random Coupling in Subnets (RCIS). Thirdly, a cascading failure model is proposed for studying the effect of local coupling of dual coupling link in combination with ACIS, DCIS, and RCIS on the robustness of the smart grid against a targeted attack, and the survival rate of functional nodes is used to assess the robustness of the smart grid. Finally, we use the IEEE 118-Bus System and the Italian High-Voltage Electrical Transmission Network to verify our model and obtain the same conclusions: (I) DCIS applied to the top-down coupling link is better able to enhance the robustness of the smart grid against a targeted attack than RCIS or ACIS, (II) ACIS applied to a bottom-up coupling link is better able to enhance the robustness of the smart grid against a targeted attack than RCIS or DCIS, and (III) the robustness of the smart grid can be improved by increasing the tolerance α . This paper provides some guidelines for slowing down the speed of the cascading failures in the design of architecture and optimization of interdependent networks, such as a top-down link with DCIS, a bottom-up link with ACIS, and an increased tolerance α .
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
2014-04-01
technologies. To facilitate efficient information exchange, wireless networks have been proposed to be widely used in the smart grid. However, the jamming...attack that constantly broadcasts radio interference is a primary security threat to prevent the deployment of wireless networks in the smart grid. Hence... wireless communications, while at the same time providing latency guarantee for control messages. An open question is how to minimize message delay for
Energy Systems Integration News | Energy Systems Integration Facility |
data analytics and forecasting methods to identify correlations between electricity consumption threats, or cyber and physical attacks-our nation's electricity grid must evolve. As part of the Grid other national labs, and several industry partners-to advance resilient electricity distribution systems
An Attack-Resilient Middleware Architecture for Grid Integration of Distributed Energy Resources
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Yifu; Mendis, Gihan J.; He, Youbiao
In recent years, the increasing penetration of Distributed Energy Resources (DERs) has made an impact on the operation of the electric power systems. In the grid integration of DERs, data acquisition systems and communications infrastructure are crucial technologies to maintain system economic efficiency and reliability. Since most of these generators are relatively small, dedicated communications investments for every generator are capital cost prohibitive. Combining real-time attack-resilient communications middleware with Internet of Things (IoTs) technologies allows for the use of existing infrastructure. In our paper, we propose an intelligent communication middleware that utilizes the Quality of Experience (QoE) metrics to complementmore » the conventional Quality of Service (QoS) evaluation. Furthermore, our middleware employs deep learning techniques to detect and defend against congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
Deep Learning-Based Data Forgery Detection in Automatic Generation Control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Fengli; Li, Qinghua
Automatic Generation Control (AGC) is a key control system in the power grid. It is used to calculate the Area Control Error (ACE) based on frequency and tie-line power flow between balancing areas, and then adjust power generation to maintain the power system frequency in an acceptable range. However, attackers might inject malicious frequency or tie-line power flow measurements to mislead AGC to do false generation correction which will harm the power grid operation. Such attacks are hard to be detected since they do not violate physical power system models. In this work, we propose algorithms based on Neural Networkmore » and Fourier Transform to detect data forgery attacks in AGC. Different from the few previous work that rely on accurate load prediction to detect data forgery, our solution only uses the ACE data already available in existing AGC systems. In particular, our solution learns the normal patterns of ACE time series and detects abnormal patterns caused by artificial attacks. Evaluations on the real ACE dataset show that our methods have high detection accuracy.« less
Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks
Chen, Chin-Ling; Lin, I-Hsien
2010-01-01
Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths. PMID:22163606
Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.
Chen, Chin-Ling; Lin, I-Hsien
2010-01-01
Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.
Predator behaviour and predation risk in the heterogeneous Arctic environment.
Lecomte, Nicolas; Careau, Vincent; Gauthier, Gilles; Giroux, Jean-François
2008-05-01
1. Habitat heterogeneity and predator behaviour can strongly affect predator-prey interactions but these factors are rarely considered simultaneously, especially when systems encompass multiple predators and prey. 2. In the Arctic, greater snow geese Anser caerulescens atlanticus L. nest in two structurally different habitats: wetlands that form intricate networks of water channels, and mesic tundra where such obstacles are absent. In this heterogeneous environment, goose eggs are exposed to two types of predators: the arctic fox Vulpes lagopus L. and a diversity of avian predators. We hypothesized that, contrary to birds, the hunting ability of foxes would be impaired by the structurally complex wetland habitat, resulting in a lower predation risk for goose eggs. 3. In addition, lemmings, the main prey of foxes, show strong population cycles. We thus further examined how their fluctuations influenced the interaction between habitat heterogeneity and fox predation on goose eggs. 4. An experimental approach with artificial nests suggested that foxes were faster than avian predators to find unattended goose nests in mesic tundra whereas the reverse was true in wetlands. Foxes spent 3.5 times more time between consecutive attacks on real goose nests in wetlands than in mesic tundra. Their attacks on goose nests were also half as successful in wetlands than in mesic tundra whereas no difference was found for avian predators. 5. Nesting success in wetlands (65%) was higher than in mesic tundra (56%) but the difference between habitats increased during lemming crashes (15%) compared to other phases of the cycle (5%). Nests located at the edge of wetland patches were also less successful than central ones, suggesting a gradient in accessibility of goose nests in wetlands for foxes. 6. Our study shows that the structural complexity of wetlands decreases predation risk from foxes but not avian predators in arctic-nesting birds. Our results also demonstrate that cyclic lemming populations indirectly alter the spatial distribution of productive nests due to a complex interaction between habitat structure, prey-switching and foraging success of foxes.
Defending the Power Grid from Hackers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eber, Kevin
A new initiative underway at the National Renewable Energy Laboratory is intended to prevent hackers from gaining control of parts of the nation's power grid, potentially damaging electrical equipment and causing localized power outages. Our nation's power grid is evolving to be more responsive to changing power needs, more able to integrate renewable energy, more efficient, and more reliable. One key element of this evolution is adding communication and control devices to the power grid, closer to the end user, so that utilities have greater situational awareness of the grid and can respond quickly to disturbances. But these new devicesmore » and their communications requirements can also open up the power grid to potential cyber attacks.« less
Drag Prediction for the DLR-F6 Wing/Body and DPW Wing using CFL3D and OVERFLOW Overset Mesh
NASA Technical Reports Server (NTRS)
Sclanfani, Anthony J.; Vassberg, John C.; Harrison, Neal A.; DeHaan, Mark A.; Rumsey, Christopher L.; Rivers, S. Melissa; Morrison, Joseph H.
2007-01-01
A series of overset grids was generated in response to the 3rd AIAA CFD Drag Prediction Workshop (DPW-III) which preceded the 25th Applied Aerodynamics Conference in June 2006. DPW-III focused on accurate drag prediction for wing/body and wing-alone configurations. The grid series built for each configuration consists of a coarse, medium, fine, and extra-fine mesh. The medium mesh is first constructed using the current state of best practices for overset grid generation. The medium mesh is then coarsened and enhanced by applying a factor of 1.5 to each (I,J,K) dimension. The resulting set of parametrically equivalent grids increase in size by a factor of roughly 3.5 from one level to the next denser level. CFD simulations were performed on the overset grids using two different RANS flow solvers: CFL3D and OVERFLOW. The results were post-processed using Richardson extrapolation to approximate grid converged values of lift, drag, pitching moment, and angle-of-attack at the design condition. This technique appears to work well if the solution does not contain large regions of separated flow (similar to that seen n the DLR-F6 results) and appropriate grid densities are selected. The extra-fine grid data helped to establish asymptotic grid convergence for both the OVERFLOW FX2B wing/body results and the OVERFLOW DPW-W1/W2 wing-alone results. More CFL3D data is needed to establish grid convergence trends. The medium grid was utilized beyond the grid convergence study by running each configuration at several angles-of-attack so drag polars and lift/pitching moment curves could be evaluated. The alpha sweep results are used to compare data across configurations as well as across flow solvers. With the exception of the wing/body drag polar, the two codes compare well qualitatively showing consistent incremental trends and similar wing pressure comparisons.
Testbed-based Performance Evaluation of Attack Resilient Control for AGC
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashok, Aditya; Sridhar, Siddharth; McKinnon, Archibald D.
The modern electric power grid is a complex cyber-physical system whose reliable operation is enabled by a wide-area monitoring and control infrastructure. This infrastructure, supported by an extensive communication backbone, enables several control applications functioning at multiple time scales to ensure the grid is maintained within stable operating limits. Recent events have shown that vulnerabilities in this infrastructure may be exploited to manipulate the data being exchanged. Such a scenario could cause the associated control application to mis-operate, potentially causing system-wide instabilities. There is a growing emphasis on looking beyond traditional cybersecurity solutions to mitigate such threats. In this papermore » we perform a testbed-based validation of one such solution - Attack Resilient Control (ARC) - on Iowa State University's \\textit{PowerCyber} testbed. ARC is a cyber-physical security solution that combines domain-specific anomaly detection and model-based mitigation to detect stealthy attacks on Automatic Generation Control (AGC). In this paper, we first describe the implementation architecture of the experiment on the testbed. Next, we demonstrate the capability of stealthy attack templates to cause forced under-frequency load shedding in a 3-area test system. We then validate the performance of ARC by measuring its ability to detect and mitigate these attacks. Our results reveal that ARC is efficient in detecting stealthy attacks and enables AGC to maintain system operating frequency close to its nominal value during an attack. Our studies also highlight the importance of testbed-based experimentation for evaluating the performance of cyber-physical security and control applications.« less
Application of multiple grids topology to supersonic internal/external flow interactions
NASA Technical Reports Server (NTRS)
Kathong, M.; Tiwari, S. N.; Smith, R. E.
1988-01-01
For many aerodynamic applications, it is very difficult to construct a smooth body-fitted grid around complex configurations. An approach, called 'multiple grids' or 'zonal grids', which subdivides the entire physical domain into several subdomains, is used to overcome such difficulties. The approach is applied to obtain the solutions to the Euler equations for the supersonic internal/external flow around a fighter-aircraft configuration. Steady-state solutions are presented for Mach 2 at 0, 3.79, 7, and 10 deg angles-of-attack. The problem of conservative treatment at the zonal interfaces is also addressed.
Subjective experiences of transient ischaemic attack: a repertory grid approach.
Spurgeon, Laura; James, Gill; Sackley, Cath
2013-01-01
Research on the psychosocial reactions to stroke has been used to inform rehabilitation programmes. Yet much less research has been conducted into experiences of, and reactions to, transient ischaemic attack (TIA), despite its link with secondary stroke. This study aimed to investigate the subjective psychological experiences of TIA. Repertory grid technique was used because of its capacity to make individual implicit experiences explicit. Using the standard repertory grid protocol, 12 post-TIA patients were asked to consider how five everyday activities had been affected by TIA. Each participant generated six constructs or personal perspectives, which were analysed using proprietary (RepGrid IV) software. Despite the individualised nature of the responses, six themes emerged from the constructs. These included deep-seated anxiety about future uncertainties/disruption to normality, loss of confidence, frustration, TIA as a wake-up call, a sense of loss and sadness, and embarrassment. Research has shown that the patient's subjective experience and perspective are important to the rehabilitation process post-stroke. Relatively little research has been conducted into the subjective experiences of TIA patients. This study has revealed a range of subjective reactions to TIA, which could be used to inform individualised post-TIA management, adaptation and rehabilitation.
Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Letchford, Joshua
While there has been a great deal of security research focused on preventing attacks, there has been less work on how one should balance security and resilience investments. In this work we developed and evaluated models that captured both explicit defenses and other mitigations that reduce the impact of attacks. We examined these issues both in more broadly applicable general Stackelberg models and in more specific network and power grid settings. Finally, we compared these solutions to existing work in terms of both solution quality and computational overhead.
Installed F/A-18 inlet flow calculations at 30 degrees angle-of-attack: A comparative study
NASA Technical Reports Server (NTRS)
Smith, C. Frederic; Podleski, Steve D.
1994-01-01
NASA Lewis is currently engaged in a research effort as a team member of the High Alpha Technology Program (HATP) within NASA. This program utilizes a specially equipped F/A-18, the High Alpha Research Vehicle (HARV), in an ambitious effort to improve the maneuverability of high-performance military aircraft at low subsonic speed, high angle of attack conditions. The overall objective of the Lewis effort is to develop inlet technology that will ensure efficient airflow delivery to the engine during these maneuvers. One part of the Lewis approach utilizes computational fluid dynamics codes to predict the installed performance of inlets for these highly maneuverable aircraft. Full Navier-Stokes (FNS) calculations on the installed F/A-18 inlet at 30 degrees angle of attack, 0 degrees yaw, and a freestream Mach number of 0.2 have been obtained in this study using an algebraic turbulence model with two grids (original and revised). Results obtained with the original grid were used to determine where further grid refinements and additional geometry were needed. In order to account properly for the external effects, the forebody, leading edge extension (LEX), ramp, and wing were included with inlet geometry. In the original grid, the diverter, LEX slot, and leading edge flap were not included due to insufficient geometry definition, but were included in a revised grid. In addition, a thin-layer Navier-Stokes (TLNS) code is used with the revised grid and the numerical results are compared to those obtained with the FNS code. The TLNS code was used to evaluate the effects on the solution using a code with more recent CFD developments such as upwinding with TVD schemes versus central differencing with artificial dissipation. The calculations are compared to a limited amount of available experimental data. The predicted forebody/fuselage surface static pressures compared well with data of all solutions. The predicted trajectory of the vortex generated under the LEX was different for each solution. These discrepancies are attributed to differences in the grid resolution and turbulence modeling. All solutions predict that this vortex is ingested by the inlet. The predicted inlet total pressure recoveries are lower than data and the distortions are higher than data. The results obtained with the revised grid were significantly improved from the original grid results. The original grid results indicated the ingested vortex migrated to the engine face and caused additional distortions to those already present due to secondary flow development. The revised grid results indicate that the ingested vortex is dissipated along the inlet duct inboard wall. The TLNS results indicate the flow at the engine face was much more distorted than the FNS results and is attributed to the pole boundary condition introducing numerical distortions into the flow field.
Modeling the Effects of Cyber Operations on Kinetic Battles
2014-06-01
Nakashima, 2013). Equally dangerous are attacks targeting the national economy . In 2012, distributed denial of service (DDoS) attacks were carried out...enable our freedom of action in cyberspace. (USCYBERCOM Concept of Operations, v 1.0, 21 Sep 2010) Global Information Grid ( GIG ): The globally...managing information on demand to warfighters, policy makers, and support personnel. The GIG includes owned and leased communications and computing
Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications
2014-08-01
computing, modeling and analysis of wireless networks , network topol- ogy, and architecture design. Dr. Wang has been a Member of the Association for...important, yet open research question is how to model and detect jamming attacks in such wireless networks , where communication traffic is more time...against time-critical wireless networks with applications to the smart grid. In contrast to communication networks where packets-oriented metrics
An Analysis of Predator Selection to Affect Aposematic Coloration in a Poison Frog Species.
Dreher, Corinna E; Cummings, Molly E; Pröhl, Heike
2015-01-01
Natural selection is widely noted to drive divergence of phenotypic traits. Predation pressure can facilitate morphological divergence, for example the evolution of both cryptic and conspicuous coloration in animals. In this context Dendrobatid frogs have been used to study evolutionary forces inducing diversity in protective coloration. The polytypic strawberry poison frog (Oophaga pumilio) shows strong divergence in aposematic coloration among populations. To investigate whether predation pressure is important for color divergence among populations of O. pumilio we selected four mainland populations and two island populations from Costa Rica and Panama. Spectrometric measurements of body coloration were used to calculate color and brightness contrasts of frogs as an indicator of conspicuousness for the visual systems of several potential predators (avian, crab and snake) and a conspecific observer. Additionally, we conducted experiments using clay model frogs of different coloration to investigate whether the local coloration of frogs is better protected than non-local color morphs, and if predator communities vary among populations. Overall predation risk differed strongly among populations and interestingly was higher on the two island populations. Imprints on clay models indicated that birds are the main predators while attacks of other predators were rare. Furthermore, clay models of local coloration were equally likely to be attacked as those of non-local coloration. Overall conspicuousness (and brightness contrast) of local frogs was positively correlated with attack rates by birds across populations. Together with results from earlier studies we conclude that conspicuousness honestly indicates toxicity to avian predators. The different coloration patterns among populations of strawberry poison frogs in combination with behavior and toxicity might integrate into equally efficient anti-predator strategies depending on local predation and other ecological factors.
An Analysis of Predator Selection to Affect Aposematic Coloration in a Poison Frog Species
Dreher, Corinna E.; Cummings, Molly E.; Pröhl, Heike
2015-01-01
Natural selection is widely noted to drive divergence of phenotypic traits. Predation pressure can facilitate morphological divergence, for example the evolution of both cryptic and conspicuous coloration in animals. In this context Dendrobatid frogs have been used to study evolutionary forces inducing diversity in protective coloration. The polytypic strawberry poison frog (Oophaga pumilio) shows strong divergence in aposematic coloration among populations. To investigate whether predation pressure is important for color divergence among populations of O. pumilio we selected four mainland populations and two island populations from Costa Rica and Panama. Spectrometric measurements of body coloration were used to calculate color and brightness contrasts of frogs as an indicator of conspicuousness for the visual systems of several potential predators (avian, crab and snake) and a conspecific observer. Additionally, we conducted experiments using clay model frogs of different coloration to investigate whether the local coloration of frogs is better protected than non-local color morphs, and if predator communities vary among populations. Overall predation risk differed strongly among populations and interestingly was higher on the two island populations. Imprints on clay models indicated that birds are the main predators while attacks of other predators were rare. Furthermore, clay models of local coloration were equally likely to be attacked as those of non-local coloration. Overall conspicuousness (and brightness contrast) of local frogs was positively correlated with attack rates by birds across populations. Together with results from earlier studies we conclude that conspicuousness honestly indicates toxicity to avian predators. The different coloration patterns among populations of strawberry poison frogs in combination with behavior and toxicity might integrate into equally efficient anti-predator strategies depending on local predation and other ecological factors. PMID:26110826
FUN3D and CFL3D Computations for the First High Lift Prediction Workshop
NASA Technical Reports Server (NTRS)
Park, Michael A.; Lee-Rausch, Elizabeth M.; Rumsey, Christopher L.
2011-01-01
Two Reynolds-averaged Navier-Stokes codes were used to compute flow over the NASA Trapezoidal Wing at high lift conditions for the 1st AIAA CFD High Lift Prediction Workshop, held in Chicago in June 2010. The unstructured-grid code FUN3D and the structured-grid code CFL3D were applied to several different grid systems. The effects of code, grid system, turbulence model, viscous term treatment, and brackets were studied. The SST model on this configuration predicted lower lift than the Spalart-Allmaras model at high angles of attack; the Spalart-Allmaras model agreed better with experiment. Neglecting viscous cross-derivative terms caused poorer prediction in the wing tip vortex region. Output-based grid adaptation was applied to the unstructured-grid solutions. The adapted grids better resolved wake structures and reduced flap flow separation, which was also observed in uniform grid refinement studies. Limitations of the adaptation method as well as areas for future improvement were identified.
The impact of the topology on cascading failures in a power grid model
NASA Astrophysics Data System (ADS)
Koç, Yakup; Warnier, Martijn; Mieghem, Piet Van; Kooij, Robert E.; Brazier, Frances M. T.
2014-05-01
Cascading failures are one of the main reasons for large scale blackouts in power transmission grids. Secure electrical power supply requires, together with careful operation, a robust design of the electrical power grid topology. Currently, the impact of the topology on grid robustness is mainly assessed by purely topological approaches, that fail to capture the essence of electric power flow. This paper proposes a metric, the effective graph resistance, to relate the topology of a power grid to its robustness against cascading failures by deliberate attacks, while also taking the fundamental characteristics of the electric power grid into account such as power flow allocation according to Kirchhoff laws. Experimental verification on synthetic power systems shows that the proposed metric reflects the grid robustness accurately. The proposed metric is used to optimize a grid topology for a higher level of robustness. To demonstrate its applicability, the metric is applied on the IEEE 118 bus power system to improve its robustness against cascading failures.
Unsteady Airfoil Flow Solutions on Moving Zonal Grids
1992-12-17
for the angle-of-attack of 15.5’, the comparisons diverge. This happens because of the different turbulence models used . At this angle- of attack, the...downstream in the wake . This vortex shedding phenomenon alters the chordwise pressure distribution on the upper surface of the airfoil resulting in higher...in- terest, turbulence modeling is used . Turbulence models are implemented with the time-averaged forms of the Navier-Stokes equations. Two widely
Bridges and Ladders: Building the Logic and Structure for Cyberspace
2012-06-01
control model defends and attacks from the GIG . By comparing and contrasting the three models, the author makes a recommendation for a hybrid model to...operations in cyberspace. The directive was clear in its direction for USCYBERCOM, through USSTRATCOM, to secure the DoD global information grid ( GIG ) and...capabilities and potential breakthroughs. The GIG is comprised of 7 million devices spread across 15,000 networks that are attacked “hundreds of
B. J. Bentz; S. Kegley; K. Gibson; R. Their
2005-01-01
The effcacy of verbenone as a stand-level protectant against mountain pine beetle, Dendroctonus ponderosae Hopkins, attacks was tested in lodgepole and whitebark pine stands at five geographically separated sites, including three consecutive years at one site. Forty and 20 high-dose pouches, with a verbenone emission rate up to 50 mg/d per pouch, were spaced in a grid...
Mathematical modeling of Avian Influenza epidemic with bird vaccination in constant population
NASA Astrophysics Data System (ADS)
Kharis, M.; Amidi
2018-03-01
The development of the industrial world and human life is increasingly modern and less attention to environmental sustainability causes the virus causes the epidemic has a high tendency to mutate so that the virus that initially only attack animals, is also found to have the ability to attack humans. The epidemics that lasted some time were bird flu epidemics and swine flu epidemics. The flu epidemic led to several deaths and many people admitted to the hospital. Strain (derivatives) of H5N1 virus was identified as the cause of the bird flu epidemic while the H1N1 strain of the virus was identified as the cause of the swine flu epidemic. The symptoms are similar to seasonal flu caused by H3N2 strain of the virus. Outbreaks of bird flu and swine flu initially only attacked animals, but over time some people were found to be infected with the virus.
Prediction of Business Jet Airloads Using The Overflow Navier-Stokes Code
NASA Technical Reports Server (NTRS)
Bounajem, Elias; Buning, Pieter G.
2001-01-01
The objective of this work is to evaluate the application of Navier-Stokes computational fluid dynamics technology, for the purpose of predicting off-design condition airloads on a business jet configuration in the transonic regime. The NASA Navier-Stokes flow solver OVERFLOW with Chimera overset grid capability, availability of several numerical schemes and convergence acceleration techniques was selected for this work. A set of scripts which have been compiled to reduce the time required for the grid generation process are described. Several turbulence models are evaluated in the presence of separated flow regions on the wing. Computed results are compared to available wind tunnel data for two Mach numbers and a range of angles-of-attack. Comparisons of wing surface pressure from numerical simulation and wind tunnel measurements show good agreement up to fairly high angles-of-attack.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sadi, Mohammad A. H.; Dasgupta, Dipankar; Ali, Mohammad Hassan
The important backbone of the smart grid is the cyber/information infrastructure, which is primarily used to communicate with different grid components. A smart grid is a complex cyber physical system containing a numerous and variety number of sources, devices, controllers and loads. Therefore, the smart grid is vulnerable to grid related disturbances. For such dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and Opnet based co-simulated platform to carry out a cyber-intrusion in cyber network for modern power systems and the smart grid. The IEEE 30 bus power system model is used tomore » demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack. Different disturbance situations in the considered test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less
Flow solution on a dual-block grid around an airplane
NASA Technical Reports Server (NTRS)
Eriksson, Lars-Erik
1987-01-01
The compressible flow around a complex fighter-aircraft configuration (fuselage, cranked delta wing, canard, and inlet) is simulated numerically using a novel grid scheme and a finite-volume Euler solver. The patched dual-block grid is generated by an algebraic procedure based on transfinite interpolation, and the explicit Runge-Kutta time-stepping Euler solver is implemented with a high degree of vectorization on a Cyber 205 processor. Results are presented in extensive graphs and diagrams and characterized in detail. The concentration of grid points near the wing apex in the present scheme is shown to facilitate capture of the vortex generated by the leading edge at high angles of attack and modeling of its interaction with the canard wake.
Mercury risk to avian piscivores across western United States and Canada
Jackson, Allyson K.; Evers, David C.; Eagles-Smith, Collin A.; Ackerman, Joshua T.; Willacker, James J.; Elliott, John E.; Lepak, Jesse M.; Vander Pol, Stacy S.; Bryan, Colleen E.
2016-01-01
The widespread distribution of mercury (Hg) threatens wildlife health, particularly piscivorous birds. Western North America is a diverse region that provides critical habitat to many piscivorous bird species, and also has a well-documented history of mercury contamination from legacy mining and atmospheric deposition. The diversity of landscapes in the west limits the distribution of avian piscivore species, complicating broad comparisons across the region. Mercury risk to avian piscivores was evaluated across the western United States and Canada using a suite of avian piscivore species representing a variety of foraging strategies that together occur broadly across the region. Prey fish Hg concentrations were size-adjusted to the preferred size class of the diet for each avian piscivore (Bald Eagle = 36 cm, Osprey = 30 cm, Common and Yellow-billed Loon = 15 cm, Western and Clark's Grebe = 6 cm, and Belted Kingfisher = 5 cm) across each species breeding range. Using a combination of field and lab-based studies on Hg effect in a variety of species, wet weight blood estimates were grouped into five relative risk categories including: background (< 0.5 μg/g), low (0.5–1 μg/g), moderate (1–2 μg/g), high (2–3 μg/g), and extra high (> 3 μg/g). These risk categories were used to estimate potential mercury risk to avian piscivores across the west at a 1 degree-by-1 degree grid cell resolution. Avian piscivores foraging on larger-sized fish generally were at a higher relative risk to Hg. Habitats with a relatively high risk included wetland complexes (e.g., prairie pothole in Saskatchewan), river deltas (e.g., San Francisco Bay, Puget Sound, Columbia River), and arid lands (Great Basin and central Arizona). These results indicate that more intensive avian piscivore sampling is needed across Western North America to generate a more robust assessment of exposure risk.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL ismore » tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.« less
NASA Technical Reports Server (NTRS)
Mineck, Raymond E.
1999-01-01
An unstructured-grid Navier-Stokes solver was used to predict the surface pressure distribution, the off-body flow field, the surface flow pattern, and integrated lift and drag coefficients on the ROBIN configuration (a generic helicopter) without a rotor at four angles of attack. The results are compared to those predicted by two structured- grid Navier-Stokes solvers and to experimental surface pressure distributions. The surface pressure distributions from the unstructured-grid Navier-Stokes solver are in good agreement with the results from the structured-grid Navier-Stokes solvers. Agreement with the experimental pressure coefficients is good over the forward portion of the body. However, agreement is poor on the lower portion of the mid-section of the body. Comparison of the predicted surface flow patterns showed similar regions of separated flow. Predicted lift and drag coefficients were in fair agreement with each other.
Resilience Metrics for the Electric Power System: A Performance-Based Approach.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vugrin, Eric D.; Castillo, Andrea R; Silva-Monroy, Cesar Augusto
Grid resilience is a concept related to a power system's ability to continue operating and delivering power even in the event that low probability, high-consequence disruptions such as hurricanes, earthquakes, and cyber-attacks occur. Grid resilience objectives focus on managing and, ideally, minimizing potential consequences that occur as a result of these disruptions. Currently, no formal grid resilience definitions, metrics, or analysis methods have been universally accepted. This document describes an effort to develop and describe grid resilience metrics and analysis methods. The metrics and methods described herein extend upon the Resilience Analysis Process (RAP) developed by Watson et al. formore » the 2015 Quadrennial Energy Review. The extension allows for both outputs from system models and for historical data to serve as the basis for creating grid resilience metrics and informing grid resilience planning and response decision-making. This document describes the grid resilience metrics and analysis methods. Demonstration of the metrics and methods is shown through a set of illustrative use cases.« less
Yang, Jianke; Yuan, Jian; Gao, Jiguang; Zhu, Xiaolei; Lin, Aiqin
2015-01-01
To predict B cell epitopes of hemagglutinin (HA) of human-infecting H6N1 avian influenza virus and analyze their evolutionary characteristics. The dataset was downloaded from GISAID and GenBank databases. And the linear and conformational B cell epitopes of HA were predicted separately by various bioinformatic software. Furthermore, the conservation, adaptation and other evolutionary characteristics were also analyzed by some bioinformatic means. Four linear epitopes (A, B, C and D) and two conformational epitopes (E and F) were obtained after consideration of multiple factors. And the C epitope and sites ( 41, 157, 186, 187) mutated easily, but the other epitopes were very conservative and the D epitope was the most conservative. Interestingly, the site 157 was identified under positive selection, suggesting that it may be a particularly important site to make the virus evade the attack from the host immune system. The HA of human-infecting H6N1 avian influenza virus has five conservative B cell epitopes (three linear and two conformational) and one site under positive selection. The findings would facilitate the vaccine development, virus control and pathogenesis understanding.
Inference and forecast of H7N9 influenza in China, 2013 to 2015.
Li, Ruiyun; Bai, Yuqi; Heaney, Alex; Kandula, Sasikiran; Cai, Jun; Zhao, Xuyi; Xu, Bing; Shaman, Jeffrey
2017-02-16
The recent emergence of A(H7N9) avian influenza poses a significant challenge to public health in China and around the world; however, understanding of the transmission dynamics and progression of influenza A(H7N9) infection in domestic poultry, as well as spillover transmission to humans, remains limited. Here, we develop a mathematical model-Bayesian inference system which combines a simple epidemic model and data assimilation method, and use it in conjunction with data on observed human influenza A(H7N9) cases from 19 February 2013 to 19 September 2015 to estimate key epidemiological parameters and to forecast infection in both poultry and humans. Our findings indicate a high outbreak attack rate of 33% among poultry but a low rate of chicken-to-human spillover transmission. In addition, we generated accurate forecasts of the peak timing and magnitude of human influenza A(H7N9) cases. This work demonstrates that transmission dynamics within an avian reservoir can be estimated and that real-time forecast of spillover avian influenza in humans is possible. This article is copyright of The Authors, 2017.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brigantic, Robert T.; Campbell, James R.; Doctor, Pamela G.
Hickam Air Force Base (AFB), Hawaii provides an ideal waypoint for U.S. strategic airlift aircraft to refuel and receive other services on their way to Northeast and Southeast Asia from the continental United States. Hickam AFB also serves as a critical aerial port of debarkation (APOD) for deploying U.S. forces and equipment to more distant lands as needed. Making use of the United States Transportation Command’s Aerial Port of Debarkation Plus model, this paper examines the ability of Hickam AFB to serve in its important role as an APOD when operating under the effects of a major avian flu pandemic.more » In this regard, the major influence on Hickam AFB will be a serious degradation to the number of available personnel to service aircraft and operate Hickam AFB’s aerial port. It is noted that the results presented herein are based on simplistic attrition rate assumptions. Nonetheless, it is envisioned that this work is applicable to more realistic input attrition rates as avian flu epidemiological models are refined, as well as attrition associated with other types of contagious pandemic disease or willful biological warfare attack.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kelley, B. M.
The electric utility industry is undergoing significant transformations in its operation model, including a greater emphasis on automation, monitoring technologies, and distributed energy resource management systems (DERMS). With these changes and new technologies, while driving greater efficiencies and reliability, these new models may introduce new vectors of cyber attack. The appropriate cybersecurity controls to address and mitigate these newly introduced attack vectors and potential vulnerabilities are still widely unknown and performance of the control is difficult to vet. This proposal argues that modeling and simulation (M&S) is a necessary tool to address and better understand these problems introduced by emergingmore » technologies for the grid. M&S will provide electric utilities a platform to model its transmission and distribution systems and run various simulations against the model to better understand the operational impact and performance of cybersecurity controls.« less
Olofsson, Martin; Vallin, Adrian; Jakobsson, Sven; Wiklund, Christer
2010-05-24
Predators preferentially attack vital body parts to avoid prey escape. Consequently, prey adaptations that make predators attack less crucial body parts are expected to evolve. Marginal eyespots on butterfly wings have long been thought to have this deflective, but hitherto undemonstrated function. Here we report that a butterfly, Lopinga achine, with broad-spectrum reflective white scales in its marginal eyespot pupils deceives a generalist avian predator, the blue tit, to attack the marginal eyespots, but only under particular conditions-in our experiments, low light intensities with a prominent UV component. Under high light intensity conditions with a similar UV component, and at low light intensities without UV, blue tits directed attacks towards the butterfly head. In nature, birds typically forage intensively at early dawn, when the light environment shifts to shorter wavelengths, and the contrast between the eyespot pupils and the background increases. Among butterflies, deflecting attacks is likely to be particularly important at dawn when low ambient temperatures make escape by flight impossible, and when insectivorous birds typically initiate another day's search for food. Our finding that the deflective function of eyespots is highly dependent on the ambient light environment helps explain why previous attempts have provided little support for the deflective role of marginal eyespots, and we hypothesize that the mechanism that we have discovered in our experiments in a laboratory setting may function also in nature when birds forage on resting butterflies under low light intensities.
NASA Technical Reports Server (NTRS)
Kathong, Monchai; Tiwari, Surendra N.
1988-01-01
In the computation of flowfields about complex configurations, it is very difficult to construct a boundary-fitted coordinate system. An alternative approach is to use several grids at once, each of which is generated independently. This procedure is called the multiple grids or zonal grids approach; its applications are investigated. The method conservative providing conservation of fluxes at grid interfaces. The Euler equations are solved numerically on such grids for various configurations. The numerical scheme used is the finite-volume technique with a three-stage Runge-Kutta time integration. The code is vectorized and programmed to run on the CDC VPS-32 computer. Steady state solutions of the Euler equations are presented and discussed. The solutions include: low speed flow over a sphere, high speed flow over a slender body, supersonic flow through a duct, and supersonic internal/external flow interaction for an aircraft configuration at various angles of attack. The results demonstrate that the multiple grids approach along with the conservative interfacing is capable of computing the flows about the complex configurations where the use of a single grid system is not possible.
NASA Technical Reports Server (NTRS)
Finley, Dennis B.; Karman, Steve L., Jr.
1996-01-01
The objective of the second phase of the Euler Technology Assessment program was to evaluate the ability of Euler computational fluid dynamics codes to predict compressible flow effects over a generic fighter wind tunnel model. This portion of the study was conducted by Lockheed Martin Tactical Aircraft Systems, using an in-house Cartesian-grid code called SPLITFLOW. The Cartesian grid technique offers several advantages, including ease of volume grid generation and reduced number of cells compared to other grid schemes. SPLITFLOW also includes grid adaption of the volume grid during the solution to resolve high-gradient regions. The SPLITFLOW code predictions of configuration forces and moments are shown to be adequate for preliminary design, including predictions of sideslip effects and the effects of geometry variations at low and high angles-of-attack. The transonic pressure prediction capabilities of SPLITFLOW are shown to be improved over subsonic comparisons. The time required to generate the results from initial surface data is on the order of several hours, including grid generation, which is compatible with the needs of the design environment.
2006-03-15
collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 15 MAR 2006 2. REPORT TYPE 3. DATES COVERED 4...eastward with the takeover of India and the establishment of English rule over the Malay Peninsula and parts of Borneo. While China was defeated by...attacks in Indonesia in October 2002 and 2004, the Severe Acute Respiratory Syndrome (SARS) scare of 2003, repeated outbreaks of Avian Flu, and the
Experimental Investigation of Oblique Wing Aerodynamics at Low Speed
2007-03-01
0\\circ’); grid on; title(’\\it C_L vs \\alpha no winglets (50 mph)’,’FontWeight’,’bold’,’FontSize’,11); xlabel(’Angle of Attack (\\alpha)’); ylabel
NASA Astrophysics Data System (ADS)
Loginov, E. L.; Raikov, A. N.
2015-04-01
The most large-scale accidents occurred as a consequence of network information attacks on the control systems of power facilities belonging to the United States' critical infrastructure are analyzed in the context of possibilities available in modern decision support systems. Trends in the development of technologies for inflicting damage to smart grids are formulated. A volume matrix of parameters characterizing attacks on facilities is constructed. A model describing the performance of a critical infrastructure's control system after an attack is developed. The recently adopted measures and legislation acts aimed at achieving more efficient protection of critical infrastructure are considered. Approaches to cognitive modeling and networked expertise of intricate situations for supporting the decision-making process, and to setting up a system of indicators for anticipatory monitoring of critical infrastructure are proposed.
Three-Dimensional Effects in Multi-Element High Lift Computations
NASA Technical Reports Server (NTRS)
Rumsey, Christopher L.; LeeReusch, Elizabeth M.; Watson, Ralph D.
2003-01-01
In an effort to discover the causes for disagreement between previous two-dimensional (2-D) computations and nominally 2-D experiment for flow over the three-element McDonnell Douglas 30P-30N airfoil configuration at high lift, a combined experimental/CFD investigation is described. The experiment explores several different side-wall boundary layer control venting patterns, documents venting mass flow rates, and looks at corner surface flow patterns. The experimental angle of attack at maximum lift is found to be sensitive to the side-wall venting pattern: a particular pattern increases the angle of attack at maximum lift by at least 2 deg. A significant amount of spanwise pressure variation is present at angles of attack near maximum lift. A CFD study using three-dimensional (3-D) structured-grid computations, which includes the modeling of side-wall venting, is employed to investigate 3-D effects on the flow. Side-wall suction strength is found to affect the angle at which maximum lift is predicted. Maximum lift in the CFD is shown to be limited by the growth of an off-body corner flow vortex and consequent increase in spanwise pressure variation and decrease in circulation. The 3-D computations with and without wall venting predict similar trends to experiment at low angles of attack, but either stall too early or else overpredict lift levels near maximum lift by as much as 5%. Unstructured-grid computations demonstrate that mounting brackets lower the lift levels near maximum lift conditions.
Three-Dimensional Effects on Multi-Element High Lift Computations
NASA Technical Reports Server (NTRS)
Rumsey, Christopher L.; Lee-Rausch, Elizabeth M.; Watson, Ralph D.
2002-01-01
In an effort to discover the causes for disagreement between previous 2-D computations and nominally 2-D experiment for flow over the 3-clement McDonnell Douglas 30P-30N airfoil configuration at high lift, a combined experimental/CFD investigation is described. The experiment explores several different side-wall boundary layer control venting patterns, document's venting mass flow rates, and looks at corner surface flow patterns. The experimental angle of attack at maximum lift is found to be sensitive to the side wall venting pattern: a particular pattern increases the angle of attack at maximum lift by at least 2 deg. A significant amount of spanwise pressure variation is present at angles of attack near maximum lift. A CFD study using 3-D structured-grid computations, which includes the modeling of side-wall venting, is employed to investigate 3-D effects of the flow. Side-wall suction strength is found to affect the angle at which maximum lift is predicted. Maximum lift in the CFD is shown to be limited by the growth of all off-body corner flow vortex and consequent increase in spanwise pressure variation and decrease in circulation. The 3-D computations with and without wall venting predict similar trends to experiment at low angles of attack, but either stall too earl or else overpredict lift levels near maximum lift by as much as 5%. Unstructured-grid computations demonstrate that mounting brackets lower die the levels near maximum lift conditions.
NASA Astrophysics Data System (ADS)
Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu
2017-05-01
This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.
Abdulqader Hussein, Ahmed; Rahman, Tharek A.; Leow, Chee Yen
2015-01-01
Localization is an apparent aspect of a wireless sensor network, which is the focus of much interesting research. One of the severe conditions that needs to be taken into consideration is localizing a mobile target through a dispersed sensor network in the presence of physical barrier attacks. These attacks confuse the localization process and cause location estimation errors. Range-based methods, like the received signal strength indication (RSSI), face the major influence of this kind of attack. This paper proposes a solution based on a combination of multi-frequency multi-power localization (C-MFMPL) and step function multi-frequency multi-power localization (SF-MFMPL), including the fingerprint matching technique and lateration, to provide a robust and accurate localization technique. In addition, this paper proposes a grid coloring algorithm to detect the signal hole map in the network, which refers to the attack-prone regions, in order to carry out corrective actions. The simulation results show the enhancement and robustness of RSS localization performance in the face of log normal shadow fading effects, besides the presence of physical barrier attacks, through detecting, filtering and eliminating the effect of these attacks. PMID:26690159
Hussein, Ahmed Abdulqader; Rahman, Tharek A; Leow, Chee Yen
2015-12-04
Localization is an apparent aspect of a wireless sensor network, which is the focus of much interesting research. One of the severe conditions that needs to be taken into consideration is localizing a mobile target through a dispersed sensor network in the presence of physical barrier attacks. These attacks confuse the localization process and cause location estimation errors. Range-based methods, like the received signal strength indication (RSSI), face the major influence of this kind of attack. This paper proposes a solution based on a combination of multi-frequency multi-power localization (C-MFMPL) and step function multi-frequency multi-power localization (SF-MFMPL), including the fingerprint matching technique and lateration, to provide a robust and accurate localization technique. In addition, this paper proposes a grid coloring algorithm to detect the signal hole map in the network, which refers to the attack-prone regions, in order to carry out corrective actions. The simulation results show the enhancement and robustness of RSS localization performance in the face of log normal shadow fading effects, besides the presence of physical barrier attacks, through detecting, filtering and eliminating the effect of these attacks.
High-Lift OVERFLOW Analysis of the DLR-F11 Wind Tunnel Model
NASA Technical Reports Server (NTRS)
Pulliam, Thomas H.; Sclafani, Anthony J.
2014-01-01
In response to the 2nd AIAA CFD High Lift Prediction Workshop, the DLR-F11 wind tunnel model is analyzed using the Reynolds-averaged Navier-Stokes flow solver OVERFLOW. A series of overset grids for a bracket-off landing configuration is constructed and analyzed as part of a general grid refinement study. This high Reynolds number (15.1 million) analysis is done at multiple angles-of-attack to evaluate grid resolution effects at operational lift levels as well as near stall. A quadratic constitutive relation recently added to OVERFLOW for improved solution accuracy is utilized for side-of-body separation issues at low angles-of-attack and outboard wing separation at stall angles. The outboard wing separation occurs when the slat brackets are added to the landing configuration and is a source of discrepancy between the predictions and experimental data. A detailed flow field analysis is performed at low Reynolds number (1.35 million) after pressure tube bundles are added to the bracket-on medium grid system with the intent of better understanding bracket/bundle wake interaction with the wing's boundary layer. Localized grid refinement behind each slat bracket and pressure tube bundle coupled with a time accurate analysis are exercised in an attempt to improve stall prediction capability. The results are inconclusive and suggest the simulation is missing a key element such as boundary layer transition. The computed lift curve is under-predicted through the linear range and over-predicted near stall, and the solution from the most complete configuration analyzed shows outboard wing separation occurring behind slat bracket 6 where the experiment shows it behind bracket 5. These results are consistent with most other participants of this workshop.
Security of Electronic Voting in the United States
King, Charity; Thompson, Michael
2016-10-20
In the midst of numerous high-profile cyber-attacks, the US is considering whether to categorize the US electronic voting system as “critical infrastructure”, to be protected and invested in much the same way as the US power grid or waterways.
Subsonic Analysis of 0.04-Scale F-16XL Models Using an Unstructured Euler Code
NASA Technical Reports Server (NTRS)
Lessard, Wendy B.
1996-01-01
The subsonic flow field about an F-16XL airplane model configuration was investigated with an inviscid unstructured grid technique. The computed surface pressures were compared to wind-tunnel test results at Mach 0.148 for a range of angles of attack from 0 deg to 20 deg. To evaluate the effect of grid dependency on the solution, a grid study was performed in which fine, medium, and coarse grid meshes were generated. The off-surface vortical flow field was locally adapted and showed improved correlation to the wind-tunnel data when compared to the nonadapted flow field. Computational results are also compared to experimental five-hole pressure probe data. A detailed analysis of the off-body computed pressure contours, velocity vectors, and particle traces are presented and discussed.
A numerical study of the effects of wind tunnel wall proximity on an airfoil model
NASA Technical Reports Server (NTRS)
Potsdam, Mark; Roberts, Leonard
1990-01-01
A procedure was developed for modeling wind tunnel flows using computational fluid dynamics. Using this method, a numerical study was undertaken to explore the effects of solid wind tunnel wall proximity and Reynolds number on a two-dimensional airfoil model at low speed. Wind tunnel walls are located at varying wind tunnel height to airfoil chord ratios and the results are compared with freestream flow in the absence of wind tunnel walls. Discrepancies between the constrained and unconstrained flows can be attributed to the presence of the walls. Results are for a Mach Number of 0.25 at angles of attack through stall. A typical wind tunnel Reynolds number of 1,200,000 and full-scale flight Reynolds number of 6,000,000 were investigated. At this low Mach number, wind tunnel wall corrections to Mach number and angle of attack are supported. Reynolds number effects are seen to be a consideration in wind tunnel testing and wall interference correction methods. An unstructured grid Navier-Stokes code is used with a Baldwin-Lomax turbulence model. The numerical method is described since unstructured flow solvers present several difficulties and fundamental differences from structured grid codes, especially in the area of turbulence modeling and grid generation.
NASA Technical Reports Server (NTRS)
Smith, Crawford F.; Podleski, Steve D.
1993-01-01
The proper use of a computational fluid dynamics code requires a good understanding of the particular code being applied. In this report the application of CFL3D, a thin-layer Navier-Stokes code, is compared with the results obtained from PARC3D, a full Navier-Stokes code. In order to gain an understanding of the use of this code, a simple problem was chosen in which several key features of the code could be exercised. The problem chosen is a cone in supersonic flow at an angle of attack. The issues of grid resolution, grid blocking, and multigridding with CFL3D are explored. The use of multigridding resulted in a significant reduction in the computational time required to solve the problem. Solutions obtained are compared with the results using the full Navier-Stokes equations solver PARC3D. The results obtained with the CFL3D code compared well with the PARC3D solutions.
Generic Wing-Body Aerodynamics Data Base
NASA Technical Reports Server (NTRS)
Holst, Terry L.; Olsen, Thomas H.; Kwak, Dochan (Technical Monitor)
2001-01-01
The wing-body aerodynamics data base consists of a series of CFD (Computational Fluid Dynamics) simulations about a generic wing body configuration consisting of a ogive-circular-cylinder fuselage and a simple symmetric wing mid-mounted on the fuselage. Solutions have been obtained for Nonlinear Potential (P), Euler (E) and Navier-Stokes (N) solvers over a range of subsonic and transonic Mach numbers and angles of attack. In addition, each solution has been computed on a series of grids, coarse, medium and fine to permit an assessment of grid refinement errors.
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic. PMID:27007951
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.
DPW-VI Results Using FUN3D with Focus on k-kL-MEAH2015 (k-kL) Turbulence Model
NASA Technical Reports Server (NTRS)
Abdol-Hamid, K. S.; Carlson, Jan-Renee; Rumsey, Christopher L.; Lee-Rausch, Elizabeth M.; Park, Michael A.
2017-01-01
The Common Research Model wing-body configuration is investigated with the k-kL-MEAH2015 turbulence model implemented in FUN3D. This includes results presented at the Sixth Drag Prediction Workshop and additional results generated after the workshop with a nonlinear Quadratic Constitutive Relation (QCR) variant of the same turbulence model. The workshop provided grids are used, and a uniform grid refinement study is performed at the design condition. A large variation between results with and without a reconstruction limiter is exhibited on "medium" grid sizes, indicating that the medium grid size is too coarse for drawing conclusions in comparison with experiment. This variation is reduced with grid refinement. At a fixed angle of attack near design conditions, the QCR variant yielded decreased lift and drag compared with the linear eddy-viscosity model by an amount that was approximately constant with grid refinement. The k-kL-MEAH2015 turbulence model produced wing root junction flow behavior consistent with wind tunnel observations.
Energy Theft in the Advanced Metering Infrastructure
NASA Astrophysics Data System (ADS)
McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick
Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.
[Typing and subtyping avian influenza virus using DNA microarrays].
Yang, Zhongping; Wang, Xiurong; Tian, Lina; Wang, Yu; Chen, Hualan
2008-07-01
Outbreaks of highly pathogenic avian influenza (HPAI) virus has caused great economic loss to the poultry industry and resulted in human deaths in Thailand and Vietnam since 2004. Rapid typing and subtyping of viruses, especially HPAI from clinical specimens, are desirable for taking prompt control measures to prevent spreading of the disease. We described a simultaneous approach using microarray to detect and subtype avian influenza virus (AIV). We designed primers of probe genes and used reverse transcriptase PCR to prepare cDNAs of AIV M gene, H5, H7, H9 subtypes haemagglutinin genes and N1, N2 subtypes neuraminidase genes. They were cloned, sequenced, reamplified and spotted to form a glass-bound microarrays. We labeled samples using Cy3-dUTP by RT-PCR, hybridized and scanned the microarrays to typing and subtyping AIV. The hybridization pattern agreed perfectly with the known grid location of each probe, no cross hybridization could be detected. Examinating of HA subtypes 1 through 15, 30 infected samples and 21 field samples revealed the DNA microarray assay was more sensitive and specific than RT-PCR test and chicken embryo inoculation. It can simultaneously detect and differentiate the main epidemic AIV. The results show that DNA microarray technology is a useful diagnostic method.
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-01-01
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications. PMID:24521942
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-02-11
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.
NASA Technical Reports Server (NTRS)
Finley, Dennis B.
1995-01-01
This report documents results from the Euler Technology Assessment program. The objective was to evaluate the efficacy of Euler computational fluid dynamics (CFD) codes for use in preliminary aircraft design. Both the accuracy of the predictions and the rapidity of calculations were to be assessed. This portion of the study was conducted by Lockheed Fort Worth Company, using a recently developed in-house Cartesian-grid code called SPLITFLOW. The Cartesian grid technique offers several advantages for this study, including ease of volume grid generation and reduced number of cells compared to other grid schemes. SPLITFLOW also includes grid adaptation of the volume grid during the solution convergence to resolve high-gradient flow regions. This proved beneficial in resolving the large vortical structures in the flow for several configurations examined in the present study. The SPLITFLOW code predictions of the configuration forces and moments are shown to be adequate for preliminary design analysis, including predictions of sideslip effects and the effects of geometry variations at low and high angles of attack. The time required to generate the results from initial surface definition is on the order of several hours, including grid generation, which is compatible with the needs of the design environment.
Computational Modeling for the Flow Over a Multi-Element Airfoil
NASA Technical Reports Server (NTRS)
Liou, William W.; Liu, Feng-Jun
1999-01-01
The flow over a multi-element airfoil is computed using two two-equation turbulence models. The computations are performed using the INS2D) Navier-Stokes code for two angles of attack. Overset grids are used for the three-element airfoil. The computed results are compared with experimental data for the surface pressure, skin friction coefficient, and velocity magnitude. The computed surface quantities generally agree well with the measurement. The computed results reveal the possible existence of a mixing-layer-like region of flow next to the suction surface of the slat for both angles of attack.
Cyberwarfare on the Electricity Infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Murarka, N.; Ramesh, V.C.
2000-03-20
The report analyzes the possibility of cyberwarfare on the electricity infrastructure. The ongoing deregulation of the electricity industry makes the power grid all the more vulnerable to cyber attacks. The report models the power system information system components, models potential threats and protective measures. It therefore offers a framework for infrastructure protection.
77 FR 64935 - Reliability Standards for Geomagnetic Disturbances
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-24
... Ridge Study'') on the effects of electromagnetic pulses on the Bulk-Power System. Available at http... . \\6\\ Oak Ridge National Laboratory, Electromagnetic Pulse: Effects on the U.S. Power Grid: Meta-R-319... issued reports assessing the threat to the United States from Electromagnetic Pulse (EMP) attack in 2004...
The Need for Balance in Attack Aviation Employment Against Hybrid Threats
2014-06-13
they mitigate airpower as well as their ability to counter landpower. Cilluffo and Clark offer a further explanation of hybrid threats. Although...power radios, and the systematic manipulation of the power grids resulting in the flickering of the lights in certain towns to alert fighters...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Billings, Jay J.; Bonior, Jason D.; Evans, Philip G.
Securely transferring timing information in the electrical grid is a critical component of securing the nation's infrastructure from cyber attacks. One solution to this problem is to use quantum information to securely transfer the timing information across sites. This software provides such an infrastructure using a standard Java webserver that pulls the quantum information from associated hardware.
NASA Technical Reports Server (NTRS)
Kinard, Tim A.; Harris, Brenda W.; Raj, Pradeep
1995-01-01
Vortex flows on a twin-tail and a single-tail modular transonic vortex interaction (MTVI) model, representative of a generic fighter configuration, are computationally simulated in this study using the Three-dimensional Euler/Navier-Stokes Aerodynamic Method (TEAM). The primary objective is to provide an assessment of viscous effects on benign (10 deg angle of attack) and burst (35 deg angle of attack) vortex flow solutions. This study was conducted in support of a NASA project aimed at assessing the viability of using Euler technology to predict aerodynamic characteristics of aircraft configurations at moderate-to-high angles of attack in a preliminary design environment. The TEAM code solves the Euler and Reynolds-average Navier-Stokes equations on patched multiblock structured grids. Its algorithm is based on a cell-centered finite-volume formulation with multistage time-stepping scheme. Viscous effects are assessed by comparing the computed inviscid and viscous solutions with each other and experimental data. Also, results of Euler solution sensitivity to grid density and numerical dissipation are presented for the twin-tail model. The results show that proper accounting of viscous effects is necessary for detailed design and optimization but Euler solutions can provide meaningful guidelines for preliminary design of flight vehicles which exhibit vortex flows in parts of their flight envelope.
Vortex Breakdown over Slender Delta Wings (Eclatement tourbillonnaire sur les ailes delta effil es)
2009-11-01
flow patterns for a) experiments of Mitchell et. al ., b) grid G9A4 fully 15-12 turbulent, c) grid G9A4 laminar to turbulent transition at 30% root...tourbillonnaires et en particulier les tourbillons de bord d’attaque subissent une désorganisation soudaine connue sous le nom de rupture du vortex. Ce...attack in the range of –10° to 36°, an amplitude of 5° to 26° and an oscillation frequency of 0.2 to 1.5 Hz. 8) TPI Test Case De Luca et al . tested a
Mapping and detecting bark beetle-caused tree mortality in the western United States
NASA Astrophysics Data System (ADS)
Meddens, Arjan J. H.
Recently, insect outbreaks across North America have dramatically increased and the forest area affected by bark beetles is similar to that affected by fire. Remote sensing offers the potential to detect insect outbreaks with high accuracy. Chapter one involved detection of insect-caused tree mortality on the tree level for a 90km2 area in northcentral Colorado. Classes of interest included green trees, multiple stages of post-insect attack tree mortality including dead trees with red needles ("red-attack") and dead trees without needles ("gray-attack"), and non-forest. The results illustrated that classification of an image with a spatial resolution similar to the area of a tree crown outperformed that from finer and coarser resolution imagery for mapping tree mortality and non-forest classes. I also demonstrated that multispectral imagery could be used to separate multiple postoutbreak attack stages (i.e., red-attack and gray-attack) from other classes in the image. In Chapter 2, I compared and improved methods for detecting bark beetle-caused tree mortality using medium-resolution satellite data. I found that overall classification accuracy was similar between single-date and multi-date classification methods. I developed regression models to predict percent red attack within a 30-m grid cell and these models explained >75% of the variance using three Landsat spectral explanatory variables. Results of the final product showed that approximately 24% of the forest within the Landsat scene was comprised of tree mortality caused by bark beetles. In Chapter 3, I developed a gridded data set with 1-km2 resolution using aerial survey data and improved estimates of tree mortality across the western US and British Columbia. In the US, I also produced an upper estimate by forcing the mortality area to match that from high-resolution imagery in Idaho, Colorado, and New Mexico. Cumulative mortality area from all bark beetles was 5.46 Mha in British Columbia in 2001-2010 and 0.47-5.37 Mha (lower and upper estimate) in the western conterminous US during 1997-2010. Improved methods for detection and mapping of insect outbreak areas will lead to improved assessments of the effects of these forest disturbances on the economy, carbon cycle (and feedback to climate change), fuel loads, hydrology and forest ecology.
Urbanization and the more-individuals hypothesis.
Chiari, Claudia; Dinetti, Marco; Licciardello, Cinzia; Licitra, Gaetano; Pautasso, Marco
2010-03-01
1. Urbanization is a landscape process affecting biodiversity world-wide. Despite many urban-rural studies of bird assemblages, it is still unclear whether more species-rich communities have more individuals, regardless of the level of urbanization. The more-individuals hypothesis assumes that species-rich communities have larger populations, thus reducing the chance of local extinctions. 2. Using newly collated avian distribution data for 1 km(2) grid cells across Florence, Italy, we show a significantly positive relationship between species richness and assemblage abundance for the whole urban area. This richness-abundance relationship persists for the 1 km(2) grid cells with less than 50% of urbanized territory, as well as for the remaining grid cells, with no significant difference in the slope of the relationship. These results support the more-individuals hypothesis as an explanation of patterns in species richness, also in human modified and fragmented habitats. 3. However, the intercept of the species richness-abundance relationship is significantly lower for highly urbanized grid cells. Our study confirms that urban communities have lower species richness but counters the common notion that assemblages in densely urbanized ecosystems have more individuals. In Florence, highly inhabited areas show fewer species and lower assemblage abundance. 4. Urbanized ecosystems are an ongoing large-scale natural experiment which can be used to test ecological theories empirically.
Cascade-based attacks on complex networks
NASA Astrophysics Data System (ADS)
Motter, Adilson E.; Lai, Ying-Cheng
2002-12-01
We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.
Inviscid Flow Computations of Several Aeroshell Configurations for a '07 Mars Lander
NASA Technical Reports Server (NTRS)
Prabhu, Ramadas K.
2001-01-01
This report documents the results of an inviscid computational study conducted on several candidate aeroshell configurations for a proposed '07 Mars lander. Eleven different configurations were considered, and the aerodynamic characteristics of each of these were computed for a Mach number of 23.7 at 10, 15, and 20 degree angles of attack. The unstructured grid software FELISA with the equilibrium Mars gas option was used for these computations. The pitching moment characteristics and the lift-to-drag ratios at trim angle of attack of each of these configurations were examined to make a selection. The criterion for selection was that the configuration should be longitudinally stable, and should trim at an angle of attack where the L/D is -0.25. Based on the present study, two configurations were selected for further study
A Structured Grid Based Solution-Adaptive Technique for Complex Separated Flows
NASA Technical Reports Server (NTRS)
Thornburg, Hugh; Soni, Bharat K.; Kishore, Boyalakuntla; Yu, Robert
1996-01-01
The objective of this work was to enhance the predictive capability of widely used computational fluid dynamic (CFD) codes through the use of solution adaptive gridding. Most problems of engineering interest involve multi-block grids and widely disparate length scales. Hence, it is desirable that the adaptive grid feature detection algorithm be developed to recognize flow structures of different type as well as differing intensity, and adequately address scaling and normalization across blocks. In order to study the accuracy and efficiency improvements due to the grid adaptation, it is necessary to quantify grid size and distribution requirements as well as computational times of non-adapted solutions. Flow fields about launch vehicles of practical interest often involve supersonic freestream conditions at angle of attack exhibiting large scale separate vortical flow, vortex-vortex and vortex-surface interactions, separated shear layers and multiple shocks of different intensity. In this work, a weight function and an associated mesh redistribution procedure is presented which detects and resolves these features without user intervention. Particular emphasis has been placed upon accurate resolution of expansion regions and boundary layers. Flow past a wedge at Mach=2.0 is used to illustrate the enhanced detection capabilities of this newly developed weight function.
Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance
NASA Technical Reports Server (NTRS)
Viswanathan, Arun
2012-01-01
This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this variability in training data for anomaly detectors, but has ignored variability in the attack signal that will necessarily affect the evaluation results for such detectors. We posit that current evaluation strategies implicitly assume that attacks always manifest in a stable manner; we show that this assumption is wrong. We describe a simple experiment to demonstrate the effects of environmental noise on the manifestation of attacks in data and introduce the notion of attack manifestation stability. Finally, we argue that conclusions about detector performance will be unreliable and incomplete if the stability of attack manifestation is not accounted for in the evaluation strategy.
Islanding the power grid on the transmission level: less connections for more security
Mureddu, Mario; Caldarelli, Guido; Damiano, Alfonso; Scala, Antonio; Meyer-Ortmanns, Hildegard
2016-01-01
Islanding is known as a management procedure of the power system that is implemented at the distribution level to preserve sensible loads from outages and to guarantee the continuity in electricity supply, when a high amount of distributed generation occurs. In this paper we study islanding on the level of the transmission grid and shall show that it is a suitable measure to enhance energy security and grid resilience. We consider the German and Italian transmission grids. We remove links either randomly to mimic random failure events, or according to a topological characteristic, their so-called betweenness centrality, to mimic an intentional attack and test whether the resulting fragments are self-sustainable. We test this option via the tool of optimized DC power flow equations. When transmission lines are removed according to their betweenness centrality, the resulting islands have a higher chance of being dynamically self-sustainable than for a random removal. Less connections may even increase the grid’s stability. These facts should be taken into account in the design of future power grids. PMID:27713509
DOE Office of Scientific and Technical Information (OSTI.GOV)
Deka, Deepjyoti; Backhaus, Scott N.; Chertkov, Michael
Traditionally power distribution networks are either not observable or only partially observable. This complicates development and implementation of new smart grid technologies, such as those related to demand response, outage detection and management, and improved load-monitoring. In this two part paper, inspired by proliferation of the metering technology, we discuss estimation problems in structurally loopy but operationally radial distribution grids from measurements, e.g. voltage data, which are either already available or can be made available with a relatively minor investment. In Part I, the objective is to learn the operational layout of the grid. Part II of this paper presentsmore » algorithms that estimate load statistics or line parameters in addition to learning the grid structure. Further, Part II discusses the problem of structure estimation for systems with incomplete measurement sets. Our newly suggested algorithms apply to a wide range of realistic scenarios. The algorithms are also computationally efficient – polynomial in time– which is proven theoretically and illustrated computationally on a number of test cases. The technique developed can be applied to detect line failures in real time as well as to understand the scope of possible adversarial attacks on the grid.« less
Vortical Flow Prediction Using an Adaptive Unstructured Grid Method
NASA Technical Reports Server (NTRS)
Pirzadeh, Shahyar Z.
2001-01-01
A computational fluid dynamics (CFD) method has been employed to compute vortical flows around slender wing/body configurations. The emphasis of the paper is on the effectiveness of an adaptive grid procedure in "capturing" concentrated vortices generated at sharp edges or flow separation lines of lifting surfaces flying at high angles of attack. The method is based on a tetrahedral unstructured grid technology developed at the NASA Langley Research Center. Two steady-state, subsonic, inviscid and Navier-Stokes flow test cases are presented to demonstrate the applicability of the method for solving practical vortical flow problems. The first test case concerns vortex flow over a simple 65deg delta wing with different values of leading-edge bluntness, and the second case is that of a more complex fighter configuration. The superiority of the adapted solutions in capturing the vortex flow structure over the conventional unadapted results is demonstrated by comparisons with the windtunnel experimental data. The study shows that numerical prediction of vortical flows is highly sensitive to the local grid resolution and that the implementation of grid adaptation is essential when applying CFD methods to such complicated flow problems.
Islanding the power grid on the transmission level: less connections for more security
NASA Astrophysics Data System (ADS)
Mureddu, Mario; Caldarelli, Guido; Damiano, Alfonso; Scala, Antonio; Meyer-Ortmanns, Hildegard
2016-10-01
Islanding is known as a management procedure of the power system that is implemented at the distribution level to preserve sensible loads from outages and to guarantee the continuity in electricity supply, when a high amount of distributed generation occurs. In this paper we study islanding on the level of the transmission grid and shall show that it is a suitable measure to enhance energy security and grid resilience. We consider the German and Italian transmission grids. We remove links either randomly to mimic random failure events, or according to a topological characteristic, their so-called betweenness centrality, to mimic an intentional attack and test whether the resulting fragments are self-sustainable. We test this option via the tool of optimized DC power flow equations. When transmission lines are removed according to their betweenness centrality, the resulting islands have a higher chance of being dynamically self-sustainable than for a random removal. Less connections may even increase the grid’s stability. These facts should be taken into account in the design of future power grids.
CFD Variability for a Civil Transport Aircraft Near Buffet-Onset Conditions
NASA Technical Reports Server (NTRS)
Rumsey, Christopher L.; Morrison, Joseph H.; Biedron, Robert T.
2003-01-01
A CFD sensitivity analysis is conducted for an aircraft at several conditions, including flow with substantial separation (buffet onset). The sensitivity is studied using two different Navier-Stokes computer codes, three different turbulence models, and two different grid treatments of the wing trailing edge. This effort is a follow-on to an earlier study of CFD variation over a different aircraft in buffet onset conditions. Similar to the earlier study, the turbulence model is found to have the largest effect, with a variation of 3.8% in lift at the buffet onset angle of attack. Drag and moment variation are 2.9% and 23.6%, respectively. The variations due to code and trailing edge cap grid are smaller than that due to turbulence model. Overall, the combined approximate error band in CFD due to code, turbulence model, and trailing edge treatment at the buffet onset angle of attack are: 4% in lift, 3% in drag, and 31% in moment. The CFD results show similar trends to flight test data, but also exhibit a lift curve break not seen in the data.
Docter, Stynke P; Street, Jackie; Braunack-Mayer, Annette J; van der Wilt, Gert-Jan
2011-08-01
The emergence of virulent avian influenza A subtypes with potential to evolve into novel human subtypes prompted directives from the World Health Organisation recommending that countries prepare for a pandemic. In response the Australian government developed the Australian Health Management Plan for Pandemic Influenza (AHMPPI), which includes strategies to contain and/or manage a pandemic. To implement these strategies successfully, community compliance is necessary. Our qualitative study investigated, through a deliberative forum, the extent to which the antiviral drug and vaccine allocation of the AHMPPI corresponds with community views about the priority groups. We used Mary Douglas' Grid/Group analysis to analyse the results, which suggested that the AHMPPI's allocation strategy corresponds well with community views with both based on a hierarchical structure. There are some differences concerning community involvement in the decision process and information provision to the public, for which our study provides recommendations.
CFD Computations for a Generic High-Lift Configuration Using TetrUSS
NASA Technical Reports Server (NTRS)
Pandya, Mohagna J.; Abdol-Hamid, Khaled S.; Parlette, Edward B.
2011-01-01
Assessment of the accuracy of computational results for a generic high-lift trapezoidal wing with a single slotted flap and slat is presented. The paper is closely aligned with the focus of the 1st AIAA CFD High Lift Prediction Workshop (HiLiftPW-1) which was to assess the accuracy of CFD methods for multi-element high-lift configurations. The unstructured grid Reynolds-Averaged Navier-Stokes solver TetrUSS/USM3D is used for the computational results. USM3D results are obtained assuming fully turbulent flow using the Spalart-Allmaras (SA) and Shear Stress Transport (SST) turbulence models. Computed solutions have been obtained at seven different angles-of-attack ranging from 6 -37 . Three grids providing progressively higher grid resolution are used to quantify the effect of grid resolution on the lift, drag, pitching moment, surface pressure and stall angle. SA results, as compared to SST results, exhibit better agreement with the measured data. However, both turbulence models under-predict upper surface pressures near the wing tip region.
Low Boom Configuration Analysis with FUN3D Adjoint Simulation Framework
NASA Technical Reports Server (NTRS)
Park, Michael A.
2011-01-01
Off-body pressure, forces, and moments for the Gulfstream Low Boom Model are computed with a Reynolds Averaged Navier Stokes solver coupled with the Spalart-Allmaras (SA) turbulence model. This is the first application of viscous output-based adaptation to reduce estimated discretization errors in off-body pressure for a wing body configuration. The output adaptation approach is compared to an a priori grid adaptation technique designed to resolve the signature on the centerline by stretching and aligning the grid to the freestream Mach angle. The output-based approach produced good predictions of centerline and off-centerline measurements. Eddy viscosity predicted by the SA turbulence model increased significantly with grid adaptation. Computed lift as a function of drag compares well with wind tunnel measurements for positive lift, but predicted lift, drag, and pitching moment as a function of angle of attack has significant differences from the measured data. The sensitivity of longitudinal forces and moment to grid refinement is much smaller than the differences between the computed and measured data.
NASA Technical Reports Server (NTRS)
Hall, Edward J.; Delaney, Robert A.; Bettner, James L.
1991-01-01
The primary objective was the development of a time dependent 3-D Euler/Navier-Stokes aerodynamic analysis to predict unsteady compressible transonic flows about ducted and unducted propfan propulsion systems at angle of attack. The resulting computer codes are referred to as Advanced Ducted Propfan Analysis Codes (ADPAC). A computer program user's manual is presented for the ADPAC. Aerodynamic calculations were based on a four stage Runge-Kutta time marching finite volume solution technique with added numerical dissipation. A time accurate implicit residual smoothing operator was used for unsteady flow predictions. For unducted propfans, a single H-type grid was used to discretize each blade passage of the complete propeller. For ducted propfans, a coupled system of five grid blocks utilizing an embedded C grid about the cowl leading edge was used to discretize each blade passage. Grid systems were generated by a combined algebraic/elliptic algorithm developed specifically for ducted propfans. Numerical calculations were compared with experimental data for both ducted and unducted flows.
Matthew Hansen, E; Steven Munson, A; Blackford, Darren C; Wakarchuk, David; Scott Baggett, L
2016-10-01
We tested lethal trap trees and repellent semiochemicals as area treatments to protect host trees from spruce beetle (Dendroctonus rufipennis Kirby) attacks. Lethal trap tree treatments ("spray treatment") combined a spruce beetle bait with carbaryl treatment of the baited spruce. Repellent treatments ("spray-repellent") combined a baited lethal trap tree within a 16-m grid of MCH (3-methylcyclohex-2-en-1-one) and two novel spruce beetle repellents. After beetle flight, we surveyed all trees within 50 m of plot center, stratified by 10-m radius subplots, and compared attack rates to those from baited and unbaited control plots. Compared to the baited controls, spruce in the spray treatment had significantly reduced likelihood of a more severe attack classification (e.g., mass-attacked over strip-attacked or unsuccessful-attacked over unattacked). Because spruce in the spray treatment also had significantly heightened probability of more severe attack classification than those in the unbaited controls, however, we do not recommend lethal trap trees as a stand-alone beetle suppression strategy for epidemic beetle populations. Spruce in the spray-repellent treatment were slightly more likely to be classified as more severely attacked within 30 m of plot center compared to unbaited controls but, overall, had reduced probabilities of beetle attack over the entire 50-m radius plots. The semiochemical repellents deployed in this study were effective at reducing attacks on spruce within treated plots despite the presence of a centrally located spruce beetle bait. Further testing will be required to clarify operational protocols such as dose, elution rate, and release device spacing. Published by Oxford University Press on behalf of Entomological Society of America 2016. This work is written by US Government employees and is in the public domain in the US.
Cyber-Physical System Security of Smart Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dagle, Jeffery E.
2012-01-31
Abstract—This panel presentation will provide perspectives of cyber-physical system security of smart grids. As smart grid technologies are deployed, the interconnected nature of these systems is becoming more prevalent and more complex, and the cyber component of this cyber-physical system is increasing in importance. Studying system behavior in the face of failures (e.g., cyber attacks) allows a characterization of the systems’ response to failure scenarios, loss of communications, and other changes in system environment (such as the need for emergent updates and rapid reconfiguration). The impact of such failures on the availability of the system can be assessed and mitigationmore » strategies considered. Scenarios associated with confidentiality, integrity, and availability are considered. The cyber security implications associated with the American Recovery and Reinvestment Act of 2009 in the United States are discussed.« less
An Aerodynamic Analysis of a Spinning Missile with Dithering Canards
NASA Technical Reports Server (NTRS)
Meakin, Robert L.; Nygaard, Tor A.
2003-01-01
A generic spinning missile with dithering canards is used to demonstrate the utility of an overset structured grid approach for simulating the aerodynamics of rolling airframe missile systems. The approach is used to generate a modest aerodynamic database for the generic missile. The database is populated with solutions to the Euler and Navier-Stokes equations. It is used to evaluate grid resolution requirements for accurate prediction of instantaneous missile loads and the relative aerodynamic significance of angle-of-attack, canard pitching sequence, viscous effects, and roll-rate effects. A novel analytical method for inter- and extrapolation of database results is also given.
Measure of robustness for complex networks
NASA Astrophysics Data System (ADS)
Youssef, Mina Nabil
Critical infrastructures are repeatedly attacked by external triggers causing tremendous amount of damages. Any infrastructure can be studied using the powerful theory of complex networks. A complex network is composed of extremely large number of different elements that exchange commodities providing significant services. The main functions of complex networks can be damaged by different types of attacks and failures that degrade the network performance. These attacks and failures are considered as disturbing dynamics, such as the spread of viruses in computer networks, the spread of epidemics in social networks, and the cascading failures in power grids. Depending on the network structure and the attack strength, every network differently suffers damages and performance degradation. Hence, quantifying the robustness of complex networks becomes an essential task. In this dissertation, new metrics are introduced to measure the robustness of technological and social networks with respect to the spread of epidemics, and the robustness of power grids with respect to cascading failures. First, we introduce a new metric called the Viral Conductance (VCSIS ) to assess the robustness of networks with respect to the spread of epidemics that are modeled through the susceptible/infected/susceptible (SIS) epidemic approach. In contrast to assessing the robustness of networks based on a classical metric, the epidemic threshold, the new metric integrates the fraction of infected nodes at steady state for all possible effective infection strengths. Through examples, VCSIS provides more insights about the robustness of networks than the epidemic threshold. In addition, both the paradoxical robustness of Barabasi-Albert preferential attachment networks and the effect of the topology on the steady state infection are studied, to show the importance of quantifying the robustness of networks. Second, a new metric VCSIR is introduced to assess the robustness of networks with respect to the spread of susceptible/infected/recovered (SIR) epidemics. To compute VCSIR, we propose a novel individual-based approach to model the spread of SIR epidemics in networks, which captures the infection size for a given effective infection rate. Thus, VCSIR quantitatively integrates the infection strength with the corresponding infection size. To optimize the VCSIR metric, a new mitigation strategy is proposed, based on a temporary reduction of contacts in social networks. The social contact network is modeled as a weighted graph that describes the frequency of contacts among the individuals. Thus, we consider the spread of an epidemic as a dynamical system, and the total number of infection cases as the state of the system, while the weight reduction in the social network is the controller variable leading to slow/reduce the spread of epidemics. Using optimal control theory, the obtained solution represents an optimal adaptive weighted network defined over a finite time interval. Moreover, given the high complexity of the optimization problem, we propose two heuristics to find the near optimal solutions by reducing the contacts among the individuals in a decentralized way. Finally, the cascading failures that can take place in power grids and have recently caused several blackouts are studied. We propose a new metric to assess the robustness of the power grid with respect to the cascading failures. The power grid topology is modeled as a network, which consists of nodes and links representing power substations and transmission lines, respectively. We also propose an optimal islanding strategy to protect the power grid when a cascading failure event takes place in the grid. The robustness metrics are numerically evaluated using real and synthetic networks to quantify their robustness with respect to disturbing dynamics. We show that the proposed metrics outperform the classical metrics in quantifying the robustness of networks and the efficiency of the mitigation strategies. In summary, our work advances the network science field in assessing the robustness of complex networks with respect to various disturbing dynamics.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Youssef, Tarek; El Hariri, Mohammad; Habib, Hani
Abstract— Secure high-speed communication is required to ensure proper operation of complex power grid systems and prevent malicious tampering activities. In this paper, artificial neural networks with temporal dependency are introduced for false data identification and mitigation for broadcasted IEC 61850 SMV messages. The fast responses of such intelligent modules in intrusion detection make them suitable for time- critical applications, such as protection. However, care must be taken in selecting the appropriate intelligence model and decision criteria. As such, this paper presents a customizable malware script to sniff and manipulate SMV messages and demonstrates the ability of the malware tomore » trigger false positives in the neural network’s response. The malware developed is intended to be as a vaccine to harden the intrusion detection system against data manipulation attacks by enhancing the neural network’s ability to learn and adapt to these attacks.« less
Physical Watermarking for Securing Cyber-Physical Systems via Packet Drop Injections
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ozel, Omur; Weekrakkody, Sean; Sinopoli, Bruno
Physical watermarking is a well known solution for detecting integrity attacks on Cyber-Physical Systems (CPSs) such as the smart grid. Here, a random control input is injected into the system in order to authenticate physical dynamics and sensors which may have been corrupted by adversaries. Packet drops may naturally occur in a CPS due to network imperfections. To our knowledge, previous work has not considered the role of packet drops in detecting integrity attacks. In this paper, we investigate the merit of injecting Bernoulli packet drops into the control inputs sent to actuators as a new physical watermarking scheme. Withmore » the classical linear quadratic objective function and an independent and identically distributed packet drop injection sequence, we study the effect of packet drops on meeting security and control objectives. Our results indicate that the packet drops could act as a potential physical watermark for attack detection in CPSs.« less
Defense on the Move: Ant-Based Cyber Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.
Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cybermore » Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.« less
Mills, Robin; Hildenbrandt, Hanno; Taylor, Graham K; Hemelrijk, Charlotte K
2018-04-01
The peregrine falcon Falco peregrinus is renowned for attacking its prey from high altitude in a fast controlled dive called a stoop. Many other raptors employ a similar mode of attack, but the functional benefits of stooping remain obscure. Here we investigate whether, when, and why stooping promotes catch success, using a three-dimensional, agent-based modeling approach to simulate attacks of falcons on aerial prey. We simulate avian flapping and gliding flight using an analytical quasi-steady model of the aerodynamic forces and moments, parametrized by empirical measurements of flight morphology. The model-birds' flight control inputs are commanded by their guidance system, comprising a phenomenological model of its vision, guidance, and control. To intercept its prey, model-falcons use the same guidance law as missiles (pure proportional navigation); this assumption is corroborated by empirical data on peregrine falcons hunting lures. We parametrically vary the falcon's starting position relative to its prey, together with the feedback gain of its guidance loop, under differing assumptions regarding its errors and delay in vision and control, and for three different patterns of prey motion. We find that, when the prey maneuvers erratically, high-altitude stoops increase catch success compared to low-altitude attacks, but only if the falcon's guidance law is appropriately tuned, and only given a high degree of precision in vision and control. Remarkably, the optimal tuning of the guidance law in our simulations coincides closely with what has been observed empirically in peregrines. High-altitude stoops are shown to be beneficial because their high airspeed enables production of higher aerodynamic forces for maneuvering, and facilitates higher roll agility as the wings are tucked, each of which is essential to catching maneuvering prey at realistic response delays.
Prediction of asymmetric vortical flows around slender bodies using Navier-Stokes equations
NASA Technical Reports Server (NTRS)
Liu, C. H.; Wong, Tin-Chee; Kandil, Osama A.
1992-01-01
Steady and unsteady asymmetric vortical flows around slender bodies at high angles of attack are solved using the unsteady, compressible, thin-layer Navier-Stokes equations. An implicit, upwind-biased, flux-difference splitting, finite-volume scheme is used for the numerical computations. For supersonic flows past point cones, the locally conical flow assumption have been used for efficient computational studies of this phenomenon. Asymmetric flows past a 5-deg semiapex-angle circular cone at different angles of attack, free-stream Mach numbers, and Reynolds numbers have been studied in responses to different sources of disturbances. The effects of grid fineness and computational domain size have also been investigated. Next, the responses of three-dimensional supersonic asymmetric flow around a 5-deg circular cone at different angles of attack and Reynolds numbers to short-duration sideslip disturbances are presented. The results show that flow asymmetry becomes stronger as the Reynolds number and angles of attack are increased. One of the cases of flow over a cone-cylinder configuration is validated fairly well by experimental data.
Santer, Roger D.; Rind, F. Claire; Simmons, Peter J.
2012-01-01
Many arthropods possess escape-triggering neural mechanisms that help them evade predators. These mechanisms are important neuroethological models, but they are rarely investigated using predator-like stimuli because there is often insufficient information on real predator attacks. Locusts possess uniquely identifiable visual neurons (the descending contralateral movement detectors, DCMDs) that are well-studied looming motion detectors. The DCMDs trigger ‘glides’ in flying locusts, which are hypothesised to be appropriate last-ditch responses to the looms of avian predators. To date it has not been possible to study glides in response to stimuli simulating bird attacks because such attacks have not been characterised. We analyse video of wild black kites attacking flying locusts, and estimate kite attack speeds of 10.8±1.4 m/s. We estimate that the loom of a kite’s thorax towards a locust at these speeds should be characterised by a relatively low ratio of half size to speed (l/|v|) in the range 4–17 ms. Peak DCMD spike rate and gliding response occurrence are known to increase as l/|v| decreases for simple looming shapes. Using simulated looming discs, we investigate these trends and show that both DCMD and behavioural responses are strong to stimuli with kite-like l/|v| ratios. Adding wings to looming discs to produce a more realistic stimulus shape did not disrupt the overall relationships of DCMD and gliding occurrence to stimulus l/|v|. However, adding wings to looming discs did slightly reduce high frequency DCMD spike rates in the final stages of object approach, and slightly delay glide initiation. Looming discs with or without wings triggered glides closer to the time of collision as l/|v| declined, and relatively infrequently before collision at very low l/|v|. However, the performance of this system is in line with expectations for a last-ditch escape response. PMID:23209660
Contributions to HiLiftPW-3 Using Structured, Overset Grid Methods
NASA Technical Reports Server (NTRS)
Coder, James G.; Pulliam, Thomas H.; Jensen, James C.
2018-01-01
The High-Lift Common Research Model (HL-CRM) and the JAXA Standard Model (JSM) were analyzed computationally using both the OVERFLOW and LAVA codes for the third AIAA High-Lift Prediction Workshop. Geometry descriptions and the test cases simulated are described. With the HL-CRM, the effects of surface smoothness during grid projection and the effect of partially sealing a flap gap were studied. Grid refinement studies were performed at two angles of attack using both codes. For the JSM, simulations were performed with and without the nacelle/pylon. Without the nacelle/pylon, evidence of multiple solutions was observed when a quadratic constitutive relation is used in the turbulence modeling; however, using time-accurate simulation seemed to alleviate this issue. With the nacelle/pylon, no evidence of multiple solutions was observed. Laminar-turbulent transition modeling was applied to both JSM configuration, and had an overall favorable impact on the lift predictions.
Progress in high-lift aerodynamic calculations
NASA Technical Reports Server (NTRS)
Rogers, Stuart E.
1993-01-01
The current work presents progress in the effort to numerically simulate the flow over high-lift aerodynamic components, namely, multi-element airfoils and wings in either a take-off or a landing configuration. The computational approach utilizes an incompressible flow solver and an overlaid chimera grid approach. A detailed grid resolution study is presented for flow over a three-element airfoil. Two turbulence models, a one-equation Baldwin-Barth model and a two equation k-omega model are compared. Excellent agreement with experiment is obtained for the lift coefficient at all angles of attack, including the prediction of maximum lift when using the two-equation model. Results for two other flap riggings are shown. Three-dimensional results are presented for a wing with a square wing-tip as a validation case. Grid generation and topology is discussed for computing the flow over a T-39 Sabreliner wing with flap deployed and the initial calculations for this geometry are presented.
What Was Learned in Predicting Slender Airframe Aerodynamics with the F16-XL Aircraft
NASA Technical Reports Server (NTRS)
Rizzi, Arthur; Lucking, James M.
2014-01-01
The CAWAPI-2 coordinated project has been underway to improve CFD predictions of slender airframe aerodynamics. The work is focused on two flow conditions and leverages a unique flight data set obtained with the F-16XL aircraft for comparison and verification. These conditions, a low-speed high angle-of-attack case and a transonic low angle-of-attack case, were selected from a prior prediction campaign wherein the CFD failed to provide acceptable results. In re-visiting these two cases, approaches for improved results include better, denser grids using more grid adaptation to local flow features as well as unsteady higher-fidelity physical modeling like hybrid RANS/URANS-LES methods. The work embodies predictions from multiple numerical formulations that are contributed from multiple organizations where some authors investigate other possible factors that could explain the discrepancies in agreement, e.g. effects due to deflected control surfaces during the flight tests, as well as static aeroelastic deflection of the outer wing. This paper presents the synthesis of all the results and findings and draws some conclusions that lead to an improved understanding of the underlying flow physics, and finally making the connections between the physics and aircraft features.
Computing Aerodynamic Performance of a 2D Iced Airfoil: Blocking Topology and Grid Generation
NASA Technical Reports Server (NTRS)
Chi, X.; Zhu, B.; Shih, T. I.-P.; Slater, J. W.; Addy, H. E.; Choo, Yung K.; Lee, Chi-Ming (Technical Monitor)
2002-01-01
The ice accrued on airfoils can have enormously complicated shapes with multiple protruded horns and feathers. In this paper, several blocking topologies are proposed and evaluated on their ability to produce high-quality structured multi-block grid systems. A transition layer grid is introduced to ensure that jaggedness on the ice-surface geometry do not to propagate into the domain. This is important for grid-generation methods based on hyperbolic PDEs (Partial Differential Equations) and algebraic transfinite interpolation. A 'thick' wrap-around grid is introduced to ensure that grid lines clustered next to solid walls do not propagate as streaks of tightly packed grid lines into the interior of the domain along block boundaries. For ice shapes that are not too complicated, a method is presented for generating high-quality single-block grids. To demonstrate the usefulness of the methods developed, grids and CFD solutions were generated for two iced airfoils: the NLF0414 airfoil with and without the 623-ice shape and the B575/767 airfoil with and without the 145m-ice shape. To validate the computations, the computed lift coefficients as a function of angle of attack were compared with available experimental data. The ice shapes and the blocking topologies were prepared by NASA Glenn's SmaggIce software. The grid systems were generated by using a four-boundary method based on Hermite interpolation with controls on clustering, orthogonality next to walls, and C continuity across block boundaries. The flow was modeled by the ensemble-averaged compressible Navier-Stokes equations, closed by the shear-stress transport turbulence model in which the integration is to the wall. All solutions were generated by using the NPARC WIND code.
Li, Yuancheng; Qiu, Rixuan; Jing, Sitong
2018-01-01
Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy.
A code inspection process for security reviews
DOE Office of Scientific and Technical Information (OSTI.GOV)
Garzoglio, Gabriele; /Fermilab
2009-05-01
In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application andmore » their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.« less
NASA Technical Reports Server (NTRS)
Lessard, Wendy B.
1999-01-01
The objective of this study is to calibrate a Navier-Stokes code for the TCA (30/10) baseline configuration (partial span leading edge flaps were deflected at 30 degs. and all the trailing edge flaps were deflected at 10 degs). The computational results for several angles of attack are compared with experimental force, moments, and surface pressures. The code used in this study is CFL3D; mesh sequencing and multi-grid were used to full advantage to accelerate convergence. A multi-grid approach was used similar to that used for the Reference H configuration allowing point-to-point matching across all the trailingedge block interfaces. From past experiences with the Reference H (ie, good force, moment, and pressure comparisons were obtained), it was assumed that the mounting system would produce small effects; hence, it was not initially modeled. However, comparisons of lower surface pressures indicated the post mount significantly influenced the lower surface pressures, so the post geometry was inserted into the existing grid using Chimera (overset grids).
A code inspection process for security reviews
NASA Astrophysics Data System (ADS)
Garzoglio, Gabriele
2010-04-01
In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application and their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.
NASA Astrophysics Data System (ADS)
Born, Joshua
The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.
NASA Technical Reports Server (NTRS)
Sondak, D. L.; Pletcher, R. H.; Vandalsem, W. R.
1992-01-01
A k-epsilon turbulence model suitable for compressible flow, including the new wall function formulation, has been incorporated into an existing compressible Reynolds-averaged Navier-Stokes code, F3D. The low Reynolds number k-epsilon model of Chien (1982) was added for comparison with the present method. A number of features were added to the F3D code including improved far-field boundary conditions and viscous terms in the streamwise direction. A series of computations of increasing complexity was run to test the effectiveness of the new formulation. Flow over a flat plate was computed by using both orthogonal and nonorthogonal grids, and the friction coefficients and velocity profiles compared with a semi-empirical equation. Flow over a body of revolution at zero angle of attack was then computed to test the method's ability to handle flow over a curved surface. Friction coefficients and velocity profiles were compared to test data. All models gave good results on a relatively fine grid, but only the wall function formulation was effective with coarser grids. Finally, in order to demonstrate the method's ability to handle complex flow fields, separated flow over a prolate spheroid at angle of attack was computed, and results were compared to test data. The results were also compared to a k-epsilon model by Kim and Patel (1991), in which one equation model patched in at the wall was employed. Both models gave reasonable solutions, but improvement is required for accurate prediction of friction coefficients in the separated regions.
Nocturnal hypothermia impairs flight ability in birds: a cost of being cool
Carr, Jennie M.; Lima, Steven L.
2013-01-01
Many birds use regulated drops in night-time body temperature (Tb) to conserve energy critical to winter survival. However, a significant degree of hypothermia may limit a bird's ability to respond to predatory attack. Despite this likely energy–predation trade-off, the behavioural costs of avian hypothermia have yet to be examined. We thus monitored the nocturnal hypothermia of mourning doves (Zenaida macroura) in a laboratory setting in response to food deprivation. Nocturnal flight tests were used to quantify the flight ability of hypothermic doves. Many hypothermic doves (39% of tests) could not fly while carrying a small weight, but could do so after quickly warming up to typical daytime Tb. Doves that were unable to fly during their first test were more hypothermic than those that could fly, with average Tb reductions of 5.3°C and 3.3°C, respectively, but there was no overall indication of a threshold Tb reduction beyond which doves were consistently incapable of flight. These results suggest that energy-saving hypothermia interferes with avian antipredator behaviour via a reduction in flight ability, likely leading to a trade-off between energy-saving hypothermia and the risk of predation. PMID:24107528
Navier-Stokes Analysis of the Flowfield Characteristics of an Ice Contaminated Aircraft Wing
NASA Technical Reports Server (NTRS)
Chung, J.; Choo, Y.; Reehorst, A.; Potapczuk, M.; Slater, J.
1999-01-01
An analytical study was performed as part of the NASA Lewis support of a National Transportation Safety Board (NTSB) aircraft accident investigation. The study was focused on the performance degradation associated with ice contamination on the wing of a commercial turbo-prop-powered aircraft. Based upon the results of an earlier numerical study conducted by the authors, a prominent ridged-ice formation on the subject aircraft wing was selected for detailed flow analysis using 2-dimensional (2-D), as well as, 3-dimensional (3-D) Navier-Stokes computations. This configuration was selected because it caused the largest lift decrease and drag increase among all the ice shapes investigated in the earlier study. A grid sensitivity test was performed to find out the influence of grid spacing on the lift, drag, and associated angle-of-attack for the maximum lift (C(sub lmax)). This study showed that grid resolution is important and a sensitivity analysis is an essential element of the process in order to assure that the final solution is independent of the grid. The 2-D results suggested that a severe stability and control difficulty could have occurred at a slightly higher angle-of-attack (AOA) than the one recorded by the Flight Data Recorder (FDR). This stability and control problem was thought to have resulted from a decreased differential lift on the wings with respect to the normal loading for the configuration. The analysis also indicated that this stability and control problem could have occurred whether or not natural ice shedding took place. Numerical results using an assumed 3-D ice shape showed an increase of the angle at which this phenomena occurred of about 4 degrees. As it occurred with the 2-D case, the trailing edge separation was observed but started only when the AOA was very close to the angle at which the maximum lift occurred.
Protecting the Power Grid From Electromagnetic Pulses
NASA Astrophysics Data System (ADS)
Simpson, Sarah
2004-10-01
A nuclear explosion high in the Earth's atmosphere does no immediate known harm to living things, but the resulting electromagnetic pulse (EMP) from a single detonation could degrade 70 percent or more of the country's electrical service in an instant, warns the Commission to Assess the Threat to the United States from Electromagnetic Pulse Attack, which presented its findings to the U.S. Congress in July.
Agroterrorism: the risks to the United States food supply and national security.
Gill, Kevin M
2015-01-01
Agroterrorism is a collective term that describes an intentional criminal attack against crops or mankind using viral, bacterial, fungal, or insect-borne agents. Agroterrorism also includes attacks against animals using infectious pathogens such as Burkholderia mallei (glanders), Bacillus anthracis (anthrax), viral avian influenza, foot and mouth disease, and several equine encephalitis viruses. Agents that could be used against crops include the causative agents of wheat blast, rice blast, rice brown spot disease, and wheat stem rust. The primary goal of terrorists using agroterrorism is to spread fear and cause massive economic loss. Subsequent goals include causing disease and death to humans and animals. The use of bioterrorism agents is a much more practical approach than using explosives, for example, to achieve those results since many of these biological agents are commonly found naturally in the environment and are difficult to detect with modern technology. The effective use of biological warfare dates back centuries and can still can be employed by terrorist groups, lone wolves, and political and religious groups to cause death and mayhem on a grand scale.
Network Robustness: the whole story
NASA Astrophysics Data System (ADS)
Longjas, A.; Tejedor, A.; Zaliapin, I. V.; Ambroj, S.; Foufoula-Georgiou, E.
2014-12-01
A multitude of actual processes operating on hydrological networks may exhibit binary outcomes such as clean streams in a river network that may become contaminated. These binary outcomes can be modeled by node removal processes (attacks) acting in a network. Network robustness against attacks has been widely studied in fields as diverse as the Internet, power grids and human societies. However, the current definition of robustness is only accounting for the connectivity of the nodes unaffected by the attack. Here, we put forward the idea that the connectivity of the affected nodes can play a crucial role in proper evaluation of the overall network robustness and its future recovery from the attack. Specifically, we propose a dual perspective approach wherein at any instant in the network evolution under attack, two distinct networks are defined: (i) the Active Network (AN) composed of the unaffected nodes and (ii) the Idle Network (IN) composed of the affected nodes. The proposed robustness metric considers both the efficiency of destroying the AN and the efficiency of building-up the IN. This approach is motivated by concrete applied problems, since, for example, if we study the dynamics of contamination in river systems, it is necessary to know both the connectivity of the healthy and contaminated parts of the river to assess its ecological functionality. We show that trade-offs between the efficiency of the Active and Idle network dynamics give rise to surprising crossovers and re-ranking of different attack strategies, pointing to significant implications for decision making.
Fast Fragmentation of Networks Using Module-Based Attacks
Requião da Cunha, Bruno; González-Avella, Juan Carlos; Gonçalves, Sebastián
2015-01-01
In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaking complex networks is attracting much attention from a practical point of view. In this contribution, we present a module-based method to efficiently fragment complex networks. The procedure firstly identifies topological communities through which the network can be represented using a well established heuristic algorithm of community finding. Then only the nodes that participate of inter-community links are removed in descending order of their betweenness centrality. We illustrate the method by applying it to a variety of examples in the social, infrastructure, and biological fields. It is shown that the module-based approach always outperforms targeted attacks to vertices based on node degree or betweenness centrality rankings, with gains in efficiency strongly related to the modularity of the network. Remarkably, in the US power grid case, by deleting 3% of the nodes, the proposed method breaks the original network in fragments which are twenty times smaller in size than the fragments left by betweenness-based attack. PMID:26569610
Numerical Investigations of the Benchmark Supercritical Wing in Transonic Flow
NASA Technical Reports Server (NTRS)
Chwalowski, Pawel; Heeg, Jennifer; Biedron, Robert T.
2017-01-01
This paper builds on the computational aeroelastic results published previously and generated in support of the second Aeroelastic Prediction Workshop for the NASA Benchmark Supercritical Wing (BSCW) configuration. The computational results are obtained using FUN3D, an unstructured grid Reynolds-Averaged Navier-Stokes solver developed at the NASA Langley Research Center. The analysis results show the effects of the temporal and spatial resolution, the coupling scheme between the flow and the structural solvers, and the initial excitation conditions on the numerical flutter onset. Depending on the free stream condition and the angle of attack, the above parameters do affect the flutter onset. Two conditions are analyzed: Mach 0.74 with angle of attack 0 and Mach 0.85 with angle of attack 5. The results are presented in the form of the damping values computed from the wing pitch angle response as a function of the dynamic pressure or in the form of dynamic pressure as a function of the Mach number.
Robust-yet-fragile nature of interdependent networks
NASA Astrophysics Data System (ADS)
Tan, Fei; Xia, Yongxiang; Wei, Zhi
2015-05-01
Interdependent networks have been shown to be extremely vulnerable based on the percolation model. Parshani et al. [Europhys. Lett. 92, 68002 (2010), 10.1209/0295-5075/92/68002] further indicated that the more intersimilar networks are, the more robust they are to random failures. When traffic load is considered, how do the coupling patterns impact cascading failures in interdependent networks? This question has been largely unexplored until now. In this paper, we address this question by investigating the robustness of interdependent Erdös-Rényi random graphs and Barabási-Albert scale-free networks under either random failures or intentional attacks. It is found that interdependent Erdös-Rényi random graphs are robust yet fragile under either random failures or intentional attacks. Interdependent Barabási-Albert scale-free networks, however, are only robust yet fragile under random failures but fragile under intentional attacks. We further analyze the interdependent communication network and power grid and achieve similar results. These results advance our understanding of how interdependency shapes network robustness.
Tejedor, Alejandro; Longjas, Anthony; Zaliapin, Ilya; Ambroj, Samuel; Foufoula-Georgiou, Efi
2017-08-17
Network robustness against attacks has been widely studied in fields as diverse as the Internet, power grids and human societies. But current definition of robustness is only accounting for half of the story: the connectivity of the nodes unaffected by the attack. Here we propose a new framework to assess network robustness, wherein the connectivity of the affected nodes is also taken into consideration, acknowledging that it plays a crucial role in properly evaluating the overall network robustness in terms of its future recovery from the attack. Specifically, we propose a dual perspective approach wherein at any instant in the network evolution under attack, two distinct networks are defined: (i) the Active Network (AN) composed of the unaffected nodes and (ii) the Idle Network (IN) composed of the affected nodes. The proposed robustness metric considers both the efficiency of destroying the AN and that of building-up the IN. We show, via analysis of well-known prototype networks and real world data, that trade-offs between the efficiency of Active and Idle Network dynamics give rise to surprising robustness crossovers and re-rankings, which can have significant implications for decision making.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.
mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants frameworkmore » is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.« less
NASA Astrophysics Data System (ADS)
Bittman, Shabtai; Jones, Keith; Vingarzan, Roxanne; Hunt, Derek E.; Sheppard, Steve C.; Tait, John; So, Rita; Zhao, Johanna
2015-07-01
Weekly inventories for emissions of agricultural ammonia were calculated for 139 4 × 4 km grid cells over 52 weeks in the intensely farmed Lower Fraser Valley, BC. The grid cells were located both inside and outside an area that had been depopulated of poultry due to an outbreak of Avian Influenza prior to the start of the study. During the study period, ambient ammonia concentrations were measured hourly at two locations outside the cull area and one location inside the cull area. Large emission differences between grid cells and differences in temporal variation between cells were related to farming practices and meteorological factors such as temperature and rainfall. Weekly average ambient concentrations at the three sampling locations were significantly correlated with estimates of weekly emissions for many of the grid cells in the study area. Inside the cull area, ambient concentrations during the cull (week 1) were 37% of the concentrations after the cull (week 52), while outside the cull there was almost no difference between week 1 and week 52, suggesting that in normal (non-cull) conditions, about 60% of the ambient ammonia was due to poultry farms. Estimated emissions in weeks 1 and 52 for grid cells affected by the cull indicated that over 90% of the emissions came from poultry. The discrepancy in difference between week 1 and 52 for emissions and ambient concentrations could be due to atmospheric factors like transport, atmospheric reactions, dispersion or deposition; to errors in the inventory including farming data, emission factors; and omission of some non-poultry emission sources. Overall the study supports the ammonia emission inventory estimates. Detailed emission data helps in modeling ammonia in the atmosphere and is useful for developing abatement policy.
Li, Yuancheng; Jing, Sitong
2018-01-01
Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can’t satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy. PMID:29485990
A framework for analyzing the impact of data integrity/quality on electricity market operations
NASA Astrophysics Data System (ADS)
Choi, Dae Hyun
This dissertation examines the impact of data integrity/quality in the supervisory control and data acquisition (SCADA) system on real-time locational marginal price (LMP) in electricity market operations. Measurement noise and/or manipulated sensor errors in a SCADA system may mislead system operators about real-time conditions in a power system, which, in turn, may impact the price signals in real-time power markets. This dissertation serves as a first attempt to analytically investigate the impact of bad/malicious data on electric power market operations. In future power system operations, which will probably involve many more sensors, the impact of sensor data integrity/quality on grid operations will become increasingly important. The first part of this dissertation studies from a market participant's perspective a new class of malicious data attacks on state estimation, which subsequently influences the result of the newly emerging look-ahead dispatch models in the real-time power market. In comparison with prior work of cyber-attack on static dispatch where no inter-temporal ramping constraint is considered, we propose a novel attack strategy, named ramp-induced data (RID) attack, with which the attacker can manipulate the limits of ramp constraints of generators in look-ahead dispatch. It is demonstrated that the proposed attack can lead to financial profits via malicious capacity withholding of selected generators, while being undetected by the existing bad data detection algorithm embedded in today's state estimation software. In the second part, we investigate from a system operator's perspective the sensitivity of locational marginal price (LMP) with respect to data corruption-induced state estimation error in real-time power market. Two data corruption scenarios are considered, in which corrupted continuous data (e.g., the power injection/flow and voltage magnitude) falsify power flow estimate whereas corrupted discrete data (e.g., the on/off status of a circuit breaker) do network topology estimate, thus leading to the distortion of LMP. We present an analytical framework to quantify real-time LMP sensitivity subject to continuous and discrete data corruption via state estimation. The proposed framework offers system operators an analytical tool to identify economically sensitive buses and transmission lines to data corruption as well as find sensors that impact LMP changes significantly. This dissertation serves as a first step towards rigorous understanding of the fundamental coupling among cyber, physical and economical layers of operations in future smart grid.
Garment Selection for Cleanrooms and Controlled Environments for Spacecraft
1991-04-01
visually undetectable, making it diffi- cult for a worker to select a treated garment. The optimal solution has been to weave a grid of synthetic coated ...make the base fabric static-dis- sipative must be selected carefully. Nylon- coated conductive yarns are readily subject to acid attack, while...Cations (+ ) which must be eliminated from garments include sodium, potassium, lithi- um, aluminum, boron , and arsenic. The standard mtwhod for
2001-03-01
natural resources and physical labor were broad meas urements of the wealth of a business , a corporation , or a state.18 With the globalization of ...5 Global Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 6 Components of Information Superiority...point where the source of attacks can be verified. 6 Notes 1. John D. Jones and Marc F. Griesbach, eds., Just War Theory in the Nuclear Age (Lanham
What Was Learned in Predicting Slender Airframe Aerodynamics with the F-16XL Aircraft
NASA Technical Reports Server (NTRS)
Rizzi, Arthur; Luckring, James M.
2016-01-01
The second Cranked-Arrow Wing Aerodynamics Project, International, coordinated project has been underway to improve high-fidelity computational-fluid-dynamics predictions of slender airframe aerodynamics. The work is focused on two flow conditions and leverages a unique flight data set obtained with the F-16XL aircraft for comparison and validation. These conditions, a low-speed high-angle-of-attack case and a transonic low-angle-of-attack case, were selected from a prior prediction campaign wherein the computational fluid dynamics failed to provide acceptable results. In revisiting these two cases, approaches for improved results include better, denser grids using more grid adaptation to local flow features as well as unsteady higher-fidelity physical modeling like hybrid Reynolds-averaged Navier-Stokes/unsteady Reynolds-averaged Navier-Stokes/large-eddy simulation methods. The work embodies predictions from multiple numerical formulations that are contributed from multiple organizations where some authors investigate other possible factors that could explain the discrepancies in agreement (e.g., effects due to deflected control surfaces during the flight tests as well as static aeroelastic deflection of the outer wing). This paper presents the synthesis of all the results and findings and draws some conclusions that lead to an improved understanding of the underlying flow physics, finally making the connections between the physics and aircraft features.
Navier-Stokes Simulation of UH-60A Rotor/Wake Interaction Using Adaptive Mesh Refinement
NASA Technical Reports Server (NTRS)
Chaderjian, Neal M.
2017-01-01
High-resolution simulations of rotor/vortex-wake interaction for a UH60-A rotor under BVI and dynamic stallconditions were carried out with the OVERFLOW Navier-Stokes code.a. The normal force and pitching moment variation with azimuth angle were in good overall agreementwith flight-test data, similar to other CFD results reported in the literature.b. The wake-grid resolution did not have a significant effect on the rotor-blade airloads. This surprisingresult indicates that a wake grid spacing of (Delta)S=10% ctip is sufficient for engineering airloads predictionfor hover and forward flight. This assumes high-resolution body grids, high-order spatial accuracy, anda hybrid RANS/DDES turbulence model.c. Three-dimensional dynamic stall was found to occur due the presence of blade-tip vortices passing overa rotor blade on the retreating side. This changed the local airfoil angle of attack, causing stall, unlikethe 2D perspective of pure pitch oscillation of the local airfoil section.
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-01-01
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-12-03
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODE plus . It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODE plus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.
Hildenbrandt, Hanno
2018-01-01
The peregrine falcon Falco peregrinus is renowned for attacking its prey from high altitude in a fast controlled dive called a stoop. Many other raptors employ a similar mode of attack, but the functional benefits of stooping remain obscure. Here we investigate whether, when, and why stooping promotes catch success, using a three-dimensional, agent-based modeling approach to simulate attacks of falcons on aerial prey. We simulate avian flapping and gliding flight using an analytical quasi-steady model of the aerodynamic forces and moments, parametrized by empirical measurements of flight morphology. The model-birds’ flight control inputs are commanded by their guidance system, comprising a phenomenological model of its vision, guidance, and control. To intercept its prey, model-falcons use the same guidance law as missiles (pure proportional navigation); this assumption is corroborated by empirical data on peregrine falcons hunting lures. We parametrically vary the falcon’s starting position relative to its prey, together with the feedback gain of its guidance loop, under differing assumptions regarding its errors and delay in vision and control, and for three different patterns of prey motion. We find that, when the prey maneuvers erratically, high-altitude stoops increase catch success compared to low-altitude attacks, but only if the falcon’s guidance law is appropriately tuned, and only given a high degree of precision in vision and control. Remarkably, the optimal tuning of the guidance law in our simulations coincides closely with what has been observed empirically in peregrines. High-altitude stoops are shown to be beneficial because their high airspeed enables production of higher aerodynamic forces for maneuvering, and facilitates higher roll agility as the wings are tucked, each of which is essential to catching maneuvering prey at realistic response delays. PMID:29649207
Diversity of terrestrial avifauna in response to distance from the shoreline of the Salton Sea
Mendelsohn, M.B.; Boarman, W.I.; Fisher, R.N.; Hathaway, S.A.
2007-01-01
Large aquatic bodies influence surrounding terrestrial ecosystems by providing water and nutrients. In arid landscapes, the increased primary productivity that results may greatly enhance vertebrate biodiversity. The Salton Sea, a large saline lake in the Colorado Desert of southern California, provides nutrients in the form of hundreds of thousands of dead fish carcasses, brine flies, and chemical compounds through windborne salt sea spray. We performed point counts for landbirds and shorebirds monthly or every other month between March 2001 and February 2002 across a sampling grid of 35 points along the west edge of Salton Sea. We found that avian diversity (numbers of species and numbers per species) was dependent on proximity to the Sea. Diversity was at a maximum nearest the shore, and was significantly lower away from the Sea's edge, at all surveyed distances up to 1 km from the shore. Cover by the dominant shrubs on the study site also corresponded to proximity to the water's edge. Whereas one may hypothesize that the avian diversity patterns are caused by these differences in vegetation structure, our data did not support this. Future studies should further investigate this potential correlation between vegetation and bird patterns. Until more is understood about the relationship between elevated avian diversity and the physical environment of the land-shore interface, our results suggest that the Sea's surface be stabilized near its present level. Future management schemes at the Salton Sea that include reductions of water sources should be carefully analyzed, so as to not jeopardize the terrestrial avifauna at this unique ecosystem. ?? 2006 Elsevier Ltd. All rights reserved.
NASA Technical Reports Server (NTRS)
Ghaffari, Farhad
1999-01-01
Unstructured grid Euler computations, performed at supersonic cruise speed, are presented for a High Speed Civil Transport (HSCT) configuration, designated as the Technology Concept Airplane (TCA) within the High Speed Research (HSR) Program. The numerical results are obtained for the complete TCA cruise configuration which includes the wing, fuselage, empennage, diverters, and flow through nacelles at M (sub infinity) = 2.4 for a range of angles-of-attack and sideslip. Although all the present computations are performed for the complete TCA configuration, appropriate assumptions derived from the fundamental supersonic aerodynamic principles have been made to extract aerodynamic predictions to complement the experimental data obtained from a 1.675%-scaled truncated (aft fuselage/empennage components removed) TCA model. The validity of the computational results, derived from the latter assumptions, are thoroughly addressed and discussed in detail. The computed surface and off-surface flow characteristics are analyzed and the pressure coefficient contours on the wing lower surface are shown to correlate reasonably well with the available pressure sensitive paint results, particularly, for the complex flow structures around the nacelles. The predicted longitudinal and lateral/directional performance characteristics for the truncated TCA configuration are shown to correlate very well with the corresponding wind-tunnel data across the examined range of angles-of-attack and sideslip. The complementary computational results for the longitudinal and lateral/directional performance characteristics for the complete TCA configuration are also presented along with the aerodynamic effects due to empennage components. Results are also presented to assess the computational method performance, solution sensitivity to grid refinement, and solution convergence characteristics.
ICS logging solution for network-based attacks using Gumistix technology
NASA Astrophysics Data System (ADS)
Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan
2013-05-01
Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.
Braukmann, Maria; Methner, Ulrich; Berndt, Angela
2015-01-01
Salmonella serovars are differentially able to infect chickens. The underlying causes are not yet fully understood. Aim of the present study was to elucidate the importance of Salmonella Pathogenicity Island 1 and 2 (SPI-1 and -2) for the virulence of two non-host-specific, but in-vivo differently invasive, Salmonella serovars in conjunction with the immune reaction of the host. Primary avian splenic macrophages were inoculated with Salmonella enterica sub-species enterica serovar (S.) Typhimurium and S. Infantis. The number and viability of intracellular bacteria and transcription of SPI-1 and -2 genes by the pathogens, as well as transcription of immune-related proteins, surface antigen expression and nitric oxide production by the macrophages, were compared at different times post inoculation. After infection, both of the Salmonella serovars were found inside the primary macrophages. Invasion-associated SPI-1 genes were significantly higher transcribed in S. Infantis- than S. Typhimurium-infected macrophages. The macrophages counteracted the S. Infantis and S. Typhimurium infection with elevated mRNA expression of inducible nitric oxide synthase (iNOS), interleukin (IL)-12, IL-18 and lipopolysaccharide-induced tumor necrosis factor alpha factor (LITAF) as well as with an increased synthesis of nitric oxide. Despite these host cell attacks, S. Typhimurium was better able than S. Infantis to survive within the macrophages and transcribed higher rates of the SPI-2 genes spiC, ssaV, sifA, and sseA. The results showed similar immune reactions of primary macrophages after infection with both of the Salmonella strains. The more rapid and stronger transcription of SPI-2-related genes by intracellular S. Typhimurium compared to S. Infantis might be responsible for its better survival in avian primary macrophages. PMID:25811871
Federated Access to Cyber Observables for Detection of Targeted Attacks
2014-10-01
each manages. The DQNs also utilize an intelligent information ex- traction capability for automatically suggesting mappings from text found in audit ...Harmelen, and others, “OWL web ontology language overview,” W3C Recomm., vol. 10, no. 2004–03, p. 10, 2004. [4] D. Miller and B. Pearson , Security...Online]. Available: http://www.disa.mil/Services/Information- Assurance /HBS/HBSS. [21] S. Zanikolas and R. Sakellariou, “A taxonomy of grid
Mitigating the Insider Threat with High-Dimensional Anomaly Detection
2004-12-01
a more serious attack. Various systems such as NSM [56], GrIDS [57], snort [58], Emerald [59], and Spice [60] generate alerts for portscan...reboot etc. The user measurements include the user profiles such as time of login , duration of user session, cumulative CPU time, names of files...already been implemented in a real-time system for information retrieval [3]. A technique developed at SRI in the Emerald system [22] uses historical
Grid Fin Stabilization of the Orion Launch Abort Vehicle
NASA Technical Reports Server (NTRS)
Pruzan, Daniel A.; Mendenhall, Michael R.; Rose, William C.; Schuster, David M.
2011-01-01
Wind tunnel tests were conducted by Nielsen Engineering & Research (NEAR) and Rose Engineering & Research (REAR) in conjunction with the NASA Engineering & Safety Center (NESC) on a 6%-scale model of the Orion launch abort vehicle (LAV) configured with four grid fins mounted near the base of the vehicle. The objectives of these tests were to 1) quantify LAV stability augmentation provided by the grid fins from subsonic through supersonic Mach numbers, 2) assess the benefits of swept grid fins versus unswept grid fins on the LAV, 3) determine the effects of the LAV abort motors on grid fin aerodynamics, and 4) generate an aerodynamic database for use in the future application of grid fins to small length-to-diameter ratio vehicles similar to the LAV. The tests were conducted in NASA Ames Research Center's 11x11-foot transonic wind tunnel from Mach 0.5 through Mach 1.3 and in their 9x7-foot supersonic wind tunnel from Mach 1.6 through Mach 2.5. Force- and moment-coefficient data were collected for the complete vehicle and for each individual grid fin as a function of angle of attack and sideslip angle. Tests were conducted with both swept and unswept grid fins with the simulated abort motors (cold jets) off and on. The swept grid fins were designed with a 22.5deg aft sweep angle for both the frame and the internal lattice so that the frontal projection of the swept fins was the same as for the unswept fins. Data from these tests indicate that both unswept and swept grid fins provide significant improvements in pitch stability as compared to the baseline vehicle over the Mach number range investigated. The swept fins typically provide improved stability as compared to the unswept fins, but the performance gap diminished as Mach number was increased. The aerodynamic performance of the fins was not observed to degrade when the abort motors were turned on. Results from these tests indicate that grid fins can be a robust solution for stabilizing the Orion LAV over a wide range of operating conditions.
Navigating the storm: report and recommendations from the Atlantic Storm exercise.
Smith, Bradley T; Inglesby, Thomas V; Brimmer, Esther; Borio, Luciana; Franco, Crystal; Gronvall, Gigi Kwik; Kramer, Bradley; Maldin, Beth; Nuzzo, Jennifer B; Schuler, Ari; Stern, Scott; Henderson, Donald A; Larsen, Randall J; Hamilton, Daniel S; O'Toole, Tara
2005-01-01
Atlantic Storm was a tabletop exercise simulating a series of bioterrorism attacks on the transatlantic community. The exercise occurred on January 14, 2005, in Washington, DC, and was organized and convened by the Center for Biosecurity of UPMC, the Center for Transatlantic Relations of Johns Hopkins University, and the Transatlantic Biosecurity Network. Atlantic Storm portrayed a summit meeting of presidents, prime ministers, and other international leaders from both sides of the Atlantic Ocean in which they responded to a campaign of bioterrorist attacks in several countries. The summit principals, who were all current or former senior government leaders, were challenged to address issues such as attaining situational awareness in the wake of a bioattack, coping with scarcity of critical medical resources such as vaccine, deciding how to manage the movement of people across borders, and communicating with their publics. Atlantic Storm illustrated that much might be done in advance to minimize the illness and death, as well as the social, economic, and political disruption, that could be caused by an international epidemic, be it natural or the result of a bioterrorist attack. These lessons are especially timely given the growing concerns over the possibility of an avian influenza pandemic that would require an international response. However, international leaders cannot create the necessary response systems in the midst of a crisis. Medical, public health, and diplomatic response systems and critical medical resources (e.g., medicines and vaccines) must be in place before a bioattack occurs or a pandemic emerges.
NASA Technical Reports Server (NTRS)
Prabhu, Ramadas K.; Sutton, Kenneth (Technical Monitor)
2001-01-01
This report documents the results of a computational study done to compute the inviscid longitudinal aerodynamic characteristics of the Space Shuttle Orbiter for Mach numbers 10 and 15 at angles of attack of 40, 50, 55, and 60 degrees. These computations were done to provide limited aerodynamic data in support of the Orbiter contingency abort task. The Orbiter had all the control surfaces in the undeflected position. The unstructured grid software FELISA was used for these computations with the equilibrium air option. Normal and axial force coefficients and pitching moment coefficients were computed. The hinge moment coefficients of the body flap and the inboard and outboard elevons were also computed. These results were compared with Orbiter Air Data Book (OADB) data and those computed using GASP. The comparison with the GASP results showed very good agreement in Cm and Ca at all the points. The computed axial force coefficients were smaller than those computed by GASP. There were noticeable differences between the present results and those in the OADB at angles of attack greater than 50 degrees.
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks
NASA Astrophysics Data System (ADS)
Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.
Space shuttle (ATP configuration) abort staging investigation
NASA Technical Reports Server (NTRS)
Rampy, J. M.; Blackwell, K. L.; Allen, E. C., Jr.; Fossler, I.
1973-01-01
A wind tunnel test conducted in a 14-inch trisonic wind tunnel to determine the force and moment characteristics of the ATP Orbiter and modified ATP External Tank/SRB combination during abort staging conditions is discussed. Six component aerodynamic force and moment data were recorded for the orbiter and ET/SRB combination. Pitch polars were obtained for an angle of attack range from minus 10 to plus 10 degrees and orbiter incidence angles (orbiter relative to the ET/SRB combination) of 0 and 2 degrees. A limited amount of yaw data were obtained at 0 degree angle of attack and beta range from minus 10 to plus 10 degrees. In addition, orbiter pitch control effectiveness was determined at several grid points. These force and moment data were obtained for Mach numbers of 0.9, 1.2 and 2.0.
Effectiveness of Flow Control for Alleviation of Twin-Tail Buffet
NASA Technical Reports Server (NTRS)
Sheta, Essam F.; Kandil, Osama A.; Yang, Zhi
1998-01-01
Effectiveness of active flow control for twin- tail buffet alleviation is investigated. Tangen- tial leading-edge blowing (TLEB) and flow suction along the vortex cores (FSVC) of the lead- ing edges of the delta wing are used to delay the vortex breakdown flow upstream of the twin tail. The combined effect of the TLEB and FSVC is also investigated. A parametric study of the effects of the spanwise position of the suction tubes and volumetric suction flow rate on the twin-tail buffet response are also investigated. The TLEB moves the path of leading-edge vortices laterally towards the twin tail, which increases the aero- dynamic damping on the tails. The FSVC effectively delays the breakdown location at high angles of attack. The computational model consists of a sharp-edged delta wing of aspect ratio one and swept-back flexible twin tail with taper ratio of 0.23. This complex multidisciplinary problem is solved sequentially using three sets of equations for the fluid flow, aeroelastic response and grid deformation, on a dynamic multi-block grid structure. The computational model is pitched at 30 deg. angle of attack. The freestream Mach number and Reynolds number are 0.3 and 1.25 million, respectively. The model is investigated for the inboard position of the twin tails, which corresponds to a separation distance between the twin tails of 33% of the wing span.
NASA Technical Reports Server (NTRS)
Hall, Edward J.; Delaney, Robert A.; Bettner, James L.
1991-01-01
The primary objective of this study was the development of a time-dependent three-dimensional Euler/Navier-Stokes aerodynamic analysis to predict unsteady compressible transonic flows about ducted and unducted propfan propulsion systems at angle of attack. The computer codes resulting from this study are referred to as Advanced Ducted Propfan Analysis Codes (ADPAC). This report is intended to serve as a computer program user's manual for the ADPAC developed under Task 2 of NASA Contract NAS3-25270, Unsteady Ducted Propfan Analysis. Aerodynamic calculations were based on a four-stage Runge-Kutta time-marching finite volume solution technique with added numerical dissipation. A time-accurate implicit residual smoothing operator was utilized for unsteady flow predictions. For unducted propfans, a single H-type grid was used to discretize each blade passage of the complete propeller. For ducted propfans, a coupled system of five grid blocks utilizing an embedded C-grid about the cowl leading edge was used to discretize each blade passage. Grid systems were generated by a combined algebraic/elliptic algorithm developed specifically for ducted propfans. Numerical calculations were compared with experimental data for both ducted and unducted propfan flows. The solution scheme demonstrated efficiency and accuracy comparable with other schemes of this class.
USM3D Simulations for Second Sonic Boom Workshop
NASA Technical Reports Server (NTRS)
Elmiligui, Alaa; Carter, Melissa B.; Nayani, Sudheer N.; Cliff, Susan; Pearl, Jason M.
2017-01-01
The NASA Tetrahedral Unstructured Software System with the USM3D flow solver was used to compute test cases for the Second AIAA Sonic Boom Prediction Workshop. The intent of this report is to document the USM3D results for SBPW2 test cases. The test cases included an axisymmetric equivalent area body, a JAXA wing body, a NASA low boom supersonic configuration modeled with flow through nacelles and engine boundary conditions. All simulations were conducted for a free stream Mach number of 1.6, zero degrees angle of attack, and a Reynolds number of 5.7 million per meter. Simulations were conducted on tetrahedral grids provided by the workshop committee, as well as a family of grids generated by an in-house approach for sonic boom analyses known as BoomGrid using current best practices. The near-field pressure signatures were extracted and propagated to the ground with the atmospheric propagation code, sBOOM. The USM3D near-field pressure signatures, corresponding sBOOM ground signatures, and loudness levels on the ground are compared with mean values from other workshop participants.
A comparison of turbulence models in computing multi-element airfoil flows
NASA Technical Reports Server (NTRS)
Rogers, Stuart E.; Menter, Florian; Durbin, Paul A.; Mansour, Nagi N.
1994-01-01
Four different turbulence models are used to compute the flow over a three-element airfoil configuration. These models are the one-equation Baldwin-Barth model, the one-equation Spalart-Allmaras model, a two-equation k-omega model, and a new one-equation Durbin-Mansour model. The flow is computed using the INS2D two-dimensional incompressible Navier-Stokes solver. An overset Chimera grid approach is utilized. Grid resolution tests are presented, and manual solution-adaptation of the grid was performed. The performance of each of the models is evaluated for test cases involving different angles-of-attack, Reynolds numbers, and flap riggings. The resulting surface pressure coefficients, skin friction, velocity profiles, and lift, drag, and moment coefficients are compared with experimental data. The models produce very similar results in most cases. Excellent agreement between computational and experimental surface pressures was observed, but only moderately good agreement was seen in the velocity profile data. In general, the difference between the predictions of the different models was less than the difference between the computational and experimental data.
Optimal Resource Allocation in Electrical Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yao, Y; Edmunds, T; Papageorgiou, D
2004-01-15
Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasuresmore » when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or links to minimize the loss. The loss can be measured in costs, including the costs of using more expensive generators and the economic losses that can be attributed to loss of load. The defender's goal is to minimize the loss while the attacker wants to maximize it. Assuming some level of budget constraint, each side can only defend or attack a limited number of network elements. When an element is attacked, it is assumed that it will be totally disabled. It is assumed that when an element is defended it cannot be disabled, which may mean that it will be restored in a very short time after being attacked. The rest of the paper is organized as follows. Section 2 will briefly review literature related to multilevel programming and network defense. Section 3 presents a mathematical formulation of the electrical network defense problem. Section 4 describes the solution algorithms. Section 5 discusses computational results. Finally, Sec. 6 explores future research directions.« less
Numerical simulation of rough-surface aerodynamics
NASA Astrophysics Data System (ADS)
Chi, Xingkai
Computational fluid dynamics (CFD) simulations of flow over surfaces with roughness in which the details of the surface geometry must be resolved pose major challenges. The objective of this study is to address these challenges through two important engineering problems, where roughness play a critical role---flow over airfoils with accrued ice and flow and heat transfer over turbine blade surfaces roughened by erosion and/or deposition. CFD simulations of iced airfoils face two major challenges. The first is how to generate high-quality single- and multi-block structured grids for highly convoluted convex and concave surface geometries with multiple scales. In this study, two methods were developed for the generation of high-quality grids for such geometries. The method developed for single-block grids involves generating a grid about the clean airfoil, carving out a portion of that grid about the airfoil, replacing that portion with a grid that accounts for the accrued ice geometry, and performing elliptic smoothing. The method developed for multi-block grids involves a transition-layer grid to ensure jaggedness in the ice geometry does not propagate into the domain. It also involves a "thick" wrap-around grid about the ice to ensure grid lines clustered next to solid surfaces do not propagate as streaks of tightly packed grid lines into the domain along block boundaries. For multi-block grids, this study also developed blocking topologies that ensure solutions to multi-block grids converge to steady state as quickly as single-block grids. The second major challenge in CFD simulations of iced airfoils is not knowing when it will predict reliably because of uncertainties in the turbulence modeling. In this study, the effects of turbulence models in predicting lift, drag, and moment coefficients were examined for airfoils with rime ice (i.e., ice with jaggedness only) and with glaze ice (i.e., ice with multiple protruding horns and surface jaggedness) as a function of angle of attack. In this examination, three different CFD codes---WIND, FLUENT, and PowerFLOW were used to examine a variety of turbulence models, including Spalart-Allmaras, RNG k-epsilon, shear-stress transport, v2-f, and differential Reynolds stress with and without non-equilibrium wall functions. The accuracy of the CFD predictions was evaluated by comparing grid-independent solutions with measured experimental data. Results obtained show CFD with WIND and FLUENT to predict the aerodynamics of airfoils with rime ice reliably up to near stall for all turbulence models investigated. (Abstract shortened by UMI.)
An Inviscid Computational Study of an X-33 Configuration at Hypersonic Speeds
NASA Technical Reports Server (NTRS)
Prabhu, Ramadas K.
1999-01-01
This report documents the results of a study conducted to compute the inviscid longitudinal aerodynamic characteristics of a simplified X-33 configuration. The major components of the X-33 vehicle, namely the body, the canted fin, the vertical fin, and the body-flap, were simulated in the CFD (Computational Fluid Dynamic) model. The rear-ward facing surfaces at the base including the aerospike engine surfaces were not simulated. The FELISA software package consisting of an unstructured surface and volume grid generator and two inviscid flow solvers was used for this study. Computations were made for Mach 4.96, 6.0, and 10.0 with perfect gas air option, and for Mach 10 with equilibrium air option with flow condition of a typical point on the X-33 flight trajectory. Computations were also made with CF4 gas option at Mach 6.0 to simulate the CF4 tunnel flow condition. An angle of attack range of 12 to 48 deg was covered. The CFD results were compared with available wind tunnel data. Comparison was good at low angles of attack; at higher angles of attack (beyond 25 deg) some differences were found in the pitching moment. These differences progressively increased with increase in angle of attack, and are attributed to the viscous effects. However, the computed results showed the trends exhibited by the wind tunnel data.
Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.
Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262
Prediction of Aerodynamic Characteristics of Fighter Wings at High Angles of Attack.
1984-03-01
potential distribution throughout the network of four points on a body surface great- ly facilitates the flow analysis procedure. Tangential velocity...expensive of computer time. For example, as quoted by McLean, using this coarsest grid network , each 0 surface of the 727-200 wing required 10 minutes of...1980. 19. Le Balleur, J.C. and Neron , M., "Calcul D’Ecoulements3 Visqueux Decolles sur Profils D’Ailes par une Approche de Couplage", AGARn CP-291
Effects-Based Operations: Air Power as the Sole Military Instrument of Power, Has it Matured Enough?
2006-04-01
use the current term, but they all tend to favor control of the enemy through EBO rather than physical destruction for its own sake. Operation Allied...would not approve of any attacks against Belgrade’s electrical power grid that would physically destroy it.56 By focusing on the desired effect, US...perspectives on how to orchestrate the air campaign in OEF. CENTCOM had an attrition-based approach and wanted air power to physically destroy all
Description of a landing site indicator (LASI) for light aircraft operation
NASA Technical Reports Server (NTRS)
Fuller, H. V.; Outlaw, B. K. E.
1976-01-01
An experimental cockpit mounted head-up type display system was developed and evaluated by LaRC pilots during the landing phase of light aircraft operations. The Landing Site Indicator (LASI) system display consists of angle of attack, angle of sideslip, and indicated airspeed images superimposed on the pilot's view through the windshield. The information is made visible to the pilot by means of a partially reflective viewing screen which is suspended directly in frot of the pilot's eyes. Synchro transmitters are operated by vanes, located at the left wing tip, which sense angle of attack and sideslip angle. Information is presented near the center of the display in the form of a moving index on a fixed grid. The airspeed is sensed by a pitot-static pressure transducer and is presented in numerical form at the top center of the display.
Synchrophasor Data Correction under GPS Spoofing Attack: A State Estimation Based Approach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fan, Xiaoyuan; Du, Liang; Duan, Dongliang
GPS spoofing attack (GSA) has been shown to be one of the most imminent threats to almost all cyber-physical systems incorporated with the civilian GPS signal. Specifically, for our current agenda of the modernization of the power grid, this may greatly jeopardize the benefits provided by the pervasively installed phasor measurement units (PMU). In this study, we consider the case where synchrophasor data from PMUs are compromised due to the presence of a single GSA, and show that it can be corrected by signal processing techniques. In particular, we introduce a statistical model for synchrophasorbased power system state estimation (SE),more » and then derive the spoofing-matched algorithms for synchrophasor data correction against GPS spoofing attack. Different testing scenarios in IEEE 14-, 30-, 57-, 118-bus systems are simulated to show the proposed algorithms’ performance on GSA detection and state estimation. Numerical results demonstrate that our proposed algorithms can consistently locate and correct the spoofed synchrophasor data with good accuracy as long as the system observability is satisfied. Finally, the accuracy of state estimation is significantly improved compared with the traditional weighted least square method and approaches the performance under the Genie-aided method.« less
Hi-alpha forebody design. Part 2: Determination of body shapes for positive directional stability
NASA Technical Reports Server (NTRS)
Ravi, R.; Mason, William H.
1991-01-01
Computational Fluid Dynamics (CFD) has been used to study aircraft forebody flowfields at low speed high angle-of-attack conditions with sideslip. The purpose is to define forebody geometries which provide good directional stability characteristics under these conditions. The flows of the F-5A forebody and Erickson forebody were recomputed with better and refined grids. The results were obtained using a modified version of cfl3d to solve either the Euler equations or the Reynolds equations employing a form of the Baldwin-Lomax turbulence model. Based on those results, we conclude that current CFD methods can be used to investigate the aerodynamic characteristics of forebodies to achieve desirable high angle-of-attack characteristics. An analytically defined generic forebody model is described, and a systematic study of forebody shapes was then conducted to determine which shapes promote a positive contribution to directional stability at high angle-of-attack. A novel way of presenting the results is used to illustrate how the positive contribution arises. Based on the results of this initial parametric study, some guidelines for aerodynamic design to promote positive directional stability are presented.
Inviscid Flow Computations of the Orbital Sciences X-34 Over a Mach Number Range of 1.25 to 6.0
NASA Technical Reports Server (NTRS)
Prabhu, Ramadas K.
2001-01-01
This report documents the results of an inviscid computational study conducted on the Orbital Sciences X-34 vehicle to compute its inviscid longitudinal aerodynamic characteristics over a Mach number range of 1.25 to 6.0. The unstructured grid software FELISA was used and th e aerodynamic characteristics were computed at Mach numbers 1.25, 1.6, 2.5, 4.0, 4.63, and 6.0, and an angle of attack range of -4 to 32 degrees. These results were compared with available aerodynamic data from wind tunnel test on X-34 models. The comparison showed excellent agreement in C(sub N). The computed pitching moment compared well at Mach numbers 2.5 and higher, and at angles of attack of up to 12 deg. The agreement was not good at higher angles of attack possibly due to viscous effects. At lower Mach numbers there were significant differences between computed and measured C(sub m) values. This could not be explained. Since the present computations are inviscid, the computed C(sub A) was consistently lower than the measured values as expected.
Cyber-Physical Correlations for Infrastructure Resilience: A Game-Theoretic Approach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S; He, Fei; Ma, Chris Y. T.
In several critical infrastructures, the cyber and physical parts are correlated so that disruptions to one affect the other and hence the whole system. These correlations may be exploited to strategically launch components attacks, and hence must be accounted for ensuring the infrastructure resilience, specified by its survival probability. We characterize the cyber-physical interactions at two levels: (i) the failure correlation function specifies the conditional survival probability of cyber sub-infrastructure given the physical sub-infrastructure as a function of their marginal probabilities, and (ii) the individual survival probabilities of both sub-infrastructures are characterized by first-order differential conditions. We formulate a resiliencemore » problem for infrastructures composed of discrete components as a game between the provider and attacker, wherein their utility functions consist of an infrastructure survival probability term and a cost term expressed in terms of the number of components attacked and reinforced. We derive Nash Equilibrium conditions and sensitivity functions that highlight the dependence of infrastructure resilience on the cost term, correlation function and sub-infrastructure survival probabilities. These results generalize earlier ones based on linear failure correlation functions and independent component failures. We apply the results to models of cloud computing infrastructures and energy grids.« less
Synchrophasor Data Correction under GPS Spoofing Attack: A State Estimation Based Approach
Fan, Xiaoyuan; Du, Liang; Duan, Dongliang
2017-02-01
GPS spoofing attack (GSA) has been shown to be one of the most imminent threats to almost all cyber-physical systems incorporated with the civilian GPS signal. Specifically, for our current agenda of the modernization of the power grid, this may greatly jeopardize the benefits provided by the pervasively installed phasor measurement units (PMU). In this study, we consider the case where synchrophasor data from PMUs are compromised due to the presence of a single GSA, and show that it can be corrected by signal processing techniques. In particular, we introduce a statistical model for synchrophasorbased power system state estimation (SE),more » and then derive the spoofing-matched algorithms for synchrophasor data correction against GPS spoofing attack. Different testing scenarios in IEEE 14-, 30-, 57-, 118-bus systems are simulated to show the proposed algorithms’ performance on GSA detection and state estimation. Numerical results demonstrate that our proposed algorithms can consistently locate and correct the spoofed synchrophasor data with good accuracy as long as the system observability is satisfied. Finally, the accuracy of state estimation is significantly improved compared with the traditional weighted least square method and approaches the performance under the Genie-aided method.« less
Aerodynamic performance of a small vertical axis wind turbine using an overset grid method
NASA Astrophysics Data System (ADS)
Bangga, Galih; Solichin, Mochammad; Daman, Aida; Sa'adiyah, Devy; Dessoky, Amgad; Lutz, Thorsten
2017-08-01
The present paper aims to asses the aerodynamic performance of a small vertical axis wind turbine operating at a small wind speed of 5 m/s for 6 different tip speed ratios (λ=2-7). The turbine consists of two blades constructed using the NACA 0015 airfoil. The study is carried out using computational fluid dynamics (CFD) methods employing an overset grid approach. The (URANS) SST k - ω is used as the turbulence model. For the preliminary study, simulations of the NACA 0015 under static conditions for a broad range of angle of attack and a rotating two-bladed VAWT are carried out. The results are compared with available measurement data and a good agreement is obtained. The simulations demonstrate that the maximum power coefficient attained is 0.45 for λ=4. The aerodynamic loads hysteresis are presented showing that the dynamic stall effect decreases with λ.
A Computational and Experimental Investigation of a Delta Wing with Vertical Tails
NASA Technical Reports Server (NTRS)
Krist. Sherrie L.; Washburn, Anthony E.; Visser, Kenneth D.
2004-01-01
The flow over an aspect ratio 1 delta wing with twin vertical tails is studied in a combined computational and experimental investigation. This research is conducted in an effort to understand the vortex and fin interaction process. The computational algorithm used solves both the thin-layer Navier-Stokes and the inviscid Euler equations and utilizes a chimera grid-overlapping technique. The results are compared with data obtained from a detailed experimental investigation. The laminar case presented is for an angle of attack of 20 and a Reynolds number of 500; 000. Good agreement is observed for the physics of the flow field, as evidenced by comparisons of computational pressure contours with experimental flow-visualization images, as well as by comparisons of vortex-core trajectories. While comparisons of the vorticity magnitudes indicate that the computations underpredict the magnitude in the wing primary-vortex-core region, grid embedding improves the computational prediction.
A computational and experimental investigation of a delta wing with vertical tails
NASA Technical Reports Server (NTRS)
Krist, Sherrie L.; Washburn, Anthony E.; Visser, Kenneth D.
1993-01-01
The flow over an aspect ratio 1 delta wing with twin vertical tails is studied in a combined computational and experimental investigation. This research is conducted in an effort to understand the vortex and fin interaction process. The computational algorithm used solves both the thin-layer Navier-Stokes and the inviscid Euler equations and utilizes a chimera grid-overlapping technique. The results are compared with data obtained from a detailed experimental investigation. The laminar case presented is for an angle of attack of 20 deg and a Reynolds number of 500,000. Good agreement is observed for the physics of the flow field, as evidenced by comparisons of computational pressure contours with experimental flow-visualization images, as well as by comparisons of vortex-core trajectories. While comparisons of the vorticity magnitudes indicate that the computations underpredict the magnitude in the wing primary-vortex-core region, grid embedding improves the computational prediction.
Efficient simulation of incompressible viscous flow over multi-element airfoils
NASA Technical Reports Server (NTRS)
Rogers, Stuart E.; Wiltberger, N. Lyn; Kwak, Dochan
1992-01-01
The incompressible, viscous, turbulent flow over single and multi-element airfoils is numerically simulated in an efficient manner by solving the incompressible Navier-Stokes equations. The computer code uses the method of pseudo-compressibility with an upwind-differencing scheme for the convective fluxes and an implicit line-relaxation solution algorithm. The motivation for this work includes interest in studying the high-lift take-off and landing configurations of various aircraft. In particular, accurate computation of lift and drag at various angles of attack, up to stall, is desired. Two different turbulence models are tested in computing the flow over an NACA 4412 airfoil; an accurate prediction of stall is obtained. The approach used for multi-element airfoils involves the use of multiple zones of structured grids fitted to each element. Two different approaches are compared: a patched system of grids, and an overlaid Chimera system of grids. Computational results are presented for two-element, three-element, and four-element airfoil configurations. Excellent agreement with experimental surface pressure coefficients is seen. The code converges in less than 200 iterations, requiring on the order of one minute of CPU time (on a CRAY YMP) per element in the airfoil configuration.
Efficient simulation of incompressible viscous flow over multi-element airfoils
NASA Technical Reports Server (NTRS)
Rogers, Stuart E.; Wiltberger, N. Lyn; Kwak, Dochan
1993-01-01
The incompressible, viscous, turbulent flow over single and multi-element airfoils is numerically simulated in an efficient manner by solving the incompressible Navier-Stokes equations. The solution algorithm employs the method of pseudo compressibility and utilizes an upwind differencing scheme for the convective fluxes, and an implicit line-relaxation scheme. The motivation for this work includes interest in studying high-lift take-off and landing configurations of various aircraft. In particular, accurate computation of lift and drag at various angles of attack up to stall is desired. Two different turbulence models are tested in computing the flow over an NACA 4412 airfoil; an accurate prediction of stall is obtained. The approach used for multi-element airfoils involves the use of multiple zones of structured grids fitted to each element. Two different approaches are compared; a patched system of grids, and an overlaid Chimera system of grids. Computational results are presented for two-element, three-element, and four-element airfoil configurations. Excellent agreement with experimental surface pressure coefficients is seen. The code converges in less than 200 iterations, requiring on the order of one minute of CPU time on a CRAY YMP per element in the airfoil configuration.
Numerical Simulations For the F-16XL Aircraft Configuration
NASA Technical Reports Server (NTRS)
Elmiligui, Alaa A.; Abdol-Hamid, Khaled; Cavallo, Peter A.; Parlette, Edward B.
2014-01-01
Numerical simulations of flow around the F-16XL are presented as a contribution to the Cranked Arrow Wing Aerodynamic Project International II (CAWAPI-II). The NASA Tetrahedral Unstructured Software System (TetrUSS) is used to perform numerical simulations. This CFD suite, developed and maintained by NASA Langley Research Center, includes an unstructured grid generation program called VGRID, a postprocessor named POSTGRID, and the flow solver USM3D. The CRISP CFD package is utilized to provide error estimates and grid adaption for verification of USM3D results. A subsonic high angle-of-attack case flight condition (FC) 25 is computed and analyzed. Three turbulence models are used in the calculations: the one-equation Spalart-Allmaras (SA), the two-equation shear stress transport (SST) and the ke turbulence models. Computational results, and surface static pressure profiles are presented and compared with flight data. Solution verification is performed using formal grid refinement studies, the solution of Error Transport Equations, and adaptive mesh refinement. The current study shows that the USM3D solver coupled with CRISP CFD can be used in an engineering environment in predicting vortex-flow physics on a complex configuration at flight Reynolds numbers.
Development of the Orion Crew Module Static Aerodynamic Database. Part 1; Hypersonic
NASA Technical Reports Server (NTRS)
Bibb, Karen L.; Walker, Eric L.; Robinson, Philip E.
2011-01-01
The Orion aerodynamic database provides force and moment coefficients given the velocity, attitude, configuration, etc. of the Crew Exploration Vehicle (CEV). The database is developed and maintained by the NASA CEV Aerosciences Project team from computational and experimental aerodynamic simulations. The database is used primarily by the Guidance, Navigation, and Control (GNC) team to design vehicle trajectories and assess flight performance. The initial hypersonic re-entry portion of the Crew Module (CM) database was developed in 2006. Updates incorporating additional data and improvements to the database formulation and uncertainty methodologies have been made since then. This paper details the process used to develop the CM database, including nominal values and uncertainties, for Mach numbers greater than 8 and angles of attack between 140deg and 180deg. The primary available data are more than 1000 viscous, reacting gas chemistry computational simulations using both the Laura and Dplr codes, over a range of Mach numbers from 2 to 37 and a range of angles of attack from 147deg to 172deg. Uncertainties were based on grid convergence, laminar-turbulent solution variations, combined altitude and code-to-code variations, and expected heatshield asymmetry. A radial basis function response surface tool, NEAR-RS, was used to fit the coefficient data smoothly in a velocity-angle-of-attack space. The resulting database is presented and includes some data comparisons and a discussion of the predicted variation of trim angle of attack and lift-to-drag ratio. The database provides a variation in trim angle of attack on the order of +/-2deg, and a range in lift-to-drag ratio of +/-0.035 for typical vehicle flight conditions.
Facelock: familiarity-based graphical authentication.
Jenkins, Rob; McLachlan, Jane L; Renaud, Karen
2014-01-01
Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.
Modeling of turbulent separated flows for aerodynamic applications
NASA Technical Reports Server (NTRS)
Marvin, J. G.
1983-01-01
Steady, high speed, compressible separated flows modeled through numerical simulations resulting from solutions of the mass-averaged Navier-Stokes equations are reviewed. Emphasis is placed on benchmark flows that represent simplified (but realistic) aerodynamic phenomena. These include impinging shock waves, compression corners, glancing shock waves, trailing edge regions, and supersonic high angle of attack flows. A critical assessment of modeling capabilities is provided by comparing the numerical simulations with experiment. The importance of combining experiment, numerical algorithm, grid, and turbulence model to effectively develop this potentially powerful simulation technique is stressed.
NASA Technical Reports Server (NTRS)
Woodard, Paul R.; Batina, John T.; Yang, Henry T. Y.
1992-01-01
Quality assessment procedures are described for two-dimensional unstructured meshes. The procedures include measurement of minimum angles, element aspect ratios, stretching, and element skewness. Meshes about the ONERA M6 wing and the Boeing 747 transport configuration are generated using an advancing front method grid generation package of programs. Solutions of Euler's equations for these meshes are obtained at low angle-of-attack, transonic conditions. Results for these cases, obtained as part of a validation study demonstrate accuracy of an implicit upwind Euler solution algorithm.
NASA Technical Reports Server (NTRS)
Branch, Drew Alexander
2014-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated, patched and secured state in a launch control system environment. Attacks on critical systems are becoming more and more relevant and frequent. Nation states are hacking into critical networks that might control electrical power grids or water dams as well as carrying out advanced persistent threat (APTs) attacks on government entities. NASA, as an organization, must protect its self from attacks from all different types of attackers with different motives. Although the International Space Station was created, there is still competition between the different space programs. With that in mind, NASA might get attacked and breached for various reasons such as espionage or sabotage. My project will provide a way for NASA to complete an in house penetration test which includes: asset discovery, vulnerability scans, exploit vulnerabilities and also provide forensic information to harden systems. Completing penetration testing is a part of the compliance requirements of the Federal Information Security Act (FISMA) and NASA NPR 2810.1 and related NASA Handbooks. This project is to demonstrate how in house penetration testing can be conducted that will satisfy all of the compliance requirements of the National Institute of Standards and Technology (NIST), as outlined in FISMA. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.
Kwon, Hyuk Moo; LeRoith, Tanya; Pudupakam, R S; Pierson, F William; Huang, Yao-Wei; Dryman, Barbara A; Meng, Xiang-Jin
2011-01-27
A genetically distinct strain of avian hepatitis E virus (avian HEV-VA strain) was isolated from a healthy chicken in Virginia, and thus it is important to characterize and compare its pathogenicity with the prototype strain (avian HEV-prototype) isolated from a diseased chicken. Here we first constructed an infectious clone of the avian HEV-VA strain. Capped RNA transcripts from the avian HEV-VA clone were replication-competent after transfection of LMH chicken liver cells. Chickens inoculated intrahepatically with RNA transcripts of avian HEV-VA clone developed active infection as evidenced by fecal virus shedding, viremia, and seroconversion. To characterize the pathogenicity, RNA transcripts of both avian HEV-VA and avian HEV-prototype clones were intrahepatically inoculated into the livers of chickens. Avian HEV RNA was detected in feces, serum and bile samples from 10/10 avian HEV-VA-inoculated and 9/9 avian HEV-prototype-inoculated chickens although seroconversion occurred only in some chickens during the experimental period. The histopathological lesion scores were lower for avian HEV-VA group than avian HEV-prototype group in the liver at 3 and 5 weeks post-inoculation (wpi) and in the spleen at 3 wpi, although the differences were not statistically significant. The liver/body weight ratio, indicative of liver enlargement, of both avian HEV-VA and avian HEV-prototype groups were significantly higher than that of the control group at 5 wpi. Overall, the avian HEV-VA strain still induces histological liver lesions even though it was isolated from a healthy chicken. The results also showed that intrahepatic inoculation of chickens with RNA transcripts of avian HEV infectious clone may serve as an alternative for live virus in animal pathogenicity studies. Copyright © 2010 Elsevier B.V. All rights reserved.
A computational examination of directional stability for smooth and chined forebodies at high-alpha
NASA Technical Reports Server (NTRS)
Ravi, Ramakrishnan; Mason, William H.
1992-01-01
Computational Fluid Dynamics (CFD) has been used to study aircraft forebody flowfields at low-speed, angle-of-attack conditions with sideslip. The purpose is to define forebody geometries which provide good directional stability characteristics under these conditions. The flows over the experimentally investigated F-5A forebody and chine type configuration, previously computed by the authors, were recomputed with better grid topology and resolution. The results were obtained using a modified version of CFL3D (developed at NASA Langley) to solve either the Euler equations or the Reynolds equations employing the Baldwin-Lomax turbulence model with the Degani-Schiff modification to account for massive crossflow separation. Based on the results, it is concluded that current CFD methods can be used to investigate the aerodynamic characteristics of forebodies to achieve desirable high angle-of-attack characteristics. An analytically defined generic forebody model is described, and a parametric study of various forebody shapes was then conducted to determine which shapes promote a positive contribution to directional stability at high angle-of-attack. An unconventional approach for presenting the results is used to illustrate how the positive contribution arises. Based on the results of this initial parametric study, some guidelines for aerodynamic design to promote positive directional stability are presented.
Navier-Stokes analysis of airfoils with leading edge ice accretions
NASA Technical Reports Server (NTRS)
Potapczuk, Mark G.
1993-01-01
A numerical analysis of the flowfield characteristics and the performance degradation of an airfoil with leading edge ice accretions was performed. The important fluid dynamic processes were identified and calculated. Among these were the leading edge separation bubble at low angles of attack, complete separation on the low pressure surface resulting in premature shell, drag rise due to the ice shape, and the effects of angle of attack on the separated flow field. Comparisons to experimental results were conducted to confirm these calculations. A computer code which solves the Navier-Stokes equations in two dimensions, ARC2D, was used to perform the calculations. A Modified Mixing Length turbulence model was developed to produce grids for several ice shape and airfoil combinations. Results indicate that the ability to predict overall performance characteristics, such as lift and drag, at low angles of attack is excellent. Transition location is important for accurately determining separation bubble shape. Details of the flowfield in and downstream of the separated regions requires some modifications. Calculations for the stalled airfoil indicate periodic shedding of vorticity that was generated aft of the ice accretion. Time averaged pressure values produce results which compare favorably with experimental information. A turbulence model which accounts for the history effects in the flow may be justified.
Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies.
Paté-Cornell, M-Elisabeth; Kuypers, Marshall; Smith, Matthew; Keller, Philip
2018-02-01
Managing cyber security in an organization involves allocating the protection budget across a spectrum of possible options. This requires assessing the benefits and the costs of these options. The risk analyses presented here are statistical when relevant data are available, and system-based for high-consequence events that have not happened yet. This article presents, first, a general probabilistic risk analysis framework for cyber security in an organization to be specified. It then describes three examples of forward-looking analyses motivated by recent cyber attacks. The first one is the statistical analysis of an actual database, extended at the upper end of the loss distribution by a Bayesian analysis of possible, high-consequence attack scenarios that may happen in the future. The second is a systems analysis of cyber risks for a smart, connected electric grid, showing that there is an optimal level of connectivity. The third is an analysis of sequential decisions to upgrade the software of an existing cyber security system or to adopt a new one to stay ahead of adversaries trying to find their way in. The results are distributions of losses to cyber attacks, with and without some considered countermeasures in support of risk management decisions based both on past data and anticipated incidents. © 2017 Society for Risk Analysis.
Yang, Y; Zhang, Y; Fang, L; Halloran, M E; Ma, M; Liang, S; Kenah, E; Britton, T; Chen, E; Hu, J; Tang, F; Cao, W; Feng, Z; Longini, I M
2015-01-01
To study human-to-human transmissibility of the avian influenza A (H7N9) virus in China, household contact information was collected for 125 index cases during the spring wave (February to May 2013), and for 187 index cases during the winter wave (October 2013 to March 2014). Using a statistical model, we found evidence for human-to-human transmission, but such transmission is not sustainable. Under plausible assumptions about the natural history of disease and the relative transmission frequencies in settings other than household, we estimate the household secondary attack rate (SAR) among humans to be 1.4% (95% CI: 0.8 to 2.3), and the basic reproductive number R0 to be 0.08 (95% CI: 0.05 to 0.13). The estimates range from 1.3% to 2.2% for SAR and from 0.07 to 0.12 for R0 with reasonable changes in the assumptions. There was no significant change in the human-to-human transmissibility of the virus between the two waves, although a minor increase was observed in the winter wave. No sex or age difference in the risk of infection from a human source was found. Human-to-human transmissibility of H7N9 continues to be limited, but it needs to be closely monitored for potential increase via genetic reassortment or mutation. PMID:25788253
Gil-da-Costa, Ricardo; Palleroni, Alberto; Hauser, Marc D; Touchton, Janeene; Kelley, J Patrick
2003-01-01
Predation is an important selective pressure in natural ecosystems. Among non-human primates, relatively little is known about how predators hunt primate prey and how primates acquire adaptive responses to counteract predation. In this study we took advantage of the recent reintroduction of radio-tagged harpy eagles (Harpia harpyja) to Barro Colorado Island (BCI), Panama to explore how mantled howler monkeys (Alouatta palliata), one of their primary prey, acquire anti-predator defences. Based on the observation that harpies follow their prey prior to attack, and often call during this pursuit period, we broadcast harpy eagle calls to howlers on BCI as well as to a nearby control population with no harpy predation. Although harpies have been extinct from this area for 50-100 years, results indicate that BCI howlers rapidly acquired an adaptive anti-predator response to harpy calls, while showing no response to other avian vocalizations; howlers maintained this response several months after the removal of the eagles. These results not only show that non-human primates can rapidly acquire an alarm response to a newly introduced predator, but that they can detect and identify predators on the basis of acoustic cues alone. These findings have significant implications both for the role of learning mechanisms in the evolution of prey defence and for conservation strategies, suggesting that the use of 'probing' approaches, such as auditory playbacks, may highly enhance an a priori assessment of the impact of species reintroduction. PMID:12769460
A novel approach to quantify cybersecurity for electric power systems
NASA Astrophysics Data System (ADS)
Kaster, Paul R., Jr.
Electric Power grid cybersecurity is a topic gaining increased attention in academia, industry, and government circles, yet a method of quantifying and evaluating a system's security is not yet commonly accepted. In order to be useful, a quantification scheme must be able to accurately reflect the degree to which a system is secure, simply determine the level of security in a system using real-world values, model a wide variety of attacker capabilities, be useful for planning and evaluation, allow a system owner to publish information without compromising the security of the system, and compare relative levels of security between systems. Published attempts at quantifying cybersecurity fail at one or more of these criteria. This document proposes a new method of quantifying cybersecurity that meets those objectives. This dissertation evaluates the current state of cybersecurity research, discusses the criteria mentioned previously, proposes a new quantification scheme, presents an innovative method of modeling cyber attacks, demonstrates that the proposed quantification methodology meets the evaluation criteria, and proposes a line of research for future efforts.
Pandemic influenza planning, United States, 1978-2008.
Iskander, John; Strikas, Raymond A; Gensheimer, Kathleen F; Cox, Nancy J; Redd, Stephen C
2013-06-01
During the past century, 4 influenza pandemics occurred. After the emergence of a novel influenza virus of swine origin in 1976, national, state, and local US public health authorities began planning efforts to respond to future pandemics. Several events have since stimulated progress in public health emergency planning: the 1997 avian influenza A(H5N1) outbreak in Hong Kong, China; the 2001 anthrax attacks in the United States; the 2003 outbreak of severe acute respiratory syndrome; and the 2003 reemergence of influenza A(H5N1) virus infection in humans. We outline the evolution of US pandemic planning since the late 1970s, summarize planning accomplishments, and explain their ongoing importance. The public health community's response to the 2009 influenza A(H1N1)pdm09 pandemic demonstrated the value of planning and provided insights into improving future plans and response efforts. Preparedness planning will enhance the collective, multilevel response to future public health crises.
Mapping influenza transmission in the ferret model to transmission in humans
Buhnerkempe, Michael G; Gostic, Katelyn; Park, Miran; Ahsan, Prianna; Belser, Jessica A; Lloyd-Smith, James O
2015-01-01
The controversy surrounding 'gain-of-function' experiments on high-consequence avian influenza viruses has highlighted the role of ferret transmission experiments in studying the transmission potential of novel influenza strains. However, the mapping between influenza transmission in ferrets and in humans is unsubstantiated. We address this gap by compiling and analyzing 240 estimates of influenza transmission in ferrets and humans. We demonstrate that estimates of ferret secondary attack rate (SAR) explain 66% of the variation in human SAR estimates at the subtype level. Further analysis shows that ferret transmission experiments have potential to identify influenza viruses of concern for epidemic spread in humans, though small sample sizes and biological uncertainties prevent definitive classification of human transmissibility. Thus, ferret transmission experiments provide valid predictions of pandemic potential of novel influenza strains, though results should continue to be corroborated by targeted virological and epidemiological research. DOI: http://dx.doi.org/10.7554/eLife.07969.001 PMID:26329460
Facelock: familiarity-based graphical authentication
McLachlan, Jane L.; Renaud, Karen
2014-01-01
Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems. PMID:25024913
The Role of Free Stream Turbulence on the Aerodynamic Performance of a Wind Turbine Blade
NASA Astrophysics Data System (ADS)
Maldonado, Victor; Thormann, Adrien; Meneveau, Charles; Castillo, Luciano; Turbulence Group Collaboration
2012-11-01
In the present research, a 2-D wind turbine blade section based on the S809 airfoil was manufactured and tested at Johns Hopkins University in the Stanley Corrsin wind tunnel facility. A free stream velocity of 10 m/s produced a Reynolds number based on blade chord of 2.08.x105. Free stream turbulence was generated using an active grid placed 5.5 m upstream of the blade which generated a turbulence intensity, Tu of up to 6.1% and an integral length scale, L∞ of about 0.15 m. The blade was pitched to a range of angles of attack, α from 0 to 18 degrees in order to study the effects of the integral length scales on the aerodynamic characteristics of the wind turbine under fully attached and separated flow conditions. Pressure measurements around the blade and wake velocity deficit measurements utilizing a hot-wire probe were acquired to compute the lift and drag coefficient. Results suggest that turbulence generally increases aerodynamic performance as measured by the lift to drag ratio, L / D except at 0 degrees angle of attack. A significant enhancement in L / D results with free stream turbulence at post-stall angles of attack of 16 and 18 degrees, where L / D increase from 2.49 to 5.43 and from 0.64 to 4.00 respectively. This is a consequence of delaying flow separation with turbulence (which is observed in the suction pressure distribution) which in turn reduces the momentum loss in the wake particularly at 18 degrees angle of attack.
Unsteady Thick Airfoil Aerodynamics: Experiments, Computation, and Theory
NASA Technical Reports Server (NTRS)
Strangfeld, C.; Rumsey, C. L.; Mueller-Vahl, H.; Greenblatt, D.; Nayeri, C. N.; Paschereit, C. O.
2015-01-01
An experimental, computational and theoretical investigation was carried out to study the aerodynamic loads acting on a relatively thick NACA 0018 airfoil when subjected to pitching and surging, individually and synchronously. Both pre-stall and post-stall angles of attack were considered. Experiments were carried out in a dedicated unsteady wind tunnel, with large surge amplitudes, and airfoil loads were estimated by means of unsteady surface mounted pressure measurements. Theoretical predictions were based on Theodorsen's and Isaacs' results as well as on the relatively recent generalizations of van der Wall. Both two- and three-dimensional computations were performed on structured grids employing unsteady Reynolds-averaged Navier-Stokes (URANS). For pure surging at pre-stall angles of attack, the correspondence between experiments and theory was satisfactory; this served as a validation of Isaacs theory. Discrepancies were traced to dynamic trailing-edge separation, even at low angles of attack. Excellent correspondence was found between experiments and theory for airfoil pitching as well as combined pitching and surging; the latter appears to be the first clear validation of van der Wall's theoretical results. Although qualitatively similar to experiment at low angles of attack, two-dimensional URANS computations yielded notable errors in the unsteady load effects of pitching, surging and their synchronous combination. The main reason is believed to be that the URANS equations do not resolve wake vorticity (explicitly modeled in the theory) or the resulting rolled-up un- steady flow structures because high values of eddy viscosity tend to \\smear" the wake. At post-stall angles, three-dimensional computations illustrated the importance of modeling the tunnel side walls.
The threshold of a stochastic avian-human influenza epidemic model with psychological effect
NASA Astrophysics Data System (ADS)
Zhang, Fengrong; Zhang, Xinhong
2018-02-01
In this paper, a stochastic avian-human influenza epidemic model with psychological effect in human population and saturation effect within avian population is investigated. This model describes the transmission of avian influenza among avian population and human population in random environments. For stochastic avian-only system, persistence in the mean and extinction of the infected avian population are studied. For the avian-human influenza epidemic system, sufficient conditions for the existence of an ergodic stationary distribution are obtained. Furthermore, a threshold of this stochastic model which determines the outcome of the disease is obtained. Finally, numerical simulations are given to support the theoretical results.
Complex dynamics underlie the evolution of imperfect wing pattern convergence in butterflies.
Finkbeiner, Susan D; Briscoe, Adriana D; Mullen, Sean P
2017-04-01
Adaptive radiation is characterized by rapid diversification that is strongly associated with ecological specialization. However, understanding the evolutionary mechanisms fueling adaptive diversification requires a detailed knowledge of how natural selection acts at multiple life-history stages. Butterflies within the genus Adelpha represent one of the largest and most diverse butterfly lineages in the Neotropics. Although Adelpha species feed on an extraordinary diversity of larval hosts, convergent evolution is widespread in this group, suggesting that selection for mimicry may contribute to adaptive divergence among species. To investigate this hypothesis, we conducted predation studies in Costa Rica using artificial butterfly facsimiles. Specifically, we predicted that nontoxic, palatable Adelpha species that do not feed on host plants in the family Rubiaceae would benefit from sharing a locally convergent wing pattern with the presumably toxic Rubiaceae-feeding species via reduced predation. Contrary to expectations, we found that the presumed mimic was attacked significantly more than its locally convergent model at a frequency paralleling attack rates on both novel and palatable prey. Although these data reveal the first evidence for protection from avian predators by the supposed toxic, Rubiaceae-feeding Adelpha species, we conclude that imprecise mimetic patterns have high costs for Batesian mimics in the tropics. © 2017 The Author(s). Evolution © 2017 The Society for the Study of Evolution.
NASA Technical Reports Server (NTRS)
Treiber, David A.; Muilenburg, Dennis A.
1995-01-01
The viability of applying a state-of-the-art Euler code to calculate the aerodynamic forces and moments through maximum lift coefficient for a generic sharp-edge configuration is assessed. The OVERFLOW code, a method employing overset (Chimera) grids, was used to conduct mesh refinement studies, a wind-tunnel wall sensitivity study, and a 22-run computational matrix of flow conditions, including sideslip runs and geometry variations. The subject configuration was a generic wing-body-tail geometry with chined forebody, swept wing leading-edge, and deflected part-span leading-edge flap. The analysis showed that the Euler method is adequate for capturing some of the non-linear aerodynamic effects resulting from leading-edge and forebody vortices produced at high angle-of-attack through C(sub Lmax). Computed forces and moments, as well as surface pressures, match well enough useful preliminary design information to be extracted. Vortex burst effects and vortex interactions with the configuration are also investigated.
Aerostructural Level Set Topology Optimization for a Common Research Model Wing
NASA Technical Reports Server (NTRS)
Dunning, Peter D.; Stanford, Bret K.; Kim, H. Alicia
2014-01-01
The purpose of this work is to use level set topology optimization to improve the design of a representative wing box structure for the NASA common research model. The objective is to minimize the total compliance of the structure under aerodynamic and body force loading, where the aerodynamic loading is coupled to the structural deformation. A taxi bump case was also considered, where only body force loads were applied. The trim condition that aerodynamic lift must balance the total weight of the aircraft is enforced by allowing the root angle of attack to change. The level set optimization method is implemented on an unstructured three-dimensional grid, so that the method can optimize a wing box with arbitrary geometry. Fast matching and upwind schemes are developed for an unstructured grid, which make the level set method robust and efficient. The adjoint method is used to obtain the coupled shape sensitivities required to perform aerostructural optimization of the wing box structure.
Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Todd Vollmer; Milos Manic
The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, thismore » paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Habib, Hany F; Lashway, Christopher R; Mohammed, Osama A
One main challenge in the practical implementation of a microgrid is the design of an adequate protection scheme in both grid connected and islanded modes. Conventional overcurrent protection schemes face selectivity and sensitivity issues during grid and microgrid faults since the fault current level is different in both cases for the same relay. Various approaches have been implemented in the past to deal with this problem, yet the most promising ones are the implementation of adaptive protection techniques abiding by the IEC 61850 communication standard. This paper presents a critical review of existing adaptive protection schemes, the technical challenges formore » the use of classical protection techniques and the need for an adaptive, smart protection system. However, the risk of communication link failures and cyber security threats still remain a challenge in implementing a reliable adaptive protection scheme. A contingency is needed where a communication issue prevents the relay from adjusting to a lower current level during islanded mode. An adaptive protection scheme is proposed that utilizes energy storage (ES) and hybrid ES (HESS) already available in the network as a mechanism to source the higher fault current. Four common grid ES and HESS are reviewed for their suitability in feeding the fault while some solutions are proposed.« less
NASA Technical Reports Server (NTRS)
Michal, Todd R.
1998-01-01
This study supports the NASA Langley sponsored project aimed at determining the viability of using Euler technology for preliminary design use. The primary objective of this study was to assess the accuracy and efficiency of the Boeing, St. Louis unstructured grid flow field analysis system, consisting of the MACGS grid generation and NASTD flow solver codes. Euler solutions about the Aero Configuration/Weapons Fighter Technology (ACWFT) 1204 aircraft configuration were generated. Several variations of the geometry were investigated including a standard wing, cambered wing, deflected elevon, and deflected body flap. A wide range of flow conditions, most of which were in the non-linear regimes of the flight envelope, including variations in speed (subsonic, transonic, supersonic), angles of attack, and sideslip were investigated. Several flowfield non-linearities were present in these solutions including shock waves, vortical flows and the resulting interactions. The accuracy of this method was evaluated by comparing solutions with test data and Navier-Stokes solutions. The ability to accurately predict lateral-directional characteristics and control effectiveness was investigated by computing solutions with sideslip, and with deflected control surfaces. Problem set up times and computational resource requirements were documented and used to evaluate the efficiency of this approach for use in the fast paced preliminary design environment.
NASA Technical Reports Server (NTRS)
Hassan, Ahmed
1999-01-01
Using the two-dimensional ARC2D Navier-Stokes flow solver analyses were conducted to predict the sectional aerodynamic characteristics of the flapped NACA-0015 airfoil section. To facilitate the analyses and the generation of the computational grids, the airfoil with the deflected trailing edge flap was treated as a single element airfoil with no allowance for a gap between the flap's leading edge and the base of the forward portion of the airfoil. Generation of the O-type computational grids was accomplished using the HYGRID hyperbolic grid generation program. Results were obtained for a wide range of Mach numbers, angles of attack and flap deflections. The predicted sectional lift, drag and pitching moment values for the airfoil were then cast in tabular format (C81) to be used in lifting-line helicopter rotor aerodynamic performance calculations. Similar were also generated for the flap. Mathematical expressions providing the variation of the sectional lift and pitching moment coefficients for the airfoil and for the flap as a function of flap chord length and flap deflection angle were derived within the context of thin airfoil theory. The airfoil's sectional drag coefficient were derived using the ARC2D drag predictions for equivalent two dimensional flow conditions.
Aerodynamics Simulations for the D8 ``Double Bubble'' Aircraft Using the LAVA Unstructured Solver
NASA Astrophysics Data System (ADS)
Ballinger, Sean
2013-11-01
The D8 ``double bubble'' is a proposed design for quieter and more efficient domestic passenger aircraft of the Boeing 737 class. It features boundary layer-ingesting engines located under a non-load-bearing π-tail and a lightweight low-sweep wing for flight around Mach 0.7. The D8's wide lifting body is expected to supply 15% of its total lift, while a Boeing 737's fuselage contributes only 8%. The tapering rear of the fuselage is also predicted to experience a negative moment resulting in positive pitch, produce a thicker boundary layer for ingestion by distortion-tolerant engines, and act as a noise shield. To investigate these predictions, unstructured grids generated over a fine surface triangulation using Star-CCM+ are used to model the unpowered D8 with flow conditions mimicking those in the MIT Wright brothers wind tunnel at angles of attack from - 2 to 14 degrees. LAVA, the recently developed Launch Ascent and Vehicle Aerodynamics solver, is used to carry out simulations on an unstructured grid. The results are compared to wind tunnel data, and to data from structured grid simulations using the LAVA, Overflow, and Cart3D solvers. Applied Modeling and Simulation Branch, NASA Advanced Supercomputing Division, funded by New York Space Grant.
Influence of numerical dissipation in computing supersonic vortex-dominated flows
NASA Technical Reports Server (NTRS)
Kandil, O. A.; Chuang, A.
1986-01-01
Steady supersonic vortex-dominated flows are solved using the unsteady Euler equations for conical and three-dimensional flows around sharp- and round-edged delta wings. The computational method is a finite-volume scheme which uses a four-stage Runge-Kutta time stepping with explicit second- and fourth-order dissipation terms. The grid is generated by a modified Joukowski transformation. The steady flow solution is obtained through time-stepping with initial conditions corresponding to the freestream conditions, and the bow shock is captured as a part of the solution. The scheme is applied to flat-plate and elliptic-section wings with a leading edge sweep of 70 deg at an angle of attack of 10 deg and a freestream Mach number of 2.0. Three grid sizes of 29 x 39, 65 x 65 and 100 x 100 have been used. The results for sharp-edged wings show that they are consistent with all grid sizes and variation of the artificial viscosity coefficients. The results for round-edged wings show that separated and attached flow solutions can be obtained by varying the artificial viscosity coefficients. They also show that the solutions are independent of the way time stepping is done. Local time-stepping and global minimum time-steeping produce same solutions.
Nondomestic avian pediatric pathology.
St Leger, Judy
2012-05-01
This is a snapshot of avian neonatal pathology—not an exhaustive review. Through knowledge and recognition of the significant pathogenic challenges of avian neonates and the associated lesions, avian practitioners can improve their diagnostic and therapeutic success. An area of need for avian research is determining the specific pathogenesis of many conditions affecting avian neonates. By narrowing the specific etiologies, we can improve management and reduce neonatal concerns.
Generalized information fusion and visualization using spatial voting and data modeling
NASA Astrophysics Data System (ADS)
Jaenisch, Holger M.; Handley, James W.
2013-05-01
We present a novel and innovative information fusion and visualization framework for multi-source intelligence (multiINT) data using Spatial Voting (SV) and Data Modeling. We describe how different sources of information can be converted into numerical form for further processing downstream, followed by a short description of how this information can be fused using the SV grid. As an illustrative example, we show the modeling of cyberspace as cyber layers for the purpose of tracking cyber personas. Finally we describe a path ahead for creating interactive agile networks through defender customized Cyber-cubes for network configuration and attack visualization.
NASA Technical Reports Server (NTRS)
Woodard, Paul R.; Yang, Henry T. Y.; Batina, John T.
1992-01-01
Quality assessment procedures are described for two-dimensional and three-dimensional unstructured meshes. The procedures include measurement of minimum angles, element aspect ratios, stretching, and element skewness. Meshes about the ONERA M6 wing and the Boeing 747 transport configuration are generated using an advancing front method grid generation package of programs. Solutions of Euler's equations for these meshes are obtained at low angle-of-attack, transonic conditions. Results for these cases, obtained as part of a validation study demonstrate the accuracy of an implicit upwind Euler solution algorithm.
76 FR 24793 - Highly Pathogenic Avian Influenza
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-03
.... APHIS-2006-0074] RIN 0579-AC36 Highly Pathogenic Avian Influenza AGENCY: Animal and Plant Health... any subtype of highly pathogenic avian influenza is considered to exist. The interim rule also imposed... avian influenza, or that have moved through regions where any subtype of highly pathogenic avian...
USDA-ARS?s Scientific Manuscript database
Avian influenza virus (AIV) is type A influenza, which is adapted to an avian host. Although avian influenza has been isolated from numerous avian species, the primary natural hosts for the virus are dabbling ducks, shorebirds, and gulls. The virus can be found world-wide in these species and in o...
Zhang, Haitao; Wu, Chenxue; Chen, Zewei; Liu, Zhao; Zhu, Yunhong
2017-01-01
Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a destination location prediction attack model based on privacy-sensitive sequence rules mined from large scale anonymity datasets. Then we proposed a novel on-line spatial-temporal k-anonymity method that can resist such inference attacks. Our anti-attack technique generates new anonymity datasets with awareness of privacy-sensitive sequence rules. The new datasets extend the original sequence database of anonymity datasets to hide the privacy-sensitive rules progressively. The process includes two phases: off-line analysis and on-line application. In the off-line phase, sequence rules are mined from an original sequence database of anonymity datasets, and privacy-sensitive sequence rules are developed by correlating privacy-sensitive spatial regions with spatial grid cells among the sequence rules. In the on-line phase, new anonymity datasets are generated upon LBS requests by adopting specific generalization and avoidance principles to hide the privacy-sensitive sequence rules progressively from the extended sequence anonymity datasets database. We conducted extensive experiments to test the performance of the proposed method, and to explore the influence of the parameter K value. The results demonstrated that our proposed approach is faster and more effective for hiding privacy-sensitive sequence rules in terms of hiding sensitive rules ratios to eliminate inference attacks. Our method also had fewer side effects in terms of generating new sensitive rules ratios than the traditional spatial-temporal k-anonymity method, and had basically the same side effects in terms of non-sensitive rules variation ratios with the traditional spatial-temporal k-anonymity method. Furthermore, we also found the performance variation tendency from the parameter K value, which can help achieve the goal of hiding the maximum number of original sensitive rules while generating a minimum of new sensitive rules and affecting a minimum number of non-sensitive rules.
Wu, Chenxue; Liu, Zhao; Zhu, Yunhong
2017-01-01
Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a destination location prediction attack model based on privacy-sensitive sequence rules mined from large scale anonymity datasets. Then we proposed a novel on-line spatial-temporal k-anonymity method that can resist such inference attacks. Our anti-attack technique generates new anonymity datasets with awareness of privacy-sensitive sequence rules. The new datasets extend the original sequence database of anonymity datasets to hide the privacy-sensitive rules progressively. The process includes two phases: off-line analysis and on-line application. In the off-line phase, sequence rules are mined from an original sequence database of anonymity datasets, and privacy-sensitive sequence rules are developed by correlating privacy-sensitive spatial regions with spatial grid cells among the sequence rules. In the on-line phase, new anonymity datasets are generated upon LBS requests by adopting specific generalization and avoidance principles to hide the privacy-sensitive sequence rules progressively from the extended sequence anonymity datasets database. We conducted extensive experiments to test the performance of the proposed method, and to explore the influence of the parameter K value. The results demonstrated that our proposed approach is faster and more effective for hiding privacy-sensitive sequence rules in terms of hiding sensitive rules ratios to eliminate inference attacks. Our method also had fewer side effects in terms of generating new sensitive rules ratios than the traditional spatial-temporal k-anonymity method, and had basically the same side effects in terms of non-sensitive rules variation ratios with the traditional spatial-temporal k-anonymity method. Furthermore, we also found the performance variation tendency from the parameter K value, which can help achieve the goal of hiding the maximum number of original sensitive rules while generating a minimum of new sensitive rules and affecting a minimum number of non-sensitive rules. PMID:28767687
Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.
He, Xiaofei; Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu
2018-02-24
Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries. In addition, we extend our game model and analyze the extortion strategy, which can enable one participant to obtain more payoff by extorting his/her opponents. The evaluation results show that the defender can combat this strategy by encouraging competition among the adversaries, and significantly suppress the total payoff of the adversaries via setting the proper penalty factor.
Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems †
Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu
2018-01-01
Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries. In addition, we extend our game model and analyze the extortion strategy, which can enable one participant to obtain more payoff by extorting his/her opponents. The evaluation results show that the defender can combat this strategy by encouraging competition among the adversaries, and significantly suppress the total payoff of the adversaries via setting the proper penalty factor. PMID:29495291
Strunk, Anneliese; Wilson, G Heather
2003-01-01
The field of avian cardiology is continually expanding. Although a great deal of the current knowledge base has been derived from poultry data, research and clinical reports involving companion avian species have been published. This article will present avian cardiovascular anatomy and physiology, history and physical examination considerations in the avian cardiac disease patient, specific diagnostic tools, cardiovascular disease processes, and current therapeutic modalities.
USDA-ARS?s Scientific Manuscript database
Avian influenza (AI) virus, avian paramyxovirus Type 1 (APMV-1 or Newcastle disease virus [NDV]), reovirus, rotavirus, turkey astrovirus (TAstV), avian metapneumovirus (aMPV), Marek’s disease virus (MDV-1), avian parvovirus (ChPV) and Salmonella enterica serovar Enteritidis are significant biosafety...
Ogiwara, Haru; Yasui, Fumihiko; Munekata, Keisuke; Takagi-Kamiya, Asako; Munakata, Tsubasa; Nomura, Namiko; Shibasaki, Futoshi; Kuwahara, Kazuhiko; Sakaguchi, Nobuo; Sakoda, Yoshihiro; Kida, Hiroshi; Kohara, Michinori
2014-01-01
Patients infected with highly pathogenic avian influenza A H5N1 viruses (H5N1 HPAIV) show diffuse alveolar damage. However, the temporal progression of tissue damage and repair after viral infection remains poorly defined. Therefore, we assessed the sequential histopathological characteristics of mouse lung after intranasal infection with H5N1 HPAIV or H1N1 2009 pandemic influenza virus (H1N1 pdm). We determined the amount and localization of virus in the lung through IHC staining and in situ hybridization. IHC used antibodies raised against the virus protein and antibodies specific for macrophages, type II pneumocytes, or proliferating cell nuclear antigen. In situ hybridization used RNA probes against both viral RNA and mRNA encoding the nucleoprotein and the hemagglutinin protein. H5N1 HPAIV infection and replication were observed in multiple lung cell types and might result in rapid progression of lung injury. Both type II pneumocytes and macrophages proliferated after H5N1 HPAIV infection. However, the abundant macrophages failed to block the viral attack, and proliferation of type II pneumocytes failed to restore the damaged alveoli. In contrast, mice infected with H1N1 pdm exhibited modest proliferation of type II pneumocytes and macrophages and slight alveolar damage. These results suggest that the virulence of H5N1 HPAIV results from the wide range of cell tropism of the virus, excessive virus replication, and rapid development of diffuse alveolar damage. Copyright © 2014 American Society for Investigative Pathology. Published by Elsevier Inc. All rights reserved.
Ogiwara, Haru; Yasui, Fumihiko; Munekata, Keisuke; Takagi-Kamiya, Asako; Munakata, Tsubasa; Nomura, Namiko; Shibasaki, Futoshi; Kuwahara, Kazuhiko; Sakaguchi, Nobuo; Sakoda, Yoshihiro; Kida, Hiroshi; Kohara, Michinori
2015-01-01
Patients infected with highly pathogenic avian influenza A H5N1 viruses (H5N1 HPAIV) show diffuse alveolar damage. However, the temporal progression of tissue damage and repair after viral infection remains poorly defined. Therefore, we assessed the sequential histopathological characteristics of mouse lung after intranasal infection with H5N1 HPAIV or H1N1 2009 pandemic influenza virus (H1N1 pdm). We determined the amount and localization of virus in the lung through IHC staining and in situ hybridization. IHC used antibodies raised against the virus protein and antibodies specific for macrophages, type II pneumocytes, or proliferating cell nuclear antigen. In situ hybridization used RNA probes against both viral RNA and mRNA encoding the nucleoprotein and the hemagglutinin protein. H5N1 HPAIV infection and replication were observed in multiple lung cell types and might result in rapid progression of lung injury. Both type II pneumocytes and macrophages proliferated after H5N1 HPAIV infection. However, the abundant macrophages failed to block the viral attack, and proliferation of type II pneumocytes failed to restore the damaged alveoli. In contrast, mice infected with H1N1 pdm exhibited modest proliferation of type II pneumocytes and macrophages and slight alveolar damage. These results suggest that the virulence of H5N1 HPAIV results from the wide range of cell tropism of the virus, excessive virus replication, and rapid development of diffuse alveolar damage. PMID:24200852
Avian Influenza A Virus Infections in Humans
... label> Archived Flu Emails Influenza Types Seasonal Avian Swine Variant Pandemic Other Avian Influenza A Virus Infections ... label> Archived Flu Emails Influenza Types Seasonal Avian Swine Variant Pandemic Other Language: English (US) Español File ...
Avian viral surveillance in Victoria, Australia, and detection of two novel avian herpesviruses
Hartley, Carol A.; Vaz, Paola K.; Marenda, Marc S.; Owens, Jane; Eden, Paul A.; Devlin, Joanne M.
2018-01-01
Viruses in avian hosts can pose threats to avian health and some have zoonotic potential. Hospitals that provide veterinary care for avian patients may serve as a site of exposure of other birds and human staff in the facility to these viruses. They can also provide a useful location to collect samples from avian patients in order to examine the viruses present in wild birds. This study aimed to investigate viruses of biosecurity and/or zoonotic significance in Australian birds by screening samples collected from 409 birds presented to the Australian Wildlife Health Centre at Zoos Victoria’s Healesville Sanctuary for veterinary care between December 2014 and December 2015. Samples were tested for avian influenza viruses, herpesviruses, paramyxoviruses and coronaviruses, using genus- or family-wide polymerase chain reaction methods coupled with sequencing and phylogenetic analyses for detection and identification of both known and novel viruses. A very low prevalence of viruses was detected. Columbid alphaherpesvirus 1 was detected from a powerful owl (Ninox strenua) with inclusion body hepatitis, and an avian paramyxovirus most similar to Avian avulavirus 5 was detected from a musk lorikeet (Glossopsitta concinna). Two distinct novel avian alphaherpesviruses were detected in samples from a sulphur-crested cockatoo (Cacatua galerita) and a tawny frogmouth (Podargus strigoides). Avian influenza viruses and avian coronaviruses were not detected. The clinical significance of the newly detected viruses remains undetermined. Further studies are needed to assess the host specificity, epidemiology, pathogenicity and host-pathogen relationships of these novel viruses. Further genome characterization is also indicated, and would be required before these viruses can be formally classified taxonomically. The detection of these viruses contributes to our knowledge on avian virodiversity. The low level of avian virus detection, and the absence of any viruses with zoonotic potential, suggests low risk to biosecurity and human health. PMID:29570719
USDA-ARS?s Scientific Manuscript database
Avian astroviruses comprise a diverse group of viruses affecting many avian species and causing enteritis, hepatitis and nephritis. To date, six different astroviruses have been identified in avian species based on the species of origin and viral genome characteristics: two turkey-origin astroviru...
DOE Office of Scientific and Technical Information (OSTI.GOV)
El Hariri, Mohamad; Faddel, Samy; Mohammed, Osama
Decentralized and hierarchical microgrid control strategies have lain the groundwork for shaping the future smart grid. Such control approaches require the cooperation between microgrid operators in control centers, intelligent microcontrollers, and remote terminal units via secure and reliable communication networks. In order to enhance the security and complement the work of network intrusion detection systems, this paper presents an artificially intelligent physical model-checking that detects tampered-with circuit breaker switching control commands whether, due to a cyber-attack or human error. In this technique, distributed agents, which are monitoring sectionalized areas of a given microgrid, will be trained and continuously adapted tomore » verify that incoming control commands do not violate the physical system operational standards and do not put the microgrid in an insecure state. The potential of this approach has been tested by deploying agents that monitor circuit breakers status commands on a 14-bus IEEE benchmark system. The results showed the accuracy of the proposed framework in characterizing the power system and successfully detecting malicious and/or erroneous control commands.« less
Game-Theoretic strategies for systems of components using product-form utilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S; Ma, Cheng-Yu; Hausken, K.
Many critical infrastructures are composed of multiple systems of components which are correlated so that disruptions to one may propagate to others. We consider such infrastructures with correlations characterized in two ways: (i) an aggregate failure correlation function specifies the conditional failure probability of the infrastructure given the failure of an individual system, and (ii) a pairwise correlation function between two systems specifies the failure probability of one system given the failure of the other. We formulate a game for ensuring the resilience of the infrastructure, wherein the utility functions of the provider and attacker are products of an infrastructuremore » survival probability term and a cost term, both expressed in terms of the numbers of system components attacked and reinforced. The survival probabilities of individual systems satisfy first-order differential conditions that lead to simple Nash Equilibrium conditions. We then derive sensitivity functions that highlight the dependence of infrastructure resilience on the cost terms, correlation functions, and individual system survival probabilities. We apply these results to simplified models of distributed cloud computing and energy grid infrastructures.« less
NASA Technical Reports Server (NTRS)
Johnson, J. L., Jr.; Newsom, W. A.; Satran, D. R.
1980-01-01
The paper presents the results of a recent investigation to determine the effects of wing leading-edge modifications on the high angle-of-attack aerodynamic characteristics of a low-wing general aviation airplane in the Langley Full-Scale Wind Tunnel. The investigation was conducted to provide aerodynamic information for correlation and analysis of flight-test results obtained for the configuration. The wind-tunnel investigation consisted of force and moment measurements, wing pressure measurements, flow surveys, and flow visualization studies utilizing a tuft grid, smoke and nonintrusive mini-tufts which were illuminated by ultra-violet light. In addition to the tunnel scale system which measured overall forces and moments, the model was equipped with an auxiliary strain-gage balance within the left wing panel to measure lift and drag forces on the outer wing panel independent of the tunnel scale system. The leading-edge modifications studied included partial- and full-span leading-edge droop arrangements as well as leading-edge slats.
A Network Access Control Framework for 6LoWPAN Networks
Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime
2013-01-01
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610
USDA-ARS?s Scientific Manuscript database
Avian influenza virus is naturally found in wild birds, primarily waterfowl, but the virus may also be found in poultry. The virus in poultry is typically differentiated into two types, low pathogenic avian influenza and highly pathogenic avian influenza. In chickens the low pathogenic form typica...
Markov Chain Estimation of Avian Seasonal Fecundity
To explore the consequences of modeling decisions on inference about avian seasonal fecundity we generalize previous Markov chain (MC) models of avian nest success to formulate two different MC models of avian seasonal fecundity that represent two different ways to model renestin...
Nonlinear dynamics of avian influenza epidemic models.
Liu, Sanhong; Ruan, Shigui; Zhang, Xinan
2017-01-01
Avian influenza is a zoonotic disease caused by the transmission of the avian influenza A virus, such as H5N1 and H7N9, from birds to humans. The avian influenza A H5N1 virus has caused more than 500 human infections worldwide with nearly a 60% death rate since it was first reported in Hong Kong in 1997. The four outbreaks of the avian influenza A H7N9 in China from March 2013 to June 2016 have resulted in 580 human cases including 202 deaths with a death rate of nearly 35%. In this paper, we construct two avian influenza bird-to-human transmission models with different growth laws of the avian population, one with logistic growth and the other with Allee effect, and analyze their dynamical behavior. We obtain a threshold value for the prevalence of avian influenza and investigate the local or global asymptotical stability of each equilibrium of these systems by using linear analysis technique or combining Liapunov function method and LaSalle's invariance principle, respectively. Moreover, we give necessary and sufficient conditions for the occurrence of periodic solutions in the avian influenza system with Allee effect of the avian population. Numerical simulations are also presented to illustrate the theoretical results. Copyright © 2016 Elsevier Inc. All rights reserved.
Avian disease at the Salton Sea
Friend, M.
2002-01-01
A review of existing records and the scientific literature was conducted for occurrences of avian diseases affecting free-ranging avifauna within the Salton Sea ecosystem. The period for evaluation was 1907 through 1999. Records of the U.S. Department of Agriculture, Bureau of Biological Survey and the scientific literature were the data sources for the period of 1907a??1939. The narrative reports of the U.S. Fish and Wildlife Service's Sonny Bono National Wildlife Refuge Complex and the epizootic database of the U.S. Geological Survey's National Wildlife Health Center were the primary data sources for the remainder of the evaluation. The pattern of avian disease at the Salton Sea has changed greatly over time. Relative to past decades, there was a greater frequency of major outbreaks of avian disease at the Salton Sea during the 1990s than in previous decades, a greater variety of disease agents causing epizootics, and apparent chronic increases in the attrition of birds from disease. Avian mortality was high for about a decade beginning during the mid-1920s, diminished substantially by the 1940s and was at low to moderate levels until the 1990s when it reached the highest levels reported. Avian botulism (Clostridium botulinum type C) was the only major cause of avian disease until 1979 when the first major epizootic of avian cholera (Pasteurella multocidia) was documented. Waterfowl and shorebirds were the primary species affected by avian botulism. A broader spectrum of species have been killed by avian cholera but waterfowl have suffered the greatest losses. Avian cholera reappeared in 1983 and has joined avian botulism as a recurring cause of avian mortality. In 1989, avian salmonellosis (Salmonella typhimurium) was first diagnosed as a major cause of avian disease within the Salton Sea ecosystem and has since reappeared several times, primarily among cattle egrets (Bubulcus ibis). The largest loss from a single epizootic occurred in 1992, when an estimated 155thinsp000 birds, primarily eared grebes (Podiceps nigricollis), died from an undiagnosed cause. Reoccurrences of that unknown malady have continued to kill substantial numbers of eared grebes throughout the 1990s. The first major epizootic of type C avian botulism in fish-eating birds occurred in 1996 and killed large numbers of pelicans (Pelecanus occidentalis & P. erythrorhynchos). Avian botulism has remained as a major annual cause of disease in pelicans. In contrast, the chronic on-Sea occurrence of avian botulism in waterfowl and shorebirds of previous decades was seldom seen during the 1990s. Newcastle disease became the first viral disease to cause major bird losses at the Salton Sea when it appeared in the Mullet Island cormorant (Phalacrocorax auritus) breeding colony during 1997 and again during 1998.
Flowfield Measurements in the Vortex Wake of a Missile at High Angle of Attack in Turbulence
1988-12-01
pressure coefficient Cy: side force coefficient d: base diameter of the missile body F: blockage correction K: wind tunnel calibration factor LI : missile...and assistance in the wind tunnel apparatus and data acquisition s -;te1 m. I would like to thank Lt. Ao Chia-Ning. Republic of China Navy, Mr. Li ...axisymmetric missile configuration. 6- MO GRID + WIJS RE 1.33 E+05 z 2- Li 0- O C8 -C0 tq *tt~E I ’mtO0 E 5 , • r;.H/ 2 011USE 6 -6 x J! ’ 5SE 3 ,AHOSE
USDA-ARS?s Scientific Manuscript database
Avian influenza virus (AIV) is type A influenza that is adapted to avian host species. Although the virus can be isolated from numerous avian species, the natural host reservoir species are dabbling ducks, shorebirds and gulls. Domestic poultry species (poultry being defined as birds that are rais...
Pathobiology of avian influenza virus infection in minor gallinaceous species: a review.
Bertran, Kateri; Dolz, Roser; Majó, Natàlia
2014-01-01
Susceptibility to avian influenza viruses (AIVs) can vary greatly among bird species. Chickens and turkeys are major avian species that, like ducks, have been extensively studied for avian influenza. To a lesser extent, minor avian species such as quail, partridges, and pheasants have also been investigated for avian influenza. Usually, such game fowl species are highly susceptible to highly pathogenic AIVs and may consistently spread both highly pathogenic AIVs and low-pathogenic AIVs. These findings, together with the fact that game birds are considered bridge species in the poultry-wildlife interface, highlight their interest from the transmission and biosecurity points of view. Here, the general pathobiological features of low-pathogenic AIV and highly pathogenic AIV infections in this group of avian species have been covered.
On avian influenza epidemic models with time delay.
Liu, Sanhong; Ruan, Shigui; Zhang, Xinan
2015-12-01
After the outbreak of the first avian influenza A virus (H5N1) in Hong Kong in 1997, another avian influenza A virus (H7N9) crossed the species barrier in mainland China in 2013 and 2014 and caused more than 400 human cases with a death rate of nearly 40%. In this paper, we take account of the incubation periods of avian influenza A virus and construct a bird-to-human transmission model with different time delays in the avian and human populations combining the survival probability of the infective avian and human populations at the latent time. By analyzing the dynamical behavior of the model, we obtain a threshold value for the prevalence of avian influenza and investigate local and global asymptotical stability of equilibria of the system.
Code of Federal Regulations, 2013 CFR
2013-01-01
.... 1, 2011 Antigen, except avian influenza and chlamydia psittaci antigens, any 2 mL $61.00 $62.00 $64.00 $65.00 $67.00 Avian antiserum except avian influenza antiserum, any 2 mL 48.00 49.00 51.00 52.00 53.00 Avian influenza antigen, any 2 mL 33.00 34.00 35.00 36.00 36.00 Avian influenza antiserum, any...
Code of Federal Regulations, 2012 CFR
2012-01-01
.... 1, 2011 Antigen, except avian influenza and chlamydia psittaci antigens, any 2 mL $61.00 $62.00 $64.00 $65.00 $67.00 Avian antiserum except avian influenza antiserum, any 2 mL 48.00 49.00 51.00 52.00 53.00 Avian influenza antigen, any 2 mL 33.00 34.00 35.00 36.00 36.00 Avian influenza antiserum, any...
Code of Federal Regulations, 2014 CFR
2014-01-01
.... 1, 2011 Antigen, except avian influenza and chlamydia psittaci antigens, any 2 mL $61.00 $62.00 $64.00 $65.00 $67.00 Avian antiserum except avian influenza antiserum, any 2 mL 48.00 49.00 51.00 52.00 53.00 Avian influenza antigen, any 2 mL 33.00 34.00 35.00 36.00 36.00 Avian influenza antiserum, any...
Evaluation of Aircraft Platforms for SOFIA by Computational Fluid Dynamics
NASA Technical Reports Server (NTRS)
Klotz, S. P.; Srinivasan, G. R.; VanDalsem, William (Technical Monitor)
1995-01-01
The selection of an airborne platform for the Stratospheric Observatory for Infrared Astronomy (SOFIA) is based not only on economic cost, but technical criteria, as well. Technical issues include aircraft fatigue, resonant characteristics of the cavity-port shear layer, aircraft stability, the drag penalty of the open telescope bay, and telescope performance. Recently, two versions of the Boeing 747 aircraft, viz., the -SP and -200 configurations, were evaluated by computational fluid dynamics (CFD) for their suitability as SOFIA platforms. In each configuration the telescope was mounted behind the wings in an open bay with nearly circular aperture. The geometry of the cavity, cavity aperture, and telescope was identical in both platforms. The aperture was located on the port side of the aircraft and the elevation angle of the telescope, measured with respect to the vertical axis, was 500. The unsteady, viscous, three-dimensional, aerodynamic and acoustic flow fields in the vicinity of SOFIA were simulated by an implicit, finite-difference Navier-Stokes flow solver (OVERFLOW) on a Chimera, overset grid system. The computational domain was discretized by structured grids. Computations were performed at wind-tunnel and flight Reynolds numbers corresponding to one free-stream flow condition (M = 0.85, angle of attack alpha = 2.50, and sideslip angle beta = 0 degrees). The computational domains consisted of twenty-nine(29) overset grids in the wind-tunnel simulations and forty-five(45) grids in the simulations run at cruise flight conditions. The maximum number of grid points in the simulations was approximately 4 x 10(exp 6). Issues considered in the evaluation study included analysis of the unsteady flow field in the cavity, the influence of the cavity on the flow across empennage surfaces, the drag penalty caused by the open telescope bay, and the noise radiating from cavity surfaces and the cavity-port shear layer. Wind-tunnel data were also available to compare to the CFD results; the data permitted an assessment of CFD as a design tool for the SOFIA program.
Billam, P; LeRoith, T; Pudupakam, R S; Pierson, F W; Duncan, R B; Meng, X J
2009-11-18
Avian hepatitis E virus (avian HEV) is the primary causative agent of Hepatitis-Splenomegaly (HS) syndrome in chickens. Recently, a genetically unique strain of avian HEV, designated avian HEV-VA, was recovered from healthy chickens in Virginia. The objective of this study was to experimentally compare the pathogenicity of the prototype strain recovered from a chicken with HS syndrome and the avian HEV-VA strain in specific-pathogen-free chickens. An infectious stock of the avian HEV-VA strain was first generated and its infectivity titer determined in chickens. For the comparative pathogenesis study, 54 chickens of 6-week-old were assigned to 3 groups of 18 chickens each. The group 1 chickens were each intravenously inoculated with 5x10(2.5) 50% chicken infectious dose of the prototype strain. The group 2 received the same dose of the avian HEV-VA strain, and the group 3 served as negative controls. Six chickens from each group were necropsied at 2, 3 and 4 weeks post-inoculation (wpi). Most chickens in both inoculated groups seroconverted by 3wpi, and the mean anti-avian HEV antibody titers were higher for the prototype strain group than the avian HEV-VA strain group. There was no significant difference in the patterns of viremia and fecal virus shedding. Blood analyte profiles did not differ between treatment groups except for serum creatine phosphokinase levels which were higher for prototype avian HEV group than avian HEV-VA group. The hepatic lesion score was higher for the prototype strain group than the other two groups. The results indicated that the avian HEV-VA strain is only slightly attenuated compared to the prototype strain, suggesting that the full spectrum of HS syndrome is likely associated with other co-factors.
Current situation on highly pathogenic avian influenza
USDA-ARS?s Scientific Manuscript database
Avian influenza is one of the most important diseases affecting the poultry industry worldwide. Avian influenza viruses can cause a range of clinical disease in poultry. Viruses that cause severe disease and mortality are referred to as highly pathogenic avian influenza (HPAI) viruses. The Asian ...
Docherty, Douglas E.; Franson, J. Christian; Brannian, Roger E.; Long, Renee R.; Radi, Craig A.; Krueger, David; Johnson, Robert F.
2012-01-01
In 1999, the U.S. Geological Survey (USGS) National Wildlife Health Center, Madison, Wisconsin, conducted a diagnostic investigation into a water bird mortality event involving intoxication with avian botulism type C and infection with avian chlamydiosis at the Benton Lake National Wildlife Refuge in Montana, USA. Of 24 carcasses necropsied, 11 had lesions consistent with avian chlamydiosis, including two that tested positive for infectious Chlamydophila psittaci, and 12 were positive for avian botulism type C. One bird tested positive for both avian botulism type C and C. psittaci. Of 61 apparently healthy water birds sampled and released, 13 had serologic evidence of C. psittaci infection and 7 were, at the time of capture, shedding infectious C. psittaci via the cloacal or oropharyngeal route. Since more routinely diagnosed disease conditions may mask avian chlamydiosis, these findings support the need for a comprehensive diagnostic investigation when determining the cause of a wildlife mortality event.
Qi, Li; Pujanauski, Lindsey M; Davis, A Sally; Schwartzman, Louis M; Chertow, Daniel S; Baxter, David; Scherler, Kelsey; Hartshorn, Kevan L; Slemons, Richard D; Walters, Kathie-Anne; Kash, John C; Taubenberger, Jeffery K
2014-11-18
Zoonotic avian influenza virus infections may lead to epidemics or pandemics. The 1918 pandemic influenza virus has an avian influenza virus-like genome, and its H1 hemagglutinin was identified as a key mammalian virulence factor. A chimeric 1918 virus expressing a contemporary avian H1 hemagglutinin, however, displayed murine pathogenicity indistinguishable from that of the 1918 virus. Here, isogenic chimeric avian influenza viruses were constructed on an avian influenza virus backbone, differing only by hemagglutinin subtype expressed. Viruses expressing the avian H1, H6, H7, H10, and H15 subtypes were pathogenic in mice and cytopathic in normal human bronchial epithelial cells, in contrast to H2-, H3-, H5-, H9-, H11-, H13-, H14-, and H16-expressing viruses. Mouse pathogenicity was associated with pulmonary macrophage and neutrophil recruitment. These data suggest that avian influenza virus hemagglutinins H1, H6, H7, H10, and H15 contain inherent mammalian virulence factors and likely share a key virulence property of the 1918 virus. Consequently, zoonotic infections with avian influenza viruses bearing one of these hemagglutinins may cause enhanced disease in mammals. Influenza viruses from birds can cause outbreaks in humans and may contribute to the development of pandemics. The 1918 pandemic influenza virus has an avian influenza virus-like genome, and its main surface protein, an H1 subtype hemagglutinin, was identified as a key mammalian virulence factor. In a previous study, a 1918 virus expressing an avian H1 gene was as virulent in mice as the reconstructed 1918 virus. Here, a set of avian influenza viruses was constructed, differing only by hemagglutinin subtype. Viruses with the avian H1, H6, H7, H10, and H15 subtypes caused severe disease in mice and damaged human lung cells. Consequently, infections with avian influenza viruses bearing one of these hemagglutinins may cause enhanced disease in mammals, and therefore surveillance for human infections with these subtypes may be important in controlling future outbreaks. Copyright © 2014 Qi et al.
The NASA aircraft noise prediction program improved propeller analysis system
NASA Technical Reports Server (NTRS)
Nguyen, L. Cathy
1991-01-01
The improvements and the modifications of the NASA Aircraft Noise Prediction Program (ANOPP) and the Propeller Analysis System (PAS) are described. Comparisons of the predictions and the test data are included in the case studies for the flat plate model in the Boundary Layer Module, for the effects of applying compressibility corrections to the lift and pressure coefficients, for the use of different weight factors in the Propeller Performance Module, for the use of the improved retarded time equation solution, and for the effect of the number grids in the Transonic Propeller Noise Module. The DNW tunnel test data of a propeller at different angles of attack and the Dowty Rotol data are compared with ANOPP predictions. The effect of the number of grids on the Transonic Propeller Noise Module predictions and the comparison of ANOPP TPN and DFP-ATP codes are studied. In addition to the above impact studies, the transonic propeller noise predictions for the SR-7, the UDF front rotor, and the support of the enroute noise test program are included.
Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid
Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz
2017-01-01
Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead. PMID:28736582
Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid.
Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz
2016-01-01
Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.
Long Island Smart Energy Corridor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mui, Ming
The Long Island Power Authority (LIPA) has teamed with Stony Brook University (Stony Brook or SBU) and Farmingdale State College (Farmingdale or FSC), two branches of the State University of New York (SUNY), to create a “Smart Energy Corridor.” The project, located along the Route 110 business corridor on Long Island, New York, demonstrated the integration of a suite of Smart Grid technologies from substations to end-use loads. The Smart Energy Corridor Project included the following key features: -TECHNOLOGY: Demonstrated a full range of smart energy technologies, including substations and distribution feeder automation, fiber and radio communications backbone, advanced meteringmore » infrastructure (AM”), meter data management (MDM) system (which LIPA implemented outside of this project), field tools automation, customer-level energy management including automated energy management systems, and integration with distributed generation and plug-in hybrid electric vehicles. -MARKETING: A rigorous market test that identified customer response to an alternative time-of-use pricing plan and varying levels of information and analytical support. -CYBER SECURITY: Tested cyber security vulnerabilities in Smart Grid hardware, network, and application layers. Developed recommendations for policies, procedures, and technical controls to prevent or foil cyber-attacks and to harden the Smart Grid infrastructure. -RELIABILITY: Leveraged new Smart Grid-enabled data to increase system efficiency and reliability. Developed enhanced load forecasting, phase balancing, and voltage control techniques designed to work hand-in-hand with the Smart Grid technologies. -OUTREACH: Implemented public outreach and educational initiatives that were linked directly to the demonstration of Smart Grid technologies, tools, techniques, and system configurations. This included creation of full-scale operating models demonstrating application of Smart Grid technologies in business and residential settings. Farmingdale State College held three international conferences on energy and sustainability and Smart Grid related technologies and policies. These conferences, in addition to public seminars increased understanding and acceptance of Smart Grid transformation by the general public, business, industry, and municipalities in the Long Island and greater New York region. - JOB CREATION: Provided training for the Smart Grid and clean energy jobs of the future at both Farmingdale and Stony Brook. Stony Brook focused its “Cradle to Fortune 500” suite of economic development resources on the opportunities emerging from the project, helping to create new technologies, new businesses, and new jobs. To achieve these features, LIPA and its sub-recipients, FSC and SBU, each have separate but complementary objectives. At LIPA, the Smart Energy Corridor (1) meant validating Smart Grid technologies; (2) quantifying Smart Grid costs and benefits; and (3) providing insights into how Smart Grid applications can be better implemented, readily adapted, and replicated in individual homes and businesses. LIPA installed 2,550 AMI meters (exceeding the 500 AMI meters in the original plan), created three “smart” substations serving the Corridor, and installed additional distribution automation elements including two-way communications and digital controls over various feeders and capacitor banks. It gathered and analyzed customer behavior information on how they responded to a new “smart” TOU rate and to various levels of information and analytical tools.« less
76 FR 67017 - Notice to Manufacturers of Airport Avian Radar Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-28
... Avian Radar Systems AGENCY: Federal Aviation Administration (FAA), U.S. DOT. ACTION: Notice to Manufacturers of Airport Avian Radar Systems. SUMMARY: Projects funded under the Airport Improvement Program... Administration (FAA) is considering issuing waivers to foreign manufacturers of airport avian radar systems that...
9 CFR 113.325 - Avian Encephalomyelitis Vaccine.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Avian Encephalomyelitis Vaccine. 113... REQUIREMENTS Live Virus Vaccines § 113.325 Avian Encephalomyelitis Vaccine. Avian Encephalomyelitis Vaccine... vaccine production. All serials shall be prepared from the first through the fifth passage from the Master...
9 CFR 113.325 - Avian Encephalomyelitis Vaccine.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Avian Encephalomyelitis Vaccine. 113... REQUIREMENTS Live Virus Vaccines § 113.325 Avian Encephalomyelitis Vaccine. Avian Encephalomyelitis Vaccine... vaccine production. All serials shall be prepared from the first through the fifth passage from the Master...
9 CFR 113.208 - Avian Encephalomyelitis Vaccine, Killed Virus.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Avian Encephalomyelitis Vaccine... STANDARD REQUIREMENTS Killed Virus Vaccines § 113.208 Avian Encephalomyelitis Vaccine, Killed Virus. Avian Encephalomyelitis Vaccine (Killed Virus) shall be prepared from virus-bearing tissues or fluids obtained from...
9 CFR 113.208 - Avian Encephalomyelitis Vaccine, Killed Virus.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Avian Encephalomyelitis Vaccine... STANDARD REQUIREMENTS Killed Virus Vaccines § 113.208 Avian Encephalomyelitis Vaccine, Killed Virus. Avian Encephalomyelitis Vaccine (Killed Virus) shall be prepared from virus-bearing tissues or fluids obtained from...
9 CFR 113.325 - Avian Encephalomyelitis Vaccine.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Avian Encephalomyelitis Vaccine. 113... REQUIREMENTS Live Virus Vaccines § 113.325 Avian Encephalomyelitis Vaccine. Avian Encephalomyelitis Vaccine... vaccine production. All serials shall be prepared from the first through the fifth passage from the Master...
9 CFR 113.325 - Avian Encephalomyelitis Vaccine.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Avian Encephalomyelitis Vaccine. 113... REQUIREMENTS Live Virus Vaccines § 113.325 Avian Encephalomyelitis Vaccine. Avian Encephalomyelitis Vaccine... vaccine production. All serials shall be prepared from the first through the fifth passage from the Master...
Xing, Lida; Buckley, Lisa G.; McCrea, Richard T.; Lockley, Martin G.; Zhang, Jianping; Piñuela, Laura; Klein, Hendrik; Wang, Fengping
2015-01-01
Trace fossils provide the only records of Early Cretaceous birds from many parts of the world. The identification of traces from large avian track-makers is made difficult given their overall similarity in size and tridactyly in comparison with traces of small non-avian theropods. Reanalysis of Wupus agilis from the Early Cretaceous (Aptian-Albian) Jiaguan Formation, one of a small but growing number of known avian-pterosaur track assemblages, of southeast China determines that these are the traces of a large avian track-maker, analogous to extant herons. Wupus, originally identified as the trace of a small non-avian theropod track-maker, is therefore similar in both footprint and trackway characteristics to the Early Cretaceous (Albian) large avian trace Limiavipes curriei from western Canada, and Wupus is reassigned to the ichnofamily Limiavipedidae. The reanalysis of Wupus reveals that it and Limiavipes are distinct from similar traces of small to medium-sized non-avian theropods (Irenichnites, Columbosauripus, Magnoavipes) based on their relatively large footprint length to pace length ratio and higher mean footprint splay, and that Wupus shares enough characters with Limiavipes to be reassigned to the ichnofamily Limiavipedidae. The ability to discern traces of large avians from those of small non-avian theropods provides more data on the diversity of Early Cretaceous birds. This analysis reveals that, despite the current lack of body fossils, large wading birds were globally distributed in both Laurasia and Gondwana during the Early Cretaceous. PMID:25993285
Chatziprodromidou, Ioanna P; Arvanitidou, Malamatenia; Guitian, Javier; Apostolou, Thomas; Vantarakis, George; Vantarakis, Apostolos
2018-01-25
We conducted a systematic review to investigate avian influenza outbreaks and to explore their distribution, upon avian influenza subtype, country, avian species and other relating details as no comprehensive epidemiological analysis of global avian influenza outbreaks from 2010 to 2016 exists. Data was collated from four databases (Scopus, Web of Science Core Correlation, PubMed and SpringerLink electronic journal) and a global electronic reporting system (ProMED mail), using PRISMA and ORION systematic approaches. One hundred seventy three avian influenza virus outbreaks were identified and included in this review, alongside 198 ProMED mail reports. Our research identified that the majority of the reported outbreaks occurred in 2016 (22.2%). These outbreaks were located in China (13.6%) and referred to commercial poultry farms (56.1%). The most common subtype reported in these outbreaks was H5N1 (38.2%), while almost 82.5% of the subtypes were highly pathogenic avian influenza viruses. There were differences noticed between ProMED mail and the scientific literature screened. Avian influenza virus has been proved to be able to contaminate all types of avian species, including commercial poultry farms, wild birds, backyard domestic animals, live poultry, game birds and mixed poultry. The study focused on wet markets, slaughterhouses, wild habitats, zoos and natural parks, in both developed and developing countries. The impact of avian influenza virus seems disproportionate and could potentially burden the already existing disparities in the public health domain. Therefore, a collaboration between all the involved health sectors is considered to be more than necessary.
Blanchong, Julie A.; Samuel, Michael D.; Goldberg, Diana R.; Shadduck, Daniel J.; Creekmore, L.H.
2006-01-01
Avian cholera is a significant infectious disease affecting waterfowl across North America and occurs worldwide among various avian species. Despite the importance of this disease, little is known about the factors that cause avian cholera outbreaks and what management strategies might be used to reduce disease mortality. Previous studies indicated that wetland water conditions may affect survival and transmission of Pasteurella multocida, the agent that causes avian cholera. These studies hypothesized that water conditions affect the likelihood that avian cholera outbreaks will occur in specific wetlands. To test these predictions, we collected data from avian cholera outbreak and non-outbreak (control) wetlands throughout North America (wintera??spring 1995a??1996 to 1998a??1999) to evaluate whether water conditions were associated with outbreaks. Conditional logistic regression analysis on paired outbreak and non-outbreak wetlands indicated no significant association between water conditions and the risk of avian cholera outbreaks. For wetlands where avian cholera outbreaks occurred, linear regression showed that increased eutrophic nutrient concentrations (Potassium [K], nitrate [NO3], phosphorus [P], and phosphate [PO3]) were positively related to the abundance of P. multocida recovered from water and sediment samples. Wetland protein concentration and an El Ni??o event were also associated with P. multocida abundance. Our results indicate that wetland water conditions are not strongly associated with the risk of avian cholera outbreaks; however, some variables may play a role in the abundance of P. multocida bacteria and might be important in reducing the severity of avian cholera outbreaks.
Avian Metapneumovirus Subgroup C Infection in Chickens, China
Wei, Li; Zhu, Shanshan; Yan, Xv; Wang, Jing; Zhang, Chunyan; She, Ruiping; Hu, Fengjiao; Quan, Rong
2013-01-01
Avian metapneumovirus causes acute respiratory tract infection and reductions in egg production in various avian species. We isolated and characterized an increasingly prevalent avian metapneumovirus subgroup C strain from meat-type commercial chickens with severe respiratory signs in China. Culling of infected flocks could lead to economic consequences. PMID:23763901
77 FR 34783 - Highly Pathogenic Avian Influenza
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-12
... [Docket No. APHIS-2006-0074] RIN 0579-AC36 Highly Pathogenic Avian Influenza AGENCY: Animal and Plant... regions where any subtype of highly pathogenic avian influenza (HPAI) is considered to exist. The interim... avian influenza (HPAI). On January 24, 2011, we published in the Federal Register (76 FR 4046-4056...
9 CFR 113.117 - Pasteurella Multocida Bacterin, Avian Isolate, Type 1.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Pasteurella Multocida Bacterin, Avian... STANDARD REQUIREMENTS Inactivated Bacterial Products § 113.117 Pasteurella Multocida Bacterin, Avian Isolate, Type 1. Pasteurella Multocida Bacterin, Avian Isolate, Type 1, shall be prepared from cultures of...
9 CFR 113.70 - Pasteurella Multocida Vaccine, Avian Isolate.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Pasteurella Multocida Vaccine, Avian... REQUIREMENTS Live Bacterial Vaccines § 113.70 Pasteurella Multocida Vaccine, Avian Isolate. Pasteurella Multocida Vaccine, Avian Isolate, shall be prepared as a desiccated live culture of an avirulent or modified...
9 CFR 113.70 - Pasteurella Multocida Vaccine, Avian Isolate.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Pasteurella Multocida Vaccine, Avian... REQUIREMENTS Live Bacterial Vaccines § 113.70 Pasteurella Multocida Vaccine, Avian Isolate. Pasteurella Multocida Vaccine, Avian Isolate, shall be prepared as a desiccated live culture of an avirulent or modified...
9 CFR 113.70 - Pasteurella Multocida Vaccine, Avian Isolate.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Pasteurella Multocida Vaccine, Avian... REQUIREMENTS Live Bacterial Vaccines § 113.70 Pasteurella Multocida Vaccine, Avian Isolate. Pasteurella Multocida Vaccine, Avian Isolate, shall be prepared as a desiccated live culture of an avirulent or modified...
9 CFR 113.70 - Pasteurella Multocida Vaccine, Avian Isolate.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Pasteurella Multocida Vaccine, Avian... REQUIREMENTS Live Bacterial Vaccines § 113.70 Pasteurella Multocida Vaccine, Avian Isolate. Pasteurella Multocida Vaccine, Avian Isolate, shall be prepared as a desiccated live culture of an avirulent or modified...
9 CFR 113.70 - Pasteurella Multocida Vaccine, Avian Isolate.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Pasteurella Multocida Vaccine, Avian... REQUIREMENTS Live Bacterial Vaccines § 113.70 Pasteurella Multocida Vaccine, Avian Isolate. Pasteurella Multocida Vaccine, Avian Isolate, shall be prepared as a desiccated live culture of an avirulent or modified...
Avian influenza virus and free-ranging wild birds
Dierauf, Leslie A.; Karesh, W.B.; Ip, Hon S.; Gilardi, K.V.; Fischer, John R.
2006-01-01
Recent media and news reports and other information implicate wild birds in the spread of highly pathogenic avian influenza in Asia and Eastern Europe. Although there is little information concerning highly pathogenic avian influenza viruses in wild birds, scientists have amassed a large amount of data on low-pathogenicity avian influenza viruses during decades of research with wild birds. This knowledge can provide sound guidance to veterinarians, public health professionals, the general public, government agencies, and other entities with concerns about avian influenza.
Numerical simulation of the flow about the F-18 HARV at high angle of attack
NASA Technical Reports Server (NTRS)
Murman, Scott M.
1994-01-01
This report summarizes research done over the past two years as part of NASA Grant NCC 2-729. This research has been aimed at validating numerical methods for computing the flow about the complete F-18 HARV at alpha = 30 deg and alpha = 45 deg. At 30 deg angle of attack, the flow about the F-18 is dominated by the formation, and subsequent breakdown, of strong vortices over the wing leading-edge extensions (LEX). As the angle of attack is increased to alpha = 45 deg, the fuselage forebody of the F-18 contains significant laminar and transitional regions which are not present at alpha = 30 deg. Further, the flow over the LEX at alpha = 45 deg is dominated by an unsteady shedding in time, rather than strong coherent vortices. This complex physics, combined with the complex geometry of a full aircraft configuration, provides a challenge for current computational fluid dynamics (CFD) techniques. The following sections present the numerical method and grid generation scheme that was used, a review of prior research done to numerically model the F-18 HARV, and a discussion of the current research. The current research is broken into two main topics: the effect of engine-inlet mass-flow rate on the F-18 vortex breakdown position, and the results using a refined F-18 computational model to compute the flow at alpha = 30 deg and alpha = 45 deg.
Numerical simulation of the flow about the F-18 HARV at high angle of attack
NASA Technical Reports Server (NTRS)
Murman, Scott M.
1995-01-01
This research has been aimed at validating numerical methods for computing the flow about the complete F-18 HARV at alpha = 30 deg and alpha = 45 deg. At 30 deg angle of attack, the flow about the F-18 is dominated by the formation, and subsequent breakdown, of strong vortices over the wing leading-edge extensions (LEX). As the angle of attack is increased to alpha = 45 deg, the fuselage forebody of the F-18 contains significant laminar and transitional regions which are not present at alpha = 30 deg. Further, the flow over the LEX at alpha = 45 deg is dominated by an unsteady shedding in time, rather than strong coherent vortices. This complex physics, combined with the complex geometry of a full-aircraft configuration, provides a challenge for current computational fluid dynamics (CFD) techniques. The following sections present the numerical method and grid generation scheme that was used, a review of prior research done to numerically model the F-18 HARV, and a discussion of the current research. The current research is broken into three main topics; the effect of engine-inlet mass-flow rate on the F-18 vortex breakdown position, the results using a refined F-18 computational model to compute the flow at alpha = 30 deg and alpha = 45 deg, and research done using the simplified geometry of an ogive-cylinder configuration to investigate the physics of unsteady shear-layer shedding. The last section briefly summarizes the discussion.
Computational analysis of forebody tangential slot blowing on the high alpha research vehicle
NASA Technical Reports Server (NTRS)
Gee, Ken
1994-01-01
Current and future fighter aircraft can maneuver in the high-angle-of-attack flight regime while flying at low subsonic and transonic freestream Mach numbers. However, at any flight speed, the ability of the vertical tails to generate yawing moment is limited in high-angle-of-attack flight. Thus, any system designed to provide the pilot with additional side force and yawing moment must work in both low subsonic and transonic flight. However, previous investigations of the effectiveness of forebody tangential slot blowing in generating the desired control forces and moments have been limited to the low subsonic freestream flow regime. In order to investigate the effectiveness of tangential slot blowing in transonic flight, a computational fluid dynamics analysis was carried out during the grant period. Computational solutions were obtained at three different freestream Mach numbers and at various jet mass flow ratios. All results were obtained using the isolated F/A-18 forebody grid geometry at 30.3 degrees angle of attack. One goal of the research was to determine the effect of freestream Mach number on the effectiveness of forebody tangential slot blowing in generating yawing moment. The second part of the research studied the force onset time lag associated with blowing. The time required for the yawing moment to reach a steady-state value from the onset of blowing may have an impact on the implementation of a pneumatic system on a flight vehicle.
An Active Smart Material Control System for F/A-18 Buffet Alleviation
NASA Technical Reports Server (NTRS)
Sheta, Essam F.; Moses, Robert W.; Huttsell, Lawrence J.; Harrand, Vincent J.
2003-01-01
The vertical tail buffet problem of fighter aircraft occurs at high angles of attack when the vortical flow breaks down ahead of the vertical tails resulting in unsteady and unbalanced pressure loads on the vertical tails. The buffet loads imposed upon the vertical tails resulted in a premature fatigue failure of the tails, and consequently limits the performance and super maneuverability of twin-tail fighter aircraft. An active smart material control system using distributed piezoelectric actuators has been developed for buffet alleviation and is presented. The inboard and outboard surfaces of the vertical tail are equipped with piezoelectric actuators to control the buffet responses in the first bending and torsion modes. The electrodynamics of the piezoelectric actuators are expressed with a three-dimensional finite-element model. A single-input-single-output controller is designed to drive the active piezoelectric actuators. High-fidelity multidisciplinary analysis modules for the fluid dynamics, structure dynamics, electrodynamics of the piezoelectric actuators, control law, fluid structure interfacing, and grid motion are integrated into a multidisciplinary computing environment that controls the temporal synchronization of the analysis modules. At 30 degree angle of attack, RMS values of tip acceleration are reduced by as much as 12%. The peak values of the power spectral density of tail-tip acceleration are reduced by as much as 22% in the first bending mode and by as much as 82% in the first torsion mode. The actively controlled piezoelectric actuators were also effective in adding damping at wide range of angles of attack.
Pandemic Influenza Planning, United States, 1978–2008
Strikas, Raymond A.; Gensheimer, Kathleen F.; Cox, Nancy J.; Redd, Stephen C.
2013-01-01
During the past century, 4 influenza pandemics occurred. After the emergence of a novel influenza virus of swine origin in 1976, national, state, and local US public health authorities began planning efforts to respond to future pandemics. Several events have since stimulated progress in public health emergency planning: the 1997 avian influenza A(H5N1) outbreak in Hong Kong, China; the 2001 anthrax attacks in the United States; the 2003 outbreak of severe acute respiratory syndrome; and the 2003 reemergence of influenza A(H5N1) virus infection in humans. We outline the evolution of US pandemic planning since the late 1970s, summarize planning accomplishments, and explain their ongoing importance. The public health community’s response to the 2009 influenza A(H1N1)pdm09 pandemic demonstrated the value of planning and provided insights into improving future plans and response efforts. Preparedness planning will enhance the collective, multilevel response to future public health crises. PMID:23731839
The role of predators in maintaining the geographic organization of aposematic signals.
Chouteau, Mathieu; Angers, Bernard
2011-12-01
Selective predation of aposematic signals is expected to promote phenotypic uniformity. But while these signals may be uniform within a population, numerous species display impressive variations in warning signals among adjacent populations. Predators from different localities who learn to avoid distinct signals while performing intense selection on others are thus expected to maintain such a geographic organization. We tested this assumption by placing clay frog models, representing distinct color morphs of the Peruvian poison dart frog Ranitomeya imitator and a nonconspicuous frog, reciprocally between adjacent localities. In each locality, avian predators were able to discriminate between warning signals; the adjacent exotic morph experienced up to four times more attacks than the local one and two times more than the nonconspicuous phenotype. Moreover, predation attempts on the exotic morph quickly decreased to almost nil, suggesting rapid learning. This experiment offers direct evidence for the existence of different predator communities performing localized homogenizing selection on distinct aposematic signals.
Proceedings of National Avian-Wind Power Planning Meeting IV
DOE Office of Scientific and Technical Information (OSTI.GOV)
NWCC Avian Subcommittee
2001-05-01
OAK-B135 The purpose of the fourth meeting was to (1) share research and update research conducted on avian wind interactions (2) identify questions and issues related to the research results, (3) develop conclusions about some avian/wind power issues, and (4) identify questions and issues for future avian research.
USDA-ARS?s Scientific Manuscript database
Avian influenza virus (AIV) induced proinflammatory cytokine expression is believed to contribute to the disease pathogenesis following infection. However, there is limited information on the avian immune response to infection with low pathogenic avian influenza virus (LPAIV). To gain a better under...
Qi, Li; Pujanauski, Lindsey M.; Davis, A. Sally; Schwartzman, Louis M.; Chertow, Daniel S.; Baxter, David; Scherler, Kelsey; Hartshorn, Kevan L.; Slemons, Richard D.; Walters, Kathie-Anne; Kash, John C.
2014-01-01
ABSTRACT Zoonotic avian influenza virus infections may lead to epidemics or pandemics. The 1918 pandemic influenza virus has an avian influenza virus-like genome, and its H1 hemagglutinin was identified as a key mammalian virulence factor. A chimeric 1918 virus expressing a contemporary avian H1 hemagglutinin, however, displayed murine pathogenicity indistinguishable from that of the 1918 virus. Here, isogenic chimeric avian influenza viruses were constructed on an avian influenza virus backbone, differing only by hemagglutinin subtype expressed. Viruses expressing the avian H1, H6, H7, H10, and H15 subtypes were pathogenic in mice and cytopathic in normal human bronchial epithelial cells, in contrast to H2-, H3-, H5-, H9-, H11-, H13-, H14-, and H16-expressing viruses. Mouse pathogenicity was associated with pulmonary macrophage and neutrophil recruitment. These data suggest that avian influenza virus hemagglutinins H1, H6, H7, H10, and H15 contain inherent mammalian virulence factors and likely share a key virulence property of the 1918 virus. Consequently, zoonotic infections with avian influenza viruses bearing one of these hemagglutinins may cause enhanced disease in mammals. PMID:25406382
DOE Office of Scientific and Technical Information (OSTI.GOV)
Walston, Leroy J.; Rollins, Katherine E.; LaGory, Kirk E.
Despite the benefits of reduced toxic and carbon emissions and a perpetual energy resource, there is potential for negative environmental impacts resulting from utility-scale solar energy (USSE) development. Although USSE development may represent an avian mortality source, there is little knowledge regarding the magnitude of these impacts in the context of other avian mortality sources. In this study we present a first assessment of avian mortality at USSE facilities through a synthesis of available avian monitoring and mortality information at existing USSE facilities. Using this information, we contextualize USSE avian mortality relative to other forms of avian mortality at 2more » spatial scales: a regional scale (confined to southern California) and a national scale. Systematic avian mortality information was available for three USSE facilities in the southern California region. We estimated annual USSE-related avian mortality to be between 16,200 and 59,400 birds in the southern California region, which was extrapolated to between 37,800 and 138,600 birds for all USSE facilities across the United States that are either installed or under construction. We also discuss issues related to avian–solar interactions that should be addressed in future research and monitoring programs.« less
Singh, Minerva; Friess, Daniel A; Vilela, Bruno; Alban, Jose Don T De; Monzon, Angelica Kristina V; Veridiano, Rizza Karen A; Tumaneng, Roven D
2017-01-01
This study maps distribution and spatial congruence between Above-Ground Biomass (AGB) and species richness of IUCN listed conservation-dependent and endemic avian fauna in Palawan, Philippines. Grey Level Co-Occurrence Texture Matrices (GLCMs) extracted from Landsat and ALOS-PALSAR were used in conjunction with local field data to model and map local-scale field AGB using the Random Forest algorithm (r = 0.92 and RMSE = 31.33 Mg·ha-1). A support vector regression (SVR) model was used to identify the factors influencing variation in avian species richness at a 1km scale. AGB is one of the most important determinants of avian species richness for the study area. Topographic factors and anthropogenic factors such as distance from the roads were also found to strongly influence avian species richness. Hotspots of high AGB and high species richness concentration were mapped using hotspot analysis and the overlaps between areas of high AGB and avian species richness was calculated. Results show that the overlaps between areas of high AGB with high IUCN red listed avian species richness and endemic avian species richness were fairly limited at 13% and 8% at the 1-km scale. The overlap between 1) low AGB and low IUCN richness, and 2) low AGB and low endemic avian species richness was higher at 36% and 12% respectively. The enhanced capacity to spatially map the correlation between AGB and avian species richness distribution will further assist the conservation and protection of forest areas and threatened avian species.
Planning for avian flu disruptions on global operations: a DMAIC case study.
Kumar, Sameer
2012-01-01
The author aims to assess the spread of avian flu, its impact on businesses operating in the USA and overseas, and the measures required for corporate preparedness. Six Sigma DMAIC process is used to analyze avian flu's impact and how an epidemic could affect large US business operations worldwide. Wal-Mart and Dell Computers were chosen as one specializes in retail and the other manufacturing. The study identifies avian flu pandemic risks including failure modes on Wal-Mart and Dell Computers global operations. It reveals the factors that reinforce avian-flu pandemic's negative impact on company global supply chains. It also uncovers factors that balance avian-flu pandemic's impact on their global supply chains. Avian flu and its irregularity affect the research outcomes because its spread could fluctuate based on so many factors that could come into play. Further, the potential cost to manufacturers and other supply chain partners is relatively unknown. As a relatively new phenomenon, quantitative data were not available to determine immediate costs. In this decade, the avian influenza H5N1 virus has killed millions of poultry in Asia, Europe and Africa. This flu strain can infect and kill humans who come into contact with this virus. An avian influenza H5N1 outbreak could lead to a devastating effect on global food supply, business services and business operations. The study provides guidance on what global business operation managers can do to prepare for such events, as well as how avian flu progression to a pandemic can disrupt such operations. This study raises awareness about avian flu's impact on businesses and humans and also highlights the need to create contingency plans for corporate preparedness to avoid incurring losses.
Coates, Peter S.; Casazza, Michael L.; Halstead, Brian J.; Fleskes, Joseph P.; Laughlin, James A.
2011-01-01
Radar systems designed to detect avian activity at airfields are useful in understanding factors that influence the risk of bird and aircraft collisions (bird strikes). We used an avian radar system to measure avian activity at Beale Air Force Base, California, USA, during 2008 and 2009. We conducted a 2-part analysis to examine relationships among avian activity, bird strikes, and meteorological and time-dependent factors. We found that avian activity around the airfield was greater at times when bird strikes occurred than on average using a permutation resampling technique. Second, we developed generalized linear mixed models of an avian activity index (AAI). Variation in AAI was first explained by seasons that were based on average migration dates of birds at the study area. We then modeled AAI by those seasons to further explain variation by meteorological factors and daily light levels within a 24-hour period. In general, avian activity increased with decreased temperature, wind, visibility, precipitation, and increased humidity and cloud cover. These effects differed by season. For example, during the spring bird migration period, most avian activity occurred before sunrise at twilight hours on clear days with low winds, whereas during fall migration, substantial activity occurred after sunrise, and birds generally were more active at lower temperatures. We report parameter estimates (i.e., constants and coefficients) averaged across models and a relatively simple calculation for safety officers and wildlife managers to predict AAI and the relative risk of bird strike based on time, date, and meteorological values. We validated model predictability and assessed model fit. These analyses will be useful for general inference of avian activity and risk assessment efforts. Further investigation and ongoing data collection will refine these inference models and improve our understanding of factors that influence avian activity, which is necessary to inform management decisions aimed at reducing risk of bird strikes.
Sun, Yani; Du, Taofeng; Liu, Baoyuan; Syed, Shahid Faraz; Chen, Yiyang; Li, Huixia; Wang, Xinjie; Zhang, Gaiping; Zhou, En-Min; Zhao, Qin
2016-11-22
From 2014 to 2015 in China, many broiler breeder and layer hen flocks exhibited a decrease in egg production and some chickens developed hepatitis syndrome including hepatomegaly, hepatic necrosis and hemorrhage. Avian hepatitis E virus (HEV) and avian leucosis virus subgroup J (ALV-J) both cause decreasing in egg production, hepatomegaly and hepatic hemorrhage in broiler breeder and layer hens. In the study, the seroprevalence of avian HEV and ALV-J in these flocks emerging the disease from Shandong and Shaanxi provinces were investigated. A total of 1995 serum samples were collected from 14 flocks with hepatitis syndrome in Shandong and Shaanxi provinces, China. Antibodies against avian HEV and ALV-J in these serum samples were detected using iELISAs. The seroprevalence of anti-avian HEV antibodies (35.09%) was significantly higher than that of anti-ALV-J antibodies (2.16%) (p = 0.00). Moreover, the 43 serum samples positive for anti-ALV-J antibodies were all also positive for anti-avian HEV antibodies. In a comparison of both provinces, Shandong chickens exhibited a significantly higher seroprevalence of anti-avian HEV antibodies (42.16%) than Shaanxi chickens (26%) (p = 0.00). In addition, the detection of avian HEV RNA and ALV-J cDNA in the liver samples from the flocks of two provinces also showed the same results of the seroprevalence. In the present study, the results showed that avian HEV infection is widely prevalent and ALV-J infection is endemic in the flocks with hepatitis syndrome from Shandong and Shaanxi provinces of China. These results suggested that avian HEV infection may be the major cause of increased egg drop and hepatitis syndrome observed during the last 2 years in China. These results should be useful to guide development of prevention and control measures to control the diseases within chicken flocks in China.
9 CFR 56.10 - Initial State response and containment plan.
Code of Federal Regulations, 2013 CFR
2013-01-01
.../H7 LOW PATHOGENIC AVIAN INFLUENZA § 56.10 Initial State response and containment plan. (a) In order... and education programs regarding avian influenza. (b) If a State is designated a U.S. Avian Influenza Monitored State, Layers under § 146.24(a) of this chapter or a U.S. Avian Influenza Monitored State, Turkeys...
9 CFR 56.10 - Initial State response and containment plan.
Code of Federal Regulations, 2014 CFR
2014-01-01
.../H7 LOW PATHOGENIC AVIAN INFLUENZA § 56.10 Initial State response and containment plan. (a) In order... and education programs regarding avian influenza. (b) If a State is designated a U.S. Avian Influenza Monitored State, Layers under § 146.24(a) of this chapter or a U.S. Avian Influenza Monitored State, Turkeys...
9 CFR 56.10 - Initial State response and containment plan.
Code of Federal Regulations, 2012 CFR
2012-01-01
.../H7 LOW PATHOGENIC AVIAN INFLUENZA § 56.10 Initial State response and containment plan. (a) In order... and education programs regarding avian influenza. (b) If a State is designated a U.S. Avian Influenza Monitored State, Layers under § 146.24(a) of this chapter or a U.S. Avian Influenza Monitored State, Turkeys...
9 CFR 56.10 - Initial State response and containment plan.
Code of Federal Regulations, 2011 CFR
2011-01-01
.../H7 LOW PATHOGENIC AVIAN INFLUENZA § 56.10 Initial State response and containment plan. (a) In order... and education programs regarding avian influenza. (b) If a State is designated a U.S. Avian Influenza Monitored State, Layers under § 146.24(a) of this chapter or a U.S. Avian Influenza Monitored State, Turkeys...
9 CFR 56.10 - Initial State response and containment plan.
Code of Federal Regulations, 2010 CFR
2010-01-01
.../H7 LOW PATHOGENIC AVIAN INFLUENZA § 56.10 Initial State response and containment plan. (a) In order...) Public awareness and education programs regarding avian influenza. (b) If a State is designated a U.S. Avian Influenza Monitored State, Layers under § 146.24(a) of this chapter or a U.S. Avian Influenza...
Patrick D. Culbert; Volker C. Radeloff; Curtis H. Flather; Josef M. Kellndorfer; Chadwick D. Rittenhouse; Anna M. Pidgeon
2013-01-01
With limited resources for habitat conservation, the accurate identification of high-value avian habitat is crucial. Habitat structure affects avian biodiversity but is difficult to quantify over broad extents. Our goal was to identify which measures of vertical and horizontal habitat structure are most strongly related to patterns of avian biodiversity across the...
The prevention and control of avian influenza: the avian influenza coordinated agriculture project.
Cardona, C; Slemons, R; Perez, D
2009-04-01
The Avian Influenza Coordinated Agriculture Project (AICAP) entitled "Prevention and Control of Avian Influenza in the US" strives to be a significant point of reference for the poultry industry and the general public in matters related to the biology, risks associated with, and the methods used to prevent and control avian influenza. To this end, AICAP has been remarkably successful in generating research data, publications through an extensive network of university- and agency-based researchers, and extending findings to stakeholders. An overview of the highlights of AICAP research is presented.
Padilla, Luis R; Huyvaert, Kathryn P; Merkel, Jane; Miller, R Eric; Parker, Patricia G
2003-09-01
Venipuncture was performed on 50 adult, free-ranging waved albatrosses (Phoebastria irrorata) on Española, Galapagos Islands, Ecuador, to establish hematologic and plasma biochemistry reference ranges and to determine the prevalence of exposure to important domestic avian pathogens. Weights and plasma creatine phosphokinase activities differed significantly between males and females. Serum was tested for evidence of exposure to avian influenza, avian paramyxoviruses 1, 2, and 3, avian cholera, adenovirus groups 1 and 2, avian encephalomyelitis, Marek's disease, infectious bursal disease, and infectious bronchitis virus (Connecticut and Massachusetts strains). Of 44 birds, 29 (66%) seroreacted to adenovirus group 1, and four seroreacted to avian encephalomyelitis. Cloacal swabs were negative for Chlamydophila psittaci DNA.
Otte, A; Sauter, M; Daxer, M A; McHardy, A C; Klingel, K; Gabriel, G
2015-07-01
During the 2009 H1N1 influenza pandemic, infection attack rates were particularly high among young individuals who suffered from pneumonia with occasional death. Moreover, previously reported determinants of mammalian adaptation and pathogenicity were not present in 2009 pandemic H1N1 influenza A viruses. Thus, it was proposed that unknown viral factors might have contributed to disease severity in humans. In this study, we performed a comparative analysis of two clinical 2009 pandemic H1N1 strains that belong to the very early and later phases of the pandemic. We identified mutations in the viral hemagglutinin (HA) and the nucleoprotein (NP) that occurred during pandemic progression and mediate increased virulence in mice. Lethal disease outcome correlated with elevated viral replication in the alveolar epithelium, increased proinflammatory cytokine and chemokine responses, pneumonia, and lymphopenia in mice. These findings show that viral mutations that have occurred during pandemic circulation among humans are associated with severe disease in mice. In this study, novel determinants of 2009 pandemic H1N1 influenza pathogenicity were identified in the viral hemagglutinin (HA) and the nucleoprotein (NP) genes. In contrast to highly pathogenic avian influenza viruses, increased virulence in mice did not correlate with enhanced polymerase activity but with reduced activity. Lethal 2009 pandemic H1N1 infection in mice correlated with lymphopenia and severe pneumonia. These studies suggest that molecular mechanisms that mediate 2009 pandemic H1N1 influenza pathogenicity are distinct from those that mediate avian influenza virus pathogenicity in mice. Copyright © 2015, American Society for Microbiology. All Rights Reserved.
Singh, Minerva; Friess, Daniel A.; Vilela, Bruno; Alban, Jose Don T. De; Monzon, Angelica Kristina V.; Veridiano, Rizza Karen A.; Tumaneng, Roven D.
2017-01-01
This study maps distribution and spatial congruence between Above-Ground Biomass (AGB) and species richness of IUCN listed conservation-dependent and endemic avian fauna in Palawan, Philippines. Grey Level Co-Occurrence Texture Matrices (GLCMs) extracted from Landsat and ALOS-PALSAR were used in conjunction with local field data to model and map local-scale field AGB using the Random Forest algorithm (r = 0.92 and RMSE = 31.33 Mg·ha-1). A support vector regression (SVR) model was used to identify the factors influencing variation in avian species richness at a 1km scale. AGB is one of the most important determinants of avian species richness for the study area. Topographic factors and anthropogenic factors such as distance from the roads were also found to strongly influence avian species richness. Hotspots of high AGB and high species richness concentration were mapped using hotspot analysis and the overlaps between areas of high AGB and avian species richness was calculated. Results show that the overlaps between areas of high AGB with high IUCN red listed avian species richness and endemic avian species richness were fairly limited at 13% and 8% at the 1-km scale. The overlap between 1) low AGB and low IUCN richness, and 2) low AGB and low endemic avian species richness was higher at 36% and 12% respectively. The enhanced capacity to spatially map the correlation between AGB and avian species richness distribution will further assist the conservation and protection of forest areas and threatened avian species. PMID:29206228
Investigation of Influenza Virus Polymerase Activity in Pig Cells
Moncorgé, Olivier; Long, Jason S.; Cauldwell, Anna V.; Zhou, Hongbo; Lycett, Samantha J.
2013-01-01
Reassortant influenza viruses with combinations of avian, human, and/or swine genomic segments have been detected frequently in pigs. As a consequence, pigs have been accused of being a “mixing vessel” for influenza viruses. This implies that pig cells support transcription and replication of avian influenza viruses, in contrast to human cells, in which most avian influenza virus polymerases display limited activity. Although influenza virus polymerase activity has been studied in human and avian cells for many years by use of a minigenome assay, similar investigations in pig cells have not been reported. We developed the first minigenome assay for pig cells and compared the activities of polymerases of avian or human influenza virus origin in pig, human, and avian cells. We also investigated in pig cells the consequences of some known mammalian host range determinants that enhance influenza virus polymerase activity in human cells, such as PB2 mutations E627K, D701N, G590S/Q591R, and T271A. The two typical avian influenza virus polymerases used in this study were poorly active in pig cells, similar to what is seen in human cells, and mutations that adapt the avian influenza virus polymerase for human cells also increased activity in pig cells. In contrast, a different pattern was observed in avian cells. Finally, highly pathogenic avian influenza virus H5N1 polymerase activity was tested because this subtype has been reported to replicate only poorly in pigs. H5N1 polymerase was active in swine cells, suggesting that other barriers restrict these viruses from becoming endemic in pigs. PMID:23077313
Pasick, J; Kahn, S
2014-12-01
The World Organisation for Animal Health (OIE) prescribes standards for the diagnosis and control of avian influenza, as well as health measures for safe trade in birds and avian products, which are based on up-to-date scientific information and risk management principles, consistent with the role of the OIE as a reference standard-setting body for the World Trade Organization (WTO). These standards and recommendations continue to evolve, reflecting advances in technology and scientific understanding of this important zoonotic disease. The avian influenza viruses form part of the natural ecosystem by virtue of their ubiquitous presence in wild aquatic birds, a fact that human intervention cannot change. For the purposes of the Terrestrial Animal Health Code (Terrestrial Code), avian influenza is defined as an infection of poultry. However, the scope of the OIE standards and recommendations is not restricted to poultry, covering the diagnosis, early detection and management of avian influenza, including sanitary measures for trade in birds and avian products. The best way to manage avian influenza-associated risks to human and animal health is for countries to conduct surveillance using recommended methods, to report results in a consistent and transparent manner, and to applythe sanitary measures described in the Terrestrial Code. Surveillance for and timely reporting of avian influenza in accordance with OIE standards enable the distribution of relevant, up-to-date information to the global community.
Charles E. Swift; Kerri T. Vierling; Andrew T. Hudak; Lee A. Vierling
2017-01-01
Ecologists have a long-term interest in understanding the relative influence of vegetation composition and vegetation structure on avian diversity. LiDAR remote sensing is useful in studying local patterns of avian diversity because it characterizes fine-scale vegetation structure across broad extents. We used LiDAR, aerial and satellite imagery, and avian field data...
USDA-ARS?s Scientific Manuscript database
Two hundred samples collected from Anseriformes, Charadriiformes, Gruiformes, and Galliformes were assayed using real-time reverse transcriptase polymerase chain reaction (RRT-PCR) for presence of avian influenza virus and avian paramyxovirus-1. Virus isolation using embryonating chicken eggs, embr...
ERIC Educational Resources Information Center
Springer, W. T.; And Others
1977-01-01
AAAP's Continuing Education Committee surveyed AAAP members in 1975 to determine the history and quality of their formal instruction in avian medicine, their opinion of the importance of avian medicine in veterinary medical education, and what effective methods could be used to stimulate interest in avian medicine. Results are reviewed. (LBH)
Nakamura, Yoshiaki
2017-01-01
Primordial germ cells (PGCs) generate new individuals through differentiation, maturation and fertilization. This means that the manipulation of PGCs is directly linked to the manipulation of individuals, making PGCs attractive target cells in the animal biotechnology field. A unique biological property of avian PGCs is that they circulate temporarily in the vasculature during early development, and this allows us to access and manipulate avian germ lines. Following the development of a technique for transplantation, PGCs have become central to avian biotechnology, in contrast to the use of embryo manipulation and subsequent transfer to foster mothers, as in mammalian biotechnology. Today, avian PGC transplantation combined with recent advanced manipulation techniques, including cell purification, cryopreservation, depletion, and long-term culture in vitro, have enabled the establishment of genetically modified poultry lines and ex-situ conservation of poultry genetic resources. This chapter introduces the principles, history, and procedures of producing avian germline chimeras by transplantation of PGCs, and the current status of avian germline modification as well as germplasm cryopreservation. Other fundamental avian reproductive technologies are described, including artificial insemination and embryo culture, and perspectives of industrial applications in agriculture and pharmacy are considered, including poultry productivity improvement, egg modification, disease resistance impairment and poultry gene "pharming" as well as gene banking.
Avian malaria, ecological host traits and mosquito abundance in southeastern Amazonia.
Fecchio, Alan; Ellis, Vincenzo A; Bell, Jeffrey A; Andretti, Christian B; D'Horta, Fernando M; Silva, Allan M; Tkach, Vasyl V; Weckstein, Jason D
2017-07-01
Avian malaria is a vector transmitted disease caused by Plasmodium and recent studies suggest that variation in its prevalence across avian hosts is correlated with a variety of ecological traits. Here we examine the relationship between prevalence and diversity of Plasmodium lineages in southeastern Amazonia and: (1) host ecological traits (nest location, nest type, flocking behaviour and diet); (2) density and diversity of avian hosts; (3) abundance and diversity of mosquitoes; and (4) season. We used molecular methods to detect Plasmodium in blood samples from 675 individual birds of 120 species. Based on cytochrome b sequences, we recovered 89 lineages of Plasmodium from 136 infected individuals sampled across seven localities. Plasmodium prevalence was homogeneous over time (dry season and flooding season) and space, but heterogeneous among 51 avian host species. Variation in prevalence among bird species was not explained by avian ecological traits, density of avian hosts, or mosquito abundance. However, Plasmodium lineage diversity was positively correlated with mosquito abundance. Interestingly, our results suggest that avian host traits are less important determinants of Plasmodium prevalence and diversity in southeastern Amazonia than in other regions in which they have been investigated.
Investigating the Transonic Flutter Boundary of the Benchmark Supercritical Wing
NASA Technical Reports Server (NTRS)
Heeg, Jennifer; Chwalowski, Pawel
2017-01-01
This paper builds on the computational aeroelastic results published previously and generated in support of the second Aeroelastic Prediction Workshop for the NASA Benchmark Supercritical Wing configuration. The computational results are obtained using FUN3D, an unstructured grid Reynolds-Averaged Navier-Stokes solver developed at the NASA Langley Research Center. The analysis results focus on understanding the dip in the transonic flutter boundary at a single Mach number (0.74), exploring an angle of attack range of ??1 to 8 and dynamic pressures from wind off to beyond flutter onset. The rigid analysis results are examined for insights into the behavior of the aeroelastic system. Both static and dynamic aeroelastic simulation results are also examined.
Cyber-intrusion Auto-response and Policy Management System (CAPMS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lusk, Steve; Lawrence, David; Suvana, Prakash
The Cyber-intrusion Auto-response and Policy Management System (CAPMS) project was funded by a grant from the US Department of Energy (DOE) Cybersecurity for Energy Delivery Systems (CEDS) program with contributions from two partner electric utilities: Southern California Edison (SCE) and Duke Energy. The goal of the project was to demonstrate protecting smart grid assets from a cyber attack in a way that “does not impede critical energy delivery functions.” This report summarizes project goals and activities for the CAPMS project and explores what did and did not work as expected. It concludes with an assessment of possible benefits and valuemore » of the system for the future.« less
NASA Technical Reports Server (NTRS)
Weilmuenster, K. J.; Gnoffo, Peter A.
1992-01-01
A procedure which reduces the memory requirements for computing the viscous flow over a modified Orbiter geometry at a hypersonic flight condition is presented. The Langley Aerothermodynamic Upwind Relaxation Algorithm (LAURA) code which incorporates a thermochemical nonequilibrium chemistry model, a finite rate catalytic wall boundary condition and wall temperature distribution based on radiation equilibrium is used in this study. In addition, the effect of choice of 'min mod' function, eigenvalue limiter and grid density on surface heating is investigated. The surface heating from a flowfield calculation at Mach number 22, altitude of 230,000 ft and 40 deg angle of attack is compared with flight data from three Orbiter flights.
Reduced avian virulence and viremia of West Nile virus isolates from Mexico and Texas.
Brault, Aaron C; Langevin, Stanley A; Ramey, Wanichaya N; Fang, Ying; Beasley, David W C; Barker, Christopher M; Sanders, Todd A; Reisen, William K; Barrett, Alan D T; Bowen, Richard A
2011-10-01
A West Nile virus (WNV) isolate from Mexico (TM171-03) and BIRD1153, a unique genotype from Texas, have exhibited reduced murine neuroinvasive phenotypes. To determine if murine neuroinvasive capacity equates to avian virulence potential, American crow (Corvus brachyrhynchos) and house sparrows (Passer domesticus) were experimentally inoculated with representative murine neuroinvasive/non-neuroinvasive strains. In both avian species, a plaque variant from Mexico that was E-glycosylation competent produced higher viremias than an E-glycosylation-incompetent variant, indicating the potential importance of E-glycosylation for avian replication. The murine non-neuroinvasive BIRD1153 strain was significantly attenuated in American crows but not house sparrows when compared with the murine neuroinvasive Texas strain. Despite the loss of murine neuroinvasive properties of nonglycosylated variants from Mexico, our data indicate avian replication potential of these strains and that unique WNV virulence characteristics exist between murine and avian models. The implications of reduced avian replication of variants from Mexico for restricted WNV transmission in Latin America is discussed.
Reduced Avian Virulence and Viremia of West Nile Virus Isolates from Mexico and Texas
Brault, Aaron C.; Langevin, Stanley A.; Ramey, Wanichaya N.; Fang, Ying; Beasley, David W. C.; Barker, Christopher M.; Sanders, Todd A.; Reisen, William K.; Barrett, Alan D. T.; Bowen, Richard A.
2011-01-01
A West Nile virus (WNV) isolate from Mexico (TM171-03) and BIRD1153, a unique genotype from Texas, have exhibited reduced murine neuroinvasive phenotypes. To determine if murine neuroinvasive capacity equates to avian virulence potential, American crow (Corvus brachyrhynchos) and house sparrows (Passer domesticus) were experimentally inoculated with representative murine neuroinvasive/non-neuroinvasive strains. In both avian species, a plaque variant from Mexico that was E-glycosylation competent produced higher viremias than an E-glycosylation–incompetent variant, indicating the potential importance of E-glycosylation for avian replication. The murine non-neuroinvasive BIRD1153 strain was significantly attenuated in American crows but not house sparrows when compared with the murine neuroinvasive Texas strain. Despite the loss of murine neuroinvasive properties of nonglycosylated variants from Mexico, our data indicate avian replication potential of these strains and that unique WNV virulence characteristics exist between murine and avian models. The implications of reduced avian replication of variants from Mexico for restricted WNV transmission in Latin America is discussed. PMID:21976584
Evidence-Based Advances in Avian Medicine.
Summa, Noémie M; Guzman, David Sanchez-Migallon
2017-09-01
This article presents relevant advances in avian medicine and surgery over the past 5 years. New information has been published to improve clinical diagnosis in avian diseases. This article also describes new pharmacokinetic studies. Advances in the understanding and treatment of common avian disorders are presented in this article, as well. Although important progress has been made over the past years, there is still much research that needs to be done regarding the etiology, pathophysiology, diagnosis, and treatment of avian diseases and evidence-based information is still sparse in the literature. Copyright © 2017 Elsevier Inc. All rights reserved.
Patrick D. Culbert; Volker C. Radeloff; Veronique St-Louis; Curtis H. Flather; Chadwick D. Rittenhouse; Thomas P. Albright; Anna M. Pidgeon
2012-01-01
Avian biodiversity is threatened, and in order to prioritize limited conservation resources and conduct effective conservation planning a better understanding of avian species richness patterns is needed. The use of image texture measures, as a proxy for the spatial structure of land cover and vegetation, has proven useful in explaining patterns of avian abundance and...
Exo-erythrocytic development of avian malaria and related haemosporidian parasites.
Valkiūnas, Gediminas; Iezhova, Tatjana A
2017-03-03
Avian malaria parasites (Plasmodium spp.) and related haemosporidians (Haemosporida) are responsible for diseases which can be severe and even lethal in avian hosts. These parasites cause not only blood pathology, but also damage various organs due to extensive exo-erythrocytic development all over the body, which is not the case during Plasmodium infections in mammals. However, exo-erythrocytic development (tissue merogony or schizogony) remains the most poorly investigated part of life cycle in all groups of wildlife haemosporidian parasites. In spite of remarkable progress in studies of genetic diversity, ecology and evolutionary biology of avian haemosporidians during the past 20 years, there is not much progress in understanding patterns of exo-erythrocytic development in these parasites. The purpose of this review is to overview the main information on exo-erythrocytic development of avian Plasmodium species and related haemosporidian parasites as a baseline for assisting academic and veterinary medicine researchers in morphological identification of these parasites using tissue stages, and to define future research priorities in this field of avian malariology. The data were considered from peer-reviewed articles and histological material that was accessed in zoological collections in museums of Australia, Europe and the USA. Articles describing tissue stages of avian haemosporidians were included from 1908 to the present. Histological preparations of various organs infected with the exo-erythrocytic stages of different haemosporidian parasites were examined. In all, 229 published articles were included in this review. Exo-erythrocytic stages of avian Plasmodium, Fallisia, Haemoproteus, Leucocytozoon, and Akiba species were analysed, compared and illustrated. Morphological characters of tissue stages that can be used for diagnostic purposes were specified. Recent molecular studies combined with histological research show that avian haemosporidians are more virulent than formerly believed. The exo-erythrocytic stages can cause severe disease, especially in non-adapted avian hosts, suggesting the existence of a group of underestimated malignant infections. The development of a given haemosporidian strain can be markedly different in different avian hosts, resulting in significantly different virulence. A methodology combining the traditional histology techniques with molecular diagnostic tools is essential to speed research in this field of avian malariology.
The public health impact of avian influenza viruses.
Katz, J M; Veguilla, V; Belser, J A; Maines, T R; Van Hoeven, N; Pappas, C; Hancock, K; Tumpey, T M
2009-04-01
Influenza viruses with novel hemagglutinin and 1 or more accompanying genes derived from avian influenza viruses sporadically emerge in humans and have the potential to result in a pandemic if the virus causes disease and spreads efficiently in a population that lacks immunity to the novel hemagglutinin. Since 1997, multiple avian influenza virus subtypes have been transmitted directly from domestic poultry to humans and have caused a spectrum of human disease, from asymptomatic to severe and fatal. To assess the pandemic risk that avian influenza viruses pose, we have used multiple strategies to better understand the capacity of avian viruses to infect, cause disease, and transmit among mammals, including humans. Seroepidemiologic studies that evaluate the frequency and risk of human infection with avian influenza viruses in populations with exposure to domestic or wild birds can provide a better understanding of the pandemic potential of avian influenza subtypes. Investigations conducted in Hong Kong following the first H5N1 outbreak in humans in 1997 determined that exposure to poultry in live bird markets was a key risk factor for human disease. Among poultry workers, butchering and exposure to sick poultry were risk factors for antibody to H5 virus, which provided evidence for infection. A second risk assessment tool, the ferret, can be used to evaluate the level of virulence and potential for host-to-host transmission of avian influenza viruses in this naturally susceptible host. Avian viruses isolated from humans exhibit a level of virulence and transmissibility in ferrets that generally reflects that seen in humans. The ferret model thus provides a means to monitor emerging avian influenza viruses for pandemic risk, as well as to evaluate laboratory-generated reassortants and mutants to better understand the molecular basis of influenza virus transmissibility. Taken together, such studies provide valuable information with which we can assess the public health risk of avian influenza viruses.
When animal viruses attack: SARS and avian influenza.
Lee, Paul J; Krilov, Leonard R
2005-01-01
SARS and avian influenza have many common features. They both arose in Asia and originated from animal viruses. They both have the potential to become pandemics because human beings lack antibodies to the animal-derived antigens present on the viral surface and rapid dissemination can occur from the relative ease and availability of high speed and far-reaching transportation methods. Pediatricians, in particular, should remain alert about the possibility of pandemic illnesses in their patients. Annual rates of influenza in children may be 1.5 to 3 times those in the adult population, and infection rates during a community epidemic may exceed 40% in preschool-aged children and 30% in school-aged children. Infected children also play a central role in disseminating influenza, as they are the major point of entry for the virus into the household, from which adults spread disease into the community. Of course, children younger than 24 months also are at high risk for complications from influenza. A 1999 Centers for Disease Control and Prevention projection of an influenza pandemic in the US paints a grim picture: 89,000 to 207,000 deaths, 314,000 to 734,000 hospitalizations, 18 million to 42 million outpatient visits, and 20 million to 47 million additional illnesses, at a cost to society of at least dollars 71.3 billion to dollars 166.5 billion. High-risk patients (15% of the population) would account for approximately 84% of all deaths. Although SARS has been kind to the pediatric population so far, there are no guarantees that future outbreaks would be as sparing. To aid readers in remaining up-to-date with SARS and avian influenza, some useful websites are listed in the Sidebar. Two masters of suspense, Alfred Hitchcock and Stephen King, may have been closer to the truth than they ever would have believed. Both birds and a super flu could bring about the end of civilization as we know it. But all is not lost--to paraphrase Thomas Jefferson, the price of health is eternal vigilance. Although we may not be able to prevent future pandemics, mankind has the ability to recognize new diseases and outbreaks as they occur, to study these infections and find ways to contain and treat them, and to implement the necessary measures to defeat them.
NASA Technical Reports Server (NTRS)
Prabhu, Ramadas K.
2001-01-01
This report documents the results of an inviscid computational study conducted on two aeroshell configurations for a proposed '07 Mars Lander. The aeroshell configurations are asymmetric due to the presence of the tabs at the maximum diameter location. The purpose of these tabs was to change the pitching moment characteristics so that the aeroshell will trim at a non-zero angle of attack and produce a lift-to-drag ratio of approximately -0.25. This is required in the guidance of the vehicle on its trajectory. One of the two configurations is called the shelf and the other is called the tab. The unstructured grid software FELISA with the equilibrium Mars gas option was used for these computations. The computations were done for six points on a preliminary trajectory of the '07 Mars Lander at nominal Mach numbers of 2, 3, 5, 10, 15, and 24. Longitudinal aerodynamic characteristics namely lift, drag, and pitching moment were computed for 10, 15, and 20 degrees angles of attack. The results indicated that the two configurations have aerodynamic characteristics that have very similar aerodynamic characteristics, and provide the desired trim LID of approximately -0.25.
NASA Technical Reports Server (NTRS)
Nelson, Robert C.; Visser, Kenneth D.
1990-01-01
Experimental x-wire measurements of the flowfield above a 70 and 75 deg flat plate delta wing were performed at a Reynolds number of 250,000. Grids were taken normal to the wing at various chordwise locations for angles of attack of 20 and 30 deg. Axial and azimuthal vorticity distributions were derived from the velocity fields. The dependence of circulation on distance from the vortex core and on chordwise location was also examined. The effects of nondimensionalization in comparison with other experimental data is made. The results indicate that the circulation distribution scales with the local semispan and grows in a nearly linear fashion in the chordwise direction. The spanwise distribution of axial vorticity is severely altered through the breakdown. The axial vorticity components with a negative sense, such as that found in the secondary vortex, seem to remain unaffected by changes in wind sweep or angle of attack, in direct contrast to the positive components. In addition, the inclusion of the local wing geometry into a previously derived correlation parameter allows the circulation of growing leading edge vortex flows to be reduced into a single curve.
NASA Astrophysics Data System (ADS)
Vinod, Ashwin; Lawrence, Angela; Banerjee, Arindam
2016-11-01
The effects of elevated freestream turbulence (FST) on the performance of a tidal turbine blade is studied using laboratory experiments. Of interest for the current investigation is elevated levels of FST in the range of 6-24% that is prevalent in deployment sites of tidal turbines. A constant chord, no twist blade section (SG6043) is tested at an operating Reynolds number of 1.5x105 and at angles of attack ranging from -90o to +90o. The parameter space encompasses the entire operational range of a tidal turbine that includes flow reversal. Multiple levels of controlled FST are achieved using an active grid type turbulence generator placed at the entrance to the water tunnel test section. The hydrodynamic loads experienced by the blade section are measured using a 3-axis load cell; a Stereo-PIV technique is used to analyze the flow field around the blade. The results indicate that elevated levels of FST cause a delay in flow separation when compared to the case of a laminar freestream. Furthermore, the lift to drag ratio of the blade is considerably altered depending on the level of FST and angle of attack tested.
Avian respiratory system disorders
Olsen, Glenn H.
1989-01-01
Diagnosing and treating respiratory diseases in avian species requires a basic knowledge about the anatomy and physiology of this system in birds. Differences between mammalian and avian respiratory system function, diagnosis, and treatment are highlighted.
Species difference in ANP32A underlies influenza A virus polymerase host restriction
Long, Jason S.; Giotis, Efstathios S.; Moncorgé, Olivier; Frise, Rebecca; Mistry, Bhakti; James, Joe; Morisson, Mireille; Iqbal, Munir; Vignal, Alain; Skinner, Michael A.; Barclay, Wendy S.
2015-01-01
Influenza pandemics occur unpredictably when zoonotic influenza viruses with novel antigenicity acquire the ability to transmit amongst humans 1. Incompatibilities between avian virus components and the human host limit host range breaches. Barriers include receptor preference, virion stability and poor activity of the avian virus RNA-dependent RNA polymerase in human cells 2. Mutants of the heterotrimeric viral polymerase components, particularly PB2 protein, are selected during mammalian adaptation, but their mode of action is unknown 3–6. We show that a species-specific difference in host protein ANP32A accounts for the suboptimal function of avian virus polymerase in mammalian cells. Avian ANP32A possesses an additional 33 amino acids between the LRR and LCAR domains. In mammalian cells, avian ANP32A rescued the suboptimal function of avian virus polymerase to levels similar to mammalian adapted polymerase. Deletion of the avian-specific sequence from chicken ANP32A abrogated this activity whereas its insertion into human ANP32A, or closely related ANP32B, supported avian virus polymerase function. Substitutions, such as PB2 E627K, rapidly selected upon infection of humans with avian H5N1 or H7N9 influenza viruses, adapt the viral polymerase for the shorter mammalian ANP32A. Thus ANP32A represents an essential host partner co-opted to support influenza virus replication and is a candidate host target for novel antivirals. PMID:26738596
Human‐Aided Movement of Viral Disease and the Archaeology of Avian Osteopetrosis
2017-01-01
Abstract The term avian osteopetrosis is used to describe alterations to the skeletal elements of several species of domestic bird, most typically the chicken, Gallus gallus domesticus (L. 1758). Such lesions are routinely identified in animal bones from archaeological sites due to their distinctive appearance, which is characterised by proliferative diaphyseal thickening. These lesions are relatively uncomplicated for specialists to differentially diagnose and are caused by a range of avian leucosis viruses in a series of subgroups. Only some avian leucosis viruses cause the development of such characteristic lesions in osteological tissue. Viraemia is necessary for the formation of skeletal pathology, and avian osteopetrosis lesions affect skeletal elements at different rates. Lesion expression differs by the age and sex of the infected individual, and environmental conditions have an impact on the prevalence of avian leucosis viruses in poultry flocks. These factors have implications for the ways in which diagnosed instances of avian osteopetrosis in archaeological assemblages are interpreted. By integrating veterinary research with archaeological evidence for the presence of avian leucosis viruses across Western Europe, this paper discusses the nature of these pathogens, outlines criteria for differential diagnosis, and offers a fresh perspective on the human‐aided movement of animal disease in the past through investigation of the incidence and geographic distribution of avian osteopetrosis lesions from the first century BC to the post‐medieval period. © 2017 The Authors International Journal of Osteoarchaeology Published by John Wiley & Sons Ltd. PMID:29104410
Wille, Michelle; McBurney, Scott; Robertson, Gregory J; Wilhelm, Sabina I; Blehert, David S; Soos, Catherine; Dunphy, Ron; Whitney, Hugh
2016-10-01
Avian cholera, caused by the bacterium Pasteurella multocida , is an endemic disease globally, often causing annual epizootics in North American wild bird populations with thousands of mortalities. From December 2006 to March 2007, an avian cholera outbreak caused mortality in marine birds off the coast of Atlantic Canada, largely centered 300-400 km off the coast of the island of Newfoundland. Scavenging gulls ( Larus spp.) were the primary species detected; however, mortality was also identified in Black-legged Kittiwakes ( Rissa tridactyla ) and one Common Raven ( Corvus corax ), a nonmarine species. The most common gross necropsy findings in the birds with confirmed avian cholera were acute fibrinous and necrotizing lesions affecting the spleen, air sacs, and pericardium, and nonspecific hepatomegaly and splenomegaly. The etiologic agent, P. multocida serotype 1, was recovered from 77 of 136 carcasses examined, and confirmed or probable avian cholera was diagnosed in 85 cases. Mortality observed in scavenging gull species was disproportionately high relative to their abundance, particularly when compared to nonscavenging species. The presence of feather shafts in the ventricular lumen of the majority of larid carcasses diagnosed with avian cholera suggests scavenging of birds that died from avian cholera as a major mode of transmission. This documentation of an outbreak of avian cholera in a North American pelagic environment affecting primarily scavenging gulls indicates that offshore marine environments may be a component of avian cholera dynamics.
Wille, Michelle; McBurney, Scott; Robertson, Gregory J.; Wilhelm, Sabine; Blehert, David; Soos, Catherine; Dunphy, Ron; Whitney, Hugh
2016-01-01
Avian cholera, caused by the bacterium Pasteurella multocida, is an endemic disease globally, often causing annual epizootics in North American wild bird populations with thousands of mortalities. From December 2006 to March 2007, an avian cholera outbreak caused mortality in marine birds off the coast of Atlantic Canada, largely centered 300–400 km off the coast of the island of Newfoundland. Scavenging gulls (Larus spp.) were the primary species detected; however, mortality was also identified in Black-legged Kittiwakes (Rissa tridactyla) and one Common Raven (Corvus corax), a nonmarine species. The most common gross necropsy findings in the birds with confirmed avian cholera were acute fibrinous and necrotizing lesions affecting the spleen, air sacs, and pericardium, and nonspecific hepatomegaly and splenomegaly. The etiologic agent, P. multocida serotype 1, was recovered from 77 of 136 carcasses examined, and confirmed or probable avian cholera was diagnosed in 85 cases. Mortality observed in scavenging gull species was disproportionately high relative to their abundance, particularly when compared to nonscavenging species. The presence of feather shafts in the ventricular lumen of the majority of larid carcasses diagnosed with avian cholera suggests scavenging of birds that died from avian cholera as a major mode of transmission. This documentation of an outbreak of avian cholera in a North American pelagic environment affecting primarily scavenging gulls indicates that offshore marine environments may be a component of avian cholera dynamics.
2017-01-01
Due to the increased frequency of interspecies transmission of avian influenza viruses, studies designed to identify the molecular determinants that could lead to an expansion of the host range have been increased. A variety of mouse-based mammalian-adaptation studies of avian influenza viruses have provided insight into the genetic alterations of various avian influenza subtypes that may contribute to the generation of a pandemic virus. To date, the studies have focused on avian influenza subtypes H5, H6, H7, H9, and H10 which have recently caused human infection. Although mice cannot fully reflect the course of human infection with avian influenza, these mouse studies can be a useful method for investigating potential mammalian adaptive markers against newly emerging avian influenza viruses. In addition, due to the lack of appropriate vaccines against the diverse emerging influenza viruses, the generation of mouse-adapted lethal variants could contribute to the development of effective vaccines or therapeutic agents. Within this review, we will summarize studies that have demonstrated adaptations of avian influenza viruses that result in an altered pathogenicity in mice which may suggest the potential application of mouse-lethal strains in the development of influenza vaccines and/or therapeutics in preclinical studies. PMID:28775972
Human health implications of avian influenza viruses and paramyxoviruses.
Capua, I; Alexander, D J
2004-01-01
Among avian influenza viruses and avian paramyxoviruses are the aetiological agents of two of the most devastating diseases of the animal kingdom: (i). the highly pathogenic form of avian influenza, caused by some viruses of the H5 and H7 subtypes, and (ii). Newcastle disease, caused by virulent strains of APMV type 1. Mortality rates due to these agents can exceed 50% in naïve bird populations, and, for some strains of AI, nearly 100%. These viruses may also be responsible for clinical conditions in humans. The virus responsible for Newcastle disease has been known to cause conjunctivitis in humans since the 1940s. The conjunctivitis is self-limiting and does not have any permanent consequences. Until 1997, reports of human infection with avian influenza viruses were sporadic and frequently associated with conjunctivitis. Recently, however, avian influenza virus infections have been associated with fatalities in human beings. These casualties have highlighted the potential risk that this type of infection poses to public health. In particular, the pathogenetic mechanisms of highly pathogenic avian influenza viruses in birds and the possibility of reassortment between avian and human viruses in the human host represent serious threats to human health. For this reason, any suspected case should be investigated thoroughly.
Multi-species patterns of avian cholera mortality in Nebraska's rainwater basin
Blanchong, Julie A.; Samuel, M.D.; Mack, G.
2006-01-01
Nebraska's Rainwater Basin (RWB) is a key spring migration area for millions of waterfowl and other avian species. Avian cholera has been endemic in the RWB since the 1970s and in some years tens of thousands of waterfowl have died from the disease. We evaluated patterns of avian cholera mortality in waterfowl species using the RWB during the last quarter of the 20th century. Mortality patterns changed between the years before (1976 - 1988) and coincident with (1989 - 1999) the dramatic increases in lesser snow goose abundance and mortality. Lesser snow geese (Chen caerulescens caerulescens) have commonly been associated with mortality events in the RWB and are known to carry virulent strains of Pasteurella multocida, the agent causing avian cholera. Lesser snow geese appeared to be the species most affected by avian cholera during 1989 - 1999; however, mortality in several other waterfowl species was positively correlated with lesser snow goose mortality. Coincident with increased lesser snow goose mortality, spring avian cholera outbreaks were detected earlier and ended earlier compared to 1976 - 1988. Dense concentrations of lesser snow geese may facilitate intraspecific disease transmission through bird-to-bird contact and wetland contamination. Rates of interspecific avian cholera transmission within the waterfowl community, however, are difficult to determine.
USDA-ARS?s Scientific Manuscript database
Avian paramyxovirus infections have been reported for chickens and turkeys in association with respiratory disease or drops in egg production. This book chapter provides general information on etiology, clinical signs, lesions, diagnosis, prevention and control of avian paramyxoviruses except Newcas...
Carcass Management During Avian Influenza Outbreaks
This page on Avian Influenza (AI) describes carcass management during Avian Flu outbreaks, including who oversees carcass management, how they're managed, environmental concerns from carcass management, and disinfection. The page also describes what AI is.
Antibody responses to avian influenza viruses in wild birds broaden with age
Manvell, Ruth J.; Schulenburg, Bodo; Shell, Wendy; Wikramaratna, Paul S.; Perrins, Christopher; Sheldon, Ben C.; Brown, Ian H.; Pybus, Oliver G.
2016-01-01
For viruses such as avian influenza, immunity within a host population can drive the emergence of new strains by selecting for viruses with novel antigens that avoid immune recognition. The accumulation of acquired immunity with age is hypothesized to affect how influenza viruses emerge and spread in species of different lifespans. Despite its importance for understanding the behaviour of avian influenza viruses, little is known about age-related accumulation of immunity in the virus's primary reservoir, wild birds. To address this, we studied the age structure of immune responses to avian influenza virus in a wild swan population (Cygnus olor), before and after the population experienced an outbreak of highly pathogenic H5N1 avian influenza in 2008. We performed haemagglutination inhibition assays on sampled sera for five avian influenza strains and show that breadth of response accumulates with age. The observed age-related distribution of antibody responses to avian influenza strains may explain the age-dependent mortality observed during the highly pathogenic H5N1 outbreak. Age structures and species lifespan are probably important determinants of viral epidemiology and virulence in birds. PMID:28003449
Avian-like breathing mechanics in maniraptoran dinosaurs
Codd, Jonathan R; Manning, Phillip L; Norell, Mark A; Perry, Steven F
2007-01-01
In 1868 Thomas Huxley first proposed that dinosaurs were the direct ancestors of birds and subsequent analyses have identified a suite of ‘avian’ characteristics in theropod dinosaurs. Ossified uncinate processes are found in most species of extant birds and also occur in extinct non-avian maniraptoran dinosaurs. Their presence in these dinosaurs represents another morphological character linking them to Aves, and further supports the presence of an avian-like air-sac respiratory system in theropod dinosaurs, prior to the evolution of flight. Here we report a phylogenetic analysis of the presence of uncinate processes in Aves and non-avian maniraptoran dinosaurs indicating that these were homologous structures. Furthermore, recent work on Canada geese has demonstrated that uncinate processes are integral to the mechanics of avian ventilation, facilitating both inspiration and expiration. In extant birds, uncinate processes function to increase the mechanical advantage for movements of the ribs and sternum during respiration. Our study presents a mechanism whereby uncinate processes, in conjunction with lateral and ventral movements of the sternum and gastral basket, affected avian-like breathing mechanics in extinct non-avian maniraptoran dinosaurs. PMID:17986432
Ecology and conservation biology of avian malaria.
Lapointe, Dennis A; Atkinson, Carter T; Samuel, Michael D
2012-02-01
Avian malaria is a worldwide mosquito-borne disease caused by Plasmodium parasites. These parasites occur in many avian species but primarily affect passerine birds that have not evolved with the parasite. Host pathogenicity, fitness, and population impacts are poorly understood. In contrast to continental species, introduced avian malaria poses a substantial threat to naive birds on Hawaii, the Galapagos, and other archipelagoes. In Hawaii, transmission is maintained by susceptible native birds, competence and abundance of mosquitoes, and a disease reservoir of chronically infected native birds. Although vector habitat and avian communities determine the geographic distribution of disease, climate drives transmission patterns ranging from continuous high infection in warm lowland forests, seasonal infection in midelevation forests, and disease-free refugia in cool high-elevation forests. Global warming is expected to increase the occurrence, distribution, and intensity of avian malaria across this elevational gradient and threaten high-elevation refugia, which is the key to survival of many susceptible Hawaiian birds. Increased temperatures may have already increased global avian malaria prevalence and contributed to an emergence of disease in New Zealand. © 2012 New York Academy of Sciences.
Ecology and conservation biology of avian malaria
LaPointe, Dennis A.; Atkinson, Carter T.; Samuel, Michael D.
2012-01-01
Avian malaria is a worldwide mosquito-borne disease caused by Plasmodium parasites. These parasites occur in many avian species but primarily affect passerine birds that have not evolved with the parasite. Host pathogenicity, fitness, and population impacts are poorly understood. In contrast to continental species, introduced avian malaria poses a substantial threat to naive birds on Hawaii, the Galapagos, and other archipelagoes. In Hawaii, transmission is maintained by susceptible native birds, competence and abundance of mosquitoes, and a disease reservoir of chronically infected native birds. Although vector habitat and avian communities determine the geographic distribution of disease, climate drives transmission patterns ranging from continuous high infection in warm lowland forests, seasonal infection in midelevation forests, and disease-free refugia in cool high-elevation forests. Global warming is expected to increase the occurrence, distribution, and intensity of avian malaria across this elevational gradient and threaten high-elevation refugia, which is the key to survival of many susceptible Hawaiian birds. Increased temperatures may have already increased global avian malaria prevalence and contributed to an emergence of disease in New Zealand.
NASA Technical Reports Server (NTRS)
Iek, Chanthy; Boldman, Donald R.; Ibrahim, Mounir
1993-01-01
A time marching Navier-Stokes code called PARC3D was used to study the 3-D viscous flow associated with an advanced ducted propeller (ADP) subsonic inlet at take-off operating conditions. At a free stream Mach number of 0.2, experimental data for the inlet-with-propeller test model indicated that the airflow was attached on the cowl windward lip at an angle of attack of 25 degrees became unstable at 29 degrees, and separated at 30 degrees. An experimental study with a similar inlet and with no propeller (through-flow) indicated that flow separation occurred at an angle of attack a few degrees below the value observed when the inlet was tested with the propeller. This tends to indicate that the propeller exerts a favorable effect on the inlet performance. During the through-flow experiment a stationary blockage device was used to successfully simulate the propeller effect on the inlet flow field at angles of attack. In the present numerical study, this flow blockage was modeled via a PARC3D computational boundary condition (BC) called the screen BC. The principle formulation of this BC was based on the one-and-half dimension actuator disk theory. This screen BC was applied at the inlet propeller face station of the computational grid. Numerical results were obtained with and without the screen BC. The application of the screen BC in this numerical study provided results which are similar to the results of past experimental efforts in which either the blockage device or the propeller was used.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-25
...] Authorization of Emergency Use of an In Vitro Diagnostic for Detection of the Novel Avian Influenza A(H7N9... Authorization) for an in vitro diagnostic device for detection of the novel avian influenza A(H7N9) virus. FDA... security of U.S. citizens living abroad that involves the novel avian influenza A(H7N9) virus. On the basis...
Novel Reassortant Clade 2.3.4.4 Avian Influenza A(H5N8) Virus in Wild Aquatic Birds, Russia, 2016.
Lee, Dong-Hun; Sharshov, Kirill; Swayne, David E; Kurskaya, Olga; Sobolev, Ivan; Kabilov, Marsel; Alekseev, Alexander; Irza, Victor; Shestopalov, Alexander
2017-02-01
The emergence of novel avian influenza viruses in migratory birds is of concern because of the potential for virus dissemination during fall migration. We report the identification of novel highly pathogenic avian influenza viruses of subtype H5N8, clade 2.3.4.4, and their reassortment with other avian influenza viruses in waterfowl and shorebirds of Siberia.
Circulating avian influenza viruses closely related to the 1918 virus have pandemic potential
Watanabe, Tokiko; Zhong, Gongxun; Russell, Colin A.; Nakajima, Noriko; Hatta, Masato; Hanson, Anthony; McBride, Ryan; Burke, David F.; Takahashi, Kenta; Fukuyama, Satoshi; Tomita, Yuriko; Maher, Eileen A.; Watanabe, Shinji; Imai, Masaki; Neumann, Gabriele; Hasegawa, Hideki; Paulson, James C.; Smith, Derek J.; Kawaoka, Yoshihiro
2014-01-01
Summary Wild birds harbor a large gene pool of influenza A viruses that have the potential to cause influenza pandemics. Foreseeing and understanding this potential is important for effective surveillance. Our phylogenetic and geographic analyses revealed the global prevalence of avian influenza virus genes whose proteins differ only a few amino acids from the 1918 pandemic influenza virus, suggesting that 1918-like pandemic viruses may emerge in the future. To assess this risk, we generated and characterized a virus composed of avian influenza viral segments with high homology to the 1918 virus. This virus exhibited higher pathogenicity in mice and ferrets than an authentic avian influenza virus. Further, acquisition of seven amino acid substitutions in the viral polymerases and the hemagglutinin surface glycoprotein conferred respiratory droplet transmission to the 1918-like avian virus in ferrets, demonstrating that contemporary avian influenza viruses with 1918 virus-like proteins may have pandemic potential. PMID:24922572
The Applied Mathematics for Power Systems (AMPS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chertkov, Michael
2012-07-24
Increased deployment of new technologies, e.g., renewable generation and electric vehicles, is rapidly transforming electrical power networks by crossing previously distinct spatiotemporal scales and invalidating many traditional approaches for designing, analyzing, and operating power grids. This trend is expected to accelerate over the coming years, bringing the disruptive challenge of complexity, but also opportunities to deliver unprecedented efficiency and reliability. Our Applied Mathematics for Power Systems (AMPS) Center will discover, enable, and solve emerging mathematics challenges arising in power systems and, more generally, in complex engineered networks. We will develop foundational applied mathematics resulting in rigorous algorithms and simulation toolboxesmore » for modern and future engineered networks. The AMPS Center deconstruction/reconstruction approach 'deconstructs' complex networks into sub-problems within non-separable spatiotemporal scales, a missing step in 20th century modeling of engineered networks. These sub-problems are addressed within the appropriate AMPS foundational pillar - complex systems, control theory, and optimization theory - and merged or 'reconstructed' at their boundaries into more general mathematical descriptions of complex engineered networks where important new questions are formulated and attacked. These two steps, iterated multiple times, will bridge the growing chasm between the legacy power grid and its future as a complex engineered network.« less
NASA Technical Reports Server (NTRS)
Elmiligui, Alaa A.; Abdol-Hamid, Khaled S.; Massey, Steven J.
2009-01-01
In this chapter numerical simulations of the flow around F-16XL are performed as a contribution to the Cranked Arrow Wing Aerodynamic Project International (CAWAPI) using the PAB3D CFD code. Two turbulence models are used in the calculations: a standard k-epsilon model, and the Shih-Zhu-Lumley (SZL) algebraic stress model. Seven flight conditions are simulated for the flow around the F-16XL where the free stream Mach number varies from 0.242 to 0.97. The range of angles of attack varies from 0 deg to 20 deg. Computational results, surface static pressure, boundary layer velocity profiles, and skin friction are presented and compared with flight data. Numerical results are generally in good agreement with flight data, considering that only one grid resolution is utilized for the different flight conditions simulated in this study. The Algebraic Stress Model (ASM) results are closer to the flight data than the k-epsilon model results. The ASM predicted a stronger primary vortex, however, the origin of the vortex and footprint is approximately the same as in the k-epsilon predictions.
Analysis of the Effects of Streamwise Lift Distribution on Sonic Boom Signature
NASA Technical Reports Server (NTRS)
Yoo, Paul
2013-01-01
Investigation of sonic boom has been one of the major areas of study in aeronautics due to the benefits a low-boom aircraft has in both civilian and military applications. This work conducts a numerical analysis of the effects of streamwise lift distribution on the shock coalescence characteristics. A simple wing-canard-stabilator body model is used in the numerical simulation. The streamwise lift distribution is varied by fixing the canard at a deflection angle while trimming the aircraft with the wing and the stabilator at the desired lift coefficient. The lift and the pitching moment coefficients are computed using the Missile DATCOM v. 707. The flow field around the wing-canard- stabilator body model is resolved using the OVERFLOW-2 flow solver. Overset/ chimera grid topology is used to simplify the grid generation of various configurations representing different streamwise lift distributions. The numerical simulations are performed without viscosity unless it is required for numerical stability. All configurations are simulated at Mach 1.4, angle-of-attack of 1.50, lift coefficient of 0.05, and pitching moment coefficient of approximately 0. Four streamwise lift distribution configurations were tested.
Towards a Low-Cost Remote Memory Attestation for the Smart Grid
Yang, Xinyu; He, Xiaofei; Yu, Wei; Lin, Jie; Li, Rui; Yang, Qingyu; Song, Houbing
2015-01-01
In the smart grid, measurement devices may be compromised by adversaries, and their operations could be disrupted by attacks. A number of schemes to efficiently and accurately detect these compromised devices remotely have been proposed. Nonetheless, most of the existing schemes detecting compromised devices depend on the incremental response time in the attestation process, which are sensitive to data transmission delay and lead to high computation and network overhead. To address the issue, in this paper, we propose a low-cost remote memory attestation scheme (LRMA), which can efficiently and accurately detect compromised smart meters considering real-time network delay and achieve low computation and network overhead. In LRMA, the impact of real-time network delay on detecting compromised nodes can be eliminated via investigating the time differences reported from relay nodes. Furthermore, the attestation frequency in LRMA is dynamically adjusted with the compromised probability of each node, and then, the total number of attestations could be reduced while low computation and network overhead can be achieved. Through a combination of extensive theoretical analysis and evaluations, our data demonstrate that our proposed scheme can achieve better detection capacity and lower computation and network overhead in comparison to existing schemes. PMID:26307998
Towards a Low-Cost Remote Memory Attestation for the Smart Grid.
Yang, Xinyu; He, Xiaofei; Yu, Wei; Lin, Jie; Li, Rui; Yang, Qingyu; Song, Houbing
2015-08-21
In the smart grid, measurement devices may be compromised by adversaries, and their operations could be disrupted by attacks. A number of schemes to efficiently and accurately detect these compromised devices remotely have been proposed. Nonetheless, most of the existing schemes detecting compromised devices depend on the incremental response time in the attestation process, which are sensitive to data transmission delay and lead to high computation and network overhead. To address the issue, in this paper, we propose a low-cost remote memory attestation scheme (LRMA), which can efficiently and accurately detect compromised smart meters considering real-time network delay and achieve low computation and network overhead. In LRMA, the impact of real-time network delay on detecting compromised nodes can be eliminated via investigating the time differences reported from relay nodes. Furthermore, the attestation frequency in LRMA is dynamically adjusted with the compromised probability of each node, and then, the total number of attestations could be reduced while low computation and network overhead can be achieved. Through a combination of extensive theoretical analysis and evaluations, our data demonstrate that our proposed scheme can achieve better detection capacity and lower computation and network overhead in comparison to existing schemes.
A Security Monitoring Framework For Virtualization Based HEP Infrastructures
NASA Astrophysics Data System (ADS)
Gomez Ramirez, A.; Martinez Pedreira, M.; Grigoras, C.; Betev, L.; Lara, C.; Kebschull, U.;
2017-10-01
High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system calls for detecting anomalies that indicate the presence of a malicious agent. They should also be able to perform automated reactions to attacks without administrator intervention. We describe a novel framework that accomplishes these requirements, with a proof of concept implementation for the ALICE experiment at CERN. We show how we achieve a fully virtualized environment that improves the security by isolating services and Jobs without a significant performance impact. We also describe a collected dataset for Machine Learning based Intrusion Prevention and Detection Systems on Grid computing. This dataset is composed of resource consumption measurements (such as CPU, RAM and network traffic), logfiles from operating system services, and system call data collected from production Jobs running in an ALICE Grid test site and a big set of malware samples. This malware set was collected from security research sites. Based on this dataset, we will proceed to develop Machine Learning algorithms able to detect malicious Jobs.
Do Bird Friendly® Coffee Criteria Benefit Mammals? Assessment of Mammal Diversity in Chiapas, Mexico
Caudill, S. Amanda; Rice, Robert A.
2016-01-01
Biodiversity-friendly coffee certifications offer a viable way to protect wildlife habitat while providing a financial incentive to farmers. Most studies related to these certifications focus on avian habitat requirements and it is not known whether these standards also apply to other wildlife, such as mammals, that inhabit the coffee landscapes. We assessed the non-volant mammalian fauna and their associated habitat requirements in 23 sites representing forest, Bird Friendly® shade, conventional shade, and sun coffee habitats. We used Sherman trap-grids to measure small mammal abundance and richness, while camera traps were set for medium-sized and large mammals. We detected 17 species of mammals, representing 11 families. This preliminary study indicates that coffee farms in this region provide an important refuge for mammalian wildlife. Mammal species density ranked significantly higher in Bird Friendly® coffee sites than other coffee habitats, although there was no significant difference for species richness (using Chao2 estimator) among the habitat types. No significant difference was found in small mammal abundance among the habitat types. We found a higher species density of medium and large mammals in sites with larger, more mature shade trees associated with, but not required by Bird Friendly® certification standards. However, lower strata vegetation (5 cm to 1 m tall), the only vegetation parameter found to increase abundance and density for small mammals, is not specified in the Bird Friendly® standards. Our findings suggest that although the standards devised for avian habitat do benefit mammals, further study is needed on the requirements specific for mammals that could be included to enhance the coffee habitat for mammals that inhabit these coffee landscapes. PMID:27880773
Caudill, S Amanda; Rice, Robert A
2016-01-01
Biodiversity-friendly coffee certifications offer a viable way to protect wildlife habitat while providing a financial incentive to farmers. Most studies related to these certifications focus on avian habitat requirements and it is not known whether these standards also apply to other wildlife, such as mammals, that inhabit the coffee landscapes. We assessed the non-volant mammalian fauna and their associated habitat requirements in 23 sites representing forest, Bird Friendly® shade, conventional shade, and sun coffee habitats. We used Sherman trap-grids to measure small mammal abundance and richness, while camera traps were set for medium-sized and large mammals. We detected 17 species of mammals, representing 11 families. This preliminary study indicates that coffee farms in this region provide an important refuge for mammalian wildlife. Mammal species density ranked significantly higher in Bird Friendly® coffee sites than other coffee habitats, although there was no significant difference for species richness (using Chao2 estimator) among the habitat types. No significant difference was found in small mammal abundance among the habitat types. We found a higher species density of medium and large mammals in sites with larger, more mature shade trees associated with, but not required by Bird Friendly® certification standards. However, lower strata vegetation (5 cm to 1 m tall), the only vegetation parameter found to increase abundance and density for small mammals, is not specified in the Bird Friendly® standards. Our findings suggest that although the standards devised for avian habitat do benefit mammals, further study is needed on the requirements specific for mammals that could be included to enhance the coffee habitat for mammals that inhabit these coffee landscapes.
Identifying avian sources of faecal contamination using sterol analysis.
Devane, Megan L; Wood, David; Chappell, Andrew; Robson, Beth; Webster-Brown, Jenny; Gilpin, Brent J
2015-10-01
Discrimination of the source of faecal pollution in water bodies is an important step in the assessment and mitigation of public health risk. One tool for faecal source tracking is the analysis of faecal sterols which are present in faeces of animals in a range of distinctive ratios. Published ratios are able to discriminate between human and herbivore mammal faecal inputs but are of less value for identifying pollution from wildfowl, which can be a common cause of elevated bacterial indicators in rivers and streams. In this study, the sterol profiles of 50 avian-derived faecal specimens (seagulls, ducks and chickens) were examined alongside those of 57 ruminant faeces and previously published sterol profiles of human wastewater, chicken effluent and animal meatwork effluent. Two novel sterol ratios were identified as specific to avian faecal scats, which, when incorporated into a decision tree with human and herbivore mammal indicative ratios, were able to identify sterols from avian-polluted waterways. For samples where the sterol profile was not consistent with herbivore mammal or human pollution, avian pollution is indicated when the ratio of 24-ethylcholestanol/(24-ethylcholestanol + 24-ethylcoprostanol + 24-ethylepicoprostanol) is ≥0.4 (avian ratio 1) and the ratio of cholestanol/(cholestanol + coprostanol + epicoprostanol) is ≥0.5 (avian ratio 2). When avian pollution is indicated, further confirmation by targeted PCR specific markers can be employed if greater confidence in the pollution source is required. A 66% concordance between sterol ratios and current avian PCR markers was achieved when 56 water samples from polluted waterways were analysed.
NASA Technical Reports Server (NTRS)
Liu, Tianshu; Kuykendoll, K.; Rhew, R.; Jones, S.
2004-01-01
This paper describes the avian wing geometry (Seagull, Merganser, Teal and Owl) extracted from non-contact surface measurements using a three-dimensional laser scanner. The geometric quantities, including the camber line and thickness distribution of airfoil, wing planform, chord distribution, and twist distribution, are given in convenient analytical expressions. Thus, the avian wing surfaces can be generated and the wing kinematics can be simulated. The aerodynamic characteristics of avian airfoils in steady inviscid flows are briefly discussed. The avian wing kinematics is recovered from videos of three level-flying birds (Crane, Seagull and Goose) based on a two-jointed arm model. A flapping seagull wing in the 3D physical space is re-constructed from the extracted wing geometry and kinematics.
Studies on the serological relationships between avian pox, sheep pox, goat pox and vaccinia viruses
Uppal, P. K.; Nilakantan, P. R.
1970-01-01
By using neutralization, complement fixation and immunogel-diffusion tests, it has been demonstrated that cross-reactions occur between various avian pox viruses and between sheep pox and goat pox viruses. No such reactions were demonstrated between avian pox viruses and vaccinia virus or between avian pox and sheep pox and goat pox viruses. Furthermore, no serological relationship was demonstrable between vaccinia virus and sheep pox and goat pox viruses. PMID:4989854
Pandemic Threat Posed by Avian Influenza A Viruses
Horimoto, Taisuke; Kawaoka, Yoshihiro
2001-01-01
Influenza pandemics, defined as global outbreaks of the disease due to viruses with new antigenic subtypes, have exacted high death tolls from human populations. The last two pandemics were caused by hybrid viruses, or reassortants, that harbored a combination of avian and human viral genes. Avian influenza viruses are therefore key contributors to the emergence of human influenza pandemics. In 1997, an H5N1 influenza virus was directly transmitted from birds in live poultry markets in Hong Kong to humans. Eighteen people were infected in this outbreak, six of whom died. This avian virus exhibited high virulence in both avian and mammalian species, causing systemic infection in both chickens and mice. Subsequently, another avian virus with the H9N2 subtype was directly transmitted from birds to humans in Hong Kong. Interestingly, the genes encoding the internal proteins of the H9N2 virus are genetically highly related to those of the H5N1 virus, suggesting a unique property of these gene products. The identification of avian viruses in humans underscores the potential of these and similar strains to produce devastating influenza outbreaks in major population centers. Although highly pathogenic avian influenza viruses had been identified before the 1997 outbreak in Hong Kong, their devastating effects had been confined to poultry. With the Hong Kong outbreak, it became clear that the virulence potential of these viruses extended to humans. PMID:11148006
Avian influenza surveillance and diagnosis
USDA-ARS?s Scientific Manuscript database
Rapid detection and accurate identification of low (LPAI) and high pathogenicity avian influenza (HPAI) is critical to controlling infections and disease in poultry. Test selection and algorithms for the detection and diagnosis of avian influenza virus (AIV) in poultry may vary somewhat among differ...
The Radical Pair Mechanism and the Avian Chemical Compass: Quantum Coherence and Entanglement
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Yiteng; Kais, Sabre; Berman, Gennady Petrovich
2015-02-02
We review the spin radical pair mechanism which is a promising explanation of avian navigation. This mechanism is based on the dependence of product yields on 1) the hyperfine interaction involving electron spins and neighboring nuclear spins and 2) the intensity and orientation of the geomagnetic field. One surprising result is that even at ambient conditions quantum entanglement of electron spins can play an important role in avian magnetoreception. This review describes the general scheme of chemical reactions involving radical pairs generated from singlet and triplet precursors; the spin dynamics of the radical pairs; and the magnetic field dependence ofmore » product yields caused by the radical pair mechanism. The main part of the review includes a description of the chemical compass in birds. We review: the general properties of the avian compass; the basic scheme of the radical pair mechanism; the reaction kinetics in cryptochrome; quantum coherence and entanglement in the avian compass; and the effects of noise. We believe that the quantum avian compass can play an important role in avian navigation and can also provide the foundation for a new generation of sensitive and selective magnetic-sensing nano-devices.« less
Global dynamics of avian influenza epidemic models with psychological effect.
Liu, Sanhong; Pang, Liuyong; Ruan, Shigui; Zhang, Xinan
2015-01-01
Cross-sectional surveys conducted in Thailand and China after the outbreaks of the avian influenza A H5N1 and H7N9 viruses show a high degree of awareness of human avian influenza in both urban and rural populations, a higher level of proper hygienic practice among urban residents, and in particular a dramatically reduced number of visits to live markets in urban population after the influenza A H7N9 outbreak in China in 2013. In this paper, taking into account the psychological effect toward avian influenza in the human population, a bird-to-human transmission model in which the avian population exhibits saturation effect is constructed. The dynamical behavior of the model is studied by using the basic reproduction number. The results demonstrate that the saturation effect within avian population and the psychological effect in human population cannot change the stability of equilibria but can affect the number of infected humans if the disease is prevalent. Numerical simulations are given to support the theoretical results and sensitivity analyses of the basic reproduction number in terms of model parameters that are performed to seek for effective control measures for avian influenza.
Bulls, Bears, and Birds: Preparing the Financial Industry for an Avian Influenza Pandemic.
Maldin, Beth; Inglesby, Thomas V; Nuzzo, Jennifer B; Lien, Onora; Gronvall, Gigi Kwik; Toner, Eric; O'Toole, Tara
2005-01-01
Bulls, Bears, and Birds: Preparing the Financial Industry for an Avian Influenza Pandemic was a half day symposium on avian influenza for senior leaders and decision makers from the financial sector with responsibility for business continuity, health, and security. The event brought together experts and leaders from the medical, public health, business continuity, and financial communities to appraise financial industry leaders on the threat of avian influenza and to offer suggestions regarding what the financial industry could do to prepare and respond.
A new stream function formulation for the Euler equations
NASA Technical Reports Server (NTRS)
Atkins, H. L.; Hassan, H. A.
1983-01-01
A new stream function formulation is developed for the solution of Euler's equations in the transonic flow region. The stream function and the density are the dependent variables in this method, while the governing equations for adiabatic flow are the momentum equations which are solved in the strong conservation law form. The application of this method does not require a knowledge of the vorticity. The algorithm is combined with the automatic grid solver (GRAPE) of Steger and Sorenson (1979) in order to study arbitrary geometries. Results of the application of this method are presented for the NACA 0012 airfoil at various Mach numbers and angles of attack, and cylinders. In addition, detailed comparisons are made with other solutions of the Euler equations.
Cascading failure in scale-free networks with tunable clustering
NASA Astrophysics Data System (ADS)
Zhang, Xue-Jun; Gu, Bo; Guan, Xiang-Min; Zhu, Yan-Bo; Lv, Ren-Li
2016-02-01
Cascading failure is ubiquitous in many networked infrastructure systems, such as power grids, Internet and air transportation systems. In this paper, we extend the cascading failure model to a scale-free network with tunable clustering and focus on the effect of clustering coefficient on system robustness. It is found that the network robustness undergoes a nonmonotonic transition with the increment of clustering coefficient: both highly and lowly clustered networks are fragile under the intentional attack, and the network with moderate clustering coefficient can better resist the spread of cascading. We then provide an extensive explanation for this constructive phenomenon via the microscopic point of view and quantitative analysis. Our work can be useful to the design and optimization of infrastructure systems.
Downstream Effects on Orbiter Leeside Flow Separation for Hypersonic Flows
NASA Technical Reports Server (NTRS)
Buck, Gregory M.; Pulsonetti, Maria V.; Weilmuenster, K. James
2005-01-01
Discrepancies between experiment and computation for shuttle leeside flow separation, which came to light in the Columbia accident investigation, are resolved. Tests were run in the Langley Research Center 20-Inch Hypersonic CF4 Tunnel with a baseline orbiter model and two extended trailing edge models. The extended trailing edges altered the wing leeside separation lines, moving the lines toward the fuselage, proving that wing trailing edge modeling does affect the orbiter leeside flow. Computations were then made with a wake grid. These calculations more closely matched baseline experiments. Thus, the present findings demonstrate that it is imperative to include the wake flow domain in CFD calculations in order to accurately predict leeside flow separation for hypersonic vehicles at high angles of attack.
Deforestation does not affect the prevalence of a common trypanosome in African birds.
Valkiūnas, Gediminas; Iezhova, Tatjana A; Sehgal, Ravinder N M
2016-10-01
In spite of numerous reports of avian Trypanosoma spp. in birds throughout the world, patterns of the distribution and prevalence of these blood parasites remains insufficiently understood. It is clear that spatial heterogeneity influences parameters of parasite distributions in natural populations, but data regarding avian trypanosomes are scarce. Using microscopy and molecular diagnostic methods, we analysed the variation of prevalence of avian Trypanosoma parasites in two widespread African bird species, the yellow-whiskered greenbul Andropadus latirostris and the olive sunbird Cyanomitra olivacea. In all, 353 birds were captured in pristine forests and agroforest sites in Cameroon and Ghana. Overall, the prevalence of avian trypanosomes was 51.3%. Five morphospecies were reported (Trypanosoma everetti, T. anguiformis, T. avium, T. naviformis, T. ontarioensis). Trypanosoma everetti predominated, representing 98% of all Trypanosoma spp. reports, and it was present in both avian hosts. The prevalence of T. everetti was significantly less in the yellow-whiskered greenbul (19%) than olive sunbird (83%), and the same pattern of prevalence was reported in these avian hosts at different study sites. We found no interaction between sites and the prevalence of T. everetti. For both avian hosts, the prevalence did not differ significantly between pristine forests and agroforests. This indicates the same pattern of transmission at sites with different levels of deforestation and suggests that spatial heterogeneity related to deforestation does not affect the prevalence of avian Trypanosoma infections. It is likely that host-related factors, but not environmental conditions favour or reduce these parasite infections in forests of sub-Saharan Africa. Microscopic and PCR-based diagnostics showed the same sensitivity in diagnostics of T. everetti. We discuss the implications of these findings for the epidemiology of avian trypanosomiasis in natural populations. Copyright © 2016 Elsevier B.V. All rights reserved.
Distinct Host Tropism Protein Signatures to Identify Possible Zoonotic Influenza A Viruses.
Eng, Christine L P; Tong, Joo Chuan; Tan, Tin Wee
2016-01-01
Zoonotic influenza A viruses constantly pose a health threat to humans as novel strains occasionally emerge from the avian population to cause human infections. Many past epidemic as well as pandemic strains have originated from avian species. While most viruses are restricted to their primary hosts, zoonotic strains can sometimes arise from mutations or reassortment, leading them to acquire the capability to escape host species barrier and successfully infect a new host. Phylogenetic analyses and genetic markers are useful in tracing the origins of zoonotic infections, but there are still no effective means to identify high risk strains prior to an outbreak. Here we show that distinct host tropism protein signatures can be used to identify possible zoonotic strains in avian species which have the potential to cause human infections. We have discovered that influenza A viruses can now be classified into avian, human, or zoonotic strains based on their host tropism protein signatures. Analysis of all influenza A viruses with complete proteome using the host tropism prediction system, based on machine learning classifications of avian and human viral proteins has uncovered distinct signatures of zoonotic strains as mosaics of avian and human viral proteins. This is in contrast with typical avian or human strains where they show mostly avian or human viral proteins in their signatures respectively. Moreover, we have found that zoonotic strains from the same influenza outbreaks carry similar host tropism protein signatures characteristic of a common ancestry. Our results demonstrate that the distinct host tropism protein signature in zoonotic strains may prove useful in influenza surveillance to rapidly identify potential high risk strains circulating in avian species, which may grant us the foresight in anticipating an impending influenza outbreak.
Evaluation of Cytology for Diagnosing Avian Pox in Wild Turkeys ( Meleagris gallopavo).
Hydock, Kira; Brown, Holly; Nemeth, Nicole; Poulson, Rebecca; Casalena, Mary Jo; Johnson, Joshua B; Brown, Justin
2018-03-01
Avian pox virus is a common cause of proliferative skin disease in wild turkeys ( Meleagris gallopavo); however, other etiologies may produce grossly indistinguishable lesions. Common methods for diagnosing avian pox include histopathology, virus isolation, and PCR. While these methods are sufficient in most cases, each has their limitations. Cytology is a cost-effective and rapid approach that may be useful when traditional diagnostics are not feasible. The objective of this study was to evaluate the performance of cytology relative to histopathology and PCR for avian pox diagnosis in wild turkeys. Fifty wild turkeys were submitted for necropsy due to nodular skin lesions on unfeathered skin of the head. Of these, five had similar skin lesions on the unfeathered legs and 26 had plaques on the mucosa of the oropharynx or esophagus. Representative skin, oropharyngeal, and esophageal lesions from all birds were examined with cytology and histopathology. Skin lesions on the head of each bird were also tested for avian pox virus via PCR. Histopathology and PCR were equally sensitive in diagnosing avian pox from skin lesions on the head. There were no significant differences between cytologic and histopathologic diagnosis of avian pox from skin lesions on the head (sensitivity = 97.4%, specificity = 100.0%), legs (sensitivity = 75.0%, specificity = 100.0%), or from lesions in the oropharynx and esophagus (sensitivity of 62.5%). Similarly, there were no significant differences between PCR and cytology for diagnosis of pox viral skin lesions of the head. Relative to PCR detection of avian pox virus, cytology had a sensitivity of 90.0% and a specificity of 90.0%. These results suggest that cytology is a useful tool for diagnosis of avian pox in wild turkeys.
Low-Pathogenic Avian Influenza Viruses in Wild House Mice
Shriner, Susan A.; VanDalen, Kaci K.; Mooers, Nicole L.; Ellis, Jeremy W.; Sullivan, Heather J.; Root, J. Jeffrey; Pelzel, Angela M.; Franklin, Alan B.
2012-01-01
Background Avian influenza viruses are known to productively infect a number of mammal species, several of which are commonly found on or near poultry and gamebird farms. While control of rodent species is often used to limit avian influenza virus transmission within and among outbreak sites, few studies have investigated the potential role of these species in outbreak dynamics. Methodology/Principal Findings We trapped and sampled synanthropic mammals on a gamebird farm in Idaho, USA that had recently experienced a low pathogenic avian influenza outbreak. Six of six house mice (Mus musculus) caught on the outbreak farm were presumptively positive for antibodies to type A influenza. Consequently, we experimentally infected groups of naïve wild-caught house mice with five different low pathogenic avian influenza viruses that included three viruses derived from wild birds and two viruses derived from chickens. Virus replication was efficient in house mice inoculated with viruses derived from wild birds and more moderate for chicken-derived viruses. Mean titers (EID50 equivalents/mL) across all lung samples from seven days of sampling (three mice/day) ranged from 103.89 (H3N6) to 105.06 (H4N6) for the wild bird viruses and 102.08 (H6N2) to 102.85 (H4N8) for the chicken-derived viruses. Interestingly, multiple regression models indicated differential replication between sexes, with significantly (p<0.05) higher concentrations of avian influenza RNA found in females compared with males. Conclusions/Significance Avian influenza viruses replicated efficiently in wild-caught house mice without adaptation, indicating mice may be a risk pathway for movement of avian influenza viruses on poultry and gamebird farms. Differential virus replication between males and females warrants further investigation to determine the generality of this result in avian influenza disease dynamics. PMID:22720076
Troop education and avian influenza surveillance in military barracks in Ghana, 2011.
Odoom, John Kofi; Bel-Nono, Samuel; Rodgers, David; Agbenohevi, Prince G; Dafeamekpor, Courage K; Sowa, Roland M L; Danso, Fenteng; Tettey, Reuben; Suu-Ire, Richard; Bonney, Joseph H K; Asante, Ivy A; Aboagye, James; Abana, Christopher Zaab-Yen; Frimpong, Joseph Asamoah; Kronmann, Karl C; Oyofo, Buhari A; Ampofo, William K
2012-11-08
Influenza A viruses that cause highly pathogenic avian influenza (HPAI) also infect humans. In many developing countries such as Ghana, poultry and humans live in close proximity in both the general and military populations, increasing risk for the spread of HPAI from birds to humans. Respiratory infections such as influenza are especially prone to rapid spread among military populations living in close quarters such as barracks making this a key population for targeted avian influenza surveillance and public health education. Twelve military barracks situated in the coastal, tropical rain forest and northern savannah belts of the country were visited and the troops and their families educated on pandemic avian influenza. Attendants at each site was obtained from the attendance sheet provided for registration. The seminars focused on zoonotic diseases, influenza surveillance, pathogenesis of avian influenza, prevention of emerging infections and biosecurity. To help direct public health policies, a questionnaire was used to collect information on animal populations and handling practices from 102 households in the military barracks. Cloacal and tracheal samples were taken from 680 domestic and domesticated wild birds and analysed for influenza A using molecular methods for virus detection. Of the 1028 participants that took part in the seminars, 668 (65%) showed good knowledge of pandemic avian influenza and the risks associated with its infection. Even though no evidence of the presence of avian influenza (AI) infection was found in the 680 domestic and wild birds sampled, biosecurity in the households surveyed was very poor. Active surveillance revealed that there was no AI circulation in the military barracks in April 2011. Though participants demonstrated good knowledge of pandemic avian influenza, biosecurity practices were minimal. Sustained educational programs are needed to further strengthen avian influenza surveillance and prevention in military barracks.
Avian models in teratology and developmental toxicology.
Smith, Susan M; Flentke, George R; Garic, Ana
2012-01-01
The avian embryo is a long-standing model for developmental biology research. It also has proven utility for toxicology research both in ovo and in explant culture. Like mammals, avian embryos have an allantois and their developmental pathways are highly conserved with those of mammals, thus avian models have biomedical relevance. Fertile eggs are inexpensive and the embryo develops rapidly, allowing for high-throughput. The chick genome is sequenced and significant molecular resources are available for study, including the ability for genetic manipulation. The absence of a placenta permits the direct study of an agent's embryotoxic effects. Here, we present protocols for using avian embryos in toxicology research, including egg husbandry and hatch, toxicant delivery, and assessment of proliferation, apoptosis, and cardiac structure and function.
Comparative genomics reveals insights into avian genome evolution and adaptation
Zhang, Guojie; Li, Cai; Li, Qiye; Li, Bo; Larkin, Denis M.; Lee, Chul; Storz, Jay F.; Antunes, Agostinho; Greenwold, Matthew J.; Meredith, Robert W.; Ödeen, Anders; Cui, Jie; Zhou, Qi; Xu, Luohao; Pan, Hailin; Wang, Zongji; Jin, Lijun; Zhang, Pei; Hu, Haofu; Yang, Wei; Hu, Jiang; Xiao, Jin; Yang, Zhikai; Liu, Yang; Xie, Qiaolin; Yu, Hao; Lian, Jinmin; Wen, Ping; Zhang, Fang; Li, Hui; Zeng, Yongli; Xiong, Zijun; Liu, Shiping; Zhou, Long; Huang, Zhiyong; An, Na; Wang, Jie; Zheng, Qiumei; Xiong, Yingqi; Wang, Guangbiao; Wang, Bo; Wang, Jingjing; Fan, Yu; da Fonseca, Rute R.; Alfaro-Núñez, Alonzo; Schubert, Mikkel; Orlando, Ludovic; Mourier, Tobias; Howard, Jason T.; Ganapathy, Ganeshkumar; Pfenning, Andreas; Whitney, Osceola; Rivas, Miriam V.; Hara, Erina; Smith, Julia; Farré, Marta; Narayan, Jitendra; Slavov, Gancho; Romanov, Michael N; Borges, Rui; Machado, João Paulo; Khan, Imran; Springer, Mark S.; Gatesy, John; Hoffmann, Federico G.; Opazo, Juan C.; Håstad, Olle; Sawyer, Roger H.; Kim, Heebal; Kim, Kyu-Won; Kim, Hyeon Jeong; Cho, Seoae; Li, Ning; Huang, Yinhua; Bruford, Michael W.; Zhan, Xiangjiang; Dixon, Andrew; Bertelsen, Mads F.; Derryberry, Elizabeth; Warren, Wesley; Wilson, Richard K; Li, Shengbin; Ray, David A.; Green, Richard E.; O’Brien, Stephen J.; Griffin, Darren; Johnson, Warren E.; Haussler, David; Ryder, Oliver A.; Willerslev, Eske; Graves, Gary R.; Alström, Per; Fjeldså, Jon; Mindell, David P.; Edwards, Scott V.; Braun, Edward L.; Rahbek, Carsten; Burt, David W.; Houde, Peter; Zhang, Yong; Yang, Huanming; Wang, Jian; Jarvis, Erich D.; Gilbert, M. Thomas P.; Wang, Jun
2015-01-01
Birds are the most species-rich class of tetrapod vertebrates and have wide relevance across many research fields. We explored bird macroevolution using full genomes from 48 avian species representing all major extant clades. The avian genome is principally characterized by its constrained size, which predominantly arose because of lineage-specific erosion of repetitive elements, large segmental deletions, and gene loss. Avian genomes furthermore show a remarkably high degree of evolutionary stasis at the levels of nucleotide sequence, gene synteny, and chromosomal structure. Despite this pattern of conservation, we detected many non-neutral evolutionary changes in protein-coding genes and noncoding regions. These analyses reveal that pan-avian genomic diversity covaries with adaptations to different lifestyles and convergent evolution of traits. PMID:25504712
TIM Appendix D summarizes avian census studies from pesticide registrant submissions and literature. The purpose of this review is to identify avian species that are representative of those that commonly visit agricultural fields.
Avian and human influenza virus compatible sialic acid receptors in little brown bats.
Chothe, Shubhada K; Bhushan, Gitanjali; Nissly, Ruth H; Yeh, Yin-Ting; Brown, Justin; Turner, Gregory; Fisher, Jenny; Sewall, Brent J; Reeder, DeeAnn M; Terrones, Mauricio; Jayarao, Bhushan M; Kuchipudi, Suresh V
2017-04-06
Influenza A viruses (IAVs) continue to threaten animal and human health globally. Bats are asymptomatic reservoirs for many zoonotic viruses. Recent reports of two novel IAVs in fruit bats and serological evidence of avian influenza virus (AIV) H9 infection in frugivorous bats raise questions about the role of bats in IAV epidemiology. IAVs bind to sialic acid (SA) receptors on host cells, and it is widely believed that hosts expressing both SA α2,3-Gal and SA α2,6-Gal receptors could facilitate genetic reassortment of avian and human IAVs. We found abundant co-expression of both avian (SA α2,3-Gal) and human (SA α2,6-Gal) type SA receptors in little brown bats (LBBs) that were compatible with avian and human IAV binding. This first ever study of IAV receptors in a bat species suggest that LBBs, a widely-distributed bat species in North America, could potentially be co-infected with avian and human IAVs, facilitating the emergence of zoonotic strains.
Khare, Shashi; Agarwal, Ramesh; Singh, Ranjana; Lal, Shiv
2006-07-01
The current outbreak of H5N 1 avian influenza affecting an unprecedented number of countries is a cause of concern worldwide. As on 26th June, 2006 outbreaks in poultry or wild birds have been reported from 54 countries. In India the first outbreak of avian influenza virus Awas reported in Navapur district in Maharashtra in February 2006 followed by detection of H5N1 in a neighbouring district of Gujarat. No case of human infection has yet been reported in India. Avian influenza virus belongs to influenza type A which is a part of family orthomyxoviridae. Transmission occurs by direct or indirect contact. Clinical symptoms on human is of typical influenza like. Laboratory investigations involves a number of tests confirming diagnosis of avian influenza. The treatment includes general supportive and antiviral therapy with oseltamivir. Prevention and control strategies can held to minimise the public health risk to highly pathogenic avian influenza. There are some dos and don'ts for the community which should be strictly followed.
Bibliography of Literature for Avian Issues in Solar and Wind Energy and Other Activities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Walston, Leroy J.; White, Ellen M.; Meyers, Stephanie A.
2015-04-01
Utility-scale solar energy has been a rapidly expanding energy sector in the United States in recent years and is expected to continue to grow. In 2014, concerns were raised over the risk of avian fatalities associated with utility-scale solar plants. With funding from the U.S. Department of Energy SunShot Program, Argonne National Laboratory and the National Renewable Energy Laboratory studied the issue and released A Review of Avian Monitoring and Mitigation Information at Existing Utility-Scale Solar Facilities (ANL/EVS-15/2, March 2015). A comprehensive literature review included peer-reviewed journal articles on avian fatalities from solar energy facilities and other sources (e.g., windmore » energy, building collisions, etc.), project-specific technical reports on avian monitoring and fatality at solar facilities, information on mitigation measures and best management practices, and literature pertaining to avian behavioral patterns and habitat use. The source citations are listed in this bibliography; they are current through December 2014.« less
Computational Aerodynamic Analysis of Three-Dimensional Ice Shapes on a NACA 23012 Airfoil
NASA Technical Reports Server (NTRS)
Jun, GaRam; Oliden, Daniel; Potapczuk, Mark G.; Tsao, Jen-Ching
2014-01-01
The present study identifies a process for performing computational fluid dynamic calculations of the flow over full three-dimensional (3D) representations of complex ice shapes deposited on aircraft surfaces. Rime and glaze icing geometries formed on a NACA23012 airfoil were obtained during testing in the NASA Glenn Research Centers Icing Research Tunnel (IRT). The ice shape geometries were scanned as a cloud of data points using a 3D laser scanner. The data point clouds were meshed using Geomagic software to create highly accurate models of the ice surface. The surface data was imported into Pointwise grid generation software to create the CFD surface and volume grids. It was determined that generating grids in Pointwise for complex 3D icing geometries was possible using various techniques that depended on the ice shape. Computations of the flow fields over these ice shapes were performed using the NASA National Combustion Code (NCC). Results for a rime ice shape for angle of attack conditions ranging from 0 to 10 degrees and for freestream Mach numbers of 0.10 and 0.18 are presented. For validation of the computational results, comparisons were made to test results from rapid-prototype models of the selected ice accretion shapes, obtained from a separate study in a subsonic wind tunnel at the University of Illinois at Urbana-Champaign. The computational and experimental results were compared for values of pressure coefficient and lift. Initial results show fairly good agreement for rime ice accretion simulations across the range of conditions examined. The glaze ice results are promising but require some further examination.
Computational Aerodynamic Analysis of Three-Dimensional Ice Shapes on a NACA 23012 Airfoil
NASA Technical Reports Server (NTRS)
Jun, Garam; Oliden, Daniel; Potapczuk, Mark G.; Tsao, Jen-Ching
2014-01-01
The present study identifies a process for performing computational fluid dynamic calculations of the flow over full three-dimensional (3D) representations of complex ice shapes deposited on aircraft surfaces. Rime and glaze icing geometries formed on a NACA23012 airfoil were obtained during testing in the NASA Glenn Research Center's Icing Research Tunnel (IRT). The ice shape geometries were scanned as a cloud of data points using a 3D laser scanner. The data point clouds were meshed using Geomagic software to create highly accurate models of the ice surface. The surface data was imported into Pointwise grid generation software to create the CFD surface and volume grids. It was determined that generating grids in Pointwise for complex 3D icing geometries was possible using various techniques that depended on the ice shape. Computations of the flow fields over these ice shapes were performed using the NASA National Combustion Code (NCC). Results for a rime ice shape for angle of attack conditions ranging from 0 to 10 degrees and for freestream Mach numbers of 0.10 and 0.18 are presented. For validation of the computational results, comparisons were made to test results from rapid-prototype models of the selected ice accretion shapes, obtained from a separate study in a subsonic wind tunnel at the University of Illinois at Urbana-Champaign. The computational and experimental results were compared for values of pressure coefficient and lift. Initial results show fairly good agreement for rime ice accretion simulations across the range of conditions examined. The glaze ice results are promising but require some further examination.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Martínez-Tossas, L. A.; Churchfield, M. J.; Meneveau, C.
The actuator line model (ALM) is a commonly used method to represent lifting surfaces such as wind turbine blades within large-eddy simulations (LES). In the ALM, the lift and drag forces are replaced by an imposed body force that is typically smoothed over several grid points using a Gaussian kernel with some prescribed smoothing width e. To date, the choice of e has most often been based on numerical considerations related to the grid spacing used in LES. However, especially for finely resolved LES with grid spacings on the order of or smaller than the chord length of the blade,more » the best choice of e is not known. In this work, a theoretical approach is followed to determine the most suitable value of e, based on an analytical solution to the linearized inviscid flow response to a Gaussian force. We find that the optimal smoothing width eopt is on the order of 14%-25% of the chord length of the blade, and the center of force is located at about 13%-26% downstream of the leading edge of the blade for the cases considered. These optimal values do not depend on angle of attack and depend only weakly on the type of lifting surface. It is then shown that an even more realistic velocity field can be induced by a 2-D elliptical Gaussian lift-force kernel. Some results are also provided regarding drag force representation.« less
High temperature static strain gage development
NASA Technical Reports Server (NTRS)
Hulse, C. O.; Bailey, R. S.; Grant, H. P.; Anderson, W. L.; Przybyszewski, J. S.
1991-01-01
Final results are presented from a program to develop a thin film static strain gage for use on the blades and vanes of running, test stand gas turbine engines with goals of an 3 x 3 mm gage area and total errors of less than 10 pct. of + or - 2,000 microstrain after 50 hrs at 1250 K. Pd containing 13 Wt. pct. Cr was previously identified as a new strain sensor alloy that appeared to be potentially usable to 1250 K. Subsequently, it was discovered, in contrast with its behavior in bulk, that Pd-13Cr suffered from oxidation attack when prepared as a 4.5 micron thick thin film. Continuing problems with electrical leakage to the substrate and the inability of sputtered alumina overcoats to prevent oxidation led to the discovery that sputtered alumina contains appreciable amounts of entrapped argon. After the argon has been exsolved by heating to elevated temperatures, the alumina films undergo a linear shrinkage of about 2 pct. resulting in formation of cracks. These problems can be largely overcome by sputtering the alumina with the substrate heated to 870 K. With 2 micron thick hot sputtered alumina insulation and overcoat films, total 50 hr drifts of about 100 microstrain (2 tests) and about 500 microstrain (1 test) were observed at 1000 and 1100 K, respectively. Results of tests on complete strain gage systems on constant moment bend bars with Pd temperature compensation grids revealed that oxidation of the Pd grid was a major problem even when the grid was overcoated with a hot or cold sputtered alumina overcoat.
Lamuka, Peter O; Njeruh, Francis M; Gitao, George C; Matofari, Joseph; Bowen, Richard; Abey, Khalif A
2018-06-01
A cross-sectional study was conducted among 308 lactating camels selected from 15 herds from three different camel milk clusters in Isiolo County, Kenya, to determine prevalence of bovine and avian tuberculosis using Single Comparative Intradermal Tuberculin Skin test. Seventy-five (75) questionnaires were administered to pastoralists/herders, and focus group discussions were conducted among 3-5 pastoralists/herders selected from each camel herd to collect information on camel husbandry and health management practices and knowledge on tuberculosis in livestock and wildlife. An overall prevalence of bovine and avian reactors was 3.57 and 18.18%, respectively, with bovine and avian reactors for different clusters being 2.38, 3.82, and 4.48% and 25, 17.2, and 11.94%, respectively. There was significant difference (p < 0.05) in prevalence of bovine and avian reactors between different clusters. There was a negative correction (r = -0.1399) between herd size and bovine reactors, while there was a positive correlation (r = 0.0445) between herd size and avian reactors. The respondents indicated that camel herds are exposed to several risk factors like close contact with other herds or livestock or wildlife during grazing and at watering points. Pastoralists have poor knowledge on mode of infection and transmission of bovine or avian tuberculosis. The high prevalence of bovine and avian reactors and pastoralists' poor knowledge on mode of transmission signify potential risk to public health.
MORIGUCHI, Sachiko; ONUMA, Manabu; GOKA, Koichi
2016-01-01
Avian influenza A, a highly pathogenic avian influenza, is a lethal infection in certain species of wild birds, including some endangered species. Raptors are susceptible to avian influenza, and spatial risk assessment of such species may be valuable for conservation planning. We used the maximum entropy approach to generate potential distribution models of three raptor species from presence-only data for the mountain hawk-eagle Nisaetus nipalensis, northern goshawk Accipiter gentilis and peregrine falcon Falco peregrinus, surveyed during the winter from 1996 to 2001. These potential distribution maps for raptors were superimposed on avian influenza A risk maps of Japan, created from data on incidence of the virus in wild birds throughout Japan from October 2010 to March 2011. The avian influenza A risk map for the mountain hawk-eagle showed that most regions of Japan had a low risk for avian influenza A. In contrast, the maps for the northern goshawk and peregrine falcon showed that their high-risk areas were distributed on the plains along the Sea of Japan and Pacific coast. We recommend enhanced surveillance for each raptor species in high-risk areas and immediate establishment of inspection systems. At the same time, ecological risk assessments that determine factors, such as the composition of prey species, and differential sensitivity of avian influenza A virus between bird species should provide multifaceted insights into the total risk assessment of endangered species. PMID:26972333
[Oligonucleotide microarray for subtyping avian influenza virus].
Xueqing, Han; Xiangmei, Lin; Yihong, Hou; Shaoqiang, Wu; Jian, Liu; Lin, Mei; Guangle, Jia; Zexiao, Yang
2008-09-01
Avian influenza viruses are important human and animal respiratory pathogens and rapid diagnosis of novel emerging avian influenza viruses is vital for effective global influenza surveillance. We developed an oligonucleotide microarray-based method for subtyping all avian influenza virus (16 HA and 9 NA subtypes). In total 25 pairs of primers specific for different subtypes and 1 pair of universal primers were carefully designed based on the genomic sequences of influenza A viruses retrieved from GenBank database. Several multiplex RT-PCR methods were then developed, and the target cDNAs of 25 subtype viruses were amplified by RT-PCR or overlapping PCR for evaluating the microarray. Further 52 oligonucleotide probes specific for all 25 subtype viruses were designed according to published gene sequences of avian influenza viruses in amplified target cDNAs domains, and a microarray for subtyping influenza A virus was developed. Then its specificity and sensitivity were validated by using different subtype strains and 2653 samples from 49 different areas. The results showed that all the subtypes of influenza virus could be identified simultaneously on this microarray with high sensitivity, which could reach to 2.47 pfu/mL virus or 2.5 ng target DNA. Furthermore, there was no cross reaction with other avian respiratory virus. An oligonucleotide microarray-based strategy for detection of avian influenza viruses has been developed. Such a diagnostic microarray will be useful in discovering and identifying all subtypes of avian influenza virus.
Dececchi, T Alexander; Larsson, Hans C E
2011-01-01
The origin of avian flight is a classic macroevolutionary transition with research spanning over a century. Two competing models explaining this locomotory transition have been discussed for decades: ground up versus trees down. Although it is impossible to directly test either of these theories, it is possible to test one of the requirements for the trees-down model, that of an arboreal paravian. We test for arboreality in non-avian theropods and early birds with comparisons to extant avian, mammalian, and reptilian scansors and climbers using a comprehensive set of morphological characters. Non-avian theropods, including the small, feathered deinonychosaurs, and Archaeopteryx, consistently and significantly cluster with fully terrestrial extant mammals and ground-based birds, such as ratites. Basal birds, more advanced than Archaeopteryx, cluster with extant perching ground-foraging birds. Evolutionary trends immediately prior to the origin of birds indicate skeletal adaptations opposite that expected for arboreal climbers. Results reject an arboreal capacity for the avian stem lineage, thus lending no support for the trees-down model. Support for a fully terrestrial ecology and origin of the avian flight stroke has broad implications for the origin of powered flight for this clade. A terrestrial origin for the avian flight stroke challenges the need for an intermediate gliding phase, presents the best resolved series of the evolution of vertebrate powered flight, and may differ fundamentally from the origin of bat and pterosaur flight, whose antecedents have been postulated to have been arboreal and gliding.
NASA Technical Reports Server (NTRS)
Newman, James C., III
1995-01-01
The limiting factor in simulating flows past realistic configurations of interest has been the discretization of the physical domain on which the governing equations of fluid flow may be solved. In an attempt to circumvent this problem, many Computational Fluid Dynamic (CFD) methodologies that are based on different grid generation and domain decomposition techniques have been developed. However, due to the costs involved and expertise required, very few comparative studies between these methods have been performed. In the present work, the two CFD methodologies which show the most promise for treating complex three-dimensional configurations as well as unsteady moving boundary problems are evaluated. These are namely the structured-overlapped and the unstructured grid schemes. Both methods use a cell centered, finite volume, upwind approach. The structured-overlapped algorithm uses an approximately factored, alternating direction implicit scheme to perform the time integration, whereas, the unstructured algorithm uses an explicit Runge-Kutta method. To examine the accuracy, efficiency, and limitations of each scheme, they are applied to the same steady complex multicomponent configurations and unsteady moving boundary problems. The steady complex cases consist of computing the subsonic flow about a two-dimensional high-lift multielement airfoil and the transonic flow about a three-dimensional wing/pylon/finned store assembly. The unsteady moving boundary problems are a forced pitching oscillation of an airfoil in a transonic freestream and a two-dimensional, subsonic airfoil/store separation sequence. Accuracy was accessed through the comparison of computed and experimentally measured pressure coefficient data on several of the wing/pylon/finned store assembly's components and at numerous angles-of-attack for the pitching airfoil. From this study, it was found that both the structured-overlapped and the unstructured grid schemes yielded flow solutions of comparable accuracy for these simulations. This study also indicated that, overall, the structured-overlapped scheme was slightly more CPU efficient than the unstructured approach.
A simple vitrification method for cryobanking avian testicular tissue
USDA-ARS?s Scientific Manuscript database
Cryopreservation of testicular tissue is a promising method of preserving male reproductive potential for avian species. This study was conducted to assess whether a vitrification method can be used to preserve avian testicular tissue, using the Japanese quail (Coturnix japonica) as a model. A sim...
Measurement of airborne influenza virus during hen slaughtering in an ABSL-3E bioBUBBLE®
USDA-ARS?s Scientific Manuscript database
Several avian viral diseases, including avian influenza, Newcastle disease, infectious bronchitis or laryngotracheitis, are transmitted via respiratory droplets or by contact with contaminated fomites. Using high pathogenicity avian influenza (HPAI) virus as a model, the objective of the present st...
EPA registers disinfectants against Avian Influenza A. Although there are no antimicrobial products registered for the H5N2 subtype of Avian Influenza A virus, based on available scientific information these products will work against other HPAI strains.
Newcastle disease and other avian paramyxoviruses
USDA-ARS?s Scientific Manuscript database
Newcastle disease virus (NDV) is a form of avian paramyxovirus type 1 (APMV-1) that is highly virulent for chickens and turkeys. There are currently 13 recognized serotypes of avian paramyxovirus, but APMV-1, including NDV, is the most important for poultry Newcastle disease (ND) is considered to be...
Flink, Henrik; Behrens, Jane W; Svensson, P Andreas
2017-06-01
Larvae of the eye fluke, Diplostomum, emerge from snails and infect fish by penetrating skin or gills, then move to the lens where they may impair the vision of the fish. For the fluke to reproduce, a bird must eat the infected fish, and it has been suggested that they therefore actively manipulate the fish's behaviour to increase the risk of predation. We found that round gobies Neogobius melanostomus, a species that was recently introduced to the Kalmar Sound of the Baltic Sea, had an eye fluke prevalence of 90-100%. We investigated how the infection related to behavioural variation in round gobies. Our results showed that the more intense the parasite-induced cataract, the weaker the host's response was to simulated avian attack. The eye flukes did not impair other potentially important anti-predator behaviours, such as shelter use, boldness and the preference for shade. Our results are in accordance with the suggestion that parasites induce changes in host behaviour that will facilitate transfer to their final host.
USDA-ARS?s Scientific Manuscript database
Avian metapneumovirus (aMPV), also known as avian pneumovirus or turkey rhinotracheitis, is a non-segmented negative-sense RNA virus belonging to the family of Paramyxoviridae, the subfamily Pneumovirinae, and the genus Metapneumovirus. aMPV is the causative agent of respiratory tract infection and ...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-25
... Avian Influenza-Marek's Disease Vaccine, H5 Subtype, Serotype 3, Live Marek's Disease Vector AGENCY...-Marek's Disease Vaccine, H5 Subtype, Serotype 3, Live Marek's Disease Vector. The environmental... product: Requester: Biomune Company. Product: Avian Influenza-Marek's Disease Vaccine, H5 Subtype...
MANAGING AVIAN FLU, CARCASS MANAGEMENT & BIOSOLIDS
The avian influenza virus is discussed with emphasis on the impact to poultry and possible movement of the highly pathogenic H5N 1 virus to humans. A review is made of the worldwide effects to date of the avian influenza viruses; methods for the viruses to enter recreational wate...
Avian Influenza: A growing threat to Africa
USDA-ARS?s Scientific Manuscript database
The H9N2 low pathogenic avian influenza (LPAI) is probably the most widespread avian influenza subtype in poultry around the world being endemic in a large part of Asia, the Middle East, Northern Africa, and in Germany. Currently, there is no standardized clade system to describe the antigenic vari...
Highly pathogenic avian influenza A(H7N9) virus, Tennessee, USA, March 2017
USDA-ARS?s Scientific Manuscript database
In March 2017, highly pathogenic avian influenza A(H7N9) was detected at 2 poultry farms in Tennessee, USA. Surveillance data and genetic analyses indicated multiple introductions of low pathogenicity avian influenza virus before mutation to high pathogenicity and interfarm transmission. Poultry sur...
Practical aspects of vaccination of poultry against avian influenza virus
USDA-ARS?s Scientific Manuscript database
Although little has changed in vaccine technology for avian influenza virus (AIV) in the past 20 years, the approach to vaccination of poultry (chickens, turkeys and ducks) for avian influenza has evolved as highly pathogenic (HP) AIV has become endemic in several regions of the world. Vaccination f...
The Markov chain nest productivity model, or MCnest, is a set of algorithms for integrating the results of avian toxicity tests with reproductive life-history data to project the relative magnitude of chemical effects on avian reproduction. The mathematical foundation of MCnest i...
Comparative genomics reveals insights into avian genome evolution and adaptation.
Zhang, Guojie; Li, Cai; Li, Qiye; Li, Bo; Larkin, Denis M; Lee, Chul; Storz, Jay F; Antunes, Agostinho; Greenwold, Matthew J; Meredith, Robert W; Ödeen, Anders; Cui, Jie; Zhou, Qi; Xu, Luohao; Pan, Hailin; Wang, Zongji; Jin, Lijun; Zhang, Pei; Hu, Haofu; Yang, Wei; Hu, Jiang; Xiao, Jin; Yang, Zhikai; Liu, Yang; Xie, Qiaolin; Yu, Hao; Lian, Jinmin; Wen, Ping; Zhang, Fang; Li, Hui; Zeng, Yongli; Xiong, Zijun; Liu, Shiping; Zhou, Long; Huang, Zhiyong; An, Na; Wang, Jie; Zheng, Qiumei; Xiong, Yingqi; Wang, Guangbiao; Wang, Bo; Wang, Jingjing; Fan, Yu; da Fonseca, Rute R; Alfaro-Núñez, Alonzo; Schubert, Mikkel; Orlando, Ludovic; Mourier, Tobias; Howard, Jason T; Ganapathy, Ganeshkumar; Pfenning, Andreas; Whitney, Osceola; Rivas, Miriam V; Hara, Erina; Smith, Julia; Farré, Marta; Narayan, Jitendra; Slavov, Gancho; Romanov, Michael N; Borges, Rui; Machado, João Paulo; Khan, Imran; Springer, Mark S; Gatesy, John; Hoffmann, Federico G; Opazo, Juan C; Håstad, Olle; Sawyer, Roger H; Kim, Heebal; Kim, Kyu-Won; Kim, Hyeon Jeong; Cho, Seoae; Li, Ning; Huang, Yinhua; Bruford, Michael W; Zhan, Xiangjiang; Dixon, Andrew; Bertelsen, Mads F; Derryberry, Elizabeth; Warren, Wesley; Wilson, Richard K; Li, Shengbin; Ray, David A; Green, Richard E; O'Brien, Stephen J; Griffin, Darren; Johnson, Warren E; Haussler, David; Ryder, Oliver A; Willerslev, Eske; Graves, Gary R; Alström, Per; Fjeldså, Jon; Mindell, David P; Edwards, Scott V; Braun, Edward L; Rahbek, Carsten; Burt, David W; Houde, Peter; Zhang, Yong; Yang, Huanming; Wang, Jian; Jarvis, Erich D; Gilbert, M Thomas P; Wang, Jun
2014-12-12
Birds are the most species-rich class of tetrapod vertebrates and have wide relevance across many research fields. We explored bird macroevolution using full genomes from 48 avian species representing all major extant clades. The avian genome is principally characterized by its constrained size, which predominantly arose because of lineage-specific erosion of repetitive elements, large segmental deletions, and gene loss. Avian genomes furthermore show a remarkably high degree of evolutionary stasis at the levels of nucleotide sequence, gene synteny, and chromosomal structure. Despite this pattern of conservation, we detected many non-neutral evolutionary changes in protein-coding genes and noncoding regions. These analyses reveal that pan-avian genomic diversity covaries with adaptations to different lifestyles and convergent evolution of traits. Copyright © 2014, American Association for the Advancement of Science.
Chemical ions affect survival of avian cholera organisms in pondwater
Price, J.I.; Yandell, B.S.; Porter, W.P.
1992-01-01
Avian cholera (Pasteurella multocida) is a major disease of wild waterfowl, but its epizootiology remains little understood. Consequently, we examined whether chemical ions affected survival of avian cholera organisms in water collected from the Nebraska Rainwater Basin where avian cholera is enzootic. We tested the response of P. multocida to ammonium (NH4), calcium (Ca), magnesium (Mg), nitrate (NO3), and ortho-phosphate (PO4) ions individually and in combination using a fractional factorial design divided into 4 blocks. High concentrations of Ca and Mg, singly or in combination, increased survival of P. multocida organisms (P < 0.001). We developed a survival index to predict whether or not specific ponds could be "problem" or "nonproblem" avian cholera sites based on concentrations of these ions in the water.
Transmission and reassortment of avian influenza viruses at the Asian-North American interface
Ramey, Andrew M.; Pearce, John M.; Ely, Craig R.; Guy, Lisa M. Sheffield; Irons, David B.; Derksen, Dirk V.; Ip, Hon S.
2010-01-01
Twenty avian influenza viruses were isolated from seven wild migratory bird species sampled at St. Lawrence Island, Alaska. We tested predictions based on previous phylogenetic analyses of avian influenza viruses that support spatially dependent trans-hemispheric gene flow and frequent interspecies transmission at a location situated at the Asian–North American interface. Through the application of phylogenetic and genotypic approaches, our data support functional dilution by distance of trans-hemispheric reassortants and interspecific virus transmission. Our study confirms infection of divergent avian taxa with nearly identical avian influenza strains in the wild. Findings also suggest that H16N3 viruses may contain gene segments with unique phylogenetic positions and that further investigation of how host specificity may impact transmission of H13 and H16 viruses is warranted.
Primary structure of the hemoglobin alpha-chain of rose-ringed parakeet (Psittacula krameri).
Islam, A; Beg, O U; Persson, B; Zaidi, Z H; Jörnvall, H
1988-10-01
The structure of the hemoglobin alpha-chain of Rose-ringed Parakeet was determined by sequence degradations of the intact subunit, the CNBr fragments, and peptides obtained by digestion with staphylococcal Glu-specific protease and trypsin. Using this analysis, the complete alpha-chain structure of 21 avian species is known, permitting comparisons of the protein structure and of avian relationships. The structure exhibits differences from previously established avian alpha-chains at a total of 61 positions, five of which have residues unique to those of the parakeet (Ser-12, Gly-65, Ser-67, Ala-121, and Leu-134). The analysis defines hemoglobin variation within an additional avian order (Psittaciformes), demonstrates distant patterns for evaluation of relationships within other avian orders, and lends support to taxonomic conclusions from molecular data.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ponton, David A.
A review of what is known about avian physiology and the biological effects of DDE suggests that some benefit to peregrine falcon egg condition could be attained by artificially feeding DDE free prey to the female from the time of her arrival on the nesting grounds until completion of egg laying; the magnitude of potential benefit is unknown. Sporadic efforts in the past demonstrated the need for precision methods of prey delivery. Two methods were developed and tried; providing dead prey items by dropping them in a day perch, and delivery of live prey by remotely controlled release from compartmentsmore » positioned at the top of the cliff occupied by the falcons. Maintaining quail in the day perch for 21 days resulted in at least one and probably two meals for the female peregrine. Of 16 live birds released (mostly pigeons) 13 were pursued and three caught. Blinding the pigeons with tape proved to be necessary to enable capture. Also, some reluctance of the male peregrine to attack pigeons was observed, and problems with equipment, visibility, and the proximity of the falcons to the release box were encountered. Manpower was the most significant resource requirement. Baiting of great-horned owls, possibly leading to owl attack on the falcons, is judged to be the largest detrimental effect of supplemental feeding. It is recommended that supplemental feeding be reserved for falcons or eyries where complete reproductive failure is expected. Plumage documentation photography was successfully conducted by a remotely controlled camera as an aid to identification of individual falcons. American robin, red-winged blackbird, starling, white-throated swift, bluebird, and mourning dove were among natural prey consumed by the peregrines before completion of egg laying. All activities in close proximity to the cliff were conducted at night to preclude direct disturbance of the falcons.« less
Reduced resistance to oxidative stress during reproduction as a cost of early-life stress.
Zimmer, Cédric; Spencer, Karen A
2015-05-01
Stress exposure during early-life development can have long-term consequences for a variety of biological functions including oxidative stress. The link between early-life stress and oxidative balance is beginning to be explored and previous studies have focused on this link in adult non-breeding or immature individuals. However, as oxidative stress is considered as the main physiological mechanism underlying the trade-off between self-maintenance and investment in reproduction, it is necessary to look at the consequences of early-life stress on oxidative status during reproduction. Here, we investigated the effects of exposure to pre- and/or post-natal stress on oxidative balance during reproduction under benign or stressful environmental conditions in an avian model species, the Japanese quail. We determined total antioxidant status (TAS), total oxidant status (TOS) and resistance to a free-radical attack in individual exposed to pre-natal stress, post-natal stress or both and in control individuals exposed to none of the stressors. TAS levels decreased over time in all females that reproduced under stressful conditions. TOS decreased between the beginning and the end of reproductive period in pre-natal control females. In all females, resistance to a free-radical attack decreased over the reproductive event but this decrease was more pronounced in females from a pre-natal stress development. Our results suggest that pre-natal stress may be associated with a higher cost of reproduction in terms of oxidative stress. These results also confirm that early-life stress can be associated with both benefits and costs depending of the life-history stage or environmental context. Copyright © 2014 Elsevier Inc. All rights reserved.
Ahmed, W; Harwood, V J; Nguyen, K; Young, S; Hamilton, K; Toze, S
2016-01-01
Avian fecal droppings may negatively impact environmental water quality due to the presence of high concentrations of fecal indicator bacteria (FIB) and zoonotic pathogens. This study was aimed at evaluating the performance characteristics and utility of a Helicobacter spp. associated GFD marker by screening 265 fecal and wastewater samples from a range of avian and non-avian host groups from two continents (Brisbane, Australia and Florida, USA). The host-prevalence and -specificity of this marker among fecal and wastewater samples tested from Brisbane were 0.58 and 0.94 (maximum value of 1.00). These values for the Florida fecal samples were 0.30 (host-prevalence) and 1.00 (host-specificity). The concentrations of the GFD markers in avian and non-avian fecal nucleic acid samples were measured at a test concentration of 10 ng of nucleic acid at Brisbane and Florida laboratories using the quantitative PCR (qPCR) assay. The mean concentrations of the GFD marker in avian fecal nucleic acid samples (5.2 × 10(3) gene copies) were two orders of magnitude higher than non-avian fecal nucleic acid samples (8.6 × 10(1) gene copies). The utility of this marker was evaluated by testing water samples from the Brisbane River, Brisbane and a freshwater creek in Florida. Among the 18 water samples tested from the Brisbane River, 83% (n = 18) were positive for the GFD marker, and the concentrations ranged from 6.0 × 10(1)-3.2 × 10(2) gene copies per 100 mL water. In all, 92% (n = 25) water samples from the freshwater creek in Florida were also positive for the GFD marker with concentrations ranging from 2.8 × 10(1)-1.3 × 10(4) gene copies per 100 mL water. Based on the results, it can be concluded that the GFD marker is highly specific to avian host groups, and could be used as a reliable marker to detect the presence and amount of avian fecal pollution in environmental waters. Crown Copyright © 2015. Published by Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duren, Mike; Aldridge, Hal; Abercrombie, Robert K
2013-01-01
Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution andmore » management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack. We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T.
Cyber physical computing infrastructures typically consist of a number of sites are interconnected. Its operation critically depends both on cyber components and physical components. Both types of components are subject to attacks of different kinds and frequencies, which must be accounted for the initial provisioning and subsequent operation of the infrastructure via information security analysis. Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, andmore » information assets. We concentrated our analysis on the electric sector failure scenarios and impact analyses by the NESCOR Working Group Study, From the Section 5 electric sector representative failure scenarios; we extracted the four generic failure scenarios and grouped them into three specific threat categories (confidentiality, integrity, and availability) to the system. These specific failure scenarios serve as a demonstration of our simulation. The analysis using our ABGT simulation demonstrates how to model the electric sector functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the cyber physical infrastructure network with respect to CIA.« less
Low diversity, activity, and density of transposable elements in five avian genomes.
Gao, Bo; Wang, Saisai; Wang, Yali; Shen, Dan; Xue, Songlei; Chen, Cai; Cui, Hengmi; Song, Chengyi
2017-07-01
In this study, we conducted the activity, diversity, and density analysis of transposable elements (TEs) across five avian genomes (budgerigar, chicken, turkey, medium ground finch, and zebra finch) to explore the potential reason of small genome sizes of birds. We found that these avian genomes exhibited low density of TEs by about 10% of genome coverages and low diversity of TEs with the TE landscapes dominated by CR1 and ERV elements, and contrasting proliferation dynamics both between TE types and between species were observed across the five avian genomes. Phylogenetic analysis revealed that CR1 clade was more diverse in the family structure compared with R2 clade in birds; avian ERVs were classified into four clades (alpha, beta, gamma, and ERV-L) and belonged to three classes of ERV with an uneven distributed in these lineages. The activities of DNA and SINE TEs were very low in the evolution history of avian genomes; most LINEs and LTRs were ancient copies with a substantial decrease of activity in recent, with only LTRs and LINEs in chicken and zebra finch exhibiting weak activity in very recent, and very few TEs were intact; however, the recent activity may be underestimated due to the sequencing/assembly technologies in some species. Overall, this study demonstrates low diversity, activity, and density of TEs in the five avian species; highlights the differences of TEs in these lineages; and suggests that the current and recent activity of TEs in avian genomes is very limited, which may be one of the reasons of small genome sizes in birds.
Dececchi, T. Alexander; Larsson, Hans C. E.
2011-01-01
The origin of avian flight is a classic macroevolutionary transition with research spanning over a century. Two competing models explaining this locomotory transition have been discussed for decades: ground up versus trees down. Although it is impossible to directly test either of these theories, it is possible to test one of the requirements for the trees-down model, that of an arboreal paravian. We test for arboreality in non-avian theropods and early birds with comparisons to extant avian, mammalian, and reptilian scansors and climbers using a comprehensive set of morphological characters. Non-avian theropods, including the small, feathered deinonychosaurs, and Archaeopteryx, consistently and significantly cluster with fully terrestrial extant mammals and ground-based birds, such as ratites. Basal birds, more advanced than Archaeopteryx, cluster with extant perching ground-foraging birds. Evolutionary trends immediately prior to the origin of birds indicate skeletal adaptations opposite that expected for arboreal climbers. Results reject an arboreal capacity for the avian stem lineage, thus lending no support for the trees-down model. Support for a fully terrestrial ecology and origin of the avian flight stroke has broad implications for the origin of powered flight for this clade. A terrestrial origin for the avian flight stroke challenges the need for an intermediate gliding phase, presents the best resolved series of the evolution of vertebrate powered flight, and may differ fundamentally from the origin of bat and pterosaur flight, whose antecedents have been postulated to have been arboreal and gliding. PMID:21857918
Slater, Tessa; Eckerle, Isabella; Chang, Kin-Chow
2018-04-10
With the recent discovery of novel H17N10 and H18N11 influenza viral RNA in bats and report on high frequency of avian H9 seroconversion in a species of free ranging bats, an important issue to address is the extent bats are susceptible to conventional avian and human influenza A viruses. To this end, three bat species (Eidolon helvum, Carollia perspicillata and Tadarida brasiliensis) of lung epithelial cells were separately infected with two avian and two human influenza viruses to determine their relative host innate immune resistance to infection. All three species of bat cells were more resistant than positive control Madin-Darby canine kidney (MDCK) cells to all four influenza viruses. TB1-Lu cells lacked sialic acid α2,6-Gal receptors and were most resistant among the three bat species. Interestingly, avian viruses were relatively more replication permissive in all three bat species of cells than with the use of human viruses which suggest that bats could potentially play a role in the ecology of avian influenza viruses. Chemical inhibition of the JAK-STAT pathway in bat cells had no effect on virus production suggesting that type I interferon signalling is not a major factor in resisting influenza virus infection. Although all three species of bat cells are relatively more resistant to influenza virus infection than control MDCK cells, they are more permissive to avian than human viruses which suggest that bats could have a contributory role in the ecology of avian influenza viruses.
West Nile and St. Louis encephalitis viral genetic determinants of avian host competence
Maharaj, Payal D.; Bosco-Lauth, Angela M.; Langevin, Stanley A.; Anishchenko, Michael; Bowen, Richard A.; Reisen, William K.
2018-01-01
West Nile virus (WNV) and St. Louis encephalitis (SLEV) virus are enzootically maintained in North America in cycles involving the same mosquito vectors and similar avian hosts. However, these viruses exhibit dissimilar viremia and virulence phenotypes in birds: WNV is associated with high magnitude viremias that can result in mortality in certain species such as American crows (AMCRs, Corvus brachyrhynchos) whereas SLEV infection yields lower viremias that have not been associated with avian mortality. Cross-neutralization of these viruses in avian sera has been proposed to explain the reduced circulation of SLEV since the introduction of WNV in North America; however, in 2015, both viruses were the etiologic agents of concurrent human encephalitis outbreaks in Arizona, indicating the need to re-evaluate host factors and cross-neutralization responses as factors potentially affecting viral co-circulation. Reciprocal chimeric WNV and SLEV viruses were constructed by interchanging the pre-membrane (prM)-envelope (E) genes, and viruses subsequently generated were utilized herein for the inoculation of three different avian species: house sparrows (HOSPs; Passer domesticus), house finches (Haemorhous mexicanus) and AMCRs. Cross-protective immunity between parental and chimeric viruses were also assessed in HOSPs. Results indicated that the prM-E genes did not modulate avian replication or virulence differences between WNV and SLEV in any of the three avian species. However, WNV-prME proteins did dictate cross-protective immunity between these antigenically heterologous viruses. Our data provides further evidence of the important role that the WNV / SLEV viral non-structural genetic elements play in viral replication, avian host competence and virulence. PMID:29447156
A mathematical model of avian influenza with half-saturated incidence.
Chong, Nyuk Sian; Tchuenche, Jean Michel; Smith, Robert J
2014-03-01
The widespread impact of avian influenza viruses not only poses risks to birds, but also to humans. The viruses spread from birds to humans and from human to human In addition, mutation in the primary strain will increase the infectiousness of avian influenza. We developed a mathematical model of avian influenza for both bird and human populations. The effect of half-saturated incidence on transmission dynamics of the disease is investigated. The half-saturation constants determine the levels at which birds and humans contract avian influenza. To prevent the spread of avian influenza, the associated half-saturation constants must be increased, especially the half-saturation constant H m for humans with mutant strain. The quantity H m plays an essential role in determining the basic reproduction number of this model. Furthermore, by decreasing the rate β m at which human-to-human mutant influenza is contracted, an outbreak can be controlled more effectively. To combat the outbreak, we propose both pharmaceutical (vaccination) and non-pharmaceutical (personal protection and isolation) control methods to reduce the transmission of avian influenza. Vaccination and personal protection will decrease β m, while isolation will increase H m. Numerical simulations demonstrate that all proposed control strategies will lead to disease eradication; however, if we only employ vaccination, it will require slightly longer to eradicate the disease than only applying non-pharmaceutical or a combination of pharmaceutical and non-pharmaceutical control methods. In conclusion, it is important to adopt a combination of control methods to fight an avian influenza outbreak.
Watanabe, K P; Kawai, Y K; Nakayama, S M M; Ikenaka, Y; Mizukawa, H; Takaesu, N; Ito, M; Ikushiro, S-I; Sakaki, T; Ishizuka, M
2015-04-01
Large interspecies differences in avian xenobiotic metabolism have been revealed by microsome-based studies, but specific enzyme isoforms in different bird species have not yet been compared. We have previously shown that CYP2C23 genes are the most induced CYP isoforms in chicken liver. In this study, we collected partial CYP2C23a gene sequences from eight avian species (ostrich, blue-eared pheasant, snowy owl, great-horned owl, Chilean flamingo, peregrin falcon, Humboldt penguin, and black-crowned night heron) selected to cover the whole avian lineage: Paleognathae, Galloanserae, and Neoaves. Genetic analysis showed that CYP2C23 genes of Galloanserae species (chicken and blue-eared pheasant) had unique characteristics. We found some duplicated genes (CYP2C23a and CYP2C23b) and two missing amino acid residues in Galloanserae compared to the other two lineages. The genes have lower homology than in other avian lineages, which suggests Galloanserae-specific rapid evolutionary changes. These genetic features suggested that the Galloanserae are not the most representative avian species, considering that the Neoaves comprise more than 95% of birds. Moreover, we succeeded in synthesizing an antipeptide polyclonal antibody against the region of CYP2C23 protein conserved in avians. However, comparative quantitation of CYP2C23 proteins in livers from six species showed that expression levels of these proteins differed no more than fourfold. Further study is needed to clarify the function of avian CYP2C23 proteins. © 2014 John Wiley & Sons Ltd.
NASA Astrophysics Data System (ADS)
Stytz, Martin R.; May, Michael; Banks, Sheila B.
2009-04-01
Department of Defense (DoD) Information Technology (IT) systems operate in an environment different from the commercial world, the differences arise from the differences in the types of attacks, the interdependencies between DoD software systems, and the reliance upon commercial software to provide basic capabilities. The challenge that we face is determining how to specify the information assurance requirements for a system without requiring changes to the commercial software and in light of the interdependencies between systems. As a result of the interdependencies and interconnections between systems introduced by the global information grid (GIG), an assessment of the IA requirements for a system must consider three facets of a system's IA capabilities: 1) the IA vulnerabilities of the system, 2) the ability of a system to repel IA attacks, and 3) the ability of a system to insure that any IA attack that penetrates the system is contained within the system and does not spread. Each facet should be assessed independently and the requirements should be derived independently from the assessments. In addition to the desired IA technology capabilities of the system, a complete assessment of the system's overall IA security technology readiness level cannot be accomplished without an assessment of the capabilities required of the system for its capability to recover from and remediate IA vulnerabilities and compromises. To allow us to accomplish these three formidable tasks, we propose a general system architecture designed to separate the system's IA capabilities from its other capability requirements; thereby allowing the IA capabilities to be developed and assessed separately from the other system capabilities. The architecture also enables independent requirements specification, implementation, assessment, measurement, and improvement of a system's IA capabilities without requiring modification of the underlying application software.
Conical Euler simulation and active suppression of delta wing rocking motion
NASA Technical Reports Server (NTRS)
Lee, Elizabeth M.; Batina, John T.
1990-01-01
A conical Euler code was developed to study unsteady vortex-dominated flows about rolling highly-swept delta wings, undergoing either forced or free-to-roll motions including active roll suppression. The flow solver of the code involves a multistage Runge-Kutta time-stepping scheme which uses a finite volume spatial discretization of the Euler equations on an unstructured grid of triangles. The code allows for the additional analysis of the free-to-roll case, by including the rigid-body equation of motion for its simultaneous time integration with the governing flow equations. Results are presented for a 75 deg swept sharp leading edge delta wing at a freestream Mach number of 1.2 and at alpha equal to 10 and 30 deg angle of attack. A forced harmonic analysis indicates that the rolling moment coefficient provides: (1) a positive damping at the lower angle of attack equal to 10 deg, which is verified in a free-to-roll calculation; (2) a negative damping at the higher angle of attack equal to 30 deg at the small roll amplitudes. A free-to-roll calculation for the latter case produces an initially divergent response, but as the amplitude of motion grows with time, the response transitions to a wing-rock type of limit cycle oscillation. The wing rocking motion may be actively suppressed, however, through the use of a rate-feedback control law and antisymmetrically deflected leading edge flaps. The descriptions of the conical Euler flow solver and the free-to-roll analysis are presented. Results are also presented which give insight into the flow physics associated with unsteady vortical flows about forced and free-to-roll delta wings, including the active roll suppression of this wing-rock phenomenon.
Avian nestling predation by endangered Mount Graham red squirrel
Claire A. Zugmeyer; John L. Koprowski
2007-01-01
Studies using artificial nests or remote cameras have documented avian predation by red squirrels (Tamiasciurus hudsonicus). Although several direct observations of avian predation events are known in the northern range of the red squirrel distribution, no accounts have been reported in the southern portion. We observed predation upon a hermit thrush...
H9N2 low pathogenic avian influenza: Should we be afraid?
USDA-ARS?s Scientific Manuscript database
The H9N2 low pathogenic avian influenza (LPAI) is probably the most widespread avian influenza subtype in poultry around the world being endemic in a large part of Asia, the Middle East, Northern Africa, and in Germany. Currently, there is no standardized clade system to describe the antigenic vari...
9 CFR 93.201 - General prohibitions; exceptions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... the United States if the poultry have been vaccinated for the H5 or H7 subtype of avian influenza. 2... been in any region where highly pathogenic avian influenza exists, which are subject to the provisions... region where highly pathogenic avian influenza exists may only be imported through the port of Los...
9 CFR 93.201 - General prohibitions; exceptions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... the United States if the poultry have been vaccinated for the H5 or H7 subtype of avian influenza. 2... been in any region where highly pathogenic avian influenza exists, which are subject to the provisions... region where highly pathogenic avian influenza exists may only be imported through the port of Los...
9 CFR 145.63 - Terminology and classification; flocks and products.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Official State Agency and approved by the Service in lieu of annual blood testing. (b) U.S. Avian Influenza... program for the prevention and control of avian influenza. It is intended to determine the presence of avian influenza in all ostrich, emu, rhea, and cassowary breeding flocks through routine serological...
9 CFR 93.201 - General prohibitions; exceptions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... the United States if the poultry have been vaccinated for the H5 or H7 subtype of avian influenza. 2... been in any region where highly pathogenic avian influenza exists, which are subject to the provisions... region where highly pathogenic avian influenza exists may only be imported through the port of Los...
Code of Federal Regulations, 2014 CFR
2014-01-01
... DISEASE, HIGHLY PATHOGENIC AVIAN INFLUENZA, AFRICAN SWINE FEVER, CLASSICAL SWINE FEVER, SWINE VESICULAR... in § 94.6(a) as free of Newcastle disease and highly pathogenic avian influenza at the time the... free of Newcastle disease and highly pathogenic avian influenza at a federally inspected slaughter...
9 CFR 145.63 - Terminology and classification; flocks and products.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Official State Agency and approved by the Service in lieu of annual blood testing. (b) U.S. Avian Influenza... program for the prevention and control of avian influenza. It is intended to determine the presence of avian influenza in all ostrich, emu, rhea, and cassowary breeding flocks through routine serological...
Studying the pathogenicity of avian influenza viruses in different avian species
USDA-ARS?s Scientific Manuscript database
Avian influenza (AI) viruses are significant pathogens of domestic poultry worldwide. Wild aquatic birds are the primordial reservoirs of AI viruses, which are classified as low pathogenic (LP) and can be any of the 16 hemagglutinin subtypes (H1-16). Circulation of H5 or H7 subtype LPAI viruses in...
9 CFR 145.63 - Terminology and classification; flocks and products.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Official State Agency and approved by the Service in lieu of annual blood testing. (b) U.S. Avian Influenza... program for the prevention and control of avian influenza. It is intended to determine the presence of avian influenza in all ostrich, emu, rhea, and cassowary breeding flocks through routine serological...
Current situation of avian influenza with emphasis on pathobiology, epidemiology and control
USDA-ARS?s Scientific Manuscript database
Avian influenza is one of the most important diseases affecting the poultry industry around the world. Avian Influenza virus (AIV) has a broad host range in birds and mammals, although the natural reservoir is considered to be in wild birds where it typically causes an asymptomatic to mild infectio...
9 CFR 113.326 - Avian Pox Vaccine.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Avian Pox Vaccine. 113.326 Section 113... Vaccines § 113.326 Avian Pox Vaccine. Fowl Pox Vaccine and Pigeon Pox Vaccine shall be prepared from virus... this section shall be used for preparing the production seed virus for vaccine production. All serials...
9 CFR 113.326 - Avian Pox Vaccine.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Avian Pox Vaccine. 113.326 Section 113... Vaccines § 113.326 Avian Pox Vaccine. Fowl Pox Vaccine and Pigeon Pox Vaccine shall be prepared from virus... this section shall be used for preparing the production seed virus for vaccine production. All serials...
9 CFR 113.326 - Avian Pox Vaccine.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Avian Pox Vaccine. 113.326 Section 113... Vaccines § 113.326 Avian Pox Vaccine. Fowl Pox Vaccine and Pigeon Pox Vaccine shall be prepared from virus... this section shall be used for preparing the production seed virus for vaccine production. All serials...
9 CFR 113.326 - Avian Pox Vaccine.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Avian Pox Vaccine. 113.326 Section 113... Vaccines § 113.326 Avian Pox Vaccine. Fowl Pox Vaccine and Pigeon Pox Vaccine shall be prepared from virus... this section shall be used for preparing the production seed virus for vaccine production. All serials...
9 CFR 113.326 - Avian Pox Vaccine.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Avian Pox Vaccine. 113.326 Section 113... Vaccines § 113.326 Avian Pox Vaccine. Fowl Pox Vaccine and Pigeon Pox Vaccine shall be prepared from virus... this section shall be used for preparing the production seed virus for vaccine production. All serials...
Susceptibility of swine to H5 and H7 low pathogenic avian influenza viruses
USDA-ARS?s Scientific Manuscript database
The ability of pigs to become infected with low pathogenic avian influenza (LPAI) viruses from an avian reservoir, and then generate mammalian adaptable influenza A viruses (IAVs) is difficult to determine. Yet, it is an important link to understanding any relationship between LPAI virus ecology and...
Genome Modification Technologies and Their Applications in Avian Species.
Lee, Hong Jo; Kim, Young Min; Ono, Tamao; Han, Jae Yong
2017-10-26
The rapid development of genome modification technology has provided many great benefits in diverse areas of research and industry. Genome modification technologies have also been actively used in a variety of research areas and fields of industry in avian species. Transgenic technologies such as lentiviral systems and piggyBac transposition have been used to produce transgenic birds for diverse purposes. In recent years, newly developed programmable genome editing tools such as transcription activator-like effector nuclease (TALEN) and clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated protein 9 (CRISPR/Cas9) have also been successfully adopted in avian systems with primordial germ cell (PGC)-mediated genome modification. These genome modification technologies are expected to be applied to practical uses beyond system development itself. The technologies could be used to enhance economic traits in poultry such as acquiring a disease resistance or producing functional proteins in eggs. Furthermore, novel avian models of human diseases or embryonic development could also be established for research purposes. In this review, we discuss diverse genome modification technologies used in avian species, and future applications of avian biotechnology.
Coquillettidia (Culicidae, Diptera) mosquitoes are natural vectors of avian malaria in Africa
2009-01-01
Background The mosquito vectors of Plasmodium spp. have largely been overlooked in studies of ecology and evolution of avian malaria and other vertebrates in wildlife. Methods Plasmodium DNA from wild-caught Coquillettidia spp. collected from lowland forests in Cameroon was isolated and sequenced using nested PCR. Female Coquillettidia aurites were also dissected and salivary glands were isolated and microscopically examined for the presence of sporozoites. Results In total, 33% (85/256) of mosquito pools tested positive for avian Plasmodium spp., harbouring at least eight distinct parasite lineages. Sporozoites of Plasmodium spp. were recorded in salivary glands of C. aurites supporting the PCR data that the parasites complete development in these mosquitoes. Results suggest C. aurites, Coquillettidia pseudoconopas and Coquillettidia metallica as new and important vectors of avian malaria in Africa. All parasite lineages recovered clustered with parasites formerly identified from several bird species and suggest the vectors capability of infecting birds from different families. Conclusion Identifying the major vectors of avian Plasmodium spp. will assist in understanding the epizootiology of avian malaria, including differences in this disease distribution between pristine and disturbed landscapes. PMID:19664282
Serological Evidence of Human Infection with Avian Influenza A H7virus in Egyptian Poultry Growers.
Gomaa, Mokhtar R; Kandeil, Ahmed; Kayed, Ahmed S; Elabd, Mona A; Zaki, Shaimaa A; Abu Zeid, Dina; El Rifay, Amira S; Mousa, Adel A; Farag, Mohamed M; McKenzie, Pamela P; Webby, Richard J; Ali, Mohamed A; Kayali, Ghazi
2016-01-01
Avian influenza viruses circulate widely in birds, with occasional human infections. Poultry-exposed individuals are considered to be at high risk of infection with avian influenza viruses due to frequent exposure to poultry. Some avian H7 viruses have occasionally been found to infect humans. Seroprevalence of neutralizing antibodies against influenza A/H7N7 virus among poultry-exposed and unexposed individuals in Egypt were assessed during a three-years prospective cohort study. The seroprevalence of antibodies (titer, ≥80) among exposed individuals was 0%, 1.9%, and 2.1% annually while the seroprevalence among the control group remained 0% as measured by virus microneutralization assay. We then confirmed our results using western blot and immunofluorescence assays. Although human infection with H7 in Egypt has not been reported yet, our results suggested that Egyptian poultry growers are exposed to avian H7 viruses. These findings highlight the need for surveillance in the people exposed to poultry to monitor the risk of zoonotic transmission of avian influenza viruses.
A human-infecting H10N8 influenza virus retains a strong preference for avian-type receptors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Heng; de Vries, Robert P.; Tzarum, Netanel
Recent avian-origin H10N8 influenza A viruses that have infected humans pose a potential pandemic threat. Alterations in the viral surface glycoprotein, hemagglutinin (HA), typically are required for influenza A viruses to cross the species barrier for adaptation to a new host, but whether H10N8 contains adaptations supporting human infection remains incompletely understood. In this paper, we investigated whether H10N8 HA can bind human receptors. Sialoside glycan microarray analysis showed that the H10 HA retains a strong preference for avian receptor analogs and negligible binding to human receptor analogs. Crystal structures of H10 HA with avian and human receptor analogs revealedmore » the basis for preferential recognition of avian-like receptors. Furthermore, introduction of mutations into the H10 receptor-binding site (RBS) known to convert other HA subtypes from avian to human receptor specificity failed to switch preference to human receptors. In conclusion, collectively these findings suggest that the current H10N8 human isolates are poorly adapted for efficient human-to-human transmission.« less
A fossil brain from the Cretaceous of European Russia and avian sensory evolution.
Kurochkin, Evgeny N; Dyke, Gareth J; Saveliev, Sergei V; Pervushov, Evgeny M; Popov, Evgeny V
2007-06-22
Fossils preserving traces of soft anatomy are rare in the fossil record; even rarer is evidence bearing on the size and shape of sense organs that provide us with insights into mode of life. Here, we describe unique fossil preservation of an avian brain from the Volgograd region of European Russia. The brain of this Melovatka bird is similar in shape and morphology to those of known fossil ornithurines (the lineage that includes living birds), such as the marine diving birds Hesperornis and Enaliornis, but documents a new stage in avian sensory evolution: acute nocturnal vision coupled with well-developed hearing and smell, developed by the Late Cretaceous (ca 90Myr ago). This fossil also provides insights into previous 'bird-like' brain reconstructions for the most basal avian Archaeopteryx--reduction of olfactory lobes (sense of smell) and enlargement of the hindbrain (cerebellum) occurred subsequent to Archaeopteryx in avian evolution, closer to the ornithurine lineage that comprises living birds. The Melovatka bird also suggests that brain enlargement in early avians was not correlated with the evolution of powered flight.
Gholami-Ahangaran, Majid; Zia-Jahromi, Noosha; Namjoo, Abdolrasul
2014-02-01
In recent years, some outbreaks of skin lesions suspected to be avian pox were observed in the backyard poultry in different parts of western areas in Iran. Consequently, 328 backyard poultries with suspected signs of avian pox virus infection were sampled. All birds showed nodular lesions on unfeathered head skin and/or fibronecrotic lesions on mucus membrane of the oral cavity and upper respiratory tract. For histopathological analysis, the sections of tissue samples from cutaneous lesions of examined birds were stained with H&E method. For PCR, after DNA extraction a 578-bp fragment of avian pox virus from 4b core protein gene was amplified. Results showed 217 and 265 out of 328 (66.1 and 80.7%, respectively) samples were positive for avian pox virus on histopathological and PCR examination, respectively. In this study, the samples that had intracytoplasmic inclusion bodies on pathologic examination were PCR positive. This study revealed that PCR is a valuable tool for identification of an avian pox virus and that the frequency of pox infection in backyard poultry in western areas of Iran is high.
A human-infecting H10N8 influenza virus retains a strong preference for avian-type receptors
Zhang, Heng; de Vries, Robert P.; Tzarum, Netanel; ...
2015-03-11
Recent avian-origin H10N8 influenza A viruses that have infected humans pose a potential pandemic threat. Alterations in the viral surface glycoprotein, hemagglutinin (HA), typically are required for influenza A viruses to cross the species barrier for adaptation to a new host, but whether H10N8 contains adaptations supporting human infection remains incompletely understood. In this paper, we investigated whether H10N8 HA can bind human receptors. Sialoside glycan microarray analysis showed that the H10 HA retains a strong preference for avian receptor analogs and negligible binding to human receptor analogs. Crystal structures of H10 HA with avian and human receptor analogs revealedmore » the basis for preferential recognition of avian-like receptors. Furthermore, introduction of mutations into the H10 receptor-binding site (RBS) known to convert other HA subtypes from avian to human receptor specificity failed to switch preference to human receptors. In conclusion, collectively these findings suggest that the current H10N8 human isolates are poorly adapted for efficient human-to-human transmission.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ocana-Macchi, Manuela; Ricklin, Meret E.; Python, Sylvie
2012-05-25
The 2009 influenza A virus (IAV) pandemic resulted from reassortment of avian, human and swine strains probably in pigs. To elucidate the role of viral genes in host adaptation regarding innate immune responses, we focussed on the effect of genes from an avian H5N1 and a porcine H1N1 IAV on infectivity and activation of porcine GM-CSF-induced dendritic cells (DC). The highest interferon type I responses were achieved by the porcine virus reassortant containing the avian polymerase gene PB2. This finding was not due to differential tropism since all viruses infected DC equally. All viruses equally induced MHC class II, butmore » porcine H1N1 expressing the avian viral PB2 induced more prominent nuclear NF-{kappa}B translocation compared to its parent IAV. The enhanced activation of DC may be detrimental or beneficial. An over-stimulation of innate responses could result in either pronounced tissue damage or increased resistance against IAV reassortants carrying avian PB2.« less
Genome Modification Technologies and Their Applications in Avian Species
Lee, Hong Jo; Kim, Young Min; Ono, Tamao
2017-01-01
The rapid development of genome modification technology has provided many great benefits in diverse areas of research and industry. Genome modification technologies have also been actively used in a variety of research areas and fields of industry in avian species. Transgenic technologies such as lentiviral systems and piggyBac transposition have been used to produce transgenic birds for diverse purposes. In recent years, newly developed programmable genome editing tools such as transcription activator-like effector nuclease (TALEN) and clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated protein 9 (CRISPR/Cas9) have also been successfully adopted in avian systems with primordial germ cell (PGC)-mediated genome modification. These genome modification technologies are expected to be applied to practical uses beyond system development itself. The technologies could be used to enhance economic traits in poultry such as acquiring a disease resistance or producing functional proteins in eggs. Furthermore, novel avian models of human diseases or embryonic development could also be established for research purposes. In this review, we discuss diverse genome modification technologies used in avian species, and future applications of avian biotechnology. PMID:29072628
Role for migratory wild birds in the global spread of avian influenza H5N8
,; Ip, Hon S.
2016-01-01
Avian influenza viruses affect both poultry production and public health. A subtype H5N8 (clade 2.3.4.4) virus, following an outbreak in poultry in South Korea in January 2014, rapidly spread worldwide in 2014–2015. Our analysis of H5N8 viral sequences, epidemiological investigations, waterfowl migration, and poultry trade showed that long-distance migratory birds can play a major role in the global spread of avian influenza viruses. Further, we found that the hemagglutinin of clade 2.3.4.4 virus was remarkably promiscuous, creating reassortants with multiple neuraminidase subtypes. Improving our understanding of the circumpolar circulation of avian influenza viruses in migratory waterfowl will help to provide early warning of threats from avian influenza to poultry, and potentially human, health.
Are wetlands the reservoir for avian cholera?
Samuel, M.D.; Shadduck, D.J.; Goldberg, Diana R.
2004-01-01
Wetlands have long been suspected to be an important reservoir for Pasteurella multocida and therefore the likely source of avian cholera outbreaks. During the fall of 1995a??98 we collected sediment and water samples from 44 wetlands where avian cholera epizootics occurred the previous winter or spring. We attempted to isolate P. multocida in sediment and surface water samples from 10 locations distributed throughout each wetland. We were not able to isolate P. multocida from any of the 440 water and 440 sediment samples collected from these wetlands. In contrast, during other investigations of avian cholera we isolated P. multocida from 20 of 44 wetlands, including 7% of the water and 4.5% of the sediment samples collected during or shortly following epizootic events. Our results indicate that wetlands are an unlikely reservoir for the bacteria that causes avian cholera.
Transmission and reassortment of avian influenza viruses at the Asian-North American interface.
Ramey, Andrew M; Pearce, John M; Ely, Craig R; Guy, Lisa M Sheffield; Irons, David B; Derksen, Dirk V; Ip, Hon S
2010-10-25
Twenty avian influenza viruses were isolated from seven wild migratory bird species sampled at St. Lawrence Island, Alaska. We tested predictions based on previous phylogenetic analyses of avian influenza viruses that support spatially dependent trans-hemispheric gene flow and frequent interspecies transmission at a location situated at the Asian-North American interface. Through the application of phylogenetic and genotypic approaches, our data support functional dilution by distance of trans-hemispheric reassortants and interspecific virus transmission. Our study confirms infection of divergent avian taxa with nearly identical avian influenza strains in the wild. Findings also suggest that H16N3 viruses may contain gene segments with unique phylogenetic positions and that further investigation of how host specificity may impact transmission of H13 and H16 viruses is warranted. Copyright © 2010. Published by Elsevier Inc.
Lin, Jian; Xia, Jing; Zhang, Tian; Zhang, Keyun; Yang, Qian
2018-05-10
The antigen-presenting ability of dendritic cells (DCs) plays an important and irreplaceable role in recognising and clearing viruses. Antiviral responses must rapidly defend against infection while minimising inflammatory damage, but the mechanisms that regulate the magnitude of response within an infected cell are not well understood. MicroRNAs (microRNAs), small non-coding RNAs, can regulate mouse or avian DCs to inhibit the infection and replication of avian influenza virus (AIV). Here, we performed a global analysis to understand how avian DCs respond to H9N2 AIV and provide a potential mechanism to explain how avian microRNAs can defend against H9N2 AIV replication. First, we found that both active and inactive H9N2 AIV enhanced the ability of DCs to present antigens and activate T lymphocytes. Next, total microarray analyses suggested that H9N2 AIV stimulation involved protein localisation, nucleotide binding, leucocyte transendothelial migration and MAPK signalling. Moreover, we constructed 551 transcription factor (TF)-miRNA-mRNA loops based on the above analyses. Furthermore, we found that the haemagglutinin (HA) fragment, neither H5N1-HA or H9N2-HA, could not activate DCs, while truncated HA greatly increased the immune function of DCs by activating ERK and STAT3 signalling pathways. Lastly, our results not only suggested that gga-miR1644 targets muscleblind-like protein 2 (MBNL2) to enhance the ability of avian DCs to inhibit virus replication, but also suggested that gga-miR6675 targets the nuclear localisation sequence of polymerase basic protein 1 (PB1) to trigger the silencing of PB1 genes, resulting in the inhibition of H9N2 AIV replication. Altogether, our innovative study will shed new light on the role of avian microRNAs in evoking avian DCs and inhibiting virus replication.
Chu, D-H; Stevenson, M A; Nguyen, L V; Isoda, N; Firestone, S M; Nguyen, T N; Nguyen, L T; Matsuno, K; Okamatsu, M; Kida, H; Sakoda, Y
2017-12-01
In Vietnam, live bird markets are found in most populated centres, providing the means by which fresh poultry can be purchased by consumers for immediate consumption. Live bird markets are aggregation points for large numbers of poultry, and therefore, it is common for a range of avian influenza viruses to be mixed within live bird markets as a result of different poultry types and species being brought together from different geographical locations. We conducted a cross-sectional study in seven live bird markets in four districts of Thua Thien Hue Province in August and December, 2014. The aims of this study were to (i) document the prevalence of avian influenza in live bird markets (as measured by virus isolation); and (ii) quantify individual bird-, seller- and market-level characteristics that rendered poultry more likely to be positive for avian influenza virus at the time of sale. A questionnaire soliciting details of knowledge, attitude and avian influenza practices was administered to poultry sellers in study markets. At the same time, swabs and faecal samples were collected from individual poultry and submitted for isolation of avian influenza virus. The final data set comprised samples from 1,629 birds from 83 sellers in the seven live bird markets. A total of 113 birds were positive for virus isolation; a prevalence of 6.9 (95% CI 5.8-8.3) avian influenza virus-positive birds per 100 birds submitted for sale. After adjusting for clustering at the market and individual seller levels, none of the explanatory variables solicited in the questionnaire were significantly associated with avian influenza virus isolation positivity. The proportions of variance at the individual market, seller and individual bird levels were 6%, 48% and 46%, respectively. We conclude that the emphasis of avian influenza control efforts in Vietnam should be at the individual seller level as opposed to the market level. © 2017 Blackwell Verlag GmbH.
Emerging and reemerging diseases of avian wildlife
Pello, Susan J.; Olsen, Glenn H.
2013-01-01
Of the many important avian wildlife diseases, aspergillosis, West Nile virus, avipoxvirus, Wellfleet Bay virus, avian influenza, and inclusion body disease of cranes are covered in this article. Wellfleet Bay virus, first identified in 2010, is considered an emerging disease. Avian influenza and West Nile virus have recently been in the public eye because of their zoonotic potential and links to wildlife. Several diseases labeled as reemerging are included because of recent outbreaks or, more importantly, recent research in areas such as genomics, which shed light on the mechanisms whereby these adaptable, persistent pathogens continue to spread and thrive.
Shiraishi, Rikiya; Nishiguchi, Akiko; Tsukamoto, Kenji; Muramatsu, Masatake
2012-09-01
We evaluated the utility of 5 commercial enzyme-linked immunosorbent assay (ELISA) kits for detecting antibodies to avian influenza viruses. The sensitivities and specificities of the ELISA kits were compared with those of the agar gel precipitation (AGP) and hemagglutination-inhibition (HI) tests. The results suggest that some ELISA kits might not be suitable for monitoring during the early stages of avian influenza virus infections. Therefore, ELISA kits should only be used in conjunction with a profound knowledge about monitoring of avian influenza.
Antigenic characterization of H3 subtypes of avian influenza A viruses from North America
Bailey, Elizabeth; Long, Li-Pong; Zhao, Nan; Hall, Jeffrey S.; Baroch, John A; Nolting, Jaqueline; Senter, Lucy; Cunningham, Frederick L; Pharr, G Todd; Hanson, Larry; Slemons, Richard; DeLiberto, Thomas J.; Wan, Xiu-Feng
2016-01-01
Besides humans, H3 subtypes of influenza A viruses (IAVs) can infect various animal hosts, including avian, swine, equine, canine, and sea mammal species. These H3 viruses are both antigenically and genetically diverse. Here, we characterized the antigenic diversity of contemporary H3 avian IAVs recovered from migratory birds in North America. Hemagglutination inhibition (HI) assays were performed on 37 H3 isolates of avian IAVs recovered from 2007 to 2011 using generated reference chicken sera. These isolates were recovered from samples taken in the Atlantic, Mississippi, Central, and Pacific waterfowl migration flyways. Antisera to all the tested H3 isolates cross-reacted with each other and, to a lesser extent, with those to H3 canine and H3 equine IAVs. Antigenic cartography showed that the largest antigenic distance among the 37 avian IAVs is about four units, and each unit corresponds to a 2 log 2 difference in the HI titer. However, none of the tested H3 IAVs cross-reacted with ferret sera derived from contemporary swine and human IAVs. Our results showed that the H3 avian IAVs we tested lacked significant antigenic diversity, and these viruses were antigenically different from those circulating in swine and human populations. This suggests that H3 avian IAVs in North American waterfowl are antigenically relatively stable.
Characterizing the avian gut microbiota: membership, driving influences, and potential function.
Waite, David W; Taylor, Michael W
2014-01-01
Birds represent a diverse and evolutionarily successful lineage, occupying a wide range of niches throughout the world. Like all vertebrates, avians harbor diverse communities of microorganisms within their guts, which collectively fulfill important roles in providing the host with nutrition and protection from pathogens. Although many studies have investigated the role of particular microbes in the guts of avian species, there has been no attempt to unify the results of previous, sequence-based studies to examine the factors that shape the avian gut microbiota as a whole. In this study, we present the first meta-analysis of the avian gut microbiota, using 16S rRNA gene sequences obtained from a range of publicly available clone-library and amplicon pyrosequencing data. We investigate community membership and structure, as well as probe the roles of some of the key biological factors that influence the gut microbiota of other vertebrates, such as host phylogeny, location within the gut, diet, and association with humans. Our results indicate that, across avian studies, the microbiota demonstrates a similar phylum-level composition to that of mammals. Host bird species is the most important factor in determining community composition, although sampling site, diet, and captivity status also contribute. These analyses provide a first integrated look at the composition of the avian microbiota, and serve as a foundation for future studies in this area.
Evolution of olfaction in non-avian theropod dinosaurs and birds
Zelenitsky, Darla K.; Therrien, François; Ridgely, Ryan C.; McGee, Amanda R.; Witmer, Lawrence M.
2011-01-01
Little is known about the olfactory capabilities of extinct basal (non-neornithine) birds or the evolutionary changes in olfaction that occurred from non-avian theropods through modern birds. Although modern birds are known to have diverse olfactory capabilities, olfaction is generally considered to have declined during avian evolution as visual and vestibular sensory enhancements occurred in association with flight. To test the hypothesis that olfaction diminished through avian evolution, we assessed relative olfactory bulb size, here used as a neuroanatomical proxy for olfactory capabilities, in 157 species of non-avian theropods, fossil birds and living birds. We show that relative olfactory bulb size increased during non-avian maniraptoriform evolution, remained stable across the non-avian theropod/bird transition, and increased during basal bird and early neornithine evolution. From early neornithines through a major part of neornithine evolution, the relative size of the olfactory bulbs remained stable before decreasing in derived neoavian clades. Our results show that, rather than decreasing, the importance of olfaction actually increased during early bird evolution, representing a previously unrecognized sensory enhancement. The relatively larger olfactory bulbs of earliest neornithines, compared with those of basal birds, may have endowed neornithines with improved olfaction for more effective foraging or navigation skills, which in turn may have been a factor allowing them to survive the end-Cretaceous mass extinction. PMID:21490022
Antigenic Characterization of H3 Subtypes of Avian Influenza A Viruses from North America.
Bailey, Elizabeth; Long, Li-Ping; Zhao, Nan; Hall, Jeffrey S; Baroch, John A; Nolting, Jacqueline; Senter, Lucy; Cunningham, Frederick L; Pharr, G Todd; Hanson, Larry; Slemons, Richard; DeLiberto, Thomas J; Wan, Xiu-Feng
2016-05-01
Besides humans, H3 subtypes of influenza A viruses (IAVs) can infect various animal hosts, including avian, swine, equine, canine, and sea mammal species. These H3 viruses are both antigenically and genetically diverse. Here, we characterized the antigenic diversity of contemporary H3 avian IAVs recovered from migratory birds in North America. Hemagglutination inhibition (HI) assays were performed on 37 H3 isolates of avian IAVs recovered from 2007 to 2011 using generated reference chicken sera. These isolates were recovered from samples taken in the Atlantic, Mississippi, Central, and Pacific waterfowl migration flyways. Antisera to all the tested H3 isolates cross-reacted with each other and, to a lesser extent, with those to H3 canine and H3 equine IAVs. Antigenic cartography showed that the largest antigenic distance among the 37 avian IAVs is about four units, and each unit corresponds to a 2 log 2 difference in the HI titer. However, none of the tested H3 IAVs cross-reacted with ferret sera derived from contemporary swine and human IAVs. Our results showed that the H3 avian IAVs we tested lacked significant antigenic diversity, and these viruses were antigenically different from those circulating in swine and human populations. This suggests that H3 avian IAVs in North American waterfowl are antigenically relatively stable.
Avian Antimicrobial Host Defense Peptides: From Biology to Therapeutic Applications
Zhang, Guolong; Sunkara, Lakshmi T.
2014-01-01
Host defense peptides (HDPs) are an important first line of defense with antimicrobial and immunomoduatory properties. Because they act on the microbial membranes or host immune cells, HDPs pose a low risk of triggering microbial resistance and therefore, are being actively investigated as a novel class of antimicrobials and vaccine adjuvants. Cathelicidins and β-defensins are two major families of HDPs in avian species. More than a dozen HDPs exist in birds, with the genes in each HDP family clustered in a single chromosomal segment, apparently as a result of gene duplication and diversification. In contrast to their mammalian counterparts that adopt various spatial conformations, mature avian cathelicidins are mostly α-helical. Avian β-defensins, on the other hand, adopt triple-stranded β-sheet structures similar to their mammalian relatives. Besides classical β-defensins, a group of avian-specific β-defensin-related peptides, namely ovodefensins, exist with a different six-cysteine motif. Like their mammalian counterparts, avian cathelicidins and defensins are derived from either myeloid or epithelial origin expressed in a majority of tissues with broad-spectrum antibacterial and immune regulatory activities. Structure-function relationship studies with several avian HDPs have led to identification of the peptide analogs with potential for use as antimicrobials and vaccine adjuvants. Dietary modulation of endogenous HDP synthesis has also emerged as a promising alternative approach to disease control and prevention in chickens. PMID:24583933
Characterizing the avian gut microbiota: membership, driving influences, and potential function
Waite, David W.; Taylor, Michael W.
2014-01-01
Birds represent a diverse and evolutionarily successful lineage, occupying a wide range of niches throughout the world. Like all vertebrates, avians harbor diverse communities of microorganisms within their guts, which collectively fulfill important roles in providing the host with nutrition and protection from pathogens. Although many studies have investigated the role of particular microbes in the guts of avian species, there has been no attempt to unify the results of previous, sequence-based studies to examine the factors that shape the avian gut microbiota as a whole. In this study, we present the first meta-analysis of the avian gut microbiota, using 16S rRNA gene sequences obtained from a range of publicly available clone-library and amplicon pyrosequencing data. We investigate community membership and structure, as well as probe the roles of some of the key biological factors that influence the gut microbiota of other vertebrates, such as host phylogeny, location within the gut, diet, and association with humans. Our results indicate that, across avian studies, the microbiota demonstrates a similar phylum-level composition to that of mammals. Host bird species is the most important factor in determining community composition, although sampling site, diet, and captivity status also contribute. These analyses provide a first integrated look at the composition of the avian microbiota, and serve as a foundation for future studies in this area. PMID:24904538
USDA-ARS?s Scientific Manuscript database
Virulent viruses of the panzootic Avian avulavirus 1 (AAvV-1) of sub-genotype VIIi were repeatedly isolated (2011–2016) from commercial chickens and from multiple non-poultry avian species in Pakistan. These findings provide evidence for the existence of epidemiological links between Newcastle disea...
76 FR 65935 - National Poultry Improvement Plan and Auxiliary Provisions; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-25
..., we amended the regulations for the control of H5/H7 low pathogenic avian influenza to simplify the... that are infected with or exposed to the H5 or H7 subtypes of low pathogenic avian influenza. In Sec... Subjects in 9 CFR Part 56 Animal diseases, Indemnity payments, Low pathogenic avian influenza, Poultry...
9 CFR 93.205 - Certificate for live poultry and hatching eggs.
Code of Federal Regulations, 2014 CFR
2014-01-01
... been vaccinated with a vaccine for the H5 or H7 subtype of avian influenza. The certificate shall also... region where any form of highly pathogenic avian influenza exists, and that, as far as it has been possible to determine, no case of highly pathogenic avian influenza or Newcastle disease occurred on the...
USDA-ARS?s Scientific Manuscript database
Avian metapneumovirus (aMPV), also known as avian pneumovirus or turkey rhinotracheitis virus, is the causative agent of turkey rhinotracheitis, and is associated with swollen head syndrome in chickens. Since its discovery in the 1970s, aMPV has been recognized as an economically important pathogen ...
Risk perceptions for avian influenza virus infection among poultry workers, China.
Yu, Qi; Liu, Linqing; Pu, Juan; Zhao, Jingyi; Sun, Yipeng; Shen, Guangnian; Wei, Haitao; Zhu, Junjie; Zheng, Ruifeng; Xiong, Dongyan; Liu, Xiaodong; Liu, Jinhua
2013-02-01
To determine risk for avian influenza virus infection, we conducted serologic surveillance for H5 and H9 subtypes among poultry workers in Beijing, China, 2009-2010, and assessed workers' understanding of avian influenza. We found that poultry workers had considerable risk for infection with H9 subtypes. Increasing their knowledge could prevent future infections.
Global spread and control of avian influenza
USDA-ARS?s Scientific Manuscript database
H5 and H7 high pathogenicity avian influenza (HPAI) viruses emerge from the mutation of H5 and H7 low pathogenicity avian influenza viruses (LPAI) after circulation in terrestrial poultry for a few weeks to years. There have been 42 distinct HPAI epizootics since 1959. The largest being the H5N1 A/G...
USDA-ARS?s Scientific Manuscript database
Immunity against avian influenza (AI) is largely based on the induction of neutralizing antibodies produced against the hemagglutinin, although cytotoxic T lymphocytes (CTL’s) have been reported as critical for clearance of virus from infected cells. Antibody production against a particular virus ...
Enhanced virulence of clade 2.3.2.1 highly pathogenic avian influenza A(H5N1) viruses in ferrets
USDA-ARS?s Scientific Manuscript database
Sporadic avian to human transmission of highly pathogenic avian influenza (HPAI) A (H5N1) viruses necessitates the analysis of currently circulating and evolving clades to assess their potential risk. Following the spread and sustained circulation of clade 2 viruses across multiple continents, num...
Computational Modeling For The Transitional Flow Over A Multi-Element Airfoil
NASA Technical Reports Server (NTRS)
Liou, William W.; Liu, Feng-Jun; Rumsey, Chris L. (Technical Monitor)
2000-01-01
The transitional flow over a multi-element airfoil in a landing configuration are computed using a two equation transition model. The transition model is predictive in the sense that the transition onset is a result of the calculation and no prior knowledge of the transition location is required. The computations were performed using the INS2D) Navier-Stokes code. Overset grids are used for the three-element airfoil. The airfoil operating conditions are varied for a range of angle of attack and for two different Reynolds numbers of 5 million and 9 million. The computed results are compared with experimental data for the surface pressure, skin friction, transition onset location, and velocity magnitude. In general, the comparison shows a good agreement with the experimental data.
NASA Astrophysics Data System (ADS)
Ji, Xingpei; Wang, Bo; Liu, Dichen; Dong, Zhaoyang; Chen, Guo; Zhu, Zhenshan; Zhu, Xuedong; Wang, Xunting
2016-10-01
Whether the realistic electrical cyber-physical interdependent networks will undergo first-order transition under random failures still remains a question. To reflect the reality of Chinese electrical cyber-physical system, the "partial one-to-one correspondence" interdependent networks model is proposed and the connectivity vulnerabilities of three realistic electrical cyber-physical interdependent networks are analyzed. The simulation results show that due to the service demands of power system the topologies of power grid and its cyber network are highly inter-similar which can effectively avoid the first-order transition. By comparing the vulnerability curves between electrical cyber-physical interdependent networks and its single-layer network, we find that complex network theory is still useful in the vulnerability analysis of electrical cyber-physical interdependent networks.
Adaptive evolution during the establishment of European avian-like H1N1 influenza A virus in swine.
Joseph, Udayan; Vijaykrishna, Dhanasekaran; Smith, Gavin J D; Su, Yvonne C F
2018-04-01
An H1N1 subtype influenza A virus with all eight gene segments derived from wild birds (including mallards), ducks and chickens, caused severe disease outbreaks in swine populations in Europe beginning in 1979 and successfully adapted to form the European avian-like swine (EA-swine) influenza lineage. Genes of the EA-swine lineage that are clearly segregated from its closest avian relatives continue to circulate in swine populations globally and represent a unique opportunity to study the adaptive process of an avian-to-mammalian cross-species transmission. Here, we used a relaxed molecular clock model to test whether the EA-swine virus originated through the introduction of a single avian ancestor as an entire genome, followed by an analysis of host-specific selection pressures among different gene segments. Our data indicated independent introduction of gene segments via transmission of avian viruses into swine followed by reassortment events that occurred at least 1-4 years prior to the EA-swine outbreak. All EA-swine gene segments exhibit greater selection pressure than avian viruses, reflecting both adaptive pressures and relaxed selective constraints that are associated with host switching. Notably, we identified key amino acid mutations in the viral surface proteins (H1 and N1) that play a role in adaptation to new hosts. Following the establishment of EA-swine lineage, we observed an increased frequency of intrasubtype reassortment of segments compared to the earlier strains that has been associated with adaptive amino acid replacements, disease severity and vaccine escape. Taken together, our study provides key insights into the adaptive changes in viral genomes following the transmission of avian influenza viruses to swine and the early establishment of the EA-swine lineage.
Avian cholera in Nebraska's Rainwater Basin
Windingstad, R.M.; Hurt, J.J.; Trout, A.K.; Cary, J.
1984-01-01
The first report of avian cholera in North America occurred in northwestern Texas in winter 1944 (Quortrup et al. 1946). In 1975, mortality from avian cholera occurred for the first time in waterfowl in the Rainwater Basin of Nebraska when an estimated 25,000 birds died (Zinkl et al. 1977). Avian cholera has continued to cause mortality in wild birds in specific areas of the Basin each spring since. Losses of waterfowl from avian cholera continue to be much greater in some of the wetlands in the western part of the Basin than in the east. Several wetlands in the west have consistently higher mortality and are most often the wetlands where initial mortality is noticed each spring (Figure 1). The establishment of this disease in Nebraska is of considerable concern because of the importance of the Rainwater Basin as a spring staging area for waterfowl migrating to their breeding grounds. The wetlands in this area are on a major migration route used by an estimated 5 to 9 million ducks and several hundred thousand geese. A large portion of the western mid-continental greater white-fronted goose (Anser albifrons) population stage in the Basin each spring. Occasionally, whooping cranes (Grus americana) use these wetlands during migration, and lesser sandhill cranes (Grus canadensis) staging on the nearby Platte River sometimes use wetlands where avian cholera occurs (Anonymous 1981). Our objectives were to determine whether certain water quality variables in the Rainwater Basin differed between areas of high and low avian cholera incidence. These results would then be used for laboratory studies involving the survivability of Pasteurella multocida, the causative bacterium of avian cholera. Those studies will be reported elsewhere.
Lee, Eun-Kyoung; Kang, Hyun-Mi; Kim, Kwang-Il; Choi, Jun-Gu; To, Thanh Long; Nguyen, Tho Dang; Song, Byung-Min; Jeong, Jipseol; Choi, Kang-Seuk; Kim, Ji-Ye; Lee, Hee-Soo; Lee, Youn-Jeong; Kim, Jae-Hong
2015-04-01
In spite of highly pathogenic avian influenza H5N1 vaccination campaigns for domestic poultry, H5N1 viruses continue to circulate in Vietnam. To estimate the prevalence of avian influenza virus in Vietnam, surveillance was conducted between November 2011 and February 2013. Genetic analysis of 312 highly pathogenic avian influenza H5 viruses isolated from poultry in Vietnam was conducted and possible genetic relationships with strains from neighboring countries were investigated. As previously reported, phylogenetic analysis of the avian influenza virus revealed two H5N1 HPAI clades that were circulating in Vietnam. Clade 1.1, related to Cambodian strains, was predominant in the southern provinces, while clade 2.3.2.1 viruses were predominant in the northern and central provinces. Sequence analysis revealed evidence of active genetic evolution. In the gene constellation of clade 2.3.2.1, genotypes A, B, and B(II) existed during the 2011/2012 winter season. In June 2012, new genotype C emerged by reassortment between genotype A and genotype B(II), and this genotype was predominant in 2013 in the northern and central provinces. Interestingly, enzootic Vietnamese clade 2.3.2.1C H5 virus subsequently reassorted with N2, which originated from wild birds, to generate H5N2 highly pathogenic avian influenza, which was isolated from duck in the northeast region. This investigation indicated that H5N1 outbreaks persist in Vietnam and cause genetic reassortment with circulating viruses. It is necessary to strengthen active influenza surveillance to eradicate highly pathogenic avian influenza viruses and sever the link between highly pathogenic avian influenza and other circulating influenza viruses. © 2015 Poultry Science Association Inc.
Fukui, Daisuke; Nakamura, Makiko; Yamaguchi, Tsuyoshi; Takenaka, Makiko; Murakami, Mami; Yanai, Tokuma; Fukushi, Hideto; Yanagida, Kazumi; Bando, Gen; Matsuno, Keita; Nagano, Masashi; Tsubota, Toshio
2016-04-28
In 2006-10, an epizootic of emerging avian pox occurred in Carrion Crows ( Corvus corone ) and Large-billed Crows ( Corvus macrorhynchos ), leading to mortality of juvenile crows in Hokkaido, the northernmost island of Japan. We diagnosed 27 crows with proliferative skin lesions (19 carcasses and eight biopsied cases [one in zoo captivity]) as avian pox clinically, histopathologically by detection of Avipoxvirus-specific 4b core protein (P4b) gene, and epidemiologically. The fatal cases demonstrated intensively severe infection and aggressive lesions with secondary bacterial infection. Since the first identification of avian pox in Sapporo, Japan, in 2006, the frequency of mortality events has increased, peaking in 2007-08. Mortalities have subsequently occurred in other areas, suggesting disease expansion. In Sapporo, prevalence of avian pox evaluated by field censuses during 2007-12 was 17.6% (6.6-27.2%), peaked during 2007-08 and 2008-09, and then decreased. All diseased crows were juveniles, except for one adult. The number of crows assembling in the winter roosts had been stable for >10 yr; however, it declined in 2007-08, decreased by about 50% in 2008-09, and recovered to the previous level in 2009-10, correlated with the avian pox outbreak. Thus, avian pox probably contributed to the unusual crow population decline. All P4b sequences detected in six specimens in Sapporo were identical and different from any previously reported sequences. The sequence detected in the zoo-kept crow was distinct from any reported clades, and interspecies transmission was suspected. This report demonstrates an emerging novel avian pox in the Japanese avifauna and in global populations of Carrion Crows and Large-billed Crows. Longitudinal monitoring is needed to evaluate its impact on the crow population.
Damas, Joana; O'Connor, Rebecca; Farré, Marta; Lenis, Vasileios Panagiotis E; Martell, Henry J; Mandawala, Anjali; Fowler, Katie; Joseph, Sunitha; Swain, Martin T; Griffin, Darren K; Larkin, Denis M
2017-05-01
Most recent initiatives to sequence and assemble new species' genomes de novo fail to achieve the ultimate endpoint to produce contigs, each representing one whole chromosome. Even the best-assembled genomes (using contemporary technologies) consist of subchromosomal-sized scaffolds. To circumvent this problem, we developed a novel approach that combines computational algorithms to merge scaffolds into chromosomal fragments, PCR-based scaffold verification, and physical mapping to chromosomes. Multigenome-alignment-guided probe selection led to the development of a set of universal avian BAC clones that permit rapid anchoring of multiple scaffolds to chromosomes on all avian genomes. As proof of principle, we assembled genomes of the pigeon ( Columbia livia ) and peregrine falcon ( Falco peregrinus ) to chromosome levels comparable, in continuity, to avian reference genomes. Both species are of interest for breeding, cultural, food, and/or environmental reasons. Pigeon has a typical avian karyotype (2n = 80), while falcon (2n = 50) is highly rearranged compared to the avian ancestor. By using chromosome breakpoint data, we established that avian interchromosomal breakpoints appear in the regions of low density of conserved noncoding elements (CNEs) and that the chromosomal fission sites are further limited to long CNE "deserts." This corresponds with fission being the rarest type of rearrangement in avian genome evolution. High-throughput multiple hybridization and rapid capture strategies using the current BAC set provide the basis for assembling numerous avian (and possibly other reptilian) species, while the overall strategy for scaffold assembly and mapping provides the basis for an approach that (provided metaphases can be generated) could be applied to any animal genome. © 2017 Damas et al.; Published by Cold Spring Harbor Laboratory Press.
O'Connor, Rebecca; Lenis, Vasileios Panagiotis E.; Martell, Henry J.; Mandawala, Anjali; Fowler, Katie; Joseph, Sunitha; Swain, Martin T.; Griffin, Darren K.; Larkin, Denis M.
2017-01-01
Most recent initiatives to sequence and assemble new species’ genomes de novo fail to achieve the ultimate endpoint to produce contigs, each representing one whole chromosome. Even the best-assembled genomes (using contemporary technologies) consist of subchromosomal-sized scaffolds. To circumvent this problem, we developed a novel approach that combines computational algorithms to merge scaffolds into chromosomal fragments, PCR-based scaffold verification, and physical mapping to chromosomes. Multigenome-alignment-guided probe selection led to the development of a set of universal avian BAC clones that permit rapid anchoring of multiple scaffolds to chromosomes on all avian genomes. As proof of principle, we assembled genomes of the pigeon (Columbia livia) and peregrine falcon (Falco peregrinus) to chromosome levels comparable, in continuity, to avian reference genomes. Both species are of interest for breeding, cultural, food, and/or environmental reasons. Pigeon has a typical avian karyotype (2n = 80), while falcon (2n = 50) is highly rearranged compared to the avian ancestor. By using chromosome breakpoint data, we established that avian interchromosomal breakpoints appear in the regions of low density of conserved noncoding elements (CNEs) and that the chromosomal fission sites are further limited to long CNE “deserts.” This corresponds with fission being the rarest type of rearrangement in avian genome evolution. High-throughput multiple hybridization and rapid capture strategies using the current BAC set provide the basis for assembling numerous avian (and possibly other reptilian) species, while the overall strategy for scaffold assembly and mapping provides the basis for an approach that (provided metaphases can be generated) could be applied to any animal genome. PMID:27903645
Evidence of infection with H4 and H11 avian influenza viruses among Lebanese chicken growers.
Kayali, Ghazi; Barbour, Elie; Dbaibo, Ghassan; Tabet, Carelle; Saade, Maya; Shaib, Houssam A; Debeauchamp, Jennifer; Webby, Richard J
2011-01-01
Human infections with H5, H7, and H9 avian influenza viruses are well documented. Exposure to poultry is the most important risk factor for humans becoming infected with these viruses. Data on human infection with other low pathogenicity avian influenza viruses is sparse but suggests that such infections may occur. Lebanon is a Mediterranean country lying under two major migratory birds flyways and is home to many wild and domestic bird species. Previous reports from this country demonstrated that low pathogenicity avian influenza viruses are in circulation but highly pathogenic H5N1 viruses were not reported. In order to study the extent of human infection with avian influenza viruses in Lebanon, we carried out a seroprevalence cross-sectional study into which 200 poultry-exposed individuals and 50 non-exposed controls were enrolled. We obtained their sera and tested it for the presence of antibodies against avian influenza viruses types H4 through H16 and used a questionnaire to collect exposure data. Our microneutralization assay results suggested that backyard poultry growers may have been previously infected with H4 and H11 avian influenza viruses. We confirmed these results by using a horse red blood cells hemagglutination inhibition assay. Our data also showed that farmers with antibodies against each virus type clustered in a small geographic area suggesting that unrecognized outbreaks among birds may have led to these human infections. In conclusion, this study suggests that occupational exposure to chicken is a risk factor for infection with avian influenza especially among backyard growers and that H4 and H11 influenza viruses may possess the ability to cross the species barrier to infect humans.
Isolation and genetic characterization of H5N2 influenza viruses from pigs in Korea.
Lee, Jun Han; Pascua, Philippe Noriel Q; Song, Min-Suk; Baek, Yun Hee; Kim, Chul-Joong; Choi, Hwan-Woon; Sung, Moon-Hee; Webby, Richard J; Webster, Robert G; Poo, Haryoung; Choi, Young Ki
2009-05-01
Due to dual susceptibility to both human and avian influenza A viruses, pigs are believed to be effective intermediate hosts for the spread and production of new viruses with pandemic potential. In early 2008, two swine H5N2 viruses were isolated from our routine swine surveillance in Korea. The sequencing and phylogenetic analysis of surface proteins revealed that the Sw/Korea/C12/08 and Sw/Korea/C13/08 viruses were derived from avian influenza viruses of the Eurasian lineage. However, although the Sw/Korea/C12/08 isolate is an entirely avian-like virus, the Sw/Korea/C13/08 isolate is an avian-swine-like reassortant with the PB2, PA, NP, and M genes coming from a 2006 Korean swine H3N1-like virus. The molecular characterization of the two viruses indicated an absence of significant mutations that could be associated with virulence or binding affinity. However, animal experiments showed that the reassortant Sw/Korea/C13/08 virus was more adapted and was more readily transmitted than the purely avian-like virus in a swine experimental model but not in ferrets. Furthermore, seroprevalence in swine sera from 2006 to 2008 suggested that avian H5 viruses have been infecting swine since 2006. Although there are no known potential clinical implications of the avian-swine reassortant virus for pathogenicity in pigs or other species, including humans, at present, the efficient transmissibility of the swine-adapted H5N2 virus could facilitate virus spread and could be a potential model for pandemic, highly pathogenic avian influenza (e.g., H5N1 and H7N7) virus outbreaks or a pandemic strain itself.
Xue, Wen; Chen, Ju; Jiang, Ao-yu
2018-01-01
The corrosion development of the reinforcement and shear stud connectors in the cracked steel–concrete composite beams under the salt-fog wet–dry cycles is presented in this investigation. Seven identical composite beams with load-induced concrete cracks were exposed to an aggressive chloride environment. The reinforcement and shear connectors were retrieved after specimens underwent a specified number of wet–dry cycles to obtain the corrosion pattern and the cross-section loss at different exposure times and their evolutions. The crack map, the corrosion pattern and the cross-section loss were measured and presented. Based on the experimental results, the influence of crack characteristics, including crack widths, orientations and positions on the corrosion rate and distribution, were accessed. Moreover, the effects of the connecting weldments on the corrosion initiations and patterns were analyzed. It was shown that the corrosion rate would increase with the number of wet–dry cycles. The characteristics of load-induced cracks could have different influences on the steel grids and shear stud connectors. The corrosion tended to initiate from the connecting weldments, due to the potential difference with the parent steel and the aggressive exposure environment, leading to a preferential weldment attack. PMID:29565836
Adaptive Suction and Blowing for Twin-Tail Buffet Control
NASA Technical Reports Server (NTRS)
Kandil, Osama A.; Yang, Zhi
1999-01-01
Adaptive active flow control for twin-tail buffet alleviation is investigated. The concept behind this technique is to place control ports on the tail outer and inner surfaces with flow suction or blowing applied through these ports in order to minimize the pressure difference across the tail. The suction or blowing volume flow rate from each port is proportional to the pressure difference across the tail at this location. A parametric study of the effects of the number and location of these ports on the buffet response is carried out. The computational model consists of a sharp-edged delta wing of aspect ratio one and swept-back flexible twin tail with taper ratio of 0.23. This complex multidisciplinary problem is solved sequentially using three sets of equations for the fluid flow, aeroelastic response and grid deformation, using a dynamic multi-block grid structure. The computational model is pitched at 30 deg angle of attack. The freestream Mach number and Reynolds number are 0.3 and 1.25 million, respectively. The model is investigated for the inboard position of the twin tails, which corresponds to a separation distance between the twin tails of 33% of the wing span. Comparison of the time history and power spectral density responses of the tails for various distributions of the control ports are presented and discussed.
Effect of Configuration Pitching Motion on Twin Tail Buffet Response
NASA Technical Reports Server (NTRS)
Sheta, Essam F.; Kandil, Osama A.
1998-01-01
The effect of dynamic pitch-up motion of delta wing on twin-tail buffet response is investigated. The computational model consists of a delta wing-twin tail configuration. The computations are carried out on a dynamic multi-block grid structure. This multidisciplinary problem is solved using three sets of equations which consists of the unsteady Navier-Stokes equations, the aeroelastic equations, and the grid displacement equations. The configuration is pitched-up from zero up to 60 deg. angle of attack, and the freestream Mach number and Reynolds number are 0.3 and 1.25 million, respectively. With the twin tail fixed as rigid surfaces and with no-forced pitch-up motion, the problem is solved for the initial flow conditions. Next, the problem is solved for the twin-tail response for uncoupled bending and torsional vibrations due to the unsteady loads on the twin tail and due to the forced pitch-up motion. The dynamic pitch-up problem is also solved for the flow response with the twin tail kept rigid. The configuration is investigated for inboard position of the twin tail which corresponds to a separation distance between the twin tail of 33% wing chord. The computed results are compared with the available experimental data.
Wind Code Application to External Forebody Flowfields with Comparisons to Experimental Results
NASA Technical Reports Server (NTRS)
Frate, F. C.; Kim, H. D.
2001-01-01
The WIND Code, a general purpose Navier-Stokes solver, has been utilized to obtain supersonic external flowfield Computational Fluid Dynamics (CFD) solutions over an axisymmetric, parabolic forebody with comparisons made to wind tunnel experimental results. Various cases have been investigated at supersonic freestream conditions ranging from Mach 2.0 to 3.5, at 0 deg and 3 deg angles-of-attack, and with either a sharp-nose or blunt-nose forebody configuration. Both a turbulent (Baldwin-Lomax algebraic turbulence model) and a laminar model have been implemented in the CFD. Obtaining the solutions involved utilizing either the parabolized- or full-Navier-Stokes analyses supplied in WIND. Comparisons have been made with static pressure measurements, with boundary-layer rake and flowfield rake pitot pressure measurements, and with temperature sensitive paint experimental results. Using WIND's parabolized Navier-Stokes capability, grid sequencing, and the Baldwin-Lomax algebraic turbulence model allowed for significant reductions in computational time while still providing good agreement with experiment. Given that CFD and experiment compare well, WIND is found to be a good computational platform for solving this type of forebody problem, and the grids developed in conjunction with it will be used in the future to investigate varying freestream conditions not tested experimentally.
Preferential recognition of avian-like receptors in human influenza A H7N9 viruses.
Xu, Rui; de Vries, Robert P; Zhu, Xueyong; Nycholat, Corwin M; McBride, Ryan; Yu, Wenli; Paulson, James C; Wilson, Ian A
2013-12-06
The 2013 outbreak of avian-origin H7N9 influenza in eastern China has raised concerns about its ability to transmit in the human population. The hemagglutinin glycoprotein of most human H7N9 viruses carries Leu(226), a residue linked to adaptation of H2N2 and H3N2 pandemic viruses to human receptors. However, glycan array analysis of the H7 hemagglutinin reveals negligible binding to humanlike α2-6-linked receptors and strong preference for a subset of avian-like α2-3-linked glycans recognized by all avian H7 viruses. Crystal structures of H7N9 hemagglutinin and six hemagglutinin-glycan complexes have elucidated the structural basis for preferential recognition of avian-like receptors. These findings suggest that the current human H7N9 viruses are poorly adapted for efficient human-to-human transmission.
Avian Models for Human Cognitive Neuroscience: A Proposal.
Clayton, Nicola S; Emery, Nathan J
2015-06-17
Research on avian cognitive neuroscience over the past two decades has revealed the avian brain to be a better model for understanding human cognition than previously thought, despite differences in the neuroarchitecture of avian and mammalian brains. The brain, behavior, and cognition of songbirds have provided an excellent model of human cognition in one domain, namely learning human language and the production of speech. There are other important behavioral candidates of avian cognition, however, notably the capacity of corvids to remember the past and plan for the future, as well as their ability to think about another's perspective, and physical reasoning. We review this work and assess the evidence that the corvid brain can support such a cognitive architecture. We propose potential applications of these behavioral paradigms for cognitive neuroscience, including recent work on single-cell recordings and neuroimaging in corvids. Finally, we discuss their impact on understanding human developmental cognition. Copyright © 2015 Elsevier Inc. All rights reserved.
Dinosaur Reproduction and Parenting
NASA Astrophysics Data System (ADS)
Horner, John R.
Non-avian dinosaur reproductive and parenting behaviors were mostly similar to those of extant archosaurs. Non-avian dinosaurs were probably sexually dimorphic and some may have engaged in hierarchical rituals. Non-avian coelurosaurs (e.g. Troodontidae, Oviraptorosauria) had two active oviducts, each of which produced single eggs on a daily or greater time scale. The eggs of non-coelurosaurian dinosaurs (e.g. Ornithischia, Sauropoda) were incubated in soils, whereas the eggs of non-avian coelurosaurs (e.g. Troodon, Oviraptor) were incubated with a combination of soil and direct parental contact. Parental attention to the young was variable, ranging from protection from predators to possible parental feeding of nest-bound hatchlings. Semi-altricial hadrosaur hatchlings exited their respective nests near the time of their first linear doubling. Some reproductive behaviors, once thought exclusive to Aves, arose first in non-avian dinosaurs. The success of the Dinosauria may be related to reproductive strategies.
Role for migratory wild birds in the global spread of avian influenza H5N8.
2016-10-14
Avian influenza viruses affect both poultry production and public health. A subtype H5N8 (clade 2.3.4.4) virus, following an outbreak in poultry in South Korea in January 2014, rapidly spread worldwide in 2014-2015. Our analysis of H5N8 viral sequences, epidemiological investigations, waterfowl migration, and poultry trade showed that long-distance migratory birds can play a major role in the global spread of avian influenza viruses. Further, we found that the hemagglutinin of clade 2.3.4.4 virus was remarkably promiscuous, creating reassortants with multiple neuraminidase subtypes. Improving our understanding of the circumpolar circulation of avian influenza viruses in migratory waterfowl will help to provide early warning of threats from avian influenza to poultry, and potentially human, health. Copyright © 2016, American Association for the Advancement of Science.
Isolation strategy of a two-strain avian influenza model using optimal control
NASA Astrophysics Data System (ADS)
Mardlijah, Ariani, Tika Desi; Asfihani, Tahiyatul
2017-08-01
Avian influenza has killed many victims of both birds and humans. Most cases of avian influenza infection in humans have resulted transmission from poultry to humans. To prevent or minimize the patients of avian influenza can be done by pharmaceutical and non-pharmaceutical measures such as the use of masks, isolation, etc. We will be analyzed two strains of avian influenza models that focus on treatment of symptoms with insulation, then investigate the stability of the equilibrium point by using Routh-Hurwitz criteria. We also used optimal control to reduce the number of humans infected by making the isolation level as the control then proceeds optimal control will be simulated. The completion of optimal control used in this study is the Pontryagin Minimum Principle and for simulation we are using Runge Kutta method. The results obtained showed that the application of two control is more optimal compared to apply one control only.
Avian pox in Magellanic Penguins (Spheniscus magellanicus).
Kane, Olivia J; Uhart, Marcela M; Rago, Virginia; Pereda, Ariel J; Smith, Jeffrey R; Van Buren, Amy; Clark, J Alan; Boersma, P Dee
2012-07-01
Avian pox is an enveloped double-stranded DNA virus that is mechanically transmitted via arthropod vectors or mucosal membrane contact with infectious particles or birds. Magellanic Penguins (Spheniscus magellanicus) from two colonies (Punta Tombo and Cabo Dos Bahías) in Argentina showed sporadic, nonepidemic signs of avian pox during five and two of 29 breeding seasons (1982-2010), respectively. In Magellanic Penguins, avian pox expresses externally as wart-like lesions around the beak, flippers, cloaca, feet, and eyes. Fleas (Parapsyllus longicornis) are the most likely arthropod vectors at these colonies. Three chicks with cutaneous pox-like lesions were positive for Avipoxvirus and revealed phylogenetic proximity with an Avipoxvirus found in Black-browed Albatross (Thalassarche melanophrys) from the Falkland Islands in 1987. This proximity suggests a long-term circulation of seabird Avipoxviruses in the southwest Atlantic. Avian pox outbreaks in these colonies primarily affected chicks, often resulted in death, and were not associated with handling, rainfall, or temperature.