5 resultados para 1099

em DigitalCommons@University of Nebraska - Lincoln


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe the distribution of tuberculosis-like lesions (TBL) in wild boar (Sus scrofa) and red deer (Cervus elaphus) in Spain. Animals with TBL were confirmed in 84.21% of mixed populations (n = 57) of red deer and wild boar and in 75% of populations of wild boar alone (n = 8) in central and southern Spain (core area). The prevalence of TBL declined towards the periphery of this region. In the core area, the prevalence ranged up to 100% in local populations of wild boar (mean estate prevalence 42.51%) and up to 50% in red deer (mean estate prevalence 13.70%). We carried out exploratory statistical analyses to describe the epidemiology of TBL in both species throughout the core area. Prevalence of TBL increased with age in both species. Wild boar and red deer mean TBL prevalence at the estate level were positively associated, and lesion scores were consistently higher in wild boars than in red deer. The wild boar prevalence of TBL in wild boar did not differ between populations that were or were not cohabiting with red deer. Amongst the wild boars with TBL, 61.19% presented generalized lesions, and the proportion of generalized cases was similar between sex and age classes. In red deer, 57.14% of TBL-positive individuals presented generalized lesions, and the percentage of generalized cases increased with age class, but did not differ between the sexes. These results highlight the potential importance of wild boar and red deer in the maintenance of tuberculosis in south central Spain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Prior studies of phylogenetic relationships among phocoenids based on morphology and molecular sequence data conflict and yield unresolved relationships among species. This study evaluates a comprehensive set of cranial, postcranial, and soft anatomical characters to infer interrelationships among extant species and several well-known fossil phocoenids, using two different methods to analyze polymorphic data: polymorphic coding and frequency step matrix. Our phylogenetic results confirmed phocoenid monophyly. The division of Phocoenidae into two subfamilies previously proposed was rejected, as well as the alliance of the two extinct genera Salumiphocaena and Piscolithax with Phocoena dioptrica and Phocoenoides dalli. Extinct phocoenids are basal to all extant species. We also examined the origin and distribution of porpoises within the context of this phylogenetic framework. Phocoenid phylogeny together with available geologic evidence suggests that the early history of phocoenids was centered in the North Pacific during the middle Miocene, with subsequent dispersal into the southern hemisphere in the middle Pliocene. A cooling period in the Pleistocene allowed dispersal of the southern ancestor of Phocoena sinusinto the North Pacific (Gulf of California).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Many key management protocols have been specifically designed for wireless sensor networks. However, most of the key management protocols focus on the establishment of the required keys or the removal of the compromised keys. The design of these key management protocols does not consider the support of higher level security applications. When the applications are integrated later in sensor networks, new mechanisms must be designed. In this paper, we propose a security framework, uKeying, for wireless sensor networks. This framework can be easily extended to support many security applications. It includes three components: a security mechanism to provide secrecy for communications in sensor networks, an efficient session key distribution scheme, and a centralized key revocation scheme. The proposed framework does not depend on a specific key distribution scheme and can be used to support many security applications, such as secure group communications. Our analysis shows that the framework is secure, efficient, and extensible. The simulation and results also reveal for the first time that a centralized key revocation scheme can also attain a high efficiency.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador: