7 resultados para Signatures of Selection

em Digital Commons at Florida International University


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Stable isotopes are important tools for understanding the trophic roles of elasmobranchs. However, whether different tissues provide consistent stable isotope values within an individual are largely unknown. To address this, the relationships among carbon and nitrogen isotope values were quantified for blood, muscle, and fin from juvenile bull sharks (Carcharhinus leucas) and blood and fin from large tiger sharks (Galeocerdo cuvier) collected in two different ecosystems. We also investigated the relationship between shark size and the magnitude of differences in isotopic values between tissues. Isotope values were significantly positively correlated for all paired tissue comparisons, but R2 values were much higher for δ13C than for δ15N. Paired differences between isotopic values of tissues were relatively small but varied significantly with shark total length, suggesting that shark size can be an important factor influencing the magnitude of differences in isotope values of different tissues. For studies of juvenile sharks, care should be taken in using slow turnover tissues like muscle and fin, because they may retain a maternal signature for an extended time. Although correlations were relatively strong, results suggest that correction factors should be generated for the desired study species and may only allow coarse-scale comparisons between studies using different tissue types.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Current commercially available mimics contain varying amounts of either the actual explosive/drug or the chemical compound of suspected interest by biological detectors. As a result, there is significant interest in determining the dominant chemical odor signatures of the mimics, often referred to as pseudos, particularly when compared to the genuine contraband material. This dissertation discusses results obtained from the analysis of drug and explosive headspace related to the odor profiles as recognized by trained detection canines. Analysis was performed through the use of headspace solid phase microextraction in conjunction with gas chromatography mass spectrometry (HS-SPME-GC-MS). Upon determination of specific odors, field trials were held using a combination of the target odors with COMPS. Piperonal was shown to be a dominant odor compound in the headspace of some ecstasy samples and a recognizable odor mimic by trained detection canines. It was also shown that detection canines could be imprinted on piperonal COMPS and correctly identify ecstasy samples at a threshold level of approximately 100ng/s. Isosafrole and/or MDP-2-POH show potential as training aid mimics for non-piperonal based MDMA. Acetic acid was shown to be dominant in the headspace of heroin samples and verified as a dominant odor in commercial vinegar samples; however, no common, secondary compound was detected in the headspace of either. Because of the similarities detected within respective explosive classes, several compounds were chosen for explosive mimics. A single based smokeless powder with a detectable level of 2,4-dinitrotoluene, a double based smokeless powder with a detectable level of nitroglycerine, 2-ethyl-1-hexanol, DMNB, ethyl centralite and diphenylamine were shown to be accurate mimics for TNT-based explosives, NG-based explosives, plastic explosives, tagged explosives, and smokeless powders, respectively. The combination of these six odors represents a comprehensive explosive odor kit with positive results for imprint on detection canines. As a proof of concept, the chemical compound PFTBA showed promise as a possible universal, non-target odor compound for comparison and calibration of detection canines and instrumentation. In a comparison study of shape versus vibration odor theory, the detection of d-methyl benzoate and methyl benzoate was explored using canine detectors. While results did not overwhelmingly substantiate either theory, shape odor theory provides a better explanation of the canine and human subject responses.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Isotope signatures of mangrove leaves can vary depending on discrimination associated with plant response to environmental stressors defined by gra­dients of resources (such as water and nutrient limitation) and regulators (such as salinity and sul­fide toxicity). We tested the variability of man­grove isotopic signatures (d13C and d15N) across a stress gradient in south Florida, using green leaves from four mangrove species collected at six sites. Mangroves across the landscape studied are stressed by resource and regulator gradients repre­sented by limited phosphorus concentrations com­bined with high sulfide concentrations, respec­tively. Foliar d13C ratios exhibited a range from ­ 24.6 to –32.7‰, and multiple regression analysis showed that 46% of the variability in mangrove d13C composition could be explained by the differ­ences in dissolved inorganic nitrogen, soluble reac­tive phosphorus, and sulfide porewater concentra­tions. 15N discrimination in mangrove species ranged from –0.1 to 7.7‰, and porewater N, salin­ity, and leaf N:Pa ratios accounted for 41% of this variability in mangrove leaves. The increase in soil P availability reduced 15N discrimination due to higher N demand. Scrub mangroves (<1.5 m tall) are more water-use efficient, as indicated by higher d13C; and have greater nutrient use efficiency ratios of P than do tall mangroves (5 to 10 m tall) existing in sites with greater soil P concentrations. The high variability of mangrove d13C and d15N across these resource and regulator gradients could be a con­founding factor obscuring the linkages between mangrove wetlands and estuarine food webs. These results support the hypothesis that landscape fac­tors may control mangrove structure and function, so that nutrient biogeochemistry and mangrove-based food webs in adjacent estuaries should ac­count for watershed-specific organic inputs.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Star formation occurs when the gas (mostly atomic hydrogen; H I) in a galaxy becomes disturbed, forming regions of high density gas, which then collapses to form stars. In dwarf galaxies it is still uncertain which processes contribute to star formation and how much they contribute to star formation. Blue compact dwarf (BCD) galaxies are low mass, low shear, gas rich galaxies that have high star formation rates when compared to other dwarf galaxies. What triggers the dense burst of star formation in BCDs but not other dwarfs is not well understood. It is often suggested that BCDs may have their starburst triggered by gravitational interactions with other galaxies, dwarf-dwarf galaxy mergers, or consumption of intergalactic gas. However, there are BCDs that appear isolated with respect to other galaxies, making an external disturbance unlikely.^ Here, I study six apparently isolated BCDs from the LITTLE THINGS sample in an attempt to understand what has triggered their burst of star formation. LITTLE THINGS is an H I survey of 41 dwarf galaxies. Each galaxy has high angular and velocity resolution H I data from the Very Large Array (VLA) telescope and ancillary stellar data. I use these data to study the detailed morphology and kinematics of each galaxy, looking for signatures of starburst triggers. In addition to the VLA data, I have collected Green Bank Telescope data for the six BCDs. These high sensitivity, low resolution data are used to search the surrounding area of each galaxy for extended emission and possible nearby companion galaxies.^ The VLA data show evidence that each BCD has likely experienced some form of external disturbance despite their apparent isolation. These external disturbances potentially seen in the sample include: ongoing/advanced dwarf-dwarf mergers, an interaction with an unknown external object, and external gas consumption. The GBT data result in no nearby, separate H I companions at the sensitivity of the data. These data therefore suggest that even though these BCDs appear isolated, they have not been evolving in isolation. It is possible that these external disturbances may have triggered the starbursts that defines them as BCDs.^

Relevância:

90.00% 90.00%

Publicador:

Resumo:

With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Current commercially available mimics contain varying amounts of either the actual explosive/drug or the chemical compound of suspected interest by biological detectors. As a result, there is significant interest in determining the dominant chemical odor signatures of the mimics, often referred to as pseudos, particularly when compared to the genuine contraband material. This dissertation discusses results obtained from the analysis of drug and explosive headspace related to the odor profiles as recognized by trained detection canines. Analysis was performed through the use of headspace solid phase microextraction in conjunction with gas chromatography mass spectrometry (HS-SPME-GC-MS). Upon determination of specific odors, field trials were held using a combination of the target odors with COMPS. Piperonal was shown to be a dominant odor compound in the headspace of some ecstasy samples and a recognizable odor mimic by trained detection canines. It was also shown that detection canines could be imprinted on piperonal COMPS and correctly identify ecstasy samples at a threshold level of approximately 100ng/s. Isosafrole and/or MDP-2-POH show potential as training aid mimics for non-piperonal based MDMA. Acetic acid was shown to be dominant in the headspace of heroin samples and verified as a dominant odor in commercial vinegar samples; however, no common, secondary compound was detected in the headspace of either. Because of the similarities detected within respective explosive classes, several compounds were chosen for explosive mimics. A single based smokeless powder with a detectable level of 2,4-dinitrotoluene, a double based smokeless powder with a detectable level of nitroglycerine, 2-ethyl-1-hexanol, DMNB, ethyl centralite and diphenylamine were shown to be accurate mimics for TNT-based explosives, NG-based explosives, plastic explosives, tagged explosives, and smokeless powders, respectively. The combination of these six odors represents a comprehensive explosive odor kit with positive results for imprint on detection canines. As a proof of concept, the chemical compound PFTBA showed promise as a possible universal, non-target odor compound for comparison and calibration of detection canines and instrumentation. In a comparison study of shape versus vibration odor theory, the detection of d-methyl benzoate and methyl benzoate was explored using canine detectors. While results did not overwhelmingly substantiate either theory, shape odor theory provides a better explanation of the canine and human subject responses.