385 resultados para Alien invaders
Resumo:
The Borg, a collective of humanoid cyborgs linked together in a hive-mind and modeled on the earthly superorganisms of ant colonies and beehives, has been the most feared alien race in the Star Trek universe. The formidable success of the Borg in assimilating their foes corresponds to the astounding success of superorganisms in our own biosphere. Yet the Borg also serves as a metaphor for another collective of biological entities known as the corporation. In the Anthropocene epoch, corporations have become the most powerful force on the planet; their influence on the social world and the environment exceeds any government and may determine the continued sustainability of human life. Corporations have been described as people and as machines, but neither metaphor accurately describes their essence or contributes to an understanding that might resist their power. This paper reframes our understanding of the corporation by examining the metaphors that are used to describe it, and by suggesting an entirely new metaphor viewing the Borg and the corporation through the lens of sociobiology. I will argue that the corporation is a new form of superorganism that has become the dominant species on the planet and that the immense, intractable power of a globalized, corporate hive-mind has become the principal obstacle to addressing the planetary emergency of climate change. Reframing our metaphoric understanding of corporations as biological entities in the planetary biosphere may enable us to imagine ways to resist their increasing dominance and create a sustainable future.
Resumo:
Legionella pneumophila, the causative agent of a severe pneumonia named Legionnaires' disease, is an important human pathogen that infects and replicates within alveolar macrophages. Its virulence depends on the Dot/Icm type IV secretion system (T4SS), which is essential to establish a replication permissive vacuole known as the Legionella containing vacuole (LCV). L. pneumophila infection can be modeled in mice however most mouse strains are not permissive, leading to the search for novel infection models. We have recently shown that the larvae of the wax moth Galleria mellonella are suitable for investigation of L. pneumophila infection. G. mellonella is increasingly used as an infection model for human pathogens and a good correlation exists between virulence of several bacterial species in the insect and in mammalian models. A key component of the larvae's immune defenses are hemocytes, professional phagocytes, which take up and destroy invaders. L. pneumophila is able to infect, form a LCV and replicate within these cells. Here we demonstrate protocols for analyzing L. pneumophila virulence in the G. mellonella model, including how to grow infectious L. pneumophila, pretreat the larvae with inhibitors, infect the larvae and how to extract infected cells for quantification and immunofluorescence microscopy. We also describe how to quantify bacterial replication and fitness in competition assays. These approaches allow for the rapid screening of mutants to determine factors important in L. pneumophila virulence, describing a new tool to aid our understanding of this complex pathogen.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-08
Resumo:
[ES]En este proyecto se ha desarrollado un prototipo de un videojuego en 2D con perspectiva lateral. El juego es fundamentalmente un juego de peleas en el que se usa una pelota para combatir. El objetivo es derrotar al rival, consiguiendo que la pelota le golpee y evitando recibir golpes mediante el uso de los controles apropiados. Está ambientado en un mundo futurista y los combates tienen lugar en naves espaciales o planetas alienígenas. Para el desarrollo de este juego se ha empleado el motor de videojuegos Unity 5, además de recursos creados por la propia autora u obtenidos de diversas fuentes de contenido open-source.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-06
Resumo:
This paper discusses the advantages of using a combined environmagnetic and geochemical approach to the provenance and characterization of distal IRDs occurring during the Last Glacial Period in core CI12PC3 from the Galicia Interior Basin (GIB). Six Heinrich layers (HL1-6) have been identified in the area in base to the detection of distinct populations of exotic magnetic mineral assemblages alien to the local/regional sedimentation environment. Their extension has been determined by Ca/Sr and Si/Sr ratios and their provenance by 143Nd/144Nd and 87Sr/86Sr isotopic ratios and FORCs. The sedimentary expression of HL is characterized by the presence of distal Ice Rafted Detritus (IRD). Distal IRD magnetic signatures in the GIB consist of (i) an increase of one order of magnitude in the peak amplitude of magnetic susceptibility from background values, (ii) a general coarsening of the magnetic grain size in a mineral assemblage dominated by titano-magnetites, (iii) FORC distributions pushing towards the coarse MD or PSD component, and (iv) thermomagnetic curves depicting the occurrence of several magnetite phases. These four features are very different from the fine-grained biogenic magnetic assemblages characterized by the combination of lower MS and higher coercivity values that dominate the predominant mixtures of the non-interacting SSD and PSD components in the non-IRD influenced background sedimentation. Our results show that the last 70.000 yr of sedimentation in the GIB were controlled by the relative contribution of local detrital material derived from the Iberian Variscan Chain and IRD alien material from the iceberg melting during the Heinrich Events. They also show two main IRD provenance fields: Europe and Canada. And that the later is more important for for HL1, HL2, HL4 and HL5. FORCs analysis complemented the isotopic information and provided a very unique information, indicating that glacial flour may not always have the same provenance as IRD and that ice-melted derived suspended sediment has its own dynamics and may reach further and/or persists longer than IRD.
Resumo:
Der Beitrag stellt empirische Befunde aus einer standardisierten Befragung von je 200 Mutter-Tochter- und Vater-Sohn-Dyaden in türkischen Migrantenfamilien dar, die in zwei sehr unterschiedlichen Erhebungskontexten (West-Berlin und Oberschwaben) gewonnen wurden. In einem Kohortenvergleich wird zunächst die hohe Persistenz familiärer Werte sowohl in der Türkei als auch bei Migranten der ersten und zweiten Zuwanderungsgeneration festgestellt. In der sich anschließenden Analyse der Wahrnehmungen, Einstellungen und Verhaltensweisen von türkischen Migranten-Müttern und -Vätern einerseits und ihren jugendlichen Töchtern bzw. Söhnen andererseits wird das Ausmaß der Übereinstimmung in den (gleichgeschlechtlichen) Dyaden untersucht. Dabei kann die intergenerative Transmission von Werten und Einstellungen, insbesondere was die Leistungs- und Aufstiegserwartungen anbetrifft, bei beiden Geschlechtern als ein bedeutsamer Faktor der Sozialisation in der Migrations- und Minoritätssituation identifiziert werden. (DIPF/Orig.)
Resumo:
Der Beitrag behandelt das Thema der Vereinbarkeit von Familie und Beruf aus der Perspektive von drei verschiedenen Gruppen von Frauen: Einwanderinnen/Arbeitsmigrantinnen aus der Türkei, Aussiedlerinnen aus der ehemaligen Sowjetunion und westdeutsche Frauen. Berichtet wird über Ergebnisse der Hauptuntersuchung eines derzeit laufenden empirischen Projektes. Obwohl sich das Problem der Vereinbarkeit im allgemeinen als ein frauenspezifisches Problem darstellt, wird seine Lösung von den drei befragten Gruppen von Frauen unterschiedlich gehandhabt. Dies wird sowohl auf die jeweilige soziale Stellung der Befragten in der BRD als auch auf die jeweilige Situation der Einwanderinnen in Beruf und Familie im Herkunftskontext zurückgeführt. (DIPF/Orig.)
Resumo:
Der Autor legt dar, daß es in den Niederlanden immer noch eine indirekt von ständischen Prinzipien bestimmte Schule gibt, in der die soziale Herkunft der Schüler das Lehrerverhalten bestimmt und an den Schüler je nach Schichtzugehörigkeit unterschiedliche Anforderungen gestellt werden. Der Beitrag untersucht aber auch die Rolle des Faktors Ethnizität bei der Behandlung und Beurteilung von Schülern. Die Arbeit ist Teil einer größeren Repräsentativstudie, die an 44 niederländischen Grundschulen mit einem hohen Anteil von Migrantenschülern durchgeführt wurde. In der Untersuchung erwies sich die Schichtzugehörigkeit der Schüler als bedeutsamer als die ethnische Zugehörigkeit. Das hat auch Konsequenzen für pädagogische Maßnahmen. (DIPF/Orig.)
Resumo:
The spread of invasive organisms is one of the greatest threats to ecosystems and biodiversity worldwide. Understanding the evolutionary and ecological factors responsible for the transport, introduction, establishment and spread of invasive species will assist the development of control strategies. The New Zealand mudsnail, Potamopyrgus antipodarum (Gray 1843) (Gastropoda: Hydrobiidae), is a global freshwater invader, with populations established in Europe, Asia, the Americas and Australia. While sexual and asexual P. antipodarum coexist in the native range, invasive populations reproduce by parthenogenesis, producing dense populations that compete for resources with native species. Potamopyrgus antipodarum is a natural model system for the study of evolutionary and ecological processes underlying invasion. This thesis assesses the invasion history, genetic diversity and ecology of P. antipodarum in Australia, with particular focus on: a) potential source populations, b) distribution and structure of populations, and c) species traits related to the establishment, persistence and spread of invasive P. antipodarum. Genetic analyses were carried out on specimens collected for this study from New Zealand and Australia, along with existing museum samples. In combination with published data, the analyses revealed low genetic diversity among and within invasive populations in south-eastern Australia, relative to New Zealand populations. Phylogenetic relationships inferred from mitochondrial sequences indicated that the Australian populations belong to clades dominated by parthenogenetic haplotypes that are known to be present in Europe and the US. These ‘invasive clades’ are likely to originate from the North Island of New Zealand, and suggest a role for selection in determining genetic composition of invasive populations. The genotypic diversity of Australian P. antipodarum was low, with few, closely related clones distributed across south-eastern Australia. The pattern of clone distribution was not consistent with any assessed geographical or abiotic factors; instead a few, widely-distributed clones were present in high frequencies at most sites. Differences in clone frequencies were found, which may indicate differential success of clonal lineages. A range of traits have been proposed as facilitators of invasion success, and within-species variation in these traits can promote differential success of genotypes. Using laboratory-based experiments, the performance of the three most common Australian clones was tested across a suite of invasion-relevant traits. Ecologically-relevant variation in traits was found among the clones. These differences may have determined the spatial distribution of clones, and may continue to do so into the future. This thesis found that the P. antipodarum invasion of Australia is the result of few introductions of a small number of globally-invasive genotypes that vary in ecologically-relevant traits. From a source of considerable genetic diversity in the native range, very few genotypes have become invasive. Those that are invasive appear to be very successful at continental scales. These findings highlight a capacity in asexual invaders to successfully invade, and potentially adapt to, a broad range of ecosystems. The P. antipodarum invasion system is amenable to research using combinations of field-based studies, molecular and laboratory approaches, and is likely to yield significant, broadly-applicable insights into invasion.
Resumo:
Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.
Resumo:
A review of the historical development of the fishery resources of the Kyoga basin shows that the fishery based on the alien fishes which surplanted the indigenous species in the 1960's and early 1970's has been evolving. The record catches of the 19705 and early 1980's were mainly influenced by increased nutrient supply and enlarged lake volume. The sudden collapse in the fishery particularly of the Nile perch in the mid 1980's was most probably imposed by bad fishing regimes. However, future trends in the fisheries of the Kyoga basin will most likely be controlled by nutrient availability and dynamics as well as by the impact of mans activities in the Kyoga catchment.
Resumo:
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they perform information fusion which directs immune responses. We have derived a Dendritic Cell Algorithm based on the functionality of these cells, by modelling the biological signals and differentiation pathways to build a control mechanism for an artificial immune system. We present algorithmic details in addition to experimental results, when the algorithm was applied to anomaly detection for the detection of port scans. The results show the Dendritic Cell Algorithm is successful at detecting port scans.
Resumo:
Tese de Doutoramento, Biologia (Ecologia Vegetal), 24 de Junho de 2013, Universidade dos Açores.