886 resultados para Pearl Harbor (Hawaii), Attack on, 1941
Resumo:
Field measurements of salinity, wind and river discharge and numerical simulations of hydrodynamics from 1978 to 1984 are used to investigate the dynamics of the buoyant plume off the Pearl River Estuary (PRE), China during summer. The studies have shown that there are four major horizontal buoyant plume types in summer: Offshore Bulge Spreading (Type I), West Alongshore Spreading (Type II), East Offshore Spreading (Type III), and Symmetrical Alongshore Spreading (Type IV). River mouth conditions, winds and ambient coastal currents have inter-influences to the transport processes of the buoyant plume. It is found that all of the four types are surface-advected plumes by analysing the vertical characteristic of the plumes, and the monthly variations of the river discharge affect the plume size dominantly. The correlation coefficient between the PRE plume size and the river discharge reaches 0.85 during the high river discharge season. A wind strength index has been introduced to examine the wind effect. It is confirmed that winds play a significant role in forming the plume morphology. The alongshore wind stress and the coastal currents determine the alongshore plume spreading. The impact of the ambient currents such as Dongsha Current and South China Sea (SCS) Warm Current on the plume off the shelf has also assessed. The present study has demonstrated that both the river discharge and wind conditions affect the plume evolution.
Resumo:
There is excess nitrate (NO3) in the Pearl River coastal plume in the southern waters of Hong Kong in summer. We hypothesize that phosphorus (P) limitation controls the utilization of excess NO3 due to the high N:P ratio in the Pearl River. To test this hypothesis, we conducted two 1-day cruises on July 13 and 19, 2000 to examine the response of the phytoplankton to P additions with respect to changes in biomass, uptake of nutrients and nutrient uptake ratios using a batch incubation of natural water samples collected from the Pearl River estuary and adjacent coastal waters. At a station (E1, salinity =5) in the Pearl River estuary, the N/P ratio at the surface was 46:1, (64 muM DIN: 1.3 muM PO4) and decreased to 24:1 (12 muM DIN: 0.5 muM PO4) downstream at a station (Stn 26, salinity =26) in the coastal plume south of Hong Kong. Without a P addition, NO3 in the water samples collected at E1 could not be depleted during a 9 day incubation (similar to20 muM NO3 remaining). With a P addition, NO3 disappeared completely on day 6 with the depletion of the added PO4 (2-3 muM). This was also true for a station, E4 (salinity= 15) further downstream, but within the estuary. At Stn 26, in the coastal plume south of Hong Kong, NO3 (similar to11.5 muM) was eventually depleted without the addition of PO4, but it took 8 days instead of 5 days for Stn E4. The uptake ratio of dissolved inorganic nitrogen (DIN) to PO4, without a P addition was 51:1, 43:1 and 46:1 for Stns E1, E4 and 26, respectively. With a P addition, the DIN/PO4 uptake ratio decreased to 20:1, 14:1 and 12:1, respectively, for the 3 stations. These results clearly indicate potential P limitation to utilization of NO3 in the Pearl River estuary, resulting in excess NO3 in waters of the coastal plume downstream of the estuary, some of which would eventually be transported offshore. High uptake ratios of N:P without a P addition (43N:1P) suggest that phytoplankton have a nitrogen uptake capacity in excess of the Redfield ratio of 16N: 1P by 2.5-3 times. The value of 2.5-3 times was likely a maximum that should have contained a contribution of P released from desorption of P from sediments or from regeneration by zooplankton grazing and bacterial activity during the incubation of natural water samples. Without a P addition, however, phytoplankton biomass did not increase. This means that P turnover rates or regeneration may allow phytoplankton to take up additional N in excess of the Redfield ratio and store it, but without increasing the algal biomass. Therefore, high ambient N:P ratios in excess of the Redfield ratio do indicate potential P limitation to phytoplankton biomass in this estuarine coastal ecosystem. (C) 2004 Elsevier Ltd. All rights reserved.
Resumo:
The source and significance. of two mitrients, nitrogen. and phosphorous, were investigated by a modified dilution method performed on seawater samples from the Jiaozhou Bay in autumn 2004. This modified dilution method accounted for the phytoplankton growth rate, microzooplankton grazing mortality rate, the external nutrient pools, as well as nutrient supplied through remineralization by microzooplankton. The results indicated that the phytoplankton net growth rate increased in turn from inside the bay, to outside the bay, to in the Xiaogang Harbor. The phytoplankton, maximum growth rates and microzooplankton grazing mortality rates were 1.14 and 0.92 d(-1) outside the bay, 0.42 and 0.32 d(-1) inside the bay and 0.98 and 0.62 d(-1) in the harbor respectively. Outside the bay, the remineralized nitrogen (K-r = 24.49) had heavy influence on the growth of the phytoplankton. Inside the bay, the remineralized phosphorus(K-r = 3.49) strongly affected the phytoplankton growth. In the harbor, the remineralized phosphorus (K-r = 3.73) was in larger demand by phytoplankton growth. The results demonstrated that the different nutrients pools supplied for phytoplankton growth were greatly in accordance with the phytoplankton community structure, microzooplankton grazing mortality rates and environmental conditions. It is revealed that, nutrient remineralization is much more important for the phytoplankton growth in the Jiaozhou Bay than previously believed.
Resumo:
The jinjiang oyster Crassostrea rivularis [Gould, 1861. Descriptions of Shells collected in the North Pacific Exploring Expedition under Captains Ringgold and Rodgers. Proc. Boston Soc. Nat. Hist. 8 (April) 33-40] is one of the most important and best-known oysters in China. Based on the color of its flesh, two forms of C rivularis are recognized and referred to as the "white meat" and 11 red meat" oysters. The classification of white and red forms of this species has been a subject of confusion and debate in China. To clarify the taxonomic status of the two forms of C. rivularis, we collected and analyzed oysters from five locations along China's coast using both morphological characters and DNA sequences from mitochondrial 16S rRNA and cytochrome oxidase 1, and the nuclear 28S rRNA genes. Oysters were classified as white or red forms according to their morphological characteristics and then subjected to DNA sequencing. Both morphological and DNA sequence data suggest that the red and white oysters are two separate species. Phylogenetic analysis of DNA sequences obtained in this study and existing sequences of reference species show that the red oyster is the same species as C. ariakensis Wakiya [1929. Japanese food oysters. Jpn. J. Zool. 2, 359-367.], albeit the red oysters from north and south China are genetically distinctive. The white oyster is the same species as a newly described species from Hong Kong, C. hongkongensis Lam and Morton [2003. Mitochondrial DNA and identification of a new species of Crassostrea (Bivalvia: Ostreidae) cultured for centuries in the Pearl River Delta, Hong Kong, China. Aqua. 228, 1-13]. Although the name C. rivularis has seniority over C. ariakensis and C. hongkongensis, the original description of Ostrea rivularis by Gould [1861] does not fit shell characteristics of either the red or the white oysters. We propose that the name of C. rivularis Gould [1861] should be suspended, the red oyster should take the name C. ariakensis, and the white oyster should take the name C. hongkongensis. (C) 2004 Elsevier B.V. All rights reserved.
Resumo:
In this paper, we expose an unorthodox adversarial attack that exploits the transients of a system's adaptive behavior, as opposed to its limited steady-state capacity. We show that a well orchestrated attack could introduce significant inefficiencies that could potentially deprive a network element from much of its capacity, or significantly reduce its service quality, while evading detection by consuming an unsuspicious, small fraction of that element's hijacked capacity. This type of attack stands in sharp contrast to traditional brute-force, sustained high-rate DoS attacks, as well as recently proposed attacks that exploit specific protocol settings such as TCP timeouts. We exemplify what we term as Reduction of Quality (RoQ) attacks by exposing the vulnerabilities of common adaptation mechanisms. We develop control-theoretic models and associated metrics to quantify these vulnerabilities. We present numerical and simulation results, which we validate with observations from real Internet experiments. Our findings motivate the need for the development of adaptation mechanisms that are resilient to these new forms of attacks.
Resumo:
Recent research have exposed new breeds of attacks that are capable of denying service or inflicting significant damage to TCP flows, without sustaining the attack traffic. Such attacks are often referred to as "low-rate" attacks and they stand in sharp contrast against traditional Denial of Service (DoS) attacks that can completely shut off TCP flows by flooding an Internet link. In this paper, we study the impact of these new breeds of attacks and the extent to which defense mechanisms are capable of mitigating the attack's impact. Through adopting a simple discrete-time model with a single TCP flow and a nonoblivious adversary, we were able to expose new variants of these low-rate attacks that could potentially have high attack potency per attack burst. Our analysis is focused towards worst-case scenarios, thus our results should be regarded as upper bounds on the impact of low-rate attacks rather than a real assessment under a specific attack scenario.
Resumo:
Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.
Resumo:
Unlike some other major composer-pianists (Franz Liszt and Alexander Scriabin being the most notable examples), Sergei Rachmaninov did not experience any dramatic changes in his compositional style; one can, however, notice certain stylistic differences between piano works composed during different periods of his long creative life. This dissertation argues that a clear evolution of Rachmaninov's pianistic style through his three creative periods can be traced by examining a selection of his compositions, from his first significant cycle for piano, 5 Marceaux de fantaisie, Op. 3 (1892), all the way through to his last piano work, a transcription of P.I.Tchakovsky's Lullaby, Op. 16, No. 1 (1941). Rachmaninov's life as a composer can be divided into three periods. His early period was ended abruptly by the disastrous premiere ofhis First Symphony in 1897, which caused a deep psychological crisis in the life of the young composer. Piano works of this period are often characterized by relatively simple homophonic texture, when Rachmaninov was clearly influenced by some of his Russian predecessors, most notably Tchaikovsky. His second and most productive period, also known as the period of"Russian maturity," started in 1900, when he began working on the Second Suite for two pianos, Op. 17, and the Second Concerto, Op. 18; this phase ended with the Russian Bolshevik revolution of 1917. Works of this time exhibit a mature style of piano writing, with rich, virtuosic - often considered excessive by many critics - texture and ever-increasing use of chromatic harmonies. Rachmaninov's works of the third period are limited in number owing to the composer's preoccupation with a career as pianist. Original works for piano now give way to revisions of earlier compositions and transcriptions: Rachmaninov's piano writing becomes more efficient and economical without losing any of its virtuosic brilliance. This dissertation project examines in detail, over the course of three piano recitals, a variety of works composed during the "Russian maturity" period, from several Preludes from Op. 23 (1903), the first major cycle for solo piano of the period, to 9 Etudes-Tableaux, Op.39 (1917), the last one; the early period is represented by 3 of 5 Marceaux defantaisie, Op. 3 (1892), while the late period is shown through several piano transcriptions and revised versions of the remaining 2 pieces from Op. 3.
Resumo:
Our long-term goal is the detection and characterization of vulnerable plaque in the coronary arteries of the heart using intravascular ultrasound (IVUS) catheters. Vulnerable plaque, characterized by a thin fibrous cap and a soft, lipid-rich necrotic core is a precursor to heart attack and stroke. Early detection of such plaques may potentially alter the course of treatment of the patient to prevent ischemic events. We have previously described the characterization of carotid plaques using external linear arrays operating at 9 MHz. In addition, we previously modified circular array IVUS catheters by short-circuiting several neighboring elements to produce fixed beamwidths for intravascular hyperthermia applications. In this paper, we modified Volcano Visions 8.2 French, 9 MHz catheters and Volcano Platinum 3.5 French, 20 MHz catheters by short-circuiting portions of the array for acoustic radiation force impulse imaging (ARFI) applications. The catheters had an effective transmit aperture size of 2 mm and 1.5 mm, respectively. The catheters were connected to a Verasonics scanner and driven with pushing pulses of 180 V p-p to acquire ARFI data from a soft gel phantom with a Young's modulus of 2.9 kPa. The dynamic response of the tissue-mimicking material demonstrates a typical ARFI motion of 1 to 2 microns as the gel phantom displaces away and recovers back to its normal position. The hardware modifications applied to our IVUS catheters mimic potential beamforming modifications that could be implemented on IVUS scanners. Our results demonstrate that the generation of radiation force from IVUS catheters and the development of intravascular ARFI may be feasible.
Resumo:
Association studies of quantitative traits have often relied on methods in which a normal distribution of the trait is assumed. However, quantitative phenotypes from complex human diseases are often censored, highly skewed, or contaminated with outlying values. We recently developed a rank-based association method that takes into account censoring and makes no distributional assumptions about the trait. In this study, we applied our new method to age-at-onset data on ALDX1 and ALDX2. Both traits are highly skewed (skewness > 1.9) and often censored. We performed a whole genome association study of age at onset of the ALDX1 trait using Illumina single-nucleotide polymorphisms. Only slightly more than 5% of markers were significant. However, we identified two regions on chromosomes 14 and 15, which each have at least four significant markers clustering together. These two regions may harbor genes that regulate age at onset of ALDX1 and ALDX2. Future fine mapping of these two regions with densely spaced markers is warranted.
Resumo:
Our research was conducted to improve the timeliness, coordination, and communication during the detection, investigation and decision-making phases of the response to an aerosolized anthrax attack in the metropolitan Washington, DC, area with the goal of reducing casualties. Our research gathered information of the current response protocols through an extensive literature review and interviews with relevant officials and experts in order to identify potential problems that may exist in various steps of the detection, investigation, and response. Interviewing officials from private and government sector agencies allowed the development of a set of models of interactions and a communication network to identify discrepancies and redundancies that would elongate the delay time in initiating a public health response. In addition, we created a computer simulation designed to model an aerosol spread using weather patterns and population density to identify an estimated population of infected individuals within a target region depending on the virulence and dimensions of the weaponized spores. We developed conceptual models in order to design recommendations that would be presented to our collaborating contacts and agencies that would use such policy and analysis interventions to improve upon the overall response to an aerosolized anthrax attack, primarily through changes to emergency protocol functions and suggestions of technological detection and monitoring response to an aerosolized anthrax attack.