919 resultados para Triple Denial


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We explore the tectono-magmatic processes in the western West Philippine Basin, Philippine Sea Plate, using bathymetric data acquired in 2003 and 2004. The northwestern part of the basin formed through a series of northwestward propagating rifts. We identify at least five sequences of propagating rifts, probably triggered by mantle flow away from the mantle thermal anomaly that is responsible for the origin of the Benham and Urdenata plateaus. Gravitational forces caused by along-axis topographic gradient and a similar to 30 degrees ridge reorientation appear to also be driving the rift propagations. The along-axis mantle flow appears to be reduced and deflected along the Luzon-Okinawa fracture zone, because the spreading system remained stable west of this major fault zone. North-east of the Benham plateau, a left-lateral fracture zone has turned into a NE-SW-trending spreading axis. As a result, a microplate developed at the triple junction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Beishan orogenic collage locates at the triple-joint among Xinjiang, Gansu, and Inner Mongolia Provinces, at which the Siberian, Tarim and North China plates join together. It also occupies the central segment of the southern Central Asian Orogenic Belt (CAOB). The main study area in the present suty focused on the southwest part of the Beishan Mountain, which can be subdivided into four units southernward, the Mazhongshan continental block, Huaniushan Arc, Liuyuan suture zone and Shibanshan-Daqishan Arc. 1. The Huaniushan Arc was formed by northernward dipping subduction from the Orcovician to Permian, in which volcanic rocks ranging from basic to acidic with island arc affinity were widely developed. The granitiod intrusions become smaller and younger southward, whichs indicates a southward rollback of slab. The granitiod intrusions are mainly composed of I type granites, and their geochemical compositions suggest that they have affinities of island arc settings. In the early Paleozoic(440Ma-390Ma). The Shibanshan-Daqishan Arc, however, were produced in the southernward dipping subduction system from Carboniferous to Permian. Volcanic rocks from basic to acidic rocks are typical calcic-alkaline rocks. The granitiod intrusions become smaller and younger northernward, indicating subdution with a northernward rollback. The granitiod intrusions mainly consist of I-type granites, of which geochemical data support they belong to island arc granite. 2. Two series of adakite intrusions and eruptive rocks have been discovered in the southern margin of the Huaniushan Island Arc. The older series formed during Silurian (441.7±2.5Ma) are gneiss granitoid. These adakite granites intruded the early Paleozoic Liuyuan accretionary complex, and have the same age as most of the granite intrusions in the Huanniushan Arc. Their geochemical compostions demonstrate that they were derived from partial melting of the subudcted oceanic slab. These characteristics indicate a young oceanic crust subduction in the early Paleozoic. The late stage adakites with compositons of dacites associate with Nb-enriched basalts, and island arc basalts and dacites. Their geochemistries demonstrate that the adakites are the products of subducted slab melts, whereas the Nb-enriched basalt is products of the mantle wedge which have metasomatized by adakite melts. Such a association indicates the existences of a young ocean slab subduction. 3. The Liuyuan suture zone is composed of late Paleozoic ophiolites and two series of accretionary complexes with age of early Paleozoic. The early Paleozoic accretionary complex extensively intruded by early Palozioc granites is composed of metamorphic clastics, marble, flysch, various metamorphic igneous rocks (ultramafic, mafic and dacite), and eclogite blocks, which are connected by faults. The original compositions of the rocks in this complex are highly varied, including MORB, E-MORB, arc rocks. Geochronological study indicates that they were formed during the Silurian (420.9±2.5Ma and 421.1±4.3Ma). Large-scale granitiods intruded in the accretionary complex suggest a fast growth effect at the south margin of the Huaniushan arc. During late Paleozoic, island arc were developed on this accretionary complex. The late Paleozoic ophiolite has an age of early Permian (285.7±2.2Ma), in which the rock assemblage includes ultra-mafic, gabbros, gabbros veins, massive basalts, pillow basalt, basaltic clastic breccias, and thin layer tuff, with chert on the top.These igneous rocks have both arc and MORB affinities, indicating their belonging to SSZ type ophiolite. Therefore, oceanic basins area were still existed in the Liuyuan area in the early Permian. 4. The mafic-ultramafic complexes are distributed along major faults, and composed of zoned cumulate rocks, in which peridotites are surrounded by pyroxenite, hornblendites, gabbros norite and diorite outward. They have island-arc affinities and are consistent with typical Alaska-type mafic-ultramafic complexes. The geochronological results indicate that they were formed in the early Permian. 5. The Liuyuan A-type granite were formed under post-collisional settings during the late Triassic (230.9±2.5Ma), indicating the persistence of orogenic process till the late Triassic in the study area. Geochronological results suggested that A-type granites become younger southward from the Wulungu A-type granite belt to Liuyuan A-type granite belt, which is in good agreement with the accretionary direction of the CAOB in this area, which indicate that the Liuyuan suture is the final sture of the Paleo-Asin Ocean. 6. Structural geological evidence demonstrate the W-E spreading of main tectonic terrenes. These terrenes had mainly underwent through S-N direction contraction and NE strike-faulting. The study area had experienced a S-N direction compression after the Permian, indicating a collisional event after the Permian. Based on the evidene from sedimentary geology, paleontology, and geomagnetism, our studies indicate that the orogenic process can be subdivided into five stages: (1) the pre-orogenic stage occurred before the Ordovicain; (2) the subduction orogenic stage occurred from the Orcovician to the Permian; (3) the collisional orogenic stage occurred from the late Permian to the late Triassic; (4) the post-collision stage occurred after the Triassic. The Liuyuan areas have a long and complex tectonic evolutional history, and the Liuyuan suture zone is one of the most important sutures. It is the finally suture zone of the paleo-Asian ocean in the Beishan area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been a growing concern about the use of fossil fuels and its adverse effects on the atmospheric greenhouse and ecological environment. A reduction in the release rate of CO2 into the atmosphere poses a major challenge to the land ecology of China. The most promising way of achieving CO2 reduction is to dispose of CO2 in deep saline aquifers. Deep aquifers have a large potential for CO2 sequestration in geological medium in terms of volume and duration. Through the numerical simulation of multiphase flow in a porous media, the transformation and motion of CO2 in saline aquifers has been implemented under various temperature and hydrostatic pressure conditions, which plays an important role to the assessment of the reliability and safety of CO2 geological storage. As expected, the calculated results can provide meaningful and scientific information for management purposes. The key problem to the numerical simulation of multiphase flow in a porous media is to accurately capture the mass interface and to deal with the geological heterogeneity. In this study, the updated CE/SE (Space and time conservation element and solution element) method has been proposed, and the Hybrid Particle Level Set method (HPLS) has extended for multiphase flows in porous medium, which can accurately trace the transformation of the mass interface. The benchmark problems have been applied to evaluate and validate the proposed method. In this study, the reliability of CO2 storage in saline aquifers in Daqingzi oil field in Sunlong basin has been discussed. The simulation code developed in this study takes into account the state for CO2 covering the triple point temperature and pressure to the supercritical region. The geological heterogeneity has been implemented, using the well known geostatistical model (GSLIB) on the base of the hard data. The 2D and 3D model have been set up to simulate the CO2 multiphase flow in the porous saline aquifer, applying the CE/SE method and the HPLS method .The main contents and results are summarized as followings. (1) The 2D CE/SE method with first and second –order accuracy has been extended to simulate the multiphase flow in porous medium, which takes into account the contribution of source and sink in the momentum equation. The 3D CE/SE method with the first accuracy has been deduced. The accuracy and efficiency of the proposed CE/SE method have been investigated, using the benchmark problems. (2) The hybrid particle level set method has been made appropriate and extended for capturing the mass interface of multiphase flows in porous media, and the numerical method for level set function calculated has been formulated. (3) The closed equations for multiphase flow in porous medium has been developed, adept to both the Darcy flow and non-Darcy flow, getting over the limitation of Reynolds number to the calculation. It is found that Darcy number has a decisive influence on pressure as well as velocity given the Darcy number. (4) The new Euler scheme for numerical simulations of multiphase flows in porous medium has been proposed, which is efficient and can accurately capture the mass interface. The artificial compressibility method has been used to couple the velocities and pressure. It is found that the Darcy number has determinant effects on the numerical convergence and stability. In terms of the different Darcy numbers, the coefficient of artificial compressibility and the time step have been obtained. (5) The time scale of the critical instability for critical CO2 in the saline aquifer has been found, which is comparable with that of completely CO2 dissolved saline aquifer. (6) The concept model for CO2 multiphase flows in the saline aquifer has been configured, based on the temperature, pressure, porosity as well as permeability of the field site .Numerical simulation of CO2 hydrodynamic trapping in saline aquifers has been performed, applying the proposed CE/SE method. The state for CO2 has been employed to take into account realistic reservoir conditions for CO2 geological sequestration. The geological heterogeneity has been sufficiently treated , using the geostatistical model. (7) It is found that the Rayleigh-Taylor instability phenomenon, which is associated with the penetration of saline fluid into CO2 fluid in the direction of gravity, has been observed in CO2 multiphase flows in the saline aquifer. Development of a mushroom-type spike is a strong indication of the formation of Kelvin-Helmholtz instability due to the developed short wavelength perturbations present along the interface and parallel to the bulk flow. Additional key findings: the geological heterogeneity can distort the flow convection. The ascending of CO2 can induce the persistent flow cycling effects. The results show that boundary conditions of the field site have determinant effects on the transformation and motion of CO2 in saline aquifers. It is confirmed that the proposed method and numerical model has the reliability to simulate the process of the hydrodynamic trapping, which is the controlling mechanism for the initial period of CO2 storage at time scale of 100 years.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Direct-injection electrospray ionization mass spectrometry in combination with information-dependent data acquisition (IDA), using a triple-quadrupole/linear ion trap combination, allows high-throughput qualitative analysis of complex phospholipid species from child whole blood. In the IDA experiments, scans to detect specific head groups (precursor ion or neutral loss scans) were used as survey scans to detect phospholipid classes. An enhanced resolution scan was then used to confirm the mass assignments, and the enhanced product ion scan was implemented as a dependent scan to determine the composition of each phospholipid class. These survey and dependent scans were performed sequentially and repeated for the entire duration of analysis, thus providing the maximum information from a single injection. In this way, 50 different phospholipids belonging to the phosphatidylethanolamine, phosphatidylserine, phosphatidylinositol, phosphatidylcholine and sphingomyelin classes were identified in child whole blood. Copyright (C) 2005 John Wiley & Sons, Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these services. Denial of Service (DoS) attacks are one of the most significant web threats and generally their aim is to waste the resources of the target machine (Mirkovic & Reiher, 2004). Dis-tributed Denial of Service (DDoS) attacks are typically executed from many sources and can result in large traf-fic flows. During last year 11% of DDoS attacks were over 60 Gbps (Prolexic, 2013a). The DDoS attacks are usually performed from the large botnets, which are networks of remotely controlled computers. There is an increasing effort by governments and companies to shut down the botnets (Dittrich, 2012), which has lead the attackers to look for alternative DDoS attack methods. One of the techniques to which attackers are returning to is DDoS amplification attacks. Amplification attacks use intermediate devices called amplifiers in order to amplify the attacker's traffic. This work outlines an evaluation tool and evaluates an amplification attack based on the Trivial File Transfer Proto-col (TFTP). This attack could have amplification factor of approximately 60, which rates highly alongside other researched amplification attacks. This could be a substantial issue globally, due to the fact this protocol is used in approximately 599,600 publicly open TFTP servers. Mitigation methods to this threat have also been consid-ered and a variety of countermeasures are proposed. Effects of this attack on both amplifier and target were analysed based on the proposed metrics. While it has been reported that the breaching of TFTP would be possible (Schultz, 2013), this paper provides a complete methodology for the setup of the attack, and its verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bain, William, 'In Praise of Folly: International Administration and the Corruption of Humanity', International Affairs, (2006) 82(3) pp.525-538 RAE2008

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Detecting and understanding anomalies in IP networks is an open and ill-defined problem. Toward this end, we have recently proposed the subspace method for anomaly diagnosis. In this paper we present the first large-scale exploration of the power of the subspace method when applied to flow traffic. An important aspect of this approach is that it fuses information from flow measurements taken throughout a network. We apply the subspace method to three different types of sampled flow traffic in a large academic network: multivariate timeseries of byte counts, packet counts, and IP-flow counts. We show that each traffic type brings into focus a different set of anomalies via the subspace method. We illustrate and classify the set of anomalies detected. We find that almost all of the anomalies detected represent events of interest to network operators. Furthermore, the anomalies span a remarkably wide spectrum of event types, including denial of service attacks (single-source and distributed), flash crowds, port scanning, downstream traffic engineering, high-rate flows, worm propagation, and network outage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reliability and availability have long been considered twin system properties that could be enhanced by distribution. Paradoxically, the traditional definitions of these properties do not recognize the positive impact of recovery as distinct from simple repair and restart on reliability, nor the negative effect of recovery, and of internetworking of clients and servers, on availability. As a result of employing the standard definitions, reliability would tend to be underestimated, and availability overestimated. We offer revised definitions of these two critical metrics, which we call service reliability and service availability, that improve the match between their formal expression, and intuitive meaning. A fortuitous advantage of our approach is that the product of our two metrics yields a highly meaningful figure of merit for the overall dependability of a system. But techniques that enhance system dependability exact a performance cost, so we conclude with a cohesive definition of performability that rewards the system for performance that is delivered to its client applications, after discounting the following consequences of failure: service denial and interruption, lost work, and recovery cost.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent research have exposed new breeds of attacks that are capable of denying service or inflicting significant damage to TCP flows, without sustaining the attack traffic. Such attacks are often referred to as "low-rate" attacks and they stand in sharp contrast against traditional Denial of Service (DoS) attacks that can completely shut off TCP flows by flooding an Internet link. In this paper, we study the impact of these new breeds of attacks and the extent to which defense mechanisms are capable of mitigating the attack's impact. Through adopting a simple discrete-time model with a single TCP flow and a nonoblivious adversary, we were able to expose new variants of these low-rate attacks that could potentially have high attack potency per attack burst. Our analysis is focused towards worst-case scenarios, thus our results should be regarded as upper bounds on the impact of low-rate attacks rather than a real assessment under a specific attack scenario.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The class of all Exponential-Polynomial-Trigonometric (EPT) functions is classical and equal to the Euler-d’Alembert class of solutions of linear differential equations with constant coefficients. The class of non-negative EPT functions defined on [0;1) was discussed in Hanzon and Holland (2010) of which EPT probability density functions are an important subclass. EPT functions can be represented as ceAxb, where A is a square matrix, b a column vector and c a row vector where the triple (A; b; c) is the minimal realization of the EPT function. The minimal triple is only unique up to a basis transformation. Here the class of 2-EPT probability density functions on R is defined and shown to be closed under a variety of operations. The class is also generalised to include mixtures with the pointmass at zero. This class coincides with the class of probability density functions with rational characteristic functions. It is illustrated that the Variance Gamma density is a 2-EPT density under a parameter restriction. A discrete 2-EPT process is a process which has stochastically independent 2-EPT random variables as increments. It is shown that the distribution of the minimum and maximum of such a process is an EPT density mixed with a pointmass at zero. The Laplace Transform of these distributions correspond to the discrete time Wiener-Hopf factors of the discrete time 2-EPT process. A distribution of daily log-returns, observed over the period 1931-2011 from a prominent US index, is approximated with a 2-EPT density function. Without the non-negativity condition, it is illustrated how this problem is transformed into a discrete time rational approximation problem. The rational approximation software RARL2 is used to carry out this approximation. The non-negativity constraint is then imposed via a convex optimisation procedure after the unconstrained approximation. Sufficient and necessary conditions are derived to characterise infinitely divisible EPT and 2-EPT functions. Infinitely divisible 2-EPT density functions generate 2-EPT Lévy processes. An assets log returns can be modelled as a 2-EPT Lévy process. Closed form pricing formulae are then derived for European Options with specific times to maturity. Formulae for discretely monitored Lookback Options and 2-Period Bermudan Options are also provided. Certain Greeks, including Delta and Gamma, of these options are also computed analytically. MATLAB scripts are provided for calculations involving 2-EPT functions. Numerical option pricing examples illustrate the effectiveness of the 2-EPT approach to financial modelling.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this work by employing numerical three-dimensional simulations we study the electrical performance and short channel behavior of several multi-gate transistors based on advanced SOI technology. These include FinFETs, triple-gate and gate-all-around nanowire FETs with different channel material, namely Si, Ge, and III-V compound semiconductors, all most promising candidates for future nanoscale CMOS technologies. Also, a new type of transistor called “junctionless nanowire transistor” is presented and extensive simulations are carried out to study its electrical characteristics and compare with the conventional inversion- and accumulation-mode transistors. We study the influence of device properties such as different channel material and orientation, dimensions, and doping concentration as well as quantum effects on the performance of multi-gate SOI transistors. For the modeled n-channel nanowire devices we found that at very small cross sections the nanowires with silicon channel are more immune to short channel effects. Interestingly, the mobility of the channel material is not as significant in determining the device performance in ultrashort channels as other material properties such as the dielectric constant and the effective mass. Better electrostatic control is achieved in materials with smaller dielectric constant and smaller source-to-drain tunneling currents are observed in channels with higher transport effective mass. This explains our results on Si-based devices. In addition to using the commercial TCAD software (Silvaco and Synopsys TCAD), we have developed a three-dimensional Schrödinger-Poisson solver based on the non-equilibrium Green’s functions formalism and in the framework of effective mass approximation. This allows studying the influence of quantum effects on electrical performance of ultra-scaled devices. We have implemented different mode-space methodologies in our 3D quantum-mechanical simulator and moreover introduced a new method to deal with discontinuities in the device structures which is much faster than the coupled-mode-space approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Solar Energy is a clean and abundant energy source that can help reduce reliance on fossil fuels around which questions still persist about their contribution to climate and long-term availability. Monolithic triple-junction solar cells are currently the state of the art photovoltaic devices with champion cell efficiencies exceeding 40%, but their ultimate efficiency is restricted by the current-matching constraint of series-connected cells. The objective of this thesis was to investigate the use of solar cells with lattice constants equal to InP in order to reduce the constraint of current matching in multi-junction solar cells. This was addressed by two approaches: Firstly, the formation of mechanically stacked solar cells (MSSC) was investigated through the addition of separate connections to individual cells that make up a multi-junction device. An electrical and optical modelling approach identified separately connected InGaAs bottom cells stacked under dual-junction GaAs based top cells as a route to high efficiency. An InGaAs solar cell was fabricated on an InP substrate with a measured 1-Sun conversion efficiency of 9.3%. A comparative study of adhesives found benzocyclobutene to be the most suitable for bonding component cells in a mechanically stacked configuration owing to its higher thermal conductivity and refractive index when compared to other candidate adhesives. A flip-chip process was developed to bond single-junction GaAs and InGaAs cells with a measured 4-terminal MSSC efficiency of 25.2% under 1-Sun conditions. Additionally, a novel InAlAs solar cell was identified, which can be used to provide an alternative to the well established GaAs solar cell. As wide bandgap InAlAs solar cells have not been extensively investigated for use in photovoltaics, single-junction cells were fabricated and their properties relevant to PV operation analysed. Minority carrier diffusion lengths in the micrometre range were extracted, confirming InAlAs as a suitable material for use in III-V solar cells, and a 1-Sun conversion efficiency of 6.6% measured for cells with 800 nm thick absorber layers. Given the cost and small diameter of commercially available InP wafers, InGaAs and InAlAs solar cells were fabricated on alternative substrates, namely GaAs. As a first demonstration the lattice constant of a GaAs substrate was graded to InP using an InxGa1-xAs metamorphic buffer layer onto which cells were grown. This was the first demonstration of an InAlAs solar cell on an alternative substrate and an initial step towards fabricating these cells on Si. The results presented offer a route to developing multi-junction solar cell devices based on the InP lattice parameter, thus extending the range of available bandgaps for high efficiency cells.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The original solution to the high failure rate of software development projects was the imposition of an engineering approach to software development, with processes aimed at providing a repeatable structure to maintain a consistency in the ‘production process’. Despite these attempts at addressing the crisis in software development, others have argued that the rigid processes of an engineering approach did not provide the solution. The Agile approach to software development strives to change how software is developed. It does this primarily by relying on empowered teams of developers who are trusted to manage the necessary tasks, and who accept that change is a necessary part of a development project. The use of, and interest in, Agile methods in software development projects has expanded greatly, yet this has been predominantly practitioner driven. There is a paucity of scientific research on Agile methods and how they are adopted and managed. This study aims at addressing this paucity by examining the adoption of Agile through a theoretical lens. The lens used in this research is that of double loop learning theory. The behaviours required in an Agile team are the same behaviours required in double loop learning; therefore, a transition to double loop learning is required for a successful Agile adoption. The theory of triple loop learning highlights that power factors (or power mechanisms in this research) can inhibit the attainment of double loop learning. This study identifies the negative behaviours - potential power mechanisms - that can inhibit the double loop learning inherent in an Agile adoption, to determine how the Agile processes and behaviours can create these power mechanisms, and how these power mechanisms impact on double loop learning and the Agile adoption. This is a critical realist study, which acknowledges that the real world is a complex one, hierarchically structured into layers. An a priori framework is created to represent these layers, which are categorised as: the Agile context, the power mechanisms, and double loop learning. The aim of the framework is to explain how the Agile processes and behaviours, through the teams of developers and project managers, can ultimately impact on the double loop learning behaviours required in an Agile adoption. Four case studies provide further refinement to the framework, with changes required due to observations which were often different to what existing literature would have predicted. The study concludes by explaining how the teams of developers, the individual developers, and the project managers, working with the Agile processes and required behaviours, can inhibit the double loop learning required in an Agile adoption. A solution is then proposed to mitigate these negative impacts. Additionally, two new research processes are introduced to add to the Information Systems research toolkit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Coming out midlife is a profound and life‐changing experience—it is an experience of self‐shattering that entails the destabilisation of identity, and of family relationships. Entailing a displacement from social insider to outsider, it is a difficult, but also exhilarating, journey of self, and sexual, discovery. This thesis is an examination of the experiences of nine women who undertook that journey. This dissertation is very much a search for understanding—for understanding how one can be lesbian, and how one can not have known, following a lifetime of heterosexual identification—as well as a search for why those questions arise in the first place. I argue that the experience of coming out midlife exposes the fundamental ambiguity of sexuality; and has a significance that ranges beyond the particularity of the participants’ experiences and speaks to the limitations of the hegemonic sexual paradigm itself. Using the theoretical lens of three diverse conceptual approaches—the dynamic systems theory of sexual fluidity; liminality; and narrative identity—to illuminate their transition, I argue that the event of coming out midlife should be viewed not merely as an atypical experience, but rather we should ask what such events can tell us about women’s sexuality in particular, and the sexual paradigm more generally. I argue that women who come out midlife challenge those dominant discourses of sexuality that would entail that women who come out midlife were either in denial of their “true” sexuality throughout their adult lives; or that they are not really lesbian now. The experiences of the women I interviewed demonstrate the inadequacy of the sexual paradigm as a framework within which to understand and research the complexity of human sexuality; they also challenge hegemonic understandings of sexuality as innate and immutable. In this thesis, I explore that challenge.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We report on a heart-lung transplant recipient who presented with pulmonary tuberculosis (TB) 2.5 months after transplantation and then developed a paradoxical reaction after 4 months of adequate anti-TB treatment. She eventually recovered with anti-TB and high-dose steroid treatments. METHODS: Using sequential bronchoalveolar lavages, we assessed the inflammatory response in the lung and investigated the alveolar immune response against a Mycobacterium tuberculosis antigen. RESULTS: The paradoxical reaction was characterized by a massive infiltration of the alveolar space by M. tuberculosis antigen-specific CD4(+) T cells and by the presence of a CD4(-)CD8(-) T lymphocyte subpopulation bearing phenotypic markers (CD16(+)/56(+)) classically associated with NK cells. CONCLUSION: This case report illustrates that even solid organ transplant recipients receiving intense triple-drug immune suppression may be able to develop a paradoxical reaction during TB treatment. Transplant physicians should be aware of this phenomenon in order to differentiate it from treatment failure.