985 resultados para LIVESTOCK PEST


Relevância:

10.00% 10.00%

Publicador:

Resumo:

AbstractINTRODUCTION: This study evaluated whether different strains of Brevibacillus laterosporus could be used to control larvae of the blowfly Chrysomya megacephala , a pest that affects both human and animal health.METHODS:Mortality rates were recorded after 1-mL suspensions of sporulated cells of 14 different strains of B. laterosporus were added to 2.5g of premixed diet consisting of rotting ground beef fed to first instar larvae of C. megacephala . All bioassays were performed using 10 larvae per strain, with a minimum of three replicates for each bioassay. Larval mortality was recorded daily up to seven days.RESULTS:Strains Bon 707, IGM 16-92, and Shi 3 showed the highest toxicity toward the larvae producing 70.5%, 64.5%, and 51.6% of larval mortality, respectively, which was significantly higher than that in the control group (p < 0.05). In contrast, strains NRS 1642, NRS 661, NRS 590 BL 856, NRS 342, ATCC 6457, Bon 712, and NRS 1247 showed limited or no pathogenic activity against the target larvae.CONCLUSIONS:Our preliminary data indicated that B. laterosporus could be used to develop bioinsecticides against C. megacephala .

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sickle cell disease (SCD) is a genetic disorder with recessive transmission, caused by the mutation HBB:c.20A>T. It originates hemoglobin S that forms polymers inside the erythrocyte, upon deoxygenation, deforming it and ultimately leading to premature hemolysis. The disease presents with high heterogeneity of clinical manifestations, the most devastating of which, ischemic stroke, occurs in 11% of patients until 20 years of age. In this study, we tried to identify genetic modifiers of risk and episodes of stroke by studying 66 children with SCD, grouped according to the degree of cerebral vasculopathy (Stroke, Risk and Control). Association studies were performed between the three phenotypic groups and hematological and biochemical parameters of patients, as well as with 23 polymorphic regions in genes related to vascular cell adhesion (VCAM-1, THBS-1 and CD36), vascular tonus (NOS3 and ET-1) and inflammation (TNF-α and HMOX-1). Relevant data was collected from patient’s medical records. Known genetic modulators of SCD (beta-globin cluster haplotype and HBA and BCL11A genotypes) and putative genetic modifiers of cerebral vasculopathy were characterized. Differences in their distribution among groups were assessed. VCAM-1 rs1409419 allele C and NOS3 rs207044 allele C were associated to stroke events, while VCAM-1 rs1409419 allele T was found to be protective. Alleles 4a and 4b of NOS3 27 bp VNTR appeared to be respectively associated to stroke risk and protection. HMOX-1 longer STRs seemed to predispose to stroke. Higher hemoglobin F levels were found in Control group, as a result of Senegal haplotype or of BCL11A rs11886868 allele T, and higher lactate dehydrogenase levels, marker of hemolysis, were found in Risk group. Molecular mechanisms underlying the modifier functions of the relevant genetic variants are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modern telecommunication equipment requires components that operate in many different frequency bands and support multiple communication standards, to cope with the growing demand for higher data rate. Also, a growing number of standards are adopting the use of spectrum efficient digital modulations, such as quadrature amplitude modulation (QAM) and orthogonal frequency division multiplexing (OFDM). These modulation schemes require accurate quadrature oscillators, which makes the quadrature oscillator a key block in modern radio frequency (RF) transceivers. The wide tuning range characteristics of inductorless quadrature oscillators make them natural candidates, despite their higher phase noise, in comparison with LC-oscillators. This thesis presents a detailed study of inductorless sinusoidal quadrature oscillators. Three quadrature oscillators are investigated: the active coupling RC-oscillator, the novel capacitive coupling RCoscillator, and the two-integrator oscillator. The thesis includes a detailed analysis of the Van der Pol oscillator (VDPO). This is used as a base model oscillator for the analysis of the coupled oscillators. Hence, the three oscillators are approximated by the VDPO. From the nonlinear Van der Pol equations, the oscillators’ key parameters are obtained. It is analysed first the case without component mismatches and then the case with mismatches. The research is focused on determining the impact of the components’ mismatches on the oscillator key parameters: frequency, amplitude-, and quadrature-errors. Furthermore, the minimization of the errors by adjusting the circuit parameters is addressed. A novel quadrature RC-oscillator using capacitive coupling is proposed. The advantages of using the capacitive coupling are that it is noiseless, requires a small area, and has low power dissipation. The equations of the oscillation amplitude, frequency, quadrature-error, and amplitude mismatch are derived. The theoretical results are confirmed by simulation and by measurement of two prototypes fabricated in 130 nm standard complementary metal-oxide-semiconductor (CMOS) technology. The measurements reveal that the power increase due to the coupling is marginal, leading to a figure-of-merit of -154.8 dBc/Hz. These results are consistent with the noiseless feature of this coupling and are comparable to those of the best state-of-the-art RC-oscillators, in the GHz range, but with the lowest power consumption (about 9 mW). The results for the three oscillators show that the amplitude- and the quadrature-errors are proportional to the component mismatches and inversely proportional to the coupling strength. Thus, increasing the coupling strength decreases both the amplitude- and quadrature-errors. With proper coupling strength, a quadrature error below 1° and amplitude imbalance below 1% are obtained. Furthermore, the simulations show that increasing the coupling strength reduces the phase noise. Hence, there is no trade-off between phase noise and quadrature error. In the twointegrator oscillator study, it was found that the quadrature error can be eliminated by adjusting the transconductances to compensate the capacitance mismatch. However, to obtain outputs in perfect quadrature one must allow some amplitude error.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this work two different procedures to utilize the sol-gel technology were applied to immobilize/encapsulate enzymes and living cells. CO2 has reached levels in the atmosphere that make it a pollutant. New methods to utilize this gas to obtain products of added value can be very important, both from an environmentally point of view and from an economic standpoint. The first goal of this work was to study the first reaction of a sequential, three-step, enzymatic process that carries out the conversion of CO2 to methanol. Of the three oxidoreductases involved, our focus was on formate dehydrogenase (FateDH) that converts CO2 to formate. This reaction requires the presence of the cofactor β-nicotinamide adenine dinucleotide in reduced form (NADH). The cofactor is expensive and unstable. Our experiments were directed towards generating NADH from its oxidized form (NAD+), using glutamate dehydrogenase (GDH). The formation of NADH from NAD+ in aqueous medium was studied with both free and sol-gel entrapped GDH. This reaction was then followed by the conversion of CO2 to formate, catalysed by free or sol-gel entrapped FateDH. The quantification of NADH/NAD+ was made using UV/Vis spectroscopy. Our results showed that it was possible to couple the GDH-catalyzed generation of the cofactor NADH with the FateDH-catalyzed conversion of CO2, as confirmed by the detection of formate in the medium, using High Performance Liquid Chromatography (HPLC). The immobilization of living cells can be advantageous from the standpoint of ease of recovery, reutilization and physical separation from the medium. Also dead cells may not always exhibit enzymatic activities found with living cells. In this work cell encapsulation was performed using Escherichia coli bacteria. To reduce toxicity for living organisms, the sol-gel method was different than for enzymes, and involved the use of aqueous-based precursors. Initial encapsulation experiments and viability tests were carried out with E. coli K12. Our results showed that sol-gel entrapment of the cells was achieved, and that cell viability could be increased with additives, namely betaine that led to greater viability improvement and was selected for further studies. For an approach to “in-cell” Nuclear Magnetic Resonance (NMR) experiments, the expression of the protein ctCBM11 was performed in E. coli BL21. It was possible to obtain an NMR signal from the entrapped cells, a considerable proportion of which remained alive after the NMR experiments. However, it was not possible to obtain a distinctive NMR signal from the target protein to distinguish it from the other proteins in the cell.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mutable state can be useful in certain algorithms, to structure programs, or for efficiency purposes. However, when shared mutable state is used in non-local or nonobvious ways, the interactions that can occur via aliases to that shared memory can be a source of program errors. Undisciplined uses of shared state may unsafely interfere with local reasoning as other aliases may interleave their changes to the shared state in unexpected ways. We propose a novel technique, rely-guarantee protocols, that structures the interactions between aliases and ensures that only safe interference is possible. We present a linear type system outfitted with our novel sharing mechanism that enables controlled interference over shared mutable resources. Each alias is assigned separate, local roles encoded in a protocol abstraction that constrains how an alias can legally use that shared state. By following the spirit of rely-guarantee reasoning, our rely-guarantee protocols ensure that only safe interference can occur but still allow many interesting uses of shared state, such as going beyond invariant and monotonic usages. This thesis describes the three core mechanisms that enable our type-based technique to work: 1) we show how a protocol models an alias’s perspective on how the shared state evolves and constrains that alias’s interactions with the shared state; 2) we show how protocols can be used while enforcing the agreed interference contract; and finally, 3) we show how to check that all local protocols to some shared state can be safely composed to ensure globally safe interference over that shared memory. The interference caused by shared state is rooted at how the uses of di↵erent aliases to that state may be interleaved (perhaps even in non-deterministic ways) at run-time. Therefore, our technique is mostly agnostic as to whether this interference was the result of alias interleaving caused by sequential or concurrent semantics. We show implementations of our technique in both settings, and highlight their di↵erences. Because sharing is “first-class” (and not tied to a module), we show a polymorphic procedure that enables abstract compositions of protocols. Thus, protocols can be specialized or extended without requiring specific knowledge of the interference produce by other protocols to that state. We show that protocol composition can ensure safety even when considering abstracted protocols. We show that this core composition mechanism is sound, decidable (without the need for manual intervention), and provide an algorithm implementation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current computer systems have evolved from featuring only a single processing unit and limited RAM, in the order of kilobytes or few megabytes, to include several multicore processors, o↵ering in the order of several tens of concurrent execution contexts, and have main memory in the order of several tens to hundreds of gigabytes. This allows to keep all data of many applications in the main memory, leading to the development of inmemory databases. Compared to disk-backed databases, in-memory databases (IMDBs) are expected to provide better performance by incurring in less I/O overhead. In this dissertation, we present a scalability study of two general purpose IMDBs on multicore systems. The results show that current general purpose IMDBs do not scale on multicores, due to contention among threads running concurrent transactions. In this work, we explore di↵erent direction to overcome the scalability issues of IMDBs in multicores, while enforcing strong isolation semantics. First, we present a solution that requires no modification to either database systems or to the applications, called MacroDB. MacroDB replicates the database among several engines, using a master-slave replication scheme, where update transactions execute on the master, while read-only transactions execute on slaves. This reduces contention, allowing MacroDB to o↵er scalable performance under read-only workloads, while updateintensive workloads su↵er from performance loss, when compared to the standalone engine. Second, we delve into the database engine and identify the concurrency control mechanism used by the storage sub-component as a scalability bottleneck. We then propose a new locking scheme that allows the removal of such mechanisms from the storage sub-component. This modification o↵ers performance improvement under all workloads, when compared to the standalone engine, while scalability is limited to read-only workloads. Next we addressed the scalability limitations for update-intensive workloads, and propose the reduction of locking granularity from the table level to the attribute level. This further improved performance for intensive and moderate update workloads, at a slight cost for read-only workloads. Scalability is limited to intensive-read and read-only workloads. Finally, we investigate the impact applications have on the performance of database systems, by studying how operation order inside transactions influences the database performance. We then propose a Read before Write (RbW) interaction pattern, under which transaction perform all read operations before executing write operations. The RbW pattern allowed TPC-C to achieve scalable performance on our modified engine for all workloads. Additionally, the RbW pattern allowed our modified engine to achieve scalable performance on multicores, almost up to the total number of cores, while enforcing strong isolation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Os aquivos municipais preservam a documentação definida legalmente como de conservação permanente, a memória e a experiência da Administração Local e, como tal, são agentes imprescindíveis à preservação dos direitos municipais. A preocupação com a preservação da documentação deve constituir um dos pilares principais do arquivo desde o início da sua criação. E não somente quando a documentação é transferida para o Arquivo Histórico, deve estar presente durante todo o ciclo de vida da documentação. Com a criação do PARAM (Programa de Apoio à Rede de Arquivos Municipais), os arquivos municipais ganham um novo incremento, não só a nível técnico como a nível financeiro, sendo-lhe reconhecido o seu devido valor e importância, na sua dupla dimensão, administrativa e cultural. Uma das funções do arquivo é disponibilizar a documentação que têm à sua guarda e que se encontra armazenada nos depósitos. Para tal é fundamental criar condições a curto, a médio e a longo prazo, implementando toda uma política integrada de preservação, envolvendo os demais serviços da instituição, fazendo-se o controlo do estado de conservação da documentação, aplicando uma metodologia da manipulação de documentos para disponibilizá-los tanto aos clientes internos como externos. O Arquivo Intermédio da Câmara Municipal de Sintra não possui plano de preservação documental, nem ações de preservação extensíveis aos objetos digitais, daí que a presente tese de mestrado pretenda ser um proposta de um contributo de um plano de preservação, que tenha em consideração os demais aspetos desde a localização e construção ou manutenção do edifício onde se encontra o arquivo, questões de segurança, de controlo ambiental, de luz/fotodegradação, o controlo integrado de pragas, danos causados por água, os desastres naturais, a poluição, a limpeza e vigilância na zona de depósitos e armazenamento e manuseamento dos documentos.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Grasslands in semi-arid regions, like Mongolian steppes, are facing desertification and degradation processes, due to climate change. Mongolia’s main economic activity consists on an extensive livestock production and, therefore, it is a concerning matter for the decision makers. Remote sensing and Geographic Information Systems provide the tools for advanced ecosystem management and have been widely used for monitoring and management of pasture resources. This study investigates which is the higher thematic detail that is possible to achieve through remote sensing, to map the steppe vegetation, using medium resolution earth observation imagery in three districts (soums) of Mongolia: Dzag, Buutsagaan and Khureemaral. After considering different thematic levels of detail for classifying the steppe vegetation, the existent pasture types within the steppe were chosen to be mapped. In order to investigate which combination of data sets yields the best results and which classification algorithm is more suitable for incorporating these data sets, a comparison between different classification methods were tested for the study area. Sixteen classifications were performed using different combinations of estimators, Landsat-8 (spectral bands and Landsat-8 NDVI-derived) and geophysical data (elevation, mean annual precipitation and mean annual temperature) using two classification algorithms, maximum likelihood and decision tree. Results showed that the best performing model was the one that incorporated Landsat-8 bands with mean annual precipitation and mean annual temperature (Model 13), using the decision tree. For maximum likelihood, the model that incorporated Landsat-8 bands with mean annual precipitation (Model 5) and the one that incorporated Landsat-8 bands with mean annual precipitation and mean annual temperature (Model 13), achieved the higher accuracies for this algorithm. The decision tree models consistently outperformed the maximum likelihood ones.