927 resultados para Nucleophilic attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We provide the first evidence of a small-headed fly planidium (first instar larva; Diptera: Acroceridae) associated with a whirligig mite (Acari: Acariformes: Prostigmata: Anystina: Anystidae) in Baltic amber. This fossil is surprising as parasitic nematodes are the only metazoans known to successfully attack acariform mites, and Acroceridae are believed to be host-restricted parasitoids of spiders. The fossil corroborates a previously published, but widely dismissed, paper that first reported parasitism of parasitengone mites by acrocerid planidia. The possible natural history implications of this find are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Phoracantha longicorn beetles are endemic to Australia, and some species have become significant pests of eucalypts worldwide, yet little is known about their host plant interactions and factors influencing tree susceptibility in Australia. Here, we investigate the host relationships of Phoracantha solida (Blackburn, 1894) on four eucalypt taxa (one pure species and three hybrid families), examining feeding site physical characteristics including phloem thickness, density, and moisture content, and host tree factors such as diameter, height, growth, taper, and survival. We also determine the cardinal and vertical (within-tree) and horizontal (between-tree) spatial distribution of borers. Fewer than 10% of P. solida attacks were recorded from the pure species (Corymbia citriodora subsp. variegate (Hook)), and this taxon also showed the highest survival, phloem thickness, relative growth rate, and bark:wood area. For the two most susceptible taxa, borer severity was negatively correlated with moisture content, and positively related to phloem density. Borers were nonrandomly and nonuniformly distributed within trees, and were statistically aggregated in 32% of plots. More attacks were situated on the northern side of the tree than the other aspects, and most larvae fed within the lower 50 cm of the bole, with attack height positively correlated with severity. Trees with borers had more dead neighbors, and more bored neighbors, than trees without borers, while within plots, borer incidence and severity were positively correlated. Because the more susceptible taxa overlapped with less susceptible taxa for several physical tree factors, the role of primary and secondary chemistries in determining host suitability needs to be investigated. Nevertheless, taxon, moisture content, phloem density, tree size, and mortality of neighboring trees appeared the most important physical characteristics influencing host suitability for P. solida at this site.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Honey bees are in decline, and the current method of keeping them can be disruptive to a colony. But new designs allow beekeepers to monitor a hive remotely, even sniff out disease and pests.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Spontaneous ejection of chloride from a three-coordinate boron Lewis acid can be effected by employing very electron rich metal substituents and leads to the formation of a sterically unprotected terminal (dimethylamino)borylene complex that has a short metal-boron bond and remarkable resistance to attack by nucleophilic and protic reagents.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The diruthenium(III) complex [Ru2O(O2CAr)2(MeCN)4(PPh3)2](ClO4)2 (1), on reaction with 1,2-diaminoethane (en) in MeOH at 25-degrees-C, undergoes nucleophilic attacks at the carbon of two facial MeCN ligands to form [(Ru2O)-O-III(O2CAr)2-{NH2CH2CH2NHC(Me)NH}2(PPh3)2](ClO4)2 (2) (Ar = C6H4-p-X, X = H, Me, OMe, Cl) containing two seven-membered amino-amidine chelating ligands. The molecular structure of 2 with Ar = C6H4-p-OMe was determined by X-ray crystallography. Crystal data are as follows: triclinic, P1BAR, a = 13.942 (5) angstrom, b = 14.528 (2) angstrom, c = 21.758 (6) angstrom, alpha = 109.50 (2)-degrees, beta = 92.52 (3)-degrees, gamma = 112.61 (2)-degrees, V = 3759 (2) angstrom 3, and Z = 2. The complex has an {Ru2(mu-O)(mu-O2CAr2)2(2+)} core. The Ru-Ru and average Ru-O(oxo) distances and the Ru-O-Ru angle are 3.280 (2) angstrom, 1.887 [8] angstrom, and 120.7 (4)-degrees, respectively. The amino group of the chelating ligand is trans to the mu-oxo ligand. The nucleophilic attacks take place on the MeCN ligands cis to the mu-oxo ligand. The visible spectra of 2 in CHCl3 display an absorption band at 565 nm. The H-1 NMR spectra of 2 in CDCl3 are indicative of the formation of an amino-amidine ligand. Complex 2 exhibits metal-centered quasireversible one-electron oxidation and reduction processes in the potential ranges +0.9 to +1.0 V and -0.3 to -0.5 V (vs SCE), respectively, involving the Ru(III)2/Ru(III)Ru(IV) and Ru(III)2/Ru(II)Ru(III) redox couples in CH2Cl2 containing 0.1 M TBAP. The mechanistic aspects of the nucleophilic reaction are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grouping and coordination tactics for ground attack missions by a heterogeneous mix of reconnaissance, enemy suppression, and attack unmanned aerial vehicles (UAVs) is presented. Dubins' paths are used to determine the optimal number of attack UAVs and their positional and heading freedoms, as functions of weapon seeker range and field of view. A generic battlefield scenario with layered defense is created and the tactics are evaluated on a Group Flyer simulation platform for both nominal and off-nominal conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

2,3-Unsaturated 3-arylsulfinyl pyranosides undergo nucleophilic additions at C-2, with facial selectivities depending on the nucleophile and the substituent on sulfinyl sulfur. The reactions of such sugar vinyl sulfoxides lead to the addition of nucleophile preferring an axial orientation at C-2, with concomitant formation of an allylic bond at C-3 to C-4. This trend in the addition pattern is observed for primary amine, carbon and sulfur nucleophiles, whereas secondary amines prefer an equatorial addition at C-2. The effect of p-tolylthio-versus (p-isopropylphenyl)thio vinyl sulfoxide is that the equatorial nucleophilic addition is preferred even more with the latter vinyl sulfoxide. (C) 2013 Published by Elsevier Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task. For such a dynamic environment, a security system which dynamically observes the attacker's plans and protect the highly sophisticated resources is in high demand. In this paper we present a method of providing security against wormhole attacks to a MANET by learning about the environment dynamically and adapting itself to avoid malicious nodes. We accomplish this with the assistance of Honeypot. Our method predicts the wormhole attack that may take place and protect the resources well-in advance. Also it cleverly deal with the attacker by using previous history and different type of messages to locate the attacker. Several experiments suggest that the system is accurate in handling wormhole attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A diazo species is trapped in an intermolecular fashion by two independent ion species in tandem at the carbene center to install an electrophile and a nucleophile on the same carbon. This metal-free concept, which is unprecedented, has been illustrated by regioselective synthesis of a variety of vinyl halides, vinyl sulfones, and alkyne derivatives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [Li et al., AIAA J. 46, 2899(2008)], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 0° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves VLFWs� are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [ Li et al., AIAA J. 46, 2899 (2008) ], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 20° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves (VLFWs) are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.