979 resultados para Sinkhole Attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Costs of resistance are widely assumed to be important in the evolution of parasite and pathogen defence in animals, but they have been demonstrated experimentally on very few occasions. Endoparasitoids are insects whose larvae develop inside the bodies of other insects where they defend themselves from attack by their hosts' immune systems (especially cellular encapsulation). Working with Drosophila melanogaster and its endoparasitoid Leptopilina boulardi, we selected for increased resistance in four replicate populations of flies. The percentage of flies surviving attack increased from about 0.5% to between 40% and 50% in five generations, revealing substantial additive genetic variation in resistance in the field population from which our culture was established. In comparison with four control lines, flies from selected lines suffered from lower larval survival under conditions of moderate to severe intraspecific competition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

1. The evolution of host resistance to parasitoid attack will be constrained by two factors: the costs of the ability to defend against attack, and the costs of surviving actual attack. These factors have been investigated using Drosophila melanogaster and its parasitoids as a model system. The costs of defensive ability are expressed as a trade-off with larval competitive ability, whereas the costs of actual defence are exhibited in terms of reduced adult fecundity and size. 2. The costs of actual defence may be ameliorated by the host-choice decisions made by Pachycrepoideus vindemiae, a pupal parasitoid. If larvae that have successfully encapsulated a parasitoid develop into poorer quality hosts, then these may be rejected by ovipositing pupal parasitoids. 3. Pupae developing from larvae that have encapsulated the parasitoid Asobara tabida are smaller and have relatively thinner puparia. Thinner puparia are likely to be associated with a reduction in mechanical strength and possibly with a decrease in desiccation tolerance. 4. Pachycrepoideus vindemiae that develop in capsule-bearing pupae are smaller than those that emerge from previously unattacked hosts. This supports the prediction that ovipositing female P. vindemiae should avoid attacking capsule-bearing hosts. However, in choice experiments with 1-day-old pupae, P. vindemiae females oviposited preferentially in hosts containing a capsule, whereas there was no preference found with 4-day-old hosts. This appears to be a maladaptive host choice decision, as the female pupal parasitoids are preferentially attacking hosts that will result in a reduction of their own fitness. 5. The increased likelihood of attack by a pupal parasitoid is another cost of actual defence against larval parasitoid attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ability to resist or avoid natural enemy attack is a critically important insect life history trait, yet little is understood of how these traits may be affected by temperature. This study investigated how different genotypes of the pea aphid Acyrthosiphon pisum Harris, a pest of leguminous crops, varied in resistance to three different natural enemies (a fungal pathogen, two species of parasitoid wasp and a coccinellid beetle), and whether expression of resistance was influenced by temperature. Substantial clonal variation in resistance to the three natural enemies was found. Temperature influenced the number of aphids succumbing to the fungal pathogen Erynia neoaphidis Remaudiere & Hermebert, with resistance increasing at higher temperatures (18 vs. 28degreesC). A temperature difference of 5degreesC (18 vs. 23degreesC) did not affect the ability of A. pisum to resist attack by the parasitoids Aphidius ervi Haliday and A. eadyi Stary Gonzalez & Hall. Escape behaviour from foraging coccinellid beetles (Hippodamia convergens Guerin-Meneville) was not directly influenced by aphid clone or temperature (16 vs. 21degreesC). However, there were significant interactions between clone and temperature (while most clones did not respond to temperature, one was less likely to escape at 16degreesC), and between aphid clone and ladybird presence (some clones showed greater changes in escape behaviour in response to the presence of foraging coccinellids than others). Therefore, while larger temperature differences may alter interactions between Acyrthosiphon pisum and an entomopathogen, there is little evidence to suggest that smaller changes in temperature will alter pea aphid-natural enemy interactions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many terrorist attacks are accomplished by bringing explosive devices hidden in ordinary-looking objects to public places. In such case, it is almost impossible to distinguish a terrorist from ordinary people just from the isolated appearance. However, valuable clues might be discovered through analyzing a series of actions of the same person. Abnormal behaviors of object fetching, deposit, or exchange in public places might indicate potential attacks. Based on the widely equipped CCTV surveillance systems at the entrance of many public places, this paper proposes an algorithm to detect such abnormal behaviors for early warning of terrorist attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The promise of cancer immunotherapy is that it will not only eradicate primary tumors but will generate systemic antitumor immunity capable of destroying distant metastases. A major problem that must first be surmounted relates to the immune resistance of large tumors. Here we reveal that immune resistance can be overcome by combining immunotherapy with a concerted attack on the tumor vasculature. The functionally related antitumor drugs 5,6-dimethylxanthenone-4-acetic acid (DMXAA) and flavone acetic acid (FAA), which cause tumor vasculature collapse and tumor necrosis, were used to attack the tumor vasculature, whereas the T-cell costimulator B7.1 (CD80), which costimulates T-cell proliferation via the CD28 pathway, was used to stimulate antitumor immunity. The injection of cDNA (60–180 µg) encoding B7.1 into large EL-4 tumors (0.8 cm in diameter) established in C57BL/6 mice, followed 24 h later by i.p. administration of either DMXAA (25 mg/kg) or FAA (300 mg/kg), resulted in complete tumor eradication within 2–6 weeks. In contrast, monotherapies were ineffective. Both vascular attack and B7.1 immunotherapy led to up-regulation of heat shock protein 70 on stressed and dying tumor cells, potentially augmenting immunotherapy. Remarkably, large tumors took on the appearance of a wound that rapidly ameliorated, leaving perfectly healed skin. Combined therapy was mediated by CD8+ T cells and natural killer cells, accompanied by heightened and prolonged antitumor cytolytic activity (P < 0.001), and by a marked increase in tumor cell apoptosis. Cured animals completely rejected a challenge of 1 x 107 parental EL-4 tumor cells but not a challenge of 1 x 104 Lewis lung carcinoma cells, demonstrating that antitumor immunity was tumor specific. Adoptive transfer of 2 x 108 splenocytes from treated mice into recipients bearing established (0.8 cm in diameter) tumors resulted in rapid and complete tumor rejection within 3 weeks. Although DMXAA and B7.1 monotherapies are complicated by a narrow range of effective doses, combined therapy was less dosage dependent. Thus, a broad range of amounts of B7.1 cDNA were effective in combination with 25 mg/kg DMXAA. In contrast, DMXAA, which has a very narrow range of high active doses, was effective at a low dose (18 mg/kg) when administered with a large amount (180 µg) of B7.1 cDNA. Importantly, combinational therapy generated heightened antitumor immunity, such that gene transfer of B7.1 into one tumor, followed by systemic DMXAA treatment, led to the complete rejection of multiple untreated tumor nodules established in the opposing flank. These findings have important implications for the future direction and utility of cancer immunotherapies aimed at harnessing patients’ immune responses to their own tumors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper uses the H1 tracking ideas in the missile guidance problem. The controller performs as a Precision guidance controller for small desired attack angles although theoretically the formulas are valid (when intercepting a maneuvering target in a precision guidance point of view) only for the case of head on collision. The controller essentially navigates the missile in a unique relative arc that is de ned by the missile and target location and the desired attack angle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper furthers the research of Rollo, Luther and Atkinson 1999, and Rollo, Honey, Atkinson and Luther 2003, regarding the way in which building shape appears to contribute to the collection of fire-brand debris subject to ember attack. The paper will present a range of 2D fluid-mapping and 3D wind tunnel studies (Melaragno 1982) which have been correlated with the transportation characteristics of an ember laden air-field (Cheney and Sullivan 1997). Working with a range of generic building types the paper also introduces simple spatial modelling techniques which are being developed to illustrate the relationship between ember capture and changes in wind speed and air pressure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IP spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. It causes serious security problem in the cyber world, and is currently exploited widely in the information warfare. This paper at first introduces the IP spoofing attack through examples, technical issues and attacking types. Later its countermeasures are analysed in detail, which include authentication and encription, filtering and IP traceback. In particular, an IP traceback mechanism, Flexible Deterministic Packet Marking (FDPM) is presented. Since the IP spoofing problem can not be solved only by technology, but it also needs social regulation, the legal issues and economic impact are discussed in the later part.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information is the glue in any organization. It is needed for policy, decision-making, control, and co-ordination. If an organisation's information systems are disrupted or destroyed, then damage to the whole inevitably follows. This paper uses a proven systemic, analytic framework the Viable System Model (VSM) - in a functionalist mode, to analyse the vulnerabilities of an organisation's information resources to this form of aggression. It examines the tactics available, and where they can be used to effectively attack an organisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. It provides the framework needed to build management strategies in this area. The topics covered include the basics of information warfare, corporate intelligence systems, the use of deception, security of systems, modes of attack, a methodology to develop defensive measures, plus specific issues associated with information warfare.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous work, in the area of defense systems has focused on developing a firewall like structure, in order to protect applications from attacks. The major drawback for implementing security in general, is that it affects the performance of the application they are trying to protect. In fact, most developers avoid implementing security at all. With the coming of new multicore systems, we might at last be able to minimize the performance issues that security places on applications. In our bodyguard framework we propose a new kind of defense that acts alongside, not in front, of applications. This means that performance issues that effect system applications are kept to a minimum, but at the same time still provide high grade security. Our experimental results demonstrate that a ten to fifteen percent speedup in performance is possible, with the potential of greater speedup.