69 resultados para Cocoon
Resumo:
1-1 is torically, the predominan t method of reconstructing phylogenies has been through the use of morphological characters. There are new techniques now gaining acceptance, including molecular techniques al1d chromosomal information. Altl10ugh the study of behaviour has been used in a comparative framework, these analyses have, historically, been based on intuition. Hennig (1966) devised a neV\' method of reconstructing phylogenies which provided a 110ncircular method for formulating, testing and refining phylogenies. Subsequent s)Tstematists had virtually abandoned ecological and beha\lioural data as primary indicators of phylogenetic relationships (Brooks and McLennan 1991). Therefore, in a modern cladistic framework (sensu Hennig) the analysis of behavioural traits remains underrepresented as a method of reconstructing phylogenies. This thesis will reconstruct the phylogeny for species of black flies (Diptera: Simuliidae), using two steps. The first step is to thoroughl)' understand and explain the cocoon spinning in black fly larvae. There have bee115 previous descriptions of cocoon spinning, but all were incomplete or erroneous. The advances in technology, including video recorders and VCRs, have allowed this behaviour to be analyzed in great detail in 20 different species. A complete description of the cocoon spinning of Simulium \littatum is given. This description will be used as a template for the other species observed. The description and understanding of cococ)n spinning was the first step in undertaking a phylogenetic analysis using this behaviour. The behaviour was then broken down and analyzed, revealing 23 characters, 3 either qualitative and quantitative in nature. These characters were assessed in a cladistic framework (sensu Hennig) and a phylogenetic tree was reconstructed with a e.I of 0.91 and an R.I. of 0.96. This phylogenetic tree closely resembles a previously established pllylogenetic tree produced from morphological and cytological information. The importance of this result is the indication that, contrary to some authors, behavioural characters, if used properly, can add very informative characters to a data set.
Resumo:
Neem oil is a biopesticide that disturbs the endocrine and neuroendocrine systems of pests and may interfere with molting, metamorphosis and cocoon spinning. The cocoon serves protective functions for the pupa during metamorphosis, and these functions are dependent on cocoon structure. To assess the changes in cocoon spinning caused by neem oil ingestion, Ceraeochrysa claveri larvae, a common polyphagous predator, were fed with neem oil throughout the larval period. When treated with neem oil, changes were observed on the outer and inner surfaces of the C. claveri cocoon, such as decreased wall thickness and impaired ability to attach to a substrate. These negative effects may reduce the effectiveness of the mechanical and protective functions of cocoons during pupation, which makes the specimen more vulnerable to natural enemies and environmental factors. © 2013 Elsevier Inc.
Resumo:
This study examined the effect of soil type on burrowing behaviour and cocoon formation during aestivation in the green-striped burrowing frog, Cyclorana alboguttata (Gunther, 1867). Given a choice, frogs always chose to burrow in wet sand in preference to wet clay. Frogs buried themselves faster and dug deeper burrows in sandy soil. However, under my laboratory conditions, there was little difference in the pattern of soil drying between the two soil types. Frogs in both sand and clay soil experienced hydrating conditions for the first 3amonths and dehydrating conditions for the last 3amonths of the 6-month aestivation period, and cocoons were not formed until after 3amonths of aestivation. After 6amonths, there were more layers in the cocoons of frogs aestivating in sand than those aestivating in clay. Frogs were able to absorb water from sandy soil with water potentials greater than -400akPa, but lost water when placed on sand with a water potential of -1000akPa.
Resumo:
This paper reads a range of nineteenth-century texts for children that retell either Shakespeare's The Tempest or mermaid narratives, considering the models of feminine subjectivity and sexuality that they construct. It then moves on to two key contemporary texts — Disney's film adaptation of The Little Mermaid (Clements and Musker 1989) and Penni Russon's Undine (2004) — that combine the Shakespearean heroine with the mermaid, and reads them against the nineteenth-century models. Ultimately, the essay determines that, while these texts seem to perform a progressive appropriation of the two traditions, they actually combine the most conservative aspects of both The Tempest and mermaid stories to produce authoritative (and dangerously persuasive) ideals of passive feminine sexuality that confine girls within patriarchally-dictated familial positions. The new figure for adolescent female subjectivity, the mermaid-Miranda, becomes in turn a model of identification and aspiration for the implied juvenile consumer.
Resumo:
With the rise of ubiquitous computing in recent years, concepts of spatiality have become a significant topic of discussion in design and development of multimedia systems. This article investigates spatial practices at the intersection of youth, technology, and urban space in Seoul, and examines what the author calls ‘transyouth’: in the South Korean context, these people are between the ages of 18 and 24, situated on the delicate border between digital natives and immigrants in Prensky’s (2001) terms. In the first section, the article sets out the technosocial environment of contemporary Seoul. This is followed by a discussion of social networking processes derived from semi-structured interviews conducted in 2007-8 with Seoul transyouth about their ‘lived experiences of the city.’ Interviewees reported how they interact to play, work, and live with and within the city’s unique environment. The article develops a theme of how technosocial convergence (re)creates urban environments and argues for a need to consider such user-driven spatial recreation in designing cities as (ubiquitous) urban networks in recognition of its changing technosocial contours of connections. This is explored in three spaces of different scales: Cyworld as an online social networking space; cocoon housing – a form of individual residential space which is growing rapidly in many Korean cities – as a private living space; and u-City (ubiquitous City) as the future macro-space of Seoul.
Resumo:
The majority of the world’s population now lives in cities (United Nations, 2008) resulting in an urban densification requiring people to live in closer proximity and share urban infrastructure such as streets, public transport, and parks within cities. However, “physical closeness does not mean social closeness” (Wellman, 2001, p. 234). Whereas it is a common practice to greet and chat with people you cross paths with in smaller villages, urban life is mainly anonymous and does not automatically come with a sense of community per se. Wellman (2001, p. 228) defines community “as networks of interpersonal ties that provide sociability, support, information, a sense of belonging and social identity.” While on the move or during leisure time, urban dwellers use their interactive information communication technology (ICT) devices to connect to their spatially distributed community while in an anonymous space. Putnam (1995) argues that available technology privatises and individualises the leisure time of urban dwellers. Furthermore, ICT is sometimes used to build a “cocoon” while in public to avoid direct contact with collocated people (Mainwaring et al., 2005; Bassoli et al., 2007; Crawford, 2008). Instead of using ICT devices to seclude oneself from the surrounding urban environment and the collocated people within, such devices could also be utilised to engage urban dwellers more with the urban environment and the urban dwellers within. Urban sociologists found that “what attracts people most, it would appear, is other people” (Whyte, 1980, p. 19) and “people and human activity are the greatest object of attention and interest” (Gehl, 1987, p. 31). On the other hand, sociologist Erving Goffman describes the concept of civil inattention, acknowledging strangers’ presence while in public but not interacting with them (Goffman, 1966). With this in mind, it appears that there is a contradiction between how people are using ICT in urban public places and for what reasons and how people use public urban places and how they behave and react to other collocated people. On the other hand there is an opportunity to employ ICT to create and influence experiences of people collocated in public urban places. The widespread use of location aware mobile devices equipped with Internet access is creating networked localities, a digital layer of geo-coded information on top of the physical world (Gordon & de Souza e Silva, 2011). Foursquare.com is an example of a location based 118 Mobile Multimedia – User and Technology Perspectives social network (LBSN) that enables urban dwellers to virtually check-in into places at which they are physically present in an urban space. Users compete over ‘mayorships’ of places with Foursquare friends as well as strangers and can share recommendations about the space. The research field of Urban Informatics is interested in these kinds of digital urban multimedia augmentations and how such augmentations, mediated through technology, can create or influence the UX of public urban places. “Urban informatics is the study, design, and practice of urban experiences across different urban contexts that are created by new opportunities of real-time, ubiquitous technology and the augmentation that mediates the physical and digital layers of people networks and urban infrastructures” (Foth et al., 2011, p. 4). One possibility to augment the urban space is to enable citizens to digitally interact with spaces and urban dwellers collocated in the past, present, and future. “Adding digital layer to the existing physical and social layers could facilitate new forms of interaction that reshape urban life” (Kjeldskov & Paay, 2006, p. 60). This methodological chapter investigates how the design of UX through such digital placebased mobile multimedia augmentations can be guided and evaluated. First, we describe three different applications that aim to create and influence the urban UX through mobile mediated interactions. Based on a review of literature, we describe how our integrated framework for designing and evaluating urban informatics experiences has been constructed. We conclude the chapter with a reflective discussion on the proposed framework.
Resumo:
Fibroin extracted from silkworm cocoon silk provides an intriguing and potentially important biomaterial for corneal reconstruction. In the present chapter we outline our methods for producing a composite of two fibroin-based materials that supports the co-cultivation of human limbal epithelial (HLE) cells and human limbal stromal (HLS) cells. The resulting tissue substitute consists of a stratified epithelium overlying a three-dimensional arrangement of extracellular matrix components (principally ‘degummed’ fibroin fibers) and mesenchymal stromal cells. This tissue substitute is currently being evaluated as a tool for reconstructing the corneal limbus and corneal epithelium.
Resumo:
Based on maps of the extragalactic radio sources Cyg A, Her A, Cen A, 3C 277.3 and others, arguments are given that the twin-jets from the respective active galactic nucleus ram their channels repeatedly through thin, massive shells. The jets are thereby temporarily choked and blow radio bubbles. Warm shell matter in the cocoon shows up radio-dark through electron-scattering.
Resumo:
The life history and host range of the lantana beetle, Alagoasa extrema, a potential biocontrol agent for Lantana spp. were investigated in a quarantine unit at the Alan Fletcher Research Station, Brisbane, Australia. Adults feed on leaves and females lay batches of about 17 eggs on the soil surface around the stems of plants. The eggs take 16 days to hatch and newly emerged larvae move up the stem to feed on young leaves. Larvae feed for about 23 days and there are three instars. There is a prepupal non-feeding stage that lasts about 12 days and the pupal stage, which occurs in a cocoon in the soil, lasts 16 days. Teneral adults remain in the cocoon for 3 days to harden prior to emergence. Males live for about 151 days while females live for about 127 days. The pre-oviposition period is 19 days. In no-choice larval feeding trials, nine plant species, representing three families, supported development to adult. Three species, Aloysia triphylla, Citharexylum spinosum and Pandorea pandorana were able to support at least two successive generations. These results confirm those reported in South Africa and suggest that A. extrema is not sufficiently specific for release in Australia. Furthermore, it is not recommended for release in any other country which is considering biological control of lantana.
Resumo:
CTRU, a public key cryptosystem was proposed by Gaborit, Ohler and Sole. It is analogue of NTRU, the ring of integers replaced by the ring of polynomials $\mathbb{F}_2[T]$ . It attracted attention as the attacks based on either LLL algorithm or the Chinese Remainder Theorem are avoided on it, which is most common on NTRU. In this paper we presents a polynomial-time algorithm that breaks CTRU for all recommended parameter choices that were derived to make CTRU secure against popov normal form attack. The paper shows if we ascertain the constraints for perfect decryption then either plaintext or private key can be achieved by polynomial time linear algebra attack.
Resumo:
Let G = (V,E) be a simple, finite, undirected graph. For S ⊆ V, let $\delta(S,G) = \{ (u,v) \in E : u \in S \mbox { and } v \in V-S \}$ and $\phi(S,G) = \{ v \in V -S: \exists u \in S$ , such that (u,v) ∈ E} be the edge and vertex boundary of S, respectively. Given an integer i, 1 ≤ i ≤ ∣ V ∣, the edge and vertex isoperimetric value at i is defined as b e (i,G) = min S ⊆ V; |S| = i |δ(S,G)| and b v (i,G) = min S ⊆ V; |S| = i |φ(S,G)|, respectively. The edge (vertex) isoperimetric problem is to determine the value of b e (i, G) (b v (i, G)) for each i, 1 ≤ i ≤ |V|. If we have the further restriction that the set S should induce a connected subgraph of G, then the corresponding variation of the isoperimetric problem is known as the connected isoperimetric problem. The connected edge (vertex) isoperimetric values are defined in a corresponding way. It turns out that the connected edge isoperimetric and the connected vertex isoperimetric values are equal at each i, 1 ≤ i ≤ |V|, if G is a tree. Therefore we use the notation b c (i, T) to denote the connected edge (vertex) isoperimetric value of T at i. Hofstadter had introduced the interesting concept of meta-fibonacci sequences in his famous book “Gödel, Escher, Bach. An Eternal Golden Braid”. The sequence he introduced is known as the Hofstadter sequences and most of the problems he raised regarding this sequence is still open. Since then mathematicians studied many other closely related meta-fibonacci sequences such as Tanny sequences, Conway sequences, Conolly sequences etc. Let T 2 be an infinite complete binary tree. In this paper we related the connected isoperimetric problem on T 2 with the Tanny sequences which is defined by the recurrence relation a(i) = a(i − 1 − a(i − 1)) + a(i − 2 − a(i − 2)), a(0) = a(1) = a(2) = 1. In particular, we show that b c (i, T 2) = i + 2 − 2a(i), for each i ≥ 1. We also propose efficient polynomial time algorithms to find vertex isoperimetric values at i of bounded pathwidth and bounded treewidth graphs.
Resumo:
This study identified the molecular defects underlying three lethal fetal syndromes. Lethal Congenital Contracture Syndrome 1 (LCCS1, MIM 253310) and Lethal Arthrogryposis with Anterior Horn Cell Disease (LAAHD, MIM 611890) are fetal motor neuron diseases. They affect the nerve cells that control voluntary muscle movement, and eventually result in severe atrophy of spinal cord motor neurons and fetal immobility. Both LCCS1 and LAAHD are caused by mutations in the GLE1 gene, which encodes for a multifunctional protein involved in posttranscriptional mRNA processing. LCCS2 and LCCS3, two syndromes that are clinically similar to LCCS1, are caused by defective proteins involved in the synthesis of inositol hexakisphosphate (IP6), an essential cofactor of GLE1. This suggests a common mechanism behind these fetal motor neuron diseases, and along with accumulating evidence from genetic studies of more late-onset motor neuron diseases such as Spinal muscular atrophy (SMA) and Amyotrophic lateral sclerosis (ALS), implicates mRNA processing as a common mechanism in motor neuron disease pathogenesis. We also studied gle1-/- zebrafish in order to investigate whether they would be a good model for studying the pathogenesis of LCCS1 and LAAHD. Mutant zebrafish exhibit cell death in their central nervous system at two days post fertilization, and the distribution of mRNA within the cells of mutant zebrafish differs from controls, encouraging further studies. The third lethal fetal syndrome is described in this study for the first time. Cocoon syndrome (MIM 613630) was discovered in a Finnish family with two affected individuals. Its hallmarks are the encasement of the limbs under the skin, and severe craniofacial abnormalities, including the lack of skull bones. We showed that Cocoon syndrome is caused by a mutation in the gene encoding the conserved helix-loop-helix ubiquitous kinase CHUK, also known as IκB kinase α (IKKα). The mutation results in the complete lack of CHUK protein expression. CHUK is a subunit of the IκB kinase enzyme that inhibits NF-κB transcription factors, but in addition, it has an essential, independent role in controlling keratinocyte differentiation, as well as informing morphogenetic events such as limb and skeletal patterning. CHUK also acts as a tumor suppressor, and is frequently inactivated in cancer. This study has brought significant new information about the molecular background of these three lethal fetal syndromes, as well as provided knowledge about the prerequisites of normal human development.
Resumo:
The relationship between hosts and parasites is one of the most studied interactions between living organisms, and it is both universal and common in nature. Parasitoids are special type of parasites whose offspring develop attached to or within a single host organism that it ultimately consumes and kills. Hosts are arthropods and most parasitoids belong to the insect order Hymenoptera. For almost two decades metapopulation research on the Glanville fritillary butterfly (Melitaea cinxia) has been conducted in the Åland Islands, Finland. The studies have been concerned with the population dynamics, evolution, genetics, behavior, natural history and life history characteristics of M. cinxia, as well as with species interacting with the butterfly. The parasitoids of M. cinxia have been under long term studies and much has been learned about specific host-parasitoid interactions during the past decade. The research for this Master s thesis was done in the Åland Islands during summer 2010. I conducted a reciprocal transplant style experiment in order to compare the performance of host butterflies (M. cinxia) under attack by different parasitoid wasps (C. melitaearum). I used hosts and parasitoids from five origins around the Baltic Sea: Öland, Uppland, Åland, Saaremaa and Pikku-Tytärsaari. The host-parasitoid relationship was studied in terms of host susceptibility and parasitoid virulence, addressing specifically the possible effects of inbreeding and local adaptation of both parasitoids and their hosts. I compared various factors such as host defence ratio, parasitoid development rate, cocoon production rate etc. I also conducted a small scale C. melitaearum egg development experiment and C. melitaearum external morphology comparison between different parasitoid populations. The results show that host resistance and parasitoid virulence differ between both host and parasitoid populations. For example, Öland hosts were most susceptible to parasitoids and especially vulnerable to Pikku-Tytärsaari wasps. Pikku-Tytärsaari wasps were most successful in terms of parasitoids virulence and efficiency except in Saaremaa hosts, where the wasp did not succeed. Saaremaa hosts were resistant except towards Åland parasitoids. I did not find any simple pattern concerning host resistance and parasitoid virulence between inbred and outbred populations. Also, the effect of local adaptation was not detected, perhaps because metapopulation processes disturb local adaptation of the studied populations. Morphological comparisons showed differences between studied wasp populations and sexual dimorphism was obvious with females being bigger that males. There were also interesting differences among populations in male and female wing shapes. The results raise many further questions. Especially interesting were Pikku-Tytärsaari wasps that did well in terms of efficiency and virulence. Pikku-Tytärsaari is a small, isolated island in the Gulf of Finland and both the host and parasitoids are extremely inbred. For the host and parasitoid to persist in the island, the host has to have some mechanisms to escape the parasitoid. Further research will be done on the subject to discover the mechanisms of Pikku-Tytärsaari host s ability to escape parasitism. Also, genetic analyses will be conducted in the near future to determine the relatedness of used C. melitaearum populations.
Resumo:
We give an efficient randomized algorithm to construct a box representation of any graph G on n vertices in $1.5 (\Delta + 2) \ln n$ dimensions, where $\Delta$ is the maximum degree of G. We also show that $\boxi(G) \le (\Delta + 2) \ln n$ for any graph G. Our bound is tight up to a factor of $\ln n$. We also show that our randomized algorithm can be derandomized to get a polynomial time deterministic algorithm. Though our general upper bound is in terms of maximum degree $\Delta$, we show that for almost all graphs on n vertices, its boxicity is upper bound by $c\cdot(d_{av} + 1) \ln n$ where d_{av} is the average degree and c is a small constant. Also, we show that for any graph G, $\boxi(G) \le \sqrt{8 n d_{av} \ln n}$, which is tight up to a factor of $b \sqrt{\ln n}$ for a constant b.