WorldWideScience

Sample records for anaplasma phagocytophilum exploits

  1. Unidirectional Suppression of Anaplasma phagocytophilum Genotypes in Infected Lambs

    OpenAIRE

    Stuen, Snorre; Dahl, Hilde; Bergström, Karin; Moum, Truls

    2005-01-01

    Five-month-old lambs were simultaneously infected with different doses of two 16S rRNA genetic variants of Anaplasma phagocytophilum and thereafter followed for clinical observation and blood sampling. The result of the study indicates a unidirectional suppression of genotypes in infected lambs, at least during a certain period of an A. phagocytophilum infection.

  2. Lessons from Anaplasma phagocytophilum: Chromatin Remodeling by Bacterial Effectors

    OpenAIRE

    Rennoll-Bankert, Kristen E.; Dumler, J. Stephen

    2012-01-01

    Bacterial pathogens can alter global host gene expression via histone modifications and chromatin remodeling in order to subvert host responses, including those involved with innate immunity, allowing for bacterial survival. Shigella flexneri, Listeria monocytogenes, Chlamydia trachomatis, and Anaplasma phagocytophilum express effector proteins that modify host histones and chromatin structure. A. phagocytophilum modulates granulocyte respiratory burst in part by dampening transcription of se...

  3. The natural history of Anaplasma phagocytophilum.

    Science.gov (United States)

    Woldehiwet, Zerai

    2010-02-10

    Anaplasma phagocytophilum is the recently designated name replacing three species of granulocytic bacteria, Ehrlichia phagocytophila, Ehrlichia equi and the agent of human granulocytic ehrlichiosis, after the recent reorganization of the families Rickettsiaceae and Anaplasmataceae in the order Rickettsiales. Tick-borne fever (TBF), which is caused by the prototype of A. phagocytophilum, was first described in 1932 in Scotland. A similar disease caused by a related granulocytic agent was first described in horses in the USA in 1969; this was followed by the description of two distinct granulocytic agents causing similar diseases in dogs in the USA in 1971 and 1982. Until the discovery of human granulocytic anaplasmosis (HGA) in the USA in 1994, these organisms were thought to be distinct species of bacteria infecting specific domestic animals and free-living reservoirs. It is now widely accepted that the agents affecting different animal hosts are variants of the same Gram-negative obligatory intracellular bacterium, which is transmitted by hard ticks belonging to the Ixodes persulcatus complex. One of its fascinating features is that it infects and actively grows in neutrophils by employing an array of mechanisms to subvert their bactericidal activity. It is also able to survive within an apparently immune host by employing a complex mechanism of antigenic variation. Ruminants with TBF and humans with HGA develop severe febrile reaction, bacteraemia and leukopenia due to neutropenia, lymphocytopenia and thrombocytopenia within a week of exposure to a tick bite. Because of the severe haematological disorders lasting for several days and other adverse effects on the host's immune functions, infected animals and humans are more susceptible to other infections. PMID:19811878

  4. Natural Anaplasma phagocytophilum infection in ticks from a forest area of Selenge province, Mongolia

    OpenAIRE

    G Javkhlan; B Enkhtaivan; B Baigal; Myagmarsuren, P.; Battur, B.; Battsetseg, B

    2014-01-01

    Anaplasma phagocytophilum is a zoonotic agent of public health importance, infecting both humans and animals. An investigation of the presence of Anaplasma phagocytophilum as well as Anaplasma platys was conducted in a forest area of Selenge province, Mongolia, where ticks are widely distributed and tick-borne diseases are highly endemic. Ticks were collected and tested using polymerase chain reaction based on groEL methodology. Anaplasma phagocytophilum was detected in 14 (6%) of Ixodes pers...

  5. Anaplasma phagocytophilum in ruminants in Europe.

    Science.gov (United States)

    Woldehiwet, Zerai

    2006-10-01

    The agent that causes tick-borne fever (TBF) in sheep was first described in 1940, 8 years after the disease was first recognized in Scotland. The same agent was soon shown to cause TBF in sheep and pasture fever in cattle in other parts of the UK, Scandinavia, and other parts of Europe. After the initial use of the name Rickettsia phagocytophila, the organism was given the name Cytoecetes phagocytophila to reflect its association with granulocytes and its morphological similarity with Cytoecetes microti. This name continued to be used by workers in the UK until the recent reclassification of the granulocytic ehrlichiae affecting ruminants, horses, and humans as variants of the same species, Anaplasma phagocytophilum. TBF and pasture fever are characterized by high fever, recurrent bacteremia, neutropenia, lymphocytopenia, thrombocytopenia, and general immunosuppression, resulting in more severe secondary infections such as tick pyemia, pneumonic pasteurellosis, listeriosis, and enterotoxemia. During the peak period of bacteremia as many as 90% of granulocytes may be infected. The agent is transmitted transtadially by the hard tick Ixodes ricinus, and possibly other ticks. After patent bacteremia, sheep, goats, and cattle become persistently infected "carriers," perhaps playing an important role in the maintenance of infection, in the flock/herd. Little is known about how efficiently ticks acquire and maintain infection in ruminant populations or whether "carrier" domestic ruminants play an important role as reservoirs of infection, but deer, other free-living ruminants, and wild rodents are also potential sources of infection. During the late 1990s serological evidence of infection of humans was demonstrated in several European countries, creating a renewed interest and increased awareness of the zoonotic potential of TBF variants. More recently, a few cases of human granulocytic anaplasmosis (HGA) have been reported in some European countries, but it remains to

  6. Prevalence of Anaplasma phagocytophilum infection and effect on lamb growth

    Directory of Open Access Journals (Sweden)

    Steinshamn Håvard

    2011-05-01

    Full Text Available Abstract Background A major challenge in sheep farming during the grazing season along the coast of south-western Norway is tick-borne fever (TBF caused by the bacteria Anaplasma phagocytophilum that is transmitted by the tick Ixodes ricinus. Methods A study was carried out in 2007 and 2008 to examine the prevalence of A. phagocytophilum infection and effect on weaning weight in lambs. The study included 1208 lambs from farms in Sunndal Ram Circle in Møre and Romsdal County in Mid-Norway, where ticks are frequently observed. All lambs were blood sampled and serum was analyzed by an indirect fluorescent antibody assay (IFA to determine an antibody status (positive or negative to A. phagocytophilum infection. Weight and weight gain and possible effect of infection were analyzed using ANOVA and the MIXED procedure in SAS. Results The overall prevalence of infection with A. phagocytophilum was 55%. A lower weaning weight of 3% (1.34 kg, p A. phagocytophilum infection compared to seronegative lambs at an average age of 137 days. Conclusions The results show that A. phagocytophilum infection has an effect on lamb weight gain. The study also support previous findings that A. phagocytophilum infection is widespread in areas where ticks are prevalent, even in flocks treated prophylactic with acaricides.

  7. Natural Anaplasma phagocytophilum infection in ticks from a forest area of Selenge province, Mongolia

    Directory of Open Access Journals (Sweden)

    G Javkhlan

    2014-03-01

    Full Text Available Anaplasma phagocytophilum is a zoonotic agent of public health importance, infecting both humans and animals. An investigation of the presence of Anaplasma phagocytophilum as well as Anaplasma platys was conducted in a forest area of Selenge province, Mongolia, where ticks are widely distributed and tick-borne diseases are highly endemic. Ticks were collected and tested using polymerase chain reaction based on groEL methodology. Anaplasma phagocytophilum was detected in 14 (6% of Ixodes persulcatus ticks and four (1% Dermacentor nuttalli ticks; infection of Anaplasma platys was detected in 1% of Ixodes persulcatus ticks and 10% of Dermacentor nuttalli ticks. The phylogenetic tree showed that the Anaplasma phagocytophilum clustered with the Russian group, most likely due to similar geographical locations. This finding is significant for both veterinary and public health officials given that these agents can cause both animal and human illness.

  8. Anaplasma phagocytophilum in Danish sheep: confirmation by DNA sequencing

    Directory of Open Access Journals (Sweden)

    Thamsborg Stig M

    2009-12-01

    Full Text Available Abstract Background The presence of Anaplasma phagocytophilum, an Ixodes ricinus transmitted bacterium, was investigated in two flocks of Danish grazing lambs. Direct PCR detection was performed on DNA extracted from blood and serum with subsequent confirmation by DNA sequencing. Methods 31 samples obtained from clinically normal lambs in 2000 from Fussingø, Jutland and 12 samples from ten lambs and two ewes from a clinical outbreak at Feddet, Zealand in 2006 were included in the study. Some of the animals from Feddet had shown clinical signs of polyarthritis and general unthriftiness prior to sampling. DNA extraction was optimized from blood and serum and detection achieved by a 16S rRNA targeted PCR with verification of the product by DNA sequencing. Results Five DNA extracts were found positive by PCR, including two samples from 2000 and three from 2006. For both series of samples the product was verified as A. phagocytophilum by DNA sequencing. Conclusions A. phagocytophilum was detected by molecular methods for the first time in Danish grazing lambs during the two seasons investigated (2000 and 2006.

  9. Molecular characterization reveals distinct genospecies of Anaplasma phagocytophilum from diverse North American hosts

    OpenAIRE

    Rejmanek, Daniel; Bradburd, Gideon; Foley, Janet

    2012-01-01

    Anaplasma phagocytophilum is an emerging tick-borne pathogen that infects humans, domestic animals and wildlife throughout the Holarctic. In the far-western United States, multiple rodent species have been implicated as natural reservoirs for A. phagocytophilum. However, the presence of multiple A. phagocytophilum strains has made it difficult to determine which reservoir hosts pose the greatest risk to humans and domestic animals. Here we characterized three genetic markers (23S–5S rRNA inte...

  10. The pathogen-occupied vacuoles of Anaplasma phagocytophilum and Anaplasma marginale interact with the endoplasmic reticulum

    Directory of Open Access Journals (Sweden)

    Hilary Kay Truchan

    2016-03-01

    Full Text Available The genus Anaplasma consists of tick-transmitted obligate intracellular bacteria that invade white or red blood cells to cause debilitating and potentially fatal infections. A. phagocytophilum, a human and veterinary pathogen, infects neutrophils to cause granulocytic anaplasmosis. A. marginale invades bovine erythrocytes. Evidence suggests that both species may also infect endothelial cells in vivo. In mammalian and arthropod host cells, A. phagocytophilum and A. marginale reside in host cell derived pathogen-occupied vacuoles (POVs. While it was recently demonstrated that the A. phagocytophilum-occupied vacuole (ApV intercepts membrane traffic from the trans-Golgi network, it is unclear if it or the A. marginale-occupied vacuole (AmV interacts with other secretory organelles. Here, we demonstrate that the ApV and AmV extensively interact with the host endoplasmic reticulum (ER in endothelial, myeloid, and/or tick cells. ER lumen markers, calreticulin and protein disulfide isomerase, and the ER membrane marker, derlin-1, were pronouncedly recruited to the peripheries of both POVs. ApV association with the ER initiated early and continued throughout the infection cycle. Both the ApV and AmV interacted with the rough ER and smooth ER. However, only derlin-1-positive rough ER derived vesicles were delivered into the ApV lumen where they localized with intravacuolar bacteria. Transmission electron microscopy identified multiple ER-POV membrane contact sites on the cytosolic faces of both species’ vacuoles that corresponded to areas on the vacuoles’ lumenal faces where intravacuolar Anaplasma organisms closely associated. A. phagocytophilum is known to hijack Rab10, a GTPase that regulates ER dynamics and morphology. Yet, ApV-ER interactions were unhindered in cells in which Rab10 had been knocked down, demonstrating that the GTPase is dispensable for the bacterium to parasitize the ER. These data establish the ApV and AmV as pathogen

  11. SERUM ANTIBODIES TO BORRELIA BURGDORFERI, ANAPLASMA PHAGOCYTOPHILUM, AND BABESIA MICROTI IN RECAPTURED WHITE-FOOTED MICE

    OpenAIRE

    Magnarelli, Louis A.; Williams, Scott C.; Norris, Steven J; Fikrig, Erol

    2013-01-01

    A mark-release-recapture study was conducted during 2007 through 2010 in six, tick-infested sites in Connecticut, United States to measure changes in antibody titers for Borrelia burgdorferi sensu stricto, Anaplasma phagocytophilum, and Babesia microti in Peromyscus leucopus (white-footed mice). There was an overall recapture rate of 40%, but only four tagged mice were caught in ≥2 yr. Sera from 561 mice were analyzed for total antibodies to B. burgdorferi and A. phagocytophilum by using whol...

  12. Nidicolous ticks of small mammals in Anaplasma phagocytophilum-enzootic sites in northern California

    OpenAIRE

    Foley, Janet; Rejmanek, Daniel; Fleer, Katryna; Nieto, Nathan

    2011-01-01

    Ixodes spp. tick-borne zoonotic diseases are present across the Holarctic in humans, domestic animals, and wildlife. Small mammals are reservoirs for the rickettsial pathogen Anaplasma phagocytophilum and tick vectors may include catholic-feeding bridge vectors as well as host-specialist or nidicolous ticks. Far western North American communities in which A. phagocytophilum is maintained are complex ecologically, with multiple reservoir host and tick species, multiple strains of the bacterial...

  13. Ixodes scapularis saliva mitigates inflammatory cytokine secretion during Anaplasma phagocytophilum stimulation of immune cells

    Czech Academy of Sciences Publication Activity Database

    Chen, G.; Severo, M. S.; Sohail, M.; Sakhon, O. S.; Wikel, S. K.; Kotsyfakis, Michalis; Pedra, J. H. F.

    2012-01-01

    Roč. 5, č. 1 (2012), s. 229. ISSN 1756-3305 Institutional support: RVO:60077344 Keywords : Tick * Ixodes scapularis * Saliva * Anaplasma phagocytophilum * Rickettsial agent Subject RIV: EC - Immunology Impact factor: 3.246, year: 2012 http://www.parasitesandvectors.com/content/5/1/229

  14. Detection and identification of Anaplasma phagocytophilum, Borrelia burgdorferi, and Rickettsia helvetica in Danish Ixodes ricinus ticks

    DEFF Research Database (Denmark)

    Skarphédinsson, Sigurdur; Lyholm, Birgitte Fjendbo; Ljungberg, Marianne;

    2007-01-01

    % of adult ticks. The difference in prevalence between Anaplasma and Borrelia in adult ticks supports the idea that their maintenance cycles in nature may be different. Ticks were also infected with Rickettsia helvetica. Our study indicates that A. phagocytophilum prevalence in ticks in Denmark is as...

  15. Seroprevalence of Borrelia burgdorferi, Anaplasma phagocytophilum, Ehrlichia canis, and Dirofilaria immitis among dogs in Canada

    OpenAIRE

    Villeneuve, Alain; Goring, Jonas; Marcotte, Lynne; Overvelde, Sébastien

    2011-01-01

    The seropositivity of dogs to Borrelia burgdorferi, Anaplasma phagocytophilum, and Ehrlichia canis antibodies, and Dirofilaria immitis antigen was assessed in Canada. Borrelia burgdorferi had the highest seroprevalence, while that of Dirofilaria immitis has not changed significantly in the past 20 y. The risk for these vector-borne infectious agents in Canadian dogs is low but widespread with foci of higher prevalence.

  16. Anaplasma phagocytophilum Infection in Small Mammal Hosts of Ixodes Ticks, Western United States

    OpenAIRE

    Janet E. Foley; Nieto, Nathan C.; Adjemian, Jennifer; Dabritz, Haydee; Brown, Richard N.

    2008-01-01

    A total of 2,121 small mammals in California were assessed for Anaplasma phagocytophilum from 2006 through 2008. Odds ratios were >1 for 4 sciurids species and dusky-footed woodrats. High seroprevalence was observed in northern sites. Ten tick species were identified. Heavily infested rodent species included meadow voles, woodrats, deer mice, and redwood chipmunks.

  17. Seroprevalence of Anaplasma phagocytophilum among healthy dogs and horses in Israel.

    Science.gov (United States)

    Levi, O; Waner, T; Baneth, G; Keysary, A; Bruchim, Y; Silverman, J; Harrus, S

    2006-03-01

    The presence of reacting antibodies to Anaplasma phagocytophilum has previously been demonstrated in Israel, both in humans and the golden jackal (Canis aureus syriacus). This study was undertaken to determine the seroprevalence of A. phagocytophilum antibodies in two additional potential hosts, domestic dogs and horses in order to investigate the possibility of exposure to the organism in Israel. Of 195 dogs tested, 9% were seroreactive with A. phagocytophilum antigen and 30% were seroreactive to Ehrlichia canis. Twenty-nine percent of the dogs seropositive for E. canis were also reactive to A. phagocytophilum. Two dogs had immunofluorescence antibody (IFA) antibody titres for A. phagocytophilum greater than E. canis. The equine serological survey (n = 300) revealed no seroreactive horses. The results presented in this study suggest that dogs in Israel could have been accidentally exposed to A. phagocytophilum, for example by ticks carried on migrating birds, however, the possibility of cross-reaction with E. canis should also be considered. In spite of the high prevalence of ticks on horses in Israel during the summer months, no evidence for exposure to A. phagocytophilum was apparent. PMID:16626404

  18. Superinfection occurs in Anaplasma phagocytophilum infected sheep irrespective of infection phase and protection status

    Directory of Open Access Journals (Sweden)

    Bergström Karin

    2009-10-01

    Full Text Available Abstract Background Anaplasma phagocytophilum infection in domestic ruminants is widespread in the coastal areas of southern Norway. The bacteria may persist in mammalian hosts. Several genetic variants of A. phagocytophilum exist. In the present study, we investigate whether superinfection occurs in the acute and persistent phase of the infection. Methods Five-month-old lambs of the Norwegian Dala breed were experimentally infected with two 16S rRNA gene variants of A. phagocytophilum, i.e. A. phagocytophilum variant 1 (GenBank accession number M73220 and variant 2 (GenBank acc. no. AF336220. Eighteen lambs were used, two lambs in each group. Eight groups were experimentally inoculated with either variant 1 or 2 on day 0. Six of these groups were then challenged with the other variant on either days 7, 42 or 84, respectively. One group was left uninfected. The occurrence of A. phagocytophilum in blood samples was determined using semi-nested PCR analysis and gene sequencing. Specific antibodies were measured by an indirect immunofluorescence antibody assay (IFA. Results A. phagocytophilum variant 1 and 2 differed significantly with regards to clinical reaction and cross-immunity in infected lambs. Both variants were found in the blood after challenge. However, variant 1 was detected most frequently. Conclusion The present experiment indicates that superinfection of different genotypes occurs during the acute as well as the persistent phase of an A. phagocytophilum infection, even in lambs protected against the challenged infection.

  19. Co-infections with Borrelia species, Anaplasma phagocytophilum and Babesia spp. in patients with tick-borne encephalitis

    OpenAIRE

    Moniuszko, A.; Dunaj, J.; Święcicka, I.; Zambrowski, G.; Chmielewska-Badora, J.; Żukiewicz-Sobczak, W.; Zajkowska, J.; Czupryna, P.; Kondrusik, M.; Grygorczuk, S.; Swierzbinska, R.; Pancewicz, S.

    2014-01-01

    The purpose of this study was evaluation of the prevalence of co-infection with Borrelia species, A. phagocytophilum and Babesia spp. in patients with tick-borne encephalitis (TBE). At total of 110 patients with TBE were included in the study. Serological tests for tick-borne encephalitis virus (TBEV), PCR for Borrelia species, Anaplasma phagocytophilum and Babesia spp., blood smears for A. phagocytophilum and Babesia spp. and BLAST analysis for Babesia spp. were performed. Results showed a s...

  20. Understanding the human ehrlichiosisis and standing out a causal agent: anaplasma phagocytophilum

    OpenAIRE

    Hernández-Ayazo Helí; Marien-Clarete Said

    2013-01-01

    Introduction: Anaplasma phagocytophilum is an obligatory intracytoplasmatic bacteriathat belong to Rickettsiales order and that has been recognized as a cause of humandisease. Most of symptomatic patients report exposure to ticks (vector) one or twoweeks before the beginning of the disease. They present a febrile disease, however theclinical status extends since asymptomatic infection until fatal disease.Clinical case: Male patient with prolonged fever and with negative proofs in the searchof...

  1. Reservoir Competence of the Redwood Chipmunk (Tamias Ochrogenys) for Anaplasma Phagocytophilum

    OpenAIRE

    Nieto, Nathan C.; Janet E. Foley

    2009-01-01

    Granulocytic anaplasmosis (GA) is an emerging tick-transmitted disease that persists in rodent- Ixodes ricinus-complex tick cycles across the Holarctic. Although the putative reservoir for anaplasmosis in the western United States is the dusky-footed woodrat (Neotoma fuscipes), this rodent was not shown reservoir-competent because of failure of infection from woodrats to other animals via ticks. Redwood chipmunks are common in habitats where Anaplasma phagocytophilum is common, have high PCR-...

  2. Global proteomic analysis of two tick-borne emerging zoonotic agents: Anaplasma phagocytophilum and Ehrlichia chaffeensis

    Energy Technology Data Exchange (ETDEWEB)

    Lin, Mingqun ..; Kikuchi, Takane; Brewer, Heather M.; Norbeck, Angela D.; Rikihisa, Yasuko

    2011-02-17

    Anaplasma phagocytophilum and Ehrlichia chaffeensis are obligatory intracellular {alpha}-proteobacteria that infect human leukocytes and cause potentially fatal emerging zoonoses. In the present study, we determined global protein expression profiles of these bacteria cultured in the human promyelocytic leukemia cell line, HL-60. Mass spectrometric (MS) analyses identified a total of 1,212 A. phagocytophilum and 1,021 E. chaffeensis proteins, representing 89.3 and 92.3% of the predicted bacterial proteomes, respectively. Nearly all bacterial proteins ({approx}99%) with known functions were expressed, whereas only approximately 80% of hypothetical proteins were detected in infected human cells. Quantitative MS/MS analyses indicated that highly expressed proteins in both bacteria included chaperones, enzymes involved in biosynthesis and metabolism, and outer membrane proteins, such as A. phagocytophilum P44 and E. chaffeensis P28/OMP-1. Among 113 A. phagocytophilum p44 paralogous genes, 110 of them were expressed and 88 of them were encoded by pseudogenes. In addition, bacterial infection of HL-60 cells up-regulated the expression of human proteins involved mostly in cytoskeleton components, vesicular trafficking, cell signaling, and energy metabolism, but down regulated some pattern recognition receptors involved in innate immunity. Our proteomics data represent a comprehensive analysis of A. phagocytophilum and E. chaffeensis proteomes, and provide a quantitative view of human host protein expression profiles regulated by bacterial infection. The availability of these proteomic data will provide new insights into biology and pathogenesis of these obligatory intracellular pathogens.

  3. Analysis of the population structure of Anaplasma phagocytophilum using multilocus sequence typing.

    Science.gov (United States)

    Huhn, Christian; Winter, Christina; Wolfsperger, Timo; Wüppenhorst, Nicole; Strašek Smrdel, Katja; Skuballa, Jasmin; Pfäffle, Miriam; Petney, Trevor; Silaghi, Cornelia; Dyachenko, Viktor; Pantchev, Nikola; Straubinger, Reinhard K; Schaarschmidt-Kiener, Daniel; Ganter, Martin; Aardema, Matthew L; von Loewenich, Friederike D

    2014-01-01

    Anaplasma phagocytophilum is a Gram-negative obligate intracellular bacterium that replicates in neutrophils. It is transmitted via tick-bite and causes febrile disease in humans and animals. Human granulocytic anaplasmosis is regarded as an emerging infectious disease in North America, Europe and Asia. However, although increasingly detected, it is still rare in Europe. Clinically apparent A. phagocytophilum infections in animals are mainly found in horses, dogs, cats, sheep and cattle. Evidence from cross-infection experiments that A. phagocytophilum isolates of distinct host origin are not uniformly infectious for heterologous hosts has led to several approaches of molecular strain characterization. Unfortunately, the results of these studies are not always easily comparable, because different gene regions and fragment lengths were investigated. Multilocus sequence typing is a widely accepted method for molecular characterization of bacteria. We here provide for the first time a universal typing method that is easily transferable between different laboratories. We validated our approach on an unprecedented large data set of almost 400 A. phagocytophilum strains from humans and animals mostly from Europe. The typability was 74% (284/383). One major clonal complex containing 177 strains was detected. However, 54% (49/90) of the sequence types were not part of a clonal complex indicating that the population structure of A. phagocytophilum is probably semiclonal. All strains from humans, dogs and horses from Europe belonged to the same clonal complex. As canine and equine granulocytic anaplasmosis occurs frequently in Europe, human granulocytic anaplasmosis is likely to be underdiagnosed in Europe. Further, wild boars and hedgehogs may serve as reservoir hosts of the disease in humans and domestic animals in Europe, because their strains belonged to the same clonal complex. In contrast, as they were only distantly related, roe deer, voles and shrews are unlikely to

  4. First report of Anaplasma phagocytophilum and Babesia microti in rodents in Finland.

    Science.gov (United States)

    Kallio, Eva R; Begon, Michael; Birtles, Richard J; Bown, Kevin J; Koskela, Esa; Mappes, Tapio; Watts, Phillip C

    2014-06-01

    Tick-borne diseases pose an increasingly important public health problem in Europe. Rodents are the reservoir host for many tick-transmitted pathogens, including Anaplasma phagocytophilum and Babesia microti, which can cause human granulocytic anaplasmosis and babesiosis, respectively. To estimate the presence of these pathogens in rodents in Finland, we examined blood samples from 151 bank voles (Myodes glareolus) and demonstrate, for the first time, that A. phagocytophilum and B. microti commonly infect bank voles (in 22% and 40% of animals, respectively) in Finland. Sequence analysis of a fragment of 18S rRNA showed that the B. microti strain isolated was identical to the Munich strain, which is considered to be nonzoonotic. The A. phagocytophilum strain (based on a fragment of the msp4 gene) was identical to one found earlier in rodents in the United Kingdom that is transmitted by the tick Ixodes trianguliceps, all the life stages of which feed on small mammals. The infection probability of B. microti in the bank voles was the greater the older the individual was, and males were more often infected than females. A. phagocytophilum infection probability first increased and then decreased with the age of individual without any difference between sexes. While these pathogens presumably pose a limited zoonotic risk to humans in Finland, they might have important interactions with other rodent pathogens and therefore affect infection dynamics of, for example, zoonotic pathogens. PMID:24848684

  5. Prevalence of Human-Active and Variant 1 Strains of the Tick-Borne Pathogen Anaplasma phagocytophilum in Hosts and Forests of Eastern North America

    OpenAIRE

    Keesing, Felicia; McHenry, Diana J.; Hersh, Michelle; Tibbetts, Michael; Jesse L Brunner; Killilea, Mary; LoGiudice, Kathleen; Kenneth A Schmidt; Ostfeld, Richard S.

    2014-01-01

    Anaplasmosis is an emerging infectious disease caused by infection with the bacterium Anaplasma phagocytophilum. In the eastern United States, A. phagocytophilum is transmitted to hosts through the bite of the blacklegged tick, Ixodes scapularis. We determined the realized reservoir competence of 14 species of common vertebrate hosts for ticks by establishing the probability that each species transmits two important strains of A. phagocytophilum (A. phagocytophilum human-active, which causes ...

  6. First molecular detection and phylogenetic analysis of Anaplasma phagocytophilum in shelter dogs in Seoul, Korea.

    Science.gov (United States)

    Lee, Sukyee; Lee, Seung-Hun; VanBik, Dorene; Kim, Neung-Hee; Kim, Kyoo-Tae; Goo, Youn-Kyoung; Rhee, Man Hee; Kwon, Oh-Deog; Kwak, Dongmi

    2016-07-01

    In this study, the status of Anaplasma phagocytophilum infection was assessed in shelter dogs in Seoul, Korea, with PCR and phylogenetic analyses. Nested PCR on 1058 collected blood samples revealed only one A. phagocytophilum positive sample (female, age genetic variability of A. phagocytophilum was evaluated by genotyping, using the 16S rRNA, groEL, and msp2 gene sequences of the positive sample. BLASTn analysis revealed that the 16S rRNA, groEL, and msp2 genes had 99.6%, 99.9%, and 100% identity with the following sequences deposited in GenBank: a cat 16S rRNA sequence from Korea (KR021166), a rat groEL sequence from Korea (KT220194), and a water deer msp2 sequence from Korea (HM752099), respectively. Phylogenetic analyses classified the groEL gene into two distinct groups (serine and alanine), whereas the msp2 gene showed a general classification into two groups (USA and Europe) that were further subgrouped according to region. To the best of our knowledge, this study is the first to describe the molecular diagnosis of A. phagocytophilum in dogs reared in Korea. In addition, the high genetic identity of the 16S rRNA and groEL sequences between humans and dogs from the same region suggests a possible epidemiological relation. Given the conditions of climate change, tick ecology, and recent incidence of human granulocytic anaplasmosis in Korea, the findings of this study underscore the need to establish appropriate control programs for tick-borne diseases in Korea. PMID:27130537

  7. Wild boar (Sus scrofa) - reservoir host of Toxoplasma gondii, Neospora caninum and Anaplasma phagocytophilum in Slovakia.

    Science.gov (United States)

    Reiterová, Katarína; Špilovská, Silvia; Blaňarová, Lucia; Derdáková, Markéta; Čobádiová, Andrea; Hisira, Vladimír

    2016-06-01

    In Central Europe the wild boar population is permanently growing and consequently Cf foodborne infections. In this study serological and molecular detection of Toxoplasma gondii and Neospora caninum in wild boars was evaluated. Moreover, same samples were screened for the presence and genetic variability of tick-borne bacterium Anaplasma phagocytophilum. Blood samples collected from 113 wild boars from Southern Slovakia were examined for antibodies to T. gondii by indirect and to N. caninum by competitive ELISA. The presence of parasitic DNA in blood samples was determined by standard or real time PCR techniques. Antibodies against T. gondii and N. caninum were detected in 45 (39.8%) and 38 (33.6%) animals, respectively. Females were more frequently infected for both pathogens than males. The high seropositivity against both coccidia indicates a permanent occurrence of these pathogens in the studied locality. T. gondii DNA was confirmed in five seropositive boars (4.4%) and N. caninum in 23 blood samples (20.4%). Three out of 23 N. caninum PCR positive animals did not show seropositivity. Three out of 113 blood samples of wild boars were positive for A. phagocytophilum (2.7%). The obtained A. phagocytophilum sequences were 100% identical with GenBankTM isolates from Slovak dog (KC985242); German horse (JF893938) or wild boar (EF143810) and red deer (EF143808) from Poland. Coinfections of T. gondii with N. caninum and N. caninum with A. phagocytophilum were detected in single cases. Results suggest a potential zoonotic risk of toxoplasmosis transmission to humans and the spread of neosporosis to farm animals. PMID:27078648

  8. Understanding the human ehrlichiosisis and standing out a causal agent: anaplasma phagocytophilum

    Directory of Open Access Journals (Sweden)

    Hernández-Ayazo Helí

    2013-06-01

    Full Text Available Introduction: Anaplasma phagocytophilum is an obligatory intracytoplasmatic bacteriathat belong to Rickettsiales order and that has been recognized as a cause of humandisease. Most of symptomatic patients report exposure to ticks (vector one or twoweeks before the beginning of the disease. They present a febrile disease, however theclinical status extends since asymptomatic infection until fatal disease.Clinical case: Male patient with prolonged fever and with negative proofs in the searchof hepatitis, malaria, dengue, leptospirosis and typhoid disease. In the peripheralblood smear with Wright’s stain, there were found granulocytes with intracytoplasmatic vacuoles called morulae (microcolonies of Anaplasma phagocytophilum. Diagnosticimpression was Human Granulocytic Anaplasmosis (HGA. Treatment with tetracyclinewas done and good evolution was reported.Conclusion: HGA should be a disease to have present in patients with prolonged febrileprofile. A detailed clinical history with information about exposure to ticks should begotten. It is important an early diagnosis to establish the differences with other similarinfections and to apply promptly indicated antibiotic therapy. Rev.cienc.biomed.2013;4(1:165-169RESUMEN:Introducción: Anaplasma phagocytophilum es una bacteria intracitoplasmática obligadaque pertenece al orden Rickettsiales, reconocido como causante de enfermedaden humanos. Pacientes sintomáticos reportan exposición a las garrapatas (vector unao dos semanas antes del inicio de la enfermedad. Presentan una enfermedad febril, noobstante el rango clínico se extiende desde infección asintomática hasta enfermedadfatal.Caso clínico: paciente masculino con cuadro febril prolongado. Pruebas negativas enla búsqueda de hepatitis, paludismo, dengue, leptospirosis y enfermedad tifoidea. Enel extendido de sangre periférica, con tinción de Wright se encontraron granulocitoscon vacuolas intracitoplasmáticas llamadas mórulas (microcolonias

  9. The first report of Anaplasma phagocytophilum and a novel Theileria spp. co-infection in a South African giraffe.

    Science.gov (United States)

    Zhang, Yan; Li, Tongyi; Cui, Yanyan; Wang, Jinhong; Lv, Yali; Wang, Rongjun; Jian, Fuchun; Zhang, Longxian; Wang, Jiantang; Yang, Guangcheng; Ning, Changshen

    2016-08-01

    Organisms of the genera Anaplasma and Theileria are important intracellular bacteria and parasites that cause various tick-borne diseases, threatening the health of numerous animals as well as human beings. In the present study, a 12-month-old male wild South African giraffe (Giraffa camelopardalis giraffa) originating from South Africa, and living in Zhengzhou Zoo (located in the urban district of Zhengzhou in the provincial capital of Henan), suddenly developed an unknown fatal disease and died 1day after the onset of the clinical signs. By microscopic examination of Giemsa-stained blood smears combined with nested PCR and DNA sequence analysis, Anaplasma phagocytophilum, Anaplasma bovis and a novel Theileria spp. were found in the blood of this giraffe. The six other Cervidae animals in the zoo and three ruminants living in the same colony house with them were found to be negative for both Anaplasma and Theileria in their blood specimens. We report on the first case of an A. phagocytophilum infection and the occurrence of a novel Theileria spp. in the blood of a giraffe. This is the first reported case of a multi-infection of A. bovis, A. phagocytophilum and Theileria spp. in a giraffe, as revealed by microscopic examination of blood smears and the results of nested PCR and DNA sequencing. PMID:27109775

  10. The Prostaglandin E2-EP3 Receptor Axis Regulates Anaplasma phagocytophilum-Mediated NLRC4 Inflammasome Activation.

    Science.gov (United States)

    Wang, Xiaowei; Shaw, Dana K; Hammond, Holly L; Sutterwala, Fayyaz S; Rayamajhi, Manira; Shirey, Kari Ann; Perkins, Darren J; Bonventre, Joseph V; Velayutham, Thangam S; Evans, Sean M; Rodino, Kyle G; VieBrock, Lauren; Scanlon, Karen M; Carbonetti, Nicholas H; Carlyon, Jason A; Miao, Edward A; McBride, Jere W; Kotsyfakis, Michail; Pedra, Joao H F

    2016-08-01

    Rickettsial agents are sensed by pattern recognition receptors but lack pathogen-associated molecular patterns commonly observed in facultative intracellular bacteria. Due to these molecular features, the order Rickettsiales can be used to uncover broader principles of bacterial immunity. Here, we used the bacterium Anaplasma phagocytophilum, the agent of human granulocytic anaplasmosis, to reveal a novel microbial surveillance system. Mechanistically, we discovered that upon A. phagocytophilum infection, cytosolic phospholipase A2 cleaves arachidonic acid from phospholipids, which is converted to the eicosanoid prostaglandin E2 (PGE2) via cyclooxygenase 2 (COX2) and the membrane associated prostaglandin E synthase-1 (mPGES-1). PGE2-EP3 receptor signaling leads to activation of the NLRC4 inflammasome and secretion of interleukin (IL)-1β and IL-18. Importantly, the receptor-interacting serine/threonine-protein kinase 2 (RIPK2) was identified as a major regulator of the immune response against A. phagocytophilum. Accordingly, mice lacking COX2 were more susceptible to A. phagocytophilum, had a defect in IL-18 secretion and exhibited splenomegaly and damage to the splenic architecture. Remarkably, Salmonella-induced NLRC4 inflammasome activation was not affected by either chemical inhibition or genetic ablation of genes associated with PGE2 biosynthesis and signaling. This divergence in immune circuitry was due to reduced levels of the PGE2-EP3 receptor during Salmonella infection when compared to A. phagocytophilum. Collectively, we reveal the existence of a functionally distinct NLRC4 inflammasome illustrated by the rickettsial agent A. phagocytophilum. PMID:27482714

  11. The Prostaglandin E2-EP3 Receptor Axis Regulates Anaplasma phagocytophilum-Mediated NLRC4 Inflammasome Activation

    Science.gov (United States)

    Wang, Xiaowei; Shaw, Dana K.; Hammond, Holly L.; Sutterwala, Fayyaz S.; Rayamajhi, Manira; Shirey, Kari Ann; Perkins, Darren J.; Bonventre, Joseph V.; Velayutham, Thangam S.; Evans, Sean M.; Rodino, Kyle G.; VieBrock, Lauren; Scanlon, Karen M.; Carbonetti, Nicholas H.; Carlyon, Jason A.; Miao, Edward A.; McBride, Jere W.; Kotsyfakis, Michail

    2016-01-01

    Rickettsial agents are sensed by pattern recognition receptors but lack pathogen-associated molecular patterns commonly observed in facultative intracellular bacteria. Due to these molecular features, the order Rickettsiales can be used to uncover broader principles of bacterial immunity. Here, we used the bacterium Anaplasma phagocytophilum, the agent of human granulocytic anaplasmosis, to reveal a novel microbial surveillance system. Mechanistically, we discovered that upon A. phagocytophilum infection, cytosolic phospholipase A2 cleaves arachidonic acid from phospholipids, which is converted to the eicosanoid prostaglandin E2 (PGE2) via cyclooxygenase 2 (COX2) and the membrane associated prostaglandin E synthase-1 (mPGES-1). PGE2-EP3 receptor signaling leads to activation of the NLRC4 inflammasome and secretion of interleukin (IL)-1β and IL-18. Importantly, the receptor-interacting serine/threonine-protein kinase 2 (RIPK2) was identified as a major regulator of the immune response against A. phagocytophilum. Accordingly, mice lacking COX2 were more susceptible to A. phagocytophilum, had a defect in IL-18 secretion and exhibited splenomegaly and damage to the splenic architecture. Remarkably, Salmonella-induced NLRC4 inflammasome activation was not affected by either chemical inhibition or genetic ablation of genes associated with PGE2 biosynthesis and signaling. This divergence in immune circuitry was due to reduced levels of the PGE2-EP3 receptor during Salmonella infection when compared to A. phagocytophilum. Collectively, we reveal the existence of a functionally distinct NLRC4 inflammasome illustrated by the rickettsial agent A. phagocytophilum. PMID:27482714

  12. An O-Methyltransferase Is Required for Infection of Tick Cells by Anaplasma phagocytophilum.

    Directory of Open Access Journals (Sweden)

    Adela S Oliva Chávez

    Full Text Available Anaplasma phagocytophilum, the causative agent of Human Granulocytic Anaplasmosis (HGA, is an obligately intracellular α-proteobacterium that is transmitted by Ixodes spp ticks. However, the pathogen is not transovarially transmitted between tick generations and therefore needs to survive in both a mammalian host and the arthropod vector to complete its life cycle. To adapt to different environments, pathogens rely on differential gene expression as well as the modification of proteins and other molecules. Random transposon mutagenesis of A. phagocytophilum resulted in an insertion within the coding region of an o-methyltransferase (omt family 3 gene. In wild-type bacteria, expression of omt was up-regulated during binding to tick cells (ISE6 at 2 hr post-inoculation, but nearly absent by 4 hr p.i. Gene disruption reduced bacterial binding to ISE6 cells, and the mutant bacteria that were able to enter the cells were arrested in their replication and development. Analyses of the proteomes of wild-type versus mutant bacteria during binding to ISE6 cells identified Major Surface Protein 4 (Msp4, but also hypothetical protein APH_0406, as the most differentially methylated. Importantly, two glutamic acid residues (the targets of the OMT were methyl-modified in wild-type Msp4, whereas a single asparagine (not a target of the OMT was methylated in APH_0406. In vitro methylation assays demonstrated that recombinant OMT specifically methylated Msp4. Towards a greater understanding of the overall structure and catalytic activity of the OMT, we solved the apo (PDB_ID:4OA8, the S-adenosine homocystein-bound (PDB_ID:4OA5, the SAH-Mn2+ bound (PDB_ID:4PCA, and SAM- Mn2+ bound (PDB_ID:4PCL X-ray crystal structures of the enzyme. Here, we characterized a mutation in A. phagocytophilum that affected the ability of the bacteria to productively infect cells from its natural vector. Nevertheless, due to the lack of complementation, we cannot rule out secondary

  13. An O-Methyltransferase Is Required for Infection of Tick Cells by Anaplasma phagocytophilum.

    Science.gov (United States)

    Oliva Chávez, Adela S; Fairman, James W; Felsheim, Roderick F; Nelson, Curtis M; Herron, Michael J; Higgins, LeeAnn; Burkhardt, Nicole Y; Oliver, Jonathan D; Markowski, Todd W; Kurtti, Timothy J; Edwards, Thomas E; Munderloh, Ulrike G

    2015-01-01

    Anaplasma phagocytophilum, the causative agent of Human Granulocytic Anaplasmosis (HGA), is an obligately intracellular α-proteobacterium that is transmitted by Ixodes spp ticks. However, the pathogen is not transovarially transmitted between tick generations and therefore needs to survive in both a mammalian host and the arthropod vector to complete its life cycle. To adapt to different environments, pathogens rely on differential gene expression as well as the modification of proteins and other molecules. Random transposon mutagenesis of A. phagocytophilum resulted in an insertion within the coding region of an o-methyltransferase (omt) family 3 gene. In wild-type bacteria, expression of omt was up-regulated during binding to tick cells (ISE6) at 2 hr post-inoculation, but nearly absent by 4 hr p.i. Gene disruption reduced bacterial binding to ISE6 cells, and the mutant bacteria that were able to enter the cells were arrested in their replication and development. Analyses of the proteomes of wild-type versus mutant bacteria during binding to ISE6 cells identified Major Surface Protein 4 (Msp4), but also hypothetical protein APH_0406, as the most differentially methylated. Importantly, two glutamic acid residues (the targets of the OMT) were methyl-modified in wild-type Msp4, whereas a single asparagine (not a target of the OMT) was methylated in APH_0406. In vitro methylation assays demonstrated that recombinant OMT specifically methylated Msp4. Towards a greater understanding of the overall structure and catalytic activity of the OMT, we solved the apo (PDB_ID:4OA8), the S-adenosine homocystein-bound (PDB_ID:4OA5), the SAH-Mn2+ bound (PDB_ID:4PCA), and SAM- Mn2+ bound (PDB_ID:4PCL) X-ray crystal structures of the enzyme. Here, we characterized a mutation in A. phagocytophilum that affected the ability of the bacteria to productively infect cells from its natural vector. Nevertheless, due to the lack of complementation, we cannot rule out secondary mutations

  14. Prävalenz von hämotrophen Mycoplasma spp., Bartonella spp., Anaplasma phagocytophilum und Borrelia burgdorferi bei Katzen im Raum Berlin/Brandenburg

    OpenAIRE

    Morgenthal, Dinah

    2014-01-01

    Arthropod-borne infectious agents in the cat include Bartonella (B.) henselae, Bartonella (B.) clarridgeiae, Bartonella (B.) quintana, Anaplasma (A.) phagocytophilum and Borrelia (B.) burgdorferi. Moreover infections with Mycoplasma (M.) haemofelis, Candidatus Mycoplasma (C. M.) turicensis and Candidatus Mycoplasma (C. M.) haemominutum occur in the cat. The cat flea (Ctenocephalides felis) is supposed to be the main vector for Mycoplasma spp.; moreover, transmission via blood transfusion and ...

  15. Efficacy of sarolaner in the prevention of Borrelia burgdorferi and Anaplasma phagocytophilum transmission from infected Ixodes scapularis to dogs.

    Science.gov (United States)

    Honsberger, Nicole A; Six, Robert H; Heinz, Thomas J; Weber, Angela; Mahabir, Sean P; Berg, Thomas C

    2016-05-30

    The efficacy of sarolaner (Simparica™, Zoetis) to prevent transmission primarily of Borrelia burgdorferi and secondarily of Anaplasma phagocytophilum from infected wild-caught Ixodes scapularis to dogs was evaluated in a placebo-controlled laboratory study. Twenty-four purpose-bred laboratory Beagles seronegative for B. burgdorferi and A. phagocytophilum antibodies were allocated randomly to one of three treatment groups: placebo administered orally on Days 0 and 7, or sarolaner at 2mg/kg administered orally on Day 0 (28 days prior to tick infestation) or on Day 7 (21 days prior to tick infestation). On Day 28, each dog was infested with approximately 25 female and 25 male wild caught adult I. scapularis that were determined to have prevalence of 57% for B. burgdorferi and 6.7% for A. phagocytophilum by PCR. In situ tick counts were conducted on Days 29 and 30. On Day 33, all ticks were counted and removed. Acaricidal efficacy was calculated based on the reduction of geometric mean live tick counts in the sarolaner-treated groups compared to the placebo-treated group for each tick count. Blood samples collected from each dog on Days 27, 49, 63, 77, 91 and 104 were tested for the presence of B. burgdorferi and A. phagocytophilum antibodies using the SNAP(®) 4Dx(®) Plus Test, and quantitatively assayed for B. burgdorferi antibodies using an ELISA test. Skin biopsies collected on Day 104 were tested for the presence of B. burgdorferi by bacterial culture and PCR. Geometric mean live tick counts for placebo-treated dogs were 14.8, 12.8, and 19.1 on Days 29, 30, and 33, respectively. The percent reductions in mean live tick counts at 1, 2, and 5 days after infestation were 86.3%, 100%, and 100% for the group treated with sarolaner 21 days prior to infestation, and 90.9%, 97.1%, and 100% for the group treated with sarolaner 28 days prior to infestation. Geometric mean live tick counts for both sarolaner-treated groups were significantly lower than those for the

  16. Comparative Experimental Infection Study in Dogs with Ehrlichia canis, E. chaffeensis, Anaplasma platys and A. phagocytophilum.

    Directory of Open Access Journals (Sweden)

    Arathy D S Nair

    Full Text Available Dogs acquire infections with the Anaplasmataceae family pathogens, E. canis, E. chaffeensis, E. ewingii, A. platys and A. phagocytophilum mostly during summer months when ticks are actively feeding on animals. These pathogens are also identified as causing diseases in people. Despite the long history of tick-borne diseases in dogs, much remains to be defined pertaining to the clinical and pathological outcomes of infections with these pathogens. In the current study, we performed experimental infections in dogs with E. canis, E. chaffeensis, A. platys and A. phagocytophilum. Animals were monitored for 42 days to evaluate infection-specific clinical, hematological and pathological differences. All four pathogens caused systemic persistent infections detectible throughout the 6 weeks of infection assessment. Fever was frequently detected in animals infected with E. canis, E. chaffeensis, and A. platys, but not in dogs infected with A. phagocytophilum. Hematological differences were evident in all four infected groups, although significant overlap existed between the groups. A marked reduction in packed cell volume that correlated with reduced erythrocytes and hemoglobin was observed only in E. canis infected animals. A decline in platelet numbers was common with E. canis, A. platys and A. phagocytophilum infections. Histopathological lesions in lung, liver and spleen were observed in all four groups of infected dogs; infection with E. canis had the highest pathological scores, followed by E. chaffeensis, then A. platys and A. phagocytophilum. All four pathogens induced IgG responses starting on day 7 post infection, which was predominantly comprised of IgG2 subclass antibodies. This is the first detailed investigation comparing the infection progression and host responses in dogs after inoculation with four pathogens belonging to the Anaplasmataceae family. The study revealed a significant overlap in clinical, hematological and pathological

  17. Tissue-Specific Signatures in the Transcriptional Response to Anaplasma phagocytophilum Infection of Ixodes scapularis and Ixodes ricinus Tick Cell Lines

    Science.gov (United States)

    Alberdi, Pilar; Mansfield, Karen L.; Manzano-Román, Raúl; Cook, Charlotte; Ayllón, Nieves; Villar, Margarita; Johnson, Nicholas; Fooks, Anthony R.; de la Fuente, José

    2016-01-01

    Anaplasma phagocytophilum are transmitted by Ixodes spp. ticks and have become one of the most common and relevant tick-borne pathogens due to their impact on human and animal health. Recent results have increased our understanding of the molecular interactions between Ixodes scapularis and A. phagocytophilum through the demonstration of tissue-specific molecular pathways that ensure pathogen infection, development and transmission by ticks. However, little is known about the Ixodes ricinus genes and proteins involved in the response to A. phagocytophilum infection. The tick species I. scapularis and I. ricinus are evolutionarily closely related and therefore similar responses are expected in A. phagocytophilum-infected cells. However, differences may exist between I. scapularis ISE6 and I. ricinus IRE/CTVM20 tick cells associated with tissue-specific signatures of these cell lines. To address this hypothesis, the transcriptional response to A. phagocytophilum infection was characterized by RNA sequencing and compared between I. scapularis ISE6 and I. ricinus IRE/CTVM20 tick cell lines. The transcriptional response to infection of I. scapularis ISE6 cells resembled that of tick hemocytes while the response in I. ricinus IRE/CTVM20 cells was more closely related to that reported previously in infected tick midguts. The inhibition of cell apoptosis by A. phagocytophilum appears to be a key adaptation mechanism to facilitate infection of both vertebrate and tick cells and was used to investigate further the tissue-specific response of tick cell lines to pathogen infection. The results supported a role for the intrinsic pathway in the inhibition of cell apoptosis by A. phagocytophilum infection of I. scapularis ISE6 cells. In contrast, the results in I. ricinus IRE/CTVM20 cells were similar to those obtained in tick midguts and suggested a role for the JAK/STAT pathway in the inhibition of apoptosis in tick cells infected with A. phagocytophilum. Nevertheless, tick

  18. Prevalence and first molecular characterization of Anaplasma phagocytophilum, the agent of human granulocytic anaplasmosis, in Rhipicephalus sanguineus ticks attached to dogs from Egypt

    Directory of Open Access Journals (Sweden)

    Mohamed W. Ghafar

    2012-04-01

    Full Text Available PCR targeting 16S rRNA gene integrated with sequence analysis were performed to investigate the prevalence and the molecular identity of Anaplasma phagocytophilum in Egyptian Rhipicephalus sanguineus ticks attached to dogs. A total of 413 adult and nymphal R. sanguineus ticks were collected while attached to 72 free-roaming dogs from four locations (Imbaba, Boulaq, Haram, Monib in Giza Governorate, Egypt. DNA was successfully extracted from 401 specimens (133 nymphs and 268 adults. The overall prevalence rate was 13.7% and adult ticks showed a significantly higher infection rate (16.4% compared to nymphs (8.3%. Sequence comparisons of 218-bp showed that detected organism belongs to A. phagocytophilum. The sequence showed 99.1% similarity (2 nucleotide differences with some strains described as human pathogens and with that detected in the established tick vectors. Phylogenetic analysis placed the bacteria on a separate branch with that found in R. annulatus from Egypt (DQ379972 (99.5% similarity. Our variant strain was designated as A. phagocytophilum-Ghafar-EGY (AB608266. This report is the first molecular characterization of A. phagocytophilum in R. sanguineus in Egypt, suggesting that this tick species may act as a competent vector for a variant strain of human granulocytic anaplasmosis agent.

  19. Prevalence of Babesia canis, Borrelia burgdorferi sensu lato, and Anaplasma phagocytophilum in hard ticks collected from meadows of Lubelskie Voivodship (eastern Poland

    Directory of Open Access Journals (Sweden)

    Dzięgiel Beata

    2014-03-01

    Full Text Available The aim of the study was to assess the distribution of Anaplasma phagocytophilum, Borrelia burgdorferi sensu lato, and Babesia canis in adult females and males of Ixodes ricinus and Dermacentor reticulatus ticks, inhabiting meadows near large forest complexes throughout the Lubelskie Voivodship (eastern region of Poland. Ticks were collected using the flagging method. Among 720 ticks collected, 506 were identified as D. reticulatus, and 214 as I. ricinus. DNA of B. canis and B. burgdorferi s.l. was detected in 21.3% and 0.6% of D. reticulatus ticks, respectively. In I. ricinus ticks, DNA specific to B. burgdorferi s.l. and A. phagocytophilum was detected in 5.6% and 10.3%, respectively. Co-infections of B. burgdorferi s.l. and A. phagocytophilum were found in two I. ricinus ticks. These results indicate that the Lublin region is an area at risk of tick-borne diseases of humans and animals, which must be considered in clinical practice.

  20. Assessment of antibodies against surface and outer membrane proteins of Anaplasma phagocytophilum in Lyme borreliosis and tick-borne encephalitis paediatric patients.

    Science.gov (United States)

    Krbková, L; Homola, L; Hlaváčová, A; Mikolášek, P; Bednářová, J; Čermáková, Z

    2016-09-01

    To examine evidence of positive antibodies against immunogenic proteins of Anaplasma phagocytophilum in patients with other tick-borne infections and to diagnose possible co-infections, 412 serum specimens were tested by immunoblotting using three specific Anaplasma antigens: surface proteins p44 and Asp62 and outer membrane protein A (OmpA). In total, 284 serum samples from children with Lyme borreliosis and 12 serum samples from children with tick-borne encephalitis were tested. Sera from patients with viral aseptic meningitis (n = 47) and from blood donors (n = 69) were used as controls. Among all serum specimens from patients with tick-borne infections submitted for this study, six samples (2·0%) showed positive IgM reactions and seven samples (2·4%) were IgG positive for A. phagocytophilum by immunoblot. Borderline reactivity was found in 30 samples (10·14%) for IgM and 36 samples (12·2%) for IgG. The difference between patients and blood donors was statistically significant for IgM (P = 0·006) and for IgG (P = 0·0007) antibodies. A statistically significant result was obtained for IgG (P = 0·02) but not for IgM between patients and children with aseptic meningitis. Immunoblot using three specific antigens provides novel information about the positivity of antibodies to A. phagocytophilum in children with other tick-borne infections. Taking into account clinical and laboratory findings of children despite antibody positivity, no case of human granulocytic anaplasmosis was demonstrated. PMID:27180603

  1. Serological survey of Borrelia burgdorferi sensu lato, Anaplasma phagocytophilum, and Ehrlichia canis infections in rural and urban dogs in Central Italy

    Directory of Open Access Journals (Sweden)

    Valentina Virginia Ebani

    2014-11-01

    Full Text Available [b]Introduction[i][/i][/b][i]. Borrelia burgdorferi [/i]sensu lato (s.l. and Anaplasma phagocytophilum are well known zoonotic pathogens, whereas[i] Ehrlichia canis[/i] is usually considered to be of veterinary concern, although on the basis of recent reports it also seems to be able to infect humans. [b]objective[/b]. The aim of the study was to determine the seroprevalence of [i]B. burgdorferi [/i]s.l., A. phagocytophilum and [i]E. canis[/i] in an Italian canine population, and to verify if there are differences between dogs living in urban areas and those from a rural environment. [b]materials and method.[/b] Blood sera of 1,965 dogs, 1,235 from cities and 730 from rural areas, were tested by indirect immunofluorescent assay (IFAT. [b]results[/b]. The overall seroprevalence was highest for E. canis (7.07%, followed by [i]A. phagocytophilum[/i] (4.68%, and [i]B. burgdorferi[/i] s.l. (1.47%. Rural dogs showed the highest seroprevalence to [i]B. burgdorferi[/i] s.l. and [i]A. phagocytophilum[/i]. No significant differences were observed between rural and urban [i]E. canis[/i]-positive dogs. A low percentage (1.32% of dogs with dual seropositivity was detected, and no triple positive reactions were observed. No significant differences were detected in the seroprevalence of the three agents in relationship to the age and gender of the dogs. Seroprevalence in the five years considered were not statistically different, except for the lowest rate for [i]E. canis[/i] observed in 2012. [b]conclusions[/b]. The results confirm the presence of [i]B. burgdorferi[/i] s.l., [i]A. phagocytophilum[/i] and [i]E. canis[/i] in Italian dogs in both urban and rural areas. Monitoring pet dogs, which share the same environment with their owners, is useful for identifying the presence of tick-borne disease agents of both veterinary and public health significance

  2. Retrospective analysis of clinical and laboratory findings in hunting dogs with serologic reactions to tick-borne pathogens (Anaplasma phagocytophilum, Borrelia burgdorferi, Babesia canis, Ehrlichia canis, Ricketsia conorii

    Directory of Open Access Journals (Sweden)

    Spasojević-Kosić Ljubica

    2015-01-01

    Full Text Available Seroprevalence of tick-borne infections in endemic areas could be high. In this study, we investigated the seroprevalence of tick-borne pathogens (Anaplasma phagocytophilum, Borrelia burgdorferi, Babesia canis, Ehrlichia canis, Rickettsia conorii in hunting dogs, naturally infected with one or more pathogens. Serological test results of the investigated animals were compared to those from clinical examination, as well as from haematological and biochemical analyses. A total of 74.14% dogs were seropositive (R.conorii 44.83%, B. canis 32.76%, B. burgdorferi 25.86%, E. canis 13.79%, A. phagocytophilum 8.47%, with 25.86% of dogs seropositive to two pathogens, 15.52% seropositive to three pathogens, and 1.72% of dogs seropositive to four pathogens. Among all registered clinical signs, only pyrexia (p<0.05 and arrhythmia (p<0.05 were significant in seropositive dogs. There was no significant difference between seropositive and seronegative dogs regarding the majority of haematological and biochemical parameters. Statistically significant difference was registered for particular haematological (number of red blood cells and seroreactivity to B. burgdorferi and biochemical parameters (albumin concentration and seroreactivity to E. canis, and AST and seroreactivity to R. conorii but these values were not clinically significant. The high exposure to tick-borne pathogens suggests that ectoparasitic profilactic treatment is not adequate in examined population of hunting dogs. Clinical finding of pyrexia need to be further investigated and explained etiologically, which means that molecular diagnosis should be used in order to identify larger number of pathogens because of the possibility of coinfection. [Projekat Ministarstva nauke Republike Srbije, br. TR 31084

  3. Comparative analysis of the infectivity rate of both Borrelia burgdorferi and Anaplasma phagocytophilum in humans and dogs in a New Jersey community

    Directory of Open Access Journals (Sweden)

    Gaito A

    2014-08-01

    Full Text Available Andrea Gaito,1 Vedrana Gjivoje,2 Sebastian Lutz,1 Ben Baxter2 1Private medical practice, Somerset County, NJ, USA; 2Bernardsville Animal Hospital, Somerset County, NJ, USA Abstract: Ticks are important vectors of disease and transmit an extensive array of bacterial, viral and protozoan diseases to both humans and dogs within a community. Borrelia burgdorferi, the causative agent of Lyme disease, has been extensively studied within both the human and veterinary population. Anaplasma phagocytophilum, an intracellular rickettsial pathogen also transmitted by ixodid ticks, has emerged as an important zoonotic infection with significant veterinary and medical implications, and is responsible for both canine granulocytic anaplasmosis and human granulocytic anaplasmosis. Multiple surveys exist in the international literature referencing infectivity rates of both of these diseases separately in both the dog and human populations. This is the first study to simultaneously examine the infectivity rate of both anaplasmosis and Lyme disease in humans and dogs in a community endemic for tick-borne diseases. Keywords: Lyme disease, anaplasmosis, dogs, humans 

  4. Entwicklung und Evaluierung von Real-time PCR-Verfahren zum Nachweis von Ehrlichia canis und Anaplasma phagocytophilum (Anaplasmataceae)

    OpenAIRE

    Messerer, Sandra

    2006-01-01

    In der vorliegenden Arbeit wurden Real-time PCR-basierte Nachweisverfahren für E. canis und A. phagocytophilum entwickelt, validiert und im Anschluss für die Untersuchung von Patientenproben eingesetzt. Für E. canis wurden für zwei Tests Primer und Sonden des Typs „Molecular Beacon“ konstruiert, die auf unterschiedliche Zielgene gerichtet waren, die Reaktionsbedingungen optimiert und die Leistungsfähigkeit beider Tests verglichen. Die PCR EC-16S hatte hierbei die 16S rDNA als Zielgen, während...

  5. A serological survey of tick-borne pathogens in dogs in North America and the Caribbean as assessed by Anaplasma phagocytophilum, A. platys, Ehrlichia canis, E. chaffeensis, E. ewingii, and Borrelia burgdorferi species-specific peptides

    Directory of Open Access Journals (Sweden)

    Barbara A. Qurollo

    2014-10-01

    Full Text Available Introduction: Tick-borne pathogens cause a spectrum of disease manifestations in both dogs and humans. Recognizing regional and temporal shifts in exposure are important as tick distributions change. To better delineate regional exposure to canine tick-borne pathogens, an expanded set of species-specific peptides were used to detect Anaplasma phagocytophilum (Aph, Anaplasma platys (Apl, Ehrlichia canis (Ec, Ehrlichia chaffeensis (Ech, Ehrlichia ewingii (Eew, and Borrelia burgdorferi (Bb antibodies in canine serum. Methods: Archived canine serum samples (n=6,582 collected during 2008–2010 and in 2012 from the US, Canada, and the Caribbean were retrospectively screened for antibodies against Ehrlichia and Anaplasma species-specific peptides. Overall, regional and temporal seroprevalence rates were determined. Results: Overall Bb and Eew were the most seroprevalent pathogens. During 2008–2010, seroprevalence rates increased overall for Aph and Ech, and regionally, Bb and Aph seroprevalence rates increased in the South. Canada had unexpectedly high seroprevalence rates for Ec and Apl. The most common co-exposures were Eew+Ech, followed by Aph+Bb and Eew+Bb. Conclusions: This study demonstrated significant shifts in canine vector-borne disease seroprevalence rates. The use of specific peptides facilitated improved geographic delineation of tick-borne pathogen distributions among dogs, which may enhance epidemiological surveillance of vector-borne pathogens shared by dogs and humans.

  6. Anaplasma phagocytophilum: deceptively simple or simply deceptive?

    Czech Academy of Sciences Publication Activity Database

    Severo, M. S.; Stephens, K. D.; Kotsyfakis, Michalis; Pedra, J. H. F.

    2012-01-01

    Roč. 7, č. 6 (2012), s. 719-731. ISSN 1746-0913 Institutional support: RVO:60077344 Keywords : obligate intracellular bacterium * rickettsial agents * ticks * vector - borne disease s Subject RIV: GJ - Animal Vermins ; Disease s, Veterinary Medicine Impact factor: 4.018, year: 2012

  7. First molecular survey and identification of Anaplasma spp. in white yaks (Bos grunniens) in China.

    Science.gov (United States)

    Yang, Jifei; Liu, Zhijie; Niu, Qingli; Liu, Junlong; Guan, Guiquan; Xie, Jingying; Luo, Jianxun; Wang, Shuqing; Wang, Shufang; Yin, Hong

    2016-05-01

    Anaplasmosis is caused by a group of obligate intracellular bacteria in the genus Anaplasma, which are transmitted by ticks and infect humans, domestic animals and wildlife. This study was conducted to determine the prevalence and molecular characterization of Anaplasma spp. in semi-wild white yaks sampled in Tianzhu Tibetan Autonomous County, northwest China. Out of 332 samples tested, 35 (10·9%) were positive for Anaplasma spp. The positive rates were 6·2% (20/322) and 5·3% (17/322) for Anaplasma bovis and Anaplasma phagocytophilum in white yaks, respectively. None of the sample was positive for Anaplasma marginale. Two (0·6%) samples were simultaneously positive to A. bovis and A. phagocytophilum. Sequence analysis of the 16S rRNA gene revealed two genotypes (ApG1 and ApG2) of A. phagocytophilum and two sequence types (ST1 and ST2) of A. bovis in white yaks. This study is the first to document the presence of Anaplasma in white yaks. Our findings extend the host range for Anaplasma species and provide more valuable information for the control and management of anaplasmosis in white yaks. PMID:27003378

  8. A Molecular and Serological Survey of Rickettsiales Bacteria in Wild Sika Deer (Cervus nippon nippon) in Shizuoka Prefecture, Japan: High Prevalence of Anaplasma Species.

    Science.gov (United States)

    Wu, Dongxing; Wuritu; Yoshikawa, Yuko; Gaowa; Kawamori, Fumihiko; Ikegaya, Asaka; Ohtake, Masayoshi; Ohashi, Masataka; Shimada, Masahiko; Takada, Ayumi; Iwai, Katsuki; Ohashi, Norio

    2015-01-01

    We surveyed Rickettsiales bacteria, including Rickettsia, Ehrlichia, Anaplasma, and Neoehrlichia, in wild sika deer (Cervus nippon nippon) from Shizuoka prefecture, Japan. In spleen samples from 187 deer, Anaplasma phagocytophilum (deer type), A. bovis, and A. centrale were successfully detected by PCR assay targeting to 16S rDNA or p44/msp2, and their positive rates were 96.3% (180/187), 53.5% (100/187), and 78.1% (146/187), respectively. Additionally, 2 or 3 Anaplasma species could be detected from a single deer in 165 spleen samples (88.2%), indicating dual or triple infection. In contrast, A. phagocytophilum (human type) 16S rDNA, Rickettsia gltA, Ehrlichia p28/omp-1, and Neoehrlichia 16S rDNA could not be amplified. The serological test of 105 deer serum samples by immunofluorescence assay showed that the detection of antibodies against antigens of A. phagocytophilum HZ (US-human isolate) and Rickettsia japonica YH were 29.5% (31/105) and 75.2% (79/105), respectively. These findings suggest that A. phagocytophilum (deer type), A. centrale, and A. bovis are highly dominant and prevalent in wild sika deer from Shizuoka, a central region of Japan, and that the antibodies against some Rickettsiales bacteria have also been retained in deer blood. PMID:25971318

  9. Prevalence of Anaplasma and Bartonella spp. in Ticks Collected from Korean Water Deer (Hydropotes inermis argyropus).

    Science.gov (United States)

    Kang, Jun-Gu; Ko, Sungjin; Kim, Heung-Chul; Chong, Sung-Tae; Klein, Terry A; Chae, Jeong-Byoung; Jo, Yong-Sun; Choi, Kyoung-Seong; Yu, Do-Hyeon; Park, Bae-Keun; Park, Jinho; Chae, Joon-Seok

    2016-02-01

    Deer serve as reservoirs of tick-borne pathogens that impact on medical and veterinary health worldwide. In the Republic of Korea, the population of Korean water deer (KWD, Hydropotes inermis argyropus) has greatly increased from 1982 to 2011, in part, as a result of reforestation programs established following the Korean War when much of the land was barren of trees. Eighty seven Haemaphysalis flava, 228 Haemaphysalis longicornis, 8 Ixodes nipponensis, and 40 Ixodes persulcatus (21 larvae, 114 nymphs, and 228 adults) were collected from 27 out of 70 KWD. A total of 89/363 ticks (266 pools, 24.5% minimum infection rate) and 5 (1.4%) fed ticks were positive for Anaplasma phagocytophilum using nested PCR targeting the 16S rRNA and groEL genes, respectively. The 16S rRNA gene fragment sequences of 88/89 (98.9%) of positive samples for A. phagocytophilum corresponded to previously described gene sequences from KWD spleen tissues. The 16S rRNA gene fragment sequences of 20/363 (5.5%) of the ticks were positive for A. bovis and were identical to previously reported sequences. Using the ITS specific nested PCR, 11/363 (3.0%) of the ticks were positive for Bartonella spp. This is the first report of Anaplasma and Bartonella spp. detected in ticks collected from KWD, suggesting that ticks are vectors of Anaplasma and Bartonella spp. between reservoir hosts in natural surroundings. PMID:26951985

  10. Detection of Babesia and Anaplasma species in rabbits from Texas and Georgia, USA.

    Science.gov (United States)

    Yabsley, Michael J; Romines, Janean; Nettles, Victor F

    2006-01-01

    Rabbits have been shown to harbor a suite of zoonotic organisms, including a Babesia species, Borrelia burgdorferi, and Anaplasma phagocytophilum. In this study, we conducted a molecular survey for various tick-borne pathogens in three species of rabbits from Texas and Georgia. Of 18 black-tailed jackrabbits (Lepus californicus) tested from Texas, six (28%) were polymerase chain reaction (PCR) positive for Babesia, and nucleotide sequencing revealed two distinct species or strains. Two jackrabbits were infected with a Babesia species or strain (Babesia sp. A) that was nearly identical (99.9%) to a piroplasm previously detected in humans from Washington state, and the remaining four jackrabbits were infected with a Babesia species (Babesia sp. B) that was most similar (99.7%) to a Babesia species detected in cottontail rabbits from Massachusetts and humans from Kentucky and Missouri. Eleven (61%) black-tailed jackrabbits were positive for A. bovis, and one was positive for A. phagocytophilum. Two of four desert cottontails (Sylvilagus audubonii) from Texas were positive for the Babesia sp. B, and one desert cottontail each was positive for A. bovis and A. phagocytophilum. One of these desert cottontails was coinfected with the Babesia sp. B and A. phagocytophilum, and five jackrabbits were coinfected with Babesia species and A. bovis. Of 19 eastern cottontails (S. floridanus) from Georgia, only one (5.3%) was positive for A. phagocytophilum, and three (15.8%) were positive for A. bovis. No rabbits from Texas or Georgia were positive for Borrelia species. The only tick species detected on the Texas and Georgia rabbits was the rabbit tick, Haemaphysalis leporispalustris. These data extend the geographic and host range of these pathogens, and because both the Babesia species and A. phagocytophilum are potential zoonotic pathogens, it is important to be aware that these organisms are enzootic in parts of the southern United States. PMID:16584322

  11. Detection of A. phagocytophilum and E. chaffeensis in patient and mouse blood and ticks by a duplex real-time PCR assay.

    Directory of Open Access Journals (Sweden)

    Tuo Dong

    Full Text Available Human granulocytic anaplasmosis (HGA and human monocytic ehrlichiosis (HME are emerging, tick-borne, zoonotic infectious diseases caused by Anaplasma phagocytophilum and Ehrlichia chaffeensis, respectively. Early diagnosis is essential for rapid clinical treatment to avoid misdiagnosis and severe patient outcomes. Simple, sensitive and reliable diagnostic methods are urgently needed. In this study, we developed a duplex real-time PCR assay targeting the A. phagocytophilum ankA gene and the E. chaffeensis TRP120 gene, respectively. The lowest limit of detection of the duplex real-time PCR assay was 100 copies of the targeted A. phagocytophilum ankA gene and the E. chaffeensis TRP120 gene per reaction, and the specificity was 100%. Detection in blood DNA samples from the acute stage of illness for 22 HGA cases and 8 HME cases indicated that the duplex real-time PCR assay was more sensitive than the nested PCR assay. The infection of Citellusundulatus Pallas with A. phagocytophilum and E. chaffeensis was first confirmed in Xinjiang Province and the positive rate was 3.1% for A. phagocytophilum, 6.3% for E. chaffeensis and 3.1% for co-infection with both pathogens. The rates of A. phagocytophilum and E. chaffeensis infection of D. silvarum ticks collected from Shanxi Province were 8.2% and 14.8%, respectively, and the co-infection rate was 3.3%. The rates of A. phagocytophilum and E. chaffeensis infection in H. longicornis ticks collected from Shandong Province were 1.6% and 6.3%, respectively, and the co-infection rate was 1.6%.

  12. Migratory and carnivorous birds in Brazil: reservoirs for Anaplasma and Ehrlichia species?

    Science.gov (United States)

    Machado, Rosangela Zacarias; André, Marcos Rogério; Werther, Karin; de Sousa, Eliane; Gavioli, Fernando Antônio; Alves Junior, José Roberto Ferreira

    2012-08-01

    In order to investigate new hosts for Anaplasmataceae agents in Brazil, we collected blood samples from 21 wild birds. Using molecular techniques, we detected the presence of Anaplasma phagocytophilum, Ehrlichia chaffeensis, and an Ehrlichia species closely related to Ehrlichia canis in carnivorous avian blood samples. In addition, an Ehrlichia species closely related to an Ehrlichia species found in wild felines in Brazil was also detected in a goose blood sample. Wild birds may play a role as carriers of Anaplasmataceae agents in Brazil. PMID:22607070

  13. DETECTION OF ANTIBODIES TO ANAPLASMA, BARTONELLA AND COXIELLA IN RURAL INHABITANTS OF THE CARIBBEAN AREA OF COLOMBIA

    Directory of Open Access Journals (Sweden)

    Salim Máttar

    2006-12-01

    Full Text Available Objetivo. Establecer la seroprevalencia de Bartonella spp, Anaplasma phagocytophilum (antesErlichia y Coexiella burnetii. Materiales y métodos. Se analizaron sueros representativos de unsector de la población en el año 2003, recolectados de personas que trabajan en actividades delcampo en los departamentos de Córdoba y Sucre que sirvieron como población base de las muestrasque se obtuvieron. Los trabajadores rurales elegidos a participar tenían entra 16 – 65 años deedad. Los sueros fueron examinados por IFA para detección de anticuerpos contra IgG para Bartonellaspp, Erlichia Anaplasma phagocytophilum y Coexiella burnetii. Resultados. La seroprevalencia deanticuerpos de todos los microorganismos estudiados fue de 56.8%. De 81 muestras de sueroanalizadas el 26.6% fueron seropositivas contra C. burnetii, el 37.7% tuvieron anticuerpos contraBartonella y el 20% de los individuos evaluados fueron seropositivos para Anaplasmaphagocytophilum. Conclusiones. Nuestros datos indican que la prevalencia de anticuerpos contraBartonella, A. phagocytophilum y C. burnetii son altos en nuestra región. Los resultados indicanque estas enfermedades zoonoticas son muy comunes en las personas que residen en el área delcaribe colombiano. Este estudio demuestra por primera vez la presencia de estos microorganismosen Colombia.

  14. Sequence analysis of the msp4 gene of Anaplasma ovis strains

    Science.gov (United States)

    de la Fuente, J.; Atkinson, M.W.; Naranjo, V.; Fernandez de Mera, I. G.; Mangold, A.J.; Keating, K.A.; Kocan, K.M.

    2007-01-01

    Anaplasma ovis (Rickettsiales: Anaplasmataceae) is a tick-borne pathogen of sheep, goats and wild ruminants. The genetic diversity of A. ovis strains has not been well characterized due to the lack of sequence information. In this study, we evaluated bighorn sheep (Ovis canadensis) and mule deer (Odocoileus hemionus) from Montana for infection with A. ovis by serology and sequence analysis of the msp4 gene. Antibodies to Anaplasma spp. were detected in 37% and 39% of bighorn sheep and mule deer analyzed, respectively. Four new msp4 genotypes were identified. The A. ovis msp4 sequences identified herein were analyzed together with sequences reported previously for the characterization of the genetic diversity of A. ovis strains in comparison with other Anaplasma spp. The results of these studies demonstrated that although A. ovis msp4 genotypes may vary among geographic regions and between sheep and deer hosts, the variation observed was less than the variation observed between A. marginale and A. phagocytophilum strains. The results reported herein further confirm that A. ovis infection occurs in natural wild ruminant populations in Western United States and that bighorn sheep and mule deer may serve as wildlife reservoirs of A. ovis. ?? 2006.

  15. Infektion mit Anaplasma phagozytophilum beim Hund

    OpenAIRE

    Galke, Daniela

    2010-01-01

    A. phagocytophilum is an obligate intracellular Gram-negative bacterium transmitted by ticks of the genus Ixodes. It mostly afflicts neutrophils. Infections with this pathogen have been described in most domestic mammals and men. A. phagocytophilum is the causative agent of canine granulocytic anaplasmosis (CGA). Objectives of this study were 1) the determination of the prevalence of A. phagocytophilum infections in clinically healthy and sick dogs suspicious for CGA, 2) the evaluation wh...

  16. The Tick Salivary Protein Sialostatin L2 Inhibits Caspase-1-Mediated Inflammation during Anaplasma phagocytophilum Infection

    Czech Academy of Sciences Publication Activity Database

    Chen, G.; Wang, X.; Sakhon, O. S.; Sohail, M.; Brown, L.J.; Sircar, M.; Snyder, G.A.; Sundberg, E.J.; Ulland, T.K.; Olivier, A.K.; Andersen, J. F.; Zhou, Y.; Shi, G.-P.; Sutterwala, F.S.; Kotsyfakis, Michalis; Pedra, J. H. F.

    2014-01-01

    Roč. 82, č. 6 (2014), s. 2553-2564. ISSN 0019-9567 Institutional support: RVO:60077344 Keywords : granulocytic ehrlichiosis agent * Ixodes scapularis * tumor necrosis factor Subject RIV: EC - Immunology Impact factor: 3.731, year: 2014

  17. Anaplasma phagocytophilum Dihydrolipoamide Dehydrogenase 1 Affects Host-Derived Immunopathology during Microbial Colonization

    Czech Academy of Sciences Publication Activity Database

    Chen, G.; Severo, M. S.; Sakhon, O. S.; Choy, A.; Herron, M. J.; Felsheim, R. F.; Wiryawan, H.; Liao, J.; Johns, J. L.; Munderloh, U. G.; Sutterwala, F. S.; Kotsyfakis, Michalis; Pedra, J. H. F.

    2012-01-01

    Roč. 80, č. 9 (2012), s. 3194-3205. ISSN 0019-9567 Institutional support: RVO:60077344 Keywords : ricketsia * microbial colonization * immunopathology * inflammation * signaling pathways Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 4.074, year: 2012 http://iai.asm.org/content/80/9/3194

  18. Identification and Characterization of Anaplasma phagocytophilum Proteins Involved in Infection of the Tick Vector, Ixodes scapularis

    Czech Academy of Sciences Publication Activity Database

    Villar, M.; Ayllón, N.; Kocan, K.M.; Bonzón-Kulichenko, E.; Alberdi, P.; Blouin, E.F.; Weisheit, S.; Mateos-Hernández, L.; Cabezas-Cruz, A.; Bell-Sakyi, L.; Vancová, Marie; Bílý, Tomáš; Meyer, D.F.; Štěrba, Ján; Contreras, M.; Rudenko, Natalia; Grubhoffer, Libor; Vázquez, J.; de la Fuente, J.

    2015-01-01

    Roč. 10, č. 9 (2015), e0137237. E-ISSN 1932-6203 R&D Projects: GA MŠk(CZ) EE2.3.30.0032 EU Projects: European Commission(XE) 238511; European Commission(XE) 278976 Institutional support: RVO:60077344 Keywords : secretion system * outer membrane vesicles * gene expression Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 3.234, year: 2014

  19. Molecular Detection of Zoonotic Rickettsiae and Anaplasma spp. in Domestic Dogs and Their Ectoparasites in Bushbuckridge, South Africa.

    Science.gov (United States)

    Kolo, Agatha O; Sibeko-Matjila, Kgomotso P; Maina, Alice N; Richards, Allen L; Knobel, Darryn L; Matjila, Paul T

    2016-04-01

    Members of the order Rickettsiales are small, obligate intracellular bacteria that are vector-borne and can cause mild to fatal diseases in humans worldwide. There is little information on the zoonotic rickettsial pathogens that may be harbored by dogs from rural localities in South Africa. To characterize rickettsial pathogens infecting dogs, we screened 141 blood samples, 103 ticks, and 43 fleas collected from domestic dogs in Bushbuckridge Municipality, Mpumalanga Province of South Africa, between October 2011 and May 2012 using the reverse line blot (RLB) and Rickettsia genus and species-specific quantitative real-time PCR (qPCR) assays. Results from RLB showed that 49% of blood samples and 30% of tick pools were positive for the genus-specific probes for Ehrlichia/Anaplasma; 16% of the blood samples were positive for Ehrlichia canis. Hemoparasite DNA could not be detected in 36% of blood samples and 30% of tick pools screened. Seven (70%) tick pools and both flea pools were positive for Rickettsia spp; three (30%) tick pools were positive for Rickettsia africae; and both flea pools (100%) were positive for Rickettsia felis. Sequencing confirmed infection with R. africae and Candidatus Rickettsia asemboensis; an R. felis-like organism from one of the R. felis-positive flea pools. Anaplasma sp. South Africa dog strain (closely related to Anaplasma phagocytophilum), A. phagocytophilum, and an Orientia tsutsugamushi-like sequence were identified from blood samples. The detection of emerging zoonotic agents from domestic dogs and their ectoparasites in a rural community in South Africa highlights the potential risk of human infection that may occur with these pathogens. PMID:26974185

  20. Prevalence of Anaplasma, Bartonella and Borrelia Species in Haemaphysalis longicornis collected from goats in North Korea.

    Science.gov (United States)

    Kang, Jun-Gu; Ko, Sungjin; Smith, W Barney; Kim, Heung-Chul; Lee, In-Yong; Chae, Joon-Seok

    2016-06-30

    North Korea is located on the northern part of the Korean Peninsula in East Asia. While tick-borne pathogens of medical and veterinary importance have been reported from China and South Korea, they have not been reported from North Korea. To screen for zoonotic tick-borne pathogens in North Korea, ticks were collected from domestic goats. A total of 292 (27 nymph, 26 male, 239 female) Haemaphysalis (H.) longicornis were collected and assayed individually for selected tick-borne pathogens. A total of 77 (26.4%) were positive for Anaplasma bovis, followed by Bartonella (B.) grahamii (15, 5.1%), Anaplasma phagocytophilum (12, 4.1%), Bartonella henselae (10, 3.4%), and Borrelia spp. (3, 1.0%) based on 16S ribosomal RNA and ITS species-specific nested polymerase chain reaction. Using the groEL-based nested PCR, a total of 6 and 1 H. longicornis were positive for B. grahamii and B. henselae, respectively. All products were sequenced and demonstrated 100% identity and homology with previously reported sequences from other countries in GenBank. This is the first report of the detection of tick-borne pathogens in the North Korea and suggests that farm animals may act as reservoirs for zoonotic tick-borne pathogens. PMID:26645342

  1. Serological and molecular investigation of Ehrlichia spp. and Anaplasma spp. in ticks and blood of dogs, in the Thrace Region of Turkey.

    Science.gov (United States)

    Çetinkaya, Handan; Matur, Erdal; Akyazi, İbrahim; Ekiz, Elif Ergul; Aydin, Levent; Toparlak, Mufit

    2016-07-01

    In recent years, tick-borne diseases like ehrlichiosis and anaplasmosis became widespread worldwide threatening the health of both human and companion animals. Therefore, the aim of this study was to determine the presence of Anaplasma spp., and Ehrlichia spp. in dogs and ticks in the Thrace Region of Turkey. A total of 400 blood samples and 912 ticks were collected from dogs living in shelters that are located in four cities (Istanbul, Edirne, Tekirdag and Kirklareli) of the Thrace Region. Blood and buffy coat smears were prepared for microscopic examination. Hematologic and serologic analyses were performed using cell counter and commercial Snap3Dx test kit, respectively. Eight hundred fifty of collected ticks were classified as Rhipicephalus sanguineus, 33 as Rhipicephalus turanicus and 29 as Ixodes ricinus. After DNA extraction from blood samples and pooled ticks (127 tick pools, in total), nested PCR was performed to detect the DNA of Anaplasma spp., and Ehrlichia spp. The seroprevalence of Ehrlichia canis was 27.25% (109) by Snap3Dx test and the total molecular positivity was 11.75% (47) in dog blood samples and 21.25% (27) in tick pools by nested PCR. The frequencies of the infected blood samples with E. canis, Anaplasma phagocytophilum and Anaplasma platys were detected as 6%, 4% and 6%, respectively. E. canis and A. platys were detected in R. sanguineus pools with a ratio of 15.75% and 0.7%, respectively. In addition, A. platys was also detected in R. turanicus pools (0.7%). A. phagocytophilum was found only in I. ricinus pools (3.93%). Morulae of three species were detected in buffy coat and blood smears. While anemia was observed in dogs infected with E. canis and co-infected (with one or more species), thrombocytopenia was observed only in co-infected dogs. This is the first study providing evidence for the presence of Anaplasma spp. and Ehrlichia spp. in dogs and ticks in the Thrace Region of Turkey. Based on the results of the tests used in this study

  2. Molecular characterization and specific detection of Anaplasma species (AP-sd) in sika deer and its first detection in wild brown bears and rodents in Hokkaido, Japan.

    Science.gov (United States)

    Moustafa, Mohamed Abdallah Mohamed; Lee, Kyunglee; Taylor, Kyle; Nakao, Ryo; Sashika, Mariko; Shimozuru, Michito; Tsubota, Toshio

    2015-12-01

    A previously undescribed Anaplasma species (herein referred to as AP-sd) has been detected in sika deer, cattle and ticks in Japan. Despite being highly similar to some strains of A. phagocytophilum, AP-sd has never been detected in humans. Its ambiguous epidemiology and the lack of tools for its specific detection make it difficult to understand and interpret the prevalence of this Anaplasma species. We developed a method for specific detection, and examined AP-sd prevalence in Hokkaido wildlife. Our study included 250 sika deer (Cervus nippon yesoensis), 13 brown bears (Ursus arctos yesoensis) and 252 rodents including 138 (Apodemus speciosus), 45 (Apodemus argenteus), 42 (Myodes rufocanus) and 27 (Myodes rutilus) were collected from Hokkaido island, northern Japan, collected during 2010 to 2015. A 770 bp and 382 bp segment of the 16S rRNA and gltA genes, respectively, were amplified by nested PCR. Results were confirmed by cloning and sequencing of the positive PCR products. A reverse line blot hybridization (RLB) based on the 16S rRNA gene was then developed for the specific detection of AP-sd. The prevalence of AP-sd by nested PCR in sika deer was 51% (128/250). We detected this Anaplasma sp. for the first time in wild brown bears and rodents with a prevalence of 15% (2/13) and 2.4% (6/252), respectively. The sequencing results of the 16S rRNA and gltA gene amplicons were divergent from the selected A. phagocytophilum sequences in GenBank. Using a newly designed AP-sd specific probe for RLB has enabled us to specifically detect this Anaplasma species. Besides sika deer and cattle, wild brown bears and rodents were identified as potential reservoir hosts for AP-sd. This study provided a high throughput molecular method that specifically detects AP-sd, and which can be used to investigate its ecology and its potential as a threat to humans in Japan. PMID:26431688

  3. Varying influences of selection and demography in host-adapted populations of the tick-transmitted bacterium, Anaplasma phagocytophilum

    OpenAIRE

    Aardema, Matthew L.; von Loewenich, Friederike D.

    2015-01-01

    Background The host range of a pathogenic bacterial strain likely influences its effective population size, which in turn affects the efficacy of selection. Transmission between competent hosts may occur more frequently for host generalists than for specialists. This could allow higher bacterial population densities to persist within an ecological community and increase the efficacy of selection in these populations. Conversely, specialist strains may be better adapted to their hosts and cons...

  4. Systems Biology of Tissue-Specific Response to Anaplasma phagocytophilum Reveals Differentiated Apoptosis in the Tick Vector Ixodes scapularis

    Czech Academy of Sciences Publication Activity Database

    Ayllón, N.; Villar, M.; Galindo, R. C.; Kocan, K.M.; Šíma, Radek; López, J.A.; Vázquez, J.; Alberdi, P.; Cabezas-Cruz, A.; Kopáček, Petr; de la Fuente, J.

    2015-01-01

    Roč. 11, č. 3 (2015), e1005120. ISSN 1553-7404 R&D Projects: GA MŠk(CZ) EE2.3.30.0032; GA ČR GP13-12816P Institutional support: RVO:60077344 Keywords : gene expression * human neutrophils * cancer cells Subject RIV: EC - Immunology Impact factor: 8.167, year: 2013

  5. The Life and Death of Anaplasma

    Centers for Disease Control (CDC) Podcasts

    2012-03-30

    Dr. Setu Vora, medical director of critical care and physician director of performance improvement at Backus Hospital in Norwich, Connecticut, reads his poem The Life and Death of Anaplasma and discusses the poem’s origins.  Created: 3/30/2012 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 4/2/2012.

  6. Molecular Characterization of Anaplasma and Ehrlichia Species in Different Cattle Breeds and Age Groups in Mbarara District (Western Uganda

    Directory of Open Access Journals (Sweden)

    Muhanguzi Dennis

    2010-07-01

    Full Text Available Anaplasma and Ehrlichia sp. (AEs cause significant economic losses to the livestock sector in Uganda. The aim of this study was to determine the prevalence of AEs in cattle from Kashaari county-Mbarara district (Uganda so as to compare the prevalence of AEs in different cattle breeds, age groups, sub county of origin and management systems and predictor(s of infection with AEs. Such information is deemed necessary to direct future tick-borne disease control programs. A single pair of primers w as used to am plify a 492-498bp fragment of the 16SRNA gene spanning the V1 region conserved for both AEs. PCR products were transferred onto the Reverse Line Blot (RLB membrane and AEs amplicons in the PCR products allowed to hybridize with AE species-specific oligonucleotides. The prevalence of Ehrlichia sp. was 5.1% (CI = 95%, 2.9-7.3% whereas that of Anaplasma species was 5.3 % (C I = 95%, 3-7.6%. Individual AEs detected include; A. bovis (5.1%, CI = 95%, 2.9-7.3%, E. ruminantium (4.5% , CI = 95%, 2.4-6.6%, A. marginale (3.7%, CI = 95%, 1.8-5.6%, A. (E. phagocytophilum (2.7%, CI = 95%, 1.1-4.3% , E. ovina/canis (2.7%, CI = 95%; 1.1-4.3%, E. sp. (omatjenne(1.9%, CI = 95 %, 0.5-3.3%. Cattle breed was found to be the best predictor of infection. To further understand bovine tick-borne parasites in Uganda, we recommend that studies covering a wider area and over longer periods, investigation of breed as a predictor of infection, molecular genetic characterization, transmission and pathogenicity studies on the different strains of AEs be carried out.

  7. Detection of Rickettsia and Anaplasma from hard ticks in Thailand.

    Science.gov (United States)

    Malaisri, Premnika; Hirunkanokpun, Supanee; Baimai, Visut; Trinachartvanit, Wachareeporn; Ahantarig, Arunee

    2015-12-01

    We collected a total of 169 adult hard ticks and 120 nymphs from under the leaves of plants located along tourist nature trails in ten localities. The results present data examining the vector competence of ticks of different genera and the presence of Rickettsia and Anaplasma species. The ticks belonged to three genera, Amblyomma, Dermacentor, and Haemaphysalis, comprising 11 species. Rickettsia bacteria were detected at three collection sites, while Anaplasma bacteria were detected at only one site. Phylogenetic analysis revealed new rickettsia genotypes from Thailand that were closely related to Rickettsia tamurae, Rickettsia monacensis, and Rickettsia montana. This study was also the first to show that Anaplasma bacteria are found in Haemaphysalis shimoga ticks and are closely related evolutionarily to Anaplasma bovis. These results provide additional information for the geographical distribution of tick species and tick-borne bacteria in Thailand and can therefore be applied for ecotourism management. PMID:26611960

  8. Complete Genome Sequence of Anaplasma marginale subsp. centrale

    Science.gov (United States)

    Anaplasma marginale subsp. centrale is a naturally attenuated subtype that has been used as a vaccine for a century. We sequenced the genome of this organism and compared it to those of virulent senso stricto A. marginale strains. The comparison markedly narrows the number of outer membrane protein ...

  9. Genetic diversity of anaplasma species major surface proteins and implications for anaplasmosis serodiagnosis and vaccine development

    OpenAIRE

    de la Fuente, J.; Lew, A.; Lutz, H.; Meli, M. L.; Hofmann-Lehmann, R.; Shkap, V; Molad, T; Mangold, A J; Almazán, C; Naranjo, V.; Gortázar, C.; Torina, A; Caracappa, S.; García-Pérez, A. L.; Barral, M.

    2005-01-01

    The genus Anaplasma (Rickettsiales: Anaplasmataceae) includes several pathogens of veterinary and human medical importance. An understanding of the diversity of Anaplasma major surface proteins (MSPs), including those MSPs that modulate infection, development of persistent infections, and transmission of pathogens by ticks, is derived in part, by characterization and phylogenetic analyses of geographic strains. Information concerning the genetic diversity of Anaplasma spp. MSPs will likely in...

  10. Anaplasma marginale and Theileria annulata in questing ticks from Portugal.

    Science.gov (United States)

    Antunes, S; Ferrolho, J; Domingues, N; Santos, A S; Santos-Silva, M M; Domingos, A

    2016-09-01

    Ticks are ubiquitous arthropods and vectors of several pathogenic agents in animals and humans. Monitoring questing ticks is of great importance to ascertain the occurrence of pathogens and the potential vector species, offering an insight into the risk of disease transmission in a given area. In this study 428 host-seeking ticks, belonging to nine species of Ixodidae and collected from 17 of the 23 Portuguese mainland subregions, were screened for several tick-borne agents with veterinary relevance: Anaplasma marginale, Anaplasma ovis, Anaplasma centrale, Babesia spp., Coxiella burnetii and Theileria spp. Prevalence was assessed by PCR and amplified amplicons sequenced for validation of results. Twenty ticks, in a total of 428, were found positive: one Ixodes ventalloi for Theileria annulata and four Dermacentor marginatus, one Haemaphysalis punctata, five Ixodes ricinus, five I. ventalloi, and four Rhipicephalus sanguineus sensu lato for A. marginale. According to the reviewed literature, this is the first report of A. marginale and T. annulata detection in I. ventalloi. Furthermore, the amplification of A. marginale DNA in several tick species suggests a broad range for this agent in Portugal that might include other uncommon species as R. sanguineus s.l. This work provides new data towards a better understanding of tick-pathogen associations and also contributes to the surveillance of tick-borne agents in geographic areas with limited information. PMID:27394441

  11. Nuclease Tudor-SN Is Involved in Tick dsRNAMediated RNA Interference and Feeding but Not in Defense against Flaviviral or Anaplasma phagocytophilum Rickettsial Infection

    Czech Academy of Sciences Publication Activity Database

    Ayllón, N.; Naranjo, V.; Hajdušek, Ondřej; Villar, M.; Galindo, R. C.; Kocan, K.M.; Alberdi, P.; Šíma, Radek; Cabezas-Cruz, A.; Rückert, C.; Bell-Sakyi, L.; Kazimírová, M.; Havlíková, S.; Klempa, B.; Kopáček, Petr; de la Fuente, J.

    2015-01-01

    Roč. 10, č. 7 (2015), e0133038. E-ISSN 1932-6203 R&D Projects: GA MŠk(CZ) EE2.3.30.0032; GA ČR GP13-12816P EU Projects: European Commission(XE) 316304 Institutional support: RVO:60077344 Keywords : disease * proteins * cell lines Subject RIV: EC - Immunology Impact factor: 3.234, year: 2014

  12. Exploiting Exploitation Cinema: an Introduction

    OpenAIRE

    Roche, David

    2016-01-01

    What is exploitation cinema? Exploitation cinema is not a genre; it is an industry with a specific mode of production. Exploitation films are made cheap for easy profit. “Easy” because they are almost always genre films relying on time-tried formulas (horror, thillers, biker movies, surfer movies, women-in-prison films, martial arts, subgenres like gore, rape-revenge, slashers, nazisploitation, etc.). “Easy” because they offer audiences what they can’t get elsewhere: sex, violence and taboo t...

  13. Molecular detection of Anaplasma platys, Ehrlichia canis, Hepatozoon canis and Rickettsia monacensis in dogs from Maio Island of Cape Verde archipelago.

    Science.gov (United States)

    Lauzi, Stefania; Maia, João P; Epis, Sara; Marcos, Ricardo; Pereira, Cristina; Luzzago, Camilla; Santos, Marta; Puente-Payo, Pablo; Giordano, Alessia; Pajoro, Massimo; Sironi, Giuseppe; Faustino, Augusto

    2016-07-01

    Tick-borne diseases are emerging worldwide and have an important zoonotic relevance. Dogs play an important role in the epidemiology of several zoonotic tick-borne pathogens acting as sentinels and/or reservoirs. This study focused on the molecular identification of tick-borne pathogens in blood samples of 153 autochthonous asymptomatic dogs in Maio Island, Cape Verde archipelago. Eighty-four (54.9%) dogs were positive for one or more pathogens. Fifty-five (35.9%) dogs were infected with Hepatozoon canis, 53 (34.6%) with Anaplasma platys, five (3.3%) with Ehrlichia canis and Rickettsia monacensis, an emerging human pathogen, was also identified in a single dog (0.7%). The former three pathogens cause important canine tick-borne diseases that are transmitted or potentially transmitted by Rhipicephalus sanguineus s.l., the only hard tick identified in Cape Verde. Furthermore, Wolbachia spp. was amplified from the blood of one dog. None of the dogs were positive for Anaplasma phagocytophilum, Borrelia burgdorferi sensu lato, Midichloria mitochondrii, Bartonella spp., Babesia spp. or Theileria spp. Fifty-four (35.3%) animals showed single infections and 30 (19.6%) co-infections, with A. platys and H. canis co-infection being the most frequent (28 dogs, 18.3%). The frequency of E. canis infection was statistically different among age groups (P=0.017), being higher among dogs older than 4 years compared to younger dogs. Infection by A. platys was also statistically different among age groups (P=0.031), being higher in dogs younger than 2 years compared to older dogs. The statistical analyses showed no significant association of PCR positivity with gender or location. The frequency of tick-borne pathogens detected in dogs in Maio Island, including R. monacensis, highlights the need to improve diagnosis and control in order to prevent the risk of transmission of these pathogens among dogs and humans living in or travelling to this touristic island. PMID:27177475

  14. Molecular study on infection rates of Anaplasma ovis and Anaplasma marginale in sheep and cattle in West-Azerbaijan province, Iran.

    Science.gov (United States)

    Noaman, Vahid; Bastani, Davood

    2016-01-01

    This study was carried out to determine the presence and frequency of Anaplasma ovis and Anaplasma marginale in sheep and dairy cattle in West-Azerbaijan province, Iran. A total number of 200 blood samples were randomly collected via the jugular vein from apparently healthy cattle (100) and sheep (100). The extracted DNA from blood cells was screened using genus-specific (Anaplasma spp.) nested-polymerase chain reaction (PCR) based on 16S rRNA gene primer sets. Species-specific PCR was set up using major surface protein 4 (MSP4) gene primer set. None of cattle blood samples were positive for Anaplasma spp. by the first nested PCR. Five samples among the 100 sheep blood samples were both positive in the first nested PCR and A. ovis -specific PCR, based on MSP4 gene. In total, 5.00% of animals were A. ovis positive. This study identified a low prevalence of A. ovis in the blood of apparently healthy sheep in West Azerbaijan province. PMID:27482362

  15. Comparative study of Anaplasma parasites in tick carrying buffaloes and cattle

    Institute of Scientific and Technical Information of China (English)

    RAJPUT Z.I.; HU Song-hua; ARIJO A.G.; HABIB M.; KHALID M.

    2005-01-01

    A comparative study on the prevalence of Anaplasma parasite was conducted on ticks carrying buffaloes and cattle.Five hundred blood samples of both animals (250 of each) were collected during February, March and April. Thin blood smears on glass slides were made, fixed in 100% methyl alcohol and examined. Microscopic examination revealed that 205 (41%) animals had Anaplasma parasites, out of which 89, 44 and 72 animals had Anaplasma marginale, Anaplasma centrale and mixed infection respectively. Infected buffaloes and cattle were 75 and 130 respectively. The infection in female was 53 and 92 in buffaloes and cattle respectively. Twenty-two and 92 blood samples of male were found positive in buffaloes and cattle respectively. Comparative study revealed that the cattle were 26.82% more susceptible than buffaloes. The parasite prevailing percentage in female of both animals was slightly higher than that of the male. This investigation was aimed at studying the comparative prevalence of Anaplasma parasite in tick carrying buffaloes and cattle.

  16. Gamma irradiation attenuation of Anaplasma Marginale and its possible use as vaccine against bovine anaplasmosis

    International Nuclear Information System (INIS)

    Bovine Anaplasmosis is one of the limiting in the cattle development at Colombia and others tropical countries. Bovine Anaplasmosis is an infectious disease caused by a microorganism called Anaplasma Marginale, it with invades the red globules producing erythrofagocitosis. In this job, were irradiated with different gamma beam intensity; microorganisms of Anaplasma Marginale, those which were used as innocuous. Animals of the groups (I,II,III) presented good protection against the disease; animals of the Group IV presented mild symptoms with subsequent recovery and strong symptoms

  17. Immune responses in cattle vaccinated with gamma-irradiated Anaplasma marginale

    International Nuclear Information System (INIS)

    The infectivity and immunogenecity of gamma-irradiated Anaplasma marginale organisms were studied in bovine calves. The severity of Anaplasma infection based on per cent infected red blood cells, haematological values and mortality was more in animals immunized with blood exposed to 60 kR in comparison to those inoculated with blood irradiated at 70, 80 and 90 kR. The immunizing controls demonstrated a significantly high parasitaemia, marked anaemia and more deaths. Marked and prolonged cell-mediated and humoral immune responses detectable in the first 3 weeks of post-immunization may be responsible for conferring of protective immunity. (author)

  18. Identification of Anaplasma marginale type IV secretion system effector proteins.

    Directory of Open Access Journals (Sweden)

    Svetlana Lockwood

    Full Text Available BACKGROUND: Anaplasma marginale, an obligate intracellular alphaproteobacterium in the order Rickettsiales, is a tick-borne pathogen and the leading cause of anaplasmosis in cattle worldwide. Complete genome sequencing of A. marginale revealed that it has a type IV secretion system (T4SS. The T4SS is one of seven known types of secretion systems utilized by bacteria, with the type III and IV secretion systems particularly prevalent among pathogenic Gram-negative bacteria. The T4SS is predicted to play an important role in the invasion and pathogenesis of A. marginale by translocating effector proteins across its membrane into eukaryotic target cells. However, T4SS effector proteins have not been identified and tested in the laboratory until now. RESULTS: By combining computational methods with phylogenetic analysis and sequence identity searches, we identified a subset of potential T4SS effectors in A. marginale strain St. Maries and chose six for laboratory testing. Four (AM185, AM470, AM705 [AnkA], and AM1141 of these six proteins were translocated in a T4SS-dependent manner using Legionella pneumophila as a reporter system. CONCLUSIONS: The algorithm employed to find T4SS effector proteins in A. marginale identified four such proteins that were verified by laboratory testing. L. pneumophila was shown to work as a model system for A. marginale and thus can be used as a screening tool for A. marginale effector proteins. The first T4SS effector proteins for A. marginale have been identified in this work.

  19. The Ethics of Exploitation

    OpenAIRE

    Paul McLaughlin

    2008-01-01

    Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to dem...

  20. Detection of genetic diversity of Anaplasma marginale isolates in Minas Gerais, Brazil

    Czech Academy of Sciences Publication Activity Database

    Pohl, A.E.; Cabezas Cruz, Alejandro; Ribeiro, M.F.B.; Goncalves da Silvera, J.; Silaghi, C.; Pfister, K.; Friche Passos, L.M.

    2013-01-01

    Roč. 22, č. 1 (2013), s. 129-135. ISSN 1984-2961 Institutional support: RVO:60077344 Keywords : Anaplasma marginale * MSP1a * DNA sequencing * microsatellites * tandem repeats * Brazil Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 0.961, year: 2013

  1. Subdominant outer membrane antigens in anaplasma marginale: conservation, antigenicity, and protective capacity using recombinant protein

    Science.gov (United States)

    Anaplasma marginale is a tick-borne rickettsial pathogen of cattle with a worldwide distribution. Currently a safe and efficacious vaccine is unavailable. Outer membrane protein (OMP) extracts or a well- defined surface protein complex reproducibly induce protective immunity. However, there are seve...

  2. The Ethics of Exploitation

    Directory of Open Access Journals (Sweden)

    Paul McLaughlin

    2008-11-01

    Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.

  3. A molecular epidemiological survey of Babesia, Hepatozoon, Ehrlichia and Anaplasma infections of dogs in Japan

    OpenAIRE

    KUBO, Shotaro; TATENO, Morihiro; ICHIKAWA, Yasuaki; ENDO, Yasuyuki

    2015-01-01

    Tick-borne diseases are often encountered in canine clinical practice. In the present study, a molecular epidemiological survey of dogs in Japan was conducted to understand the prevalence and geographical distribution of Babesia spp., Hepatozoon spp., Ehrlichia spp. and Anaplasma spp. Pathogen-derived DNA in blood samples obtained from 722 dogs with a history of exposure to ticks and/or fleas was examined by PCR. The prevalence of Babesia gibsoni, Babesia odocoilei-like species, Hepatozoon ca...

  4. First case of Anaplasma platys infection in a dog from Croatia

    Directory of Open Access Journals (Sweden)

    Dyachenko Viktor

    2012-03-01

    Full Text Available Abstract Background It is known that Anaplasma (A. platys, the causative agent of infectious canine cyclic thrombocytopenia, is endemic in countries of the Mediterranean basin. However, few reports are available from the Balkans. This case report describes a dog, which was imported from Croatia to Germany in May 2010. One month later the dog was presented to a local veterinarian in Germany due to intermittent/recurrent diarrhoea. Diagnostic tests were performed to identify infections caused by Anaplasma spp., Ehrlichia spp., Hepatozoon canis, Babesia spp., Leishmania spp., Borrelia burgdorferi and/or Dirofilaria immitis. Findings Haematological examination of a blood smear revealed basophilic inclusions in thrombocytes, which were confirmed as A. platys with a species-specific real-time PCR. Additionally, an infection with Babesia (B. vogeli was also detected (PCR and serology. No specific antibodies against Anaplasma antigen were detectable. Although the dog showed no specific clinical signs, thrombocytopenia, anaemia and elevated C-reactive protein (CRP were observed. Sequencing of a 1,348-bp partial ribosomal RNA gene revealed highest homology to A. platys sequences from Thailand, Japan and France. Conclusions A. platys was detected for first time in a dog imported from Croatia. As the dog was also co-infected by B. vogeli, unique serological and haematological findings were recorded. Thrombocytopenia, anaemia and elevated values of C-reactive protein were the laboratory test abnormalities observed in this case. A. platys infections should be considered in dogs coming from Croatia and adjacent regions.

  5. Comparison of the Efficiency of Biological Transmission of Anaplasma marginale (Rickettsiales: Anaplasmataceae) by Dermacentor andersoni Stiles (Acari: Ixodidae) with Mechanical Transmission by the Horse Fly, Tabanus fuscicos

    Science.gov (United States)

    Mechanical transmission of Anaplasma marginale by horse flies (Tabanidae) is thought to be epidemiologically significant in some areas of the US. We compared the relative efficiencies of mechanical transmission of Anaplasma marginale by the horse fly, Tabanus fuscicostatus Hine during acute infectio...

  6. Anthropology of sexual exploitation

    Directory of Open Access Journals (Sweden)

    Lalić Velibor

    2009-01-01

    Full Text Available In this paper, the authors observe sexual exploitation from an anthropological perspective. They analyze the rational, ethical, emotional and mythological dimensions of human sexuality. Consequently, after setting the phenomenon in a social and historical context, sexual exploitation is closely observed in the contemporary age. Based on thoughts of relevant thinkers, they make the conclusion that the elimination of sexual exploitation is not an utterly legal issue, but political and economical issues as well. Namely, legal norms are not sufficient to overcome sexual exploitation, but, political and economical relationships in contemporary societies, which will be based on sincere equal opportunities must be established.

  7. The Facets of Exploitation

    OpenAIRE

    Fleurbaey, Marc

    2012-01-01

    This paper proposes four concepts of exploitation that encapsulate common uses of the word in social interactions: unfair advantage, unequal exchange, using persons as means, free-riding. It briefly discusses how these concepts appear in the literature (the first two are prominent in Roemer's classical work), and then examines how these forms of exploitation are related and how they can occur.

  8. EXPLOITATION OF GRANITE BOULDER

    Directory of Open Access Journals (Sweden)

    Ivan Cotman

    1994-12-01

    Full Text Available The processes of forming, petrography, features, properties and exploitation of granite boulders are described. The directional drilling and black powder blasting is the succesful method in exploitation of granite boulders (boulder technology (the paper is published in Croatian.

  9. First Molecular Characterization of Anaplasma marginale in Cattle and Rhipicephalus (Boophilus) microplus Ticks in Cebu, Philippines

    OpenAIRE

    YBAÑEZ, Adrian Patalinghug; Sivakumar, Thillaiampalam; YBAÑEZ, Rochelle Haidee Daclan; RATILLA, Jowarren Catingan; PEREZ, Zandro Obligado; GABOTERO, Shirleny Reyes; Hakimi, Hassan; KAWAZU, Shin-Ichiro; MATSUMOTO, Kotaro; Yokoyama, Naoaki; INOKUMA, Hisashi; 河津, 信一郎; 松本, 高太郎; 横山, 直明; 猪熊,壽

    2013-01-01

    Anaplasma marginale has been detected in the Philippines only by peripheral blood smear examination and serological methods. This study generally aimed to molecularly detect and characterize A. marginale in cattle and ticks in Cebu, Philippines. A total of 12 bovine blood samples and 60 Rhipicephalus (Boophilus) microplus ticks were collected on the Cebu Island in 2011. 16S rRNA-based screening-PCR and DNA sequencing revealed 8 cattle (66.7%) and 8 ticks (13.3%) to be positive for A. marginal...

  10. DOREMI - Exploitation plan

    OpenAIRE

    Lupi??ez-Villanueva, Francisco; Colombo, Matteo; Vozzi, Federico; Ferro, Erina; Fortunati, Luigi; Palumbo, Filippo

    2014-01-01

    The objective of this report is to outline the DOREMI solution exploitation strategy that will be followed to define the exploitation plan of DOREMI consortium. The exploitation plan will be developed during the project life cycle and reported in the deliverables 7.3.1, 7.3.2 and 7.3.3. The main element of the report is the definition of the target markets that would be addressed by DOREMI products and services. According to the analysis conducted in the report, the target market relies on tw...

  11. FAQ: Child Sexual Exploitation

    Science.gov (United States)

    ... Support FAQ: Child Sexual Exploitation What is child pornography? Federal law (18 U.S.C. §2256(8)) defines ... person under the age of 18. Is child pornography a crime? It is a federal crime to ...

  12. Molecular characterization of two different strains of haemotropic mycoplasmas from a sheep flock with fatal haemolytic anaemia, concomitant Anaplasma ovis infection

    OpenAIRE

    Hornok, Sándor; Meli, Marina L; Erdős, András; Hajtós, István; Lutz, Hans; Hofmann-Lehmann, Regina

    2009-01-01

    Molecular characterization of two different strains of haemotropic mycoplasmas from a sheep flock with fatal haemolytic anaemia, concomitant Anaplasma ovis infection HUNGARY (Hornok, Sandor) HUNGARY Received: 2008-08-03 Revised: 2008-10-27 Accepted: 2008-10-29

  13. Dissemination and Exploitation Strategy

    DEFF Research Database (Denmark)

    Badger, Merete; Monaco, Lucio; Fransson, Torsten; Farinetti, Laura; Corno, Fulvio; Vercoulen, Frank

    Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy for...... project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...

  14. Natural infection of Anaplasma platys in dogs from Umbria region (Central Italy

    Directory of Open Access Journals (Sweden)

    Maria Teresa Antognoni

    2014-03-01

    Full Text Available Anaplasma platys is a tick-borne pathogen causing the Infectious Canine Cyclic Thrombocytopenia. The pathogenesis of this disease is not yet well understood, due to the wide variety of clinico-pathological patterns described worldwide and to the high prevalence of co-infections with other vector-borne pathogens occurring in endemic areas. The present paper reports 3 cases of infection by A. platys occurring in dogs native to Central Italy, considered a non-endemic area to date. Infections were initially diagnosed based on clinical data and observation of morulae within platelets and then confirmed by biomolecular techniques. Moreover, two dogs showed an immune-mediated hemolytic anemia, as yet not described in literature in association with A. platys infection. The symptoms and the pathological findings observed will be discussed, as well as the importance to include this pathogen in the differential diagnosis of tick-borne diseases even in Central Italy.

  15. Comparison of Microscopy and PCR-RFLP for detection of Anaplasma marginale in carrier cattle

    Directory of Open Access Journals (Sweden)

    P Shayan

    2010-09-01

    Full Text Available Background and Objectives: In Iran, anaplasmosis is normally diagnosed with traditional Giemsa staining method. This is not applicable for identification of the carrier animals. The aim of this study was to compare the detection of Anaplasma marginale in two different numbers of microscopic fields (50 and 100 using conventional Giemsa staining method compared with the PCR-RFLP technique."nMaterials and Methods: In this study, examinations were performed on 150 blood samples from cattle without clinical signs. Sensitivity and specificity of two microscopic fields (50 and 100 fields were compared with A. marginale specific PCR-RFLP. The degree of agreement between PCR-RFLP and the two microscopic tests was determined by Kappa (κ values with 95% confidence intervals."nResults: PCR-RFLP showed that 58 samples were A. marginale, while routine microscopy showed erythrocytes harboring Anaplasma like structures in 16 and 75 blood samples determined in 50 and 100 microscopic fields respectively. Examination of 50 and 100 microscopic fields showed 25.8% and 91.4% sensitivity and 99% and 76.1% specificity compared to 100% sensitivity and specificity by PCR-RFLP. The Kappa coefficient between PCR-RFLP and Microscopy (50 fields indicated a fair level of agreement (0.29. The Kappa coefficient between PCR-RFLP and Microscopy (100 fields indicated a good level of agreement (0.64"nConclusion: Our results showed that the microscopic examination remains the convenient technique for day-to-day diagnosis of clinical cases in the laboratory but for the detection of carrier animal with low bacteremia, microscopy with 100 fields is preferable to Microscopy with 50 fields and molecular methods such as PCR-RFLP can be used as a safe method for identifying cattle persistently infected with A. marginale.

  16. Molecular evidence of potential novel spotted fever group rickettsiae, Anaplasma and Ehrlichia species in Amblyomma ticks parasitizing wild snakes

    OpenAIRE

    Kho, Kai Ling; Koh, Fui Xian; Tay, Sun Tee

    2015-01-01

    Background Amblyomma ticks parasitize a wide range of animals in tropical regions. This study describes the identification of Amblyomma ticks from wild snakes in Malaysia and the detection of potential human pathogens such as Rickettsia, Anaplasma, Ehrlichia and bartonellae in the ticks. Findings Twenty one adult ticks (twelve A. varanense and nine Amblyomma helvolum ticks) identified from seven Python molurus snakes in Sepang and a pool of six A. helvolum ticks from a Naja sumatrana snake in...

  17. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  18. M-Commerce Exploitation

    DEFF Research Database (Denmark)

    Ulhøi, John Parm; Jørgensen, Frances

    2008-01-01

    SMEs venturing into business ventures utilizing mobile devices via wireless communication for commercial purposes, or Mobile commerce (M-commerce), need to be adept at both exploiting cutting edge technology and managing intense collaboration between a host of network participants. Successful entry...... into this emerging market may well depend on development of new business models that emphasize the socio-technical intricacies of these networks. The objective of this paper is to examine the development of these networks as a central part of new M-commerce business models in SME's and report on...... initial findings from the preliminary phase of the project that is aimed at exploring, describing, and facilitating the development of new business models for M-commerce in SME's in Denmark. Data have been collected through in-depth interviews. The paper contributes to theory relative to M...

  19. Biotechnological exploitation of microalgae.

    Science.gov (United States)

    Gangl, Doris; Zedler, Julie A Z; Rajakumar, Priscilla D; Martinez, Erick M Ramos; Riseley, Anthony; Włodarczyk, Artur; Purton, Saul; Sakuragi, Yumiko; Howe, Christopher J; Jensen, Poul Erik; Robinson, Colin

    2015-12-01

    Microalgae are a diverse group of single-cell photosynthetic organisms that include cyanobacteria and a wide range of eukaryotic algae. A number of microalgae contain high-value compounds such as oils, colorants, and polysaccharides, which are used by the food additive, oil, and cosmetic industries, among others. They offer the potential for rapid growth under photoautotrophic conditions, and they can grow in a wide range of habitats. More recently, the development of genetic tools means that a number of species can be transformed and hence used as cell factories for the production of high-value chemicals or recombinant proteins. In this article, we review exploitation use of microalgae with a special emphasis on genetic engineering approaches to develop cell factories, and the use of synthetic ecology approaches to maximize productivity. We discuss the success stories in these areas, the hurdles that need to be overcome, and the potential for expanding the industry in general. PMID:26400987

  20. The Geohazards Exploitation Platform

    Science.gov (United States)

    Laur, Henri; Casu, Francesco; Bally, Philippe; Caumont, Hervé; Pinto, Salvatore

    2016-04-01

    The Geohazards Exploitation Platform, or Geohazards TEP (GEP), is an ESA originated R&D activity of the EO ground segment to demonstrate the benefit of new technologies for large scale processing of EO data. This encompasses on-demand processing for specific user needs, systematic processing to address common information needs of the geohazards community, and integration of newly developed processors for scientists and other expert users. The platform supports the geohazards community's objectives as defined in the context of the International Forum on Satellite EO and Geohazards organised by ESA and GEO in Santorini in 2012. The GEP is a follow on to the Supersites Exploitation Platform (SSEP) an ESA initiative to support the Geohazards Supersites & Natural Laboratories initiative (GSNL). Today the GEP allows to exploit 70+ Terabyte of ERS and ENVISAT archive and the Copernicus Sentinel-1 data available on line. The platform has already engaged 22 European early adopters in a validation activity initiated in March 2015. Since September, this validation has reached 29 single user projects. Each project is concerned with either integrating an application, running on demand processing or systematically generating a product collection using an application available in the platform. The users primarily include 15 geoscience centres and universities based in Europe: British Geological Survey (UK), University of Leeds (UK), University College London (UK), ETH University of Zurich (CH), INGV (IT), CNR-IREA and CNR-IRPI (IT), University of L'Aquila (IT), NOA (GR), Univ. Blaise Pascal & CNRS (FR), Ecole Normale Supérieure (FR), ISTERRE / University of Grenoble-Alpes (FR). In addition, there are users from Africa and North America with the University of Rabat (MA) and the University of Miami (US). Furthermore two space agencies and four private companies are involved: the German Space Research Centre DLR (DE), the European Space Agency (ESA), Altamira Information (ES

  1. Learning Metasploit exploitation and development

    CERN Document Server

    Balapure, Aditya

    2013-01-01

    A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st

  2. Exploitation of Labour and Exploitation of Commodities: A "New Interpretation"

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2011-01-01

    In the standard Okishio-Morishima approach, the existence of profits is proved to be equivalent to the exploitation of labour. Yet, it can also be proved that the existence of profits is equivalent to the ‘exploitation’ of any good. Labour and commodity exploitation are just different numerical representations of the productiveness of the economy. This paper presents an alternative approach to exploitation theory which is related to the New Interpretation (Duménil 1980; Foley 1982). In this a...

  3. Introduction to the alpha-proteobacteria: Wolbachia and Bartonella, Rickettsia, Brucella, Ehrlichia, and Anaplasma.

    Science.gov (United States)

    Bowman, Dwight D

    2011-11-01

    Wolbachia is an obligate intracellular endosymbiont and likely mutualist living within the heartworm Dirofilaria immitis and a number of other filarial nematodes in the family Onchocercidae. The bacterial infection is passed from worm to worm transovarially; the organisms are in ovarian cells, the developing microfilariae, and multiply and persist in all later developmental stages through the mosquito and into the next host. Besides being present in the ovaries of the adult worms, they also are present in large numbers within the hypodermal tissues of the nematode. It is now know that these bacteria that were first observed in heartworms more than 30 years ago are actually related to similar Wolbachia bacteria that are found in arthropods. Wolbachia is an alpha-proteobacteria, and this group includes a number of important arthropod-transmitted bacterial agents of dogs and cats: Rickettsia rickettsii, R. felis, Anaplasma platys, Ehrlichia canis, E. chaffeensis, and E. ewingii. Alpha-proteobacteria are also important as obligate intracellular mutualists in plants in which they are responsible for nitrogen fixation. Recent work on the treatment of heartworms in dogs with doxycycline stems from related work with the human filarial nematode Onchocerca volvulus that causes river blindness in people. PMID:22152604

  4. First molecular survey of Anaplasma bovis in small ruminants from Tunisia.

    Science.gov (United States)

    Ben Said, Mourad; Belkahia, Hanène; Karaoud, Maroua; Bousrih, Maha; Yahiaoui, Mouna; Daaloul-Jedidi, Monia; Messadi, Lilia

    2015-09-30

    To date, no information is available regarding the presence of Anaplasma bovis in the South Mediterranean area. In this study, prevalence, risk factors, and genetic diversity of A. bovis were assessed in small ruminants. A total of 563 healthy small ruminants (260 sheep and 303 goats), from 25 randomly selected flocks located in 5 localities from two bioclimatic areas in Tunisia, were investigated for the detection of A. bovis in blood by nested polymerase chain reaction (nPCR) assay. The overall infection rates of A. bovis were 42.7 and 23.8% in sheep and goats, respectively. Goats located in a sub-humid area were statistically more infected than those located in a humid area. A. bovis prevalence rate varied significantly according to sheep and goat flocks, and to the sheep breed. Infection with A. bovis was validated by sequencing. Sequence analysis based on the 16S rRNA gene showed that A. bovis from Tunisian goats and sheep clustered with other strain sequences detected from wild and domestic animals and published in GenBank. This study gives the first insight of presence of A. bovis DNA in small ruminants in Tunisia and suggests that these animal species may be playing an important role in the bovine anaplasmosis natural cycle caused by A. bovis in the South Mediterranean ecosystem. PMID:26088935

  5. Evaluating the effectiveness of an inactivated vaccine from Anaplasma marginale derived from tick cell culture.

    Science.gov (United States)

    Lasmar, Pedro Veloso Facury; Carvalho, Antônio Último de; Facury Filho, Elias Jorge; Bastos, Camila Valgas; Ribeiro, Múcio Flávio Barbosa

    2012-01-01

    The protective efficacy of an inactivated vaccine from Anaplasma marginale that was cultured in tick cells (IDE8) for use against bovine anaplasmosis was evaluated. Five calves (Group 1) were inoculated subcutaneously, at 21-day intervals, with three doses of vaccine containing 3 × 10(9) A. marginale initial bodies. Five control calves received saline solution alone (Group 2). Thirty-two days after the final inoculation, all the calves were challenged with approximately 3 × 10(5) erythrocytes infected with A. marginale high-virulence isolate (UFMG2). The Group 1 calves seroconverted 14 days after the second dose of vaccine. After the challenge, all the animals showed patent rickettsemia. There was no significant difference (p > 0.05) between the Group 1 and 2 calves during the incubation period, patency period or convalescence period. All the animals required treatment to prevent death. The results suggest that the inactivated vaccine from A. marginale produced in IDE8 induced seroconversion in calves, but was not effective for preventing anaplasmosis induced by the UFMG2 isolate under the conditions of this experiment. PMID:22832750

  6. Detección de Anaplasma spp. en Garrapatas de Myrmecophaga tridactyla de Vida Libre en la Sabana Inundable de Casanare‚ Colombia -resumen-

    OpenAIRE

    César Rojano-Bolaño; V Contreras-Cogollo; L Miranda-Cortés; R Ávila-Avilán; Jorge Miranda-Regino; Laura Hernández-Fernández; Salim Mattar-Velilla; Santiago Monsalve-Buriticá

    2014-01-01

    La anaplasmosis es una enfermedad infecciosa causada por rickettsias del género Anaplasma spp. Su relevancia esta principalmente determinada por el grado de afectación endémica en el ganado doméstico. Una amplia variedad de mamíferos silvestres también son susceptibles a la infección. Las bacterias pueden ser intracitoplasmáticas‚ dañando las estructuras de las células pudiendo causar anemia e ictericia. Algunas especies de Anaplasma spp han sido reportadas como microorganismos potencialmente...

  7. Exploiting the plasma potential

    International Nuclear Information System (INIS)

    The concept of plasma potential arises from the interaction of a plasma with a boundary. Due to the high mobility of electrons, a potential difference develops between the two so that a positive space-charge region, the 'sheath', shields the plasma from the boundary. Losses of ions at the boundary, however, means that shielding is ineffective unless ions enter the sheath region with a sufficiently high velocity (the 'Bohm criterion'). Since this ion flux cannot be generated by thermal motion, there is a potential variation within the plasma itself (the 'presheath'), which accelerates the ions towards the plasma edge. The potential difference between a plasma and a boundary has been exploited in a wide variety of plasma surface engineering applications. The surface of a substrate immersed in a plasma will be subject to bombardment by ions accelerated across the sheath which will not only heat the substrate but can also sputter atoms out of the surface, modify the properties of films deposited onto the surface or result in bombarding species being incorporated into the surface. While energetic ion bombardment can be supplied by directed ion beams, it is more easily applied uniformly over complex surfaces by biasing a substrate immersed in a plasma with an appropriate negative potential, either DC or rectified rf. This is a feature of ion assisted deposition processes, both PVD and CVD, ion assisted thermochemical diffusion processes, such as plasma nitriding, and, in the limit of high bias potentials (10-100 kV), Plasma Immersion Ion Implantation (PIII or PI3 - Trade Mark). This paper reviews some of the interesting and intriguing aspects of the behaviour of low pressure rf plasmas when large perturbations occur to the potential distribution described above. These observations have been made as part of our work over the last ten years on the use of low pressure plasmas and high energy ion bombardment to extend the range of applicability of plasma nitriding, in

  8. AMU NEXRAD Exploitation Task

    Science.gov (United States)

    Lambert, Winifred C.; Wheeler, Mark M.

    1997-01-01

    This report documents the results of the Applied Meteorology Unit's NEXRAD Exploitation Task. The objectives of this task are to determine what radar signatures are present prior to and at the time of convection initiation, and to determine radar signatures which will help distinguish whether the ensuing convection will become severe. Radar data from the WSR-88D radar located at NWS Melbourne (WSR-88D/KMLB) were collected between June and September 1995, and 16 convective case studies were analyzed for which the radar was operating during the entire period of interest. All WSR-88D/KMLB products were scrutinized for their utility in detecting convection initiation and severe storm signatures. Through process of elimination, it was found that the 0.5 deg reflectivity product with the lowest reflectivity values displayed is the best product to monitor for convection initiation signatures. Seven meteorological features associated with the initiation of deep convection were identified: the Merritt Island and Indian River convergence zones, interlake convergence, horizontal convective rolls, the sea breeze, storm outflow boundaries, and fires. Their reflectivity values ranged from -5 to 20 dBZ. Of the three severe weather phenomena (winds greater than or equal to 50 kts, tornado, 3/4 inch hail), high wind events due to microbursts were most common in the data set. It was found that the values and trends of composite reflectivity, vertically integrated liquid, and core aspect ratio were key indicators of the potential of a cell to produce a microburst. The data were not analyzed for the other two severe weather phenomena because they rarely occurred during the data collection period. This report also includes suggestions for new WSR-88D products, summaries of ongoing research aimed at creating new products, and explicit recommended procedures for detecting convection initiation and severe storm signatures in the radar data using the currently available technology.

  9. Exploitation and the class struggle

    OpenAIRE

    Juan Carlos Cuestas; Bruce Philp

    2010-01-01

    This paper contributes to our understanding of the determinants and dynamics of Marxian exploitation using quarterly UK data, 1955-2008. Initially a simple model is introduced for the purpose of defining exploitation and its component parts, before elaborating on theoretical issues which are important in estimating the rate of exploitation. In the empirical analysis we seek to explain the effect of class struggle, for the UK economy, using quarterly data. Attention is paid to three forces whi...

  10. Heap spray exploitation

    OpenAIRE

    Παπαντωνίου, Ιωάννης Δ.

    2012-01-01

    Η διπλωματική αυτή εργασία έχει ως σκοπό την παρουσίαση και ανάλυση τεχνικών heap spray exploitation σε περιβάλλον λειτουργικού συστήματος Windows. Αναλύει τη λειτουργία του heap memory segment και τους τρόπους χρήσης του, με σκοπό την υλοποίηση heap spray επιθέσεως. Επίσης αναλύει μεθόδους και εργαλεία εντοπισμού και αντιμετώπισης των heap spray τεχνικών. Τέλος παρουσιάζονται τέσσερις μελέτες περίπτωσεων heap spray επιθέσεων για την εφαρμογή Internet Explorer (εκδόσεις 6,9,10)....

  11. Reversible switch from hemoglobin A to C in sheep and recovery from anemia following experimental infection with Anaplasma ovis

    OpenAIRE

    Elisa Pieragostini; Ferruccio Petazzi; Anna Caroli; Alessandra Torina; Giuseppe De Ruvo; Ingrid Alloggio

    2010-01-01

    Anemia causes a change in the type of circulating hemoglobin (Hb) in sheep carrying the βA-globin haplotype, where the Hb A is replaced with Hb C, unlike Hb B. The effect of the substitution of Hb A with Hb C on the recovery from anemia was investigated by comparing the hematological picture of sheep, following experimental infection with Anaplasma ovis. The blood values were obtained from 3 AB and 3 BB Hb sheep after the development of the disease where anemia is a pathognomonic symptom...

  12. Hematologic and Clinical Aspects of Experimental Ovine Anaplasmosis Caused by Anaplasma Ovis in Iran

    Directory of Open Access Journals (Sweden)

    A Gharabaghi

    2012-12-01

    Full Text Available Background: Anaplasma ovis infections can cause clinical symptoms in acute phase and lead to huge economic losses in flocks. The aim of the present study was to investigate the hematological and parasito­logical changes in experimental anaplasmosis in sheep with Iranian strain of A. ovis.Method: Five male sheep without any blood parasite infection were selected. One hundred ml hepari­nized blood was collected from splenectomised sheep that showed 6% A. ovis parasitemia. Inocu­lums of 20 ml blood were administered intravenously to each test animal. Hematological, parasito­logical and clinical changes of experimental anaplasmosis were studied in 0-38 days post infec­tion.Result: Parasitemia was detected 3 days post infection and reached its maximum level on the day 12 of experiment in test animals. Then the parasitemia was declined, but the organism could be found persistently until the last day of study. The red cell counts, packed cell volume and hemoglobin concentra­tion were decreased and mean corpuscular volume was increased significantly during the infection period. Reticulocytosis and basophilic stippling were also detected. No significant changes were observed in total and differential leukocyte count and animal body temperature.Conclusion: Experimental A. ovis infection in sheep resulted in marked normocytic normochromic anemia at the beginning of the infection which became macrocytic normochromic by the develop­ment of the disease. There were negative correlations between parasitemia and RBC, PCV and Hb values, therefore hematological assessment can be considered as a practical diagnostic tool in ovine anaplasmosis.

  13. Longitudinal analysis of tick densities and Borrelia, Anaplasma, and Ehrlichia infections of Ixodes ricinus ticks in different habitat areas in The Netherlands.

    NARCIS (Netherlands)

    Wielinga, Peter R; Gaasenbeek, Cor; Fonville, Manoj; Boer, Albert de; Vries, Ankje de; Dimmers, Wim; Akkerhuis Op Jagers, Gerard; Schouls, Leo M; Borgsteede, Fred; Giessen, Joke W B van der

    2006-01-01

    From 2000 to 2004, ticks were collected by dragging a blanket in four habitat areas in The Netherlands: dunes, heather, forest, and a city park. Tick densities were calculated, and infection with Borrelia burgdorferi and Anaplasma and Ehrlichia species was investigated by reverse line blot analysis.

  14. Longitudinal analysis of tick densities and Borrelia, Anaplasma, and Ehrlichia infections of Ixodes ricinus ticks in different habitat areas in the Netherlands

    NARCIS (Netherlands)

    Wielinga, P.R.; Gaasenbeek, C.P.H.; Fonville, M.; Boer, de A.G.; Vries, de A.; Dimmers, W.J.; Jagers op Akkerhuis, G.A.J.M.; Schouls, L.M.; Borgsteede, F.H.M.; Giessen, van der J.W.B.

    2006-01-01

    From 2000 to 2004, ticks were collected by dragging a blanket in four habitat areas in The Netherlands: dunes, heather, forest, and a city park. Tick densities were calculated, and infection with Borrelia burgdorferi and Anaplasma and Ehrlichia species was investigated by reverse line blot analysis.

  15. Independence of Anaplasma marginale Strains with High and Low Transmission Efficiencies in the Tick Vector following Simultaneous Acquisition by Feeding on a Superinfected Mammalian Reservoir Host

    Science.gov (United States)

    Strain superinfection occurs when a second pathogen strain infects a host already carrying a primary strain. Anaplasma marginale superinfection occurs when the second strain encodes a unique variant surface repertoire as compared to the primary strain and the epidemiologic consequences depend on th...

  16. Immunization-induced anaplasma marginale-specific T lymphocyte reponses impaired by A. marginale infection are restored after eliminating the infection with tetracycline

    Science.gov (United States)

    Infection of cattle with Anaplasma marginale fails to prime sustained effector/memory T-cell responses, and high bacterial load may induce antigen-specific CD4 T exhaustion and deletion. We tested the hypothesis that clearance of persistent infection restores the exhausted T-cell response. We show t...

  17. Anaplasma marginale infection with persistent high-load bacteremia induces a dysfunctional memory CD4+ T lymphocyte response but sustained high IgG titers

    Science.gov (United States)

    Control of blood-borne infections is dependent on antigen-specific effector and memory T cells and high-affinity IgG responses. In chronic infections characterized by a high antigen load, it has been shown that antigen-specific T and B cells are vulnerable to downregulation and apoptosis. Anaplasma ...

  18. Detection of Anaplasma antibodies in wildlife and domestic species in wildlife-livestock interface areas of Kenya by major surface protein 5 competitive inhibition enzyme-linked immunosorbent assay

    OpenAIRE

    J.J.N. Ngeranwa; S.P. Shompole; E.H. Venter; Wambugu, A.; J.E. Crafford; Penzhorn, B.L.

    2008-01-01

    The seroprevalence of Anaplasma antibodies in wildlife (eland, blue wildebeest, kongoni, impala, Thomson's gazelle, Grant's gazelle, giraffe and plains zebra) and domestic animal (cattle, sheep and goat) populations was studied in wildlife / livestock interface areas of Kenya. Serum samples were analyzed by competitive inhibition enzyme-linked immunosorbent assay (CI-ELISA), using a recombinant antigen (MSP-5) from Anaplasma marginale surface membrane. A monoclonal antibody, FC-16, was ...

  19. Reversible switch from hemoglobin A to C in sheep and recovery from anemia following experimental infection with Anaplasma ovis

    Directory of Open Access Journals (Sweden)

    Elisa Pieragostini

    2010-01-01

    Full Text Available Anemia causes a change in the type of circulating hemoglobin (Hb in sheep carrying the βA-globin haplotype, where the Hb A is replaced with Hb C, unlike Hb B. The effect of the substitution of Hb A with Hb C on the recovery from anemia was investigated by comparing the hematological picture of sheep, following experimental infection with Anaplasma ovis. The blood values were obtained from 3 AB and 3 BB Hb sheep after the development of the disease where anemia is a pathognomonic symptom. The expression of the silent gene encoding for Hb C was detected by isoelectric focusing and quantified by high performance liquid chromatography. Both Hb AB genotype and Hb C occurrence were involved in the lower recovery from anemia in the trial.

  20. Cepas atenuadas de Babesia bovis e Babesia bigemina e de Anaplasma centrale como imunógenos no controle da tristeza parasitária bovina Attenuated strains of Babesia bovis and Babesia bigemina and of Anaplasma centrale as immunogens for tick borne disease control

    Directory of Open Access Journals (Sweden)

    Ana Maria Sastre Sacco

    2001-10-01

    Full Text Available Neste trabalho foram avaliadas cepas atenuadas de Babesia bovis e B. bigemina e Anaplasma centrale como imunógenos a serem utilizados no controle da Tristeza Parasitária Bovina. O processo de imunização demonstrou ser inócuo, imunogênico e eficiente, pelo menos no que diz respeito às babesias, pois protegeu os animais vacinados frente ao desafio com cepas heterólogas virulentas a campo, que provocou doença clínica e morte nos animais do grupo controle. O desafio a campo pelo Anaplasma marginale não se mostrou muito virulento ou patogênico, não sendo possível concluir que a imunização com A. centrale proteja os animais contra anaplasmose.Attenuated strains of Babesia bovis and B. bigemina and a strain of Anaplasma centrale were evaluated as immunogens against tick-borne disease. The immunization process was shown to be inocuous, immunogenic and efficient to protect cattle, at least against the babesias. Vaccinated animals proved to be protected when naturally challenged with heterologous and virulent strains, in contrast to control animals that showed clinical symptoms of the disease and had to be treated. The Anaplasma marginale challenge was not efficient since treatment was not necessary in the control animals, therefore it was not possible to conclude that immunization with A. centrale protected animals against anaplasmosis.

  1. OCORRÊNCIA DE Anaplasma bovis (Donatien & Lestoquard, 1936, Dumler et al. 2001) NA REGIÃO DE BOM JESUS DO ITABAPOANA, RJ

    OpenAIRE

    Orlando Augusto Melo Junior; Antonio Peixoto Albernaz; José Tarcisio de Lima Thiebaut; Farlen Jose Bebber Miranda; Josias Alves Machado; Antonio Carlos Faber da Silva

    2010-01-01

    In the present study, 400 capillary blood smears collected from the ear and the tail of 200 bovines were microscopically examinedfor the presence of hemoparasites. The diagnosis was based on the direct research, semonstrating the etiologic agent inclusions. Eleven bovines (5.5%) were considered infected by Anaplasma bovis, confirming the presence of this hemoparasite in the city of Bom Jesus do Itabapoana, the first city of the northwesten region of the state of Rio de Janeiro to register suc...

  2. Vigilancia Epidemiológica de Rickettsia‚ Ehrlichia y Anaplasma en Fauna Silvestre ex situ e in situ de algunas Regiones de Colombia -resumen-

    OpenAIRE

    Santiago Monsalve-Buriticá; César Rojano-Bolaño; Jorge Miranda-Regino; Lizeth Quintana-Diosa; Laura Hernandez-Fernandez; M J Loaiza-Escobar; Luz Dary Acevedo-Cendales; Salim Mattar-Velilla; J Londoño-Londoño; J D Rodas-González

    2014-01-01

    Las enfermedades causadas por bacterias del orden de los Rickettsiales son trasmitidas por ectoparásitos originados en vida silvestre‚ sin embargo‚ en Colombia no existe una línea base del conocimiento en este sentido. Estos microorganismos intracelulares son causantes de enfermedades transmisibles en pacientes humanos; convirtiéndolas en zoonosis de tipo emergente. Este estudio ha permitido determinar la presencia de microorganismos del orden de los Rickettsiales (Ehrlichia spp.‚ Anaplasma s...

  3. Infections and risk factors for livestock with species of Anaplasma, Babesia and Brucella under semi-nomadic rearing in Karamoja Region, Uganda.

    Science.gov (United States)

    Lolli, Chiara; Marenzoni, Maria Luisa; Strona, Paolo; Lappo, Pier Giorgio; Etiang, Patrick; Diverio, Silvana

    2016-03-01

    A survey was conducted to estimate the prevalence of Anaplasma, Babesia and Brucella spp. infections in cattle, goats and sheep in the Karamoja Region of Uganda and to identify possible risk factors existing in this semi-nomadic and pastoral area. Low cost laboratory tests were used to diagnose infections (Rose Bengal test for Brucella spp. antibodies and direct microscopic examination for Anaplasma and Babesia spp.). Multivariable logistic regression models were applied to identify possible risk factors linked to gender, animal species, age (only for cattle) and districts. A total of 3935 cattle, 729 goats and 306 sheep of five districts of the Karamoja Region were tested. Seroprevalence for Brucella was 9.2 % (CI, 95 %: 8.4-10), for Anaplasma 19.5 % (CI 95 %: 18.4-20.6) and for Babesia 16 % (CI 95 %: 15-17.1). Significant differences in infections prevalence were observed against risk factors associated with districts and species. Cattle were the species with higher risk of the infections. Female gender was identified as at risk only for Brucella spp. infection. Cattle more than one year old had greater likelihood to be Brucella seropositive. Co-infections of Anaplasma and Babesia spp. were statistically associated, especially in goats and sheep. Further studies to identify risk factors related to host species and geographical districts are needed. The influence on the semi-nomadic agro-pastoral system in Karamoja of animal raids and animal mixing should be further investigated. Findings were important to sensitize Karamojong undertaking measures on infection control, especially on cattle, which are their main source of food. PMID:26888206

  4. Preventing the Sexual Exploitation of Children

    Science.gov (United States)

    Preventing the Sexual Exploitation of Children The words sexual exploitation evoke a number of reactions and feelings. Perhaps one of the most devastating ... Exploited Children ® (NCMEC) is working to bring sexual exploitation to the forefront; raise awareness about this issue; ...

  5. Teotihuacan, tepeapulco, and obsidian exploitation.

    Science.gov (United States)

    Charlton, T H

    1978-06-16

    Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion. PMID:17738704

  6. ECOLOGY AFFECTED IN OIL EXPLOITATION

    Institute of Scientific and Technical Information of China (English)

    Wang Mingren; Zeng Dezhang; Zhang Shiquan; Shi Lifeng

    1997-01-01

    @@ Introduction During the Eighth Five-Year Plan period(1991-1995), a study about crude impacts on ecology in oil exploitation was conducted in seven representative onshore oil fields of China. The study discusses crude pollutant's impacts on ecology in terms of its production,movement, transformation and concentration in the ecological system,as well as its toxicity and damage degree on living things , by means of investigation on the spot, test analysis and analogue test.

  7. Exploiting mutagenesis for wheat improvement

    International Nuclear Information System (INIS)

    The chemical mutagen, ethylmethanesulphonate, is being used to introduce into wheat novel variation that can be exploited for crop improvement. We have created mutagenised populations of diploid (Einkorn), tetraploid (Durum) and hexaploid (bread) wheat. The forward genetic approach enables the identification of high yielding or novel phenotypes that can be exploited in conventional breeding programmes. A powerful reverse genetic strategy, TILLING (Targetting Induced Local Lesions IN Genomes), allows the detection of induced point mutations in the populations of mutagenised individuals and allows gene function to be examined. Genetic redundancy in the tetraploid and hexaploid species allows them to tolerate a high level of mutation (up to one mutation per 25kbp). This mutation frequency makes it relatively easy to identify lesions in each homeologue of a particular gene which can then be combined for crop improvement or functional genomics. Novel variation created can be exploited without the regulatory restrictions imposed on genetically modified organisms. Gene targets have been selected in relation to plant architecture, primary metabolism, disease resistance and stress tolerance and over 50 TILLING mutants have so been identified, including mis-sense, non-sense and splice site mutations (author)

  8. Detección de Anaplasma spp. en Garrapatas de Myrmecophaga tridactyla de Vida Libre en la Sabana Inundable de Casanare‚ Colombia -resumen-

    Directory of Open Access Journals (Sweden)

    César Rojano-Bolaño

    2014-12-01

    Full Text Available La anaplasmosis es una enfermedad infecciosa causada por rickettsias del género Anaplasma spp. Su relevancia esta principalmente determinada por el grado de afectación endémica en el ganado doméstico. Una amplia variedad de mamíferos silvestres también son susceptibles a la infección. Las bacterias pueden ser intracitoplasmáticas‚ dañando las estructuras de las células pudiendo causar anemia e ictericia. Algunas especies de Anaplasma spp han sido reportadas como microorganismos potencialmente zoonóticos‚ por lo tanto‚ la anaplasmosis‚ como otras enfermedades transmitidas por garrapatas‚ ha tomado una especial relevancia en la salud pública. El objetivo de este estudio fue detectar la presencia de Anaplasma spp.‚ en garrapatas colectadas en nueve osos palmeros (Myrmecophaga tridactyla de vida libre en el municipio de Pore‚ Casanare‚ entre los años 2013 y 2014‚ capturados con el método de búsqueda activa‚ y posteriormente fueron anestesiados utilizando un dardo con Ketamina (12 mg/kg y Xilacina (0‚5 mg/kg por vía intramuscular. Las garrapatas fueron colectadas directamente de los individuos‚ con ayuda de pinzas. En total se obtuvieron 204 ectoparásitos‚ que fueron almacenados en alcohol al 70%‚ y posteriormente fueron identificados como pertenecientes a la especie Amblyomma cajennense. Para este estudio se seleccionaron 55 pool de tres individuos y fueron analizadas por medio de la técnica de PCR en tiempo real. Se detectaron 2 pool de garrapatas positivos a este microorganismo (3‚6 % pertenecientes a dos osos palmeros. Los resultados preliminares de este estudio demuestran que Anaplasma spp. podría estar circulante entre garrapatas A. cajennense de animales silvestres en la sabana inundable del municipio de Pore‚ Casanare. Se hace necesario realizar nuevos muestreos para analizar un mayor número de garrapatas y determinar la especie de Anaplasma spp. presente.

  9. Seroprevalence of IgG antibodies against Anaplasma marginale in cattle from south Mozambique Soroprevalência de anticorpos de classe IgG contra Anaplasma marginale em bovinos da região Sul de Moçambique

    Directory of Open Access Journals (Sweden)

    António Amélia Mucalane Tembue

    2011-12-01

    Full Text Available The current study aimed to investigate the seroprevalence of IgG antibodies to Anaplasma marginale in cattle from Maputo, Gaza and Inhambane provinces, south Mozambique. A total of 809 serum samples from cattle were obtained and tested by indirect enzyme-linked immunosorbent assay (i-ELISA. The chi-square test at 5% significance was used to assess the association between seroprevalence and the variables gender, age and geographic origin of animals. The overall seropositivity was 76.5% (n = 619 and anti-A. marginale antibodies were detected in 89.1% (n = 156, 68.4% (n = 308 and 84.2% (n = 155 of the animals in the provinces of Maputo, Gaza and Inhambane, respectively. A significant association (p 12 and 24 and 36 months, respectively. These results indicate that in southern Mozambique there are areas of enzootic stability to A. marginale. Thus, epidemiological monitoring is required to monitor the immune status of animals in the region.O objetivo do presente estudo foi investigar a soroprevalência de anticorpos da classe IgG contra Anaplasma marginale em bovinos de corte da região Sul de Moçambique. Para esse efeito, 809 amostras de soro foram coletadas e avaliadas pelo ensaio imunoadsorção enzimático indireto (ELISA-i. O teste Qui-Quadrado, a 5% de significância, foi utilizado para avaliar a associação entre a soroprevalência e as variáveis sexo, idade e origem geográfica dos animais. A soropositividade geral foi de 76,5% (n = 619, e anticorpos anti-A. marginale foram detectados em 89,1% (n = 156, 68,4% (n = 308 e 84,2% (n = 155 dos animais nas províncias de Maputo, Gaza e Inhambane, respectivamente. Uma associação significativa (p 12 a 24 36 meses, respectivamente. Os resultados demonstram que, no Sul de Moçambique, existem áreas de estabilidade enzoótica para A. marginale, em animais maiores de 12 meses. Assim, monitoramento epidemiológico deve ser realizado para o acompanhamento do status imunológico dos animais na região.

  10. Ehrlichia canis and Anaplasma platys in ticks of dogs in Cuiaba, Mato GrossoEhrlichia canis e Anaplasma platys em carrapatos de cães de Cuiabá, Mato Grosso

    Directory of Open Access Journals (Sweden)

    Valéria Dutra

    2012-06-01

    Full Text Available Diseases transmitted by arthropods such as Rhipicephalus sanguineus, are caused by a spectrum of pathogens. Among these are the canine monocytic ehrlichiosis and cyclical thrombocytopenia with a cosmopolitan distribution. Aiming to verify the presence of DNA of Anaplasma platys and Ehrlichia canis in ticks R. sanguineus collected in the period 2008 to 2009 of 380 infected dogs. Ticks, after maceration, were subjected to DNA extraction and then nested PCR was performed for amplification of A. platys and E. canis. Of these, 81 (29.7% amplified DNA from ehrlichiais agents, where 38 (17.9% amplified in E. canis and 32 (15.7% for A. platys. The observation of two pathogens, combined with worldwide distribution of the tick R. sanguineus, demonstrates the high risk of infection with these pathogens in dogs in the city of Cuiaba. Doenças transmitidas por artrópodes, como o Rhipicephalus sanguineus, são causadas por um espectro de patógenos. Dentre estas, estão a erliquiose monocítica canina e trombocitopenia cíclica com distribuição cosmopolita. Com o objetivo de verificar a presença de DNA de Anaplasma platys e Ehrlichia canis em carrapatos R. sanguineus coletados no período de 2008 a 2009 de 380 cães infestados. Os carrapatos, após a maceração, foram submetidos a extração de DNA e, em seguida, foi realizada a Nested PCR para a amplificação da espécie A. platys e E. canis. Destes, 81 (29.7% amplificaram o DNA dos agentes ehrlichiais, onde 38 (17.9% amplificaram para E. canis e 32 (15.7% para A. platys. A observação dos dois patógenos, combinado com distribuição mundial do carrapato R. sanguineus, demonstra o elevado risco de infecção por esses patógenos de cães na cidade de Cuiabá.

  11. Human Ehrlichiosis and Anaplasmosis in America

    Directory of Open Access Journals (Sweden)

    J Stephen Dumler

    2013-07-01

    Full Text Available A description of Ehrlichia and Anaplasma agents that have been linked to human disease is presented. A particular emphasis is given to Ehrlichia chaffeensis, Anaplasma phagocytophilum, and Ehrlichia canis. The clinical features associated with each agent, as well as the corresponding diagnosis and treatment are also described.

  12. The ESA Geohazard Exploitation Platform

    Science.gov (United States)

    Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore

    2015-04-01

    Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further

  13. Prospects of geothermal resource exploitation

    International Nuclear Information System (INIS)

    The use of geothermal energy to generate electricity has only occurred during the past 50 years by drilling wells in aquifers close to magmas and producing either dry steam or hot water. The world's production of electricity from geothermal energy is over 6000 MWe and is still growing. The direct use of geothermal energy for major urban communities has been developed recently by exploitation of aquifers in sedimentary basins under large towns. Scaling up the extraction of heat implies the exploitation of larger and better located fields requiring an appropriate method of extraction; the objective of present attempts in USA, Japan and Europe is to create heat exchangers by the circulation of water between several deep wells. Two field categories are considered: the extension of classical geothermal fields beyond the aquifer areas, and areas favoured by both a high geothermal gradient, fractures inducing a natural permeability at large scale, and good commercial prospects (such as in the Rhenan Graben). Hot dry rocks concept has gained a large interest. 1 fig., 5 tabs., 11 refs

  14. A Theory of Exploitative Child Labor

    OpenAIRE

    Carol Rogers & Kenneth A. Swinnerton

    2002-01-01

    We develop a model of exploitative child labor with two key features: first, parents have imperfect information about whether employment opportunities available to their children are exploitative or not. Second, firms choose whether or not to exploit their child workers. In our model, a ban on exploitative child labor is desirable, because it resolves the problem of imperfect information faced by parents, and therefore leads to Pareto efficiency. We also find that a ban leads to an increase i...

  15. The exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Wilkinson, Stephen

    2003-04-01

    This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships. PMID:12812183

  16. Seroprevalence estimation and management factors associated with high herd seropositivity for Anaplasma marginale in commercial dairy farms of Puerto Rico.

    Science.gov (United States)

    Urdaz-Rodríguez, J H; Fosgate, G T; Alleman, A R; Rae, D O; Donovan, G A; Melendez, P

    2009-10-01

    A cross-sectional study was conducted to determine individual cow seroprevalence of Anaplasma marginale in adult lactating dairy cattle of Puerto Rico (PR) and to assess the associations of farm management factors on herd seroprevalence. Antibody activity against A. marginale was determined using the MSP-5 competitive enzyme-linked immunosorbent assay. Serum samples were obtained from 2,414 adult lactating dairy cattle from 76 randomly selected commercial dairy farms. Herd seroprevalence ranged from 3 to 100% with an overall individual cow seroprevalence for A. marginale of 27.4%. Factors associated with high herd seropositivity were pasture grazing as the main feed source (OR = 6.5, 95% CI = 1.2-34), observed monkeys on the premises (OR = 13, 95% CI = 1.2-138), use of 11% permethrin (OR = 17, 95% CI = 2.2-129), farmers who attended an acaricide certification program (OR = 0.18, 95% CI = 0.04-0.74), and lack of a fly control program (OR = 5.6, 95% CI = 1.3-24). PMID:19337849

  17. Anaplasma marginale major surface protein 1a directs cell surface display of tick BM95 immunogenic peptides on Escherichia coli.

    Science.gov (United States)

    Canales, Mario; Almazán, Consuelo; Pérez de la Lastra, José M; de la Fuente, José

    2008-07-31

    The surface display of heterologous proteins on live Escherichia coli using anchoring motifs from outer membranes proteins has impacted on many areas of biochemistry, molecular biology and biotechnology. The Anaplasma marginale major surface protein 1a (MSP1a) contains N-terminal surface-exposed repeated peptides (28-289 amino acids) that are involved in pathogen interaction with host cell receptors and is surface-displayed when the recombinant protein is expressed in E. coli. Therefore, it was predicted that MSP1a would surface display on E. coli peptides inserted in the N-terminal repeats region of the protein. The Rhipicephalus (Boophilus) microplus BM86 and BM95 glycoproteins are homologous proteins that protect cattle against tick infestations. In this study, we demonstrated that a recombinant protein comprising tick BM95 immunogenic peptides fused to the A. marginale MSP1a N-terminal region is displayed on the E. coli surface and is recognized by anti-BM86 and anti-MSP1a antibodies. This system provides a novel approach to the surface display of heterologous antigenic proteins on live E. coli and suggests the possibility to use the recombinant bacteria for immunization studies against cattle tick infestations. PMID:18582976

  18. The Exploitation of Evolving Resources

    CERN Document Server

    McGlade, Jacqueline; Law, Richard

    1993-01-01

    The impact of man on the biosphere is profound. Quite apart from our capacity to destroy natural ecosystems and to drive species to extinction, we mould the evolution of the survivors by the selection pressures we apply to them. This has implications for the continued health of our natural biological resources and for the way in which we seek to optimise yield from those resources. Of these biological resources, fish stocks are particularly important to mankind as a source of protein. On a global basis, fish stocks provide the major source of protein for human consumption from natural ecosystems, amounting to some seventy million tonnes in 1970. Although fisheries management has been extensively developed over the last century, it has not hitherto considered the evolutionary consequences of fishing activity. While this omission may not have been serious in the past, the ever increasing intensity of exploitation and the deteriorating health of fish stocks has generated an urgent need for a better understanding...

  19. Energy for lunar resource exploitation

    Science.gov (United States)

    Glaser, Peter E.

    1992-01-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  20. Prokaryotic expression and immunogenicity of recombinant AnkA protein from 3 Anaplasma phagocytophilum isolates%3株嗜吞噬细胞无形体AnkA蛋白原核表达及免疫原性差异性研究

    Institute of Scientific and Technical Information of China (English)

    姚娜; 陈创夫; 于强; 张丽娟

    2013-01-01

    In order to investigate the immunogenicity of recombinant AnkA proteins from 3 A. phagocytophilujn isolates, the partial ankA fragments of its strain Webster, strain Slovenia 1 567, and strain 96HK58 were amplified by PCR respectively and then inserted into the vector pET-30a and transformed into Escherichia coli BL21 to express with IPTG induction. The amino acid sequences of the expression products were identified by mass spectrum analysis. Polyclonal antibodies a-gainst the 3 recombinant AnkA proteins were produced by immuned mouse with the purified fusion proteins. The immunoreac-tivity of the 3 AnkA recombinant proteins was analyzed by Western blot using the serum from immunized mouse and HGA positive serum from human. The recombinant AnkA proteins were efficiently expressed. High titer antibodies against the 3 AnkA recombinant proteins were successfully produced and cross reacted among the 3 AnkA recombinant proteins and their corresponding antibodies. Apparent reaction was also observed among the 3 AnkA recombinant proteins and Chinese human HGA positive serum. Here we concluded that there was no immunogenicity difference among the 3 recombinant AnkA proteins of A. phagocylophilum strain Webster, strain Slovenia 1 567, and strain 96HE58.%目的 研究分析3株嗜吞噬细胞无形体AnkA蛋白的免疫原性.方法 利用原核表达PCR扩增了嗜吞噬细胞无形体Webster株,斯洛文尼亚1 567株,美国96HE58株ankA 基因部分序列,构建pET-30a-AnkA表达载体,转化至大肠杆菌BL21中,以IPTG诱导高效表达融合蛋白,经飞行质谱鉴定氨基酸序列,免疫BALB/c小鼠制备多克隆抗体.Western blot分析3株菌AnkA重组蛋白与免疫小鼠血清抗体相互间的免疫反应以及交叉反应性.同时检测3株菌AnkA重组蛋白与我国无形体病人血清抗体反应性.结果 表达的重组蛋白主要以可溶性形式存在,小鼠免疫获得高效价抗AnkA IgG抗体,3株菌重组蛋白免疫抗体间存在免疫交叉.3株菌重组蛋白与我国无形体病人血清抗体存在免疫反应.结论 成功原核表达并纯化了3株嗜吞噬细胞无形体AnkA蛋白,重组蛋白与我国无形体病人阳性血清存在免疫反应.3株嗜吞噬细胞无形体AnkA重组蛋白与免疫小鼠多克隆抗体间存在交叉反应.

  1. Eficácia do dipropionato de imidocarb, da enrofloxacina e do cloridrato de oxitetraciclina no tratamento de bovinos naturalmente infectados por Anaplasma marginale

    OpenAIRE

    L.R. Alberton; C.F. Orlandini; T.M. Zampieri; A.Y. Nakamura; D.D. Gonçalves; R. Piau Júnior; M.M. Zaniolo; S.T. Cardim; O. Vidotto; Garcia, J. L.

    2015-01-01

    O agente de maior importância, em relação à anaplasmose bovina, é o Anaplasma marginale. Os principais sinais clínicos dessa enfermidade são anemia hemolítica, icterícia, dispneia, taquicardia, febre, fadiga, lacrimejamento, sialorreia, micção frequente, anorexia, perda de peso, aborto e morte. A terapia antimicrobiana é o principal protocolo terapêutico. O objetivo do presente trabalho foi avaliar a eficácia do dipropionato de imidocarb, da enrofloxacina e do cloridrato de oxitetraciclina no...

  2. Occurrence of Ehrlichia canis and Anaplasma platys in household dogs from northern Parana Ocorrência de Ehrlichia canis e Anaplasma platys em cães domiciliados da região norte do Paraná

    Directory of Open Access Journals (Sweden)

    Gislaine Cristina Ferreira da Silva

    2012-12-01

    Full Text Available Canine monocytic ehrlichiosis caused primarily by Ehrlichia canis and canine thrombocytic anaplasmosis induced by Anaplasma platys are important emerging zoonotic tick-borne diseases of dogs. There is evidence that these pathogens can also affect humans. This study evaluated the presence of E. canis and A. platys in blood samples collected from 256 domiciled dogs in the municipality of Jataizinho, located in north region of the State of Parana, Brazil, by PCR assay. The occurrence of E. canis and A. platys was 16.4% (42/256 and 19.4% (49/256, respectively; while 5.47% (14/256 of the dogs evaluated were co-infected by these two organisms. The presence of E. canis and A. platys was not significantly associated with the variables evaluated (sex, age, outdoor access, and presence of ticks during blood collection. Infection of dogs by E. canis was associated with anemia and thrombocytopenia, while infection induced by A. platys was related only to thrombocytopenia. Canine monocytic ehrlichiosis and canine thrombocytic anaplasmosis should be included in the differential diagnoses when these hematological alterations are observed during routine laboratory evaluation of dogs.Erliquiose monocítica canina, causada principalmente por Ehrlichia canis, e anaplasmose trombocítica canina, devida a infecção com Anaplasma platys, são importantes doenças transmitidas por carrapatos que acometem os cães, com evidências que podem também acometer o homem. O presente estudo avaliou a ocorrência desses agentes em amostras de sangue de 256 cães domiciliados na cidade de Jataizinho, na região Norte do Paraná, Brasil, utilizando a técnica da Reação em Cadeia da Polimerase (PCR. A ocorrência de E. canis e A. platys foi de 16,4% (42/256 e 19,4% (49/256, respectivamente, com 5,47% (14/256 dos animais apresentando coinfecção. Não foi observada associação significativa com as variáveis sexo, idade, acesso à rua e presença de carrapatos no momento da

  3. Identification of a vertically transmitted strain from Anaplasma marginale (UFMG3): Molecular and phylogenetic characterization, and evaluation of virulence.

    Science.gov (United States)

    Silvestre, Bruna T; Silveira, Júlia A G; Meneses, Rodrigo M; Facury-Filho, Elias J; Carvalho, Antônio U; Ribeiro, Múcio F B

    2016-02-01

    Bovine anaplasmosis is a disease caused by the intraerythrocytic rickettsia species Anaplasma marginale and results in great economic losses in tropical and subtropical regions. Vertical transmission is an important phenomenon that contributes to the persistence of different strains of the agent within the same herd. The identification of new strains and genetic characterization studies are essential to understanding their epidemiology and virulence and for vaccine development. The aim of this study was to perform molecular and phylogenetic characterizations of a new vertically transmitted strain from A. marginale and to evaluate its virulence by experimental inoculation of rickettsia-free calves. Thirty newborn Holstein calves were subjected to molecular tests for the detection of A. marginale, Babesia bovis and Babesia bigemina. Calves positive for A. marginale (n=3) were splenectomized and monitored for the clinical manifestations of anaplasmosis. Blood samples from one of the calves that presented rickettsemia of 42.8% and spontaneous recovery of clinical parameters were used for molecular and phylogenetic characterization (msp1a gene), and inoculum production was used for the evaluation of virulence. This strain was identified as UFMG3. Three tandem repeat forms (13 and MGI19) were identified from the analysis of the msp1a gene, in which the form MGI19 appeared twice. Analysis of these repeats revealed the presence of the sequences QASTSS and SSASGQQQESS and of aspartic acid (D) at position 20 of both repeats. Phylogenetic analysis showed a close relationship among the UFMG3, MGI19 and UFMG2 strains. For virulence evaluation, six Holstein calves were inoculated intravenously with 2×10(7)A. marginale UFMG3-infected erythrocytes. The calves showed maximum rickettsemia of 5.1%, a moderate decrease in packed cell volume and spontaneous recovery of clinical parameters without the need for treatment. The results of experimental inoculation suggest that the strain A

  4. Cattle experimentally infected by Anaplasma marginale: Influence of splenectomy on disease pathogenesis, oxidative profile, and antioxidant status.

    Science.gov (United States)

    Doyle, Rovaina L; França, Raqueli T; Oliveira, Camila B; Rezer, João F P; Klafke, Guilherme M; Martins, João R; Santos, Andrea P; do Nascimento, Naíla C; Mesick, Joanne B; Lopes, Sonia T A; Leal, Daniela B R; Da Silva, Aleksandro S; Andrade, Cinthia M

    2016-06-01

    Bovine anaplasmosis is caused by the obligate intraerythrocytic bacteria Anaplasma marginale. These bacteria are transmitted by tick species such as Rhipicephalus (Boophilus) microplus, blood-sucking insects, and fomites (needles, clippers, and other blood contaminated equipment). During the acute phase of infection, animals may develop fever, anemia, jaundice, and hepatosplenomegaly. The aims of this study are to quantify the bacteremia by quantitative PCR in eight naïve calves experimentally infected by A. marginale [splenectomized (n = 4), and intact/non-splenectomized (n = 4)], and to correlate these findings with markers of oxidative stress on days 0, 8, 15, 21 and 23 post-infection. Complete blood counts (CBC) were performed in both groups. Lipid peroxidation was estimated by quantifying thiobarbituric acid reactive substances (TBARS); and non-enzymatic antioxidants were assessed by erythrocyte content of non-protein thiols (NPSH). There were no significant differences in complete blood counts (CBC) between the two groups. However, both groups had a slight decrease on packet cell volume (PCV), erythrocytes and hemoglobin concentration, as well as an increase in total leukocyte counts due to elevated lymphocytes when comparing pre and post-infection with A. marginale. Progressive increase on TBARS levels and concomitant decrease on NPSH content were observed in all animals, without significant differences between splenectomized and intact animals. A positive correlation between bacteremia and TBARS, and a negative correlation between bacteremia and NPSH were observed in both groups with higher correlation for NPSH in splenectomized animals. A negative correlation between TBARS and NPSH levels was observed in both groups indicating lipid peroxidation without a non-enzymatic antioxidant response. The results of experimental infection by A. marginale in cattle showed that bacteremia has an impact on lipid peroxidation regardless of the splenectomy. PMID

  5. Silencing of genes involved in Anaplasma marginale-tick interactions affects the pathogen developmental cycle in Dermacentor variabilis

    Directory of Open Access Journals (Sweden)

    Almazán Consuelo

    2009-07-01

    Full Text Available Abstract Background The cattle pathogen, Anaplasma marginale, undergoes a developmental cycle in ticks that begins in gut cells. Transmission to cattle occurs from salivary glands during a second tick feeding. At each site of development two forms of A. marginale (reticulated and dense occur within a parasitophorous vacuole in the host cell cytoplasm. However, the role of tick genes in pathogen development is unknown. Four genes, found in previous studies to be differentially expressed in Dermacentor variabilis ticks in response to infection with A. marginale, were silenced by RNA interference (RNAi to determine the effect of silencing on the A. marginale developmental cycle. These four genes encoded for putative glutathione S-transferase (GST, salivary selenoprotein M (SelM, H+ transporting lysosomal vacuolar proton pump (vATPase and subolesin. Results The impact of gene knockdown on A. marginale tick infections, both after acquiring infection and after a second transmission feeding, was determined and studied by light microscopy. Silencing of these genes had a different impact on A. marginale development in different tick tissues by affecting infection levels, the densities of colonies containing reticulated or dense forms and tissue morphology. Salivary gland infections were not seen in any of the gene-silenced ticks, raising the question of whether these ticks were able to transmit the pathogen. Conclusion The results of this RNAi and light microscopic analyses of tick tissues infected with A. marginale after the silencing of genes functionally important for pathogen development suggest a role for these molecules during pathogen life cycle in ticks.

  6. Development of a multilocus sequence typing scheme for the study of Anaplasma marginale population structure over space and time.

    Science.gov (United States)

    Guillemi, Eliana C; Ruybal, Paula; Lia, Verónica; Gonzalez, Sergio; Lew, Sergio; Zimmer, Patricia; Lopez Arias, Ludmila; Rodriguez, Jose L; Rodriguez, Sonia Y; Frutos, Roger; Wilkowsky, Silvina E; Farber, Marisa D

    2015-03-01

    Bovine Anaplasmosis caused by Anaplasma marginale is a worldwide disease prevalent in tropical and subtropical regions where Rhipicephalus microplus is considered the most significant biological vector. Molecular markers previously applied for A. marginale typing are efficient for isolate discrimination but they are not a suitable tool for studying population structure and dynamics. Here we report the development of an MLST scheme based on the study of seven genes: dnaA, ftsZ, groEl, lipA, recA, secY and sucB. Five annotated genomes (Saint Maries, Florida, Mississippi, Puerto Rico and Virginia) and 53 bovine blood samples from different world regions were analyzed. High nucleotide diversity and a large proportion of synonymous substitutions, indicative of negative selection resulted from DnaSP 5.00.02 package application. Recombination events were detected in almost all genes, this evidence together with the coexistence of more than one A. marginale strain in the same sample might suggest the superinfection phenomena as a potential source of variation. The allelic profile analysis performed through GoeBURST shown two main CC that did not support geography. In addition, the AMOVA test confirmed the occurrence of at least two main genetically divergent groups. The composition of the emergent groups reflected the impact of both historical and environmental traits on A. marginale population structure. Finally, a web-based platform "Galaxy MLST-Pipeline" was developed to automate DNA sequence editing and data analysis that together with the Data Base are freely available to users. The A. marginale MLST scheme developed here is a valuable tool with a high discrimination power, besides PCR based strategies are still the better choice for epidemiological intracellular pathogens studies. Finally, the allelic profile describe herein would contribute to uncover the mechanisms in how intracellular pathogens challenge virulence paradigm. PMID:25550150

  7. Prevalence and haemato-biochemical profile ofAnaplasma marginale infection in dairy animals of Punjab (India)

    Institute of Scientific and Technical Information of China (English)

    Ashuma; Amrita Sharma; Lachhman Das Singla; Paramjit Kaur; Mandeep Singh Bal; Balwinder Kaur Batth; Prayag Dutt Juyal

    2013-01-01

    Objective:To do the systematic comparison of prevalence of anaplasmosis byPCR andGiemsa stained thin blood smear (GSTBS) based parasitological assays in dairy cattle ofPunjab, which has not been reported yet.To analyse the haematobiochemical alterations in infected animals to arrive at the conclusion regarding the pathogenicity induced byAnaplasma marginale (A. marginale) in latent and patent infection.Methods:Study was conducted on320 animals (236 cows,62 calves and22 buffaloes) ofPunjab,India.PCR on genome ofA. marginale was performed by targeting msp1β gene using specific primersBAP-2/AL34S, amplifies products of size407 bp.Questionnaires based data on the characteristics of the infected animals and management strategies of the farm were collected and correlated.Results:Higher prevalence and more significant association was observed in thePCR based molecular diagnosis (P=0.00012) as compared to that inGSTBS (P=0.0288) based diagnosis with various regions under study.With respect to the regions, highest prevalence was recorded inFerozepur byPCR based diagnosis, while that inJalandhar byGSTBS examination.Similar marked significant association of thePCR based diagnosis with the age of the animals under study (P=0.00013) was observed elucidating no inverse age resistance toA. marginale in cow calves.Haematobiochemical profile of infected animals revealed marked anemia, liver dysfunction and increase globulin concentrate indicating rise in immunoglobulin level to counteract infection.Conclusions:PCR is far more sensitive in detecting the disease even in latent infection which may act as nidus for spread of anaplasmosis to susceptible animals in endemic areas.Severity of anaemia and liver dysfunction were comparable both in patent as well as latent infection indicating pathogenicity of both.

  8. Identité et exploitation au travail

    OpenAIRE

    Danilo Martuccelli

    2013-01-01

    This article explores some aspects of identity exploitation in the world of work. For this, he proceeds in three stages. First, it presents three major forms of capacity of employees - qualification, skills, identities. Then it draws the outlines of specific objective and subjective identity exploitation at work. Finally, it examines the notions of justice and injustice that can be mobilized to account this process.

  9. The economics of exploiting gas hydrates

    International Nuclear Information System (INIS)

    We investigate the optimal exploitation of methane hydrates, a recent discovery of methane resources under the sea floor, mainly located along the continental margins. Combustion of methane (releasing CO2) and leakage through blow-outs (releasing CH4) contribute to the accumulation of greenhouse gases. A second externality arises since removing solid gas hydrates from the sea bottom destabilizes continental margins and thus increases the risk of marine earthquakes. We show that in such a model three regimes can occur: i) resource exploitation will be stopped in finite time, and some of the resource will stay in situ, ii) the resource will be used up completely in finite time, and iii) the resource will be exhausted in infinite time. We also show how to internalize the externalities by policy instruments. - Highlights: • We set up a model of optimal has hydrate exploitation • We incorporate to types of damages: contribution to global warming and geo-hazards • We characterize optimal exploitation paths and study decentralization with an exploitation tax. • Three regimes can occur: • i) exploitation in finite time and some of the stock remaining in situ, • ii) exploitation in finite time and the resource will be exhausted, • iii) exploitation and exhaustion in infinite time

  10. Localized appropriability: Percuniary externalities in knowledge exploitation

    OpenAIRE

    Antonelli, Cristiano

    2008-01-01

    Pecuniary externalities are crucial in shaping the strategies to value the distinctive competences and the economic success of innovative firms. The analysis of conditions for localized knowledge appropriation and exploitation makes it possible to identify idiosyncratic production factors. The introduction of directed technological change biased towards intensive usage provides the opportunity for the exploitation of technological knowledge.

  11. Exploration, Exploitation, and Organizational Coordination Mechanisms

    Directory of Open Access Journals (Sweden)

    Silvio Popadiuk

    2016-03-01

    Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.

  12. Optimal exploitation of complex electric energy systems

    International Nuclear Information System (INIS)

    One of the possible manners, to reduce the losses in consumption of electrical energy in Complex Electro-energetic Systems is inventing of optimal solution on a lot of problems which exists in exploitation of CEES (Complexual Electro-energetic Systems), as so as in theirs starting that and in theirs exploitation in CEES, independent of consumption in EPS (Electric Power System). In all this very important is the insuring of optimal exploitation of Power Plants with minimal economic deficit and minimal energetic deficit. In this paper will be proposed concrete example of exploitation of two Power Plants, which one of them is Thermal Power Plant and the other is Hydro Power Plant, and by the way was calculated their necessary optimal working time independent of consumption in Power Grids. It is analyzed regular using of Primary energetic sources in exploitation of Thermal and Hydro Power Plants with maximal saving water in HPP and maximal saving fossil fuel in TPP. (Author)

  13. Detecção de Ehrlichia spp./Anaplasma spp., Rickettsia spp., Mycoplasma haemofelis e Leishmania infantum em felinos errantes e sua relação com a presença de retrovírus e com a sintomatologia manifestada

    OpenAIRE

    Martins, Telma Simone Oliveira

    2012-01-01

    ABSTRACT - Detection of Ehrlichia spp./Anaplasma spp., Rickettsia spp., Mycoplasma haemofelis and Leishmania infantum in stray cats, and its relation to the presence of retroviruses and the symptoms manifested - The prevalence of infectious diseases on cats is related with the density and the size of the population indwells. The objective of this work was to determinate the prevalence of the feline immunodeficiency virus (FIV), feline leukemia virus (FeLV), Ehrlichia spp./Anaplasma s...

  14. Experimental infection and co-infection of dogs with Anaplasma platys and Ehrlichia canis: hematologic, serologic and molecular findings

    Directory of Open Access Journals (Sweden)

    Diniz PPVP

    2010-04-01

    Full Text Available Abstract Background Rhipicephalus sanguineus is a ubiquitous tick responsible for transmitting Ehrlichia canis and most likely Anaplasma platys to dogs, as either single or co-infections. The objective of this study was to assess the effects of either simultaneous or sequential experimental infections with E. canis and A. platys on hematological and serological parameters, duration of infection, and efficacy of doxycycline therapy in dogs infected with one or both organisms. Six dogs per group were either uninfected, A. platys infected, E. canis infected, A. platys and E. canis co-infected, A. platys infected and E. canis challenged or E. canis infected and A. platys challenged at day 112 post-infection (PI. Doxycycline treatment was initiated at 211 days PI, followed by dexamethasone immunosuppression beginning 410 days PI. Results Initially, transient decreases in hematocrit occurred in all groups infected with E. canis, but the mean hematocrit was significantly lower in the A. platys and E. canis co-infected group. All dogs except the controls developed marked thrombocytopenia after initial infection followed by gradually increased platelet counts by 112 days PI in groups with the single infections, while platelet counts remained significantly lower in the A. platys and E. canis co-infected group. Both sequential and simultaneous infections of A. platys and E. canis produced an enhanced humoral immune response to A. platys when compared to infection with A. platys alone. Likewise, co-infection with E. canis and A. platys resulted in a more persistent A. platys infection compared to dogs infected with A. platys only, but nearly all A. platys infected dogs became A. platys PCR negative prior to doxycycline treatment. E. canis infected dogs, whether single or co-infected, remained thrombocytopenic and E. canis PCR positive in blood for 420 days. When treated with doxycycline, all E. canis infected dogs became E. canis PCR negative and the

  15. Should we envisage shale gas exploitation?

    International Nuclear Information System (INIS)

    Two points of view about shale gas exploitation are presented. The first one is proposed by an American scientist who outlines that the consequences of shale gas exploitation in the USA are already disastrous, notably in terms of water consumption by hydraulic fracturing (50 to 100 times more water for shale gas than for oil or natural gas), of greenhouse gas emissions (a lot a methane is leaking during this exploitation, and methane has a much stronger greenhouse effect than CO2), of environmental risks (shale gas wells are significantly susceptible to pollute underground waters, and radon is present in shale gas and would be released in housing). The second point of view outlines the lack of knowledge of the French underground, and that it is therefore impossible to assess shale gas reserves and exploitation possibilities

  16. Automatic exploitation system for photographic dosemeters

    International Nuclear Information System (INIS)

    The Laboratory of Dosimetry Exploitation (LED) has realized an equipment allowing to exploit automatically photographic film dosemeters. This system uses an identification of the films by code-bars and gives the doses measurement with a completely automatic reader. The principle consists in putting in ribbon the emulsions to be exploited and to develop them in a circulation machine. The measurement of the blackening film is realized on a reading plate having fourteen points of reading, in which are circulating the emulsions in ribbon. The exploitation is made with the usual dose calculation method, with special computers codes. A comparison on 2000 dosemeters has shown that the results are the same in manual and automatical methods. This system has been operating since July 1995 by the LED. (N.C.)

  17. Organ sales: exploitative at any price?

    Science.gov (United States)

    Lawlor, Rob

    2014-05-01

    In many cases, claims that a transaction is exploitative will focus on the details of the transaction, such as the price paid or conditions. For example, in a claim that a worker is exploited, the grounds for the claim are usually that the pay is not sufficient or the working conditions too dangerous. In some cases, however, the claim that a transaction is exploitative is not seen to rely on these finer details. Many, for example, claim that organ sales would be exploitative, in a way that doesn't seem to depend on the details. This article considers, but ultimately rejects, a number of arguments which could be used to defend this sort of claim. PMID:23025892

  18. Exploitation of Children Widespread, ILO Reports.

    Science.gov (United States)

    Kucherov, Tanya

    1980-01-01

    Reports that nearly 55 million children under age 15 are working in violation of labor standards. Discusses industries in which child labor is common, effects on children's safety and health, and social and economic causes of exploitation. (SK)

  19. Identité et exploitation au travail

    Directory of Open Access Journals (Sweden)

    Danilo Martuccelli

    2013-11-01

    Full Text Available This article explores some aspects of identity exploitation in the world of work. For this, he proceeds in three stages. First, it presents three major forms of capacity of employees - qualification, skills, identities. Then it draws the outlines of specific objective and subjective identity exploitation at work. Finally, it examines the notions of justice and injustice that can be mobilized to account this process.

  20. The Political Economy of Wildlife Exploitation

    OpenAIRE

    Anders Skonhoft; Jan Tore Solstad

    1998-01-01

    In this paper we analyze the exploitation of wildlife in a Third World context. In the model there are two agents: an agency managing a habitat area of fixed size and a group of peasants. The agency managing the habitat area has the legal right to exploit the wildlife, while the local people hunt illegally. Introducing the concept of relative harvesting dominance, we demonstrate that the stock utilization depends crucially on the prevailing economic and ecological conditions. It is also shown...

  1. The exploitation of social tagging in libraries

    OpenAIRE

    Κακάλη, Κωνσταντία; Παπαθεοδώρου, Χρήστος

    2011-01-01

    Nowadays, many libraries have developed social tagging services, after the considerable use of social tagging and deployment as key components of Web 2.0. Another set of libraries have enriched the search and indexing services of their OPACs with the folksonomy of Library Thing. The evaluation of these metadata (folksonomies) and further their exploitation is one of our challenges. At the same time, we explore ways to define a methodology for the exploitation of user’s vocabulary by the tradi...

  2. A Theory of Exploitative Child Labor

    OpenAIRE

    Carol Ann Rogers; Kenneth A. Swinnerton

    2005-01-01

    Child labor laws should aim to protect children who work, instead of trying to remove children from work. In this paper, we identify an instance when the risk of exploitation lowers the expected bene…t of child labor to the child,and therefore suppresses child labor force participation. Targeted legal intervention that lowers or removes the risk of exploitation raises child participation in the labor market, child welfare, and overall societal welfare. Targeting on child labor more broadly ma...

  3. Serological detection of Anaplasma marginale, Babesia bovis and Babesia bigemina in beef cattle of the northern and central-western regions of Brazil

    Directory of Open Access Journals (Sweden)

    Jenevaldo Barbosa da Silva

    2015-06-01

    Full Text Available The objective of this study was to assess the occurrence of antibodies against Anaplasma marginale, Babesia bovis and Babesia bigemina in beef cattle of the northern and central-western regions of Brazil. A total of 1703 blood samples were collected from cattle from 100 farms distributed among 37 municipalities in the states of Mato Grosso, Pará and Tocantins. The search for antibodies was conducted using an indirect enzyme-linked immunosorbent assay (ELISA, and antibodies were observed for B. bovis, B. bigemina and A. marginale in cattle from Mato Grosso, Tocantins and Pará at rates of 99%, 90% and 41%; 99%, 70% and 52%; and 97%, 97% and 75%, respectively. The results show that the analyzed regions exhibit enzootic stability for infection with B. bovis and B. bigemina, whereas the same result was not observed with A. marginale.

  4. Detection of Anaplasma antibodies in wildlife and domestic species in wildlife-livestock interface areas of Kenya by major surface protein 5 competitive inhibition enzyme-linked immunosorbent assay

    Directory of Open Access Journals (Sweden)

    J.J.N. Ngeranwa

    2008-09-01

    Full Text Available The seroprevalence of Anaplasma antibodies in wildlife (eland, blue wildebeest, kongoni, impala, Thomson's gazelle, Grant's gazelle, giraffe and plains zebra and domestic animal (cattle, sheep and goat populations was studied in wildlife / livestock interface areas of Kenya. Serum samples were analyzed by competitive inhibition enzyme-linked immunosorbent assay (CI-ELISA, using a recombinant antigen (MSP-5 from Anaplasma marginale surface membrane. A monoclonal antibody, FC-16, was used as the primary antibody, while anti-mouse conjugated to horseradish peroxidase was used as the secondary antibody. The results indicate a high seroprevalence in both wildlife and livestock populations, in contrast to earlier reports from Kenya, which indicated a low seroprevalence. The differences are attributed to the accurate analytical method used (CI-ELISA, as compared with agglutination techniques, clinical signs and microscopy employed by the earlier workers.

  5. Detection of Anaplasma antibodies in wildlife and domestic species in wildlife-livestock interface areas of Kenya by major surface protein 5 competitive inhibition enzyme-linked immunosorbent assay.

    Science.gov (United States)

    Ngeranwa, J J N; Shompole, S P; Venter, E H; Wambugu, A; Crafford, J E; Penzhorn, B L

    2008-09-01

    The seroprevalence of Anaplasma antibodies in wildlife (eland, blue wildebeest, kongoni, impala, Thomson's gazelle, Grant's gazelle, giraffe and plains zebra) and domestic animal (cattle, sheep and goat) populations was studied in wildlife/livestock interface areas of Kenya. Serum samples were analyzed by competitive inhibition enzyme-linked immunosorbent assay (CI-ELISA), using a recombinant antigen (MSP-5) from Anaplasma marginale surface membrane. A monoclonal antibody, FC-16, was used as the primary antibody, while anti-mouse conjugated to horseradish peroxidase was used as the secondary antibody. The results indicate a high seroprevalence in both wildlife and livestock populations, in contrast to earlier reports from Kenya, which indicated a low seroprevalence. The differences are attributed to the accurate analytical method used (CI-ELISA), as compared with agglutination techniques, clinical signs and microscopy employed by the earlier workers. PMID:19040134

  6. L'exploitation des algues en Bretagne

    OpenAIRE

    Arzel, Pierre

    2003-01-01

    Les algues sont exploitées sur les côtes de Bretagne. Le potentiel y est varié et riche. Depuis plusieurs siècles, cette exploitation fournit de la matière première à l'industrie. Les besoins élevés tant de l'industrie que de l'agriculture ont conduit les administrations impliquées à imposer des règles strictes d'exploitation. Ces mesures ont été complétées de tout temps par des us et coutumes qui visaient à mieux organiser les campagnes de récolte. Aujourd'hui, la récolte porte sur un...

  7. Oil exploitation and the environmental Kuznets curve

    Energy Technology Data Exchange (ETDEWEB)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar [Department of Agricultural Economics, College of Agriculture, Shiraz University, Shiraz, Fars (Iran)

    2009-01-15

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  8. PUNISHMENT FOR SEXUAL EXPLOITATION OF THE CHILDREN

    OpenAIRE

    B. P. Tiwari

    2015-01-01

    Sexual Exploitation of the children for any country is worst than other offence against children. It is not only the duty of state to protect the dignity of the women but, Article 51 A(e) of the constitution imposes the duty on every citizen of India in mandatory from which says that “It shall be the duty of every citizen of India, to renounce practices derogatory to the dignity of women.” The Sexual Exploitation of children is a social disease that denies a child their basic rights as ...

  9. Exploitation Cinema and the Lesbian Imagination

    OpenAIRE

    Crémieux, Anne

    2016-01-01

    À leur sortie, les films d’exploitation ont été critiqués pour leur représentation des femmes et des homosexuelles. Cependant, le recul du temps et les transformations de la société permettent aux publics féministes de s’approprier des films et leurs curieux personnages queer qu’ils peuvent désormais apprécier non seulement comme traces du passé, mais aussi comme des personnages véritablement subversifs. Cet article évoque des films d’exploitation comme Faster Pussycat! Kill! Kill! (1965) ou ...

  10. Child Exploitation: Some Pieces of the Puzzle.

    Science.gov (United States)

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  11. Randomized Heuristics for Exploiting Jacobian Scarcity

    OpenAIRE

    Lyons, Andrew; Safro, Ilya

    2009-01-01

    Griewank and Vogel introduced the notion of Jacobian scarcity, which generalizes the properties of sparsity and rank to capture a kind of deficiency in the degrees of freedom of the Jacobian matrix $F'(mathbf{x}).$ We describe new randomized heuristics that exploit scarcity for the optimized evaluation of collections of Jacobian-vector or Jacobian-transpose-vector products.

  12. End of the Jouac mines exploitation

    International Nuclear Information System (INIS)

    The Society of Jouac Mines (SMJ) works the uranium deposit of Bernardan since 1978. The document presents the management of this deposit exploitation end. The historical and social aspects, the site remedial, the wastes storage and the economic aspect of the project are provided. (A.L.B.)

  13. Dynamics and exploitation of unstable percid populations.

    NARCIS (Netherlands)

    Buijse, A.D.

    1992-01-01

    The gill net fishery on perch (Perca fluviatilis) and especially the highly valued pikeperch (Stizostedion lucioperca) in Lake IJssel is characterised by large variations in the yield. These variations are caused by variations in yearclass strength in combination with the high exploitation rate. In

  14. Mineral exploitation and development in Greenland

    DEFF Research Database (Denmark)

    Hendriksen, Kåre; Hoffmann, Birgitte; Jørgensen, Ulrik

    using immigrant and migrant labourers that work intensively while living in temporary quarters. The historic experiences of Greenland tell that a different, slower exploitation of mineral resources may contribute to social improvements and competence building thereby providing long-term improvements for...

  15. Exploiting multilevel preconditioning techniques in eigenvalue computations

    NARCIS (Netherlands)

    Sleijpen, Gerard L.G.; Wubs, Fred W.

    2003-01-01

    In the Davidson method, any preconditioner can be exploited for the iterative computation of eigenpairs. However, the convergence of the eigenproblem solver may be poor for a high quality preconditioner. Theoretically, this counter-intuitive phenomenon with the Davidson method is remedied by the Jac

  16. The Illegal Exploitation of Natural Resources

    NARCIS (Netherlands)

    Boekhout van Solinge, T.

    2014-01-01

    This essay discusses the involvement of organized crime in natural resource exploitation and trade. This is accomplished by examining case studies from different tropical regions in the world: Africa (Liberia, Sierra Leone, and DR Congo), Southeast Asia (Indonesia), and Latin America (Brazilian Amaz

  17. Packaging of Sin Goods - Commitment or Exploitation?

    DEFF Research Database (Denmark)

    Nafziger, Julia

    to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves...

  18. Trolling may intensify exploitation in crappie fisheries

    Science.gov (United States)

    Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.

    2012-01-01

    In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation

  19. Vigilancia Epidemiológica de Rickettsia‚ Ehrlichia y Anaplasma en Fauna Silvestre ex situ e in situ de algunas Regiones de Colombia -resumen-

    Directory of Open Access Journals (Sweden)

    Santiago Monsalve-Buriticá

    2014-12-01

    Full Text Available Las enfermedades causadas por bacterias del orden de los Rickettsiales son trasmitidas por ectoparásitos originados en vida silvestre‚ sin embargo‚ en Colombia no existe una línea base del conocimiento en este sentido. Estos microorganismos intracelulares son causantes de enfermedades transmisibles en pacientes humanos; convirtiéndolas en zoonosis de tipo emergente. Este estudio ha permitido determinar la presencia de microorganismos del orden de los Rickettsiales (Ehrlichia spp.‚ Anaplasma spp.‚ y Rickettsia spp. en ejemplares silvestres de centros de conservación ex situ (Zoológicos‚ CAV y CAVR y en algunas regiones en condiciones in situ del país. De igual manera se identifica la infección de estos microorganismos en ectoparásitos vectores relacionados. Por medio de la técnica PCRrt‚ se detectó la presencia de Rickettsia spp.‚ Anaplasma spp.‚ y Ehrlichia spp.‚ en suero obtenido de mamíferos‚ y garrapatas colectadas de reptiles y mamíferos del Centro de Atención y Valoración de Fauna silvestre de la Corporación Autónoma Regional de los Valles del Sinú y San Jorge CAV-CVS en Montería (Córdoba‚ en osos hormigueros (Myrmecophaga tridactyla en Pore (Casanare‚ y en garrapatas obtenidas en ejemplares de titi gris (Saguinus leucopus y su hábitat en la vereda La Parroquia en Mariquita (Tolima. En Montería‚ los resultados obtenidos en mamíferos demostraron la ausencia de Rickettsia spp. en 72 muestras de suero‚ sin embargo se detectó un pool de garrapatas de la especie Amblyomma ovale positivo a este microorganismo‚ siendo el primer reporte en Colombia de ectoparásitos de Puma concolor positivos a Rickettsia spp.‚ mientras que en reptiles se detectaron 18 pools de garrapatas positivos a Rickettsia spp (90 %. En las garrapatas colectadas de nueve osos palmeros (Myrmecophaga tridactyla de vida libre se detectaron 12 pool de garrapatas positivos a este microorganismo (17‚6 %‚ y en ejemplares de

  20. Exploitable underground water reserves; 1 : 500 000

    International Nuclear Information System (INIS)

    The documents of the Slovak Hydrometeorological Institute (the State Water-Economic Balance of the SR, Water-Economic Balance for 1988 - part Underground Waters) were used as the source materials. Calculation of the exploitable underground water reserves was based on the hydrological characteristics of the individual hydro-geological zones. The obtained values of the exploitable underground water supply are expressed in dm3.s-1.km-2 for the particular hydrogeological zone. The seven-grade scale of yield from 0 to 10 dm3.s-1.km-2 and more was compiled from the obtained values. Numerical signing of hydrogeological zone, which agrees with the new Hydrogeological Zoning of the SR from 1998 is also expressed in the map. The zones are numbered from 001 to 142 and the stratigraphic indices, which characterise the stratigraphic appurtenance of the zone, were aligned to the numbers. (authors)

  1. Energy exploitation of agricultural residues in Crete

    Energy Technology Data Exchange (ETDEWEB)

    Vamvuka, D.; Tsoutsos, T.D.

    2002-07-01

    The island of Crete is a typical Mediterranean area with a high biomass potential, the major part of which is still unexploited or irrationally exploited, but at the same time has a problematic energy supply during the high touristic season. In this paper the energy content of the biomass potential is estimated, as a parameter to alleviate the energy system of the island. The exploitation of biomass is studied with reference to the following aspects: the major residue production (olive kernel, husks - citrus fruits, grapes), branches (olive tree, citrus tree, grape tree); the qualitative analysis (proximate, ultimate, calorific value, ash analysis) of samples of basic agricultural residues of the Cretan production (vineshoots, olive tree wood and citrus, olive kernel). (author)

  2. Dynamics and exploitation of unstable percid populations.

    OpenAIRE

    Buijse, A.D.

    1992-01-01

    The gill net fishery on perch (Perca fluviatilis) and especially the highly valued pikeperch (Stizostedion lucioperca) in Lake IJssel is characterised by large variations in the yield. These variations are caused by variations in yearclass strength in combination with the high exploitation rate. In the present study a start has been made to explain the causes for variations in year-class strength. In addition, possible management measures are evaluated for their effectiveness in optimising yi...

  3. Exploiting log files in video retrieval

    OpenAIRE

    Hopfgartner, F.; Urruty, T.; Villa, R.; Gildea, N.; Jose, J.M.

    2008-01-01

    While research into user-centered text retrieval is based on mature evaluation methodologies, user evaluation in multimedia retrieval is still in its infancy. User evaluations can be expensive and are also often non-repeatable. An alternative way of evaluating such systems is the use of simulations. In this poster, we present an evaluation methodology which is based on exploiting log files recorded from a user-study we conducted.

  4. Exploiting tag correlations to improve multilabel learning

    OpenAIRE

    Payne, Brent

    2011-01-01

    This thesis looks at applying tags to musical songs as a multilabeling problem. We focus on the CAL500 dataset which summarizes 1704 student reviews into tags for 502 songs. This summarization loses information, so we create the CAL1700 dataset which uses each of the student reviews to generate a single multilabel. We develop a two-layer technique to exploit tag correlations. The first layer makes tag predictions based on data features. The second layer applies correlation information to thes...

  5. Exploitation of Folksonomies in Subject Analysis

    OpenAIRE

    Παπαθεοδώρου, Χρήστος; Κακάλη, Κωνσταντία

    2010-01-01

    Social tagging is one of the most popular of social media applications and has attracted the interest of a number of libraries and museums, which have developed services that facilitate user-community collaboration. This paper presents a methodology for the exploitation of social tagging in subject indexing, and explores that method through a case study in an academic library setting. The findings reveal the characteristics of users' tagging behavior, which mainly enhances the subject descrip...

  6. Matching characteristic codes: exploiting two directions

    OpenAIRE

    Lehner, Luis

    1999-01-01

    Combining incoming and outgoing characteristic formulations can provide numerical relativists with a natural implementation of Einstein's equations that better exploits the causal properties of the spacetime and gives access to both null infinity and the interior region simultaneously (assuming the foliation is free of caustics and crossovers). We discuss how this combination can be performed and illustrate its behavior in the Einstein-Klein-Gordon field in 1D.

  7. Exploiting Social Semantics for Multilingual Information Retrieval

    OpenAIRE

    Sorg, Philipp

    2011-01-01

    In this thesis we consider how user-generated content that is assembled by different popular Web portals can be exploited for Multilingual Information Retrieval. We define the knowledge that can be derived from such portals as Social Semantics. We present to approaches, Cross-lingual Explicit Semantic Analysis and Discriminative Retrieval Models, that are able to support multilingual retrieval models by integrating Social Semantics derived from Wikipedia and Yahoo! Answers.

  8. PUNISHMENT FOR SEXUAL EXPLOITATION OF THE CHILDREN

    Directory of Open Access Journals (Sweden)

    B. P. Tiwari

    2015-01-01

    Full Text Available Sexual Exploitation of the children for any country is worst than other offence against children. It is not only the duty of state to protect the dignity of the women but, Article 51 A(e of the constitution imposes the duty on every citizen of India in mandatory from which says that “It shall be the duty of every citizen of India, to renounce practices derogatory to the dignity of women.” The Sexual Exploitation of children is a social disease that denies a child their basic rights as their human integrity. It has many form, the most common of which is child prostitutions, but incest abuse, rape, child brides and female genital mutilation are lesser known but equally widespread forms of Sexual abuse. Children around the world are sexually abused and exploited on ways but that can cause permanent physical and psychological harm. ‘Child Sexual Abuse’ is a crime so common hideous and yet completely unspoken about the Indian society. Child labour is another form of abuse. Time to time all news papers shows that the child abuse number is increasing. But surprisingly all the agencies to curb this menace is turning deaf ears to it. All the political party and trade union are also least bothered because these children are not the vote banks.

  9. Real time polymerase chain reaction to diagnose Anaplasma marginale in cattle and deer (Ozotoceros bezoarticus leucogaster of the Brazilian Pantanal Reação da polimerase em cadeia tempo real para diagnóstico de Anaplasma marginale em bovino e veado campeiro do Pantanal brasileiro Ozotoceros bezoarticus leucogaster

    Directory of Open Access Journals (Sweden)

    Graziela Picoloto

    2010-09-01

    Full Text Available Epizootiological study of Anaplasma marginale in regions that contain various reservoir hosts, co-existence of rickettsia pathogens, and common vectors is a complicated task. To achieve diagnosis of this rickettsia in cattle and campeiro deer of Brazilian Pantanal, a comparison was made between a real time polymerase chain reaction (RT-PCR with intercalating Sybr Green fluorochrome and primers based on msp5 gene of A. marginale; a conventional PCR (C-PCR; and parasitological examination using thin blood smear stained with Giemsa-MayGrunwald. Both PCRs showed good performance in the diagnosis of A. marginale in cattle, and were superior to the parasitological exam. The RT-PCR detected seven positive campeiro deer (16.3%. This rate was significantly higher compared to C-PCR, which identified one animal as positive (2.3%, and also compared to parasitological diagnosis, which did not find any positive animals. The dissociation temperature average of positive reactions in cattle (81.72 ºC ± 0.20 was identical to dissociation temperature found in the cervids (81.72 ºC ± 0.12, suggesting that both animal species were infected with A. marginale. We concluded that RT-PCR can be used for A. marginale diagnosis and in epizootiological studies of cattle and cervids; in spite of the small number of campeiro deer samples, the results indicated that this wildlife species has importance in the Anaplasma epizootiology in the Brazilian Pantanal.O estudo epizootiológico de Anaplasma marginale em regiões que existem vários reservatórios, co-existência de espécies de riquétsias patógenas e vetores comuns é uma tarefa complicada. Com o objetivo de obter o diagnóstico dessa riquétsia em bovinos e veado campeiro do Pantanal brasileiro foi avaliada uma reação da polimerase em cadeia em tempo real (PCR-TR com o fluoróforo intercalante de fita dupla de DNA Sybr Green e iniciadores baseados na seqüência do gene msp5 de A. marginale comparando-a a uma

  10. Human trafficking, modern day slavery, and economic exploitation

    OpenAIRE

    Koettl, Johannes

    2009-01-01

    Human trafficking, as it is defined by international law, subsumes all forms of nonconsensual exploitation. That is, whenever people are forced or lured into exploitation no matter if movement of victims is involved it is considered human trafficking. There is, though, a large overlap with consensual exploitation, namely when economic vulnerabilities forcevictims to accept exploitative work arrangements. Consensual exploitation is mostly addressed through social and labor law, which is also a...

  11. Objectivist versus Subjectivist Approaches to the Marxian Theory of Exploitation

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2009-01-01

    This paper analyses two central issues in exploitation theory. First, the appropriate definition of individual and aggregate measures of exploitation is discussed. Second, the relation between profits and exploitation (the so-called Fundamental Marxian Theorem) is analysed. A general framework for the analysis of exploitation in the context of convex cone economies is proposed and various alternative equilibrium concepts are discussed. The limits of subjectivist approaches to exploitation, wh...

  12. Immunogenicity of Outer Membrane Proteins VirB9-1 and VirB9-2, a Novel Nanovaccine against Anaplasma marginale

    Science.gov (United States)

    Cavallaro, Antonino S.; Zhang, Bing; Zhang, Jun; Deringer, James R.; Zhao, Chun-Xia; Brown, Wendy C.; Yu, Chengzhong; Mitter, Neena; Middelberg, Anton P. J.

    2016-01-01

    Anaplasma marginale is the most prevalent tick-borne livestock pathogen and poses a significant threat to cattle industry. In contrast to currently available live blood-derived vaccines against A. marginale, alternative safer and better-defined subunit vaccines will be of great significance. Two proteins (VirB9-1 and VirB9-2) from the Type IV secretion system of A. marginale have been shown to induce humoral and cellular immunity. In this study, Escherichia coli were used to express VirB9-1 and VirB9-2 proteins. Silica vesicles having a thin wall of 6 nm and pore size of 5.8 nm were used as the carrier and adjuvant to deliver these two antigens both as individual or mixed nano-formulations. High loading capacity was achieved for both proteins, and the mouse immunisation trial with individual as well as mixed nano-formulations showed high levels of antibody titres over 107 and strong T-cell responses. The mixed nano-formulation also stimulated high-level recall responses in bovine T-cell proliferation assays. These results open a promising path towards the development of efficient A. marginale vaccines and provide better understanding on the role of silica vesicles to deliver multivalent vaccines as mixed nano-formulations able to activate both B-cell and T-cell immunity, for improved animal health. PMID:27115492

  13. The prevalence of Ehrlichia canis, Anaplasma platys and Babesia spp. in dogs in Nueva Ecija, Philippines based on multiplex polymerase chain reaction (mPCR) assay.

    Science.gov (United States)

    Corales, Joyce Marielle I; Viloria, Victoria V; Venturina, Virginia M; Mingala, Claro N

    2014-01-01

    The aim of the study was to determine the prevalence of Ehrlichia canis, Anaplasma platys and Babesia spp. in dogs. It describes the practice of veterinarians in detecting tick-borne diseases in Nueva Ecija, Philippines. Seventy blood samples were collected and were subjected to multiplex PCR for the detection of E. canis, Babesia spp. and A. platys. The prevalence of babesiosis is the highest in Cabanatuan City (2/10), while a 10% prevalence (1/10) was observed in Science City of Muñoz, Talavera and Sta. Rosa. E. canis were only detected in Cabanatuan City. However, no anaplasmosis was detected in any area. The prevalence of babesiosis and ehrlichiosis in Nueva Ecija is 7.14% (5/70) and 2.85% (2/70) respectively. In addition, 70% (7/10) of the Nueva Ecija veterinary practitioners encountered cases of suspected ehrlichiosis in their practice. The diagnosis of ehrlichiosis is based primarily on presented clinical signs and complete blood counts, which include a platelet count. Of the 10 respondents, half utilized test kits while 90% interpreted blood samples. Meanwhile, only 60% of the respondents used an ELISA test kit for ehrlichiosis. For some practitioners, the main reason for not utilizing a kit is the high cost. None of the respondents had previously attended cases of suspected anaplasmosis. Only one respondent diagnosed a case of babesiosis by blood smear microscopy. PMID:25706424

  14. Frequency of Anaplasma marginale (Theiler 1910 and Babesia sp in mestizo bovine Zebu, in the Municipality of Ixiamas county Abel Iturralde Department of The La Paz, Bolivia

    Directory of Open Access Journals (Sweden)

    Mercado Alvaro

    2011-08-01

    Full Text Available The present work one carries out in the Municipality of Ixiamas County Abel Iturralde of the department of Peace-Bolivia, between May and August of 2010. The objective was to determine the presence of Anaplama sp and Babesia sp, through sanguine smear, they took 160 samples of blood, 40 bovine of the four areas they have been evaluated. The results indicate the presence of Anaplasma sp 6,90%, 6,20% in females and 9,70% in males, this represents 2,50% for the area TO, 5,00% area B, 17,50% area C and 2,50% area D. According to the category 12,50% in calves, 0,00% in torillos, 4,80% in bulls, 6,20% in cows and 14,30% in heifers. The presence of Babesia sp 3,13%, with relationship to the sex 3,10% in females and 3,22% in males, being observed 2,50% in the area TO, 5,00% in the area B, 5,00% in the area C and 0,00% in the area D, according to the category 0,00% in calves, torillos 4,80% bulls, 2,73% vacates and 7,14% in heifers.

  15. Exploitation of subsea gas hydrate reservoirs

    Science.gov (United States)

    Janicki, Georg; Schlüter, Stefan; Hennig, Torsten; Deerberg, Görge

    2016-04-01

    Natural gas hydrates are considered to be a potential energy resource in the future. They occur in permafrost areas as well as in subsea sediments and are stable at high pressure and low temperature conditions. According to estimations the amount of carbon bonded in natural gas hydrates worldwide is two times larger than in all known conventional fossil fuels. Besides technical challenges that have to be overcome climate and safety issues have to be considered before a commercial exploitation of such unconventional reservoirs. The potential of producing natural gas from subsea gas hydrate deposits by various means (e.g. depressurization and/or injection of carbon dioxide) is numerically studied in the frame of the German research project »SUGAR«. The basic mechanisms of gas hydrate formation/dissociation and heat and mass transport in porous media are considered and implemented into a numerical model. The physics of the process leads to strong non-linear couplings between hydraulic fluid flow, hydrate dissociation and formation, hydraulic properties of the sediment, partial pressures and seawater solution of components and the thermal budget of the system described by the heat equation. This paper is intended to provide an overview of the recent development regarding the production of natural gas from subsea gas hydrate reservoirs. It aims at giving a broad insight into natural gas hydrates and covering relevant aspects of the exploitation process. It is focused on the thermodynamic principles and technological approaches for the exploitation. The effects occurring during natural gas production within hydrate filled sediment layers are identified and discussed by means of numerical simulation results. The behaviour of relevant process parameters such as pressure, temperature and phase saturations is described and compared for different strategies. The simulations are complemented by calculations for different safety relevant problems.

  16. Molecular Detection of Tick-Borne Rickettsiales in Goats and Sheep from Southeastern China.

    Science.gov (United States)

    Ge, Yan; Yin, Hongmei; Rikihisa, Yasuko; Pan, Weiqing; Yin, Hong

    2016-05-01

    Members from Rickettsiales such as Anaplasma phagocytophilum, Ehrlichia chaffeensis, and some spotted fever group (SFG) Rickettsiae are important tick-borne pathogens. One hundred goats and sheep from southeastern China were examined for the presence of Anaplasma, E. chaffeensis, and SFG Rickettsiae by PCR. A. phagocytophilum, Anaplasma bovis, and Anaplasma centrale were detected in 15, 49, and 16 samples, respectively. The A. phagocytophilum and A. centrale were highly homologous to strains from Japanese sika deer and Japanese cattle, respectively, whereas a diversity of A. bovis sequences were detected. New genetic variants of Anaplasma close to A. centrale have been revealed. No Ehrlichia was detected in this study. The presence of SFG Rickettsiae was determined in 26 samples. The coinfection with more than two pathogens tested in this study was as high as 29%. This study has molecularly characterized the circulation of Anaplasma and Rickettsiae in goats and sheep in southeastern China, which highlights the risk of contracting the pathogens upon tick exposure. PMID:26872274

  17. Exploiting Polyhedral Symmetries in Social Choice

    CERN Document Server

    Schürmann, Achill

    2011-01-01

    A large amount of literature in social choice theory deals with quantifying the probability of certain election outcomes. One way of computing the probability of a specific voting situation under the impartial anonymous culture is via counting integral points in polyhedra. Here, Ehrhart theory can help, but unfortunately the dimension and complexity of the involved polyhedra grows rapidly with the number of candidates. However, if we exploit available polyhedral symmetries, some computations become possible that previously were infeasible. We show this in three well known examples: Condorcet's paradox, Condorcet efficiency of plurality voting and in Plurality voting vs Plurality Runoff.

  18. Geothermal resources: exploration and exploitation. A bibliography

    Energy Technology Data Exchange (ETDEWEB)

    1976-07-01

    This comprehensive bibliography contains 5476 citations of foreign and domestic research reports, journal articles, patents, conference proceedings, and books concerned with the exploration and exploitation of geothermal resources. The coverage dates back as far as useful references could be obtained and extends through June 1976. References are arranged in broad subject categories and are made up of complete bibliographic citations. These are followed by a listing of subject descriptors used to describe the subject content of each reference. Four indexes are included: Corporate, Personal Author, Subject, and Report Number. Also included is a list of journals from which articles were selected. (LBS)

  19. Electromagnetic Optimization Exploiting Aggressive Space Mapping

    DEFF Research Database (Denmark)

    Bandler, J. W.; Biernacki, R.; Chen, S.;

    1995-01-01

    We propose a significantly improved space mapping (SM) strategy for electromagnetic (EM) optimization. Instead of waiting for upfront EM analyses at several base points, our new approach aggressively exploits every available EM analysis, producing dramatic results right from the first step. We...... establish a relationship between the novel SM optimization and the quasi-Newton iteration for solving a system of nonlinear equations. Approximations to the matrix of first-order derivatives are updated by the classic Broyden formula. A high-temperature superconducting microstrip filter design solution...

  20. Exploiting HRM in support of lean manufacturing

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Matthiesen, Rikke

    The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the...... lean manufacturing....

  1. Exploiting Reference Images in Exposing Geometrical Distortions

    Directory of Open Access Journals (Sweden)

    Rimba Whidiana Ciptasari

    2013-07-01

    Full Text Available Nowadays, image alteration in the mainstream mediahas become common. The degree of manipulation isfacilitated by image editing software. In the pasttwo decades the number indicating manipulation ofimages rapidly grows. Hence, there are many outstanding images which have no provenance informationor certainty of authenticity. Therefore, constructing a scientific and automatic way for evaluating imageauthenticity is an important task, which is the aimof this paper. In spite of having outstandingperformance, all the image forensics schemes developed so far have not provided verifiable informationabout source of tampering. This paper aims to propose a different kind of scheme, by exploiting a group ofsimilar images, to verify the source of tampering.First, we define our definition with regard to tamperedimage. The distinctive features are obtained by exploiting Scale- Invariant Feature Transform (SIFTtechnique. We then proposed clustering technique toidentify the tampered region based on distinctivekeypoints. In contrast to k-means algorithm, our technique does not require the initialization of k value. Theexperimental results over and beyond the dataset indicate the efficacy of our proposed scheme.

  2. Large size space construction for space exploitation

    Science.gov (United States)

    Kondyurin, Alexey

    2016-07-01

    Space exploitation is impossible without large space structures. We need to make sufficient large volume of pressurized protecting frames for crew, passengers, space processing equipment, & etc. We have to be unlimited in space. Now the size and mass of space constructions are limited by possibility of a launch vehicle. It limits our future in exploitation of space by humans and in development of space industry. Large-size space construction can be made with using of the curing technology of the fibers-filled composites and a reactionable matrix applied directly in free space. For curing the fabric impregnated with a liquid matrix (prepreg) is prepared in terrestrial conditions and shipped in a container to orbit. In due time the prepreg is unfolded by inflating. After polymerization reaction, the durable construction can be fitted out with air, apparatus and life support systems. Our experimental studies of the curing processes in the simulated free space environment showed that the curing of composite in free space is possible. The large-size space construction can be developed. A project of space station, Moon base, Mars base, mining station, interplanet space ship, telecommunication station, space observatory, space factory, antenna dish, radiation shield, solar sail is proposed and overviewed. The study was supported by Humboldt Foundation, ESA (contract 17083/03/NL/SFe), NASA program of the stratospheric balloons and RFBR grants (05-08-18277, 12-08-00970 and 14-08-96011).

  3. ROUNDTABLE - SESSION 2 EXPLOITATION, CONSERVATION AND LEGISLATION

    Directory of Open Access Journals (Sweden)

    EDSMAN L.

    2004-01-01

    Full Text Available The link between socioeconomics and conservation and the role of legislation in conservation work was discussed in the group with participants from nine European countries. Interest and knowledge among the general public, stakeholders and managers is the key to successful conservation of native crayfish species. Exploitation and conservation do not necessarily exclude each other. A controlled fishery, where it can be sustained, may be an essential tool for conservation by increasing the general awareness and involving more people in the task of protecting the native crayfish species. This strategy is mainly possible for the noble crayfish in the northern part of its distribution, where strong traditions connected to crayfish also exist. A balance between utilisation and overexploitation has to be found and local guidelines for sustainable exploitation produced. Media, the Internet and educational material aimed at schools and stakeholders are excellent ways of reaching a wide audience with information. Universal objectives, rules and regulations at the European level are desirable and the noble crayfish and the stone crayfish should be included in Annex II of the Habitat Directive. Based on this framework detailed regulations are best worked out at the national level, considering the specific crayfish situation in the country. Information about the legislation, the purpose of the legislation and the consequences when not obeying it should be distributed. Stricter regulation of the trade with live alien crayfish is vital because of the associated risk of introducing new diseases and species.

  4. Capitalist exploitation without capitalist production: The consequences of imperfect contracting

    OpenAIRE

    Gilbert Skillman

    2014-01-01

    On the basis of a static general equilibrium analysis premised on frictionless exchange conditions in competitive markets, John Roemer’s General Theory of Exploitation and Class challenges the canonical Marxian account of capitalist exploitation by arguing that unequal distribution of economically scarce productive assets suffices to enable the exploitation of labor by capital. Marxian critics have dismissed Roemer’s characterization partly on the presumption that capitalist exploitation ...

  5. Total exploitation of an ornamental granite quarry

    Directory of Open Access Journals (Sweden)

    Taboada, J.

    2005-09-01

    Full Text Available In this paper we propose a methodology to estimate the recovery percentage for each of the products which can be obtained from the exploitation of an ornamental granite quarry: block, semiblock, masonry-transverse stone, and the smaller materials that can be used to obtain construction aggregates. This methodology ensures that quarry exploitation is exhaustive, thereby minimising the production of spoils and the consequent negative impact on the environment. The analysis is based on a detailed and exhaustive compilation of discontinuity data from the research fronts, which are then interpreted statistically and projected over the three weakness planes that are a particular feature of ornamental granite deposits. Using this information, and bearing in mind the minimum commercially viable sizes for each kind of granite, the corresponding recovery rates are calculated for each material in each plane. The results are then integrated using spatial techniques, and the result is an evaluation of quarry contents with a view to total exploitation. This methodology was applied to a quarry in the opening phase in order to carry out an a priori assessment of the economic feasibility of the quarry.

    En este trabajo se propone una metodología para estimar el porcentaje de recuperación de cada uno de los productos que se pueden obtener en la explotación de una cantera de granito ornamental: bloque, semibloque, manpostería y per piaños, y material restante destinado a la obtención de áridos. De esta manera se logra un aprovechamiento integral de la cantera, evitándose la generación de estériles y el subsiguiente impacto ambiental producido por éstos. La metodología de análisis se basa en la recopilación detallada y exhaustiva de datos de discontinuidades en los frentes de investigación, que se interpretan estadísticamente y se proyectan sobre los tres planos de debilidad propios del granito ornamental. Con esta información, y las

  6. Explosives Detection: Exploitation of the Physical Signatures

    Science.gov (United States)

    Atkinson, David

    2010-10-01

    Explosives based terrorism is an ongoing threat that is evolving with respect to implementation, configuration and materials used. There are a variety of devices designed to detect explosive devices, however, each technology has limitations and operational constraints. A full understanding of the signatures available for detection coupled with the array of detection choices can be used to develop a conceptual model of an explosives screening operation. Physics based sensors provide a robust approach to explosives detection, typically through the identification of anomalies, and are currently used for screening in airports around the world. The next generation of detectors for explosives detection will need to be more sensitive and selective, as well as integrate seamlessly with devices focused on chemical signatures. An appreciation for the details of the physical signature exploitation in cluttered environments with time, space, and privacy constraints is necessary for effective explosives screening of people, luggage, cargo, and vehicles.

  7. Intertemporal Choice of Marine Ecosystem Exploitation

    DEFF Research Database (Denmark)

    Ravn-Jonsen, Lars

    the ecosystem level in the present management. Therefore, economic predictions for an ecosystem managed as a common pool resource must be that  the exploitation probably are conducted at lower sized than optimum. In addition, given its population stock approach, the present management probably......The term ``Fishing Down Marine Food Webs'' describes the gradual transition in landing from marine ecosystems towards organisms lower in the food web. To address this issue and the need to manage the marine ecosystem in a broader perspective, Ecosystem Management is recommended. Ecosystem...... Management, however, requires models that can link the ecosystem level to the operation level, so this paper examines an ecosystem production model and shows that it is suitable for applying ground rent theory. This model is the simplest possible that incorporates the principles of size as the main...

  8. Exploiting novel molecular targets in gastrointestinal cancers

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Novel molecular targets are being discovered as we learn more about the aberrant processes underlying various cancers. Efforts to translate this knowledge are starting to impact on the care of patients with gastrointestinal cancers. The epidermal growth factor receptor (EGFR) pathway and angiogenesis have been targeted successfully in colorectal cancer with cetuximab, panitunumab and bevacizumab. Similarly, EGFR-targeting with erlotinib yielded significant survival benefit in pancreatic cancer when combined with gemcitabine. The multi-targeting approach with sorafenib has made it the first agent to achieve significant survival benefit in hepatocellular carcinoma. Efforts to exploit the dysregulated Akt/mTOR pathway in GI cancer therapy are ongoing. These molecular targets can be disrupted by various approaches, including the use of monoclonal antibody to intercept extracellular ligands and disrupt receptor-ligand binding, and small molecule inhibitors that interrupt the activation of intracellular kinases.

  9. Protocol to Exploit Waiting Resources for UASNs.

    Science.gov (United States)

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  10. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  11. Exploiting Resistive Guiding for Fast Ignition

    Science.gov (United States)

    Robinson, Alex

    2012-10-01

    Devising methods and schemes for controlling fast electron transport remains a major challenge in Fast Ignition research. Realistic estimates of the fast electron divergence angle require this control in order to ensure that the fast electron to hot spot coupling efficiency does not reach excessively low values. Resistivity gradients in the target will lead to strong magnetic field growth (via ∇ηxj) which can be exploited for the purposes of controlling the fast electron propagation (Robinson and Sherlock, PoP (2007)). There are a number of possible schemes which might be considered. Here we will report on numerical simulations that we have carried out on both simple configurations such as parabolic reflectors, and complex arrangements (Robinson, Key and Tabak, PRL (2012)). Substantial improvements to the fast electron to hot spot coupling efficiency have been found even for realistic fast electron divergence angles.

  12. The Evolution of Exploitation Strategies by Myrmecophiles

    DEFF Research Database (Denmark)

    Schär, Sämi

    macrogyne host queens in the same nests. This implies that microgynes either reduce host queen life span, or more likely prefer exploitation of colonies containing disproportionally many old host queens. In a second chapter I found that the abundance of entomopathogens was significantly reduced in ant nests......Myrmecophiles are animals which have evolved to live in the nests of ants. This life history strategy appears in animals as different as insects, spiders, snails, crustaceans and even snakes. Myrmecophiles are very speciose with estimates of up to 100'000 species, which raises the question why this...... strategy has evolved so frequently and is maintained by natural selection. The type of association between Myrmecophiles and ants ranges from mutualistic through to parasitic. These types of symbioses can also be found between and within species of ants. Ant associations can therefore be broadly...

  13. CHARACTERISTICS OF HYDROCARBON EXPLOITATION IN ARCTIC CIRCLE

    Directory of Open Access Journals (Sweden)

    Vanja Lež

    2013-12-01

    Full Text Available The existence of large quantities of hydrocarbons is supposed within the Arctic Circle. Assumed quantities are 25% of the total undiscovered hydrocarbon reserves on Earth, mostly natural gas. Over 500 major and minor gas accumulations within the Arctic Circle were discovered so far, but apart from Snøhvit gas field, there is no commercial exploitation of natural gas from these fields. Arctic gas projects are complicated, technically hard to accomplish, and pose a great threat to the return of investment, safety of people and equipment and for the ecosystem. Russia is a country that is closest to the realization of the Arctic gas projects that are based on the giant gas fields. The most extreme weather conditions in the seas around Greenland are the reason why this Arctic region is the least explored and furthest from the realization of any gas project (the paper is published in Croatian .

  14. Redressing China's Strategy of Water Resource Exploitation

    Science.gov (United States)

    Ran, Lishan; Lu, Xi Xi

    2013-03-01

    China, with the confrontation of water-related problems as an element of its long history, has been investing heavily in water engineering projects over the past few decades based on the assumption that these projects can solve its water problems. However, the anticipated benefits did not really occur, or at least not as large as expected. Instead, the results involved additional frustrations, such as biodiversity losses and human-induced disasters (i.e., landslides and earthquakes). Given its inherent shortcomings, the present engineering-dominated strategy for the management of water resources cannot help solve China's water problems and achieve its goal of low-carbon transformation. Therefore, the present strategy for water resources exploitation needs to be reevaluated and redressed. A policy change to achieve better management of Chinese rivers is urgently needed.

  15. Summary of radiation protection in exploitation

    International Nuclear Information System (INIS)

    This document proposes a large and detailed overview of notions and practices regarding radiation protection in relationship with an NPP exploitation framework. It presents the main notions: matter structure, radioactivity, interactions between matter and radiations, types of ionizing radiation, magnitudes and measurement units, exposure modes, main principles of radiation protection, means of protection against internal and external exposures. The second part proposes an overview of the origin of radiological risks in a nuclear power plant. This origin can be found in fission products, activation products, actinides, designed protections, or circuit contaminations. These radiological risks are more precisely identified and described in terms of detection and prevention (internal exposure risk, contamination risk, iodine-related risk, alpha radiation-related risk, access to the reactor building). The next part addresses the medical and radiological follow-up of exposed workers by a special medical control, by an individual exposure control, by a specific control of female personnel, and by attention to exceptional exposures. Measurement means are presented (detection principles, installation continuous control, workspaces control, personnel contamination control, follow-up of individual dose) as well as collective and individual protection means. The management of radiation protection is addressed through a presentation of decision and management structures for radiation protection, and of EDF objectives and ambitions in this domain. The organization of radiation protection during exploitation is described: responsibilities for radiation protection in a nuclear power station, requirements for workers, preparation of interventions in controlled zone, work execution in controlled zone, zone controls and radiological cleanness of installations. The two last chapters address issues and practices of radiation protection in the case of deconstruction or dismantling, and

  16. Epitope-based vaccines with the Anaplasma marginale MSP1a functional motif induce a balanced humoral and cellular immune response in mice.

    Directory of Open Access Journals (Sweden)

    Paula S Santos

    Full Text Available Bovine anaplasmosis is a hemoparasitic disease that causes considerable economic loss to the dairy and beef industries. Cattle immunized with the Anaplasma marginale MSP1 outer membrane protein complex presents a protective humoral immune response; however, its efficacy is variable. Immunodominant epitopes seem to be a key-limiting factor for the adaptive immunity. We have successfully demonstrated that critical motifs of the MSP1a functional epitope are essential for antibody recognition of infected animal sera, but its protective immunity is yet to be tested. We have evaluated two synthetic vaccine formulations against A. marginale, using epitope-based approach in mice. Mice infection with bovine anaplasmosis was demonstrated by qPCR analysis of erythrocytes after 15-day exposure. A proof-of-concept was obtained in this murine model, in which peptides conjugated to bovine serum albumin were used for immunization in three 15-day intervals by intraperitoneal injections before challenging with live bacteria. Blood samples were analyzed for the presence of specific IgG2a and IgG1 antibodies, as well as for the rickettsemia analysis. A panel containing the cytokines' transcriptional profile for innate and adaptive immune responses was carried out through qPCR. Immunized BALB/c mice challenged with A. marginale presented stable body weight, reduced number of infected erythrocytes, and no mortality; and among control groups mortality rates ranged from 15% to 29%. Additionally, vaccines have significantly induced higher IgG2a than IgG1 response, followed by increased expression of pro-inflammatory cytokines. This is a successful demonstration of epitope-based vaccines, and protection against anaplasmosis may be associated with elicitation of effector functions of humoral and cellular immune responses in murine model.

  17. Natural infection of calves by Anaplasma marginale in dairy herds of the Metalúrgica Region, Minas Gerais Infecção natural por Anaplasma marginale em bezerras de fazendas leiteiras da região Metalúrgica de Minas Gerais

    Directory of Open Access Journals (Sweden)

    Valeska S.P. Melo

    2001-12-01

    Full Text Available The dynamic of natural infections by Anaplasma marginale in calves was evaluated during a period of one year on two farms located in the Metalúrgica Region, State of Minas Gerais, Brazil. Blood samples were collected weekly for rickettsemia and packed cell volume (PCV determination. The animals born from March to July suffered the infection in October and November, independently of their age, whilst calves born from September to December acquired the infection during the first days of life. These animals presented patent rickettsemia from 30 days of life. During the patent period PCV decreased after one week of infection, ranging from 20 to 23%. It was concluded, that in the region studied, the transmission of A. marginale is influenced by climatic conditions, and that calves born during the dry season are more likely to acquire the infection when they are exposed to high transmission levels during the subsequent raining season.Realizou-se um estudo da dinâmica de infecções naturais por Anaplasma marginale, durante o período de um ano, em duas propriedades localizadas na Região Metalúrgica do Estado de Minas Gerais. Foram realizados esfregaços sangüíneos e determinação do volume globular (VG. Os animais que nasceram no período de março a julho sofreram a infecção em outubro e novembro, independentemente da idade, enquanto os que nasceram no período de setembro a dezembro adquiriram a infecção nos primeiros dias de vida, com parasitemia patente a partir de 30 dias de idade. Durante o período patente, o VG reduziu na primeira semana de infecção, variando entre 20 a 23%. Concluiu-se que a ocorrência da primo-infecção sofre influência das estações do ano e que bezerros nascidos na estação seca apresentam maior risco de infecção, quando expostos às condições de elevada transmissão durante a estação chuvosa subseqüente.

  18. Evaluating the effectiveness of an inactivated vaccine from Anaplasma marginale derived from tick cell culture Avaliação da eficácia de uma vacina inativada de Anaplasma marginale derivada de cultura de células de carrapato

    Directory of Open Access Journals (Sweden)

    Pedro Veloso Facury Lasmar

    2012-06-01

    Full Text Available The protective efficacy of an inactivated vaccine from Anaplasma marginale that was cultured in tick cells (IDE8 for use against bovine anaplasmosis was evaluated. Five calves (Group 1 were inoculated subcutaneously, at 21-day intervals, with three doses of vaccine containing 3 × 10(9 A. marginale initial bodies. Five control calves received saline solution alone (Group 2. Thirty-two days after the final inoculation, all the calves were challenged with approximately 3 × 10(5 erythrocytes infected with A. marginale high-virulence isolate (UFMG2. The Group 1 calves seroconverted 14 days after the second dose of vaccine. After the challenge, all the animals showed patent rickettsemia. There was no significant difference (p > 0.05 between the Group 1 and 2 calves during the incubation period, patency period or convalescence period. All the animals required treatment to prevent death. The results suggest that the inactivated vaccine from A. marginale produced in IDE8 induced seroconversion in calves, but was not effective for preventing anaplasmosis induced by the UFMG2 isolate under the conditions of this experiment.Foi avaliada a eficácia de uma vacina protetora para Anaplasma marginale cultivada em células de carrapato (IDE8 para uso contra a anaplasmose bovina. Cinco bezerros (Grupo 1 foram inoculados por via subcutânea com três doses, intervalados de 21 dias, de vacina contendo 3 × 10(9 corpúsculos iniciais de A. marginale inicial. Cinco bezerros do grupo controle receberam apenas solução salina (Grupo 2. Trinta e dois dias após a inoculação final, todos os bezerros foram desafiados com aproximadamente 3 × 10(5 eritrócitos infectados com isolado de A. marginale alta virulência (UFMG2. Os bezerros do Grupo 1 soroconverteram-se 14 dias após a segunda dose da vacina. Após o desafio, todos os animais mostraram riquestsemia patente. Não houve diferença significativa (p > 0,05 entre bezerros do Grupo 1 e 2 em período de incuba

  19. Mission Exploitation Platform PROBA-V

    Science.gov (United States)

    Goor, Erwin

    2016-04-01

    VITO and partners developed an end-to-end solution to drastically improve the exploitation of the PROBA-V EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data. From November 2015 an operational Mission Exploitation Platform (MEP) PROBA-V, as an ESA pathfinder project, will be gradually deployed at the VITO data center with direct access to the complete data archive. Several applications will be released to the users, e.g. - A time series viewer, showing the evolution of PROBA-V bands and derived vegetation parameters for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains e.g. for the calculation of N-daily composites. - A Virtual Machine will be provided with access to the data archive and tools to work with this data, e.g. various toolboxes and support for R and Python. After an initial release in January 2016, a research platform will gradually be deployed allowing users to design, debug and test applications on the platform. From the MEP PROBA-V, access to Sentinel-2 and landsat data will be addressed as well, e.g. to support the Cal/Val activities of the users. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to the complete data archive. To realise this, private cloud technology (openStack) is used and a distributed processing environment is built based on Hadoop. The Hadoop ecosystem offers a lot of technologies (Spark, Yarn, Accumulo, etc.) which we integrate with several open-source components. The impact of this MEP on the user community will be high and will completely change the way of working with the data and hence open the large time series to a larger

  20. War, plague and exploitation in DR Congo

    Directory of Open Access Journals (Sweden)

    Dimčevska Antoaneta K.

    2007-01-01

    Full Text Available Late in autumn 2006 one of the headlines in world media was the first democratic elections in DR Congo. They took place after 30 years of Mobutu Sese Seko’s dictatorship and bloody civil wars in the period 1996-2002. These conflicts, which took approximately 4 million human lives, are called "The First African World War". Elections were held but they did not guarantee the end of trouble for the divided and tormented people in the northeast of Congo, the real scene of bloodshed. The area is still turbulent because it abounds in mineral wealth - gold, diamonds and raw materials for nuclear technology. For a whole decade, unscrupulous actors of the African crisis were fighting there, for illegal profits (achievable in the chaos of bloodshed rather than for democracy, defense of tribal interests, security, etc. as they claimed. In the mines of Eastern Congo unprecedented exploitation of people is still going on, especially of children, victims of conflicts, who suffer in great numbers from violence, starvation and diseases. These slaves of the crisis make local "warlords" and their mentors rich. The looting of the mines has stabilized the crisis because it makes possible enormous accumulation of wealth among armed decision-makers - which also includes availability of countless slaves-miners who have lost everything except their bare lives. Eastern Congo is, however, one of world’s three old focuses of plague; wild exploitation of ores in the area of this endemic disease has activated a sleepy focus and added pneumonic plague to the burdens suffered by the population of the rich but ill-fated region. This was to be expected because endemic plague in the gold-bearing evil circumstances impedes safe mining - and this will be the crucial challenge in the future of Congo. This article is an anthropological outline of the area where gold, plague, weapons and incomparable suffering of people merge together just because of cynic greed producing abuse

  1. Seroprevalence of selected infectious agents in a free-ranging, low-density lion population in the Central Kalahari Game Reserves in Botswana

    OpenAIRE

    Ramsauer, S; Bay, G.; Meli, M; Hofmann-Lehmann, R.; Lutz, H.

    2007-01-01

    Twenty-one free-ranging Central Kalahari lions (Panthera leo) exhibited a high prevalence rate of feline herpesvirus (100%) and feline immunodeficiency virus (71.4%). Canine distemper virus and feline calicivirus occurred with a low prevalence. All individuals tested negative for feline coronavirus, feline parvovirus, feline leukemia virus, Ehrlichia canis, and Anaplasma phagocytophilum.

  2. Neglected tick-borne pathogens in the Czech Republic, 2011–2014

    Czech Academy of Sciences Publication Activity Database

    Venclíková, Kristýna; Mendel, Jan; Betášová, Lenka; Blažejová, Hana; Jedličková, Petra; Straková, Petra; Hubálek, Zdeněk; Rudolf, Ivo

    2016-01-01

    Roč. 7, č. 1 (2016), s. 107-112. ISSN 1877-959X EU Projects: European Commission(XE) 261504 - EDENEXT Institutional support: RVO:68081766 Keywords : Ixodes ricinus * Rickettsia spp. * Candidatus N. mikurensis * Anaplasma phagocytophilum * Babesia spp. Subject RIV: FN - Epidemiology, Contagious Diseases ; Clinical Immunology Impact factor: 2.718, year: 2014

  3. Human anaplasmosis: the first Spanish case confirmed by PCR.

    Science.gov (United States)

    García, J C; Núñez, M J; Castro, B; Fraile, F J; López, A; Mella, M C; Blanco, A; Sieira, C; Loureiro, E; Portillo, A; Oteo, J A

    2006-10-01

    We report a case of human anaplasmosis (HA) fulfilling the confirmation criteria: epidemiologic data and clinical picture compatible with HA; presence of a morulae within polymorphonuclear leukocyte; and positive PCR assay for Anaplasma phagocytophilum: This case report shows the presence of HA in Spain. PMID:17114773

  4. Exploitation of TerraSAR-X

    Science.gov (United States)

    Herrmann, Jorg

    2004-01-01

    InfoTerra is an innovative market-derived EO-services concept with end-to-end products and service chains addressing end user information requirements in existing and new markets, with the advantage of a dedicated SAR satellite system TerraSAR (L+X-band) featuring high spatial and thematic resolution. The services will be provided from integrated value chains in a network with complementary partners, benefiting from most up-to-date and reliable image acquisition. The service development has been initiated in 1998 running in parallel to the TerraSAR space and ground system implementation. Infoterra, a new geo-information services company founded in 2001, implements the business concept. TerraSAR-X will be the first system element being available in 2006. The X-band SAR capability enables various applications, e.g. change detection to rationalize updating of cartographic databases; forest inventories, and de-/afforestation monitoring; crop stand density monitoring to support optimized fungicide application; land use monitoring in support of environmental control. A key challenge addressed in the exploitation development is the largely automated and quality controlled large area processing and feature extraction. The high resolution, multi-polarization, and multi-mode TerraSAR-X data source will considerably improve the short-term event observation from space. Reception of data via dedicated ground stations of customers or partners will also be offered.

  5. Understanding Online Child Sexual Exploitation Offenses.

    Science.gov (United States)

    Ly, Thanh; Murphy, Lisa; Fedoroff, J Paul

    2016-08-01

    In the past three decades, there has been an exponential increase in the worldwide availability of Internet access and devices that are able to access online materials. This literature review investigated whether increased accessibility of Internet child pornography (CP) increases the risk of in-person child sexual exploitation. The current review found little to no evidence that availability of the Internet has increased the worldwide incidence or prevalence of in-person child sexual abuse. In fact, during the time period in which the Internet has flourished, international crime statistics have shown a steady decrease of in-person child sexual abuse. The only exception to this trend is an increase in Internet child pornography or luring offenses (e.g., Stats Can, 2014), which involves child abuse by definition. This article reviews the impact of the Internet on child sexual abuse. It also reviews the characteristics of online CP offenders. Treatment of these offenders and prevention of such offenses is also discussed. PMID:27325170

  6. Fostering the Exploitation of Open Educational Resources

    Directory of Open Access Journals (Sweden)

    Thomas Richter

    2014-07-01

    Full Text Available The central concept behind Open Educational Resources (OER is opening up the access to educational resources for stakeholders who are not the usual target user group. This concept must be perceived as innovative because it describes a general economic and social paradigm shift: Education, which formerly was limited to a specific group of learners, now, is promoted as a public good. However, despite very good intentions, internationally agreed quality standards, and the availability of the required technological infrastructure, the critical threshold is not yet met. Due to several reasons, the usefulness of OER is often limited to the originally targeted context. Questions arise if the existing quality standards for Technology Enhanced Learning (TEL actually meet the specific requirements within the OER value chain, if the existing quality standards are applicable to OER in a meaningful way, and under which conditions related standards generally could support the exploitation of OER.We analyze quality standards for TEL and contrast the life cycle model of commercial learning resources against the life cycle model of OER. We investigate special demands on quality from the context of OER and, taking the former results into account, derive emergent quality criteria for OER. The paper concludes with recommendations for the design of OER and a future standard development.

  7. Exploiting unused cluster resources with virtualization

    International Nuclear Information System (INIS)

    Cluster applications may have timing constraints. One approach to ensuring their satisfaction is over-provisioning, i.e. to provide more hardware resources than needed for processing a certain peak data rate. This concept is used for the HLT-Chain. This application runs in the ALICE HLT cluster and processes events at runtime of the ALICE experiment. Over-provisioning has a drawback: When physical resources are dimensioned for a peak data rate, then these resources are underutilized at times of decreased data rates. From a perspective of efficiency this is not desirable. Therefore a software framework has been developed which allows to run additional third-party applications in order to exploit temporarily unused cluster resources. To avoid relevant negative impact to the time-critical application the third-party applications are encapsulated in Virtual Machines (VMs) and the resource usage of VMs is dynamically adapted at runtime. The adaption is done both globally by e.g. hot-migrating VMs between nodes, but also locally by modifying the local resource share (e.g. CPU) of a VM. Policies allow to tune the trade-off between benefit of third-party applications (increased cluster usage, computed results) and negative impact to the time-critical application. Experiments show that using the framework in parallel to the HLT-Chain leads to additional computed results, increases the cluster CPU usage from 49% to 79% and causes no relevant impact to the HLT-Chain.

  8. Exploiting Genetic Interference for Antiviral Therapy

    Science.gov (United States)

    Kirkegaard, Karla A.; Weinberger, Leor S.

    2016-01-01

    Rapidly evolving viruses are a major threat to human health. Such viruses are often highly pathogenic (e.g., influenza virus, HIV, Ebola virus) and routinely circumvent therapeutic intervention through mutational escape. Error-prone genome replication generates heterogeneous viral populations that rapidly adapt to new selection pressures, leading to resistance that emerges with treatment. However, population heterogeneity bears a cost: when multiple viral variants replicate within a cell, they can potentially interfere with each other, lowering viral fitness. This genetic interference can be exploited for antiviral strategies, either by taking advantage of a virus’s inherent genetic diversity or through generating de novo interference by engineering a competing genome. Here, we discuss two such antiviral strategies, dominant drug targeting and therapeutic interfering particles. Both strategies harness the power of genetic interference to surmount two particularly vexing obstacles—the evolution of drug resistance and targeting therapy to high-risk populations—both of which impede treatment in resource-poor settings. PMID:27149616

  9. Exploiting death: apoptotic immunity in microbial pathogenesis.

    Science.gov (United States)

    Ucker, D S

    2016-06-01

    Innate immunity typically is responsible for initial host responses against infections. Independently, nucleated cells that die normally as part of the physiological process of homeostasis in mammals (including humans) suppress immunity. Specifically, the physiological process of cell death (apoptosis) generates cells that are recognized specifically by viable cells of all types and elicit a profound transient suppression of host immunity (termed 'innate apoptotic immunity' (IAI)). IAI appears to be important normally for the maintenance of self-tolerance and for the resolution of inflammation. In addition, pathogens are able to take advantage of IAI through a variety of distinct mechanisms, to enable their proliferation within the host and enhance pathogenicity. For example, the protist pathogen Leishmania amazonensis, at its infective stage, mimics apoptotic cells by expressing apoptotic-like protein determinants on the cell surface, triggering immunosuppression directly. In contrast, the pathogenic bacterium Listeria monocytogenes triggers cell death in host lymphocytes, relying on those apoptotic cells to suppress host immune control and facilitate bacterial expansion. Finally, although the inhibition of apoptotic cell death is a common attribute of many viruses which facilitates their extended replication, it is clear that adenoviruses also reprogram the non-apoptotic dead cells that arise subsequently to manifest apoptotic-like immunosuppressive properties. These three instances represent diverse strategies used by microbial pathogens to exploit IAI, focusing attention on the potency of this facet of host immune control. Further examination of these cases will be revealing both of varied mechanisms of pathogenesis and the processes involved in IAI control. PMID:26943319

  10. Exploiting Genetic Interference for Antiviral Therapy.

    Science.gov (United States)

    Tanner, Elizabeth J; Kirkegaard, Karla A; Weinberger, Leor S

    2016-05-01

    Rapidly evolving viruses are a major threat to human health. Such viruses are often highly pathogenic (e.g., influenza virus, HIV, Ebola virus) and routinely circumvent therapeutic intervention through mutational escape. Error-prone genome replication generates heterogeneous viral populations that rapidly adapt to new selection pressures, leading to resistance that emerges with treatment. However, population heterogeneity bears a cost: when multiple viral variants replicate within a cell, they can potentially interfere with each other, lowering viral fitness. This genetic interference can be exploited for antiviral strategies, either by taking advantage of a virus's inherent genetic diversity or through generating de novo interference by engineering a competing genome. Here, we discuss two such antiviral strategies, dominant drug targeting and therapeutic interfering particles. Both strategies harness the power of genetic interference to surmount two particularly vexing obstacles-the evolution of drug resistance and targeting therapy to high-risk populations-both of which impede treatment in resource-poor settings. PMID:27149616

  11. Exploiting Genetic Interference for Antiviral Therapy.

    Directory of Open Access Journals (Sweden)

    Elizabeth J Tanner

    2016-05-01

    Full Text Available Rapidly evolving viruses are a major threat to human health. Such viruses are often highly pathogenic (e.g., influenza virus, HIV, Ebola virus and routinely circumvent therapeutic intervention through mutational escape. Error-prone genome replication generates heterogeneous viral populations that rapidly adapt to new selection pressures, leading to resistance that emerges with treatment. However, population heterogeneity bears a cost: when multiple viral variants replicate within a cell, they can potentially interfere with each other, lowering viral fitness. This genetic interference can be exploited for antiviral strategies, either by taking advantage of a virus's inherent genetic diversity or through generating de novo interference by engineering a competing genome. Here, we discuss two such antiviral strategies, dominant drug targeting and therapeutic interfering particles. Both strategies harness the power of genetic interference to surmount two particularly vexing obstacles-the evolution of drug resistance and targeting therapy to high-risk populations-both of which impede treatment in resource-poor settings.

  12. Exploiting tumor epigenetics to improve oncolytic virotherapy

    Directory of Open Access Journals (Sweden)

    Nicole E. Forbes

    2013-09-01

    Full Text Available Oncolytic viruses (OVs comprise a versatile and multi-mechanistic therapeutic platform in the growing arsenal of anticancer biologics. These replicating therapeutics find favorable conditions in the tumor niche, characterized among others by increased metabolism, reduced anti-tumor/antiviral immunity, and disorganized vasculature. Through a self-amplification that is dependent on multiple cancer-specific defects, these agents exhibit remarkable tumor selectivity. With several OVs completing or entering Phase III clinical evaluation, their therapeutic potential as well as the challenges ahead are increasingly clear. One key hurdle is tumor heterogeneity, which results in variations in the ability of tumors to support productive infection by OVs and to induce adaptive anti-tumor immunity. To this end, mounting evidence suggests tumor epigenetics may play a key role. This review will focus on the epigenetic landscape of tumors and how it relates to OV infection. Therapeutic strategies aiming to exploit the epigenetic identity of tumors in order to improve OV therapy are also discussed.

  13. Exploiting intrinsic fluctuations to identify model parameters.

    Science.gov (United States)

    Zimmer, Christoph; Sahle, Sven; Pahle, Jürgen

    2015-04-01

    Parameterisation of kinetic models plays a central role in computational systems biology. Besides the lack of experimental data of high enough quality, some of the biggest challenges here are identification issues. Model parameters can be structurally non-identifiable because of functional relationships. Noise in measured data is usually considered to be a nuisance for parameter estimation. However, it turns out that intrinsic fluctuations in particle numbers can make parameters identifiable that were previously non-identifiable. The authors present a method to identify model parameters that are structurally non-identifiable in a deterministic framework. The method takes time course recordings of biochemical systems in steady state or transient state as input. Often a functional relationship between parameters presents itself by a one-dimensional manifold in parameter space containing parameter sets of optimal goodness. Although the system's behaviour cannot be distinguished on this manifold in a deterministic framework it might be distinguishable in a stochastic modelling framework. Their method exploits this by using an objective function that includes a measure for fluctuations in particle numbers. They show on three example models, immigration-death, gene expression and Epo-EpoReceptor interaction, that this resolves the non-identifiability even in the case of measurement noise with known amplitude. The method is applied to partially observed recordings of biochemical systems with measurement noise. It is simple to implement and it is usually very fast to compute. This optimisation can be realised in a classical or Bayesian fashion. PMID:26672148

  14. Exploiting range imagery: techniques and applications

    Science.gov (United States)

    Armbruster, Walter

    2009-07-01

    Practically no applications exist for which automatic processing of 2D intensity imagery can equal human visual perception. This is not the case for range imagery. The paper gives examples of 3D laser radar applications, for which automatic data processing can exceed human visual cognition capabilities and describes basic processing techniques for attaining these results. The examples are drawn from the fields of helicopter obstacle avoidance, object detection in surveillance applications, object recognition at high range, multi-object-tracking, and object re-identification in range image sequences. Processing times and recognition performances are summarized. The techniques used exploit the bijective continuity of the imaging process as well as its independence of object reflectivity, emissivity and illumination. This allows precise formulations of the probability distributions involved in figure-ground segmentation, feature-based object classification and model based object recognition. The probabilistic approach guarantees optimal solutions for single images and enables Bayesian learning in range image sequences. Finally, due to recent results in 3D-surface completion, no prior model libraries are required for recognizing and re-identifying objects of quite general object categories, opening the way to unsupervised learning and fully autonomous cognitive systems.

  15. Exploiting Microbeams for Membrane Protein Structure Determination.

    Science.gov (United States)

    Warren, Anna J; Axford, Danny; Paterson, Neil G; Owen, Robin L

    2016-01-01

    A reproducible, and sample independent means of predictably obtaining large, well-ordered crystals has proven elusive in macromolecular crystallography. In the structure determination pipeline, crystallisation often proves to be a rate-limiting step, and the process of obtaining even small or badly ordered crystals can prove time-consuming and laborious. This is particularly true in the field of membrane protein crystallography and this is reflected in the limited number of unique membrane protein structures deposited in the protein data bank (less than 650 by June 2016 - http://blanco.biomol.uci.edu/mpstruc ). Over recent years the requirement for, and time and cost associated with obtaining, large crystals has been partially alleviated through the development of beamline instrumentation allowing data collection, and structure solution, from ever-smaller crystals. Advances in several areas have led to a step change in what might be considered achievable during a synchrotron trip over the last decade. This chapter will briefly review the current status of the field, the tools available to ease data collection and processing, and give some examples of exploitation of these for membrane protein microfocus macromolecular crystallography. PMID:27553238

  16. Notations Around the World: Census and Exploitation

    CERN Document Server

    Libbrecht, Paul

    2010-01-01

    Mathematical notations around the world are diverse. Not as much as requiring computing machines' makers to adapt to each culture, but as much as to disorient a person landing on a web-page with a text in mathematics. In order to understand better this diversity, we are building a census of notations: it should allow any content creator or mathematician to grasp which mathematical notation is used in which language and culture. The census is built collaboratively, collected in pages with a given semantic and presenting observations of the widespread notations being used in existing materials by a graphical extract. We contend that our approach should dissipate the fallacies found here and there about the notations in "other cultures" so that a better understanding of the cultures can be realized. The exploitation of the census in the math-bridge project is also presented: this project aims at taking learners "where they are in their math-knowledge" and bring them to a level ready to start engineering studies....

  17. Synthetic aperture radar imaging exploiting multiple scattering

    International Nuclear Information System (INIS)

    In this paper, we consider an imaging scenario, where a bi-static synthetic aperture radar (SAR) system is used in a multiple scattering environment. We consider a ray-theoretic approximation to the Green function to model a multiple scattering environment. This allows us to incorporate the multiple paths followed by the transmitted signal, thereby providing different views of the object to be imaged. However, the received signal from the multiple paths and additive thermal noise may interfere and produce artifacts when standard backprojection-based reconstruction algorithms are used. We use microlocal analysis in a statistical setting to develop a novel filtered-backprojection type image reconstruction method that not only exploits the multi-paths leading to enhancement of the reconstructed image but also suppresses the artifacts due to interference. We assume a priori knowledge of the second-order statistics of the target and noise to suppress the artifacts due to interference in a mean-square error sense. We present numerical simulations to demonstrate the performance of our image reconstruction method. While the focus of this paper is on radar applications, our image formation method is also applicable to other problems arising in fields such as acoustic, geophysical and medical imaging

  18. Exploiting Virtualization and Cloud Computing in ATLAS

    International Nuclear Information System (INIS)

    The ATLAS Computing Model was designed around the concept of grid computing; since the start of data-taking, this model has proven very successful in the federated operation of more than one hundred Worldwide LHC Computing Grid (WLCG) sites for offline data distribution, storage, processing and analysis. However, new paradigms in computing, namely virtualization and cloud computing, present improved strategies for managing and provisioning IT resources that could allow ATLAS to more flexibly adapt and scale its storage and processing workloads on varied underlying resources. In particular, ATLAS is developing a “grid-of-clouds” infrastructure in order to utilize WLCG sites that make resources available via a cloud API. This work will present the current status of the Virtualization and Cloud Computing R and D project in ATLAS Distributed Computing. First, strategies for deploying PanDA queues on cloud sites will be discussed, including the introduction of a “cloud factory” for managing cloud VM instances. Next, performance results when running on virtualized/cloud resources at CERN LxCloud, StratusLab, and elsewhere will be presented. Finally, we will present the ATLAS strategies for exploiting cloud-based storage, including remote XROOTD access to input data, management of EC2-based files, and the deployment of cloud-resident LCG storage elements.

  19. Generating circuit tests by exploiting designed behavior

    Science.gov (United States)

    Shirley, Mark H.

    1988-12-01

    Generating tests for sequential devices is one of the hardest problems in designing and manufacturing digital circuits. This task is difficult primarily because internal components are accessible only indirectly, forcing a test generator to use the surrounding components collectively as a probe for detecting faults. This in turn forces the test generator to reason about complex interactions between the behaviors of these surrounding components. Current automated solutions are becoming ineffective as designs grow larger and more complex. Yet, despite the complexity, human experts remain remarkably successful, in part, because they use knowledge from many sources and use a variety of reasoning techniques. This thesis exploits several kinds of expert knowledge about circuits and test generation not used by the current algorithms. First, many test generation problems can be solved efficiently using operation relations, a novel representation of circuit behavior that connects internal component operations with directly executable circuit operations. Operation relations can be computed efficiently for sequential circuits that provide few operations at their interfaces by searching traces of simulated circuit behavior. Second, experts write test programs rather than test vectors because programs are a more readable and compact representation for tests than vectors are. Test programs can be constructed automatically by merging test program fragments using expert supplied goal-refined rules and domain independent planning techniques from artificial intelligence.

  20. Against Permitted Exploitation in Developing World Research Agreements.

    Science.gov (United States)

    Wenner, Danielle M

    2016-04-01

    This paper examines the moral force of exploitation in developing world research agreements. Taking for granted that some clinical research which is conducted in the developing world but funded by developed world sponsors is exploitative, it asks whether a third party would be morally justified in enforcing limits on research agreements in order to ensure more fair and less exploitative outcomes. This question is particularly relevant when such exploitative transactions are entered into voluntarily by all relevant parties, and both research sponsors and host communities benefit from the resulting agreements. I show that defenders of the claim that exploitation ought to be permitted rely on a mischaracterization of certain forms of interference as unjustly paternalistic and two dubious empirical assumptions about the results of regulation. The view I put forward is that by evaluating a system of constraints on international research agreements, rather than individual transaction-level interference, we can better assess the alternatives to permitting exploitative research agreements. PMID:25688922

  1. Transnational gestational surrogacy: does it have to be exploitative?

    Science.gov (United States)

    Kirby, Jeffrey

    2014-01-01

    This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative. PMID:24766117

  2. Exploiting spatial descriptions in visual scene analysis.

    Science.gov (United States)

    Ziegler, Leon; Johannsen, Katrin; Swadzba, Agnes; De Ruiter, Jan P; Wachsmuth, Sven

    2012-08-01

    The reliable automatic visual recognition of indoor scenes with complex object constellations using only sensor data is a nontrivial problem. In order to improve the construction of an accurate semantic 3D model of an indoor scene, we exploit human-produced verbal descriptions of the relative location of pairs of objects. This requires the ability to deal with different spatial reference frames (RF) that humans use interchangeably. In German, both the intrinsic and relative RF are used frequently, which often leads to ambiguities in referential communication. We assume that there are certain regularities that help in specific contexts. In a first experiment, we investigated how speakers of German describe spatial relationships between different pieces of furniture. This gave us important information about the distribution of the RFs used for furniture-predicate combinations, and by implication also about the preferred spatial predicate. The results of this experiment are compiled into a computational model that extracts partial orderings of spatial arrangements between furniture items from verbal descriptions. In the implemented system, the visual scene is initially scanned by a 3D camera system. From the 3D point cloud, we extract point clusters that suggest the presence of certain furniture objects. We then integrate the partial orderings extracted from the verbal utterances incrementally and cumulatively with the estimated probabilities about the identity and location of objects in the scene, and also estimate the probable orientation of the objects. This allows the system to significantly improve both the accuracy and richness of its visual scene representation. PMID:22806654

  3. Exploiting Untapped Information Resources in Earth Science

    Science.gov (United States)

    Ramachandran, R.; Fox, P. A.; Kempler, S.; Maskey, M.

    2015-12-01

    One of the continuing challenges in any Earth science investigation is the amount of time and effort required for data preparation before analysis can begin. Current Earth science data and information systems have their own shortcomings. For example, the current data search systems are designed with the assumption that researchers find data primarily by metadata searches on instrument or geophysical keywords, assuming that users have sufficient knowledge of the domain vocabulary to be able to effectively utilize the search catalogs. These systems lack support for new or interdisciplinary researchers who may be unfamiliar with the domain vocabulary or the breadth of relevant data available. There is clearly a need to innovate and evolve current data and information systems in order to improve data discovery and exploration capabilities to substantially reduce the data preparation time and effort. We assert that Earth science metadata assets are dark resources, information resources that organizations collect, process, and store for regular business or operational activities but fail to utilize for other purposes. The challenge for any organization is to recognize, identify and effectively utilize the dark data stores in their institutional repositories to better serve their stakeholders. NASA Earth science metadata catalogs contain dark resources consisting of structured information, free form descriptions of data and pre-generated images. With the addition of emerging semantic technologies, such catalogs can be fully utilized beyond their original design intent of supporting current search functionality. In this presentation, we will describe our approach of exploiting these information resources to provide novel data discovery and exploration pathways to science and education communities

  4. Exploiting laboratory and heliophysics plasma synergies

    Energy Technology Data Exchange (ETDEWEB)

    Dahlburg, J.; Amatucci, W.; Chen, J.; Chua, D.; Dahlburg, R.; Doschek, G.; Howard, R.; Huba, J.; Ko, Y.-K.; Krall, J.; Laming, J. M.; Linton, M.; Lukin, V; Murphy, R.; Rakowski, C.; Socker, D.; Tylka, A.; Vourlidas, A.; Warren, H.; Wood, B. [Naval Research Laboratory, Washington, DC 20375 (United States); Brown, M. [Swarthmore College, Swarthmore, PA 19081 (United States); Chan, V. [General Atomics, San Diego, CA 92186 (United States); Cothran, Ch. [Global Defense Technology and Systems, Inc., Crofton, MD 21114 (United States); Egedal, J. [Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Forest, C. [University of Wisconsin, Madison, WI 53706 (United States); Lin, R. [University of California, Berkeley, CA 94720 (United States)

    2010-07-01

    Recent advances in space-based heliospheric observations, laboratory experimentation, and plasma simulation codes are creating an exciting new cross-disciplinary opportunity for understanding fast energy release and transport mechanisms in heliophysics and laboratory plasma dynamics, which had not been previously accessible. This article provides an overview of some new observational, experimental, and computational assets, and discusses current and near-term activities towards exploitation of synergies involving those assets. This overview does not claim to be comprehensive, but instead covers mainly activities closely associated with the authors' interests and research. Heliospheric observations reviewed include the Sun Earth Connection Coronal and Heliospheric Investigation (SECCHI) on the National Aeronautics and Space Administration (NASA) Solar Terrestrial Relations Observatory (STEREO) mission, the first instrument to provide remote sensing imagery observations with spatial continuity extending from the Sun to the Earth, and the Extreme-ultraviolet Imaging Spectrometer (EIS) on the Japanese Hinode spacecraft that is measuring spectroscopically physical parameters of the solar atmosphere towards obtaining plasma temperatures, densities, and mass motions. The Solar Dynamics Observatory (SDO) and the upcoming Solar Orbiter with the Heliospheric Imager (SoloHI) on-board will also be discussed. Laboratory plasma experiments surveyed include the line-tied magnetic reconnection experiments at University of Wisconsin (relevant to coronal heating magnetic flux tube observations and simulations), and a dynamo facility under construction there; the Space Plasma Simulation Chamber at the Naval Research Laboratory that currently produces plasmas scalable to ionospheric and magnetospheric conditions and in the future also will be suited to study the physics of the solar corona; the Versatile Toroidal Facility at the Massachusetts Institute of Technology that provides

  5. Exploiting laboratory and heliophysics plasma synergies

    International Nuclear Information System (INIS)

    Recent advances in space-based heliospheric observations, laboratory experimentation, and plasma simulation codes are creating an exciting new cross-disciplinary opportunity for understanding fast energy release and transport mechanisms in heliophysics and laboratory plasma dynamics, which had not been previously accessible. This article provides an overview of some new observational, experimental, and computational assets, and discusses current and near-term activities towards exploitation of synergies involving those assets. This overview does not claim to be comprehensive, but instead covers mainly activities closely associated with the authors' interests and research. Heliospheric observations reviewed include the Sun Earth Connection Coronal and Heliospheric Investigation (SECCHI) on the National Aeronautics and Space Administration (NASA) Solar Terrestrial Relations Observatory (STEREO) mission, the first instrument to provide remote sensing imagery observations with spatial continuity extending from the Sun to the Earth, and the Extreme-ultraviolet Imaging Spectrometer (EIS) on the Japanese Hinode spacecraft that is measuring spectroscopically physical parameters of the solar atmosphere towards obtaining plasma temperatures, densities, and mass motions. The Solar Dynamics Observatory (SDO) and the upcoming Solar Orbiter with the Heliospheric Imager (SoloHI) on-board will also be discussed. Laboratory plasma experiments surveyed include the line-tied magnetic reconnection experiments at University of Wisconsin (relevant to coronal heating magnetic flux tube observations and simulations), and a dynamo facility under construction there; the Space Plasma Simulation Chamber at the Naval Research Laboratory that currently produces plasmas scalable to ionospheric and magnetospheric conditions and in the future also will be suited to study the physics of the solar corona; the Versatile Toroidal Facility at the Massachusetts Institute of Technology that provides

  6. Nanostructures Exploit Hybrid-Polariton Resonances

    Science.gov (United States)

    Anderson, Mark

    2008-01-01

    Nanostructured devices that exploit the hybrid-polariton resonances arising from coupling among photons, phonons, and plasmons are subjects of research directed toward the development of infrared-spectroscopic sensors for measuring extremely small quantities of molecules of interest. The spectroscopic techniques in question are surface enhanced Raman scattering (SERS) and surface enhanced infrared absorption (SEIRA). An important intermediate goal of this research is to increase the sensitivity achievable by these techniques. The basic idea of the approach being followed in this research is to engineer nanostructured devices and thereby engineer their hybrid-polariton resonances to concentrate infrared radiation incident upon their surfaces in such a manner as to increase the absorption of the radiation for SEIRA and measure the frequency shifts of surface vibrational modes. The underlying hybrid-polariton-resonance concept is best described by reference to experimental devices that have been built and tested to demonstrate the concept. The nanostructure of each such device includes a matrix of silicon carbide particles of approximately 1 micron in diameter that are supported on a potassium bromide (KBr) or poly(tetrafluoroethylene) [PTFE] window. These grains are sputter-coated with gold grains of 40-nm size (see figure). From the perspective of classical electrodynamics, in this nanostructure, that includes a particulate or otherwise rough surface, the electric-field portion of an incident electromagnetic field becomes concentrated on the particles when optical resonance conditions are met. Going beyond the perspective of classical electrodynamics, it can be seen that when the resonance frequencies of surface phonons and surface plasmons overlap, the coupling of the resonances gives rise to an enhanced radiation-absorption or -scattering mechanism. The sizes, shapes, and aggregation of the particles determine the frequencies of the resonances. Hence, the task of

  7. Exploiting Laboratory and Heliophysics Plasma Synergies

    Directory of Open Access Journals (Sweden)

    Jill Dahlburg

    2010-05-01

    Full Text Available Recent advances in space-based heliospheric observations, laboratory experimentation, and plasma simulation codes are creating an exciting new cross-disciplinary opportunity for understanding fast energy release and transport mechanisms in heliophysics and laboratory plasma dynamics, which had not been previously accessible. This article provides an overview of some new observational, experimental, and computational assets, and discusses current and near-term activities towards exploitation of synergies involving those assets. This overview does not claim to be comprehensive, but instead covers mainly activities closely associated with the authors’ interests and reearch. Heliospheric observations reviewed include the Sun Earth Connection Coronal and Heliospheric Investigation (SECCHI on the National Aeronautics and Space Administration (NASA Solar Terrestrial Relations Observatory (STEREO mission, the first instrument to provide remote sensing imagery observations with spatial continuity extending from the Sun to the Earth, and the Extreme-ultraviolet Imaging Spectrometer (EIS on the Japanese Hinode spacecraft that is measuring spectroscopically physical parameters of the solar atmosphere towards obtaining plasma temperatures, densities, and mass motions. The Solar Dynamics Observatory (SDO and the upcoming Solar Orbiter with the Heliospheric Imager (SoloHI on-board will also be discussed. Laboratory plasma experiments surveyed include the line-tied magnetic reconnection experiments at University of Wisconsin (relevant to coronal heating magnetic flux tube observations and simulations, and a dynamo facility under construction there; the Space Plasma Simulation Chamber at the Naval Research Laboratory that currently produces plasmas scalable to ionospheric and magnetospheric conditions and in the future also will be suited to study the physics of the solar corona; the Versatile Toroidal Facility at the Massachusetts Institute of Technology that

  8. Simulated population responses of common carp to commercial exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance

  9. Exploiting for medical and biological applications

    Science.gov (United States)

    Giano, Michael C.

    Biotherapeutics are an emerging class of drug composed of molecules ranging in sizes from peptides to large proteins. Due to their poor stability and mucosal membrane permeability, biotherapeutics are administered by a parenteral method (i.e., syringe, intravenous or intramuscular). Therapeutics delivered systemically often experience short half-lives. While, local administration may involve invasive surgical procedures and suffer from poor retention at the site of application. To compensate, the patient receives frequent doses of highly concentrated therapeutic. Unfortunately, the off-target side effects and discomfort associated with multiple injections results in poor patient compliance. Therefore, new delivery methods which can improve therapeutic retention, reduce the frequency of administration and may aid in decreasing the off-target side effects is a necessity. Hydrogels are a class of biomaterials that are gaining interests for tissue engineering and drug delivery applications. Hydrogel materials are defined as porous, 3-dimensional networks that are primarily composed of water. Generally, they are mechanically rigid, cytocompatible and easily chemically functionalized. Collectively, these properties make hydrogels fantastic candidates to perform as drug delivery depots. Current hydrogel delivery systems physically entrap the target therapeutic which is then subsequently released over time at the site of administration. The swelling and degradation of the material effect the diffusion of the therapy from the hydrogel, and therefore should be controlled. Although these strategies provide some regulation over therapeutic release, full control of the delivery is not achieved. Newer approaches are focused on designing hydrogels that exploit known interactions, covalently attach the therapy or respond to an external stimulus in an effort to gain improved control over the therapy's release. Unfortunately, the biotherapeutic is typically required to be chemically

  10. Prevalence of Dirofilaria immitis, Ehrlichia canis, Borrelia burgdorferi sensu lato, Anaplasma spp. and Leishmania infantum in apparently healthy and CVBD-suspect dogs in Portugal - a national serological study

    Directory of Open Access Journals (Sweden)

    Cardoso Luís

    2012-03-01

    Full Text Available Abstract Background Canine vector-borne diseases (CVBDs are caused by a wide range of pathogens transmitted to dogs by arthropods including ticks and insects. Many CVBD-agents are of zoonotic concern, with dogs potentially serving as reservoirs and sentinels for human infections. The present study aimed at assessing the seroprevalence of infection with or exposure to Dirofilaria immitis, Ehrlichia canis, Borrelia burgdorferi sensu lato, Anaplasma spp. and Leishmania infantum in dogs in Portugal. Methods Based on 120 veterinary medical centres from all the regions of mainland and insular Portugal, 557 apparently healthy and 628 CVBD-suspect dogs were sampled. Serum, plasma or whole blood was tested for qualitative detection of D. immitis antigen and antibodies to E. canis, B. burgdorferi s. l., Anaplasma spp. and L. infantum with two commercial in-clinic enzyme-linked immunosorbent assay kits. Odds ratios (OR were calculated by logistic regression analysis to identify independent risk factors of exposure to the vector-borne agents. Results Total positivity levels to D. immitis, E. canis, B. burgdorferi, Anaplasma spp., L. infantum, one or more agents and mixed agents were 3.6%, 4.1%, 0.2%, 4.5%, 4.3%, 14.0% and 2.0% in the healthy group, and 8.9%, 16.4%, 0.5%, 9.2%, 25.2%, 46.3% and 11.6% in the clinically suspect group, respectively. Non-use of ectoparasiticides was a risk factor for positivity to one or more agents both in the apparently healthy (OR = 2.1 and CVBD-suspect (OR = 1.5 dogs. Seropositivity to L. infantum (OR = 7.6, E. canis (OR = 4.1 and D. immitis (OR = 2.4 were identified as risk factors for the presence of clinical signs compatible with CVBDs. Positivity to mixed agents was not found to be a risk factor for disease. Conclusions Dogs in Portugal are at risk of becoming infected with vector-borne pathogens, some of which are of zoonotic concern. CVBDs should be considered by practitioners and prophylactic measures must be put in

  11. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    Science.gov (United States)

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis, 2005; Milloy in…

  12. Self-Report Measure of Financial Exploitation of Older Adults

    Science.gov (United States)

    Conrad, Kendon J.; Iris, Madelyn; Ridings, John W.; Langley, Kate; Wilber, Kathleen H.

    2010-01-01

    Purpose: This study was designed to improve the measurement of financial exploitation (FE) by testing psychometric properties of the older adult financial exploitation measure (OAFEM), a client self-report instrument. Design and Methods: Rasch item response theory and traditional validation approaches were used. Questionnaires were administered by…

  13. On species preservation and Non-Cooperative Exploiters

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Lindroos, Marko

    cases where several non-cooperative exploiters are involved in mixed fisheries. This paper is targeting biodiversity preservation by setting up a two species model with the aim of ensuring both species survive harvesting of exploiters adapting a non-cooperative behaviour. The model starts out as a multi...

  14. Exploit and ignore the consequences: A mother of planetary issues.

    Science.gov (United States)

    Moustafa, Khaled

    2016-07-01

    Many environmental and planetary issues are due to an exploitation strategy based on exploit, consume and ignore the consequences. As many natural and environmental resources are limited in time and space, such exploitation approach causes important damages on earth, in the sea and maybe soon in the space. To sustain conditions under which humans and other living species can coexist in productive and dynamic harmony with their environments, terrestrial and space exploration programs may need to be based on 'scrutinize the consequences, prepare adequate solutions and then, only then, exploit'. Otherwise, the exploitation of planetary resources may put the environmental stability and sustainability at a higher risk than it is currently predicted. PMID:27133936

  15. Exploit and ignore the consequences: A mother of planetary issues

    Science.gov (United States)

    Moustafa, K.

    2016-07-01

    Many environmental and planetary issues are due to an exploitation strategy based on exploit, consume and ignore the consequences. As many natural and environmental resources are limited in time and space, such exploitation approach causes important damages on earth, in the sea and maybe soon in the space. To sustain conditions under which humans and other living species can coexist in productive and dynamic harmony with their environments, terrestrial and space exploration programs may need to be based on 'scrutinize the consequences, prepare adequate solutions and then, only then, exploit'. Otherwise, the exploitation of planetary resources may put the environmental stability and sustainability at a higher risk than it is currently predicted. (C) 2016 Elsevier B.V. All rights reserved.

  16. Comparação de nested-PCR com o diagnóstico direto na detecção de Ehrlichia canis e Anaplasma platys em cães Comparison of nested-PCR with blood smear examination in detection of Ehrlichia canis and Anaplasma platys in dogs

    Directory of Open Access Journals (Sweden)

    Carlos A. N. Ramos

    2009-12-01

    Full Text Available Os sinais clínicos das infecções por Ehrlichia canis e Anaplasma platys são similares, e o diagnóstico desses patógenos feito por esfregaços sanguíneos corados é difícil devido à sensibilidade e especificidade. Por outro lado, os diagnósticos moleculares são altamente sensíveis e específicos, e nested-PCRs têm sido otimizadas para o diagnóstico preciso desses patógenos em cães. Em um Hospital Veterinário Escola, amostras de sangue total com EDTA foram obtidas de 100 cães, e esfregaços foram feitos das amostras de sangue para busca dos parasitos intracelulares. Para cada amostra, DNA foi extraído e submetido à nPCR para detecção de E. canis e A. platys. Os resultados dos esfregaços sanguíneos mostraram que 9% dos animais foram positivos para E. canis e 21% para A. platys. Com relação à nPCR, 57 e 55% dos cães foram positivos para E. canis e A. platys, respectivamente. Quando comparados com a nPCR, os esfregaços sanguíneos corados revelaram resultados falso-negativos para E. canis e A. platys. Os resultados indicam que a nPCR é altamente sensível e específica para detecção de ambos os patógenos, e os diagnósticos moleculares podem ser mais úteis nos Hospitais Veterinários.The clinical signs of Ehrlichia canis and Anaplasma platys infection are similar, and the diagnosis of these pathogens made by stained blood smears is poor due sensibility and specificity. On the other hand, the molecular diagnosis is highly sensitive and specific and nested-PCR have been optimized for accurate diagnosis these pathogens in dogs. At the veterinary teaching hospital, whole-blood samples with EDTA were obtained from 100 dogs and smears were made from blood samples for evaluation for intracellular parasites. For each sample, DNA was extracted and submitted to nPCR analysis for detection of E. canis and A. platys. The results of stained blood smears showed 9% of the animals were positive for E. canis and 21% for A. platys

  17. The Haunted World of El Superbeasto (Rob Zombie, 2009): An Animated Exploitation of Exploitation Cinema

    OpenAIRE

    Floquet, Pierre

    2016-01-01

    Le film de Rob Zombie, sorti en 2009 dans la lignée des films d’exploitation, non seulement se veut transgressif, mais aussi s’appuie sur des sujets scabreux, sinon provocants, afin de viser des publics niches. Son intention est-elle d’exprimer un point de vue politique qui susciterait la controverse en mettant en images la face cachée d’une culture qu’Hollywood étale dans ses films, d’animation ou directs ? Ou bien demeure-t-il une simple expérience distanciée et animée, sans suite dans la c...

  18. Uncertainty of exploitation estimates made from tag returns

    Science.gov (United States)

    Miranda, L.E.; Brock, R.E.; Dorr, B.S.

    2002-01-01

    Over 6,000 crappies Pomoxis spp. were tagged in five water bodies to estimate exploitation rates by anglers. Exploitation rates were computed as the percentage of tags returned after adjustment for three sources of uncertainty: postrelease mortality due to the tagging process, tag loss, and the reporting rate of tagged fish. Confidence intervals around exploitation rates were estimated by resampling from the probability distributions of tagging mortality, tag loss, and reporting rate. Estimates of exploitation rates ranged from 17% to 54% among the five study systems. Uncertainty around estimates of tagging mortality, tag loss, and reporting resulted in 90% confidence intervals around the median exploitation rate as narrow as 15 percentage points and as broad as 46 percentage points. The greatest source of estimation error was uncertainty about tag reporting. Because the large investments required by tagging and reward operations produce imprecise estimates of the exploitation rate, it may be worth considering other approaches to estimating it or simply circumventing the exploitation question altogether.

  19. Meaning, function and methods of the recultivation in mining exploitation

    OpenAIRE

    Dambov, Risto; Ljatifi, Ejup

    2015-01-01

    With the exploitation of mineral resources is performed degradation and deformation of the relief and the general part of surface of the Earth's crust. Depending on the type of open pit mine, this degradation can be expressed to a lesser or greater extent, and sometimes in several square kilometers. The exploitation of mineral resources is with unbreakable link with the environment. Very often it is said that mining is „enemy No. 1“ for environment. With exploitation comes to degradation of h...

  20. Enhanced surrogate models for statistical design exploiting space mapping technology

    DEFF Research Database (Denmark)

    Koziel, Slawek; Bandler, John W.; Mohamed, Achmed S.;

    2005-01-01

    We present advances in microwave and RF device modeling exploiting Space Mapping (SM) technology. We propose new SM modeling formulations utilizing input mappings, output mappings, frequency scaling and quadratic approximations. Our aim is to enhance circuit models for statistical analysis...

  1. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    OpenAIRE

    Jaris Mujica

    2015-01-01

    The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i) evidence of s...

  2. NUMERICAL ANALYSES OF THE UNDERGROUND EXPLOITATION OF DIMENSION STONE

    OpenAIRE

    1996-01-01

    Underground exploitation of dimension stone is spreading lately for three main reasons; economy, organisation and environment. Moreover, underground openings can be used for many purposes. Underground exploitation is different from surface quarrying only in the first stage, the removal of top slice, descending slices are worked as in conventional quarries. In underground stone quarries, stability problems require adequate studies in order to avoid expensive artificial support measures, ...

  3. D1.2_Final Dissemination and Exploitation Plan

    OpenAIRE

    Garavelli, Sara; Jones, Bob; Amsaghrou Rachida

    2016-01-01

    The following summary outlines the major assets and sustainability strategy that PICSE has produced during its eighteen month activity. This second iteration, which is the present report, combines the final strategy of the communication plan as well as addressing the exploitation of the project itself. The PICSE project, in its timeframe produced: Four PICSE Major Sustainable and Exploitable Assets PICSE Roadmap, highlighting the existing challenges, barriers and trends in ...

  4. Sexual exploitation and abuse by peacekeeping operations in contemporary Africa

    OpenAIRE

    Rudén, Fanny; Utas, Mats

    2009-01-01

    In international peacekeeping operations (PKOs) some individuals are involved in sexual exploitation and abuse of the host country’s population, buying of sexual services and trafficking of prostitutes. Far from being a new phenomenon it goes back a long time, and reports on the issue have increased over the years. All too frequently we read about peacekeepers visiting prostitutes, committing rape, or in other ways sexually exploiting host populations. Some peacekeepers are taking advantage o...

  5. Exploiting symmetries in SDP-relaxations for polynomial optimization

    OpenAIRE

    Riener, Cordian; Theobald, Thorsten; Andrén, Lina Jansson; Lasserre, Jean B.

    2011-01-01

    In this paper we study various approaches for exploiting symmetries in polynomial optimization problems within the framework of semi definite programming relaxations. Our special focus is on constrained problems especially when the symmetric group is acting on the variables. In particular, we investigate the concept of block decomposition within the framework of constrained polynomial optimization problems, show how the degree principle for the symmetric group can be computationally exploited...

  6. Exploration and Exploitation Fit and Performance in International Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo Bernhard; Gudergan, Siegfried

    2012-01-01

    Exploration and exploitation constitute two separate, potentially conflicting strategic choices for firms engaged in international strategic alliances. Our empirical study challenges the ambidexterity argument and demonstrates that exploration and exploitation are separate (though not necessarily...... significant roles. When the motive is efficiency and downstream market performance, prior experience with the partner instead is beneficial, as are high levels of trust and low levels of cultural distance. These findings have key implications for literature on strategic fit and alliance performance....

  7. Unequal Exchange, Assets, and Power: Recent Developments in Exploitation Theory

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2013-01-01

    This paper surveys and extends some recent contributions on the theory of exploitation as the unequal exchange of labour. A model of dynamic economies with heterogeneous optimising agents is presented which encompasses the models used in the literature as special cases. It is shown that the notion of exploitation is logically coherent and can be meaningfully analysed in such a general framework. It is then shown that the axiomatic approach of social choice theory can be adopted to explore the...

  8. UK Coal resource for new exploitation technologies. Final report

    OpenAIRE

    Jones, N. S.; Holloway, S.; Creedy, D.P.; Gamer, K.; Smith, N.J.P.; Browne, M.A.E.; S. Durucan

    2004-01-01

    This focus of this report are the UK coal resources available for exploitation by the new technologies of Underground Coal Gasification, Coalbed Methane production and Carbon Dioxide Sequestration. It also briefly considers the potential for further underground and opencast mining and the extraction of methane from working and closed mines. The potential for mining was mainly considered because it has a bearing on the scope for the new exploitation technologies rather than to identify resourc...

  9. eCHASE: Sustainable Exploitation of Electronic Cultural Heritage

    OpenAIRE

    Sinclair, Patrick; Lewis, Paul; Martinez, Kirk; Addis, Matthew; Prideaux, Daniel; Fina, Daniela; Da Bormida, Giorgio

    2005-01-01

    Europe’s digital cultural heritage content has tremendous exploitation potential in applications such as Education, Publishing, e-Commerce, Public Access and Tourism. Value is hugely amplified if the content can be aggregated, repurposed and distributed at a European level. The eCHASE project seeks to demonstrate that public-private partnerships between content holders and commercial service providers can create new services and a sustainable business based on access and exploitation of digit...

  10. Micro and nanotechnology commercialization: balance between exploration and exploitation

    OpenAIRE

    WHC Knol

    2005-01-01

    Innovative materials, components, and systems based on micro and nanotechnologies are recognized as promising growth innovators. The coming years the commercialization of micro and nanotechnology will be extended, but in order to commercialize micro and nanotechnology successfully, besides exploration a parallel focus should be aimed at exploitation. This paper presents in a brief and non-exhaustive manor a theoretical introduction and two company introductions related to exploitation and exp...

  11. Exploiting sparsity and sharing in probabilistic sensor data models

    OpenAIRE

    Evers, S

    2008-01-01

    Probabilistic sensor models defined as dynamic Bayesian networks can possess an inherent sparsity that is not reflected in the structure of the network. Classical inference algorithms like variable elimination and junction tree propagation cannot exploit this sparsity. Also, they do not exploit the opportunities for sharing calculations among different time slices of the model. We show that, using a relational representation, inference expressions for these sensor models can be rewritten to m...

  12. The ALARA project of the EDF nuclear park exploitation

    International Nuclear Information System (INIS)

    To bring the exploitation of the nuclear park of EDF at the level of the best exploiters in the world in matter of collective and individual dosimetry, the ALARA principle coordinates numerous actions: to associate the temporary societies, to define common language, methods and tools for the whole park to organize a level effect in this area, to optimize the maintenance that is expansive in radiation doses, to make the different levels of management responsible on dosimetric stakes, to reduce the singular sources of exposure, to assure the organisation and exploitation of the experience back in this field and adapt consequently the system of information. The results are cheerful and the objectives for 2000 are: less than 1.2 h.Sv by year and by reactor, no intervener whom annual radiation dose is upper than 20 mSv (out of exceptional case). (N.C.)

  13. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    Directory of Open Access Journals (Sweden)

    Jaris Mujica

    2015-01-01

    Full Text Available The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i evidence of seasonal forms of exploitation; (ii the path of life of these women showing steps in a chain holding several stages and in different work areas; (iii in this context, sexual exploitation and trafficking are not permanent phenomena, are concentrated in one point in the path and stopped to motherhood, between 19 and 25 years; (iv with motherhood and matrilocal settlement, daughters and sons repeat the cycle and reproduce the chain.

  14. NUMERICAL ANALYSES OF THE UNDERGROUND EXPLOITATION OF DIMENSION STONE

    Directory of Open Access Journals (Sweden)

    Biljana Kovačević-Zelić

    1996-12-01

    Full Text Available Underground exploitation of dimension stone is spreading lately for three main reasons; economy, organisation and environment. Moreover, underground openings can be used for many purposes. Underground exploitation is different from surface quarrying only in the first stage, the removal of top slice, descending slices are worked as in conventional quarries. In underground stone quarries, stability problems require adequate studies in order to avoid expensive artificial support measures, The article presents numerical analyses of an underground stone quarry made using of the finite difference code FLAC (the paper is published in Croatian.

  15. Short-term price overreaction: Identification, testing, exploitation

    OpenAIRE

    Caporale, Guglielmo Maria; Gil-Alana, Luis; Plastun, Alex

    2014-01-01

    This paper examines short-term price reactions after one-day abnormal price changes and whether they create exploitable profit opportunities in various financial markets. A t-test confirms the presence of overreactions and also suggests that there is an “inertia anomaly”, i.e. after an overreaction day prices tend to move in the same direction for some time. A trading robot approach is then used to test two trading strategies aimed at exploiting the detected anomalies to make abnormal profits...

  16. Short-Term Price Overreactions: Identification, Testing, Exploitation

    OpenAIRE

    Caporale, Guglielmo Maria; Luis A. Gil-Alana; Plastun, Alex

    2014-01-01

    This paper examines short-term price reactions after one-day abnormal price changes and whether they create exploitable profit opportunities in various financial markets. A t-test confirms the presence of overreactions and also suggests that there is an “inertia anomaly”, i.e. after an overreaction day prices tend to move in the same direction for some time. A trading robot approach is then used to test two trading strategies aimed at exploiting the detected anomalies to make abnormal profits...

  17. Manipulation and exploitation of the tumour environment for therapeutic benefit

    International Nuclear Information System (INIS)

    The authors describe aspects of the tumour microenvironment that are available as targets for manipulation. In particular, the question asked is whether hypoxia in tumours is a problem to be overcome, or a physiological abnormality to be exploited? Bioreductive drugs require metabolic reduction to generate cytotoxic metabolites. This process is facilitated by appropriate reductases and the lower oxygen conditions present in solid tumours compared with normal tissues. Because of their specificity, bioreductive drugs are used to help answer this question. Other aspects of tumour physiology and biochemistry that may be exploited include tissue dependent reductase expression, pH and angiogenesis. (author)

  18. Exploitation of Natural Resources and the Public Sector in Greenland

    DEFF Research Database (Denmark)

    Nielsen, Søren Bo

    This paper considers the role of the public sector in future exploitation of non-renewable resources, especially minerals, in Greenland. The focus is on fiscal sustainability, principles for public sector involvement and the form of government take from mining activities. At present, the public...... to GDP. Hence, fiscal policy is quite far from being sustainable. Apart from a need for reforms, these facts also constrain the possible role of the public sector in future resource exploitation. In any case, the government should preferably adhere to strict principles when developing the mineral...

  19. The human traffickers and exploitation of children and young adults.

    Directory of Open Access Journals (Sweden)

    Sara Scala

    2012-06-01

    Full Text Available The article focuses on the traffic of children, who are kidnapped, cheated and purchased by their families to be exploited in many ways. These victims have severe mental and physical traumas. Many of them, slaves of their exploiters, remain invisible and live their lifes without fundamental rights and without any kind of support or help. The traffic in human beings is a new kind of slavery, which acts in the dark, is criminal and involves different subjects of different ages, different nationalities and generations. The traffic in human beings is managed by transnational criminal organizations and is a disturbing and growing phenomena around the world.

  20. Insider Trading in Germany - Do Corporate Insiders Exploit Inside Information?

    Directory of Open Access Journals (Sweden)

    Björn M. Dymke

    2008-12-01

    Full Text Available Our study focuses on the question whether corporate insiders in Germany exploit inside information while trading in their company’s stock. In contrast to prior international studies, which are not able to link insider transactions to a formal definition of inside information, we relate insider transactions to subsequent releases of inside information via ad-hoc news disclosures. We find evidence that corporate insiders as a group seem to trade on inside information. Moreover, members of the supervisory board seem to be most active in exploiting inside information, since they realize exceptionally high profits with their frequent front-running transactions.

  1. Frequency of antibodies to Babesia bigemina, B. bovis, Anaplasma marginale, Trypanosoma vivax and Borrelia burdgorferi in cattle from the northeastern region of the state of Pará, Brazil Freqüência de anticorpos para Babesia bigemina, B. bovis, Anaplasma marginale, Trypanosoma vivax e Borrelia burgdorferi em bovinos do nordeste do Estado do Pará, Brasil

    Directory of Open Access Journals (Sweden)

    Daniel S. Guedes Junior

    2008-06-01

    Full Text Available Babesiosis, anaplasmosis, and trypanosomosis are relevant diseases, potentially causing morbidity in cattle, leading to economic losses. Borreliosis is import as a potential zoonosis. The objective of this study was to determine, by indirect enzyme-linked immunosorbent assay (ELISA, the frequency of seropositive cattle to Babesia bigemina, B. bovis, Anaplasma marginale, Trypanosoma vivax and Borrelia burgdorferi in cattle from the Northeastern region of Pará, Brazil. Sera samples from 246 female adult cattle from municipalities of Castanhal and São Miguel do Guamá were used. Crude antigens ELISAs were used to detect antibodies to all agents, except to A. marginale, to which an indirect ELISA with recombinant major surface 1a protein (MSP1a antigen was used. Overall frequencies of seropositive animals were: B. bigemina - 99.2%; B. bovis - 98.8%; A. marginale - 68.3%; T. vivax - 93.1% and B. burgdorferi - 54.9%. The frequencies of seropositive cattle to B. bovis and B. bigemina suggest a high rate of transmission of these organisms by tick in the studied region, which can be classified as enzootically stable to these hemoprotozoans. The low frequency of seropositive cattle to A. marginale may be attributed to a lower sensitivity of the recombinant antigen ELISA utilized or a distinct rate of inoculation of this rickettsia by ticks, as compared with Babesia sp. transmission. The high frequency of seropositive cattle to T. vivax indicates that this hemoprotozoan is prevalent in herds from the Northeastern region of Pará. The rate of animal that showed homologues antibodies to B. burgdorferi indicates the presence of the tickborne spirochaetal agent in the cattle population in the studied region.A babesiose, a anaplasmose e a tripanossomose são enfermidades relevantes, potencialmente causadoras de morbidade em bovinos, levando a perdas econômicas. A borreliose assume importância como zoonose potencial. O objetivo desse estudo foi determinar

  2. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    Science.gov (United States)

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels. PMID:26726289

  3. Epidemiology and control of human granulocytic anaplasmosis: a systematic review.

    Science.gov (United States)

    Jin, Hongtao; Wei, Feng; Liu, Quan; Qian, Jun

    2012-04-01

    Granulocytic anaplasmosis caused by Anaplasma phagocytophilum is an emerging tick-borne zoonosis worldwide. The obligate intracellular pathogen is transmitted by Ixodes ticks and infects neutrophils in humans and animals, resulting in clinical symptoms ranging from asymptomatic seroconversion to mild, severe, or fatal disease. Since the initial description of human granulocytic anaplasmosis (HGA) in the United States in 1990, HGA has been increasingly recognized in America, Europe, and Asia. This review describes the epidemiology, diagnosis, and treatment of HGA and provides background information on the potential vectors and reservoirs of A. phagocytophilum. PMID:22217177

  4. The forecast effectiveness of mining exploitation effects on the exploited area conducted with the use of Bialek`s formulas

    Science.gov (United States)

    Orwat, Justyna

    2016-06-01

    The article presents the results of numerical calculations conducted with the use of a computer programme EDN - OPN for forecasting permanent deformations of a mining area being the result of the underground exploitation of coal deposits. The theoretical values of basic deformation indicators (decreases, inclinations, curvatures, displacements and horizontal strains) were determined with the use of Bialek`s formulas. They were subsequently juxtaposed with the practical values obtained thanks to the geodetic measurements conducted in the years 2001-2011 on the established observation line. The evaluation of the effectiveness of the conducted forecast of effects of the mining exploitation was carried out on this basis.

  5. Multiwavelength erbium-doped fiber laser exploiting intracavity polarization inhomogeneity

    Institute of Scientific and Technical Information of China (English)

    孙军强; 丘军林; 黄德修

    2000-01-01

    Simultaneous multiwavelength lasing is demonstrated exploiting intracavity polarization in-homogeneity in an erbium-doped fiber laser. Experiments indicate that polarization hole burning can be enhanced by the changes of optical MQW waveguide bias current and the polarization states in the laser cavity. Ten wavelengths with 0.9 nm spacing are generated at room temperature.

  6. Six scenarios of exploiting an ontology based, mobilized learning environment

    NARCIS (Netherlands)

    G. Kismihók; I. Szabó; R. Vas

    2012-01-01

    In this article, six different exploitation possibilities of an educational ontology based, mobilized learning management system are presented. The focal point of this system is the educational ontology model. The first version of this educational ontology model serves as a foundation for curriculum

  7. Bats track and exploit changes in insect pest populations

    Science.gov (United States)

    The role of bats or any generalist predator in suppressing prey populations depends on the predator’s ability to exploit available prey in space and time. Using a qPCR faecal DNA assay, we document significant association between numbers of Brazilian free-tailed bats (Tadarida brasiliensis) consumin...

  8. The Sexual Exploitation of Missing Children: A Research Review.

    Science.gov (United States)

    Hotaling, Gerald T.; Finkelhor, David

    This paper evaluates current knowledge about the prevalence, dynamics, and short- and long-term effects of sexual exploitation among missing children. It is based upon empirical research findings from books, papers presented at professional meetings, doctoral dissertations, works in progress, and more than 75 articles in professional journals.…

  9. Exploitation of commercial remote sensing images: reality ignored?

    Science.gov (United States)

    Allen, Paul C.

    1999-12-01

    The remote sensing market is on the verge of being awash in commercial high-resolution images. Market estimates are based on the growing numbers of planned commercial remote sensing electro-optical, radar, and hyperspectral satellites and aircraft. EarthWatch, Space Imaging, SPOT, and RDL among others are all working towards launch and service of one to five meter panchromatic or radar-imaging satellites. Additionally, new advances in digital air surveillance and reconnaissance systems, both manned and unmanned, are also expected to expand the geospatial customer base. Regardless of platform, image type, or location, each system promises images with some combination of increased resolution, greater spectral coverage, reduced turn-around time (request-to- delivery), and/or reduced image cost. For the most part, however, market estimates for these new sources focus on the raw digital images (from collection to the ground station) while ignoring the requirements for a processing and exploitation infrastructure comprised of exploitation tools, exploitation training, library systems, and image management systems. From this it would appear the commercial imaging community has failed to learn the hard lessons of national government experience choosing instead to ignore reality and replicate the bias of collection over processing and exploitation. While this trend may be not impact the small quantity users that exist today it will certainly adversely affect the mid- to large-sized users of the future.

  10. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Science.gov (United States)

    Yoshioka, Katsunari; Inoue, Daisuke; Eto, Masashi; Hoshizawa, Yuji; Nogawa, Hiroki; Nakao, Koji

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  11. Exploiting synergies between nonproliferation verification regimes: A pragmatic approach

    International Nuclear Information System (INIS)

    This paper considers the potential for expanding interaction and exploiting synergies between different multilateral disarmament and nonproliferation regimes. It concludes that although there are political barriers to high-level and pervasive synergization, there are opportunities for pragmatic, functional steps to be taken as a way of building confidence and experience. (author)

  12. Multiwavelength erbium-doped fiber laser exploiting intracavity polarization inhomogeneity

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Simultaneous multiwavelength lasing is demonstrated exploiting intracavity polarization inhomogeneity in an erbium-doped fiber laser. Experiments indicate that polarization hole burning can be enhanced by the changes of optical MQW waveguide bias current and the polarization states in the laser cavity. Ten wavelengths with 0.9 nm spacing are generated at room temperature.

  13. Hitch-hiking parasitic wasp learns to exploit butterfly antiaphrodisiac

    NARCIS (Netherlands)

    Huigens, M.E.; Pashalidou, F.G.; Qian, M.H.; Bukovinszky, T.; Smid, H.M.; Loon, van J.J.A.; Dicke, M.; Fatouros, N.E.

    2009-01-01

    Many insects possess a sexual communication system that is vulnerable to chemical espionage by parasitic wasps. We recently discovered that a hitch-hiking (H) egg parasitoid exploits the antiaphrodisiac pheromone benzyl cyanide (BC) of the Large Cabbage White butterfly Pieris brassicae. This pheromo

  14. Space Mapping Optimization of Microwave Circuits Exploiting Surrogate Models

    DEFF Research Database (Denmark)

    Bakr, M. H.; Bandler, J. W.; Madsen, Kaj; Søndergaard, Jacob

    2000-01-01

    convex combination of a mapped coarse model and a linearized fine model. It exploits, in a novel way, a linear frequency-sensitive mapping. During the optimization iterates, the coarse and fine models are simulated at different sets of frequencies. This approach is shown to be especially powerful if a...

  15. Confirmatory Factor Analysis of Perceived Exploitation of College Athletes Questionnaire

    Science.gov (United States)

    Van Rheenen, Derek; Atwood, Jason R.

    2014-01-01

    The exploitation of college athletes has been a topic of controversy within American higher education for over half of a century. Especially in the revenue-generating sports of men's basketball and football, critics have highlighted the surplus gains expropriated by colleges and universities on the backs of these young men, who are…

  16. Commercial Sexual Exploitation of Children and the School Nurse

    Science.gov (United States)

    Grace, Lisa Goldblatt; Starck, Maureen; Potenza, Jane; Kenney, Patricia A.; Sheetz, Anne H.

    2012-01-01

    As trusted health professionals in the school setting, school nurses are well positioned to identify students who may be victims of commercial sexual exploitation of children (CSEC). However, until recently this issue has been clouded by lack of awareness, stigma, and/or denial. Since nationally the average age of entry for girls into the…

  17. eCHASE: Exploiting Cultural Heritage using the Semantic Web

    OpenAIRE

    Sinclair, Patrick; Lewis, Paul; Martinez, Kirk; Addis, Matthew; Pillinger, Adrian; Prideaux, Daniel

    2005-01-01

    The eCHASE project is using semantic web technologies to demonstrate sustainable business models based on access and exploitation of digital cultural heritage content at a European level. In this paper we describe the eCHASE project and outline the system architecture.

  18. Exploiting Network Topology Information to Mitigate Ambiguities in VMP Localization

    DEFF Research Database (Denmark)

    Pedersen, Claus; Pedersen, Troels; Fleury, Bernard Henri

    2011-01-01

    We investigate an extension to the probabilistic model of a wireless sensor network (WSN) in the variational message passing localization algorithm. This extension exploits network topology information to mitigate ambiguities in WSN localization schemes. In a simulation case study we show...

  19. Geographical aspects of exploitation of nuclear energy in Europe

    International Nuclear Information System (INIS)

    The topic of exploitation of nuclear energy is becoming increasingly actual in the present time in connection with frequently discussed question of 'renaissance of nuclear energetics'. The work is aimed at research of geographical aspects of exploitation of nuclear energy for military and civil purposes on the territory of Europe. The base of work represents the analysis of theoretical aspects of research of energy, mainly of nuclear energy. The work examines the historical development of exploitation of nuclear energy since its discovery, through development of military nuclear industry in Europe, big attention is paid to spreading of nuclear energetics on the territory of Europe from its beginnings up to the present time. The main part of the work represents the analysis of the present situation of exploitation of nuclear energy for civil purposes in Europe. The attention is paid to so-called nuclear fuel cycle as complex chain of several reciprocally interconnected operations of nuclear fuel treatment. The monitoring of spatial relations among individual countries within their nuclear fuel cycles is emphasised. The analysis of historical development and of the present state of nuclear energetics finished up in the outline of the perspectives of its further development in Europe. The analysis of the tendencies of evolution of world energetic economy mentions on the trend of growth of energy consumption in the world and Europe, as well as on the important position of nuclear energy in the structure of energy sources. Summary in English language is included. (author)

  20. Human trafficking for labour exploitation: Interpreting the crime

    NARCIS (Netherlands)

    Coster van Voorhout, J.E.B.

    2007-01-01

    The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation a

  1. Exploiting Link Dynamics in LEO-to-Ground Communications

    OpenAIRE

    Palmer, Joseph; Caffrey, Michael

    2009-01-01

    The high dynamics of the LEO-to-ground radio channel are described. An analysis shows how current satellite radio systems largely underutilize the available radio link, and that a radio that can adaptively vary the bit rate can more fully exploit it, resulting in increased data throughput and improved power efficiency. We propose one method for implementing the adaptivity, and present simulation results.

  2. Assisting children born of sexual exploitation and abuse

    Directory of Open Access Journals (Sweden)

    Lauren Rumble

    2007-01-01

    Full Text Available The UN Secretary-General has issued a strategy tosupport victims of sexual exploitation and abuse by UNstaff. It includes a controversial proposal to introduceDNA sampling for all UN staff. Unless this suggestionis adopted, an important opportunity to implementa truly survivor-centred approach may be lost.

  3. Exploiting Patient Labour at Kew Cottages, Australia, 1887-1950

    Science.gov (United States)

    Monk, Lee-Ann

    2010-01-01

    This article examines the exploitation of patient labour at Kew Cottages, Australia's first purpose-built state institution for people with learning disabilities. Analysing historical evidence for the period 1887-1950 shows that unpaid patient labour contributed significantly to the economy of the Cottages and so to the government department of…

  4. Relativistic Quantum Metrology: Exploiting relativity to improve quantum measurement technologies

    CERN Document Server

    Ahmadi, Mehdi; Friis, Nicolai; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2013-01-01

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory (QFT). QFT properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in QFT including proper times and acce...

  5. Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges

    Science.gov (United States)

    Liu, Zhenhua; Liu, Hongbo; Xu, Wenyuan; Chen, Yingying

    Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. Thus, in this paper, we focus on developing mechanisms to localize a jammer. We first conduct jamming effect analysis to examine how a hearing range, e.g., the area from which a node can successfully receive and decode the packet, alters with the jammer's location and transmission power. Then, we show that the affected hearing range can be estimated purely by examining the network topology changes caused by jamming attacks. As such, we solve the jammer location estimation by constructing a least-squares problem, which exploits the changes of the hearing ranges. Compared with our previous iterative-search-based virtual force algorithm, our proposed hearing-range-based algorithm exhibits lower computational cost (i.e., one-step instead of iterative searches) and higher localization accuracy.

  6. EXPLOITING RHETORICAL RELATIONS TO MULTIPLE DOCUMENTS TEXT SUMMARIZATION

    Directory of Open Access Journals (Sweden)

    N. Adilah Hanin Zahri

    2015-03-01

    Full Text Available Many of previous research have proven that the usage of rhetorical relations is capable to enhance many applications such as text summarization, question answering and natural language generation. This work proposes an approach that expands the benefit of rhetorical relations to address redundancy problem for cluster-based text summarization of multiple documents. We exploited rhetorical relations exist between sentences to group similar sentences into multiple clusters to identify themes of common information. The candidate summary were extracted from these clusters. Then, cluster-based text summarization is performed using Conditional Markov Random Walk Model to measure the saliency scores of the candidate summary. We evaluated our method by measuring the cohesion and separation of the clusters constructed by exploiting rhetorical relations and ROUGE score of generated summaries. The experimental result shows that our method performed well which shows promising potential of applying rhetorical relation in text clustering which benefits text summarization of multiple documents

  7. Infomax strategies for an optimal balance between exploration and exploitation

    CERN Document Server

    Reddy, Gautam; Vergassola, Massimo

    2016-01-01

    Proper balance between exploitation and exploration is what makes good decisions, which achieve high rewards like payoff or evolutionary fitness. The Infomax principle postulates that maximization of information directs the function of diverse systems, from living systems to artificial neural networks. While specific applications are successful, the validity of information as a proxy for reward remains unclear. Here, we consider the multi-armed bandit decision problem, which features arms (slot-machines) of unknown probabilities of success and a player trying to maximize cumulative payoff by choosing the sequence of arms to play. We show that an Infomax strategy (Info-p) which optimally gathers information on the highest mean reward among the arms saturates known optimal bounds and compares favorably to existing policies. The highest mean reward considered by Info-p is not the quantity actually needed for the choice of the arm to play, yet it allows for optimal tradeoffs between exploration and exploitation.

  8. Evaluating Maximum Wind Energy Exploitation in Active Distribution Networks

    DEFF Research Database (Denmark)

    Siano, Pierluigi; Chen, Peiyuan; Chen, Zhe;

    2010-01-01

    The increased spreading of distributed and renewable generation requires moving towards active management of distribution networks. In this paper, in order to evaluate maximum wind energy exploitation in active distribution networks, a method based on a multi-period optimal power flow (OPF......) analysis is proposed. Active network management schemes such as coordinated voltage control, energy curtailment and power factor control are integrated in the method in order to investigate their impacts on the maximization of wind energy exploitation. Some case studies, using real data from a Danish...... distribution system, confirmed the effectiveness of the proposed method in evaluating the optimal applications of active management schemes to increase wind energy harvesting without costly network reinforcement for the connection of wind generation....

  9. The remote control of power supplies: Experience of exploitation

    Directory of Open Access Journals (Sweden)

    Petrović Dragana

    2012-01-01

    Full Text Available The remote control of power supplies has been developed according to Telecom Serbia’s technical requirements. It has been exploited for five years. From this system specially developed for the needs of a telecom company, it has evolved into a universal system. After five years of usage of SDNU, analysis and systematization of the detected problems were carried out. The data were collected from about 200 external devices. The analyzed objects were of the first priority, located in larger cities, but also objects in inaccessible locations far from the city. The identified problems were grouped into four categories. According to classification of the problem, recommendations about SDNU users’ work organization were made in order to exploit the results effectively. This paper presents the characteristic forms of signals for every category of the detected problems.

  10. Analysis Of Damage Arising From Exploitation Of The Aircraft

    Directory of Open Access Journals (Sweden)

    Woźny Piotr

    2014-12-01

    Full Text Available During exploitation, due to a variety of reasons, aircrafts are damaged or suffer from different failures. In the process of operation, using appropriate methods of diagnosis, failure, damage, and relative deregulation of individual elements or units can be detected. For this purpose, one can apply a number of indirect diagnostic methods with the use of recorded diagnostic signals or a direct diagnosis with the use of non-destructive methods. The proper identification of the technical condition allows to determine the causes of irregularities and take actions aimed at preventing their occurrence. The article presents the types of exploitation damage of a multi-purpose aircraft. In addition, the criteria for the division of damage and research methods of the causes of damage are presented. Furthermore, an analysis of the scope of activities to be performed during the research of causes of damage to the aircraft is made.

  11. Exploiting Innocuous Activity for Correlating Users Across Sites

    OpenAIRE

    Goga, Oana; Lei, Howard; Parthasarathi, Sree Hari Krishnan; Friedland, Gerald; Sommer, Robin; Teixeira, Renata

    2013-01-01

    International audience We study how potential attackers can identify accounts on different social network sites that all belong to the same user, exploiting only innocuous activity that inherently comes with posted content. We examine three specific features on Yelp, Flickr, and Twitter: the geo-location attached to a user's posts, the timestamp of posts, and the user's writing style as captured by language models. We show that among these three features the location of posts is the most po...

  12. How to Exploit Domain Knowledge in Multiple Software Product Lines?

    OpenAIRE

    Urli, Simon; Mosser, Sébastien; Blay-Fornarino, Mireille; Collet, Philippe

    2013-01-01

    International audience As Software Product Lines (SPL) are inevitably moving towards a multiple form to tackle issues of reuse and complexity, variability management across the composed SPLs is still addressed with basic inter-constraints. Based on two disjoint case studies (digital signage and cloud computing), we identified this challenging problem for the SPL community. In this paper we describe how the domain knowledge needs to be exploited to support a more complete definition of Mult...

  13. Endangered Species and Natural Resource Exploitation: Extinction vs. Coexistence

    OpenAIRE

    Tsur, Yacov; Zemel, Amos

    1994-01-01

    The threat on the survival of animal species due to intensive use of natural resources is incorporated within resource management models, paying special attention to uncertainty regarding the conditions that lead to extinction. The manner in which the potential benefits forgone due to the species extinction (denoted extinction penalty) induce more conservative exploitation policies is studied in detail. When the extinction penalty is ignored, the optimal policy is to drive the resource stock ...

  14. CORPORATE CULTURE AS AN ANTECEDENT OF SUCCESSFUL EXPLORATION AND EXPLOITATION

    OpenAIRE

    KURT MATZLER; DAGMAR E. ABFALTER; TODD A. MOORADIAN; FRANZ BAILOM

    2013-01-01

    Organisational culture is a decisive factor for a firm's innovativeness and performance. Our empirical model explores the relationship between organisational culture — based on the competing values model — as an antecedent of exploration and exploitation, innovation success and firm performance. It is tested on a sample of 232 CEOs of corporations in the US. Relationships between the constructs were analysed through path modelling, using the Partial Least Squares (PLS) method, employing the S...

  15. HUMAN TRAFFICKING. TRAFFICKING IN CHILDREN. PRACTICAL ASPECTS REGARDING CHILDREN EXPLOITATION

    OpenAIRE

    Raluca-Ioana Rosu

    2010-01-01

    900 thousand children are working in their own households and 70 thousand were victims of worst forms of child labor, including sexual exploitation, forced work, trafficking in children, involvement in criminal activities and risk exposure. Also, approximately 3 thousand street children were involved in: products selling in the street, beggary or windshields washing. In Roma communities, the work of young children (even of 5 years old) is still a frequent practice. Isolated cases of girls inv...

  16. Exploiting GPUs in Virtual Machine for BioCloud

    OpenAIRE

    Heeseung Jo; Jinkyu Jeong; Myoungho Lee; Dong Hoon Choi

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that ena...

  17. Anisotropic Assembly of Colloidal Nanoparticles: Exploiting Substrate Crystallinity

    OpenAIRE

    Hayton, JA; Pauliac-Vaujour, E.; Moriarty, P.

    2007-01-01

    We show that the crystal structure of a substrate can be exploited to drive the anisotropic assembly of colloidal nanoparticles. Pentanethiol-passivated Au particles of approximately 2 nm diameter deposited from toluene onto hydrogen-passivated Si(111) surfaces form linear assemblies (rods) with a narrow width distribution. The rod orientations mirror the substrate symmetry, with a high degree of alignment along principal crystallographic axes of the Si(111) surface. There is a strong prefere...

  18. The exploitation of small cetaceans in Coastal Peru

    OpenAIRE

    Read, A J; Van Waerebeek, K.; Reyes, J.C.; McKinnon, J.S.; Lehman, L.C.

    1988-01-01

    Several species of small cetaceans are captured by fishermen in Peruvian coastal waters and used for human consumption. A large directed fishery exists for one species, the dusky dolphin Lagenorhynchus obscurus. In addition, two other species, the Burmeister's porpoise Phocoena spinipinnis and bottlenose dolphin Tursiops truncatus, are commonly taken in both directed fisheries and incidentally to other fishing operations. To examine the exploitation of these species in detail, we monitored th...

  19. Sicilian Protected Areas Among Tourist Exploitation and Environmental Guardianship

    OpenAIRE

    Genna, Vito

    2006-01-01

    This report pursues the objective to define the connection that ties exploitation of the environment quality in the protected areas and the opportunities of economic and tourist development. Sicilian protected areas involve a territory full of an extraordinary variety and concentration of historical, artistic and environmental resources, so that they represent one of the main tourist attractions of the Island. Unfortunately, the Sicilian protected areas system shows serious backwardnesses, so...

  20. Compressed Sensing MR Image Reconstruction Exploiting TGV and Wavelet Sparsity

    OpenAIRE

    Di Zhao; Huiqian Du; Yu Han; Wenbo Mei

    2014-01-01

    Compressed sensing (CS) based methods make it possible to reconstruct magnetic resonance (MR) images from undersampled measurements, which is known as CS-MRI. The reference-driven CS-MRI reconstruction schemes can further decrease the sampling ratio by exploiting the sparsity of the difference image between the target and the reference MR images in pixel domain. Unfortunately existing methods do not work well given that contrast changes are incorrectly estimated or motion compensation is inac...

  1. Sea cucumber exploitation in the Toliara region of southwest Madagascar

    OpenAIRE

    Rasolofonirina, R.; Conand, Chantal

    1998-01-01

    Sea cucumber harvesting is a traditional activity in Madagascar (Conand et al., 1997) and is very actively pursued in the south-west (Toliara). Several sources (e.g. Provincial Trade Department, Provincial Marine Fisheries Service) indicate that, between 1979 and 1986, exports fluctuated between 10 and 56 t. Data on recent exports show a very large increase, with volumes of more than 500 t. However, available data are insufficient to diagnose and analyse current over-exploitation, as the fish...

  2. A New Index Coding Scheme Exploiting Interlinked Cycles

    OpenAIRE

    Thapa, Chandra; Ong, Lawrence; Johnson, Sarah J.

    2015-01-01

    We study the index coding problem in the unicast message setting, i.e., where each message is requested by one unique receiver. This problem can be modeled by a directed graph. We propose a new scheme called interlinked cycle cover, which exploits interlinked cycles in the directed graph, for designing index codes. This new scheme generalizes the existing clique cover and cycle cover schemes. We prove that for a class of infinitely many digraphs with messages of any length, interlinked cycle ...

  3. Unconventional coal exploitation methods in Republic of Macedonia

    OpenAIRE

    Panov, Zoran; Popovski, Risto; Karanakova Stefanovska, Radmila

    2014-01-01

    Traditional mining methods however are not suited to working offshore reserves, and development and infrastructure costs of new mines can render the exploitation of landward reserves uneconomical. Underground coal gasification (UCG) has the potential to provide a clean and convenient source of energy from coal seams where traditional mining methods are either impossible or uneconomical. UCG is a method of converting unworked coal, deep underground, into a combustible gas, which can be use...

  4. A Trainable Neuromorphic Integrated Circuit that Exploits Device Mismatch

    OpenAIRE

    Thakur, Chetan Singh; Wang, Runchun; Hamilton, Tara Julia; Tapson, Jonathan; van Schaik, Andre

    2015-01-01

    Random device mismatch that arises as a result of scaling of the CMOS (complementary metal-oxide semi-conductor) technology into the deep submicron regime degrades the accuracy of analogue circuits. Methods to combat this increase the complexity of design. We have developed a novel neuromorphic system called a Trainable Analogue Block (TAB), which exploits device mismatch as a means for random projections of the input to a higher dimensional space. The TAB framework is inspired by the princip...

  5. Register Based Research Exploiting a Goldmine of Knowledge

    OpenAIRE

    Thaulow, Ivan; Thygesen, Lars

    2014-01-01

    Part 10: Short Summaries International audience Researchers in Denmark have for many years had outstanding opportunities for exploiting data from a wide range of registers. They can carry out research based on a goldmine of information on social and demographic characteristics of the population, labour market participation, health data and medical treatment, and more. All these data can be combined, and longitudinal analysis can be made.

  6. Organizational Ambidexterity : Balancing Exploitation and Exploration in Organizations

    OpenAIRE

    Yigit, Mert

    2013-01-01

    Purpose: This paper aims to investigate necessity of ambidexterity for organizations. The main interest of this thesis is to investigate why organizations should be ambidextrous and how organizations can reach ambidexterity under the pressure of limited resources and competitive market condition. Findings: This thesis explored relations and tensions between exploitation and exploration in organizational and individual aspects. Findings in the research show that communication skill of the subu...

  7. Birds of a Feather: Neanderthal Exploitation of Raptors and Corvids

    OpenAIRE

    Finlayson, Clive; Brown, Kimberly; Blasco, Ruth; Rossell, Jordi; Negro, Juan J.; Bortolotti, Gary R.; Finlayson, Geraldine; Sánchez-Marco, A.; Rodríguez Vidal, Joaquín.; Carrión, José S.; Rodríguez-Llanes, J.M.

    2012-01-01

    The hypothesis that Neanderthals exploited birds for the use of their feathers or claws as personal ornaments in symbolic behaviour is revolutionary as it assigns unprecedented cognitive abilities to these hominins. This inference, however, is based on modest faunal samples and thus may not represent a regular or systematic behaviour. Here we address this issue by looking for evidence of such behaviour across a large temporal and geographical framework. Our analyses try to answer four main qu...

  8. Exploiting Child-Robot Aesthetic Interaction for a Social Robot

    OpenAIRE

    Jae-Joon Lee; Dae-Won Kim; Bo-Yeong Kang

    2012-01-01

    A social robot interacts and communicates with humans by using the embodied knowledge gained from interactions with its social environment. In recent years, emotion has emerged as a popular concept for designing social robots. Several studies on social robots reported an increase in robot sociability through emotional imitative interactions between the robot and humans. In this paper conventional emotional interactions are extended by exploiting the aesthetic theories that the sociability of ...

  9. Exploitation de la faune en République Centrafricaine

    Directory of Open Access Journals (Sweden)

    Hardouin, J.

    1983-01-01

    Full Text Available Exploitation of wildlife in Central African Republic. Potentialities of wildlife and tourism in the area of Bamangui-Bangoran are high, but local population has been omitted from the development programmes. Hunting economy has always been in force. A better use of the local production is possible. Fight against commercial poaching should be intensified. Scientific observations must be regularly organized to avoid destruction of a most interesting renewable natural resource.

  10. Exploitation de la faune en République Centrafricaine

    OpenAIRE

    Hardouin, J.

    1983-01-01

    Exploitation of wildlife in Central African Republic. Potentialities of wildlife and tourism in the area of Bamangui-Bangoran are high, but local population has been omitted from the development programmes. Hunting economy has always been in force. A better use of the local production is possible. Fight against commercial poaching should be intensified. Scientific observations must be regularly organized to avoid destruction of a most interesting renewable natural resource.

  11. Online users of child sexual exploitation material (CSEM)

    OpenAIRE

    Kettleborough, Danielle; Merdian, Hannah Lena; Roberts, Amanda; Perkins, Derek

    2016-01-01

    Recent years have seen a substantial increase in the number of individuals engaging in offences relating to the online use of child sexual exploitation material (CSEM), to the point that UK police forces have stated that they “cannot arrest their way out of the problem”. Current movements are shifting the focus towards primary and secondary prevention efforts through public health campaigns, yet our knowledge of this typology of offending still remains somewhat limited. As such, a research pr...

  12. Catch and release: Rab1 exploitation by Legionella pneumophila

    OpenAIRE

    Machner, Matthias P.; Chen, Yang

    2011-01-01

    The intracellular pathogen Legionella pneumophila exploits host cell vesicular transport by manipulating the activity of the small GTPase Rab1. Bacterial proteins, so called effectors, that are delivered into the infected cell play a key role in this process. Here, we summarize recent developments in our quest to understand the molecular function of these effectors, and describe how L. pneumophila employs post-translational modification in a reversible manner to manipulate the activity of Rab...

  13. Architectures for intelligent robots in the age of exploitation

    Science.gov (United States)

    Hall, E. L.; Ali, S. M. Alhaj; Ghaffari, M.; Liao, X.; Sarkar, Saurabh; Mathur, Kovid; Tennety, Srinivas

    2009-01-01

    History shows that problems that cause human confusion often lead to inventions to solve the problems, which then leads to exploitation of the invention, creating a confusion-invention-exploitation cycle. Robotics, which started as a new type of universal machine implemented with a computer controlled mechanism in the 1960's, has progressed from an Age of Over-expectation, a Time of Nightmare, an Age of Realism, and is now entering the Age of Exploitation. The purpose of this paper is to propose architecture for the modern intelligent robot in which sensors permit adaptation to changes in the environment are combined with a "creative controller" that permits adaptive critic, neural network learning, and a dynamic database that permits task selection and criteria adjustment. This ideal model may be compared to various controllers that have been implemented using Ethernet, CAN Bus and JAUS architectures and to modern, embedded, mobile computing architectures. Several prototypes and simulations are considered in view of peta-computing. The significance of this comparison is that it provides some insights that may be useful in designing future robots for various manufacturing, medical, and defense applications.

  14. Pork and Carcasses Quality in Swine Exploited in Family Farms

    Directory of Open Access Journals (Sweden)

    Loredana Heber

    2010-10-01

    Full Text Available Maximum values of dry matter and fat (% of the carcass weight is achieved in swine exploited on small private family farms at 137 kg of dry matter and 115 kg of protein. Slaughtering swine at higher weight results in an increase of the dry matter and of the caloric value because of the increase of the amount of fat in the muscular fibber; thus, pork is of low quality because of the massive accumulation fat substance and the economic efficiency of producing pork is improper, with supplementary expenses on feed. Fattening swine on small family exploitations up to over 11 kg results in changes of the meat /fat ratio, detrimental to pork meat because of both thickening of lard on the animals' back and of fat depositions in the muscular fibber; though this improves pork quality, it is done with high expenses of energy, resulting in inefficient exploitation on private family farms that in most cases only supply for their families and rarely sell extra production.

  15. Neanderthal exploitation of ibex and chamois in southwestern Europe.

    Science.gov (United States)

    Yravedra, José; Cobo-Sánchez, Lucía

    2015-01-01

    There is increasing evidence that Neanderthals had a diverse and flexible diet. They exploited a wide range of resources from large proboscideans to small animals like turtles, rabbits, and marine species. Here, we discuss the importance of ibex and chamois in Neanderthal hunting strategies. The exploitation of both animals has traditionally been regarded as typical of Homo sapiens hunting behavior but was not a feature of Neanderthal behavior, which was thought to have focused on other kinds of game like deer, horses or large bovids. Our analysis of an extensive sample of Middle Paleolithic sites with faunal remains in the Iberian Peninsula reveals that Iberian ibex and chamois were frequently present throughout this period. Statistical analyses allowed us to assess the conditions that might have favored the presence or absence of these animals in the sites, while the taphonomic analyses enabled us to address the issue of whether ibex and chamois were indeed hunted by Neanderthals in the Iberian Peninsula. Our results indicate a better representation of both species in rocky and mountainous areas. The taphonomy of some sites reveals that chamois and ibex were hunted by Neanderthals, who showed great adaptive capacities to a wide variety of environments, including mountainous habitats. In contrast, other sites with favorable ecological conditions for ibex and chamois where these animals were not exploited by Neanderthals, who chose to hunt other species like deer, horses or aurochs, suggest behavioral complexity and large versatility. PMID:25481629

  16. Distinct Urban Mines: Exploiting secondary resources in unique anthropogenic spaces.

    Science.gov (United States)

    Ongondo, F O; Williams, I D; Whitlock, G

    2015-11-01

    Fear of scarcity of resources highlight the need to exploit secondary materials from urban mines in the anthroposphere. Analogous to primary mines rich in one type of material (e.g. copper, gold, etc.), some urban mines are unique/distinct. We introduce, illustrate and discuss the concept of Distinct Urban Mines (DUM). Using the example of a university DUM in the UK, analogous to a primary mine, we illustrate potential product/material yields in respect of size, concentration and spatial location of the mine. Product ownership and replacement cycles for 17 high-value electrical and electronic equipment (EEE) among students showed that 20 tonnes of valuable e-waste were in stockpile in this DUM and a further 87 tonnes would 'soon' be available for exploitation. We address the opportunities and challenges of exploiting DUMs and conclude that they are readily available reservoirs for resource recovery. Two original contributions arise from this work: (i) a novel approach to urban mining with a potential for maximising resource recovery within the anthroposphere is conceptualised; and (ii) previously unavailable data for high-value products for a typical university DUM are presented and analysed. PMID:26066575

  17. Exploitative and hierarchical antagonism in a cooperative bacterium.

    Directory of Open Access Journals (Sweden)

    2005-11-01

    Full Text Available Social organisms that cooperate with some members of their own species, such as close relatives, may fail to cooperate with other genotypes of the same species. Such noncooperation may take the form of outright antagonism or social exploitation. Myxococcus xanthus is a highly social prokaryote that cooperatively develops into spore-bearing, multicellular fruiting bodies in response to starvation. Here we have characterized the nature of social interactions among nine developmentally proficient strains of M. xanthus isolated from spatially distant locations. Strains were competed against one another in all possible pairwise combinations during starvation-induced development. In most pairings, at least one competitor exhibited strong antagonism toward its partner and a majority of mixes showed bidirectional antagonism that decreased total spore production, even to the point of driving whole populations to extinction. Differential response to mixing was the primary determinant of competitive superiority rather than the sporulation efficiencies of unmixed populations. In some competitive pairings, the dominant partner sporulated more efficiently in mixed populations than in clonal isolation. This finding represents a novel form of exploitation in bacteria carried out by socially competent genotypes and is the first documentation of social exploitation among natural bacterial isolates. Patterns of antagonistic superiority among these strains form a highly linear dominance hierarchy. At least some competition pairs construct chimeric, rather than segregated, fruiting bodies. The cooperative prokaryote M. xanthus has diverged into a large number of distinct social types that cooperate with clone-mates but exhibit intense antagonism toward distinct social types of the same species. Most lengthy migration events in nature may thus result in strong antagonism between migratory and resident populations, and this antagonism may have large effects on local

  18. Common Ground Station For Imagery Processing And Exploitation

    Science.gov (United States)

    Johnston, Morris V.

    1989-02-01

    The Joint Service Imagery Processing System (JSIPS) provides the services with an imagery receipt, processing, exploitation, and reporting capability that is responsive to the requirements of the tactical commanders. JSIPS combines existing and modified hardware and software with all-source digital imagery processing and exploitationto provide intelligence support that enhances the commander's ability to act within the enemy's decision cycle. JSIPS provides not only Tactical all-source imagery processing but integrates the Tactical, National, Auxiliary and Secondary imagery sources into one resource available to the image analyst for production of the commander's comprehensive report. JSIPS has been designed as a modular architecture which is readily expandable and reconfigurable to meet individual user needs. Pre-planned capabilities along with allocated space has been provided for growth in processing, throughput, and I/O requirements. JSIPS provides interoperability with several other imagery programs such as IDPS, TRAC, SYERS, IITS/FIST, NITF, UPD-8, and ATARS. It provides the ability to add additional imagery programs with little or no changes in the JSIPS design. JSIPS provides a softcopy and hardcopy exploitation capability for all military branches with output to their respective intelligence centers. The JSIPS system design, as shown in figure 1.0-1, has the following segments: Tactical Input Segment (TIS), National Input Segment (NIS), Exploitation Support Segment (ESS), Softcopy Exploitation Segment (SES), Hardcopy Exploitation Segment (HES), Communications Support Segment (CSS), and System Support Segment (SSS). JSIPS consists of standardized modules and segments with the collective capability to receive, process, exploit and disseminate imagery and reports based on multi-source imagery from the Tactical and National inputs. The overall JSIPS System operates in either a shelterized or non-shelterized configuration. Tailored JSIPS Systems are packaged in

  19. Diversity of rickettsial pathogens in Columbian black-tailed deer and their associated keds (Diptera: Hippoboscidae) and ticks (Acari: Ixodidae).

    Science.gov (United States)

    Foley, Janet E; Hasty, Jeomhee M; Lane, Robert S

    2016-06-01

    Cervids host multiple species of ixodid ticks, other ectoparasites, and a variety of rickettsiae. However, diagnostic test cross-reactivity has precluded understanding the specific role of deer in rickettsial ecology. In our survey of 128 Columbian black-tailed deer (Odocoileus hemionus columbianus (Richardson)) and their arthropod parasites from two northern Californian herds, combined with reports from the literature, we identified four distinct Anaplasma spp. and one Ehrlichia species. Two keds, Lipoptena depressa (Say) and Neolipoptena ferrisi Bequaert, and two ixodid ticks, Ixodes pacificus Cooley and Kohls and Dermacentor occidentalis Marx, were removed from deer. One D. occidentalis was PCR-positive for E. chaffeensis; because it was also PCR-positive for Anaplasma sp., this is an Anaplasma/Ehrlichia co-infection prevalence of 4.3%. 29% of L. depressa, 23% of D. occidentalis, and 14% of deer were PCR-positive for Anaplasma spp. DNA sequencing confirmed A. bovis and A. ovis infections in D. occidentalis, A. odocoilei in deer and keds, and Anaplasma phagocytophilum strain WI-1 in keds and deer. This is the first report of Anaplasma spp. in a North America deer ked, and begs the question whether L. depressa may be a competent vector of Anaplasma spp. or merely acquire such bacteria while feeding on rickettsemic deer. PMID:27232123

  20. Serological investigation of vector-borne disease in dogs from rural areas of China

    Institute of Scientific and Technical Information of China (English)

    Shiwen Wang; Jing He; Lijuan Zhang

    2012-01-01

    Objective:To evaluate the Anaplasma phagocytophilum (A. phagocytophilum), Ehrlichia canis (E. canis), Dirofilaria immitis (D. immitis) (canine heartworm), Borrelia burgdorferi (B. burgdorferi) infections in countryside dogs from Yunnan, Hainan and Anhui provinces. Methods: Serum samples were collected from 26 dogs in Yunnan, Hainan and Anhui provinces. The samples were tested using a commercial ELISA rapid diagnostic assay kit (SNAP® 4Dx®; IDEXX Laboratories, Inc. U.S.A.). Meanwhile, indirect immunofluorescence assay (IFA) recommended by WHO was conducted to detect IgG to A. phagocytophilum. Two methods were analyzed and compared. Results: The number of serologically positive dogs for IgG to A. phagocytophilum was only 2 which was from Hainan province and none of the 26 dogs responded positive for E. canis, D. immitis (canine heartworm), and B. burgdorferi by ELISA rapid diagnostic method. The number of serologically positive dogs for IgG to A. phagocytophilum was 13 (50%) by IFA method. Data of the two methods were analyzed by statistical software and the difference was statistically significant (P=0.002). Conclusions: It can be concluded that IFA method was more sensitive than ELISA rapid diagnostic method. However, we need conduct further and intensive epidemiology survey on tick-born diseases pathogens including A. phagocytophilum, E. canis, D. immitis (canine heartworm), and B. burgdorferi which have public health significance.

  1. Human collective intelligence under dual exploration-exploitation dilemmas.

    Directory of Open Access Journals (Sweden)

    Wataru Toyokawa

    Full Text Available The exploration-exploitation dilemma is a recurrent adaptive problem for humans as well as non-human animals. Given a fixed time/energy budget, every individual faces a fundamental trade-off between exploring for better resources and exploiting known resources to optimize overall performance under uncertainty. Colonies of eusocial insects are known to solve this dilemma successfully via evolved coordination mechanisms that function at the collective level. For humans and other non-eusocial species, however, this dilemma operates within individuals as well as between individuals, because group members may be motivated to take excessive advantage of others' exploratory findings through social learning. Thus, even though social learning can reduce collective exploration costs, the emergence of disproportionate "information scroungers" may severely undermine its potential benefits. We investigated experimentally whether social learning opportunities might improve the performance of human participants working on a "multi-armed bandit" problem in groups, where they could learn about each other's past choice behaviors. Results showed that, even though information scroungers emerged frequently in groups, social learning opportunities reduced total group exploration time while increasing harvesting from better options, and consequentially improved collective performance. Surprisingly, enriching social information by allowing participants to observe others' evaluations of chosen options (e.g., Amazon's 5-star rating system in addition to choice-frequency information had a detrimental impact on performance compared to the simpler situation with only the choice-frequency information. These results indicate that humans groups can handle the fundamental "dual exploration-exploitation dilemmas" successfully, and that social learning about simple choice-frequencies can help produce collective intelligence.

  2. Widespread exploitation of the honeybee by early Neolithic farmers.

    Science.gov (United States)

    Roffet-Salque, Mélanie; Regert, Martine; Evershed, Richard P; Outram, Alan K; Cramp, Lucy J E; Decavallas, Orestes; Dunne, Julie; Gerbault, Pascale; Mileto, Simona; Mirabaud, Sigrid; Pääkkönen, Mirva; Smyth, Jessica; Šoberl, Lucija; Whelton, Helen L; Alday-Ruiz, Alfonso; Asplund, Henrik; Bartkowiak, Marta; Bayer-Niemeier, Eva; Belhouchet, Lotfi; Bernardini, Federico; Budja, Mihael; Cooney, Gabriel; Cubas, Miriam; Danaher, Ed M; Diniz, Mariana; Domboróczki, László; Fabbri, Cristina; González-Urquijo, Jesus E; Guilaine, Jean; Hachi, Slimane; Hartwell, Barrie N; Hofmann, Daniela; Hohle, Isabel; Ibáñez, Juan J; Karul, Necmi; Kherbouche, Farid; Kiely, Jacinta; Kotsakis, Kostas; Lueth, Friedrich; Mallory, James P; Manen, Claire; Marciniak, Arkadiusz; Maurice-Chabard, Brigitte; Mc Gonigle, Martin A; Mulazzani, Simone; Özdoğan, Mehmet; Perić, Olga S; Perić, Slaviša R; Petrasch, Jörg; Pétrequin, Anne-Marie; Pétrequin, Pierre; Poensgen, Ulrike; Pollard, C Joshua; Poplin, François; Radi, Giovanna; Stadler, Peter; Stäuble, Harald; Tasić, Nenad; Urem-Kotsou, Dushka; Vuković, Jasna B; Walsh, Fintan; Whittle, Alasdair; Wolfram, Sabine; Zapata-Peña, Lydia; Zoughlami, Jamel

    2015-11-12

    The pressures on honeybee (Apis mellifera) populations, resulting from threats by modern pesticides, parasites, predators and diseases, have raised awareness of the economic importance and critical role this insect plays in agricultural societies across the globe. However, the association of humans with A. mellifera predates post-industrial-revolution agriculture, as evidenced by the widespread presence of ancient Egyptian bee iconography dating to the Old Kingdom (approximately 2400 BC). There are also indications of Stone Age people harvesting bee products; for example, honey hunting is interpreted from rock art in a prehistoric Holocene context and a beeswax find in a pre-agriculturalist site. However, when and where the regular association of A. mellifera with agriculturalists emerged is unknown. One of the major products of A. mellifera is beeswax, which is composed of a complex suite of lipids including n-alkanes, n-alkanoic acids and fatty acyl wax esters. The composition is highly constant as it is determined genetically through the insect's biochemistry. Thus, the chemical 'fingerprint' of beeswax provides a reliable basis for detecting this commodity in organic residues preserved at archaeological sites, which we now use to trace the exploitation by humans of A. mellifera temporally and spatially. Here we present secure identifications of beeswax in lipid residues preserved in pottery vessels of Neolithic Old World farmers. The geographical range of bee product exploitation is traced in Neolithic Europe, the Near East and North Africa, providing the palaeoecological range of honeybees during prehistory. Temporally, we demonstrate that bee products were exploited continuously, and probably extensively in some regions, at least from the seventh millennium cal BC, likely fulfilling a variety of technological and cultural functions. The close association of A. mellifera with Neolithic farming communities dates to the early onset of agriculture and may provide

  3. Enhancing data exploitation through DTN-based data transmission protocols

    Science.gov (United States)

    Daglis, Ioannis A.; Tsaoussidis, Vassilis; Rontogiannis, Athanasios; Balasis, Georgios; Keramitsoglou, Iphigenia; Paronis, Dimitrios; Sykioti, Olga; Tsinganos, Antonios

    2014-05-01

    Data distribution and data access are major issues in space sciences and geosciences as they strongly influence the degree of data exploitation. Processing and analysis of large volumes of Earth observation and space/planetary data face two major impediments: limited access capabilities due to narrow connectivity windows between spacecraft and ground receiving stations and lack of sufficient communication and dissemination mechanisms between space data receiving centres and the end-user community. Real-time data assimilation that would be critical in a number of forecasting capabilities is particularly affected by such limitations. The FP7-Space project "Space-Data Routers" (SDR) has the aim of allowing space agencies, academic institutes and research centres to disseminate/share space data generated by single or multiple missions, in an efficient, secure and automated manner. The approach of SDR relies on space internetworking - and in particular on Delay-Tolerant Networking (DTN), which marks the new era in space communications, unifies space and earth communication infrastructures and delivers a set of tools and protocols for space-data exploitation. The project includes the definition of limitations imposed by typical space mission scenarios in which the National Observatory of Athens is currently involved, including space and planetary exploration, as well as satellite-supported geoscience applications. In this paper, we present the mission scenarios, the SDR-application and the evaluation of the associated impact from the space-data router enhancements. The work leading to this paper has received funding from the European Union's Seventh Framework Programme (FP7-SPACE-2010-1) under grant agreement no. 263330 for the SDR (Space-Data Routers for Exploiting Space Data) collaborative research project. This paper reflects only the authors' views and the Union is not liable for any use that may be made of the information contained therein.

  4. Exploiting the Potential of Data Centers in the Smart Grid

    Science.gov (United States)

    Wang, Xiaoying; Zhang, Yu-An; Liu, Xiaojing; Cao, Tengfei

    As the number of cloud computing data centers grows rapidly in recent years, from the perspective of smart grid, they are really large and noticeable electric load. In this paper, we focus on the important role and the potential of data centers as controllable loads in the smart grid. We reviewed relevant research in the area of letting data centers participate in the ancillary services market and demand response programs of the grid, and further investigate the possibility of exploiting the impact of data center placement on the grid. Various opportunities and challenges are summarized, which could provide more chances for researches to explore this field.

  5. Nonlinear Cherenkov difference-frequency generation exploiting birefringence of KTP

    Energy Technology Data Exchange (ETDEWEB)

    Ni, R.; Du, L.; Wu, Y.; Hu, X. P., E-mail: xphu@nju.edu.cn; Zou, J.; Zhang, Y.; Zhu, S. N. [National Laboratory of Solid State Microstructures and School of Physics, Nanjing University, Nanjing 210093 (China); Sheng, Y. [Laser Physics Center, Research School of Physics and Engineering, Australian National University, Canberra ACT 0200 (Australia); Arie, A. [School of Electrical Engineering, Faculty of Engineering, Tel-Aviv University, Tel-Aviv 69978 (Israel)

    2016-01-18

    In this letter, we demonstrate the realization of nonlinear Cherenkov difference-frequency generation (CDFG) exploiting the birefringence property of KTiOPO{sub 4} (KTP) crystal. The pump and signal waves were set to be along different polarizations, thus the phase-matching requirement of CDFG, which is, the refractive index of the pump wave should be smaller than that of the signal wave, was fulfilled. The radiation angles and the intensity dependence of the CDFG on the pump wave were measured, which agreed well with the theoretical ones.

  6. Cues That Language Users Exploit to Segment Speech

    Institute of Scientific and Technical Information of China (English)

    陈冰茹

    2015-01-01

    <正>The capability to segment words from fluent speech is an important step for learning and acquiring a language(Jusczyk,1999).Therefore,a number of researches and studies have focused on various cues that language learners exploit to locate word boundaries.During the half century,it has been discussed that there are mainly four crucial cues can be used by listeners to segment words in speech.Particularly,they are:(1)Prosody(Echols et al.1997;Jusczyk et al.1996):(2)Statistical and distributional regularities(Brent et al.1996;Saffran et al.1996);(3)Phonotactics(Brent et al.1996;Myers et al.1996);

  7. Labour exploitation of illegal immigrants in the developed north

    OpenAIRE

    Renovčević Anja

    2013-01-01

    The theme of this paper is the exploitation of illegal immigrants working in the developed North, while the main objective is analysis of the relation between illegal migration and market demand for low-cost labor, in the context of globalization, growing inequalities and the new global division of labor. The basic assumption is that the market of so-called developed countries of the North has an internal, self-built need for illegal labor, and that the overall economy in the North larg...

  8. Nonlinear Cherenkov difference-frequency generation exploiting birefringence of KTP

    International Nuclear Information System (INIS)

    In this letter, we demonstrate the realization of nonlinear Cherenkov difference-frequency generation (CDFG) exploiting the birefringence property of KTiOPO4 (KTP) crystal. The pump and signal waves were set to be along different polarizations, thus the phase-matching requirement of CDFG, which is, the refractive index of the pump wave should be smaller than that of the signal wave, was fulfilled. The radiation angles and the intensity dependence of the CDFG on the pump wave were measured, which agreed well with the theoretical ones

  9. VCSELs and silicon light sources exploiting SOI grating mirrors

    DEFF Research Database (Denmark)

    Chung, Il-Sug; Mørk, Jesper

    2012-01-01

    In this talk, novel vertical-cavity laser structure consisting of a dielectric Bragg reflector, a III-V active region, and a high-index-contrast grating made in the Si layer of a silicon-on-insulator (SOI) wafer will be presented. In the Si light source version of this laser structure, the SOI...... Bragg reflector. Numerical simulations show that both the silicon light source and the VCSEL exploiting SOI grating mirrors have superior performances, compared to existing silicon light sources and long wavelength VCSELs. These devices are highly adequate for chip-level optical interconnects as well as...

  10. Cyber-Herding: Exploiting Islamic Extremists Use of the Internet

    OpenAIRE

    Moon, David B.

    2007-01-01

    The internet has many characteristics that support extremists' information operations, such as being able to reach large audiences. Yet the internet also has inherent weaknesses that can be exploited. One of these weaknesses is the ambiguous nature of the net. You trust that when you go to a website that it is legitimate. If it looks professional, you tend to believe that the site is real. However, criminals or terrorists could just as easily be running that website. The same is true when you...

  11. On the Exploitation of Sensitivity Derivatives for Improving Sampling Methods

    Science.gov (United States)

    Cao, Yanzhao; Hussaini, M. Yousuff; Zang, Thomas A.

    2003-01-01

    Many application codes, such as finite-element structural analyses and computational fluid dynamics codes, are capable of producing many sensitivity derivatives at a small fraction of the cost of the underlying analysis. This paper describes a simple variance reduction method that exploits such inexpensive sensitivity derivatives to increase the accuracy of sampling methods. Three examples, including a finite-element structural analysis of an aircraft wing, are provided that illustrate an order of magnitude improvement in accuracy for both Monte Carlo and stratified sampling schemes.

  12. Efficient Depth Map Compression Exploiting Segmented Color Data

    DEFF Research Database (Denmark)

    Milani, Simone; Zanuttigh, Pietro; Zamarin, Marco;

    2011-01-01

    performances is still an open research issue. This paper presents a novel compression scheme that exploits a segmentation of the color data to predict the shape of the different surfaces in the depth map. Then each segment is approximated with a parameterized plane. In case the approximation is sufficiently...... accurate for the target bit rate, the surface coefficients are compressed and transmitted. Otherwise, the region is coded using a standard H.264/AVC Intra coder. Experimental results show that the proposed scheme permits to outperformthe standardH.264/AVC Intra codec on depth data and can be effectively...

  13. The ESA Scientific Exploitation of Operational Missions element, first results

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Mathieu, Pierre-Philippe; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Pinnock, Simon; Foumelis, Michael; Ramoino, Fabrizio

    2016-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS, ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan is established and is approved every year by ESA Members States. During 2015 SEOM, Science users consultation workshops have been organized for Sentinel1/3/5P ( Fringe, S3 Symposium and Atmospheric science respectively) , new R&D studies for scientific exploitation of the Sentinels have been launched ( S3 for Science SAR Altimetry and Ocean Color , S2 for Science,) , open-source multi-mission scientific toolboxes have been launched (in particular the SNAP/S1-2-3 Toolbox). In addition two advanced international training courses have been organized in Europe to exploit the new S1-A and S2-A data for Land and Ocean remote sensing (over 120 participants from 25 countries) as well as activities for promoting the first scientific results ( e.g. Chili Earthquake) . In addition the First EO Open Science 2.0 was organised at ESA in October 2015 with 225 participants from 31 countries bringing together young EO scientists and data scientists. During the conference precursor activities in EO Open Science and Innovation were presented, while developing a Roadmap preparing for future ESA scientific exploitation activities. Within the conference, the first

  14. Exploiting Maximum Parallelism in Loop Using Heterogeneous Computing

    Institute of Scientific and Technical Information of China (English)

    ZENG Guosun

    2001-01-01

    In this paper, we present the defini-tion of maximum loop speedup, which is the metricof parallelism hidden in loop body. We also studythe classes of Do-loop and their dependence as wellas the parallelism they contain. How to exploit suchparallelism under heterogeneous computing environ-ment? The paper proposes several approaches, whichare eliminating serial bottleneck by means of heteroge-neous computing, heterogeneous Do-all-loop schedul-ing, heterogeneous Do-a-cross scheduling. We findthat, not only on theoretical analysis but also on ex-perimental results, these schemes acquire better per-formance than in homogeneous computing.

  15. Exploring, exploiting and evolving diversity of aquatic ecosystem models

    DEFF Research Database (Denmark)

    Janssen, Annette B. G.; Arhonditsis, George B.; Beusen, Arthur;

    2015-01-01

    Here, we present a community perspective on how to explore, exploit and evolve the diversity in aquatic ecosystem models. These models play an important role in understanding the functioning of aquatic ecosystems, filling in observation gaps and developing effective strategies for water quality...... by comparing and combining different aspects of existing models. Finally, we discuss how model diversity came about in the past and could evolve in the future. Throughout our study, we use analogies from biodiversity research to analyse and interpret model diversity. We recommend to make models...

  16. Exploitation Strategies in Social Parasites of Fungus Growing Ants

    DEFF Research Database (Denmark)

    Clement, Janni Dolby

    to increase its own fitness. The host will use a sophisticated recognition system in order to accept nestmates and expel intruders from their societies. However this defence barrier can be overcome by parasites. Among the most specialized social parasites are the inquilines that exploit social insect...... colonies. Inquilines are usually close relatives of their host and so share ancestral characteristics (Emery’s rule). They are dependent on being fully integrated into their host’s colony throughout their lives in order to reproduce. Most inquiline ants have completely lost their sterile worker caste...

  17. The pCS20 PCR assay for Ehrlichia ruminantium does not cross-react with the novel deer ehrlichial agent found in white-tailed deer in the United States of America

    OpenAIRE

    Mahan, S. M.; B.H. Simbi; Burridge, M J

    2004-01-01

    White-tailed deer are susceptible to heartwater (Ehrlichia [Cowdria] ruminantium infection) and are likely to suffer high mortality if the disease spreads to the United States. It is vital, therefore, to validate a highly specific and sensitive detection method for E. ruminantium infection that can be reliably used in testing white-tailed deer, which are reservoirs of antigenically or genetically related agents such as Ehrlichia chaffeensis, Anaplasma (Ehrlichia) phagocytophilum (HGE a...

  18. Tickborne fever associated with abortion outbreak in dairy cows.

    Science.gov (United States)

    2016-08-20

    Anaplasma phagocytophilum detected in aborting cows on rough grazingLead poisoning in bullocksPersistent bovine viral diarrhoea virus infection and colisepticaemia in a 20-hour-old calfAbortion due to bovine herpesvirus 1 in a four-year-old cowTickborne fever in lambsInfectious sinusitis due to Mycoplasma gallisepticum in pheasants These are among matters discussed in the disease surveillance report for May 2016 from SAC Consulting: Veterinary Services (SAC C VS). PMID:27550334

  19. Ecological factors characterizing the prevalence of bacterial tick-borne pathogens in Ixodes ricinus ticks in pastures and woodlands

    OpenAIRE

    Halos, Lenaïg; Bord, Severine; Cotté, Violaine; Gasqui, Patrick; Abrial, David; Barnouin, Jacques; Boulouis, Henri-Jean; Taussat, Muriel; Vourc'H, Gwenaël

    2010-01-01

    Ecological changes are recognized as an important driver behind the emergence of infectious diseases. The prevalence of infection in ticks depends upon ecological factors that are rarely taken into account simultaneously. Our objective was to investigate the influences of forest fragmentation, vegetation, adult tick hosts, and habitat on the infection prevalence of three tick-borne bacteria, Borrelia burgdorferi sensu lato, Anaplasma phagocytophilum, and Rickettsia sp. of the spotted fever gr...

  20. Stray dogs of northern Jordan as reservoirs of ticks and tick-borne hemopathogens

    Czech Academy of Sciences Publication Activity Database

    Qablan, M.; Kubelová, M.; Široký, P.; Modrý, David; Amr, Z. S.

    2012-01-01

    Roč. 111, č. 1 (2012), s. 301-307. ISSN 0932-0113 R&D Projects: GA ČR GA206/09/0927 Grant ostatní: GA CR(CZ) GA524/09/0715 Keywords : ANAPLASMA-PHAGOCYTOPHILUM * GRANULOCYTIC EHRLICHIOSIS * MOLECULAR EVIDENCE * CANINE BABESIOSIS * HEPATOZOON-CANIS * ISRAEL * IXODIDAE * ACARI * COINFECTION * INFECTION Subject RIV: GJ - Animal Vermins ; Diseases, Veterinary Medicine Impact factor: 2.852, year: 2012

  1. Assessment of Polymicrobial Infections in Ticks in New York State

    OpenAIRE

    Tokarz, Rafal; Jain, Komal; Bennett, Ashlee; Briese, Thomas; Lipkin, W. Ian

    2010-01-01

    Ixodes scapularis ticks are clinically important hematophagous vectors. A single tick bite can lead to a polymicrobial infection. We determined the prevalence of polymicrobial infection with Borrelia burgdorferi, Anaplasma phagocytophilum, Babesia microti, Borrelia miyamotoi, and Powassan virus in 286 adult ticks from the two counties in New York State where Lyme disease is endemic, utilizing a MassTag multiplex polymerase chain reaction assay. Seventy-one percent of the ticks harbored at lea...

  2. Coexistence of Pathogens in Host-Seeking and Feeding Ticks within a Single Natural Habitat in Central Germany▿ †

    OpenAIRE

    Franke, Jan; Fritzsch, Julia; Tomaso, Herbert; Straube, Eberhard; Dorn, Wolfram; Hildebrandt, Anke

    2010-01-01

    The importance of established and emerging tick-borne pathogens in Central and Northern Europe is steadily increasing. In 2007, we collected Ixodes ricinus ticks feeding on birds (n = 211) and rodents (n = 273), as well as host-seeking stages (n = 196), in a habitat in central Germany. In order to find out more about their natural transmission cycles, the ticks were tested for the presence of Lyme disease borreliae, Anaplasma phagocytophilum, spotted fever group (SFG) rickettsiae, Francisella...

  3. First evidence of feline herpesvirus, calicivirus, parvovirus, and Ehrlichia exposure in Brazilian free-ranging felids.

    OpenAIRE

    Filoni, C.; Catão-Dias, J L; Bay, G.; E. L. Durigon; Jorge, R S P; Lutz, H.; Hofmann-Lehmann, R.

    2006-01-01

    Serum samples from 18 pumas (Puma concolor), one ocelot (Leopardus pardalis), and two little spotted cats (Leopardus tigrinus) collected from free-ranging animals in Brazil between 1998 and 2004 were tested by indirect immunofluorescence (IFA) for antibodies to feline herpesvirus 1 (FHV 1), calicivirus (FCV), coronavirus (FCoV), parvo-virus (FPV), Ehrlichia canis, Anaplasma pha-gocytophilum, and Bartonella henselae. Serum samples also were tested, by Western blot and ELISA, for feline leukemi...

  4. Spatial distribution of vector borne disease agents in dogs in Aegean region, Turkey

    OpenAIRE

    Kerem Ural; Mehmet Gultekin; Abidin Atasoy; Bulent Ulutas

    2015-01-01

    ABSTRACTObjective. Assess the spatial distribution of seroprevalence of infection with or exposure to 4 vector-borne pathogens Ehrlichia canis, Anaplasma phagocytophilum, Borrelia burgdorferi and Dirofilaria immitis, across the coastal states of the Aegean region with special reference to clinical signs and haematological variances related to disease condition. Materials and methods. A convenience sample, targeting blood from at least 10 pet dogs from İzmir, Aydin, Denizli, Mugla and Manisa c...

  5. Agents of Human Anaplasmosis and Lyme Disease at Camp Ripley, Minnesota

    OpenAIRE

    Johnson, Russell C.; Kodner, Carrie; Jarnefeld, Janet; Eck, Deborah K.; Xu, Yaning

    2011-01-01

    The transmission dynamics of Anaplasma phagocytophilum (Ap) and Borrelia burgdorferi (Bb) among Ixodes scapularis (Is) and mammalian hosts was investigated at Camp Ripley, an area representative of central Minnesota. Prevalence of white-footed mouse infection with Ap and Bb were 20% and 42%, respectively, with a coinfection level of 14%. Peak levels of infection with both agents occurred in May. The average levels of seropositivity to Ap and Bb were 29.3% and 48%, respectively. Of the mice in...

  6. The ecology of tick-transmitted infections in the redwood chipmunk (Tamias ochrogenys)

    OpenAIRE

    Janet E. Foley; Nieto, Nathan C.

    2011-01-01

    The redwood chipmunk contributes to the maintenance of tick-borne diseases in northern California. The range of redwood chipmunks overlaps that of western black-legged ticks and tick-borne disease, including granulocytic anaplasmosis and Lyme borreliosis. Chipmunks have high Anaplasma phagocytophilum PCR- and seroprevalence, are infested with a diversity of Ixodes spp. ticks, and are reservoir competent for Borrelia burgdorferi. We hypothesized that chipmunks could maintain tick-borne disease...

  7. Detection of Borrelia burgdorferi sensu lato and spotted fever group rickettsiae in hard ticks (Acari, Ixodidae) parasitizing bats in Poland

    OpenAIRE

    Piksa, Krzysztof; Stańczak, Joanna; Biernat, Beata; Górz, Andrzej; Nowak-Chmura, Magdalena; Siuda, Krzysztof

    2016-01-01

    A total of 491 Ixodes vespertilionis and 8 Ixodes ricinus collected from bats and cave walls in southern Poland between 2010 and 2012 were examined by the polymerase chain reaction for tick-transmitted pathogens. PCR analysis for Borrelia burgdorferi s.l., Rickettsia spp., and Anaplasma phagocytophilum yielded negative results for all I. vespertilionis. DNA of Rickettsia helvetica was detected in three specimens of I. ricinus attached to Rhinolophus hipposideros or Myotis myotis, while Borrel...

  8. Investigação molecular de Ehrlichia spp. e Anaplasma platys em felinos domésticos: alterações clínicas, hematológicas e bioquímicas

    Directory of Open Access Journals (Sweden)

    Elisabete S Correa

    2011-10-01

    Full Text Available Ehrlichia sp. e Anaplasma platys são micro-organismos Gram negativos, parasitos intracelulares obrigatórios, residindo em vacúolos citoplasmáticos de leucócitos e plaquetas, encontrados no sangue periférico ou em tecidos. Poucos relatos têm sido feitos sobre erliquiose e anaplasmose em gatos no Brasil, os quais são baseados na presença de mórulas em leucócitos e plaquetas, ou pela detecção de anticorpos. O objetivo deste trabalho foi investigar a infecção natural por Ehrlichia sp. e A.platys em gatos no Município de Campos dos Goytacazes-RJ, através da hematoscopia e pela detecção do DNA desses agentes. Foram utilizadas amostras de sangue total e de soro de 91 gatos, independente de raça, sexo e idade. Realizaram-se hemograma, bioquímica sérica e PCR, utilizando oligonucleotídes para Ehrlichia sp. e A.platys. Os dados de hematoscopia mostraram que 9,89% dos gatos apresentaram mórulas em macroplaquetas. O DNA de A.platys foi detectado em 13,18% dos 91 animais e em 44,44% das amostras positivas à hematoscopia. O DNA de Ehrlichia sp. não foi detectado em nenhuma amostra. Nenhuma alteração foi observada nos sinais clínicos nem nos resultados laboratoriais nos animais estudados. Os dados sugerem que os felinos domésticos podem atuar como potenciais reservatórios para A. platys, como forma não sintomática das enfermidades relacionadas

  9. Exploitation of Clustering Techniques in Transactional Healthcare Data

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad Mahoto

    2014-03-01

    Full Text Available Healthcare service centres equipped with electronic health systems have improved their resources as well as treatment processes. The dynamic nature of healthcare data of each individual makes it complex and difficult for physicians to manually mediate them; therefore, automatic techniques are essential to manage the quality and standardization of treatment procedures. Exploratory data analysis, patternanalysis and grouping of data is managed using clustering techniques, which work as an unsupervised classification. A number of healthcare applications are developed that use several data mining techniques for classification, clustering and extracting useful information from healthcare data. The challenging issue in this domain is to select adequate data mining algorithm for optimal results. This paper exploits three different clustering algorithms: DBSCAN (Density-Based Clustering, agglomerative hierarchical and k-means in real transactional healthcare data of diabetic patients (taken as case study to analyse their performance in large and dispersed healthcare data. The best solution of cluster sets among the exploited algorithms is evaluated using clustering quality indexes and is selected to identify the possible subgroups of patients having similar treatment patterns

  10. Exploiting GPUs in Virtual Machine for BioCloud

    Directory of Open Access Journals (Sweden)

    Heeseung Jo

    2013-01-01

    Full Text Available Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.

  11. Noise-exploitation and adaptation in neuromorphic sensors

    Science.gov (United States)

    Hindo, Thamira; Chakrabartty, Shantanu

    2012-04-01

    Even though current micro-nano fabrication technology has reached integration levels where ultra-sensitive sensors can be fabricated, the sensing performance (resolution per joule) of synthetic systems are still orders of magnitude inferior to those observed in neurobiology. For example, the filiform hairs in crickets operate at fundamental limits of noise; auditory sensors in a parasitoid fly can overcome fundamental limitations to precisely localize ultra-faint acoustic signatures. Even though many of these biological marvels have served as inspiration for different types of neuromorphic sensors, the main focus these designs have been to faithfully replicate the biological functionalities, without considering the constructive role of "noise". In man-made sensors device and sensor noise are typically considered as a nuisance, where as in neurobiology "noise" has been shown to be a computational aid that enables biology to sense and operate at fundamental limits of energy efficiency and performance. In this paper, we describe some of the important noise-exploitation and adaptation principles observed in neurobiology and how they can be systematically used for designing neuromorphic sensors. Our focus will be on two types of noise-exploitation principles, namely, (a) stochastic resonance; and (b) noise-shaping, which are unified within our previously reported framework called Σ▵ learning. As a case-study, we describe the application of Σ▵ learning for the design of a miniature acoustic source localizer whose performance matches that of its biological counterpart(Ormia Ochracea).

  12. Are shale gas exploitation and water resources security compatible?

    International Nuclear Information System (INIS)

    Shale gas- or more precisely gas from source rock- is a potential resource, diffused and largely distributed. The exploitation of non-conventional hydrocarbons raises issues even if most techniques are well known and properly controlled: drilling, casing cementing, the development of natural rock discontinuities for gas or oil production. The most worrying repercussions will be on the surface: multiple boreholes, usage conflicts, linear production infrastructures, access paths and safety of aging constructions. The potential impacts on groundwater at the depth it is traditionally exploited are more indirect than direct. The impacts in depth will be presumably less threatening due to a lack of elements at stake. The cost of projects at such a depth will impose to combine exploration and experimentation in real size. The potential resource is only known through the American administration's indirect and approximate assessment: France would appear to be the second country (after Poland) with the largest quantity in Europe. France must engage in producing its own assessment. The 'code for mines' yet referred to is no more adapted for non-conventional resources, thus minimizing the WFD objectives, the French law on water and the code for the environment, without involving the stake holders. Recently, the administration decided to ban the hydraulic fracturing technique, though in practice since a long time, thus penalizing a professional branch. Policies, regulation, communication, decision process, validation of techniques and security checks on works should be improved. (author)

  13. Infomax Strategies for an Optimal Balance Between Exploration and Exploitation

    Science.gov (United States)

    Reddy, Gautam; Celani, Antonio; Vergassola, Massimo

    2016-06-01

    Proper balance between exploitation and exploration is what makes good decisions that achieve high reward, like payoff or evolutionary fitness. The Infomax principle postulates that maximization of information directs the function of diverse systems, from living systems to artificial neural networks. While specific applications turn out to be successful, the validity of information as a proxy for reward remains unclear. Here, we consider the multi-armed bandit decision problem, which features arms (slot-machines) of unknown probabilities of success and a player trying to maximize cumulative payoff by choosing the sequence of arms to play. We show that an Infomax strategy (Info-p) which optimally gathers information on the highest probability of success among the arms, saturates known optimal bounds and compares favorably to existing policies. Conversely, gathering information on the identity of the best arm in the bandit leads to a strategy that is vastly suboptimal in terms of payoff. The nature of the quantity selected for Infomax acquisition is then crucial for effective tradeoffs between exploration and exploitation.

  14. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach. PMID:15825483

  15. A case study of exploiting enterprise resource planning requirements

    Science.gov (United States)

    Niu, Nan; Jin, Mingzhou; Cheng, Jing-Ru C.

    2011-05-01

    The requirements engineering (RE) processes have become a key to conceptualising corporate-wide integrated solutions based on packaged enterprise resource planning (ERP) software. The RE literature has mainly focused on procuring the most suitable ERP package. Little is known about how an organisation exploits the chosen ERP RE model to frame the business application development. This article reports an exploratory case study of a key tenet of ERP RE adoption, namely that aligning business applications to the packaged RE model leads to integral practices and economic development. The case study analysed a series interrelated pilot projects developed for a business division of a large IT manufacturing and service company, using Oracle's appl1ication implementation method (AIM). The study indicated that AIM RE improved team collaboration and project management experience, but needed to make hidden assumptions explicit to support data visibility and integrity. Our study can direct researchers towards rigorous empirical evaluations of ERP RE adoption, collect experiences and lessons learned for practitioners, and help generate more effective and mature processes when exploiting ERP RE methods.

  16. Characterization of CRISPR RNA transcription by exploiting stranded metatranscriptomic data.

    Science.gov (United States)

    Ye, Yuzhen; Zhang, Quan

    2016-07-01

    CRISPR-Cas systems are bacterial adaptive immune systems, each typically composed of a locus of cas genes and a CRISPR array of spacers flanked by repeats. Processed transcripts of CRISPR arrays (crRNAs) play important roles in the interference process mediated by these systems, guiding targeted immunity. Here we developed computational approaches that allow us to characterize the expression of many CRISPRs in their natural environments, using community RNA-seq (metatranscriptomic) data. By exploiting public human gut metatranscriptomic data sets, we studied the expression of 56 repeat-sequence types of CRISPRs, revealing that most CRISPRs are transcribed in one direction (producing crRNAs). In rarer cases, including a type II system associated with Bacteroides fragilis, CRISPRs are transcribed in both directions. Type III CRISPR-Cas systems were found in the microbiomes, but metatranscriptomic reads were barely found for their CRISPRs. We observed individual-level variation of the crRNA transcription, and an even greater transcription of a CRISPR from the antisense strand than the crRNA strand in one sample. The orientations of CRISPR expression implicated by metatranscriptomic data are largely in agreement with prior predictions for CRISPRs, with exceptions. Our study shows the promise of exploiting community RNA-seq data for investigating the transcription of CRISPR-Cas systems. PMID:27190232

  17. Infomax Strategies for an Optimal Balance Between Exploration and Exploitation

    Science.gov (United States)

    Reddy, Gautam; Celani, Antonio; Vergassola, Massimo

    2016-04-01

    Proper balance between exploitation and exploration is what makes good decisions that achieve high reward, like payoff or evolutionary fitness. The Infomax principle postulates that maximization of information directs the function of diverse systems, from living systems to artificial neural networks. While specific applications turn out to be successful, the validity of information as a proxy for reward remains unclear. Here, we consider the multi-armed bandit decision problem, which features arms (slot-machines) of unknown probabilities of success and a player trying to maximize cumulative payoff by choosing the sequence of arms to play. We show that an Infomax strategy (Info-p) which optimally gathers information on the highest probability of success among the arms, saturates known optimal bounds and compares favorably to existing policies. Conversely, gathering information on the identity of the best arm in the bandit leads to a strategy that is vastly suboptimal in terms of payoff. The nature of the quantity selected for Infomax acquisition is then crucial for effective tradeoffs between exploration and exploitation.

  18. Human trafficking for labour exploitation: Interpreting the crime

    Directory of Open Access Journals (Sweden)

    Jill E.B. Coster van Voorhout

    2007-12-01

    Full Text Available The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation also falls short discouraging the aim of this legislation, namely harmonisation. Hence, another solution is required. This article does so by firstly challenging assumptions about human trafficking for labour exploitation that are generally pertinent, but nonetheless untrue. This accurate appraisal of the crime’s nature is followed by a synopsis of national legislation and adjudication in three Member States, so as to also focus on these actualities regarding the crime that are commonly not conceived. This article examines two countries that have implemented the Framework Decision, namely Belgium and the Netherlands, and one that has not yet done so, the United Kingdom. Thereafter remaining unexplained elements of the Framework Decision’s definition are interpreted with use of international, pan-European and European legislation and adjudication. Based upon all this, a suggested interpretation of the Framework Decision’s definition is provided so as to overcome all identified difficulties with it.

  19. Exploiting first-class arrays in Fortran for accelerator programming

    International Nuclear Information System (INIS)

    Emerging architectures for high performance computing often are well suited to a data parallel programming model. This paper presents a simple programming methodology based on existing languages and compiler tools that allows programmers to take advantage of these systems. We will work with the array features of Fortran 90 to show how this infrequently exploited, standardized language feature is easily transformed to lower level accelerator code. Our transformations are based on a mapping from Fortran 90 to C++ code with OpenCL extensions. The sheer complexity of programming for clusters of many or multi-core processors with tens of millions threads of execution make the simplicity of the data parallel model attractive. Furthermore, the increasing complexity of todays applications (especially when convolved with the increasing complexity of the hardware) and the need for portability across hardware architectures make a higher-level and simpler programming model like data parallel attractive. The goal of this work has been to exploit source-to-source transformations that allow programmers to develop and maintain programs at a high-level of abstraction, without coding to a specific hardware architecture. Furthermore these transformations allow multiple hardware architectures to be targeted without changing the high-level source. It also removes the necessity for application programmers to understand details of the accelerator architecture or to know OpenCL.

  20. Exploiting SCADA vulnerabilities using a Human Interface Device

    Directory of Open Access Journals (Sweden)

    Grigoris Tzokatziou

    2015-07-01

    Full Text Available SCADA (Supervisory Control and Data Acquisition systems are used to control and monitor critical national infras-tructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic Controllers are one of the most critical components of a control system. Cyber-attacks usually target valuable infrastructures assets, taking advantage of architectural/technical vulnerabilities or even weaknesses in the defense systems. Even though novel intrusion detection systems are being implemented and used for defending cyber-attacks, certain vulnerabilities of SCADA systems can still be exploited. In this article we present an attack scenario based on a Human Interface Device (HID device which is used as a means of communication/exploitation tool to compromise SCADA systems. The attack, which is a normal series of commands that are sent from the HID to the PLC cannot be detected through current intrusion detection mechanisms. Finaly we provide possible counter measures and defense mechanisms against this kind of cyber attacks.

  1. Film-induced, steps for a Real Exploitation in Europe

    Directory of Open Access Journals (Sweden)

    Francesco di Cesare

    2015-03-01

    Full Text Available One of the possible ways to enhance Europe visibility, its entirety rather than a set of destinations, is implementing cooperation between the Member States especially in creating and developing trans-border thematic tourist products and experiences. One of them could be the film-induced tourism. In looking back over the past two cycles of European programming it is possible to find some examples, described in the article, in which the theme of audiovisual productions in their shooting phase in European locations has been the subject of EU attention.This article refers to some previous research results reminding how movie-induced tourism seems to be used just through sporadic attempts and therefore not developed and exploited in a strategic way. Whether from demand-side is clear what potential is inherent in the relationship between movie and tourism, on the supply side there is still much to do.As the current EC funding period (2014-2020 is favouring, at least in the first calls for proposal that came out, SMEs projects and being aware of the apparent lack of such activities developed by private businesses, the article explores new opportunities to be gathered suggesting a new exploitation path.

  2. Coordinating Exploration and Exploitation To Construct Genetic Algorithms

    Institute of Scientific and Technical Information of China (English)

    江瑞; 罗予频; 胡东成; 司徒国业

    2002-01-01

    A new genetic algorithm is proposed based on the careful coordination of the exploration in the solution space of the given problem and the exploitation of the information from the previous search. In the new algorithm architecture, the population in each generation consists of three sub-populations: a preserved part, a reproduced part, and a randomized part. Two parameters are incorporated into the algorithm to efficiently control the percentage of each sub-population to achieve good balance between the exploration and exploitation processes during the optimization. By modeling the algorithm as a homogeneous finite Markov chain, the new genetic algorithm is shown to converge towards the global optimum of the problem at hand. Experiments were designed to test the algorithm using the Rastrigin function, the Griewangk function, and the Schaffer function. Data analyses using the average success ratio, the average objective calculating number, the average first passage time to solution, and the standard deviation of the first passage time were compared with those of the canonical genetic algorithm, the elitist genetic algorithm, and the steady genetic algorithm. The results show strong evidence that our algorithm is superior in performance in terms of economy, robustness and efficiency.

  3. Activity-based exploitation of Full Motion Video (FMV)

    Science.gov (United States)

    Kant, Shashi

    2012-06-01

    Video has been a game-changer in how US forces are able to find, track and defeat its adversaries. With millions of minutes of video being generated from an increasing number of sensor platforms, the DOD has stated that the rapid increase in video is overwhelming their analysts. The manpower required to view and garner useable information from the flood of video is unaffordable, especially in light of current fiscal restraints. "Search" within full-motion video has traditionally relied on human tagging of content, and video metadata, to provision filtering and locate segments of interest, in the context of analyst query. Our approach utilizes a novel machine-vision based approach to index FMV, using object recognition & tracking, events and activities detection. This approach enables FMV exploitation in real-time, as well as a forensic look-back within archives. This approach can help get the most information out of video sensor collection, help focus the attention of overburdened analysts form connections in activity over time and conserve national fiscal resources in exploiting FMV.

  4. Exploitation of induced 2n-gametes for plant breeding.

    Science.gov (United States)

    Younis, Adnan; Hwang, Yoon-Jung; Lim, Ki-Byung

    2014-02-01

    Unreduced gamete formation derived via abnormal meiotic cell division is an important approach to polyploidy breeding. This process is considered the main driving force in spontaneous polyploids formation in nature, but the potential application of these gametes to plant breeding has not been fully exploited. An effective mechanism for their artificial induction is needed to attain greater genetic variation and enable efficient use of unreduced gametes in breeding programs. Different approaches have been employed for 2n-pollen production including interspecific hybridization, manipulation of environmental factors and treatment with nitrous oxide, trifluralin, colchicine, oryzalin and other chemicals. These chemicals can act as a stimulus to produce viable 2n pollen; however, their exact mode of action, optimum concentration and developmental stages are still not known. Identification of efficient methods of inducing 2n-gamete formation will help increase pollen germination of sterile interspecific hybrids for inter-genomic recombination and introgression breeding to develop new polyploid cultivars and increase heterozygosity among plant populations. Additionally, the application of genomic tools and identification and isolation of genes and mechanisms involved in the induction of 2n-gamete will enable increased exploitation in different plant species, which will open new avenues for plant breeding. PMID:24311154

  5. The control of coal mine gas and coordinated exploitation of coal bed methane in China

    Institute of Scientific and Technical Information of China (English)

    LIU Jian-zhong

    2009-01-01

    Based on the characteristics of the coalfield geology and the distribution of coal bed methane (CBM) in China, the geological conditions for exploiting the CBM and drain-ing the coal mine gas were analyzed, as well as the characteristics of CBM production. By comparing the current situation of CBM exploitation in China with that in the United States, the current technology and characteristics of the CBM exploitation in China were summa-rized and the major technical problems of coal mine gas control and CBM exploitation analyzed. It was emphasized that the CBM exploitation in China should adopt the coal mine gas drainage method coordinated with coal mine exploitation as the main model. It was proposed that coal mine gas control should be coordinated with coal mine gas ex-ploitation. The technical countermeasure should be integrating the exploitation of coal and CBM and draining gas before coal mining.

  6. Potential impact on climate of the exploitation of methane hydrate deposits offshore

    Digital Repository Service at National Institute of Oceanography (India)

    Glasby, G.P.

    of exploiting these deposits offshore on global climate may therefore be limited provided serious efforts are made to minimize environmental impacts. At present, prospects for the commercial exploitation of methane hydrates are in their infancy. Considerable...

  7. The Exploitation of shale gas – A Grave peril for human health and life

    OpenAIRE

    Dumitru Mazilu

    2014-01-01

    In recent years the American example is evoked insistently for the exploitation of shale gas. The main argument for this exploitation is the positive impact of this exploitation for the energy crisis. A movie produced by Americans who are concerned about the serious human consequences of shale gas exploitation, and which was broadcasted by many televisions including Romanian ones – shows terrifying images: „the tap water that was drinkable before drilling for shale gas started to burst into f...

  8. To exploit or not to exploit: The structure and development of arguments over the use of wetlands

    Directory of Open Access Journals (Sweden)

    Tiina Korvela

    2013-07-01

    Full Text Available This paper considers the discourse surrounding the exploitation of wetlands (also called marshlands, bogs, mires and peatlands in Finland. The focus of the paper is on the development of the arguments used in the discourse – thus the paper also gives an insight into how the legal regimes concerning wetlands have developed. The arguments are analysed using the dualistic and deconstructive model developed in Critical Legal Studies by Martti Koskenniemi. The hypothesis is that, to some extent, the model developed for international law can be adapted to fit national laws, but that significant problems may still arise. Throughout the history of discourse on wetlands, legal arguments have essentially dealt with the conflict between the conservation of wetlands or their exploitation for peat, which is a source of energy. Three arguments are discussed in this paper: 1 The ‘sovereignty argument’; 2 The ‘no harm argument’; and 3 The ‘climate change argument’. The sovereignty argument has been dominant from the beginning of the industrialised production of peat, but the no harm argument has been steadily gaining weight. Interestingly, the climate change argument lacks traction in the discourse even though the importance of wetlands in adaptation to climate change is common knowledge. This paper argues that regional and national authorities use legislation and the no harm argument in innovative ways. These innovations may be useful for the aims underlying the climate change argument.

  9. Child Sexual Abuse and Exploitation: Guest Editor’s Introduction

    Directory of Open Access Journals (Sweden)

    Michael Salter

    2015-07-01

    Full Text Available One of the most unnerving aspects of child sexual abuse is that it is constantly manifesting in unexpected ways. The current Royal Commission into Institutional Responses to Child Sexual Abuse has collected testimony of abuse in churches, schools, out-of-home care, hospitals and religious communities, demonstrating the breadth of institutional arrangements whose structures and cultures have facilitated child sexual abuse. Cases of serious and prolonged sexual abuse in family contexts have been excluded from the terms of reference of the Royal Commission but nonetheless continue to surface in media reports. In 2013, twelve children were permanently removed from an extended family living in rural NSW in what has been described as one of the worst cases of child abuse in Australia, involving intergenerational incest going back at least three generations (Auebach 2014. Another recent high-profile case involved the use of the Internet to facilitate the sexual exploitation of an adopted child by his parents in Queensland (Ralston 2013. These cases challenge the received wisdom that child sexual abuse is characterised by the victimisation of one child by one opportunistic offender. Such incidents suggest instead that child sexual abuse takes varied and systemic forms, and can operate to perpetuate and entrench toxic cultures and power structures.   This special issue on Child Sexual Abuse and Exploitation is a timely contribution to ongoing efforts to understand the multiplicity of child sexual abuse. It is an interdisciplinary collection of insights drawn from criminology, sociology, psychiatry, psychology and psychoanalysis, and includes papers from academic researchers alongside academic practitioners whose writing is grounded in their work with affected individuals and communities. A key aim of the special issue is to contextualise the diversity of child sexual abuse socially, politically and historically, recognising the dynamic and iterative

  10. The Illusions and Juxtapositions of Commercial Sexual Exploitation among Youth: Identifying Effective Street-Outreach Strategies

    Science.gov (United States)

    Holger-Ambrose, Beth; Langmade, Cheree; Edinburgh, Laurel D.; Saewyc, Elizabeth

    2013-01-01

    To explore sexually exploited youths' perspectives of how street outreach workers can effectively provide outreach and connections to services, we conducted qualitative interviews with 13 female participants, ages 14 to 22, in a Midwest U.S. city. Participants reported multiple types of exploitation, most first exploited by age 13, plus…

  11. 75 FR 40838 - Establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation

    Science.gov (United States)

    2010-07-14

    ... HUMAN SERVICES Establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation AGENCY... Board on Elder Abuse, Neglect, and Exploitation is authorized under section 2021, Subtitle H--Elder... establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation, as directed by section...

  12. Prevalence of selected rickettsial infections in cats in Southern Germany.

    Science.gov (United States)

    Bergmann, Michèle; Englert, Theresa; Stuetzer, Bianca; Hawley, Jennifer R; Lappin, Michael R; Hartmann, Katrin

    2015-10-01

    Prevalence of Anaplasma, Ehrlichia, Neorickettsia, and Wolbachia DNA in blood of 479 cats collected in different veterinary clinics in Southern Germany was determined using a previously published conventional PCR using 16S-23S intergenic spacer primers (5' CTG GGG ACT ACG GTC GCA AGA C 3' - forward; 5' CTC CAG TTT ATC ACT GGA AGT T 3' - reverse). Purified amplicons were sequenced to confirm genus and species. Associations between rickettsial infections, and feline immunodeficiency virus (FIV), as well as feline leukemia virus (FeLV) status were evaluated. Rickettsial prevalence was 0.4% (2/479; CI: 0.01-1.62%). In the two infected cats, Anaplasma phagocytophilum DNA was amplified. These cats came from different environment and had outdoor access. Both were ill with many of their problems likely related to other diseases. However, one cat had neutrophilia with left shift and the other thrombocytopenia potentially caused by their A. phagocytophilum infection. There was no significant difference in the FIV and FeLV status between A. phagocytophilum-negative and -positive cats. A. phagocytophilum can cause infection in cats in Southern Germany, and appropriate tick control is recommended. PMID:26387062

  13. Shale gas, Poland pioneer of exploitation in Europe

    International Nuclear Information System (INIS)

    This article presents an installation built by a Polish company to perform drillings in the search for shale gas pockets from which gas would be extracted by hydraulic fracturing. Some technical characteristics of the installation and process are evoked. The article outlines the confidence the population now has gained in this installation. However and despite the fact that the region possesses important underground water reserves, water consumption is reported to be too high with respect to farmer needs. Besides, some farmers have had a compulsory purchase order made on their land and could afford to buy new lands. However, in some other places, the population did not accept the arrival of the multinational company Chevron. In parallel, a brief overview of shale gas exploitation projects or status in other European countries is given

  14. On the exploitability of thermo-charged capacitors

    CERN Document Server

    D'Abramo, Germano

    2009-01-01

    Recently (arXiv:0904.3188) the concept of vacuum capacitors spontaneously charged thanks to the heat absorbed from single thermal source at room temperature has been introduced, along with a detailed mathematical description of the functioning and a discussion on its main paradoxical feature that seems to violate the Second Law of Thermodynamics. In the present paper we investigate the theoretical and practical possibility of exploiting such thermo-charged capacitors as voltage/current generators: we show that if very weak provisos on the physical characteristics of the capacitors are fulfilled, then a measurable current should flow across the device, allowing the generation of potentially usable voltage, current and electric power out of a single thermal source at room temperature.

  15. How Polyomaviruses Exploit the ERAD Machinery to Cause Infection.

    Science.gov (United States)

    Dupzyk, Allison; Tsai, Billy

    2016-01-01

    To infect cells, polyomavirus (PyV) traffics from the cell surface to the endoplasmic reticulum (ER) where it hijacks elements of the ER-associated degradation (ERAD) machinery to penetrate the ER membrane and reach the cytosol. From the cytosol, the virus transports to the nucleus, enabling transcription and replication of the viral genome that leads to lytic infection or cellular transformation. How PyV exploits the ERAD machinery to cross the ER membrane and access the cytosol, a decisive infection step, remains enigmatic. However, recent studies have slowly unraveled many aspects of this process. These emerging insights should advance our efforts to develop more effective therapies against PyV-induced human diseases. PMID:27589785

  16. Exploiting the Errors: A Simple Approach for Improved Volatility Forecasting

    DEFF Research Database (Denmark)

    Bollerslev, Tim; Patton, Andrew J.; Quaedvlieg, Rogier

    We propose a new family of easy-to-implement realized volatility based forecasting models. The models exploit the asymptotic theory for high-frequency realized volatility estimation to improve the accuracy of the forecasts. By allowing the parameters of the models to vary explicitly with the...... (estimated) degree of measurement error, the models exhibit stronger persistence, and in turn generate more responsive forecasts, when the measurement error is relatively low. Implementing the new class of models for the S&P500 equity index and the individual constituents of the Dow Jones Industrial Average......, we document significant improvements in the accuracy of the resulting forecasts compared to the forecasts from some of the most popular existing models that implicitly ignore the temporal variation in the magnitude of the realized volatility measurement errors....

  17. Exploration and Exploitation of Victorian Science in Darwin's Reading Notebooks

    CERN Document Server

    Murdock, Jaimie; DeDeo, Simon

    2015-01-01

    Search in an environment with an uncertain distribution of resources involves a trade-off between local exploitation and distant exploration. This extends to the problem of information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. Darwin built his theory of natural selection in part by synthesizing disparate parts of Victorian science. When we analyze his extensively self-documented reading we find shifts, on multiple timescales, between choosing to remain with familiar topics and seeking cognitive surprise in novel fields. On the longest timescales, these shifts correlate with major intellectual epochs of his career, as detected by Bayesian epoch estimation. When we compare Darwin's reading path with publication order of the same texts, we find Darwin more adventurous than the culture as a whole.

  18. Impact of Exploitation System on Commercial Hogs’ Behaviour

    Directory of Open Access Journals (Sweden)

    Ioan Petroman

    2010-10-01

    Full Text Available Rest is the etho-physiological activity with the most prolonged duration within the 24 hours: thus, males rest for about 61-62% of their time while females rest for about 66-68% of their time. Feed consumption in ad libitum feeding conditions lasts differently: thus, castrated males feed for about 16' 23" ± 0.44" while females feed for about 18'46" ± 0.62". Conflicts within the groups take place in 2.30 ± 0.34 sessions for attacks and in 0.45-0.83 session for defence fights. Attack sessions, foraging sessions, defecation sessions, and urinating sessions to differ between castrated males and females exploited in farming systems since neither feeding, nor living conditions are always acceptable and regular.

  19. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Directory of Open Access Journals (Sweden)

    André Plagens

    2013-07-01

    Full Text Available The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR/CRISPR-associated (Cas that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries.

  20. Exploiting digital systems technology to improve nuclear safety

    International Nuclear Information System (INIS)

    Nuclear plant designers in the 1990's have exceptional opportunities to exploit rapidly evolving computer and information system technology to make significant improvements in public safety. CANDU reactors have utilized extensive computer automation for reactor control for 20 years. A direct consequence is that the frequencies for forced outages and spurious protection system trips have been among the lowest for all reactor types. Historically, CANDU was among the first commercial power reactor to utilize computers to implement protection system. System functions with the PDC's (Programmable Digital Comparators) used in the CANDU 600 reactors. PDC's were used to implement the trip decision logic for the process trip parameters. The paper provides detail on safety benefits that have been realized from the use of digital automation for control and protection. The paper describes how accident risk reduction can be achieved in other ways with digital systems

  1. The strategic and economic value of exploiting heavy crude

    International Nuclear Information System (INIS)

    Non-conventional oil, and particularly heavy crude varieties, will play an increasingly important role in meeting growing global energy requirements by 2030 and beyond. These heavy oils currently account for high volumes in certain areas but their proportion of global oil production remains modest for the moment, This should significantly change with the completion of several projects currently underway in Canada and Venezuela. Indeed, the technological innovations occurring over recent years have allowed for a considerable reduction in exploitation costs for these crude varieties and improved economic profitability conditions for the projects. The geographical location of resources (which are independent of the Middle East) and the fact that they are not subject to OPEC quotas also make these crude varieties particularly attractive. (authors)

  2. Exploiting tumor shrinkage through temporal optimization of radiotherapy

    CERN Document Server

    Unkelbach, Jan; Hong, Theodore; Papp, David; Ramakrishnan, Jagdish; Salari, Ehsan; Wolfgang, John; Bortfeld, Thomas

    2013-01-01

    In multi-stage radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated mostly by radiobiological considerations, but also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. The paper considers the optimal design of multi-stage treatments, motivated by the clinical management of large liver tumors for which normal liver dose constraints prohibit the administration of an ablative radiation dose in a single treatment. We introduce a dynamic tumor model that incorporates three factors: radiation induced cell kill, tumor shrinkage, and tumor cell repopulation. The design of multi-stage radiotherapy is formulated as a mathematical optimization problem in which the total dose to the liver is minimized, subject to delivering the prescribed dose to the tumor. Based on the model, we gain insight into the optimal administration of radiation over time, i.e. the optimal treatment gaps and dose levels. We analyze treatments consisting ...

  3. Safe industrial electron accelerators operation in extended period of exploitation

    International Nuclear Information System (INIS)

    construction. Safe industrial electron accelerators operation in extended period of exploitation became a question due to over 30 years long period in service of some units and second hand accelerators sometime offered on the market. The careful evaluation should be performed to establish critical parameters like: - Accelerator reliability (availability); - Access to the spare parts and cost of accelerator servicing; - Safety interlocks condition and reliability; - Quality of cables, wires and rubber tubes which are irradiated by scattered radiation (in some cases replacement is needed in 10-15 years intervals). One should recognize if second hand accelerator was renovated and it is adequate in spite of: - Lack of computer based accelerator control and technological process management; - Limited quality control capabilities in relation to present industrial standards; - Certain accelerator parameters (electron energy, beam power, electrical efficiency, exploitation cost). Positive answer on above topics may allow on successful accelerator exploitation in extended period of time. Such evaluation should be repeated in 2-5 years period to avoid rapid change in accelerator availability. More conservative direct (transformer) accelerator construction is better suited for longer exploitation period to compare with microwave linacs where microwave components with limited life period are applied. Progress in development of microwave components creates difficulties in access to old fashion spare parts. The accelerator upgrading program can be applied in some cases to increase electron energy, beam power or both, replace certain components when ageing process is particularly intense or replace components which are no more accessible as spare parts. The detail investigation should be made to recognize manpower in development and implementation such upgrading program, time needed and available financial resources. New accelerator purchasing could be better solution in some cases. (author)

  4. Improvong alloys exploitation characteristics under powerful ion beams action

    International Nuclear Information System (INIS)

    Methods of positron annihilation, X-ray diffraction analysis, mass spectroscopy of secondary ions, Auger-electron spectroscopy and metallographic investigations were used to study structures of high-speed R6M5 steel, T14K8 hard alloy and KNT-16, TN-20 tungsten-free alloys, irradiated by heavy-current carbon ion beams. Modified layer of complex structure of 50-100 mm thickness forms on the surface of samples under investigation irradiated by powerful ion beam. All structural changes taking place in the layer result to improvement of alloy exploitation characteristics: 1.5-2 time increase of microhardness and 2.2-3.5 time elevation of resistance to cutting as compared to reference check samples

  5. Commercial Sexual Exploitation of Children and State Child Welfare Systems.

    Science.gov (United States)

    Bounds, Dawn; Julion, Wrenetha A; Delaney, Kathleen R

    2015-01-01

    In several states, commercial sexual exploitation of children (CSEC) is now a reportable child abuse offense. Illinois has taken the lead in tackling the issue and the Illinois experience illuminates valuable lessons. This article delineates the protection, practice, and policy implications that evolve when CSEC falls under a state child welfare system. The specific aims are to (a) discuss CSEC, its victims, risks, harms, and challenges inherent in providing effective care; (b) use Illinois as an exemplar to explicate the consequences and implementation challenges of establishing a state reporting system that frames CSEC as a child welfare issue; (c) recommend strategies for developing effective state reporting models, and (d) demonstrate how nurses are well poised to advocate for victims of human trafficking on both state and national levels. Recommendations for improving the identification of CSEC victims and overcoming challenges to state implementation are offered. PMID:25908664

  6. SMARTS: Exploiting Temporal Locality and Parallelism through Vertical Execution

    International Nuclear Information System (INIS)

    In the solution of large-scale numerical prob- lems, parallel computing is becoming simultaneously more important and more difficult. The complex organization of today's multiprocessors with several memory hierarchies has forced the scientific programmer to make a choice between simple but unscalable code and scalable but extremely com- plex code that does not port to other architectures. This paper describes how the SMARTS runtime system and the POOMA C++ class library for high-performance scientific computing work together to exploit data parallelism in scientific applications while hiding the details of manag- ing parallelism and data locality from the user. We present innovative algorithms, based on the macro -dataflow model, for detecting data parallelism and efficiently executing data- parallel statements on shared-memory multiprocessors. We also desclibe how these algorithms can be implemented on clusters of SMPS

  7. Smart facility application: exploiting space technology for smart city solution

    Science.gov (United States)

    Termizi, A. A. A.; Ahmad, N.; Omar, M. F.; Wahap, N. A.; Zainal, D.; Ismail, N. M.

    2016-06-01

    Facilities and amenities management is amongst the core functionalities of local government. Considering the vast area that local government has to manage, a smart solution is extremely inevitable to solve issues such as inefficient maintenance of public parks, drainage system and so forth. Therefore, this paper aims to offer a smart city solution which exploits the benefit of space technology. This proposed solution is one of the modules developed in Spatial Smart City Service Delivery Engine (SSC SDE) Project undertaken by Agensi Angkasa Negara (ANGKASA). Various levels of local government have been chosen to understand real issues faced by them. Based on this data, a Smart Facility application has been developed with the aim to enhance the service delivery by the local government hence improving citizens’ satisfaction. Since this project is still in progress, this paper will merely discussing the concept of this application.

  8. Groundwater exploration and exploitation of the Caracas aquifer, Venezuela

    International Nuclear Information System (INIS)

    The Caracas valley is bordered by crystalline rocks, and the valley fill (Caracas aquifer) comprises the weathering products of these rocks, such as fluvial gravels and sands, in addition to clay and silts from former lakes. All these sediments intercalate in a very irregular manner. Groundwater recharge below Caracas is pronounced because of significant exfiltrations of drinking water out of the distribution net. This creates an important dilution potential for pollutants and stimulates the development of microbiological activity. These, however, cannot favour groundwater withdrawal from the active recharge zone, because protection measures will be difficult to realize. It is therefore recommended that groundwater exploitation be restricted to the passive recharge zone by wells with filter screens more than 100 m below the surface

  9. Understanding and Exploiting Information Spreading and Integrating Technologies

    Institute of Scientific and Technical Information of China (English)

    Petter Holme; Mikael Huss

    2011-01-01

    Our daily life leaves an increasing amount of digital traces,footprints that are improving our lives.Data-mining tools,like recommender systems,convert these traces to information for aiding decisions in an ever-increasing number of areas in our lives.The feedback loop from what we do,to the information this produces,to decisions what to do next,will likely be an increasingly important factor in human behavior on all levels from individuals to societies.In this essay,we review some effects of this feedback and discuss how to understand and exploit them beyond mapping them on more well-understood phenomena.We take examples from models of spreading phenomena in social media to argue that analogies can be deceptive,instead we need to fresh approaches to the new types of data,something we exemplify with promising applications in medicine.

  10. Apoptosis pathways and their therapeutic exploitation in pancreatic cancer.

    Science.gov (United States)

    Fulda, Simone

    2009-07-01

    Resistance to apoptosis (programmed cell death) is a characteristic feature of human malignancies including pancreatic cancer, which is one of the leading causes of cancer deaths in the western world. Defects in this intrinsic cell death program can contribute to the multistep process of tumorigenesis, because too little cell death can disturb tissue homeostasis. Further, blockade of apoptosis pathways can cause treatment failure, because intact apoptosis signalling cascades largely mediate therapy-induced cytotoxicity. The elucidation of apoptosis pathways in pancreatic carcinoma over the last decade has resulted in the identification of various molecular defects. How apoptosis pathways can be exploited for the treatment of pancreatic cancer will be discussed in this review. PMID:19382915

  11. Host exploitation strategies of the social parasite Maculinea alcon

    DEFF Research Database (Denmark)

    Fürst, Matthias Alois

    . Throughout the first instars M. alcon lives on a specific food plant, however, in the last instar before pupation it develops into an obligate social parasite, posing a considerably cost to its host ant colony. I here focus on the different exploitation strategies of M. alcon throughout its lifecycle and the...... the nest where it will feed on ant regurgitations and ant brood. It is thus crucial for the caterpillar's survival to attract the host ant, get picked up and brought back to the ant's colony. My study shows that 3rd and 4th instar caterpillars are distinct from each other not only morphologically but...... caterpillar constitutes a fitness cost to infected host ant colonies, the host ants are expected to have developed defense mechanisms in response to the presence of the social parasite. I was able to demonstrate that the efficiency of ant colonies to defend themselves against intruders depends on a multitude...

  12. Exploiting the geomagnetic distortion of the inclined atmospheric showers

    CERN Document Server

    Billoir, Pierre; Blanco, Miguel

    2015-01-01

    We propose a novel approach for the determination of the nature of ultra-high energy cosmic rays by exploiting the geomagnetic deviation of muons in nearly horizontal showers. The distribution of the muons at ground level is well described by a simple parametrization providing a few shape parameters tightly correlated to $X^\\mu_\\mathrm{max}$, the depth of maximal muon production, which is a mass indicator tightly correlated to the usual parameter $X_\\mathrm{max}$, the depth of maximal development of the shower. We show that some constraints can be set on the predictions of hadronic models, especially by combining the geomagnetic distortion with standard measurement of the longitudinal profile. We discuss the precision needed to obtain significant results and we propose a schematic layout of a detector.

  13. Autonomous Industrial Mobile Manipulation (AIMM) - Maturation, Exploitation and Implementation

    DEFF Research Database (Denmark)

    Bøgh, Simon

    2012-01-01

    a state-of-the-art review, it is observed that implementations of mobile manipulators in industry have been limited although the needs for flexible automation are present. The second topic is “Identifying skills for AIMM robots” and is dedicated to defining a unifying terminology for task...... for AIMM robots. Firstly an application-based analysis is conducted, to identify skills in the logistic domain, based on real-world experiments at the industrial partner. Secondly an analysis based on standard operating procedures (SOPs) is conducted.......The overall topic of this PhD thesis is Autonomous Industrial Mobile Manipulation (AIMM) - maturation, exploitation and implementation. The thesis addresses two topics. The first topic is “From research to industry” and the challenges this holds. The Autonomous Industrial Mobile Manipulator (AIMM...

  14. Autonomous Industrial Mobile Manipulation (AIMM) - maturation, exploitation and implementation

    DEFF Research Database (Denmark)

    Hvilshøj, Mads

    This thesis introduces the Autonomous Industrial Mobile Manipulator ”Little Helper”, a robotic co-worker which extends the potential of industrial robotics by combining locomotion and manipulation capabilities. The thesis presents promising findings for industrial maturation, exploitation...... and implementation of AIMM. The first part concerns the missing links and gaps for bringing AIMM from research to industry. A general AIMM manufacturing concept has been formulated, AIMM prototypes have been developed and laboratory experiments have been conducted. From this, we have joined forces with Grundfos A....../S, where full-scale industrial AIMM demonstrations in terms of automatic multiple part feeding have been successfully realized. The second part concerns the development of modular and (re)configurable AIMM systems. At present, it is technically and/or economically unfeasible to create a hyper flexible AIMM...

  15. Schistosoma mansoni cercariae exploit an elastohydrodynamic coupling to swim efficiently

    CERN Document Server

    Krishnamurthy, Deepak; Bhargava, Arjun; Prakash, Manu

    2016-01-01

    The motility of many parasites is critical for the infection process of their host, as exemplified by the transmission cycle of the blood fluke Schistosoma mansoni. In their human infectious stage, immature, submillimetre-scale forms of the parasite known as cercariae swim in freshwater and infect humans by penetrating through the skin. This infection causes Schistosomiasis, a parasitic disease that is comparable to malaria in its global socio-economic impact. Given that cercariae do not feed and hence have a finite lifetime of around 12 hours, efficient motility is crucial for the parasite's survival and transmission of Schistosomiasis. However, a first-principles understanding of how cercariae swim is lacking. Via a combined experimental, theoretical and robotics based approach, we demonstrate that cercariae propel themselves against gravity by exploiting a unique elastohydrodynamic coupling. We show that cercariae beat their tail in a periodic fashion while maintaining a fixed flexibility near their poster...

  16. Exploiting the colloidal nanocrystal library to construct electronic devices

    Science.gov (United States)

    Choi, Ji-Hyuk; Wang, Han; Oh, Soong Ju; Paik, Taejong; Sung, Pil; Sung, Jinwoo; Ye, Xingchen; Zhao, Tianshuo; Diroll, Benjamin T.; Murray, Christopher B.; Kagan, Cherie R.

    2016-04-01

    Synthetic methods produce libraries of colloidal nanocrystals with tunable physical properties by tailoring the nanocrystal size, shape, and composition. Here, we exploit colloidal nanocrystal diversity and design the materials, interfaces, and processes to construct all-nanocrystal electronic devices using solution-based processes. Metallic silver and semiconducting cadmium selenide nanocrystals are deposited to form high-conductivity and high-mobility thin-film electrodes and channel layers of field-effect transistors. Insulating aluminum oxide nanocrystals are assembled layer by layer with polyelectrolytes to form high–dielectric constant gate insulator layers for low-voltage device operation. Metallic indium nanocrystals are codispersed with silver nanocrystals to integrate an indium supply in the deposited electrodes that serves to passivate and dope the cadmium selenide nanocrystal channel layer. We fabricate all-nanocrystal field-effect transistors on flexible plastics with electron mobilities of 21.7 square centimeters per volt-second.

  17. International petroleum exploration and exploitation agreements: a comprehensive environmental appraisal

    International Nuclear Information System (INIS)

    The evolution of the environmental aspects of international petroleum exploration and exploitation is outlined. Four case studies of modern petroleum contracts from four developing countries are presented. These are Thailand's modern concession contract, Indonesia's production sharing contract, Brazil's risk service contract and China's hybrid contract. The failure of these four countries to provide adequate environmental regulation through their petroleum contracts is typical of many countries in the developing world. An urgent need exists to recognise that important environmental and resource consequences are associated with the developments authorised by petroleum contracts and that appropriate legal changes must be made to take them into account. Environmental sustainability should be an explicit part of all investment arrangements. (UK)

  18. Mangrove exploitation effects on biodiversity and ecosystem services

    DEFF Research Database (Denmark)

    Malik, Abdul; Fensholt, Rasmus; Mertz, Ole

    2015-01-01

    Mangrove forests are one of the most important coastal ecosystems as they support many local communities. However, over the last two decades harvesting of mangrove forests has been extensive with effects on mangrove biodiversity and ecosystem services. We investigate the effect of mangrove...... harvesting on tree biodiversity in South Sulawesi, Indonesia. Using two line transects each in ten mangrove forests, mangrove composition, species dominance, density, frequency, coverage, and stem diameter and diversity were recorded. Interviews detailing provisioning ecosystem services were also conducted...... with local forestry and fishery workers to determine the level of exploitation. Ten mangrove species were recorded (Avicennia alba, Bruguiera gymnorrhiza, Ceriops tagal, Excoecaria agallocha, Lumnitzera racemosa, Nypa fruticans, Rhizophora apiculata, Rhizophora mucronata, Rhizophora stylosa, and...

  19. Exploiting material softening in hard PZTs for resonant bandwidth enhancement

    Science.gov (United States)

    Leadenham, S.; Moura, A.; Erturk, A.

    2016-04-01

    Intentionally designed nonlinearities have been employed by several research groups to enhance the frequency bandwidth of vibration energy harvesters. Another type of nonlinear resonance behavior emerges from the piezoelectric constitutive behavior for high excitation levels and is manifested in the form of softening stiffness. This material nonlinearity does not result in the jump phenomenon in soft piezoelectric ceramics, e.g. PZT-5A and PZT-5H, due to their large internal dissipation. This paper explores the potential for wideband energy harvesting using a hard (relatively high quality factor) PZT-8 bimorph by exploiting its material softening. A wide range of base excitation experiments conducted for a set of resistive electrical loads confirms the frequency bandwidth enhancement.

  20. Microbial biosurfactants: challenges and opportunities for future exploitation.

    Science.gov (United States)

    Marchant, Roger; Banat, Ibrahim M

    2012-11-01

    The drive for industrial sustainability has pushed biosurfactants to the top of the agenda of many companies. Biosurfactants offer the possibility of replacing chemical surfactants, produced from nonrenewable resources, with alternatives produced from cheap renewable feedstocks. Biosurfactants are also attractive because they are less damaging to the environment yet are robust enough for industrial use. The most promising biosurfactants at the present time are the glycolipids, sophorolipids produced by Candida yeasts, mannosylerythritol lipids (MELs) produced by Pseudozyma yeasts, and rhamnolipids produced by Pseudomonas. Despite the current enthusiasm for these compounds several residual problems remain. This review highlights remaining problems and indicates the prospects for imminent commercial exploitation of a new generation of microbial biosurfactants. PMID:22901730

  1. ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES

    Directory of Open Access Journals (Sweden)

    Himanshu Shewale

    2014-03-01

    Full Text Available Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

  2. Exploiting sequential phonetic constraints in recognizing spoken words

    Science.gov (United States)

    Huttenlocher, D. P.

    1985-10-01

    Machine recognition of spoken language requires developing more robust recognition algorithms. A recent study by Shipman and Zue suggest using partial descriptions of speech sounds to eliminate all but a handful of word candidates from a large lexicon. The current paper extends their work by investigating the power of partial phonetic descriptions for developing recognition algorithms. First, we demonstrate that sequences of manner of articulation classes are more reliable and provide more constraint than certain other classes. Alone these results are of limited utility, due to the high degree of variability in natural speech. This variability is not uniform however, as most modifications and deletions occur in unstressed syllables. Comparing the relative constraint provided by sounds in stressed versus unstressed syllables, we discover that the stressed syllables provide substantially more constraint. This indicates that recognition algorithms can be made more robust by exploiting the manner of articulation information in stressed syllables.

  3. Information Acquisition and Exploitation in Multichannel Wireless Networks

    CERN Document Server

    Guha, Sudipto; Sarkar, Saswati

    2008-01-01

    A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by transmitting a control packet in it. Since probing all channels consumes significant energy and time, a user needs to determine what and how much information it needs to acquire about the instantaneous states of the available channels so that it can maximize its transmission rate. This motivates the study of the trade-off between the cost of information acquisition and its value towards improving the transmission rate. A simple model is presented for studying this information acquisition and exploitation trade-off when the channels are multi-state, with different distributions and information acquisition costs. The objective is to maximize a utility function which depends on both the cost and value of information. Solution techniques are presented for computing near-optimal policies with succinct representation in polynomial time. Th...

  4. Exploitation of particle filter for forecast error covariance structure estimation

    Czech Academy of Sciences Publication Activity Database

    Hofman, Radek

    Izola : Jozef Stefan Institute, 2008 - (Gašperin, M.; Pregelj, B.), s. 1-6 ISBN 978-961-264-003-3. [9th International PhD Workshop on Systems and Control: A Young Generation Viewpoint. Izola (SI), 01.10.2008-03.10.2008] R&D Projects: GA ČR(CZ) GA102/07/1596 Institutional research plan: CEZ:AV0Z10750506 Keywords : data assimilation * estimation * marginalized * particle filter * model error covariane structure Subject RIV: BC - Control Systems Theory http://library.utia.cas.cz/separaty/2008/AS/hofman-exploitation%20of%20particle%20filter%20for%20forecast%20error%20covariance%20structure%20estimation.pdf

  5. Exploiting PV technology for basic need provision in Nigeria

    International Nuclear Information System (INIS)

    Transitional economies are confronted with ever declining standard of living and low per capita income. Development institutions around the world have come to realize the strategic importance of Sustainable Energy as a Basic Need in the development process. Despite the efforts made by emerging democracies to eradicate poverty, there are still millions of people without access to electricity. Unreliable energy supply currently presents a constant obstacle to many poverty alleviation programmes. Against this background, some states government in Nigeria are exploiting the unique advantage offered by PV technology in the provision of Basic Needs. This study appraises some of the scheme in which the authors have been heavily involved with. This paper identifies some of the strategic policies that might accelerate the successful implementation of PV technology as a poverty alleviation tool in terms of electricity provision in transitional economies. (authors)

  6. Exploiting periodicity to extract the atrial activity in atrial arrhythmias

    Science.gov (United States)

    Llinares, Raul; Igual, Jorge

    2011-12-01

    Atrial fibrillation disorders are one of the main arrhythmias of the elderly. The atrial and ventricular activities are decoupled during an atrial fibrillation episode, and very rapid and irregular waves replace the usual atrial P-wave in a normal sinus rhythm electrocardiogram (ECG). The estimation of these wavelets is a must for clinical analysis. We propose a new approach to this problem focused on the quasiperiodicity of these wavelets. Atrial activity is characterized by a main atrial rhythm in the interval 3-12 Hz. It enables us to establish the problem as the separation of the original sources from the instantaneous linear combination of them recorded in the ECG or the extraction of only the atrial component exploiting the quasiperiodic feature of the atrial signal. This methodology implies the previous estimation of such main atrial period. We present two algorithms that separate and extract the atrial rhythm starting from a prior estimation of the main atrial frequency. The first one is an algebraic method based on the maximization of a cost function that measures the periodicity. The other one is an adaptive algorithm that exploits the decorrelation of the atrial and other signals diagonalizing the correlation matrices at multiple lags of the period of atrial activity. The algorithms are applied successfully to synthetic and real data. In simulated ECGs, the average correlation index obtained was 0.811 and 0.847, respectively. In real ECGs, the accuracy of the results was validated using spectral and temporal parameters. The average peak frequency and spectral concentration obtained were 5.550 and 5.554 Hz and 56.3 and 54.4%, respectively, and the kurtosis was 0.266 and 0.695. For validation purposes, we compared the proposed algorithms with established methods, obtaining better results for simulated and real registers.

  7. Exploitation of the waste-heat from hydro power plants

    International Nuclear Information System (INIS)

    This paper presents the possibility of exploiting low-temperature heat from the generators' cooling system within a hydro power plant, using a HTHP (high temperature heat-pump) that enables heating at up to 85 °C. The results based on theoretical calculations are presented for heat-flows, the powers of the compressors, and COP (coefficient of performance) values for the cases when using the refrigerant R717 and a single stage high pressure compressor (up to 50 bar) under varying operational conditions. Real possibilities are presented for heat production based on measurements of a closed cooling system of generators, thus showing that the total efficiencies of generators can be enhanced by up to 1% whilst reducing the electricity consumption during the electric heating of buildings. In addition, the simulations of cost and revenue, and cumulatively discounted cash-flows of the investment in HTHP are presented using the MS Excel computer program. The payback period for the investment in a 500 kW high-temperature heat-pump for exploiting low-temperature heat of the generators' cooling system would be approximately 2 years for the case of heating the commercial buildings of the hydro power plant, and 7 years for the case when heating the fluid within the nearby district heating systems of urban settlements. - Highlights: • Article describes the use of generators' heat within a hydroelectric power plant. • Total energy efficiency of hydroelectric generators can thus be increased by up to 1%. • High-temperature heat-pump allows a temperature rise of up to 85 °C with COP (coefficient of performance) > 5. • Heat recovery of a generator cooling system is very economical

  8. Model-supported exploitation of synthetic aperture radar images

    Science.gov (United States)

    Chellappa, Rama; Kuttikkad, Shyam; Meth, Reuven; Burlina, Philippe; Shekhar, Chandra S.

    1996-02-01

    We address the application of model-supported exploitation techniques to synthetic aperture radar (SAR) imagery. The emphasis is on monitoring SAR imagery using wide area 2D and/or 3D site models along with contextual information. We consider here the following tasks useful in monitoring: (a) site model construction using segmentation and labeling techniques, (b) target detection, (c) target classification and indexing, and (d) SAR image-site model registration. The 2-D wide area site models used here for SAR image exploitation differ from typical site models developed for RADIUS applications, in that they do not model specific facilities, but constitute wide area site models of cultural features such as urban clutter areas, roads, clearings, fields, etc. These models may be derived directly from existing site models, possibly constructed from electro-optical (EO) observations. When such models are not available, a set of segmentation and labeling techniques described here can be used for the construction of 2D site models. The use of models can potentially yield critical information which can disambiguate target signatures in SAR images. We address registration of SAR and EO images to a common site model. Specific derivations are given for the case of registration within the RCDE platform. We suggest a constant false alarm rate (CFAR) detection scheme and a topographic primal sketch (TPS) based classification scheme for monitoring target occurrences in SAR images. The TPS of an observed target is matched against candidate targets TPSs synthesized for the preferred target orientation, inferred from context (e.g. road or parking lot targets). Experimental results on real and synthetic SAR images are provided.

  9. Sensor Exposure, Exploitation, and Experimentation Environment (SE4)

    Science.gov (United States)

    Buell, D.; Duff, F.; Goding, J.; Bankston, M.; McLaughlin, T.; Six, S.; Taylor, S.; Wootton, S.

    2011-09-01

    As the resident space object population increases from new launches and events such as the COSMOS/IRIDIUM collision, the maintenance of high-level Space Situational Awareness (SSA) has become increasingly difficult. To maintain situational awareness of the changing environment, new systems and methods must be developed. The Sensor Exposure, Exploitation and Experimentation Environment (SE4) provides a platform to illustrate “The Art of the Possible” that shows the potential benefit of enriched sensor data collections and real-time data sharing. Through modeling and simulation, and a net-centric architecture, SE4 shows the added value of sharing data in real-time and exposing new types of sensor data. The objective of SE4 is to develop an experimentation and innovation environment for sensor data exposure, composable sensor capabilities, reuse, and exploitation that accelerates the delivery of needed Command and Control, Intelligence, Surveillance, and Reconnaissance capabilities to the warfighter. Through modeling, simulation and rapid prototyping, the art of the possible for a fully-connected, net-centric space Command and Control (C2) and sensor enterprise can be demonstrated. This paper provides results that demonstrate the potential for faster cataloging of breakup events and additional event monitoring that are possible with data available today in the Space Surveillance Network (SSN). Demonstrating the art of the possible for the enterprise will guide net-centric requirements definition and facilitate discussions with stakeholder organizations on the Concept of Operations (CONOPS), policy, and Tactics, Techniques, and Procedures (TTP) evolution necessary to take full advantage of net-centric operations. SE4 aligns with direction from Secretary Gates and the Chairman Joint Chief of Staff that emphasizes the need to get the most out of our existing systems. Continuing to utilize SE4 will enable the enterprise by demonstrating the benefits of applying

  10. The mobility of radioactive elements in a Uranium exploitation zone

    International Nuclear Information System (INIS)

    One of the purposes of this study is to gain knowledge on the possibilities of accumulations of the radioelements (238U, 232Th, 226Ra) in a given ecosystem, and, particularly, the knowledge of the mechanisms implied in the transfer of these radioelements around the abandoned mining exploitations. The final purpose is the evaluation of the quantity of the radioelements susceptible to reach the man. The research is directed towards a quantitative evaluation of the transport rate of the contaminating element in the soil. There have been studied the surroundings of ore mines in the Boul Massif in Poiana Rusca Mountains in Romania. These exploitations had been closed and abandoned in 1990. From a geological point of view, the region is formed from crystalline schists, banat eruptive and sedimentary rocks. The iron deposit is totally situated in crystalline rocks in Poiana Rusca Mountains. The concentration of magnetite in the deposit is 25% with a relatively uniform dissemination in the ore. Brannerite (UCaThY)(TiFe)2O6, was also found in the same place. It is an ore should contain UO3 in proportion of up to about 33%. In 1963 there were stood out areas with radioactive minerals with gamma doses in the range of 500-9100 nGy/hour. In the same time, there were also identified a few points in which the concentration of thorium and uranium were significant. The areas with radioactive mineralizations were generally limited and strictly located in the limit of the iron ores deposit. By closing the mining activities huge quantities of waste rock stored in unprotected dump remained abandoned. As a result of the process of ore extraction, the waste rock and a very low percentage of metallic minerals were stored in tailing ponds, with a clay liner necessary to isolate the tailing from the reast of the aquifer

  11. Exploiting tumor shrinkage through temporal optimization of radiotherapy

    International Nuclear Information System (INIS)

    In multi-stage radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated mostly by radiobiological considerations, but also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. The paper considers the optimal design of multi-stage treatments, motivated by the clinical management of large liver tumors for which normal liver dose constraints prohibit the administration of an ablative radiation dose in a single treatment. We introduce a dynamic tumor model that incorporates three factors: radiation induced cell kill, tumor shrinkage, and tumor cell repopulation. The design of multi-stage radiotherapy is formulated as a mathematical optimization problem in which the total dose to the normal tissue is minimized, subject to delivering the prescribed dose to the tumor. Based on the model, we gain insight into the optimal administration of radiation over time, i.e. the optimal treatment gaps and dose levels. We analyze treatments consisting of two stages in detail. The analysis confirms the intuition that the second stage should be delivered just before the tumor size reaches a minimum and repopulation overcompensates shrinking. Furthermore, it was found that, for a large range of model parameters, approximately one-third of the dose should be delivered in the first stage. The projected benefit of multi-stage treatments in terms of normal tissue sparing depends on model assumptions. However, the model predicts large dose reductions by more than a factor of 2 for plausible model parameters. The analysis of the tumor model suggests that substantial reduction in normal tissue dose can be achieved by exploiting tumor shrinkage via an optimal design of multi-stage treatments. This suggests taking a fresh look at multi-stage radiotherapy for selected disease sites where substantial tumor regression translates into reduced target volumes. (paper)

  12. Preliminary exploitation of industrial facility for flue gas treatment

    International Nuclear Information System (INIS)

    and pilot installation in Poland has lead to decision concerning design and construction of the industrial demonstration plant for electron beam flue gas treatment. Industrial demonstration facility for electron beam flue gas treatment was designed and installed in EPS Pomorzany in Szczecin. This flue gas purification installation treats exhaust gases coming from a block which consists of two Benson type boilers of power 56 MWe each, supplying additional steam for heating purposes up to 40 MWth each. The 270,000 Nm3/h flue gases (half of produced by the blocks) is treated meet Polish regulations which are imposed since 1997. Four electron accelerators has been constructed by Nissin High Voltage, Kyoto, Japan to provide 1200 kW of total beam power with electron energy 0,8 MeV to be installed in EPS Pomorzany. Two-stage irradiation was applied as it was tested at the pilot plant. The industrial installation located at EPS Pomorzany consist of two independent reaction chambers, humidification tower with water and steam supply systems, ammonia water handling system with ammonia injection, electrostatic precipitator, by product handling system, measuring and control systems. Solid particles which are formed as salts are separated in ESP and byproduct pretreated in handling system with amount up to 700 kg/h. All systems including accelerators were tested separately to meet EPS regulations (72 h continues run) and confirm producer warranted parameters and facility design specification. Some necessary modifications including accelerators were introduced by equipment producers depends on obtained results of performed measurements. The quality of shielding properties of accelerator chamber walls was tested according to national regulation and the license on accelerator exploitation and personnel qualification were issued by polish authorities. The spatial dose distribution and dose rate measurement were carried on with electron energy 700 and 800 keV. Preliminary results have

  13. The ESA Scientific Exploitation of Operational Missions element

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Zehner, Claus; Engdahl, Marcus; Benveniste, Jerome; Delwart, Steven; Gascon, Ferran; Mathieu, Pierre-Philippe; Bojkov, Bojan; Koetz, Benjamin; Arino, Olivier; Donlon, Craig; Davidson, Malcolm; Goryl, Philippe; Foumelis, Michael

    2014-05-01

    The objectives of the ESA Scientific Exploitation of Operational Missions (SEOM) programme element are • to federate, support and expand the research community • to strengthen the leadership of European EO research community • to enable the science community to address new scientific research As a preparation for the SEOM element a series of international science users consultation has been organized by ESA in 2012 and 2013 In particular the ESA Living Planet Symposium was successfully organized in Edinburgh September 2013 and involving 1700 participants from 60 countries. The science users recommendations have been gathered and form the basis for the 2014 SEOM work plan approved by ESA member states. The SEOM element is organized along the following action lines: 1. Developing open-source, multi-mission, scientific toolboxes : the new toolboxes for Sentinel 1/2/3 and 5P will be introduced 2. Research and development studies: the first SEOM studies are being launched such as the INSARAP studies for Sentinel 1 interferometry in orbit demonstration , the IAS study to generate an improved spectroscopic database of the trace gas species CH4, H2O, and CO in the 2.3 μm region and SO2 in the UV region for Sentinel 5 P. In addition larger Sentinels for science call will be tendered in 2014 covering grouped studies for Sentinel 1 Land , Sentinel 1 Ocean , Sentinel 2 Land, Sentinel 3 SAR Altimetry ,Sentinel 3 Ocean color, Sentinel 3 Land and Sentinels Synergy . 3. Science users consultation : the Sentinel 2 for Science workshop is planned from 20 to 22 may 2014 at ESRIN to prepare for scientific exploitation of the Sentinel-2 mission (http://seom.esa.int/S2forScience2014 ) . In addition the FRINGE workshop focusing on scientific explotation of Sentinel1 using SAR interferometry is planned to be held at ESA ESRIN in Q2 2015 4. Training the next generation of European EO scientists on the scientific exploitation of Sentinels data: the Advanced Training course Land

  14. Rare earth elements exploitation, geopolitical implications and raw materials trading

    Science.gov (United States)

    Chemin, Marie-Charlotte

    2015-04-01

    Rare earth elements (REE) correspond to seventeen elements of the periodic table. They are used in high technology, cracking, electric cars' magnet, metal alloy for batteries, and also in phone construction or ceramics for electronic card. REEs are an important resource for high technology. This project targets 16 years old students in the subject "personalized aid" and will last six weeks. The purpose of this project is to develop autonomy and research in groups for a transdisciplinary work. This project gathers knowledge in geology, geography and economics. During the first session students analyze the geology applications of the REE. They begin the analysis with learning the composition in different rocks such as basalt and diorite to make the link with crystallization. Then they compare it with adakite to understand the formation of these rocks. In the second session, they study REE exploitation. We can find them as oxides in many deposits. The principal concentrations of rare earth elements are associated with uncommon varieties of igneous rocks, such as carbonatites. They can use Qgis, to localize this high concentration. In the third session, they study the environmental costs of REE exploitation. Indeed, the exploitation produces thorium and carcinogenic toxins: sulphates, ammonia and hydrochloric acid. Processing one ton of rare earths produces 2,000 tons of toxic waste. This session focuses, first, on Baotou's region, and then on an example they are free to choose. In the fourth session, they study the geopolitical issues of REE with a focus on China. In fact this country is the largest producer of REE, and is providing 95% of the overall production. REE in China are at the center of a geopolitical strategy. In fact, China implements a sort of protectionism. Indeed, the export tax on REE is very high so, as a foreign company, it is financially attractive to establish a manufacturing subsidiary in China in order to use REE. As a matter of fact

  15. Analysis of energetic exploitation of straw in Vojvodina

    International Nuclear Information System (INIS)

    The Autonomous Province of Vojvodina is an autonomous province in the Republic of Serbia. It is located in the northern part of the country, in the Pannonia plain. Vojvodina is an energy-deficient province. The average yearly quantity of the cellulose wastes in Vojvodina amounts to about 9 millions tons barely in the agriculture, and the same potential on the level of Serbia estimates to almost 13 million tons. This study gives the analysis of energetic exploitation of straws from stubble cereals processed in different forms. Costs for the equipment that uses biomass in the EU are approximately two times higher with respect to those for the equipment for combustion of natural gas or of fuel oil. Costs of investments for combustion of biomass in Vojvodina if compared with the cited data are approximately for 40-50% lower. The difference of the investment costs for the construction of such units is because units for straw combustion designed and constructed in our country, have neither the complicated devices for manipulation of fuels, nor the devices for the waste gasses processing. The definite conclusions about the economic justification of the energetic exploitation of stubble straws can be obtained only by comparison of costs of the so obtained energy, with the costs of energy obtained through the combustion of classical fuels. Previous comparisons were the most often based on the comparisons of value of prices of the equivalent straw quantity with the process of fuel oil of other classical fuels. Such the comparisons leaded to the very positive evaluations of the economical effects of straws, without taking into account the realizability of the named method. Namely, comparisons of straw and fuel oil hardly could lead to the conclusion that these two fuels are mutually substitutable. According to its physical properties, straw is most similar to firewood, but the preciousness and lacking of this the very resource excludes it from the comparative analysis, so

  16. Tuning oxygen sensitivity of ruthenium complex exploiting silver nanoparticles

    Energy Technology Data Exchange (ETDEWEB)

    Ozturk, Osman [Department of Chemistry, Faculty of Science, University of Dicle, Diyarbakır (Turkey); Oter, Ozlem [Department of Chemistry, Faculty of Science, University of Dokuz Eylul, 35397 Buca, Izmir (Turkey); Center for Fabrication and Application of Electronic Materials (EMUM), University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Nanoscience and Nanoengineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Yildirim, Serdar [Center for Fabrication and Application of Electronic Materials (EMUM), University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Metallurgical and Materials Engineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Subasi, Elif [Department of Chemistry, Faculty of Science, University of Dokuz Eylul, 35397 Buca, Izmir (Turkey); Department of Nanoscience and Nanoengineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Ertekin, Kadriye, E-mail: kadriye.ertekin@deu.edu.tr [Department of Chemistry, Faculty of Science, University of Dokuz Eylul, 35397 Buca, Izmir (Turkey); Center for Fabrication and Application of Electronic Materials (EMUM), University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Nanoscience and Nanoengineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Celik, Erdal [Center for Fabrication and Application of Electronic Materials (EMUM), University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Nanoscience and Nanoengineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Metallurgical and Materials Engineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Temel, Hamdi [Department of Chemistry, Faculty of Science, University of Dicle, Diyarbakır (Turkey)

    2014-11-15

    In this study, we utilized silver nanoparticles (Ag NPs) along with ionic liquids as additives for fabrication of polymeric oxygen sensitive fibers. Plasticized polymethyl methacrylate and ethyl cellulose (EC) were used as matrix materials. Fibers and porous films were produced by electrospinning technique. Oxygen induced spectral response of the fluorescent tris(2,2′-bipyridyl) ruthenium(II) chloride (Ru(bipy){sub 3}{sup 2+}) was followed as the analytical signal. Utilization of silver nanoparticles in electrospun polymeric fibers for oxygen sensing purposes resulted with many advantages such as tuned sensitivity, linear calibration plot for larger concentration ranges, increased surface area and enhancement in all sensor dynamics. Linearity of the calibration plot for the offered composition was superior with respect to the previously reported ones. When stored at the ambient air of the laboratory there was no significant drift in intensity after 12 months. Our sensitivity and stability tests are still in progress. - Highlights: • Ag nanoparticles and Ru(II) complex doped together into polymers for the first time for O{sub 2} sensing. • The ionic liquid EMIMBF{sub 4} was used for matrix modification. • Fabricated electrospun nanofibers offered enhanced linearity for a large concentration range. • Exploited polymeric matrix materials and additives provided long-term stability. • Silver nanoparticles tuned oxygen sensitivity and facilitated fabrication process.

  17. The business of exploiting induced pluripotent stem cells.

    Science.gov (United States)

    Prescott, Catherine

    2011-08-12

    Induced pluripotent stem cells (iPS cells) can be exploited for both research and clinical applications. The first part of this review seeks to provide an understanding of the financial drivers and key elements of a successful business strategy that underpin a company focused on developing iPS-related products and services targeted at the research market. The latter part of the review highlights some of the reasons as to why the reprogramming of somatic cells is currently being used to develop cell-based models to screen for small molecules with drug-like properties rather than to develop cell-based regenerative medicines per se. The latter may be used to repair or replace a patient's damaged cells and thereby have the potential to 'cure' a disease and, in doing so, prevent or delay the onset of associated medical conditions. However, the cost of an expensive regenerative medicine and time to accrue any benefit linked to a decrease in co-morbidity expenditure may not outweigh the benefit for a healthcare community that has finite resources. The implications of this are discussed together with evidence that the UK National Institute for Health and Clinical Excellence (NICE) and the National Health Service (NHS) have established a precedent for a cost-sharing strategy with the pharmaceutical industry. PMID:21727138

  18. Compressive sensing exploiting wavelet-domain dependencies for ECG compression

    Science.gov (United States)

    Polania, Luisa F.; Carrillo, Rafael E.; Blanco-Velasco, Manuel; Barner, Kenneth E.

    2012-06-01

    Compressive sensing (CS) is an emerging signal processing paradigm that enables sub-Nyquist sampling of sparse signals. Extensive previous work has exploited the sparse representation of ECG signals in compression applications. In this paper, we propose the use of wavelet domain dependencies to further reduce the number of samples in compressive sensing-based ECG compression while decreasing the computational complexity. R wave events manifest themselves as chains of large coefficients propagating across scales to form a connected subtree of the wavelet coefficient tree. We show that the incorporation of this connectedness as additional prior information into a modified version of the CoSaMP algorithm can significantly reduce the required number of samples to achieve good quality in the reconstruction. This approach also allows more control over the ECG signal reconstruction, in particular, the QRS complex, which is typically distorted when prior information is not included in the recovery. The compression algorithm was tested upon records selected from the MIT-BIH arrhythmia database. Simulation results show that the proposed algorithm leads to high compression ratios associated with low distortion levels relative to state-of-the-art compression algorithms.

  19. Energy harvesting from human motion: exploiting swing and shock excitations

    International Nuclear Information System (INIS)

    Modern compact and low power sensors and systems are leading towards increasingly integrated wearable systems. One key bottleneck of this technology is the power supply. The use of energy harvesting techniques offers a way of supplying sensor systems without the need for batteries and maintenance. In this work we present the development and characterization of two inductive energy harvesters which exploit different characteristics of the human gait. A multi-coil topology harvester is presented which uses the swing motion of the foot. The second device is a shock-type harvester which is excited into resonance upon heel strike. Both devices were modeled and designed with the key constraint of device height in mind, in order to facilitate the integration into the shoe sole. The devices were characterized under different motion speeds and with two test subjects on a treadmill. An average power output of up to 0.84 mW is achieved with the swing harvester. With a total device volume including the housing of 21 cm3 a power density of 40 μW cm−3 results. The shock harvester generates an average power output of up to 4.13 mW. The power density amounts to 86 μW cm−3 for the total device volume of 48 cm3. Difficulties and potential improvements are discussed briefly. (paper)

  20. A legal market in organs: the problem of exploitation.

    Science.gov (United States)

    Greasley, Kate

    2014-01-01

    The article considers the objection to a commercial market in living donor organs for transplantation on the ground that such a market would be exploitative of the vendors. It examines a key challenge to that objection, to the effect that denying poor people the option to sell an organ is to withhold from them the best that a bad situation has to offer. The article casts serious doubt on this attempt at justifying an organ market, and its philosophical underpinning. Drawing, in part, from the catalogued consequences of a thriving kidney market in some parts of India, it is argued that the justification relies on conditions which are extremely unlikely to obtain, even in a regulated donor market: that organ selling meaningfully improves the material situation of the organ vendor. Far from being axiomatic, both logic and the extant empirical evidence point towards the unlikelihood of such an upshot. Finally, the article considers a few conventional counter-arguments in favour of a permissive stance on organ sales. PMID:23001920

  1. Exploitation of parallelism in climate models. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Baer, Ferdinand; Tribbia, Joseph J.; Williamson, David L.

    2001-02-05

    This final report includes details on the research accomplished by the grant entitled 'Exploitation of Parallelism in Climate Models' to the University of Maryland. The purpose of the grant was to shed light on (a) how to reconfigure the atmospheric prediction equations such that the time iteration process could be compressed by use of MPP architecture; (b) how to develop local subgrid scale models which can provide time and space dependent parameterization for a state-of-the-art climate model to minimize the scale resolution necessary for a climate model, and to utilize MPP capability to simultaneously integrate those subgrid models and their statistics; and (c) how to capitalize on the MPP architecture to study the inherent ensemble nature of the climate problem. In the process of addressing these issues, we created parallel algorithms with spectral accuracy; we developed a process for concurrent climate simulations; we established suitable model reconstructions to speed up computation; we identified and tested optimum realization statistics; we undertook a number of parameterization studies to better understand model physics; and we studied the impact of subgrid scale motions and their parameterization in atmospheric models.

  2. Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits

    Directory of Open Access Journals (Sweden)

    Christopher Kugler

    2015-10-01

    Full Text Available Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the development on new defense strategies against stack-based buffer overflows has not yet come to an end. In this article, we present a novel compiler-level protection called SCADS: Separated Control and Data Stacks that protects return addresses and saved frame pointers on a separate stack, called the control stack. In common computer programs, a single user mode stack is used to store control information next to data buffers. By separating control information from the data stack, we can protect sensitive pointers of a program’s control flow from being overwritten by buffer overflows. To substantiate the practicability of our approach, we provide SCADS as an open source patch for the LLVM compiler infrastructure. Focusing on Linux and FreeBSD running on the AMD64 architecture, we show compatibility, security and performance results. As we make control flow information simply unreachable for buffer overflows, many exploits are stopped at an early stage of progression with only negligible performance overhead.

  3. Strategic aspects of exploiting geothermal energy for industrial purposes

    International Nuclear Information System (INIS)

    Geothermal energy is widely used in Iceland for space heating swimming pools and snow melting systems as well as for greenhouses and soil heating and aquaculture. Its contribution to the standard of living in Iceland is very substantial. The industrial applications are, however, fewer today than anticipated twenty years ago. This paper considers some of the socio-economic reasons for that. Although geothermal energy is generally a cost competitive source of energy, it is site limited and does not by itself provide sufficient economic incentive to attract manufacturing or process industries. This generally requires another, locally available production factor offering further competitive advantage to justify greenfield investments. World economic slow-downs, and structural problems in many process industries after the energy crisis of the seventies have reduced interest for investments in energy intensify industries world wide. While public sector initiative motivated by technological possibilities was instrumental for developing geothermal resources in the past, time has now come for private sector initiative, led by market interest, to identify and exploit opportunities for using geothermal energy for industrial purposes. National and local governments must, however, provide the appropriate incentives to stimulate such developments

  4. Exploitation of vegetables and fruits through lactic acid fermentation.

    Science.gov (United States)

    Di Cagno, Raffaella; Coda, Rossana; De Angelis, Maria; Gobbetti, Marco

    2013-02-01

    Lactic acid fermentation represents the easiest and the most suitable way for increasing the daily consumption of fresh-like vegetables and fruits. Literature data are accumulating, and this review aims at describing the main features of the lactic acid bacteria to be used for fermentation. Lactic acid bacteria are a small part of the autochthonous microbiota of vegetables and fruits. The diversity of the microbiota markedly depends on the intrinsic and extrinsic parameters of the plant matrix. Notwithstanding the reliable value of the spontaneous fermentation to stabilize and preserve raw vegetables and fruits, a number of factors are in favour of using selected starters. Two main options may be pursued for the controlled lactic acid fermentation of vegetables and fruits: the use of commercial/allochthonous and the use of autochthonous starters. Several evidences were described in favour of the use of selected autochthonous starters, which are tailored for the specific plant matrix. Pro-technological, sensory and nutritional criteria for selecting starters were reported as well as several functional properties, which were recently ascribed to autochthonous lactic acid bacteria. The main features of the protocols used for the manufacture of traditional, emerging and innovative fermented vegetables and fruits were reviewed. Tailored lactic acid bacteria starters completely exploit the potential of vegetables and fruits, which enhances the hygiene, sensory, nutritional and shelf life properties. PMID:23122495

  5. Commercial imagery archive, management, exploitation, and distribution product development

    Science.gov (United States)

    Hollinger, Bruce; Sakkas, Alysa

    1999-12-01

    The Lockheed Martin (LM) team had garnered over a decade of operational experience on the U.S. Government's IDEX II (Imagery Dissemination and Exploitation) system. Recently, it set out to create a new commercial product to serve the needs of large-scale imagery archiving and analysis markets worldwide. LM decided to provide a turnkey commercial solution to receive, store, retrieve, process, analyze and disseminate in 'push' or 'pull' modes imagery, data and data products using a variety of sources and formats. LM selected 'best of breed' hardware and software components and adapted and developed its own algorithms to provide added functionality not commercially available elsewhere. The resultant product, Intelligent Library System (ILS)TM, satisfies requirements for (a) a potentially unbounded, data archive (5000 TB range) (b) automated workflow management for increased user productivity; (c) automatic tracking and management of files stored on shelves; (d) ability to ingest, process and disseminate data volumes with bandwidths ranging up to multi- gigabit per second; (e) access through a thin client-to-server network environment; (f) multiple interactive users needing retrieval of files in seconds from both archived images or in real time, and (g) scalability that maintains information throughput performance as the size of the digital library grows.

  6. Commercial imagery archive, management, exploitation, and distribution project development

    Science.gov (United States)

    Hollinger, Bruce; Sakkas, Alysa

    1999-10-01

    The Lockheed Martin (LM) team had garnered over a decade of operational experience on the U.S. Government's IDEX II (Imagery Dissemination and Exploitation) system. Recently, it set out to create a new commercial product to serve the needs of large-scale imagery archiving and analysis markets worldwide. LM decided to provide a turnkey commercial solution to receive, store, retrieve, process, analyze and disseminate in 'push' or 'pull' modes imagery, data and data products using a variety of sources and formats. LM selected 'best of breed' hardware and software components and adapted and developed its own algorithms to provide added functionality not commercially available elsewhere. The resultant product, Intelligent Library System (ILS)TM, satisfies requirements for (1) a potentially unbounded, data archive (5000 TB range) (2) automated workflow management for increased user productivity; (3) automatic tracking and management of files stored on shelves; (4) ability to ingest, process and disseminate data volumes with bandwidths ranging up to multi- gigabit per second; (5) access through a thin client-to-server network environment; (6) multiple interactive users needing retrieval of files in seconds from both archived images or in real time, and (7) scalability that maintains information throughput performance as the size of the digital library grows.

  7. Efficient terrestrial laser scan segmentation exploiting data structure

    Science.gov (United States)

    Mahmoudabadi, Hamid; Olsen, Michael J.; Todorovic, Sinisa

    2016-09-01

    New technologies such as lidar enable the rapid collection of massive datasets to model a 3D scene as a point cloud. However, while hardware technology continues to advance, processing 3D point clouds into informative models remains complex and time consuming. A common approach to increase processing efficiently is to segment the point cloud into smaller sections. This paper proposes a novel approach for point cloud segmentation using computer vision algorithms to analyze panoramic representations of individual laser scans. These panoramas can be quickly created using an inherent neighborhood structure that is established during the scanning process, which scans at fixed angular increments in a cylindrical or spherical coordinate system. In the proposed approach, a selected image segmentation algorithm is applied on several input layers exploiting this angular structure including laser intensity, range, normal vectors, and color information. These segments are then mapped back to the 3D point cloud so that modeling can be completed more efficiently. This approach does not depend on pre-defined mathematical models and consequently setting parameters for them. Unlike common geometrical point cloud segmentation methods, the proposed method employs the colorimetric and intensity data as another source of information. The proposed algorithm is demonstrated on several datasets encompassing variety of scenes and objects. Results show a very high perceptual (visual) level of segmentation and thereby the feasibility of the proposed algorithm. The proposed method is also more efficient compared to Random Sample Consensus (RANSAC), which is a common approach for point cloud segmentation.

  8. Biological and economic foundations of renewable resource exploitation

    International Nuclear Information System (INIS)

    A physiologically based population dynamics model of a renewable resource is used as the basis to develop a model of human harvesting. The model incorporates developing technology and the effects of market forces on the sustainability of common property resources. The bases of the model are analogies between the economics of resource harvesting and allocation by firms and adapted organisms in nature. Specifically, the paper makes the following points: (1) it shows how economic and ecological theories may be unified; (2) it punctuates the importance of time frame in the two systems (evolutionary versus market); (3) it shows, contrary to prevailing economic wisdom, how technological progress may be detrimental to resource preservation; (4) it shows how the anticipated effects of high discount rates on resource use can be catastrophic when synergized by progress in harvesting technology; (5) it suggests that increases in efficiency of utilization of the harvest encourages higher levels of resource exploitation; and (6) it shows the effects of environmental degradation on consumer and resource dynamics. The model leads to global implications on the relationship between economic growth and the ability of modern societies to maintain the environment at a sustainable level

  9. LALPC: Exploiting Parallelism from FPGAs Using C Language

    Science.gov (United States)

    Porto, Lucas F.; Fernandes, Marcio M.; Bonato, Vanderlei; Menotti, Ricardo

    2015-10-01

    This paper presents LALPC, a prototype high-level synthesis tool, specialized in hardware generation for loop-intensive code segments. As demonstrated in a previous work, the underlying hardware components target by LALPC are highly specialized for loop pipeline execution, resulting in efficient implementations, both in terms of performance and resources usage (silicon area). LALPC extends the functionality of a previous tool by using a subset of the C language as input code to describe computations, improving the usability and potential acceptance of the technique among developers. LALPC also enhances parallelism exploitation by applying loop unrolling, and providing support for automatic generation and scheduling of parallel memory accesses. The combination of using the C language to automate the process of hardware design, with an efficient underlying scheme to support loop pipelining, constitutes the main goal and contribution of the work described in this paper. Experimental results have shown the effectiveness of those techniques to enhance performance, and also exemplifies how some of the LALPC compiler features may support performance-resources trade-off analysis tasks.

  10. Cosimulation of electromagnetics-circuit systems exploiting DGTD and MNA

    KAUST Repository

    Li, Ping

    2014-06-01

    A hybrid electromagnetics (EM)-circuit simulator exploiting the discontinuous Galerkin time domain (DGTD) method and the modified nodal analysis (MNA) algorithm is developed for analyzing hybrid distributive and nonlinear multiport lumped circuit systems. The computational domain is split into two subsystems. One is the EM subsystem that is analyzed by DGTD, while the other is the circuit subsystem that is solved by the MNA method. The coupling between the EM and circuit subsystems is enforced at the lumped port where related field and circuit unknowns are coupled via the use of numerical flux, port voltages, and current sources. Since the spatial operations of DGTD are localized, thanks to the use of numerical flux, coupling matrices between EM and circuit subsystems are small and are directly inverted. To handle nonlinear devices within the circuit subsystem, the standard Newton-Raphson method is applied to the nonlinear coupling matrix system. In addition, a local time-stepping scheme is applied to improve the efficiency of the hybrid solver. Numerical examples including single and multiport linear/nonlinear circuit networks are presented to validate the proposed solver. © 2014 IEEE.

  11. Exploiting apoptosis in photodynamic therapy: is it possible?

    Science.gov (United States)

    Rendon, Cesar A.; Lilge, Lothar D.

    2003-06-01

    Glioblastoma Multiforme is the most common form of malignant brain tumors and accounts for approximately 25% of all primary brain tumors. Only 5% of these patients survive longer than 2 years. The standard form of treatment is radiation therapy and surgery if the site is accessible. Different forms of adjuvant chemotherapy have been largely proven unsuccessful. Another form of adjuvant therapy, Photodynamic Therapy (PDT), has undergone preliminary trials showing some promising results but at the cost of increased side effects like rise in intracranial blood pressure and neurological deficiency. Apoptotic cell kill used as a biological treatment endpoint can possibly ameliorate these side effects. This study evaluates the significance of apoptotic cell death in the 9L rat gliosarcoma using the aminolevulinic acid (ALA) induced endogenous photosensitizer Protophorphyrin IX (PpIX). A strong influence of drug incubation time with cell kill was observed. The percentage of apoptotic cell death was less than 10% for 2 and 4 hours incubation times and irradiation times ensuring up to 70 and 80% cell kill respectively. Accumulation of PpIX in the mitochondria and cytoplasm was quantified by confocal fluorescence microscopy showing a linear relationship of PpIX fluorescence with concentration. The possibility of an in vitro threshold in the PDT dose is discussed, above which cell repair mechanisms may become exhausted. In conclusion for the range of parameters investigated, apoptotic cell kill may be hard to exploit therapeutically in this tumor model.

  12. Exploiting dimensionality and defect mitigation to create tunable microwave dielectrics

    Science.gov (United States)

    Lee, Che-Hui; Orloff, Nathan D.; Birol, Turan; Zhu, Ye; Goian, Veronica; Rocas, Eduard; Haislmaier, Ryan; Vlahos, Eftihia; Mundy, Julia A.; Kourkoutis, Lena F.; Nie, Yuefeng; Biegalski, Michael D.; Zhang, Jingshu; Bernhagen, Margitta; Benedek, Nicole A.; Kim, Yongsam; Brock, Joel D.; Uecker, Reinhard; Xi, X. X.; Gopalan, Venkatraman; Nuzhnyy, Dmitry; Kamba, Stanislav; Muller, David A.; Takeuchi, Ichiro; Booth, James C.; Fennie, Craig J.; Schlom, Darrell G.

    2013-10-01

    The miniaturization and integration of frequency-agile microwave circuits--relevant to electronically tunable filters, antennas, resonators and phase shifters--with microelectronics offers tantalizing device possibilities, yet requires thin films whose dielectric constant at gigahertz frequencies can be tuned by applying a quasi-static electric field. Appropriate systems such as BaxSr1-xTiO3 have a paraelectric-ferroelectric transition just below ambient temperature, providing high tunability. Unfortunately, such films suffer significant losses arising from defects. Recognizing that progress is stymied by dielectric loss, we start with a system with exceptionally low loss--Srn+1TinO3n+1 phases--in which (SrO)2 crystallographic shear planes provide an alternative to the formation of point defects for accommodating non-stoichiometry. Here we report the experimental realization of a highly tunable ground state arising from the emergence of a local ferroelectric instability in biaxially strained Srn+1TinO3n+1 phases with n>=3 at frequencies up to 125GHz. In contrast to traditional methods of modifying ferroelectrics--doping or strain--in this unique system an increase in the separation between the (SrO)2 planes, which can be achieved by changing n, bolsters the local ferroelectric instability. This new control parameter, n, can be exploited to achieve a figure of merit at room temperature that rivals all known tunable microwave dielectrics.

  13. Compressed sensing MR image reconstruction exploiting TGV and wavelet sparsity.

    Science.gov (United States)

    Zhao, Di; Du, Huiqian; Han, Yu; Mei, Wenbo

    2014-01-01

    Compressed sensing (CS) based methods make it possible to reconstruct magnetic resonance (MR) images from undersampled measurements, which is known as CS-MRI. The reference-driven CS-MRI reconstruction schemes can further decrease the sampling ratio by exploiting the sparsity of the difference image between the target and the reference MR images in pixel domain. Unfortunately existing methods do not work well given that contrast changes are incorrectly estimated or motion compensation is inaccurate. In this paper, we propose to reconstruct MR images by utilizing the sparsity of the difference image between the target and the motion-compensated reference images in wavelet transform and gradient domains. The idea is attractive because it requires neither the estimation of the contrast changes nor multiple times motion compensations. In addition, we apply total generalized variation (TGV) regularization to eliminate the staircasing artifacts caused by conventional total variation (TV). Fast composite splitting algorithm (FCSA) is used to solve the proposed reconstruction problem in order to improve computational efficiency. Experimental results demonstrate that the proposed method can not only reduce the computational cost but also decrease sampling ratio or improve the reconstruction quality alternatively. PMID:25371704

  14. Compressed Sensing MR Image Reconstruction Exploiting TGV and Wavelet Sparsity

    Directory of Open Access Journals (Sweden)

    Di Zhao

    2014-01-01

    Full Text Available Compressed sensing (CS based methods make it possible to reconstruct magnetic resonance (MR images from undersampled measurements, which is known as CS-MRI. The reference-driven CS-MRI reconstruction schemes can further decrease the sampling ratio by exploiting the sparsity of the difference image between the target and the reference MR images in pixel domain. Unfortunately existing methods do not work well given that contrast changes are incorrectly estimated or motion compensation is inaccurate. In this paper, we propose to reconstruct MR images by utilizing the sparsity of the difference image between the target and the motion-compensated reference images in wavelet transform and gradient domains. The idea is attractive because it requires neither the estimation of the contrast changes nor multiple times motion compensations. In addition, we apply total generalized variation (TGV regularization to eliminate the staircasing artifacts caused by conventional total variation (TV. Fast composite splitting algorithm (FCSA is used to solve the proposed reconstruction problem in order to improve computational efficiency. Experimental results demonstrate that the proposed method can not only reduce the computational cost but also decrease sampling ratio or improve the reconstruction quality alternatively.

  15. Informing or Exploiting? Public Reponses to Giuliana Rancic's Health Narrative.

    Science.gov (United States)

    Bute, Jennifer J; Quinlan, Margaret M; Quandt, Lindsay K

    2016-08-01

    Popular entertainment journalist Giuliana Rancic has shared her struggles with pregnancy loss, infertility, and breast cancer in an array of public forums. In this study, we analyzed online comments responding to public discourses surrounding Rancic's revelations, including her miscarriage and fertility treatments, her breast cancer diagnosis, and her decision to undergo a double mastectomy. Our goal was to explore how the public framed Rancic's health challenges. Using a narrative lens, we argue that online comments reveal the tensions that celebrities like Rancic must manage as they contend with public scrutiny of their stories. Online commenters in this study framed Rancic's narrative as a privileged vantage point in which she exploited her health struggles for personal and financial gain. Our analysis of these comments also demonstrates how Rancic's narrative exists in concert with other discourses that challenge and disrupt her own account of events. The examination of these mediated discourses has implications for understanding the role of celebrity experiences in personal and public conversations about health. PMID:26756357

  16. Nuclear techniques in the prospecting and exploitation of petroleum

    International Nuclear Information System (INIS)

    The apatite is a mineral that is found in the perforation nucleus of petroleum exploration whose natural content of Uranium is of around 10 ppm. This uranium is spontaneously fissioned producing fission traces whose number it is proportional to the age of the apatite and whose longitudes remained stable to temperatures smaller than 60 C, they decreased partially in the temperature range of 60 to 120 C and they faded totally if the nucleus of perforation was to temperatures bigger than 120 C. This agreement in the call 'thermal formation window' of the petroleum among 60 and 120 C and the partial erased of the longitudes of fission traces in the apatite, it allows to use this to determine not only the age of the petroleum field, but also their geologic thermal history (paleo temperature), it also allows to model the formation of the petroleum field and to contribute to outline to PEMEX on exploitation and exploration strategies. In this work it is presented: the visualization of the fission traces in the apatite of Cerro de Mercado, Durango, considered as an international standard of dating; the basic principles of this nuclear technique that allow to determine the age of the apatite; the formation of horizontal fission traces inside the apatite, by irradiation with fission fragments; and as the analysis of the thermal instability of the lengths of the fission traces it provides information of the paleo temperature of the petroleum basin. (Author)

  17. Exploiting Child-Robot Aesthetic Interaction for a Social Robot

    Directory of Open Access Journals (Sweden)

    Jae-Joon Lee

    2012-09-01

    Full Text Available A social robot interacts and communicates with humans by using the embodied knowledge gained from interactions with its social environment. In recent years, emotion has emerged as a popular concept for designing social robots. Several studies on social robots reported an increase in robot sociability through emotional imitative interactions between the robot and humans. In this paper conventional emotional interactions are extended by exploiting the aesthetic theories that the sociability of a social robot can be markedly enhanced through aesthetic imitative interactions such as “playful acts”. We applied these aesthetic interactions to child‐robot interaction. Children imitate the emotional behaviours of a robot through aesthetic interactions; they play with the robot by mimicking its emotional facial expressions. From the tests, we see that aesthetic judgment is more influential than emotions in playful interactions between children and the robot; the aesthetic imitative interactions would reinforce the positive social relationships of children and enhance their social adaptability. To the best of our knowledge, this is the first social robot study to investigate child‐robot interaction on the basis of aesthetics.

  18. Exploitation réseau électrique Bilan 2000

    CERN Document Server

    Cumer, G

    2001-01-01

    Ce document présente le bilan annuel d'exploitation du réseau électrique pour l'année 2000. Après une présentation succincte des nouvelles sous-stations et équipements mis en service cette année, ce bilan est proposé au travers des statistiques des pannes et des demandes d'interventions des salles de contrôles PCR, MCR et PCR. Cette année 2000 aura été marquée par quelques pannes majeures ayant affecté le LEP et le SPS. L'analyse de ces incidents en fait apparaître les causes d'origines techniques, humaines ou extérieures au CERN, détaille les catégories d'équipements concernés. Ces données permettent de souligner l'impact et les conséquences lourdes de la moindre coupure électrique sur le fonctionnement des accélérateurs. Elles permettent d'autre part de mettre en lumière les points faibles actuels que sont les contrôleurs Micène, les câbles et les protections 18 kV SPS. Dans ce contexte et au vu des incidents de ces dernières années, un historique des pannes survenues sur les...

  19. Use Hierarchical Storage and Analysis to Exploit Intrinsic Parallelism

    Science.gov (United States)

    Zender, C. S.; Wang, W.; Vicente, P.

    2013-12-01

    Big Data is an ugly name for the scientific opportunities and challenges created by the growing wealth of geoscience data. How to weave large, disparate datasets together to best reveal their underlying properties, to exploit their strengths and minimize their weaknesses, to continually aggregate more information than the world knew yesterday and less than we will learn tomorrow? Data analytics techniques (statistics, data mining, machine learning, etc.) can accelerate pattern recognition and discovery. However, often researchers must, prior to analysis, organize multiple related datasets into a coherent framework. Hierarchical organization permits entire dataset to be stored in nested groups that reflect their intrinsic relationships and similarities. Hierarchical data can be simpler and faster to analyze by coding operators to automatically parallelize processes over isomorphic storage units, i.e., groups. The newest generation of netCDF Operators (NCO) embody this hierarchical approach, while still supporting traditional analysis approaches. We will use NCO to demonstrate the trade-offs involved in processing a prototypical Big Data application (analysis of CMIP5 datasets) using hierarchical and traditional analysis approaches.

  20. Thermal exploitation of wastes with lignite for energy production.

    Science.gov (United States)

    Grammelis, Panagiotis; Kakaras, Emmanuel; Skodras, George

    2003-11-01

    The thermal exploitation of wastewood with Greek lignite was investigated by performing tests in a laboratory-scale fluidized bed reactor, a 1-MW(th) semi-industrial circulating fluidized bed combustor, and an industrial boiler. Blends of natural wood, demolition wood, railroad sleepers, medium-density fiberboard residues, and power poles with lignite were used, and the co-combustion efficiency and the effect of wastewood addition on the emitted pollutants were investigated. Carbon monoxide, sulfur dioxide, and oxides of nitrogen emissions were continuously monitored, and, during the industrial-scale tests, the toxic emissions (polychlorinated dibenzodioxins and dibenzofurans and heavy metals) were determined. Ash samples were analyzed for heavy metals in an inductively coupled plasma-atomic emission spectroscopy spectrophotometer. Problems were observed during the preparation of wastewood, because species embedded with different compounds, such as railway sleepers and demolition wood, were not easily treated. All wastewood blends were proven good fuels; co-combustion proceeded smoothly and homogeneous temperature and pressure profiles were obtained. Although some fluctuations were observed, low emissions of gaseous pollutants were obtained for all fuel blends. The metal element emissions (in the flue gases and the solid residues) were lower than the legislative limits. Therefore, wastewood co-combustion with lignite can be realized, provided that the fuel handling and preparation can be practically performed in large-scale installations. PMID:14649749

  1. Evidence for exploitative interspecific competition in mud snails (Hydrobiidae)

    International Nuclear Information System (INIS)

    Some of the basic assumptions implied in the theory of limiting similarity of coexisting competitors were investigated experimentally in the case of three congeneric, deposit feeding snails. The species show character displacement with respect to size when coexisting. In experimental containers with a natural substrate, interspecific, exploitative competition between snails of the same size range is as intense as intraspecific competition. Diatoms of a given size range, which constitute the most important food, show a ''logistic'' growth response to grazing, and individual growth of the snails is linearly related to diatom density. The previous observation that the snails show size dependent selection for ingested particle sizes is extended to show that this mechanism leads to a real resource partitioning between snails of different sizes. Size frequency distribution of diatoms in the sediment is a function of the sizes of grazing snails. Size selection of ingested sand grains may also be significant for resource partitioning since the migration rate of the attached microflora between sand grains seems to be slow relative to its growth on the individual sand grains. (author)

  2. Methods for spectral image analysis by exploiting spatial simplicity

    Science.gov (United States)

    Keenan, Michael R.

    2010-11-23

    Several full-spectrum imaging techniques have been introduced in recent years that promise to provide rapid and comprehensive chemical characterization of complex samples. One of the remaining obstacles to adopting these techniques for routine use is the difficulty of reducing the vast quantities of raw spectral data to meaningful chemical information. Multivariate factor analysis techniques, such as Principal Component Analysis and Alternating Least Squares-based Multivariate Curve Resolution, have proven effective for extracting the essential chemical information from high dimensional spectral image data sets into a limited number of components that describe the spectral characteristics and spatial distributions of the chemical species comprising the sample. There are many cases, however, in which those constraints are not effective and where alternative approaches may provide new analytical insights. For many cases of practical importance, imaged samples are "simple" in the sense that they consist of relatively discrete chemical phases. That is, at any given location, only one or a few of the chemical species comprising the entire sample have non-zero concentrations. The methods of spectral image analysis of the present invention exploit this simplicity in the spatial domain to make the resulting factor models more realistic. Therefore, more physically accurate and interpretable spectral and abundance components can be extracted from spectral images that have spatially simple structure.

  3. Exploitation of semantic methods to cluster pharmacovigilance terms.

    Science.gov (United States)

    Dupuch, Marie; Dupuch, Laëtitia; Hamon, Thierry; Grabar, Natalia

    2014-01-01

    Pharmacovigilance is the activity related to the collection, analysis and prevention of adverse drug reactions (ADRs) induced by drugs. This activity is usually performed within dedicated databases (national, European, international...), in which the ADRs declared for patients are usually coded with a specific controlled terminology MedDRA (Medical Dictionary for Drug Regulatory Activities). Traditionally, the detection of adverse drug reactions is performed with data mining algorithms, while more recently the groupings of close ADR terms are also being exploited. The Standardized MedDRA Queries (SMQs) have become a standard in pharmacovigilance. They are created manually by international boards of experts with the objective to group together the MedDRA terms related to a given safety topic. Within the MedDRA version 13, 84 SMQs exist, although several important safety topics are not yet covered. The objective of our work is to propose an automatic method for assisting the creation of SMQs using the clustering of semantically close MedDRA terms. The experimented method relies on semantic approaches: semantic distance and similarity algorithms, terminology structuring methods and term clustering. The obtained results indicate that the proposed unsupervised methods appear to be complementary for this task, they can generate subsets of the existing SMQs and make this process systematic and less time consuming. PMID:24739596

  4. Augmented reality enabling intelligence exploitation at the edge

    Science.gov (United States)

    Kase, Sue E.; Roy, Heather; Bowman, Elizabeth K.; Patton, Debra

    2015-05-01

    Today's Warfighters need to make quick decisions while interacting in densely populated environments comprised of friendly, hostile, and neutral host nation locals. However, there is a gap in the real-time processing of big data streams for edge intelligence. We introduce a big data processing pipeline called ARTEA that ingests, monitors, and performs a variety of analytics including noise reduction, pattern identification, and trend and event detection in the context of an area of operations (AOR). Results of the analytics are presented to the Soldier via an augmented reality (AR) device Google Glass (Glass). Non-intrusive AR devices such as Glass can visually communicate contextually relevant alerts to the Soldier based on the current mission objectives, time, location, and observed or sensed activities. This real-time processing and AR presentation approach to knowledge discovery flattens the intelligence hierarchy enabling the edge Soldier to act as a vital and active participant in the analysis process. We report preliminary observations testing ARTEA and Glass in a document exploitation and person of interest scenario simulating edge Soldier participation in the intelligence process in disconnected deployment conditions.

  5. Efficient Resource Scheduling by Exploiting Relay Cache for Cellular Networks

    Directory of Open Access Journals (Sweden)

    Chun He

    2015-01-01

    Full Text Available In relay-enhanced cellular systems, throughput of User Equipment (UE is constrained by the bottleneck of the two-hop link, backhaul link (or the first hop link, and access link (the second hop link. To maximize the throughput, resource allocation should be coordinated between these two hops. A common resource scheduling algorithm, Adaptive Distributed Proportional Fair, only ensures that the throughput of the first hop is greater than or equal to that of the second hop. But it cannot guarantee a good balance of the throughput and fairness between the two hops. In this paper, we propose a Two-Hop Balanced Distributed Scheduling (TBS algorithm by exploiting relay cache for non-real-time data traffic. The evolved Node Basestation (eNB adaptively adjusts the number of Resource Blocks (RBs allocated to the backhaul link and direct links based on the cache information of relays. Each relay allocates RBs for relay UEs based on the size of the relay UE’s Transport Block. We also design a relay UE’s ACK feedback mechanism to update the data at relay cache. Simulation results show that the proposed TBS can effectively improve resource utilization and achieve a good trade-off between system throughput and fairness by balancing the throughput of backhaul and access link.

  6. IN A PARALLEL UNIVERSE: HOW ART EXPLOITS TECHNOLOGY

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Technical innovation in the arts creates new opportunities for perceptual shifts that lead to lasting achievements. One of the most important events took place in the 15th century not far from CERN on the other side of the Alps in Venice. Titian, in one life time, exploited these new material developments to expand the range of expression like no other artist of his generation. Titian was able to harness these new innovations to emerge as the supreme competitor and hustler, a notion that seems very much a part of the modern promotion of art as exemplified by Warhol , Jeff Koons and Damian Hirst. The language of science and technology has created social networks, changed the mediums and the subject of fine art. Fast forward to CERN 2012, the most expensive experiment in the history of science. The knowledge of dark matter will either help confirm, or not, the Standard Model. This information will be part of what Michel Foucault calls "epistemological breaks", shifts in consciousness that change our p...

  7. Waste heat exploitation in processing plants using existing power installations

    International Nuclear Information System (INIS)

    The paper reviews a new procedure patent for the exploitation of low-temperature waste heat in processing plants that consist of steam power installations for the generation of electric energy. The procedure is based on the energy exchange among different processing units, divided into processing stages, so that the input of waste heat at one point substitutes for the consumption of the primary energy medium steam at another point. This enables the utilisation of higher parameter energy accumulated from the, still operationally capable, steam, for the additional expansion on the existing steam turbine within a steam installation. Should this procedure secure a larger quantity of usable steam compared to the quantities processed by the existing steam turbine, then it could be utilised on a new, smaller turbine, which would be built into the other side of the generator, so that it made a unique operational group with the existing one. This would enable the generation of additional electric energy by means of utilising waste heat. Both above mentioned variants can be seen on the process diagram, Figure 1, which is an essential part of this report, while only the first one will be presented in detail for a particular location with a potential energy rationalisation expressed through heat power of around 11 MWt. The main characteristic of this innovation is that its implementation involves minimum investments, as little new equipment would be used with the existing power installations. (author)

  8. Low grade uranium deposits being exploited in China

    International Nuclear Information System (INIS)

    Known uranium deposits in China are mainly of granitic, volcanic and sedimentary types. A lot of ore deposits are low in grade and small in size. How to extract these resources at a profit has been a challenge to natural uranium producers. If the production cost of natural uranium from these low grade deposits is higher than the current long-term contract price in the international market, plenty of resources will be lying idle underground for a long time. The Chinese government's self-reliance policy that the nuclear fuel of reactors will be mainly supplied from domestic natural uranium products can not be executed completely. Research works and pilot tests have been done and technical improvements have been carried out with the aim of making the low grade deposits being extracted at an appropriate profit. Effective measures have been taken by some uranium mines to reduce production costs. Measures taken include improving mining methods, utilizing radiometric sorting techniques, extracting uranium from mine water, recovering uranium by solution mining and recovering associated useful minerals or compounds from ores. At present, some low grade uranium deposits are being exploited at proper costs. This paper gives a brief description of the improved techniques practiced and parameters achieved

  9. Estimating measurement noise in a time series by exploiting nonstationarity

    International Nuclear Information System (INIS)

    A measured time series is always corrupted by noise to some degree. Even a rough estimation of the level of noise contained in an experimental time series is valuable. This is so, for example, when one wishes to apply techniques from nonlinear dynamics theory to analyze a time series. However, this is a very difficult problem. It becomes even harder when the measured signal is nonstationary, which is often true in practice. Detecting nonstationarity has been a hot research topic in recent years. However, many researchers stop when they find the time series under study is indeed nonstationary. Here, we exploit the very nature of nonstationarity in a signal to formulate a method for quantitatively estimating the amount of noise contained in the signal. The approach is first verified using computer simulated signals based on the chaotic Lorenz attractors and the Mackey-Glass equations with different parameters and then applied to the clinically measured intracranial EEG signals. It is found that the amount of noise in the EEG signals is around 8.0-8.5% in terms of amplitude. Implications to whether EEG signals are chaotic or not are discussed

  10. Exploiting Seams and Closing Gaps: Lessons from Mumbai and Beyond

    Directory of Open Access Journals (Sweden)

    Dr. Andrea J. Dew

    2012-01-01

    Full Text Available This article analyzes a single event—the 2008 Mumbai attacks—in order to consider the strategic and operational lessons for dealing with other armed groups. How and why was Lashkar-e-Tayyiba (LeT able to carry out such a sophisticated attack in the heart of Mumbai? And what lessons does Mumbai hold for strategists seeking to counter other armed groups around the world? While tactical level lessons from Mumbai have been well documented, it is important to also consider what the Mumbai attacks tell us at the strategic and operational levels. Specifically, the Mumbai attacks provide valuable insight into how armed groups use the maritime environment, and how they use surprise, denial, and deception to mask intention and invite over-reaction by states. In addition, studying the Mumbai attacks provides insight into some of the strategic and operational seams and gaps that armed groups seek to exploit. These include environmental and geographical factors; institutional, bureaucratic, and jurisdictional seams and gaps between agencies; cognitive seams and gaps that made the use of the sea by LeT so difficult to conceptualize; and the diplomatic seams and gaps that led to heightened tensions among states— in this case, India, Pakistan, and the United States. This article discusses how to categorize these seams and gaps in order to better address the problems they create, and how states might best direct and focus their limited resources when faced with similar challenges.

  11. Exploiting dimensionality and defect mitigation to create tunable microwave dielectrics.

    Science.gov (United States)

    Lee, Che-Hui; Orloff, Nathan D; Birol, Turan; Zhu, Ye; Goian, Veronica; Rocas, Eduard; Haislmaier, Ryan; Vlahos, Eftihia; Mundy, Julia A; Kourkoutis, Lena F; Nie, Yuefeng; Biegalski, Michael D; Zhang, Jingshu; Bernhagen, Margitta; Benedek, Nicole A; Kim, Yongsam; Brock, Joel D; Uecker, Reinhard; Xi, X X; Gopalan, Venkatraman; Nuzhnyy, Dmitry; Kamba, Stanislav; Muller, David A; Takeuchi, Ichiro; Booth, James C; Fennie, Craig J; Schlom, Darrell G

    2013-10-24

    The miniaturization and integration of frequency-agile microwave circuits--relevant to electronically tunable filters, antennas, resonators and phase shifters--with microelectronics offers tantalizing device possibilities, yet requires thin films whose dielectric constant at gigahertz frequencies can be tuned by applying a quasi-static electric field. Appropriate systems such as BaxSr1-xTiO3 have a paraelectric-ferroelectric transition just below ambient temperature, providing high tunability. Unfortunately, such films suffer significant losses arising from defects. Recognizing that progress is stymied by dielectric loss, we start with a system with exceptionally low loss--Srn+1TinO3n+1 phases--in which (SrO)2 crystallographic shear planes provide an alternative to the formation of point defects for accommodating non-stoichiometry. Here we report the experimental realization of a highly tunable ground state arising from the emergence of a local ferroelectric instability in biaxially strained Srn+1TinO3n+1 phases with n ≥ 3 at frequencies up to 125 GHz. In contrast to traditional methods of modifying ferroelectrics-doping or strain-in this unique system an increase in the separation between the (SrO)2 planes, which can be achieved by changing n, bolsters the local ferroelectric instability. This new control parameter, n, can be exploited to achieve a figure of merit at room temperature that rivals all known tunable microwave dielectrics. PMID:24132232

  12. Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling

    CERN Document Server

    Leung, Lap-Fai; Hu, Xiaobo Sharon

    2011-01-01

    A novel energy reduction strategy to maximally exploit the dynamic workload variation is proposed for the offline voltage scheduling of preemptive systems. The idea is to construct a fully-preemptive schedule that leads to minimum energy consumption when the tasks take on approximately the average execution cycles yet still guarantees no deadline violation during the worst-case scenario. End-time for each sub-instance of the tasks obtained from the schedule is used for the on-line dynamic voltage scaling (DVS) of the tasks. For the tasks that normally require a small number of cycles but occasionally a large number of cycles to complete, such a schedule provides more opportunities for slack utilization and hence results in larger energy saving. The concept is realized by formulating the problem as a Non-Linear Programming (NLP) optimization problem. Experimental results show that, by using the proposed scheme, the total energy consumption at runtime is reduced by as high as 60% for randomly generated task set...

  13. Tuning oxygen sensitivity of ruthenium complex exploiting silver nanoparticles

    International Nuclear Information System (INIS)

    In this study, we utilized silver nanoparticles (Ag NPs) along with ionic liquids as additives for fabrication of polymeric oxygen sensitive fibers. Plasticized polymethyl methacrylate and ethyl cellulose (EC) were used as matrix materials. Fibers and porous films were produced by electrospinning technique. Oxygen induced spectral response of the fluorescent tris(2,2′-bipyridyl) ruthenium(II) chloride (Ru(bipy)32+) was followed as the analytical signal. Utilization of silver nanoparticles in electrospun polymeric fibers for oxygen sensing purposes resulted with many advantages such as tuned sensitivity, linear calibration plot for larger concentration ranges, increased surface area and enhancement in all sensor dynamics. Linearity of the calibration plot for the offered composition was superior with respect to the previously reported ones. When stored at the ambient air of the laboratory there was no significant drift in intensity after 12 months. Our sensitivity and stability tests are still in progress. - Highlights: • Ag nanoparticles and Ru(II) complex doped together into polymers for the first time for O2 sensing. • The ionic liquid EMIMBF4 was used for matrix modification. • Fabricated electrospun nanofibers offered enhanced linearity for a large concentration range. • Exploited polymeric matrix materials and additives provided long-term stability. • Silver nanoparticles tuned oxygen sensitivity and facilitated fabrication process

  14. Exploiting Unsupervised and Supervised Constraints for Subspace Clustering.

    Science.gov (United States)

    Hu, Han; Feng, Jianjiang; Zhou, Jie

    2015-08-01

    Data in many image and video analysis tasks can be viewed as points drawn from multiple low-dimensional subspaces with each subspace corresponding to one category or class. One basic task for processing such kind of data is to separate the points according to the underlying subspace, referred to as subspace clustering. Extensive studies have been made on this subject, and nearly all of them use unconstrained subspace models, meaning the points can be drawn from everywhere of a subspace, to represent the data. In this paper, we attempt to do subspace clustering based on a constrained subspace assumption that the data is further restricted in the corresponding subspaces, e.g., belonging to a submanifold or satisfying the spatial regularity constraint. This assumption usually describes the real data better, such as differently moving objects in a video scene and face images of different subjects under varying illumination. A unified integer linear programming optimization framework is used to approach subspace clustering, which can be efficiently solved by a branch-and-bound (BB) method. We also show that various kinds of supervised information, such as subspace number, outlier ratio, pairwise constraints, size prior and etc., can be conveniently incorporated into the proposed framework. Experiments on real data show that the proposed method outperforms the state-of-the-art algorithms significantly in clustering accuracy. The effectiveness of the proposed method in exploiting supervised information is also demonstrated. PMID:26352994

  15. Improved Exploiting Modification Direction Method by Modulus Operation

    Directory of Open Access Journals (Sweden)

    Ki-Hyun Jung

    2009-03-01

    Full Text Available The EMD method proposed by Zhang and Wang fully exploited modification directions. Modifications in different directions were used to represent different secret data. According to the experimental results, the highest capacity was demonstrated in the 5-ary notational system, where only one secret digit is embedded for each two pixels. But this is an inefficient method because it can be hidden more secret data without revealing to the human visual system. To improve an embedding capacity, Chang et al. proposed two-stage EMD method, Lee et al. restricted to 8-ary embedding for the EMD method, and also Lee et al. segmented the pair of cover data into two parts to embed higher secret data. But still have a room for hiding more secret data. This paper proposes an improved method of the EMD method to hide more secret data while maintaining ahigh PSNR value. The proposed method can embed secret bit on every pixel of cover data. The experimental results demonstrate that the proposed method has a high capacity and good visual quality.

  16. Exploiting pallidal plasticity for stimulation in Parkinson’s disease

    Science.gov (United States)

    Lourens, Marcel A. J.; Schwab, Bettina C.; Nirody, Jasmine A.; Meijer, Hil G. E.; van Gils, Stephan A.

    2015-04-01

    Objective. Continuous application of high-frequency deep brain stimulation (DBS) often effectively reduces motor symptoms of Parkinson’s disease patients. While there is a growing need for more effective and less traumatic stimulation, the exact mechanism of DBS is still unknown. Here, we present a methodology to exploit the plasticity of GABAergic synapses inside the external globus pallidus (GPe) for the optimization of DBS. Approach. Assuming the existence of spike-timing-dependent plasticity (STDP) at GABAergic GPe-GPe synapses, we simulate neural activity in a network model of the subthalamic nucleus and GPe. In particular, we test different DBS protocols in our model and quantify their influence on neural synchrony. Main results. In an exemplary set of biologically plausible model parameters, we show that STDP in the GPe has a direct influence on neural activity and especially the stability of firing patterns. STDP stabilizes both uncorrelated firing in the healthy state and correlated firing in the parkinsonian state. Alternative stimulation protocols such as coordinated reset stimulation can clearly profit from the stabilizing effect of STDP. These results are widely independent of the STDP learning rule. Significance. Once the model settings, e.g., connection architectures, have been described experimentally, our model can be adjusted and directly applied in the development of novel stimulation protocols. More efficient stimulation leads to both minimization of side effects and savings in battery power.

  17. Bats track and exploit changes in insect pest populations.

    Directory of Open Access Journals (Sweden)

    Gary F McCracken

    Full Text Available The role of bats or any generalist predator in suppressing prey populations depends on the predator's ability to track and exploit available prey. Using a qPCR fecal DNA assay, we document significant association between numbers of Brazilian free-tailed bats (Tadarida brasiliensis consuming corn earworm (CEW moths (Helicoverpa zea and seasonal fluctuations in CEW populations. This result is consistent with earlier research linking the bats' diet to patterns of migration, abundance, and crop infestation by important insect pests. Here we confirm opportunistic feeding on one of the world's most destructive insects and support model estimates of the bats' ecosystem services. Regression analysis of CEW consumption versus the moth's abundance at four insect trapping sites further indicates that bats track local abundance of CEW within the regional landscape. Estimates of CEW gene copies in the feces of bats are not associated with seasonal or local patterns of CEW abundance, and results of captive feeding experiments indicate that our qPCR assay does not provide a direct measure of numbers or biomass of prey consumed. Our results support growing evidence for the role of generalist predators, and bats specifically, as agents for biological control and speak to the value of conserving indigenous generalist predators.

  18. Bats track and exploit changes in insect pest populations.

    Science.gov (United States)

    McCracken, Gary F; Westbrook, John K; Brown, Veronica A; Eldridge, Melanie; Federico, Paula; Kunz, Thomas H

    2012-01-01

    The role of bats or any generalist predator in suppressing prey populations depends on the predator's ability to track and exploit available prey. Using a qPCR fecal DNA assay, we document significant association between numbers of Brazilian free-tailed bats (Tadarida brasiliensis) consuming corn earworm (CEW) moths (Helicoverpa zea) and seasonal fluctuations in CEW populations. This result is consistent with earlier research linking the bats' diet to patterns of migration, abundance, and crop infestation by important insect pests. Here we confirm opportunistic feeding on one of the world's most destructive insects and support model estimates of the bats' ecosystem services. Regression analysis of CEW consumption versus the moth's abundance at four insect trapping sites further indicates that bats track local abundance of CEW within the regional landscape. Estimates of CEW gene copies in the feces of bats are not associated with seasonal or local patterns of CEW abundance, and results of captive feeding experiments indicate that our qPCR assay does not provide a direct measure of numbers or biomass of prey consumed. Our results support growing evidence for the role of generalist predators, and bats specifically, as agents for biological control and speak to the value of conserving indigenous generalist predators. PMID:22952782

  19. Exploiting data parallelism in the Image Content Engine

    Science.gov (United States)

    Miller, W. Marcus; Garlick, Jim E.; Weinert, George F.; Abdulla, Ghaleb M.

    2006-05-01

    The Image Content Engine (ICE) is a framework of software and underlying mathematical and physical models that enable scientists and analysts to extract features from Terabytes of imagery and search the extracted features for content relevant to their problem domain. The ICE team has developed a set of tools for feature extraction and analysis of image data, primarily based on the image content. The scale and volume of imagery that must be searched presents a formidable computation and data bandwidth challenge, and a search of moderate to large scale imagery quickly becomes intractable without exploiting high degrees of data parallelism in the feature extraction engine. In this paper we describe the software and hardware architecture developed to build a data parallel processing engine for ICE. We discuss our highly tunable parallel process and job scheduling subsystem, remote procedure invocation, parallel I/O strategy, and our experience in running ICE on a 16 node, 32 processing element (CPU) Linux Cluster. We present performance and benchmark results, and describe how we obtain excellent speedup for the imagery searches in our test-bed prototype.

  20. Energy harvesting from human motion: exploiting swing and shock excitations

    Science.gov (United States)

    Ylli, K.; Hoffmann, D.; Willmann, A.; Becker, P.; Folkmer, B.; Manoli, Y.

    2015-02-01

    Modern compact and low power sensors and systems are leading towards increasingly integrated wearable systems. One key bottleneck of this technology is the power supply. The use of energy harvesting techniques offers a way of supplying sensor systems without the need for batteries and maintenance. In this work we present the development and characterization of two inductive energy harvesters which exploit different characteristics of the human gait. A multi-coil topology harvester is presented which uses the swing motion of the foot. The second device is a shock-type harvester which is excited into resonance upon heel strike. Both devices were modeled and designed with the key constraint of device height in mind, in order to facilitate the integration into the shoe sole. The devices were characterized under different motion speeds and with two test subjects on a treadmill. An average power output of up to 0.84 mW is achieved with the swing harvester. With a total device volume including the housing of 21 cm3 a power density of 40 μW cm-3 results. The shock harvester generates an average power output of up to 4.13 mW. The power density amounts to 86 μW cm-3 for the total device volume of 48 cm3. Difficulties and potential improvements are discussed briefly.

  1. Comparative analysis of redirection methods for asteroid resource exploitation

    Science.gov (United States)

    Bazzocchi, Michael C. F.; Emami, M. Reza

    2016-03-01

    An in-depth analysis and systematic comparison of asteroid redirection methods are performed within a resource exploitation framework using different assessment mechanisms. Through this framework, mission objectives and constraints are specified for the redirection of an asteroid from a near-Earth orbit to a stable orbit in the Earth-Moon system. The paper provides a detailed investigation of five redirection methods, i.e., ion beam, tugboat, gravity tractor, laser sublimation, and mass ejector, with respect to their capabilities for a redirection mission. A set of mission level criteria are utilized to assess the performance of each redirection method, and the means of assigning attributes to each criterion is discussed in detail. In addition, the uncertainty in physical characteristics of the asteroid population is quantified through the use of Monte Carlo analysis. The Monte Carlo simulation provides insight into the performance robustness of the redirection methods with respect to the targeted asteroid range. Lastly, the attributes for each redirection method are aggregated using three different multicriteria assessment approaches, i.e., the Analytical Hierarchy Process, a utility-based approach, and a fuzzy aggregation mechanism. The results of each assessment approach as well as recommendations for further studies are discussed in detail.

  2. Geological Environment Problems Caused by Controlling Groundwater Exploitation in Jiangyin City

    Institute of Scientific and Technical Information of China (English)

    DENG Qing-hai; MA Feng-shan; YUAN Ren-mao; YAO Bing-kui

    2007-01-01

    Geological environment effects caused by the control of groundwater exploitation in Jiangyin city are discussed thoroughly, including the dynamic variation of groundwater levels and quality and the development of land subsidence and ground fissures. According to the dynamic characteristics of groundwater levels, some advice about groundwater exploitation is offered. Our research will provide a basis for using groundwater resources and the prevention of geological disasters in Jiangyin city and the Suzhou-Wuxi-Changzhou area. The following results are deduced from our research. First, groundwater levels vary with the exploitation of groundwater in Jiangyin city and are affected by hydrogeological conditions. The groundwater levels remained rather stable before and after the implementation of control of groundwater exploitation in the northwest of Jiangyin city along the Yangtze River. A suitable level of exploitation should be allowed. In the southeast, the speed of recovery of the groundwater level has been rather rapid after the control of exploitation. We conclude that groundwater might be exploited locally after the groundwater level has recovered. In the southwest, the speed of recovery of the groundwater level is rather slow and exploitation of groundwater should be prohibited. Second, groundwater quality is stable in Jiangyin city and the contents of the main chemical indices of groundwater varied only slightly before and after the control of exploitation. Third, after controlling the exploitation, the speed of land subsidence has clearly slowed down and the development of ground fissures has been controlled effectively.

  3. Prevalence of select vector-borne disease agents in owned dogs of Ghana

    Directory of Open Access Journals (Sweden)

    Lorelei L. Clarke

    2014-02-01

    Full Text Available Ticks, sera and ethylenediaminetetraacetic acid (EDTA blood were collected from dogs evaluated at the Amakom Veterinary Clinic in Kumasi, Ghana. Sera were evaluated for Dirofilaria immitis antigen and antibodies against Borrelia burgdorferi, Anaplasma phagocytophilum and Ehrlichia canis. Conventional polymerase chain reaction assays designed to amplify the deoxyribonucleic acid (DNA ofEhrlichia spp. or Anaplasma spp. or Neorickettsia spp. or Wolbachia spp., Babesia spp., Rickettsia spp., Hepatozoon spp., Bartonella spp. and the haemoplasmas were performed on DNA extracted from EDTA blood and all positive amplicons were sequenced. This small survey shows that the following vector-borne pathogens are present in urban Ghanian dogs: Ehrlichia canis, Hepatozoon canis,Dirofilaria immitis and Anaplasma platys. Bartonella henselae was isolated from ticks but not from the dogs.

  4. Exploiting node mobility for energy optimization in wireless sensor networks

    Science.gov (United States)

    El-Moukaddem, Fatme Mohammad

    Wireless Sensor Networks (WSNs) have become increasingly available for data-intensive applications such as micro-climate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit the sheer amount of data generated within an application's lifetime to the base station despite the fact that sensor nodes have limited power supplies such as batteries or small solar panels. The availability of numerous low-cost robotic units (e.g. Robomote and Khepera) has made it possible to construct sensor networks consisting of mobile sensor nodes. It has been shown that the controlled mobility offered by mobile sensors can be exploited to improve the energy efficiency of a network. In this thesis, we propose schemes that use mobile sensor nodes to reduce the energy consumption of data-intensive WSNs. Our approaches differ from previous work in two main aspects. First, our approaches do not require complex motion planning of mobile nodes, and hence can be implemented on a number of low-cost mobile sensor platforms. Second, we integrate the energy consumption due to both mobility and wireless communications into a holistic optimization framework. We consider three problems arising from the limited energy in the sensor nodes. In the first problem, the network consists of mostly static nodes and contains only a few mobile nodes. In the second and third problems, we assume essentially that all nodes in the WSN are mobile. We first study a new problem called max-data mobile relay configuration (MMRC ) that finds the positions of a set of mobile sensors, referred to as relays, that maximize the total amount of data gathered by the network during its lifetime. We show that the MMRC problem is surprisingly complex even for a trivial network topology due to the joint consideration of the energy consumption of both wireless communication and mechanical locomotion. We present optimal MMRC algorithms and practical distributed

  5. Incentive Use in Research: Protecting Vulnerable Populations from Exploitation

    Directory of Open Access Journals (Sweden)

    Haruna Muwonge

    2013-06-01

    Full Text Available Global investment in Medical Research and Development has markedly increased in the last few decades. However, due to the decreasing public altruism, researchers have come under increased pressures from the funding bodies to produce results. Out of desperation, some researchers have resorted to using incentives as a means of sourcing for volunteers. Consequently, the research burden has disproportionately been shared among the most vulnerable populations in the society. Incentives especially monetary ones present an ethical dilemma because of the uncertainties’ surrounding the morality, amount and type of payment, vulnerability of volunteers and possible threats to voluntary participation. Several studies done on the use of incentives in medical research have noted that financial motivation was the number one reason for subjects to volunteer in Medical research. Mutual benefit and freedom of choice by participants were given as reasons to support their use. However, scientists who are against the use of incentives believe that they are coercive or undue inducements, and may influence a subjects’ ability to give an informed consent. Guidelines exist that protect vulnerable groups from exploitation, although none sheds light into the use of incentives. Nonetheless, in the face of the waning public altruism, the benefits of using incentives far outweigh the dangers, although researchers should avoid situations where their use may become problematic. As a mode of payment to research subjects, researchers should adopt a combination of the Dickerts’ Wage and re-imbursement models as guides in quantifying the incentive. [Archives Medical Review Journal 2013; 22(3.000: 408-417

  6. Birds of a feather: Neanderthal exploitation of raptors and corvids.

    Directory of Open Access Journals (Sweden)

    Clive Finlayson

    Full Text Available The hypothesis that Neanderthals exploited birds for the use of their feathers or claws as personal ornaments in symbolic behaviour is revolutionary as it assigns unprecedented cognitive abilities to these hominins. This inference, however, is based on modest faunal samples and thus may not represent a regular or systematic behaviour. Here we address this issue by looking for evidence of such behaviour across a large temporal and geographical framework. Our analyses try to answer four main questions: 1 does a Neanderthal to raptor-corvid connection exist at a large scale, thus avoiding associations that might be regarded as local in space or time?; 2 did Middle (associated with Neanderthals and Upper Palaeolithic (associated with modern humans sites contain a greater range of these species than Late Pleistocene paleontological sites?; 3 is there a taphonomic association between Neanderthals and corvids-raptors at Middle Palaeolithic sites on Gibraltar, specifically Gorham's, Vanguard and Ibex Caves? and; 4 was the extraction of wing feathers a local phenomenon exclusive to the Neanderthals at these sites or was it a geographically wider phenomenon?. We compiled a database of 1699 Pleistocene Palearctic sites based on fossil bird sites. We also compiled a taphonomical database from the Middle Palaeolithic assemblages of Gibraltar. We establish a clear, previously unknown and widespread, association between Neanderthals, raptors and corvids. We show that the association involved the direct intervention of Neanderthals on the bones of these birds, which we interpret as evidence of extraction of large flight feathers. The large number of bones, the variety of species processed and the different temporal periods when the behaviour is observed, indicate that this was a systematic, geographically and temporally broad, activity that the Neanderthals undertook. Our results, providing clear evidence that Neanderthal cognitive capacities were comparable to

  7. Exploiting Aura OMI Level 2 Data with High Resolution Visualization

    Science.gov (United States)

    Wei, J. C.; Yang, W.; Johnson, J. E.; Zhao, P.; Gerasimov, I. V.; Pham, L.; Vicente, G. A.; Shen, S.

    2014-12-01

    Satellite data products are important for a wide variety of applications that can bring far-reaching benefits to the science community and the broader society. These benefits can best be achieved if the satellite data are well utilized and interpreted, such as model inputs from satellite, or extreme event (such as volcano eruption, dust storm, …etc) interpretation from satellite. Unfortunately, this is not always the case, despite the abundance and relative maturity of numerous satellite data products provided by NASA and other organizations. One way to help users better understand the satellite data is to provide data along with 'Images', including accurate pixel-level (Level 2) information, pixel coverage area delineation, and science team recommended quality screening for individual geophysical parameters. Goddard Earth Sciences Data and Information Services Center (GES DISC) always strives to best support (i.e., Software-as-a-service, SaaS) the user-community for NASA Earth Science Data. In this case, we will present a new visualization tool that helps users exploiting Aura Ozone Monitoring Instrument (OMI) Level 2 data. This new visualization service utilizes Open Geospatial Consortium (OGC) standard-compliant Web Mapping Service (WMS) and Web Coverage Service (WCS) calls in the backend infrastructure. The functionality of the service allows users to select data sources (e.g., multiple parameters under the same measurement, like NO2 and SO2 from OMI Level 2 or same parameter with different methods of aggregation, like NO2 in OMNO2G and OMNO2D products), defining area-of-interest and temporal extents, zooming, panning, overlaying, sliding, and data subsetting and reformatting. The interface will also be able to connect to other OGC WMS and WCS servers, which will greatly enhance its expandability to integrate additional outside data/map sources (such as Global Imagery Browse Services (GIBS)).

  8. Tunable Optical True-Time Delay Devices Would Exploit EIT

    Science.gov (United States)

    Kulikov, Igor; DiDomenico, Leo; Lee, Hwang

    2004-01-01

    Tunable optical true-time delay devices that would exploit electromagnetically induced transparency (EIT) have been proposed. Relative to prior true-time delay devices (for example, devices based on ferroelectric and ferromagnetic materials) and electronically controlled phase shifters, the proposed devices would offer much greater bandwidths. In a typical envisioned application, an optical pulse would be modulated with an ultra-wideband radio-frequency (RF) signal that would convey the information that one seeks to communicate, and it would be required to couple differently delayed replicas of the RF signal to the radiating elements of a phased-array antenna. One or more of the proposed devices would be used to impose the delays and/or generate the delayed replicas of the RF-modulated optical pulse. The beam radiated or received by the antenna would be steered by use of a microprocessor-based control system that would adjust operational parameters of the devices to tune the delays to the required values. EIT is a nonlinear quantum optical interference effect that enables the propagation of light through an initially opaque medium. A suitable medium must have, among other properties, three quantum states (see Figure 1): an excited state (state 3), an upper ground state (state 2), and a lower ground state (state 1). These three states must form a closed system that exhibits no decays to other states in the presence of either or both of two laser beams: (1) a probe beam having the wavelength corresponding to the photon energy equal to the energy difference between states 3 and 1; and (2) a coupling beam having the wavelength corresponding to the photon energy equal to the energy difference between states 3 and 2. The probe beam is the one that is pulsed and modulated with an RF signal.

  9. Trends in the exploitation of South Atlantic shark populations.

    Science.gov (United States)

    Barreto, Rodrigo; Ferretti, Francesco; Flemming, Joanna M; Amorim, Alberto; Andrade, Humber; Worm, Boris; Lessa, Rosangela

    2016-08-01

    Approximately 25% of globally reported shark catches occur in Atlantic pelagic longline fisheries. Strong declines in shark populations have been detected in the North Atlantic, whereas in the South Atlantic the situation is less clear, although fishing effort has been increasing in this region since the late 1970s. We synthesized information on shark catch rates (based on 871,177 sharks caught on 86,492 longline sets) for the major species caught by multiple fleets in the South Atlantic between 1979 and 2011. We complied records from fishing logbooks of fishing companies, fishers, and onboard observers that were supplied to Brazilian institutions. By using exploratory data analysis and literature sources, we identified 3 phases of exploitation in these data (Supporting Information). From 1979 to 1997 (phase A), 5 fleets (40 vessels) fished mainly for tunas. From 1998 to 2008 (phase B), 20 fleets (100 vessels) fished for tunas, swordfishes, and sharks. From 2008 to 2011 (phase C), 3 fleets (30 vessels) fished for multiple species, but restrictive measures were implemented. We used generalized linear models to standardize catch rates and identify trends in each of these phases. Shark catch rates increased from 1979 to 1997, when fishing effort was low, decreased from 1998 to 2008, when fishing effort increased substantially, and remained stable or increased from 2008 to 2011, when fishing effort was again low. Our results indicate that most shark populations affected by longlines in the South Atlantic are currently depleted, but these populations may recover if fishing effort is reduced accordingly. In this context, it is problematic that comprehensive data collection, monitoring, and management of these fisheries ceased after 2012. Concurrently with the fact that Brazil is newly identified by FAO among the largest (and in fastest expansion) shark sub-products consumer market worldwide. PMID:26634410

  10. Refuging rainbow trout selectively exploit flows behind tandem cylinders.

    Science.gov (United States)

    Stewart, William J; Tian, Fang-Bao; Akanyeti, Otar; Walker, Christina J; Liao, James C

    2016-07-15

    Fishes may exploit environmental vortices to save in the cost of locomotion. Previous work has investigated fish refuging behind a single cylinder in current, a behavior termed the Kármán gait. However, current-swept habitats often contain aggregations of physical objects, and it is unclear how the complex hydrodynamics shed from multiple structures affect refuging in fish. To begin to address this, we investigated how the flow fields produced by two D-shaped cylinders arranged in tandem affect the ability of rainbow trout (Oncorhynchus mykiss) to Kármán gait. We altered the spacing of the two cylinders from l/D of 0.7 to 2.7 (where l=downstream spacing of cylinders and D=cylinder diameter) and recorded the kinematics of trout swimming behind the cylinders with high-speed video at Re=10,000-55,000. Digital particle image velocimetry showed that increasing l/D decreased the strength of the vortex street by an average of 53% and decreased the frequency that vortices were shed by ∼20% for all speeds. Trout were able to Kármán gait behind all cylinder treatments despite these differences in the downstream wake; however, they Kármán gaited over twice as often behind closely spaced cylinders (l/D=0.7, 1.1, and 1.5). Computational fluid dynamics simulations show that when cylinders are widely spaced, the upstream cylinder generates a vortex street that interacts destructively with the downstream cylinder, producing weaker, more widely spaced and less-organized vortices that discourage Kármán gaiting. These findings are poised to help predict when fish may seek refuge in natural habitats based on the position and arrangement of stationary objects. PMID:27445401

  11. The impact of pathogens on exploited populations of decapod crustaceans.

    Science.gov (United States)

    Shields, Jeffrey D

    2012-06-01

    Several crustacean fisheries have experienced significant outbreaks of disease that have damaged their industries. Not only do fisheries suffer from direct losses to pathogens, such as disease-induced mortalities or reduced product value, but they can also incur indirect losses such as stunting, castration, and increased risk of predation. In some cases, the indirect losses can be substantial, yet they are often overlooked by the fishing industry as their primary focus is on recruits to the fishery, and not on the affected juvenile pre-recruits. Low levels of pathogens are to be expected in natural populations of commercial species, but baseline data on the prevalence and intensity of even the most common agents is often lacking. It is important to establish baselines for two reasons. First, it is important to know what pathogens exist in heavily exploited populations so as to gauge their potential to damage the industry; and second, during outbreaks, it is important to know whether an outbreak is a newly emergent event or whether it is a component of a cyclical phenomenon. Pathogens frequently act in concert with environmental stressors, and a variety of stressors have contributed to outbreaks of emerging agents in crustacean fisheries. Pollution, poor water quality, hypoxia, temperature extremes, and overexploitation have all been implicated as stressors in various outbreaks. This review focuses on epidemic diseases of commercially fished crustaceans. Outbreaks in cultured stocks are not covered. Disease epizootics have occurred in fished populations of crayfish and shrimp but they are less well known than the issues arising from extensive aquaculture of these species. PMID:22434001

  12. Trawling bats exploit an echo-acoustic ground effect

    Directory of Open Access Journals (Sweden)

    Sandor eZsebok

    2013-04-01

    Full Text Available A water surface acts not only as an optic mirror but also as an acoustic mirror. Echolocation calls emitted by bats at low heights above water are reflected away from the bat, and hence the background clutter is reduced. Moreover, targets on the surface create an enhanced echo. Here, we formally quantified the effect of the substrate and target height on both target detection and –discrimination in a combined laboratory and field approach with Myotis daubentonii. In a two-alternative, forced-choice paradigm, the bats had to detect a mealworm and discriminate it from an inedible dummy (20 mm PVC disc. Psychophysical performance was measured as a function of height above either smooth substrates (water or PVC or above a clutter substrate (artificial grass. At low heights above the clutter substrate (10, 20 or 35 cm, the bats’ detection performance was worse than above a smooth substrate. At a height of 50 cm, the substrate structure had no influence on target detection. Above the clutter surface, also target discrimination was significantly impaired with decreasing target height. A detailed analysis of the bats’ echolocation calls during target approach shows that above the clutter substrate, the bats produce calls with significantly higher peak frequency. Flight-path reconstruction revealed that the bats attacked an object from below over water but from above over a clutter substrate.These results are consistent with the hypothesis that trawling bats exploit an echo-acoustic ground effect, in terms of a spatio-temporal integration of direct reflections with indirect reflections from the water surface, to optimize prey detection and –discrimination not only for prey on the water but also for some range above.

  13. Exploitation of hemicellulose, cellulose and lignin from Hesperaloe funifera.

    Science.gov (United States)

    Sánchez, R; Rodríguez, A; García, J C; Rosal, A; Jiménez, L

    2011-01-01

    This work seeks the integral use of all major components of Hesperaloe funifera, separating hemicelluose by hydrothermal treatments; cellulose by pulping processes; and exploitation of lignin of pulping liquor by pyrolysis and gasification processes. By using sulfuric acid in the hydrothermal treatment (150-190 °C, 0-20 min after reaching operating temperature, 6-10 liquid/solid ratio, 0.1-0.5% sulfuric acid), the glucose and xylose of liquid fraction increase from 1.5% to 5.9%, and 4.0% to 12.4%, respectively; the yields of solid fraction decrease from 91.6% to 79.5%, and the lignin content increase from 23% to 32%. Pulps and paper sheets obtained from solid fractions hydrothermal treatments and from raw material pulped with diethanolamine, are worse than those obtained with soda-anthraquinone (Yield 57.8%; kappa number 24.9; Viscosity 711 mL/g; Brightness 54.8%; Tensile index 73.6 Nm/g; Stretch 2.84%; Burst index 6.13 kN/g and Tear index 1.69 mNm2/g). By acidification (pH 6) of soda pulping liquor it separate lignin-rich solids, which by pyrolysis gave a gas containing 1.13% H2, 31.79% CO and 1.86% CH4 by weight. Gasification of the same sample provided a gas containing 0.18% H2, 24.50% CO and 17.75% CH4. PMID:20846856

  14. Optimization of hydraulic machinery by exploiting previous successful designs

    International Nuclear Information System (INIS)

    A design-optimization method for hydraulic machinery is proposed. Optimal designs are obtained using the appropriate CFD evaluation software driven by an evolutionary algorithm which is also assisted by artificial neural networks used as surrogate evaluation models or metamodels. As shown in a previous IAHR paper by the same authors, such an optimization method substantially reduces the CPU cost, since the metamodels can discard numerous non-promising candidate solutions generated during the evolution, at almost negligible CPU cost, without evaluating them by means of the costly CFD tool. The present paper extends the optimization method of the previous paper by making it capable to accommodate and exploit pieces of useful information archived during previous relevant successful designs. So, instead of parameterizing the geometry of the hydraulic machine components, which inevitably leads to many design variables, enough to slow down the design procedure, in the proposed method all new designs are expressed as weighted combinations of the archived ones. The archived designs act as the design space bases. The role of the optimization algorithms is to find the set (or sets, for more than one objectives, where the Pareto front of non-dominated solutions is sought) of weight values, corresponding to the hydraulic machine configuration(s) with optimal performance. Since the number of weights is much less that the number of design variables of the conventional shape parameterization, the design space dimension reduces and the CPU cost of the metamodel-assisted evolutionary algorithm is much lower. The design of a Francis runner is used to demonstrate the capabilities of the proposed method.

  15. Improving Quay Cranes Exploitation by Implementing a Port Equipment Management System

    Directory of Open Access Journals (Sweden)

    Cristina Dragomir

    2011-09-01

    Full Text Available Port operators use almost all type of port equipments, from a range of heavy equipments to light machines. Port activities efficiency can be achieved by improving the exploitation of the necessary port equipment for handling cargo. Objectives of research are based on establishing factors that influence management activities of quay cranes exploitation. A better exploitation management of quay cranes can be achieved by implementing a proper port equipment management system

  16. Improving Quay Cranes Exploitation by Implementing a Port Equipment Management System

    OpenAIRE

    Cristina Dragomir

    2011-01-01

    Port operators use almost all type of port equipments, from a range of heavy equipments to light machines. Port activities efficiency can be achieved by improving the exploitation of the necessary port equipment for handling cargo. Objectives of research are based on establishing factors that influence management activities of quay cranes exploitation. A better exploitation management of quay cranes can be achieved by implementing a proper port equipment management system

  17. Rational Exploitation of Resources and Prevention of Geohazards in Karst Regions

    Institute of Scientific and Technical Information of China (English)

    卢耀如

    2001-01-01

    This paper discusses the rational exploitation of main resources and prevention of geohazards in karst regions. There exist relationship chains between natural disasters in the earth, which include the chain between geological hazards and climatic hazards, the chain between geological hazards and biogenic hazards as well as the one between geological hazards. Irrational exploitation of all resources will inevitably cause hazards. Therefore it is very important to discuss the problem related to prevention of geohazards by rational exploitation of resources.``

  18. FULL WAVEFORM LIDAR EXPLOITATION TECHNIQUE AND ITS EVALUATION IN THE MIXED FOREST HILLY REGION

    OpenAIRE

    Chhatkuli, S.; Mano, K.; Kogure, T.; Tachibana, K; H. Shimamura

    2012-01-01

    In this paper a full waveform exploitation technique and its evaluation in the mixed forest hilly region is presented. The increment in ground penetration by using the full waveform exploitation technique compared to the discrete LiDAR pulses during autumn and winter season is evaluated. The results showed that the technique used for the full waveform exploitation has effectively increased the ground penetration by 50 % and 20 %, respectively, during autumn and winter in the mixed fo...

  19. SEXUAL EXPLOITATION OF CHILDREN IN THE TOURISM – THE DARK SIDE OF TOURISM

    OpenAIRE

    Janez Mekinc; Katarina Music

    2015-01-01

    The underlying causes of sexual exploitation and prostitution are poverty, inequality between women and men, high population growth and rural - urban migration. Victims are, predominantly, women and children with lower socio-economic status. One particular form of sexual exploitation is child sex tourism. This ruthless exploitation of children can be found throughout the world, predominantly in the third world and developing countries. Children, mainly between the ages of 6 to 14 years, are t...

  20. Sex, Gore and Provocation: the Influence of Exploitation in John Waters’s Early Films

    OpenAIRE

    Pereira Nunes, Elise

    2016-01-01

    A self-taught filmmaker working with very low budgets, fascinated with Hollywood’s glamor as well as exploitation and underground cinema, John Waters has appropriated techniques and modes of production, distribution and promotion specific to exploitation from the beginning of his career in the late 1960s. The illicit, controversial topics addressed in his early movies, traditionally brought up by exploitation in order to attract audiences whose voyeuristic desires would not be fulfilled by Ho...